Hay
Date
July 15, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.700994] ==================================================================
[   20.701051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.701101] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.701642] 
[   20.701709] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.701821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.701852] Hardware name: linux,dummy-virt (DT)
[   20.701886] Call trace:
[   20.702108]  show_stack+0x20/0x38 (C)
[   20.702201]  dump_stack_lvl+0x8c/0xd0
[   20.702308]  print_report+0x118/0x5d0
[   20.702428]  kasan_report+0xdc/0x128
[   20.702474]  __asan_report_load8_noabort+0x20/0x30
[   20.702527]  kasan_atomics_helper+0x3f58/0x4858
[   20.702624]  kasan_atomics+0x198/0x2e0
[   20.702857]  kunit_try_run_case+0x170/0x3f0
[   20.702942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.703000]  kthread+0x328/0x630
[   20.703046]  ret_from_fork+0x10/0x20
[   20.703095] 
[   20.703115] Allocated by task 267:
[   20.703145]  kasan_save_stack+0x3c/0x68
[   20.703211]  kasan_save_track+0x20/0x40
[   20.703251]  kasan_save_alloc_info+0x40/0x58
[   20.703389]  __kasan_kmalloc+0xd4/0xd8
[   20.703568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.703609]  kasan_atomics+0xb8/0x2e0
[   20.703666]  kunit_try_run_case+0x170/0x3f0
[   20.703832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.703900]  kthread+0x328/0x630
[   20.703992]  ret_from_fork+0x10/0x20
[   20.704105] 
[   20.704183] The buggy address belongs to the object at fff00000c59c9e00
[   20.704183]  which belongs to the cache kmalloc-64 of size 64
[   20.704261] The buggy address is located 0 bytes to the right of
[   20.704261]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.704331] 
[   20.704354] The buggy address belongs to the physical page:
[   20.704387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.704444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.704494] page_type: f5(slab)
[   20.705023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.705184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.705569] page dumped because: kasan: bad access detected
[   20.705616] 
[   20.705711] Memory state around the buggy address:
[   20.705961]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.706013]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.706057] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.706100]                                      ^
[   20.706134]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.706181]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.706232] ==================================================================
[   20.830159] ==================================================================
[   20.830233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.830413] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.830478] 
[   20.830510] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.830814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.830857] Hardware name: linux,dummy-virt (DT)
[   20.830892] Call trace:
[   20.831269]  show_stack+0x20/0x38 (C)
[   20.831471]  dump_stack_lvl+0x8c/0xd0
[   20.831634]  print_report+0x118/0x5d0
[   20.831695]  kasan_report+0xdc/0x128
[   20.831742]  kasan_check_range+0x100/0x1a8
[   20.831792]  __kasan_check_write+0x20/0x30
[   20.832171]  kasan_atomics_helper+0x1384/0x4858
[   20.832262]  kasan_atomics+0x198/0x2e0
[   20.832668]  kunit_try_run_case+0x170/0x3f0
[   20.832747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.833071]  kthread+0x328/0x630
[   20.833142]  ret_from_fork+0x10/0x20
[   20.834042] 
[   20.834588] Allocated by task 267:
[   20.834883]  kasan_save_stack+0x3c/0x68
[   20.835065]  kasan_save_track+0x20/0x40
[   20.835285]  kasan_save_alloc_info+0x40/0x58
[   20.835403]  __kasan_kmalloc+0xd4/0xd8
[   20.835645]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.835841]  kasan_atomics+0xb8/0x2e0
[   20.836028]  kunit_try_run_case+0x170/0x3f0
[   20.836180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.836336]  kthread+0x328/0x630
[   20.836398]  ret_from_fork+0x10/0x20
[   20.836440] 
[   20.836462] The buggy address belongs to the object at fff00000c59c9e00
[   20.836462]  which belongs to the cache kmalloc-64 of size 64
[   20.836529] The buggy address is located 0 bytes to the right of
[   20.836529]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.836600] 
[   20.836640] The buggy address belongs to the physical page:
[   20.836674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.836730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.836781] page_type: f5(slab)
[   20.836821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.836885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.836932] page dumped because: kasan: bad access detected
[   20.836976] 
[   20.837015] Memory state around the buggy address:
[   20.837060]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.837107]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.837153] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.837214]                                      ^
[   20.837248]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.837307]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.837742] ==================================================================
[   20.963144] ==================================================================
[   20.963199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.963267] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.963320] 
[   20.963351] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.963562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.963602] Hardware name: linux,dummy-virt (DT)
[   20.963659] Call trace:
[   20.963686]  show_stack+0x20/0x38 (C)
[   20.963737]  dump_stack_lvl+0x8c/0xd0
[   20.963798]  print_report+0x118/0x5d0
[   20.963845]  kasan_report+0xdc/0x128
[   20.963902]  kasan_check_range+0x100/0x1a8
[   20.963952]  __kasan_check_write+0x20/0x30
[   20.964000]  kasan_atomics_helper+0x17ec/0x4858
[   20.964051]  kasan_atomics+0x198/0x2e0
[   20.964103]  kunit_try_run_case+0x170/0x3f0
[   20.964154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.964225]  kthread+0x328/0x630
[   20.964272]  ret_from_fork+0x10/0x20
[   20.964321] 
[   20.964351] Allocated by task 267:
[   20.964382]  kasan_save_stack+0x3c/0x68
[   20.964431]  kasan_save_track+0x20/0x40
[   20.964472]  kasan_save_alloc_info+0x40/0x58
[   20.964520]  __kasan_kmalloc+0xd4/0xd8
[   20.964559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.964603]  kasan_atomics+0xb8/0x2e0
[   20.964649]  kunit_try_run_case+0x170/0x3f0
[   20.964690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.964737]  kthread+0x328/0x630
[   20.964795]  ret_from_fork+0x10/0x20
[   20.964841] 
[   20.964867] The buggy address belongs to the object at fff00000c59c9e00
[   20.964867]  which belongs to the cache kmalloc-64 of size 64
[   20.964929] The buggy address is located 0 bytes to the right of
[   20.964929]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.965003] 
[   20.965024] The buggy address belongs to the physical page:
[   20.965068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.965140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.965191] page_type: f5(slab)
[   20.965240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.965293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.965841] page dumped because: kasan: bad access detected
[   20.966100] 
[   20.966129] Memory state around the buggy address:
[   20.966740]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.967225]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.967322] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.967396]                                      ^
[   20.967492]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.967569]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.967924] ==================================================================
[   20.896888] ==================================================================
[   20.897444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.897525] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.897650] 
[   20.897719] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.898244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.898630] Hardware name: linux,dummy-virt (DT)
[   20.898709] Call trace:
[   20.898950]  show_stack+0x20/0x38 (C)
[   20.899391]  dump_stack_lvl+0x8c/0xd0
[   20.899620]  print_report+0x118/0x5d0
[   20.899737]  kasan_report+0xdc/0x128
[   20.899990]  __asan_report_load8_noabort+0x20/0x30
[   20.900137]  kasan_atomics_helper+0x3db0/0x4858
[   20.900296]  kasan_atomics+0x198/0x2e0
[   20.900349]  kunit_try_run_case+0x170/0x3f0
[   20.900906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.901171]  kthread+0x328/0x630
[   20.901394]  ret_from_fork+0x10/0x20
[   20.901691] 
[   20.901859] Allocated by task 267:
[   20.902083]  kasan_save_stack+0x3c/0x68
[   20.902318]  kasan_save_track+0x20/0x40
[   20.902702]  kasan_save_alloc_info+0x40/0x58
[   20.902831]  __kasan_kmalloc+0xd4/0xd8
[   20.902931]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.902972]  kasan_atomics+0xb8/0x2e0
[   20.903061]  kunit_try_run_case+0x170/0x3f0
[   20.903269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.903661]  kthread+0x328/0x630
[   20.903833]  ret_from_fork+0x10/0x20
[   20.904116] 
[   20.904334] The buggy address belongs to the object at fff00000c59c9e00
[   20.904334]  which belongs to the cache kmalloc-64 of size 64
[   20.904419] The buggy address is located 0 bytes to the right of
[   20.904419]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.904491] 
[   20.904748] The buggy address belongs to the physical page:
[   20.904860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.904921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.905005] page_type: f5(slab)
[   20.905052] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.905119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.905165] page dumped because: kasan: bad access detected
[   20.905220] 
[   20.905240] Memory state around the buggy address:
[   20.905295]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.905597]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.905944] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.906016]                                      ^
[   20.906067]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.906122]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.906303] ==================================================================
[   20.952623] ==================================================================
[   20.952788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.953311] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.953399] 
[   20.953432] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.953516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.953544] Hardware name: linux,dummy-virt (DT)
[   20.953953] Call trace:
[   20.954313]  show_stack+0x20/0x38 (C)
[   20.954397]  dump_stack_lvl+0x8c/0xd0
[   20.954558]  print_report+0x118/0x5d0
[   20.954744]  kasan_report+0xdc/0x128
[   20.954813]  __asan_report_load8_noabort+0x20/0x30
[   20.955085]  kasan_atomics_helper+0x3e20/0x4858
[   20.955309]  kasan_atomics+0x198/0x2e0
[   20.955585]  kunit_try_run_case+0x170/0x3f0
[   20.955800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.955927]  kthread+0x328/0x630
[   20.956318]  ret_from_fork+0x10/0x20
[   20.956427] 
[   20.956637] Allocated by task 267:
[   20.956847]  kasan_save_stack+0x3c/0x68
[   20.956918]  kasan_save_track+0x20/0x40
[   20.957110]  kasan_save_alloc_info+0x40/0x58
[   20.957189]  __kasan_kmalloc+0xd4/0xd8
[   20.957245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.957469]  kasan_atomics+0xb8/0x2e0
[   20.957679]  kunit_try_run_case+0x170/0x3f0
[   20.957920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.958080]  kthread+0x328/0x630
[   20.958562]  ret_from_fork+0x10/0x20
[   20.958876] 
[   20.958938] The buggy address belongs to the object at fff00000c59c9e00
[   20.958938]  which belongs to the cache kmalloc-64 of size 64
[   20.959020] The buggy address is located 0 bytes to the right of
[   20.959020]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.959333] 
[   20.959398] The buggy address belongs to the physical page:
[   20.959643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.959848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.959995] page_type: f5(slab)
[   20.960291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.960652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.960731] page dumped because: kasan: bad access detected
[   20.961106] 
[   20.961473] Memory state around the buggy address:
[   20.961632]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.961724]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.961780] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.961822]                                      ^
[   20.962031]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.962440]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.962631] ==================================================================
[   20.761599] ==================================================================
[   20.761740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.761787] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.761857] 
[   20.761925] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.762038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.762107] Hardware name: linux,dummy-virt (DT)
[   20.762141] Call trace:
[   20.762184]  show_stack+0x20/0x38 (C)
[   20.762247]  dump_stack_lvl+0x8c/0xd0
[   20.762294]  print_report+0x118/0x5d0
[   20.762341]  kasan_report+0xdc/0x128
[   20.762386]  kasan_check_range+0x100/0x1a8
[   20.762435]  __kasan_check_write+0x20/0x30
[   20.762516]  kasan_atomics_helper+0xff0/0x4858
[   20.762573]  kasan_atomics+0x198/0x2e0
[   20.762618]  kunit_try_run_case+0x170/0x3f0
[   20.762698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.762782]  kthread+0x328/0x630
[   20.762843]  ret_from_fork+0x10/0x20
[   20.762909] 
[   20.762967] Allocated by task 267:
[   20.762996]  kasan_save_stack+0x3c/0x68
[   20.763054]  kasan_save_track+0x20/0x40
[   20.763111]  kasan_save_alloc_info+0x40/0x58
[   20.763166]  __kasan_kmalloc+0xd4/0xd8
[   20.763211]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.763252]  kasan_atomics+0xb8/0x2e0
[   20.763289]  kunit_try_run_case+0x170/0x3f0
[   20.763328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.763375]  kthread+0x328/0x630
[   20.763463]  ret_from_fork+0x10/0x20
[   20.763523] 
[   20.763562] The buggy address belongs to the object at fff00000c59c9e00
[   20.763562]  which belongs to the cache kmalloc-64 of size 64
[   20.763675] The buggy address is located 0 bytes to the right of
[   20.763675]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.763791] 
[   20.763815] The buggy address belongs to the physical page:
[   20.763855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.763919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.763971] page_type: f5(slab)
[   20.764010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.764063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.764409] page dumped because: kasan: bad access detected
[   20.764449] 
[   20.764468] Memory state around the buggy address:
[   20.764503]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.764549]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.764596] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.764709]                                      ^
[   20.764750]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.764805]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.764846] ==================================================================
[   20.778689] ==================================================================
[   20.778745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.778795] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.778848] 
[   20.778880] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.778991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.779022] Hardware name: linux,dummy-virt (DT)
[   20.779055] Call trace:
[   20.779080]  show_stack+0x20/0x38 (C)
[   20.779128]  dump_stack_lvl+0x8c/0xd0
[   20.779186]  print_report+0x118/0x5d0
[   20.779245]  kasan_report+0xdc/0x128
[   20.779291]  kasan_check_range+0x100/0x1a8
[   20.779341]  __kasan_check_write+0x20/0x30
[   20.779389]  kasan_atomics_helper+0x1128/0x4858
[   20.779437]  kasan_atomics+0x198/0x2e0
[   20.779482]  kunit_try_run_case+0x170/0x3f0
[   20.779531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.779586]  kthread+0x328/0x630
[   20.779643]  ret_from_fork+0x10/0x20
[   20.779690] 
[   20.779711] Allocated by task 267:
[   20.779751]  kasan_save_stack+0x3c/0x68
[   20.779803]  kasan_save_track+0x20/0x40
[   20.779841]  kasan_save_alloc_info+0x40/0x58
[   20.779882]  __kasan_kmalloc+0xd4/0xd8
[   20.779918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.779958]  kasan_atomics+0xb8/0x2e0
[   20.780002]  kunit_try_run_case+0x170/0x3f0
[   20.780044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.780093]  kthread+0x328/0x630
[   20.780131]  ret_from_fork+0x10/0x20
[   20.780167] 
[   20.780187] The buggy address belongs to the object at fff00000c59c9e00
[   20.780187]  which belongs to the cache kmalloc-64 of size 64
[   20.780607] The buggy address is located 0 bytes to the right of
[   20.780607]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.780694] 
[   20.780961] The buggy address belongs to the physical page:
[   20.781044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.781105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.781434] page_type: f5(slab)
[   20.781550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.781795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.781861] page dumped because: kasan: bad access detected
[   20.782103] 
[   20.782174] Memory state around the buggy address:
[   20.782519]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.782662]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.782719] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.782994]                                      ^
[   20.783103]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.783335]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.783587] ==================================================================
[   20.545195] ==================================================================
[   20.545263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.545339] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.545457] 
[   20.545488] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.545572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.545602] Hardware name: linux,dummy-virt (DT)
[   20.546239]  kasan_report+0xdc/0x128
[   20.547081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.547257]  kthread+0x328/0x630
[   20.547384]  ret_from_fork+0x10/0x20
[   20.547620] 
[   20.547641] Allocated by task 267:
[   20.547691]  kasan_save_stack+0x3c/0x68
[   20.547735]  kasan_save_track+0x20/0x40
[   20.547821]  kasan_save_alloc_info+0x40/0x58
[   20.547911]  __kasan_kmalloc+0xd4/0xd8
[   20.547948]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.547989]  kasan_atomics+0xb8/0x2e0
[   20.548026]  kunit_try_run_case+0x170/0x3f0
[   20.548088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.548241]  kthread+0x328/0x630
[   20.548278]  ret_from_fork+0x10/0x20
[   20.548317] 
[   20.548338] The buggy address belongs to the object at fff00000c59c9e00
[   20.548338]  which belongs to the cache kmalloc-64 of size 64
[   20.548408] The buggy address is located 0 bytes to the right of
[   20.548408]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.548525] 
[   20.548547] The buggy address belongs to the physical page:
[   20.548580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.548633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.549136] page_type: f5(slab)
[   20.549184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.549251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.549551] page dumped because: kasan: bad access detected
[   20.549588] 
[   20.549626] Memory state around the buggy address:
[   20.549692]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.549740]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.549804] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.549847]                                      ^
[   20.549882]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.549928]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.549969] ==================================================================
[   20.745848] ==================================================================
[   20.746056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.746252] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.746306] 
[   20.746338] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.746423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.746453] Hardware name: linux,dummy-virt (DT)
[   20.746487] Call trace:
[   20.746509]  show_stack+0x20/0x38 (C)
[   20.746556]  dump_stack_lvl+0x8c/0xd0
[   20.746606]  print_report+0x118/0x5d0
[   20.746653]  kasan_report+0xdc/0x128
[   20.746699]  kasan_check_range+0x100/0x1a8
[   20.749361]  __kasan_check_write+0x20/0x30
[   20.750157]  kasan_atomics_helper+0xf20/0x4858
[   20.750406]  kasan_atomics+0x198/0x2e0
[   20.750708]  kunit_try_run_case+0x170/0x3f0
[   20.751553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.752381]  kthread+0x328/0x630
[   20.752641]  ret_from_fork+0x10/0x20
[   20.752830] 
[   20.752853] Allocated by task 267:
[   20.752963]  kasan_save_stack+0x3c/0x68
[   20.753008]  kasan_save_track+0x20/0x40
[   20.753046]  kasan_save_alloc_info+0x40/0x58
[   20.753088]  __kasan_kmalloc+0xd4/0xd8
[   20.754558]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.755029]  kasan_atomics+0xb8/0x2e0
[   20.755082]  kunit_try_run_case+0x170/0x3f0
[   20.756241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.756304]  kthread+0x328/0x630
[   20.756345]  ret_from_fork+0x10/0x20
[   20.756384] 
[   20.756406] The buggy address belongs to the object at fff00000c59c9e00
[   20.756406]  which belongs to the cache kmalloc-64 of size 64
[   20.756471] The buggy address is located 0 bytes to the right of
[   20.756471]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.756539] 
[   20.756561] The buggy address belongs to the physical page:
[   20.756595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.756650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.756702] page_type: f5(slab)
[   20.756742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.756796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.756841] page dumped because: kasan: bad access detected
[   20.756877] 
[   20.756897] Memory state around the buggy address:
[   20.756933]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.756982]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.757029] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.757116]                                      ^
[   20.757246]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.757364]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.757470] ==================================================================
[   20.784752] ==================================================================
[   20.784809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.785062] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.785224] 
[   20.785268] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.786988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.787139] Hardware name: linux,dummy-virt (DT)
[   20.787312] Call trace:
[   20.787397]  show_stack+0x20/0x38 (C)
[   20.789351]  dump_stack_lvl+0x8c/0xd0
[   20.789425]  print_report+0x118/0x5d0
[   20.789472]  kasan_report+0xdc/0x128
[   20.789521]  kasan_check_range+0x100/0x1a8
[   20.790312]  __kasan_check_write+0x20/0x30
[   20.790384]  kasan_atomics_helper+0x1190/0x4858
[   20.791254]  kasan_atomics+0x198/0x2e0
[   20.791754]  kunit_try_run_case+0x170/0x3f0
[   20.791843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.791904]  kthread+0x328/0x630
[   20.792100]  ret_from_fork+0x10/0x20
[   20.792369] 
[   20.792677] Allocated by task 267:
[   20.792730]  kasan_save_stack+0x3c/0x68
[   20.792931]  kasan_save_track+0x20/0x40
[   20.793013]  kasan_save_alloc_info+0x40/0x58
[   20.793128]  __kasan_kmalloc+0xd4/0xd8
[   20.793185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.793467]  kasan_atomics+0xb8/0x2e0
[   20.793757]  kunit_try_run_case+0x170/0x3f0
[   20.794025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.794133]  kthread+0x328/0x630
[   20.794331]  ret_from_fork+0x10/0x20
[   20.794388] 
[   20.794411] The buggy address belongs to the object at fff00000c59c9e00
[   20.794411]  which belongs to the cache kmalloc-64 of size 64
[   20.794476] The buggy address is located 0 bytes to the right of
[   20.794476]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.794546] 
[   20.794568] The buggy address belongs to the physical page:
[   20.795265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.795357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.795411] page_type: f5(slab)
[   20.795477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.795544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.795598] page dumped because: kasan: bad access detected
[   20.795648] 
[   20.795678] Memory state around the buggy address:
[   20.795733]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.795782]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.795828] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.795872]                                      ^
[   20.795909]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.795962]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.796004] ==================================================================
[   20.808935] ==================================================================
[   20.809086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.809138] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.809213] 
[   20.809248] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.809638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.810021] Hardware name: linux,dummy-virt (DT)
[   20.810225] Call trace:
[   20.810467]  show_stack+0x20/0x38 (C)
[   20.810606]  dump_stack_lvl+0x8c/0xd0
[   20.810784]  print_report+0x118/0x5d0
[   20.811117]  kasan_report+0xdc/0x128
[   20.811482]  kasan_check_range+0x100/0x1a8
[   20.811665]  __kasan_check_write+0x20/0x30
[   20.811839]  kasan_atomics_helper+0x126c/0x4858
[   20.811931]  kasan_atomics+0x198/0x2e0
[   20.811980]  kunit_try_run_case+0x170/0x3f0
[   20.812286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.812771]  kthread+0x328/0x630
[   20.812836]  ret_from_fork+0x10/0x20
[   20.812969] 
[   20.812999] Allocated by task 267:
[   20.813061]  kasan_save_stack+0x3c/0x68
[   20.813107]  kasan_save_track+0x20/0x40
[   20.813145]  kasan_save_alloc_info+0x40/0x58
[   20.813195]  __kasan_kmalloc+0xd4/0xd8
[   20.813251]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.813293]  kasan_atomics+0xb8/0x2e0
[   20.813435]  kunit_try_run_case+0x170/0x3f0
[   20.813873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.813944]  kthread+0x328/0x630
[   20.813983]  ret_from_fork+0x10/0x20
[   20.814023] 
[   20.814044] The buggy address belongs to the object at fff00000c59c9e00
[   20.814044]  which belongs to the cache kmalloc-64 of size 64
[   20.814616] The buggy address is located 0 bytes to the right of
[   20.814616]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.815632] 
[   20.815682] The buggy address belongs to the physical page:
[   20.815730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.815799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.815871] page_type: f5(slab)
[   20.815944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.816187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.816343] page dumped because: kasan: bad access detected
[   20.816585] 
[   20.816613] Memory state around the buggy address:
[   20.816802]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.817249]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.817309] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.817465]                                      ^
[   20.817511]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.817558]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.817909] ==================================================================
[   20.945599] ==================================================================
[   20.945654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.945705] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.945758] 
[   20.946161] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.946278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.946314] Hardware name: linux,dummy-virt (DT)
[   20.946542] Call trace:
[   20.946577]  show_stack+0x20/0x38 (C)
[   20.946631]  dump_stack_lvl+0x8c/0xd0
[   20.946847]  print_report+0x118/0x5d0
[   20.947078]  kasan_report+0xdc/0x128
[   20.947141]  kasan_check_range+0x100/0x1a8
[   20.947191]  __kasan_check_write+0x20/0x30
[   20.947458]  kasan_atomics_helper+0x175c/0x4858
[   20.947694]  kasan_atomics+0x198/0x2e0
[   20.947957]  kunit_try_run_case+0x170/0x3f0
[   20.948038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.948221]  kthread+0x328/0x630
[   20.948282]  ret_from_fork+0x10/0x20
[   20.948332] 
[   20.948621] Allocated by task 267:
[   20.948863]  kasan_save_stack+0x3c/0x68
[   20.948933]  kasan_save_track+0x20/0x40
[   20.949062]  kasan_save_alloc_info+0x40/0x58
[   20.949115]  __kasan_kmalloc+0xd4/0xd8
[   20.949151]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.949391]  kasan_atomics+0xb8/0x2e0
[   20.949652]  kunit_try_run_case+0x170/0x3f0
[   20.949854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.949949]  kthread+0x328/0x630
[   20.950351]  ret_from_fork+0x10/0x20
[   20.950479] 
[   20.950569] The buggy address belongs to the object at fff00000c59c9e00
[   20.950569]  which belongs to the cache kmalloc-64 of size 64
[   20.950676] The buggy address is located 0 bytes to the right of
[   20.950676]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.950861] 
[   20.950886] The buggy address belongs to the physical page:
[   20.950921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.951170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.951333] page_type: f5(slab)
[   20.951498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.951569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.951616] page dumped because: kasan: bad access detected
[   20.951652] 
[   20.951673] Memory state around the buggy address:
[   20.951718]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.951775]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.951831] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.951873]                                      ^
[   20.951910]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.951956]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.951997] ==================================================================
[   20.850618] ==================================================================
[   20.850776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.850980] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.851261] 
[   20.851305] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.851394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.851431] Hardware name: linux,dummy-virt (DT)
[   20.851464] Call trace:
[   20.851728]  show_stack+0x20/0x38 (C)
[   20.851808]  dump_stack_lvl+0x8c/0xd0
[   20.852036]  print_report+0x118/0x5d0
[   20.852101]  kasan_report+0xdc/0x128
[   20.852513]  kasan_check_range+0x100/0x1a8
[   20.852742]  __kasan_check_write+0x20/0x30
[   20.852805]  kasan_atomics_helper+0x1414/0x4858
[   20.852923]  kasan_atomics+0x198/0x2e0
[   20.852980]  kunit_try_run_case+0x170/0x3f0
[   20.853308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.853389]  kthread+0x328/0x630
[   20.853694]  ret_from_fork+0x10/0x20
[   20.853759] 
[   20.853790] Allocated by task 267:
[   20.853819]  kasan_save_stack+0x3c/0x68
[   20.854020]  kasan_save_track+0x20/0x40
[   20.854307]  kasan_save_alloc_info+0x40/0x58
[   20.854485]  __kasan_kmalloc+0xd4/0xd8
[   20.854872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.855021]  kasan_atomics+0xb8/0x2e0
[   20.855187]  kunit_try_run_case+0x170/0x3f0
[   20.855873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.855960]  kthread+0x328/0x630
[   20.856027]  ret_from_fork+0x10/0x20
[   20.856100] 
[   20.856169] The buggy address belongs to the object at fff00000c59c9e00
[   20.856169]  which belongs to the cache kmalloc-64 of size 64
[   20.856780] The buggy address is located 0 bytes to the right of
[   20.856780]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.856905] 
[   20.857067] The buggy address belongs to the physical page:
[   20.857727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.857811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.857865] page_type: f5(slab)
[   20.858078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.858425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.858478] page dumped because: kasan: bad access detected
[   20.858514] 
[   20.858535] Memory state around the buggy address:
[   20.858771]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.858845]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.858913] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.858965]                                      ^
[   20.859001]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.859057]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.859100] ==================================================================
[   20.770575] ==================================================================
[   20.770631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.770868] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.770942] 
[   20.771003] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.771094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.771141] Hardware name: linux,dummy-virt (DT)
[   20.771175] Call trace:
[   20.771228]  show_stack+0x20/0x38 (C)
[   20.771289]  dump_stack_lvl+0x8c/0xd0
[   20.771366]  print_report+0x118/0x5d0
[   20.771446]  kasan_report+0xdc/0x128
[   20.771513]  kasan_check_range+0x100/0x1a8
[   20.771562]  __kasan_check_write+0x20/0x30
[   20.771610]  kasan_atomics_helper+0x10c0/0x4858
[   20.771659]  kasan_atomics+0x198/0x2e0
[   20.771842]  kunit_try_run_case+0x170/0x3f0
[   20.771896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.772063]  kthread+0x328/0x630
[   20.772333]  ret_from_fork+0x10/0x20
[   20.772468] 
[   20.772545] Allocated by task 267:
[   20.772579]  kasan_save_stack+0x3c/0x68
[   20.772638]  kasan_save_track+0x20/0x40
[   20.772679]  kasan_save_alloc_info+0x40/0x58
[   20.772720]  __kasan_kmalloc+0xd4/0xd8
[   20.772769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.772817]  kasan_atomics+0xb8/0x2e0
[   20.772856]  kunit_try_run_case+0x170/0x3f0
[   20.772898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.772945]  kthread+0x328/0x630
[   20.772983]  ret_from_fork+0x10/0x20
[   20.773319] 
[   20.773362] The buggy address belongs to the object at fff00000c59c9e00
[   20.773362]  which belongs to the cache kmalloc-64 of size 64
[   20.773608] The buggy address is located 0 bytes to the right of
[   20.773608]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.773703] 
[   20.773728] The buggy address belongs to the physical page:
[   20.773761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.774192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.774546] page_type: f5(slab)
[   20.774830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.775123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.775389] page dumped because: kasan: bad access detected
[   20.775677] 
[   20.775721] Memory state around the buggy address:
[   20.775787]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.776358]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.776477] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.776651]                                      ^
[   20.776996]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.777252]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.777322] ==================================================================
[   20.877559] ==================================================================
[   20.877614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.877663] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.877717] 
[   20.878215] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.878639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.878682] Hardware name: linux,dummy-virt (DT)
[   20.878753] Call trace:
[   20.878779]  show_stack+0x20/0x38 (C)
[   20.878919]  dump_stack_lvl+0x8c/0xd0
[   20.878978]  print_report+0x118/0x5d0
[   20.879350]  kasan_report+0xdc/0x128
[   20.879744]  kasan_check_range+0x100/0x1a8
[   20.880003]  __kasan_check_write+0x20/0x30
[   20.880087]  kasan_atomics_helper+0x154c/0x4858
[   20.880147]  kasan_atomics+0x198/0x2e0
[   20.880194]  kunit_try_run_case+0x170/0x3f0
[   20.880529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.880771]  kthread+0x328/0x630
[   20.881027]  ret_from_fork+0x10/0x20
[   20.881095] 
[   20.881217] Allocated by task 267:
[   20.881253]  kasan_save_stack+0x3c/0x68
[   20.881295]  kasan_save_track+0x20/0x40
[   20.881386]  kasan_save_alloc_info+0x40/0x58
[   20.881451]  __kasan_kmalloc+0xd4/0xd8
[   20.881491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.881548]  kasan_atomics+0xb8/0x2e0
[   20.881587]  kunit_try_run_case+0x170/0x3f0
[   20.882333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.882486]  kthread+0x328/0x630
[   20.882550]  ret_from_fork+0x10/0x20
[   20.883025] 
[   20.883095] The buggy address belongs to the object at fff00000c59c9e00
[   20.883095]  which belongs to the cache kmalloc-64 of size 64
[   20.883173] The buggy address is located 0 bytes to the right of
[   20.883173]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.883433] 
[   20.883459] The buggy address belongs to the physical page:
[   20.883598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.884192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.884337] page_type: f5(slab)
[   20.884378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.884607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.884727] page dumped because: kasan: bad access detected
[   20.884939] 
[   20.885119] Memory state around the buggy address:
[   20.885696]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.885966]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.886160] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.886343]                                      ^
[   20.886470]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.886852]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.886956] ==================================================================
[   20.690434] ==================================================================
[   20.690497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.690546] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.690598] 
[   20.690632] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.690717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.690747] Hardware name: linux,dummy-virt (DT)
[   20.690778] Call trace:
[   20.690803]  show_stack+0x20/0x38 (C)
[   20.690850]  dump_stack_lvl+0x8c/0xd0
[   20.690899]  print_report+0x118/0x5d0
[   20.690946]  kasan_report+0xdc/0x128
[   20.690992]  kasan_check_range+0x100/0x1a8
[   20.691042]  __kasan_check_read+0x20/0x30
[   20.691089]  kasan_atomics_helper+0xdd4/0x4858
[   20.691137]  kasan_atomics+0x198/0x2e0
[   20.691181]  kunit_try_run_case+0x170/0x3f0
[   20.691240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.693247]  kthread+0x328/0x630
[   20.694164]  ret_from_fork+0x10/0x20
[   20.694368] 
[   20.695059] Allocated by task 267:
[   20.695097]  kasan_save_stack+0x3c/0x68
[   20.695328]  kasan_save_track+0x20/0x40
[   20.695445]  kasan_save_alloc_info+0x40/0x58
[   20.695546]  __kasan_kmalloc+0xd4/0xd8
[   20.695624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.695713]  kasan_atomics+0xb8/0x2e0
[   20.695764]  kunit_try_run_case+0x170/0x3f0
[   20.695817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.695913]  kthread+0x328/0x630
[   20.695950]  ret_from_fork+0x10/0x20
[   20.695989] 
[   20.696012] The buggy address belongs to the object at fff00000c59c9e00
[   20.696012]  which belongs to the cache kmalloc-64 of size 64
[   20.696073] The buggy address is located 0 bytes to the right of
[   20.696073]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.696175] 
[   20.696964] The buggy address belongs to the physical page:
[   20.697068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.697126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.697180] page_type: f5(slab)
[   20.697917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.698101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.698151] page dumped because: kasan: bad access detected
[   20.698186] 
[   20.698250] Memory state around the buggy address:
[   20.698354]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.698762]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.698813] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.698854]                                      ^
[   20.698892]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.698941]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.698984] ==================================================================
[   20.871681] ==================================================================
[   20.871765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.871817] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.871908] 
[   20.871942] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.872025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.872443] Hardware name: linux,dummy-virt (DT)
[   20.872615] Call trace:
[   20.872651]  show_stack+0x20/0x38 (C)
[   20.872850]  dump_stack_lvl+0x8c/0xd0
[   20.872903]  print_report+0x118/0x5d0
[   20.872949]  kasan_report+0xdc/0x128
[   20.873014]  kasan_check_range+0x100/0x1a8
[   20.873068]  __kasan_check_write+0x20/0x30
[   20.873141]  kasan_atomics_helper+0x14e4/0x4858
[   20.873624]  kasan_atomics+0x198/0x2e0
[   20.873816]  kunit_try_run_case+0x170/0x3f0
[   20.874057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.874124]  kthread+0x328/0x630
[   20.874170]  ret_from_fork+0x10/0x20
[   20.874232] 
[   20.874253] Allocated by task 267:
[   20.874285]  kasan_save_stack+0x3c/0x68
[   20.874489]  kasan_save_track+0x20/0x40
[   20.874660]  kasan_save_alloc_info+0x40/0x58
[   20.874727]  __kasan_kmalloc+0xd4/0xd8
[   20.874775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.874841]  kasan_atomics+0xb8/0x2e0
[   20.874880]  kunit_try_run_case+0x170/0x3f0
[   20.874926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.874972]  kthread+0x328/0x630
[   20.875021]  ret_from_fork+0x10/0x20
[   20.875060] 
[   20.875082] The buggy address belongs to the object at fff00000c59c9e00
[   20.875082]  which belongs to the cache kmalloc-64 of size 64
[   20.875156] The buggy address is located 0 bytes to the right of
[   20.875156]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.875254] 
[   20.875277] The buggy address belongs to the physical page:
[   20.875319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.875375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.875427] page_type: f5(slab)
[   20.875468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.875523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.875570] page dumped because: kasan: bad access detected
[   20.875624] 
[   20.875653] Memory state around the buggy address:
[   20.875697]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.875743]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.875790] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.875840]                                      ^
[   20.875883]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.875929]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.875978] ==================================================================
[   20.860189] ==================================================================
[   20.860553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.860635] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.860823] 
[   20.861012] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.861110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.861276] Hardware name: linux,dummy-virt (DT)
[   20.861525] Call trace:
[   20.861585]  show_stack+0x20/0x38 (C)
[   20.861700]  dump_stack_lvl+0x8c/0xd0
[   20.861768]  print_report+0x118/0x5d0
[   20.862037]  kasan_report+0xdc/0x128
[   20.862412]  kasan_check_range+0x100/0x1a8
[   20.862537]  __kasan_check_write+0x20/0x30
[   20.862712]  kasan_atomics_helper+0x147c/0x4858
[   20.862975]  kasan_atomics+0x198/0x2e0
[   20.863141]  kunit_try_run_case+0x170/0x3f0
[   20.863358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.863752]  kthread+0x328/0x630
[   20.863823]  ret_from_fork+0x10/0x20
[   20.864176] 
[   20.864296] Allocated by task 267:
[   20.864463]  kasan_save_stack+0x3c/0x68
[   20.864599]  kasan_save_track+0x20/0x40
[   20.864640]  kasan_save_alloc_info+0x40/0x58
[   20.864681]  __kasan_kmalloc+0xd4/0xd8
[   20.864891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.865394]  kasan_atomics+0xb8/0x2e0
[   20.865587]  kunit_try_run_case+0x170/0x3f0
[   20.866183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866540]  kthread+0x328/0x630
[   20.866737]  ret_from_fork+0x10/0x20
[   20.866854] 
[   20.866905] The buggy address belongs to the object at fff00000c59c9e00
[   20.866905]  which belongs to the cache kmalloc-64 of size 64
[   20.867327] The buggy address is located 0 bytes to the right of
[   20.867327]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.867585] 
[   20.867834] The buggy address belongs to the physical page:
[   20.868131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.868427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.868516] page_type: f5(slab)
[   20.868855] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.869200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.869466] page dumped because: kasan: bad access detected
[   20.869619] 
[   20.869695] Memory state around the buggy address:
[   20.869742]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.869805]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.869852] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.869895]                                      ^
[   20.869929]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.869976]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.870016] ==================================================================
[   20.539346] ==================================================================
[   20.539581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.539829] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.539890] 
[   20.539955] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.540196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.540292] Hardware name: linux,dummy-virt (DT)
[   20.540340] Call trace:
[   20.540460]  show_stack+0x20/0x38 (C)
[   20.540514]  dump_stack_lvl+0x8c/0xd0
[   20.540572]  print_report+0x118/0x5d0
[   20.540687]  kasan_report+0xdc/0x128
[   20.540919]  kasan_check_range+0x100/0x1a8
[   20.541230]  __kasan_check_write+0x20/0x30
[   20.541284]  kasan_atomics_helper+0x99c/0x4858
[   20.541399]  kasan_atomics+0x198/0x2e0
[   20.541447]  kunit_try_run_case+0x170/0x3f0
[   20.541496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.541570]  kthread+0x328/0x630
[   20.541619]  ret_from_fork+0x10/0x20
[   20.541666] 
[   20.541686] Allocated by task 267:
[   20.541715]  kasan_save_stack+0x3c/0x68
[   20.541837]  kasan_save_track+0x20/0x40
[   20.541878]  kasan_save_alloc_info+0x40/0x58
[   20.541918]  __kasan_kmalloc+0xd4/0xd8
[   20.541957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.541996]  kasan_atomics+0xb8/0x2e0
[   20.542034]  kunit_try_run_case+0x170/0x3f0
[   20.542074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.542122]  kthread+0x328/0x630
[   20.542420]  ret_from_fork+0x10/0x20
[   20.542479] 
[   20.542501] The buggy address belongs to the object at fff00000c59c9e00
[   20.542501]  which belongs to the cache kmalloc-64 of size 64
[   20.542563] The buggy address is located 0 bytes to the right of
[   20.542563]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.542684] 
[   20.542739] The buggy address belongs to the physical page:
[   20.542778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.542874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.542923] page_type: f5(slab)
[   20.542963] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.543073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.543303] page dumped because: kasan: bad access detected
[   20.543450] 
[   20.543470] Memory state around the buggy address:
[   20.543530]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.543578]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.543624] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.543699]                                      ^
[   20.543794]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.543840]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.543902] ==================================================================
[   20.907298] ==================================================================
[   20.907489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.907560] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.907614] 
[   20.908081] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.908189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.908235] Hardware name: linux,dummy-virt (DT)
[   20.908628] Call trace:
[   20.908688]  show_stack+0x20/0x38 (C)
[   20.908775]  dump_stack_lvl+0x8c/0xd0
[   20.908830]  print_report+0x118/0x5d0
[   20.908936]  kasan_report+0xdc/0x128
[   20.908982]  kasan_check_range+0x100/0x1a8
[   20.909046]  __kasan_check_write+0x20/0x30
[   20.909097]  kasan_atomics_helper+0x1644/0x4858
[   20.909281]  kasan_atomics+0x198/0x2e0
[   20.909697]  kunit_try_run_case+0x170/0x3f0
[   20.909813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.909985]  kthread+0x328/0x630
[   20.910136]  ret_from_fork+0x10/0x20
[   20.910198] 
[   20.910234] Allocated by task 267:
[   20.910263]  kasan_save_stack+0x3c/0x68
[   20.910661]  kasan_save_track+0x20/0x40
[   20.910967]  kasan_save_alloc_info+0x40/0x58
[   20.911238]  __kasan_kmalloc+0xd4/0xd8
[   20.911427]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.911523]  kasan_atomics+0xb8/0x2e0
[   20.911561]  kunit_try_run_case+0x170/0x3f0
[   20.911827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.912283]  kthread+0x328/0x630
[   20.912535]  ret_from_fork+0x10/0x20
[   20.912635] 
[   20.912691] The buggy address belongs to the object at fff00000c59c9e00
[   20.912691]  which belongs to the cache kmalloc-64 of size 64
[   20.912983] The buggy address is located 0 bytes to the right of
[   20.912983]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.913061] 
[   20.913457] The buggy address belongs to the physical page:
[   20.913768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.913956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.914012] page_type: f5(slab)
[   20.914050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.914835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.915226] page dumped because: kasan: bad access detected
[   20.915293] 
[   20.915471] Memory state around the buggy address:
[   20.915682]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.915736]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.916145] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.916196]                                      ^
[   20.916256]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.916301]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.916354] ==================================================================
[   20.887756] ==================================================================
[   20.887817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.887872] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.887981] 
[   20.888016] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.888114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.888278] Hardware name: linux,dummy-virt (DT)
[   20.888316] Call trace:
[   20.888343]  show_stack+0x20/0x38 (C)
[   20.888561]  dump_stack_lvl+0x8c/0xd0
[   20.888652]  print_report+0x118/0x5d0
[   20.888904]  kasan_report+0xdc/0x128
[   20.889168]  kasan_check_range+0x100/0x1a8
[   20.889252]  __kasan_check_write+0x20/0x30
[   20.889303]  kasan_atomics_helper+0x15b4/0x4858
[   20.889926]  kasan_atomics+0x198/0x2e0
[   20.890094]  kunit_try_run_case+0x170/0x3f0
[   20.890170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.890243]  kthread+0x328/0x630
[   20.890289]  ret_from_fork+0x10/0x20
[   20.890953] 
[   20.891002] Allocated by task 267:
[   20.891192]  kasan_save_stack+0x3c/0x68
[   20.891358]  kasan_save_track+0x20/0x40
[   20.891455]  kasan_save_alloc_info+0x40/0x58
[   20.891588]  __kasan_kmalloc+0xd4/0xd8
[   20.891819]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.892225]  kasan_atomics+0xb8/0x2e0
[   20.892416]  kunit_try_run_case+0x170/0x3f0
[   20.892697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.893195]  kthread+0x328/0x630
[   20.893781]  ret_from_fork+0x10/0x20
[   20.893845] 
[   20.894003] The buggy address belongs to the object at fff00000c59c9e00
[   20.894003]  which belongs to the cache kmalloc-64 of size 64
[   20.894184] The buggy address is located 0 bytes to the right of
[   20.894184]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.894404] 
[   20.894432] The buggy address belongs to the physical page:
[   20.894925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.895174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.895443] page_type: f5(slab)
[   20.895617] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.895702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.895860] page dumped because: kasan: bad access detected
[   20.895906] 
[   20.895926] Memory state around the buggy address:
[   20.895964]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.896011]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.896059] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.896103]                                      ^
[   20.896338]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.896418]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.896469] ==================================================================
[   20.527881] ==================================================================
[   20.527928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.527993] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.528259] 
[   20.528407] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.528597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.528633] Hardware name: linux,dummy-virt (DT)
[   20.528667] Call trace:
[   20.528688]  show_stack+0x20/0x38 (C)
[   20.528746]  dump_stack_lvl+0x8c/0xd0
[   20.528989]  print_report+0x118/0x5d0
[   20.529043]  kasan_report+0xdc/0x128
[   20.529192]  __asan_report_load4_noabort+0x20/0x30
[   20.529282]  kasan_atomics_helper+0x42d8/0x4858
[   20.529402]  kasan_atomics+0x198/0x2e0
[   20.529448]  kunit_try_run_case+0x170/0x3f0
[   20.529499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.529557]  kthread+0x328/0x630
[   20.529644]  ret_from_fork+0x10/0x20
[   20.529692] 
[   20.529940] Allocated by task 267:
[   20.530089]  kasan_save_track+0x20/0x40
[   20.530348]  kasan_save_alloc_info+0x40/0x58
[   20.530400]  __kasan_kmalloc+0xd4/0xd8
[   20.530439]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.530723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.531236] 
[   20.531335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.532286]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.533689] ==================================================================
[   20.757918] ==================================================================
[   20.758000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.758076] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.758129] 
[   20.758191] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.758290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.758343] Hardware name: linux,dummy-virt (DT)
[   20.758378] Call trace:
[   20.758401]  show_stack+0x20/0x38 (C)
[   20.758450]  dump_stack_lvl+0x8c/0xd0
[   20.758515]  print_report+0x118/0x5d0
[   20.758590]  kasan_report+0xdc/0x128
[   20.758777]  kasan_check_range+0x100/0x1a8
[   20.758856]  __kasan_check_write+0x20/0x30
[   20.758955]  kasan_atomics_helper+0xf88/0x4858
[   20.759051]  kasan_atomics+0x198/0x2e0
[   20.759097]  kunit_try_run_case+0x170/0x3f0
[   20.759192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.759275]  kthread+0x328/0x630
[   20.759321]  ret_from_fork+0x10/0x20
[   20.759396] 
[   20.759436] Allocated by task 267:
[   20.759483]  kasan_save_stack+0x3c/0x68
[   20.759525]  kasan_save_track+0x20/0x40
[   20.759562]  kasan_save_alloc_info+0x40/0x58
[   20.759603]  __kasan_kmalloc+0xd4/0xd8
[   20.759914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.759963]  kasan_atomics+0xb8/0x2e0
[   20.760000]  kunit_try_run_case+0x170/0x3f0
[   20.760096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.760154]  kthread+0x328/0x630
[   20.760193]  ret_from_fork+0x10/0x20
[   20.760244] 
[   20.760264] The buggy address belongs to the object at fff00000c59c9e00
[   20.760264]  which belongs to the cache kmalloc-64 of size 64
[   20.760494] The buggy address is located 0 bytes to the right of
[   20.760494]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.760562] 
[   20.760621] The buggy address belongs to the physical page:
[   20.760678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.760753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.760821] page_type: f5(slab)
[   20.760890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.760974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.761029] page dumped because: kasan: bad access detected
[   20.761075] 
[   20.761095] Memory state around the buggy address:
[   20.761129]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.761176]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.761232] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.761274]                                      ^
[   20.761307]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.761364]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.761406] ==================================================================
[   20.652631] ==================================================================
[   20.652690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.652740] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.652795] 
[   20.652826] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.653720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.653984] Hardware name: linux,dummy-virt (DT)
[   20.654152] Call trace:
[   20.654326]  show_stack+0x20/0x38 (C)
[   20.654805]  dump_stack_lvl+0x8c/0xd0
[   20.654863]  print_report+0x118/0x5d0
[   20.655801]  kasan_report+0xdc/0x128
[   20.656161]  __asan_report_load4_noabort+0x20/0x30
[   20.656300]  kasan_atomics_helper+0x3dd8/0x4858
[   20.656350]  kasan_atomics+0x198/0x2e0
[   20.656398]  kunit_try_run_case+0x170/0x3f0
[   20.656449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.656505]  kthread+0x328/0x630
[   20.656553]  ret_from_fork+0x10/0x20
[   20.656951] 
[   20.657264] Allocated by task 267:
[   20.657302]  kasan_save_stack+0x3c/0x68
[   20.657347]  kasan_save_track+0x20/0x40
[   20.657384]  kasan_save_alloc_info+0x40/0x58
[   20.657433]  __kasan_kmalloc+0xd4/0xd8
[   20.657471]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.657511]  kasan_atomics+0xb8/0x2e0
[   20.658421]  kunit_try_run_case+0x170/0x3f0
[   20.658494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.658651]  kthread+0x328/0x630
[   20.658721]  ret_from_fork+0x10/0x20
[   20.659046] 
[   20.659072] The buggy address belongs to the object at fff00000c59c9e00
[   20.659072]  which belongs to the cache kmalloc-64 of size 64
[   20.659400] The buggy address is located 0 bytes to the right of
[   20.659400]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.659563] 
[   20.659587] The buggy address belongs to the physical page:
[   20.659780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.660030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.660502] page_type: f5(slab)
[   20.660699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.660953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.661077] page dumped because: kasan: bad access detected
[   20.661395] 
[   20.661574] Memory state around the buggy address:
[   20.661617]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.661732]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.661781] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.661824]                                      ^
[   20.662252]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.662355]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.662397] ==================================================================
[   20.818699] ==================================================================
[   20.818762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.819056] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.819295] 
[   20.819340] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.819428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.819586] Hardware name: linux,dummy-virt (DT)
[   20.819623] Call trace:
[   20.819698]  show_stack+0x20/0x38 (C)
[   20.819887]  dump_stack_lvl+0x8c/0xd0
[   20.820099]  print_report+0x118/0x5d0
[   20.820310]  kasan_report+0xdc/0x128
[   20.820372]  kasan_check_range+0x100/0x1a8
[   20.820568]  __kasan_check_write+0x20/0x30
[   20.820695]  kasan_atomics_helper+0x12d8/0x4858
[   20.820859]  kasan_atomics+0x198/0x2e0
[   20.820913]  kunit_try_run_case+0x170/0x3f0
[   20.820964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.821019]  kthread+0x328/0x630
[   20.821066]  ret_from_fork+0x10/0x20
[   20.821113] 
[   20.821136] Allocated by task 267:
[   20.821165]  kasan_save_stack+0x3c/0x68
[   20.821573]  kasan_save_track+0x20/0x40
[   20.821867]  kasan_save_alloc_info+0x40/0x58
[   20.821984]  __kasan_kmalloc+0xd4/0xd8
[   20.822254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.822352]  kasan_atomics+0xb8/0x2e0
[   20.822451]  kunit_try_run_case+0x170/0x3f0
[   20.822498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.822544]  kthread+0x328/0x630
[   20.822603]  ret_from_fork+0x10/0x20
[   20.823128] 
[   20.823199] The buggy address belongs to the object at fff00000c59c9e00
[   20.823199]  which belongs to the cache kmalloc-64 of size 64
[   20.823439] The buggy address is located 0 bytes to the right of
[   20.823439]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.823517] 
[   20.823739] The buggy address belongs to the physical page:
[   20.824035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.824164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.824353] page_type: f5(slab)
[   20.824703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.824947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.825272] page dumped because: kasan: bad access detected
[   20.825810] 
[   20.827223] Memory state around the buggy address:
[   20.827762]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.827964]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.828156] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.828351]                                      ^
[   20.828397]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.828871]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.829169] ==================================================================
[   20.715515] ==================================================================
[   20.715696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.715751] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.715805] 
[   20.715837] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.715921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.716265] Hardware name: linux,dummy-virt (DT)
[   20.716506] Call trace:
[   20.716606]  show_stack+0x20/0x38 (C)
[   20.716658]  dump_stack_lvl+0x8c/0xd0
[   20.716815]  print_report+0x118/0x5d0
[   20.717048]  kasan_report+0xdc/0x128
[   20.717191]  __asan_report_store8_noabort+0x20/0x30
[   20.717255]  kasan_atomics_helper+0x3e5c/0x4858
[   20.717306]  kasan_atomics+0x198/0x2e0
[   20.717389]  kunit_try_run_case+0x170/0x3f0
[   20.717719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.717916]  kthread+0x328/0x630
[   20.717971]  ret_from_fork+0x10/0x20
[   20.718239] 
[   20.718665] Allocated by task 267:
[   20.718765]  kasan_save_stack+0x3c/0x68
[   20.719098]  kasan_save_track+0x20/0x40
[   20.719366]  kasan_save_alloc_info+0x40/0x58
[   20.719601]  __kasan_kmalloc+0xd4/0xd8
[   20.719725]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.720016]  kasan_atomics+0xb8/0x2e0
[   20.720305]  kunit_try_run_case+0x170/0x3f0
[   20.720509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.720598]  kthread+0x328/0x630
[   20.720638]  ret_from_fork+0x10/0x20
[   20.720677] 
[   20.720744] The buggy address belongs to the object at fff00000c59c9e00
[   20.720744]  which belongs to the cache kmalloc-64 of size 64
[   20.721018] The buggy address is located 0 bytes to the right of
[   20.721018]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.721092] 
[   20.721119] The buggy address belongs to the physical page:
[   20.721186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.721275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.721377] page_type: f5(slab)
[   20.721419] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.721529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.722072] page dumped because: kasan: bad access detected
[   20.722113] 
[   20.722133] Memory state around the buggy address:
[   20.722169]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.722227]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.722633] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.722696]                                      ^
[   20.722799]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.722846]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.723146] ==================================================================
[   20.707652] ==================================================================
[   20.707807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.708043] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.708195] 
[   20.708290] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.708375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.708411] Hardware name: linux,dummy-virt (DT)
[   20.708580] Call trace:
[   20.708687]  show_stack+0x20/0x38 (C)
[   20.708865]  dump_stack_lvl+0x8c/0xd0
[   20.708948]  print_report+0x118/0x5d0
[   20.708993]  kasan_report+0xdc/0x128
[   20.709039]  kasan_check_range+0x100/0x1a8
[   20.709088]  __kasan_check_write+0x20/0x30
[   20.709137]  kasan_atomics_helper+0xe44/0x4858
[   20.709190]  kasan_atomics+0x198/0x2e0
[   20.709619]  kunit_try_run_case+0x170/0x3f0
[   20.709825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.709885]  kthread+0x328/0x630
[   20.710430]  ret_from_fork+0x10/0x20
[   20.710629] 
[   20.710650] Allocated by task 267:
[   20.710679]  kasan_save_stack+0x3c/0x68
[   20.710723]  kasan_save_track+0x20/0x40
[   20.710761]  kasan_save_alloc_info+0x40/0x58
[   20.711083]  __kasan_kmalloc+0xd4/0xd8
[   20.711129]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.711349]  kasan_atomics+0xb8/0x2e0
[   20.711393]  kunit_try_run_case+0x170/0x3f0
[   20.711436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.711485]  kthread+0x328/0x630
[   20.711802]  ret_from_fork+0x10/0x20
[   20.711845] 
[   20.711867] The buggy address belongs to the object at fff00000c59c9e00
[   20.711867]  which belongs to the cache kmalloc-64 of size 64
[   20.712214] The buggy address is located 0 bytes to the right of
[   20.712214]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.712285] 
[   20.712309] The buggy address belongs to the physical page:
[   20.712354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.712411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.712824] page_type: f5(slab)
[   20.712866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.713299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.713377] page dumped because: kasan: bad access detected
[   20.713413] 
[   20.713435] Memory state around the buggy address:
[   20.713470]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.713665]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.713854] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.713898]                                      ^
[   20.713944]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.714236]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.714513] ==================================================================
[   20.924361] ==================================================================
[   20.924412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.924459] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.924519] 
[   20.924549] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.924633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.924673] Hardware name: linux,dummy-virt (DT)
[   20.924716] Call trace:
[   20.924748]  show_stack+0x20/0x38 (C)
[   20.924797]  dump_stack_lvl+0x8c/0xd0
[   20.924848]  print_report+0x118/0x5d0
[   20.924898]  kasan_report+0xdc/0x128
[   20.924945]  kasan_check_range+0x100/0x1a8
[   20.924994]  __kasan_check_write+0x20/0x30
[   20.925041]  kasan_atomics_helper+0x16d0/0x4858
[   20.925095]  kasan_atomics+0x198/0x2e0
[   20.925139]  kunit_try_run_case+0x170/0x3f0
[   20.925189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.925728]  kthread+0x328/0x630
[   20.925830]  ret_from_fork+0x10/0x20
[   20.925894] 
[   20.925914] Allocated by task 267:
[   20.925945]  kasan_save_stack+0x3c/0x68
[   20.925985]  kasan_save_track+0x20/0x40
[   20.926515]  kasan_save_alloc_info+0x40/0x58
[   20.926593]  __kasan_kmalloc+0xd4/0xd8
[   20.926670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.926983]  kasan_atomics+0xb8/0x2e0
[   20.927106]  kunit_try_run_case+0x170/0x3f0
[   20.927176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.927236]  kthread+0x328/0x630
[   20.927586]  ret_from_fork+0x10/0x20
[   20.927960] 
[   20.928079] The buggy address belongs to the object at fff00000c59c9e00
[   20.928079]  which belongs to the cache kmalloc-64 of size 64
[   20.928556] The buggy address is located 0 bytes to the right of
[   20.928556]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.928983] 
[   20.929359] The buggy address belongs to the physical page:
[   20.929436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.929514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.929849] page_type: f5(slab)
[   20.929901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.930094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.930309] page dumped because: kasan: bad access detected
[   20.930429] 
[   20.930621] Memory state around the buggy address:
[   20.930715]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.930766]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.931198] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.931449]                                      ^
[   20.931604]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.931934]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.932194] ==================================================================
[   20.764952] ==================================================================
[   20.765063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.765176] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.765242] 
[   20.765271] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.765364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.765394] Hardware name: linux,dummy-virt (DT)
[   20.765426] Call trace:
[   20.765450]  show_stack+0x20/0x38 (C)
[   20.765497]  dump_stack_lvl+0x8c/0xd0
[   20.765581]  print_report+0x118/0x5d0
[   20.765689]  kasan_report+0xdc/0x128
[   20.765765]  kasan_check_range+0x100/0x1a8
[   20.765852]  __kasan_check_write+0x20/0x30
[   20.765951]  kasan_atomics_helper+0x1058/0x4858
[   20.766002]  kasan_atomics+0x198/0x2e0
[   20.766071]  kunit_try_run_case+0x170/0x3f0
[   20.766120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.766175]  kthread+0x328/0x630
[   20.766232]  ret_from_fork+0x10/0x20
[   20.766279] 
[   20.766300] Allocated by task 267:
[   20.766329]  kasan_save_stack+0x3c/0x68
[   20.766368]  kasan_save_track+0x20/0x40
[   20.766406]  kasan_save_alloc_info+0x40/0x58
[   20.766669]  __kasan_kmalloc+0xd4/0xd8
[   20.766782]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.766894]  kasan_atomics+0xb8/0x2e0
[   20.766971]  kunit_try_run_case+0x170/0x3f0
[   20.767101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.767498]  kthread+0x328/0x630
[   20.767574]  ret_from_fork+0x10/0x20
[   20.767723] 
[   20.767752] The buggy address belongs to the object at fff00000c59c9e00
[   20.767752]  which belongs to the cache kmalloc-64 of size 64
[   20.767815] The buggy address is located 0 bytes to the right of
[   20.767815]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.767916] 
[   20.767949] The buggy address belongs to the physical page:
[   20.767996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.768060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.768110] page_type: f5(slab)
[   20.768148] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.768364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.768660] page dumped because: kasan: bad access detected
[   20.768697] 
[   20.768764] Memory state around the buggy address:
[   20.768839]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.768950]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.769016] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.769419]                                      ^
[   20.769498]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.769607]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.769648] ==================================================================
[   20.664370] ==================================================================
[   20.664425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.664476] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.664529] 
[   20.664561] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.664646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.666105] Hardware name: linux,dummy-virt (DT)
[   20.666297] Call trace:
[   20.666328]  show_stack+0x20/0x38 (C)
[   20.666798]  dump_stack_lvl+0x8c/0xd0
[   20.666865]  print_report+0x118/0x5d0
[   20.667282]  kasan_report+0xdc/0x128
[   20.667343]  kasan_check_range+0x100/0x1a8
[   20.667392]  __kasan_check_write+0x20/0x30
[   20.667997]  kasan_atomics_helper+0xd3c/0x4858
[   20.668219]  kasan_atomics+0x198/0x2e0
[   20.668270]  kunit_try_run_case+0x170/0x3f0
[   20.668823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.669425]  kthread+0x328/0x630
[   20.670002]  ret_from_fork+0x10/0x20
[   20.670072] 
[   20.670146] Allocated by task 267:
[   20.670235]  kasan_save_stack+0x3c/0x68
[   20.670309]  kasan_save_track+0x20/0x40
[   20.670648]  kasan_save_alloc_info+0x40/0x58
[   20.670736]  __kasan_kmalloc+0xd4/0xd8
[   20.671321]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.671378]  kasan_atomics+0xb8/0x2e0
[   20.671418]  kunit_try_run_case+0x170/0x3f0
[   20.671798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.672161]  kthread+0x328/0x630
[   20.672496]  ret_from_fork+0x10/0x20
[   20.672615] 
[   20.672819] The buggy address belongs to the object at fff00000c59c9e00
[   20.672819]  which belongs to the cache kmalloc-64 of size 64
[   20.673301] The buggy address is located 0 bytes to the right of
[   20.673301]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.673698] 
[   20.673727] The buggy address belongs to the physical page:
[   20.673880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.673940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.674263] page_type: f5(slab)
[   20.674311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.674365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.674932] page dumped because: kasan: bad access detected
[   20.674982] 
[   20.675003] Memory state around the buggy address:
[   20.675040]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.675086]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.675133] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.675175]                                      ^
[   20.676154]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.676447]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.677023] ==================================================================
[   20.550984] ==================================================================
[   20.551101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.551148] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.551214] 
[   20.551250] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.551606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.551639] Hardware name: linux,dummy-virt (DT)
[   20.551673] Call trace:
[   20.551696]  show_stack+0x20/0x38 (C)
[   20.551747]  dump_stack_lvl+0x8c/0xd0
[   20.551807]  print_report+0x118/0x5d0
[   20.551855]  kasan_report+0xdc/0x128
[   20.551901]  kasan_check_range+0x100/0x1a8
[   20.552056]  __kasan_check_write+0x20/0x30
[   20.552313]  kasan_atomics_helper+0xa6c/0x4858
[   20.552408]  kasan_atomics+0x198/0x2e0
[   20.552455]  kunit_try_run_case+0x170/0x3f0
[   20.552505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.552801]  kthread+0x328/0x630
[   20.552856]  ret_from_fork+0x10/0x20
[   20.553016] 
[   20.553036] Allocated by task 267:
[   20.553124]  kasan_save_stack+0x3c/0x68
[   20.553172]  kasan_save_track+0x20/0x40
[   20.553227]  kasan_save_alloc_info+0x40/0x58
[   20.553358]  __kasan_kmalloc+0xd4/0xd8
[   20.553397]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.553439]  kasan_atomics+0xb8/0x2e0
[   20.553475]  kunit_try_run_case+0x170/0x3f0
[   20.553517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.553762]  kthread+0x328/0x630
[   20.553941]  ret_from_fork+0x10/0x20
[   20.553987] 
[   20.554008] The buggy address belongs to the object at fff00000c59c9e00
[   20.554008]  which belongs to the cache kmalloc-64 of size 64
[   20.554071] The buggy address is located 0 bytes to the right of
[   20.554071]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.554143] 
[   20.554165] The buggy address belongs to the physical page:
[   20.554197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.554423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.554492] page_type: f5(slab)
[   20.554532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.554586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.554630] page dumped because: kasan: bad access detected
[   20.554666] 
[   20.554696] Memory state around the buggy address:
[   20.554730]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.554776]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.554949] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.555005]                                      ^
[   20.555040]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.555086]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.555697] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.556993]  kasan_atomics+0x198/0x2e0
[   20.557256] 
[   20.557278] Allocated by task 267:
[   20.557306]  kasan_save_stack+0x3c/0x68
[   20.557463]  kasan_save_track+0x20/0x40
[   20.557539]  kasan_save_alloc_info+0x40/0x58
[   20.557699]  __kasan_kmalloc+0xd4/0xd8
[   20.557951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.557999]  kasan_atomics+0xb8/0x2e0
[   20.558062]  kunit_try_run_case+0x170/0x3f0
[   20.558105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.558156]  kthread+0x328/0x630
[   20.558193]  ret_from_fork+0x10/0x20
[   20.558242] 
[   20.558265] The buggy address belongs to the object at fff00000c59c9e00
[   20.558265]  which belongs to the cache kmalloc-64 of size 64
[   20.558327] The buggy address is located 0 bytes to the right of
[   20.558327]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.558697] 
[   20.558718] The buggy address belongs to the physical page:
[   20.558780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.559155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.559222] page_type: f5(slab)
[   20.559296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.559383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.559585] page dumped because: kasan: bad access detected
[   20.559713] 
[   20.559812]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.561922] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.562264]  show_stack+0x20/0x38 (C)
[   20.563801]  kthread+0x328/0x630
[   20.564150]  kasan_save_stack+0x3c/0x68
[   20.564539]  kasan_save_track+0x20/0x40
[   20.565824]  kunit_try_run_case+0x170/0x3f0
[   20.567114] The buggy address is located 0 bytes to the right of
[   20.567114]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.570122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.572456] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.575587] ==================================================================
[   20.724134] ==================================================================
[   20.724188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.724256] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.724770] 
[   20.724892] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.724980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.725011] Hardware name: linux,dummy-virt (DT)
[   20.725045] Call trace:
[   20.725693]  show_stack+0x20/0x38 (C)
[   20.725958]  dump_stack_lvl+0x8c/0xd0
[   20.726412]  print_report+0x118/0x5d0
[   20.726513]  kasan_report+0xdc/0x128
[   20.726651]  kasan_check_range+0x100/0x1a8
[   20.726718]  __kasan_check_write+0x20/0x30
[   20.726828]  kasan_atomics_helper+0xeb8/0x4858
[   20.727275]  kasan_atomics+0x198/0x2e0
[   20.727325]  kunit_try_run_case+0x170/0x3f0
[   20.728112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.728932]  kthread+0x328/0x630
[   20.729616]  ret_from_fork+0x10/0x20
[   20.730221] 
[   20.730296] Allocated by task 267:
[   20.730884]  kasan_save_stack+0x3c/0x68
[   20.731097]  kasan_save_track+0x20/0x40
[   20.731421]  kasan_save_alloc_info+0x40/0x58
[   20.732145]  __kasan_kmalloc+0xd4/0xd8
[   20.732910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.733094]  kasan_atomics+0xb8/0x2e0
[   20.733166]  kunit_try_run_case+0x170/0x3f0
[   20.734028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.734388]  kthread+0x328/0x630
[   20.734516]  ret_from_fork+0x10/0x20
[   20.734862] 
[   20.735115] The buggy address belongs to the object at fff00000c59c9e00
[   20.735115]  which belongs to the cache kmalloc-64 of size 64
[   20.735660] The buggy address is located 0 bytes to the right of
[   20.735660]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.736433] 
[   20.736488] The buggy address belongs to the physical page:
[   20.737112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.737624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.737983] page_type: f5(slab)
[   20.738050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.738579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.739101] page dumped because: kasan: bad access detected
[   20.739148] 
[   20.739415] Memory state around the buggy address:
[   20.740087]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.740393]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.741484] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.741582]                                      ^
[   20.741650]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.741697]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.741739] ==================================================================
[   20.797125] ==================================================================
[   20.797214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.797692] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.797843] 
[   20.797907] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.798033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.798326] Hardware name: linux,dummy-virt (DT)
[   20.798560] Call trace:
[   20.798708]  show_stack+0x20/0x38 (C)
[   20.799139]  dump_stack_lvl+0x8c/0xd0
[   20.799315]  print_report+0x118/0x5d0
[   20.799395]  kasan_report+0xdc/0x128
[   20.799632]  kasan_check_range+0x100/0x1a8
[   20.799810]  __kasan_check_write+0x20/0x30
[   20.800012]  kasan_atomics_helper+0x11f8/0x4858
[   20.800300]  kasan_atomics+0x198/0x2e0
[   20.800445]  kunit_try_run_case+0x170/0x3f0
[   20.800500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.800909]  kthread+0x328/0x630
[   20.801354]  ret_from_fork+0x10/0x20
[   20.801516] 
[   20.801566] Allocated by task 267:
[   20.801636]  kasan_save_stack+0x3c/0x68
[   20.801868]  kasan_save_track+0x20/0x40
[   20.802111]  kasan_save_alloc_info+0x40/0x58
[   20.802224]  __kasan_kmalloc+0xd4/0xd8
[   20.802469]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.802650]  kasan_atomics+0xb8/0x2e0
[   20.802848]  kunit_try_run_case+0x170/0x3f0
[   20.802929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.803089]  kthread+0x328/0x630
[   20.803129]  ret_from_fork+0x10/0x20
[   20.803527] 
[   20.803572] The buggy address belongs to the object at fff00000c59c9e00
[   20.803572]  which belongs to the cache kmalloc-64 of size 64
[   20.804001] The buggy address is located 0 bytes to the right of
[   20.804001]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.804438] 
[   20.804498] The buggy address belongs to the physical page:
[   20.804546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.804843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.805228] page_type: f5(slab)
[   20.805642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.805717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.805765] page dumped because: kasan: bad access detected
[   20.805801] 
[   20.806066] Memory state around the buggy address:
[   20.806449]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.806612]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.806688] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.806734]                                      ^
[   20.806803]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.806859]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.806913] ==================================================================
[   20.933393] ==================================================================
[   20.933492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.933554] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.933607] 
[   20.933638] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.934102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.934162] Hardware name: linux,dummy-virt (DT)
[   20.934427] Call trace:
[   20.934454]  show_stack+0x20/0x38 (C)
[   20.934825]  dump_stack_lvl+0x8c/0xd0
[   20.935095]  print_report+0x118/0x5d0
[   20.935414]  kasan_report+0xdc/0x128
[   20.935698]  __asan_report_load8_noabort+0x20/0x30
[   20.936152]  kasan_atomics_helper+0x3e10/0x4858
[   20.936245]  kasan_atomics+0x198/0x2e0
[   20.936514]  kunit_try_run_case+0x170/0x3f0
[   20.936682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.937129]  kthread+0x328/0x630
[   20.937282]  ret_from_fork+0x10/0x20
[   20.937552] 
[   20.937609] Allocated by task 267:
[   20.937799]  kasan_save_stack+0x3c/0x68
[   20.938010]  kasan_save_track+0x20/0x40
[   20.938089]  kasan_save_alloc_info+0x40/0x58
[   20.938366]  __kasan_kmalloc+0xd4/0xd8
[   20.938507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.938748]  kasan_atomics+0xb8/0x2e0
[   20.938819]  kunit_try_run_case+0x170/0x3f0
[   20.938890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.939135]  kthread+0x328/0x630
[   20.939418]  ret_from_fork+0x10/0x20
[   20.939685] 
[   20.940013] The buggy address belongs to the object at fff00000c59c9e00
[   20.940013]  which belongs to the cache kmalloc-64 of size 64
[   20.940150] The buggy address is located 0 bytes to the right of
[   20.940150]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.940681] 
[   20.940838] The buggy address belongs to the physical page:
[   20.941075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.941374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.941565] page_type: f5(slab)
[   20.941826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.942103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.942167] page dumped because: kasan: bad access detected
[   20.942482] 
[   20.942789] Memory state around the buggy address:
[   20.942855]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.943018]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.943088] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.943375]                                      ^
[   20.943663]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.943914]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.944006] ==================================================================
[   20.918237] ==================================================================
[   20.918295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.918669] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.918739] 
[   20.919082] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.919186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.919226] Hardware name: linux,dummy-virt (DT)
[   20.919261] Call trace:
[   20.919530]  show_stack+0x20/0x38 (C)
[   20.919603]  dump_stack_lvl+0x8c/0xd0
[   20.919703]  print_report+0x118/0x5d0
[   20.919811]  kasan_report+0xdc/0x128
[   20.919908]  __asan_report_load8_noabort+0x20/0x30
[   20.919970]  kasan_atomics_helper+0x3df4/0x4858
[   20.920312]  kasan_atomics+0x198/0x2e0
[   20.920503]  kunit_try_run_case+0x170/0x3f0
[   20.920573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.920787]  kthread+0x328/0x630
[   20.921154]  ret_from_fork+0x10/0x20
[   20.921233] 
[   20.921568] Allocated by task 267:
[   20.921641]  kasan_save_stack+0x3c/0x68
[   20.921807]  kasan_save_track+0x20/0x40
[   20.921876]  kasan_save_alloc_info+0x40/0x58
[   20.922092]  __kasan_kmalloc+0xd4/0xd8
[   20.922153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.922535]  kasan_atomics+0xb8/0x2e0
[   20.922761]  kunit_try_run_case+0x170/0x3f0
[   20.922979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.923115]  kthread+0x328/0x630
[   20.923156]  ret_from_fork+0x10/0x20
[   20.923193] 
[   20.923237] The buggy address belongs to the object at fff00000c59c9e00
[   20.923237]  which belongs to the cache kmalloc-64 of size 64
[   20.923302] The buggy address is located 0 bytes to the right of
[   20.923302]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.923371] 
[   20.923402] The buggy address belongs to the physical page:
[   20.923445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.923502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.923554] page_type: f5(slab)
[   20.923594] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.923674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.923728] page dumped because: kasan: bad access detected
[   20.923762] 
[   20.923784] Memory state around the buggy address:
[   20.923826]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.923891]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.923939] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.923983]                                      ^
[   20.924020]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.924066]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.924108] ==================================================================
[   20.838358] ==================================================================
[   20.838412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.838667] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.838754] 
[   20.838856] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.838944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.839189] Hardware name: linux,dummy-virt (DT)
[   20.839249] Call trace:
[   20.839274]  show_stack+0x20/0x38 (C)
[   20.839571]  dump_stack_lvl+0x8c/0xd0
[   20.839795]  print_report+0x118/0x5d0
[   20.839857]  kasan_report+0xdc/0x128
[   20.839965]  __asan_report_load8_noabort+0x20/0x30
[   20.840282]  kasan_atomics_helper+0x3f04/0x4858
[   20.840347]  kasan_atomics+0x198/0x2e0
[   20.840648]  kunit_try_run_case+0x170/0x3f0
[   20.840866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.840950]  kthread+0x328/0x630
[   20.841002]  ret_from_fork+0x10/0x20
[   20.841268] 
[   20.841303] Allocated by task 267:
[   20.841767]  kasan_save_stack+0x3c/0x68
[   20.841891]  kasan_save_track+0x20/0x40
[   20.841955]  kasan_save_alloc_info+0x40/0x58
[   20.842258]  __kasan_kmalloc+0xd4/0xd8
[   20.842301]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.842350]  kasan_atomics+0xb8/0x2e0
[   20.842387]  kunit_try_run_case+0x170/0x3f0
[   20.843073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.843371]  kthread+0x328/0x630
[   20.843819]  ret_from_fork+0x10/0x20
[   20.844098] 
[   20.844167] The buggy address belongs to the object at fff00000c59c9e00
[   20.844167]  which belongs to the cache kmalloc-64 of size 64
[   20.844445] The buggy address is located 0 bytes to the right of
[   20.844445]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.844804] 
[   20.845258] The buggy address belongs to the physical page:
[   20.845426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.845489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.845689] page_type: f5(slab)
[   20.846284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.846731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.846838] page dumped because: kasan: bad access detected
[   20.847019] 
[   20.847197] Memory state around the buggy address:
[   20.847459]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.847539]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.847950] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.848288]                                      ^
[   20.848715]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.848768]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.849404] ==================================================================
[   20.678591] ==================================================================
[   20.678654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.678716] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.678771] 
[   20.678804] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.678889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.678917] Hardware name: linux,dummy-virt (DT)
[   20.679849] Call trace:
[   20.679888]  show_stack+0x20/0x38 (C)
[   20.680048]  dump_stack_lvl+0x8c/0xd0
[   20.680134]  print_report+0x118/0x5d0
[   20.680342]  kasan_report+0xdc/0x128
[   20.680697]  __asan_report_load4_noabort+0x20/0x30
[   20.680857]  kasan_atomics_helper+0x3e04/0x4858
[   20.680909]  kasan_atomics+0x198/0x2e0
[   20.681375]  kunit_try_run_case+0x170/0x3f0
[   20.681938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.682359]  kthread+0x328/0x630
[   20.682789]  ret_from_fork+0x10/0x20
[   20.682996] 
[   20.683019] Allocated by task 267:
[   20.683049]  kasan_save_stack+0x3c/0x68
[   20.683458]  kasan_save_track+0x20/0x40
[   20.683538]  kasan_save_alloc_info+0x40/0x58
[   20.683877]  __kasan_kmalloc+0xd4/0xd8
[   20.683919]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.683960]  kasan_atomics+0xb8/0x2e0
[   20.683998]  kunit_try_run_case+0x170/0x3f0
[   20.684461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.684525]  kthread+0x328/0x630
[   20.684804]  ret_from_fork+0x10/0x20
[   20.685123] 
[   20.685214] The buggy address belongs to the object at fff00000c59c9e00
[   20.685214]  which belongs to the cache kmalloc-64 of size 64
[   20.685283] The buggy address is located 0 bytes to the right of
[   20.685283]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.685362] 
[   20.685974] The buggy address belongs to the physical page:
[   20.686017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.686079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.686133] page_type: f5(slab)
[   20.686173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.686808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.687320] page dumped because: kasan: bad access detected
[   20.687365] 
[   20.687697] Memory state around the buggy address:
[   20.687737]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.688082]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.688330] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.688494]                                      ^
[   20.688597]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.689019]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.689071] ==================================================================

[   13.371990] ==================================================================
[   13.372444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.372674] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.373348] 
[   13.373589] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.373636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.373647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.373669] Call Trace:
[   13.373682]  <TASK>
[   13.373698]  dump_stack_lvl+0x73/0xb0
[   13.373723]  print_report+0xd1/0x610
[   13.373746]  ? __virt_addr_valid+0x1db/0x2d0
[   13.373766]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.373787]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.373810]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.373831]  kasan_report+0x141/0x180
[   13.373853]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.373891]  __asan_report_load4_noabort+0x18/0x20
[   13.373912]  kasan_atomics_helper+0x4bbc/0x5450
[   13.373934]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.373957]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.373977]  ? ret_from_fork_asm+0x1a/0x30
[   13.373998]  ? kasan_atomics+0x152/0x310
[   13.374021]  kasan_atomics+0x1dc/0x310
[   13.374040]  ? __pfx_kasan_atomics+0x10/0x10
[   13.374061]  ? __pfx_read_tsc+0x10/0x10
[   13.374080]  ? ktime_get_ts64+0x86/0x230
[   13.374129]  kunit_try_run_case+0x1a5/0x480
[   13.374151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.374169]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.374193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.374216]  ? __kthread_parkme+0x82/0x180
[   13.374239]  ? preempt_count_sub+0x50/0x80
[   13.374264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.374284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.374306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.374329]  kthread+0x337/0x6f0
[   13.374345]  ? trace_preempt_on+0x20/0xc0
[   13.374368]  ? __pfx_kthread+0x10/0x10
[   13.374386]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.374407]  ? calculate_sigpending+0x7b/0xa0
[   13.374429]  ? __pfx_kthread+0x10/0x10
[   13.374446]  ret_from_fork+0x41/0x80
[   13.374466]  ? __pfx_kthread+0x10/0x10
[   13.374483]  ret_from_fork_asm+0x1a/0x30
[   13.374513]  </TASK>
[   13.374524] 
[   13.387219] Allocated by task 284:
[   13.387542]  kasan_save_stack+0x45/0x70
[   13.387906]  kasan_save_track+0x18/0x40
[   13.388198]  kasan_save_alloc_info+0x3b/0x50
[   13.388507]  __kasan_kmalloc+0xb7/0xc0
[   13.388986]  __kmalloc_cache_noprof+0x189/0x420
[   13.389206]  kasan_atomics+0x95/0x310
[   13.389467]  kunit_try_run_case+0x1a5/0x480
[   13.389651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.390280]  kthread+0x337/0x6f0
[   13.390416]  ret_from_fork+0x41/0x80
[   13.390871]  ret_from_fork_asm+0x1a/0x30
[   13.391323] 
[   13.391539] The buggy address belongs to the object at ffff888103a31d80
[   13.391539]  which belongs to the cache kmalloc-64 of size 64
[   13.392326] The buggy address is located 0 bytes to the right of
[   13.392326]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.392898] 
[   13.392976] The buggy address belongs to the physical page:
[   13.393234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.393533] flags: 0x200000000000000(node=0|zone=2)
[   13.393744] page_type: f5(slab)
[   13.394130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.394416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.394648] page dumped because: kasan: bad access detected
[   13.395227] 
[   13.395336] Memory state around the buggy address:
[   13.395556]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.396182]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.396519] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.396894]                                      ^
[   13.397069]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.397394]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.397908] ==================================================================
[   14.633985] ==================================================================
[   14.634278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   14.634606] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.635065] 
[   14.635166] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.635210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.635224] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.635244] Call Trace:
[   14.635259]  <TASK>
[   14.635274]  dump_stack_lvl+0x73/0xb0
[   14.635299]  print_report+0xd1/0x610
[   14.635322]  ? __virt_addr_valid+0x1db/0x2d0
[   14.635343]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.635366]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.635389]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.635411]  kasan_report+0x141/0x180
[   14.635434]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.635462]  kasan_check_range+0x10c/0x1c0
[   14.635482]  __kasan_check_write+0x18/0x20
[   14.635502]  kasan_atomics_helper+0x20c8/0x5450
[   14.635525]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.635548]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.635569]  ? ret_from_fork_asm+0x1a/0x30
[   14.635590]  ? kasan_atomics+0x152/0x310
[   14.635613]  kasan_atomics+0x1dc/0x310
[   14.635633]  ? __pfx_kasan_atomics+0x10/0x10
[   14.635654]  ? __pfx_read_tsc+0x10/0x10
[   14.635674]  ? ktime_get_ts64+0x86/0x230
[   14.635698]  kunit_try_run_case+0x1a5/0x480
[   14.635719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.635738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.635762]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.635785]  ? __kthread_parkme+0x82/0x180
[   14.635819]  ? preempt_count_sub+0x50/0x80
[   14.635844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.635865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.635900]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.635923]  kthread+0x337/0x6f0
[   14.635940]  ? trace_preempt_on+0x20/0xc0
[   14.635964]  ? __pfx_kthread+0x10/0x10
[   14.635982]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.636005]  ? calculate_sigpending+0x7b/0xa0
[   14.636026]  ? __pfx_kthread+0x10/0x10
[   14.636045]  ret_from_fork+0x41/0x80
[   14.636065]  ? __pfx_kthread+0x10/0x10
[   14.636084]  ret_from_fork_asm+0x1a/0x30
[   14.636113]  </TASK>
[   14.636124] 
[   14.643470] Allocated by task 284:
[   14.643651]  kasan_save_stack+0x45/0x70
[   14.643851]  kasan_save_track+0x18/0x40
[   14.645009]  kasan_save_alloc_info+0x3b/0x50
[   14.645219]  __kasan_kmalloc+0xb7/0xc0
[   14.645393]  __kmalloc_cache_noprof+0x189/0x420
[   14.645598]  kasan_atomics+0x95/0x310
[   14.645782]  kunit_try_run_case+0x1a5/0x480
[   14.646049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.646284]  kthread+0x337/0x6f0
[   14.646433]  ret_from_fork+0x41/0x80
[   14.646615]  ret_from_fork_asm+0x1a/0x30
[   14.646806] 
[   14.647498] The buggy address belongs to the object at ffff888103a31d80
[   14.647498]  which belongs to the cache kmalloc-64 of size 64
[   14.648039] The buggy address is located 0 bytes to the right of
[   14.648039]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.648673] 
[   14.648926] The buggy address belongs to the physical page:
[   14.649178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.649631] flags: 0x200000000000000(node=0|zone=2)
[   14.649966] page_type: f5(slab)
[   14.650115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.650580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.650926] page dumped because: kasan: bad access detected
[   14.651230] 
[   14.651332] Memory state around the buggy address:
[   14.651528]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.651829]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.652138] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.652438]                                      ^
[   14.652650]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.653361]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.653613] ==================================================================
[   14.090452] ==================================================================
[   14.091033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.091342] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.091565] 
[   14.091646] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.091688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.091700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.091720] Call Trace:
[   14.091734]  <TASK>
[   14.091749]  dump_stack_lvl+0x73/0xb0
[   14.091772]  print_report+0xd1/0x610
[   14.091796]  ? __virt_addr_valid+0x1db/0x2d0
[   14.091827]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.091849]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.091872]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.091906]  kasan_report+0x141/0x180
[   14.091929]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.091957]  kasan_check_range+0x10c/0x1c0
[   14.091977]  __kasan_check_write+0x18/0x20
[   14.091997]  kasan_atomics_helper+0x12e6/0x5450
[   14.092020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.092044]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.092065]  ? ret_from_fork_asm+0x1a/0x30
[   14.092086]  ? kasan_atomics+0x152/0x310
[   14.092110]  kasan_atomics+0x1dc/0x310
[   14.092129]  ? __pfx_kasan_atomics+0x10/0x10
[   14.092150]  ? __pfx_read_tsc+0x10/0x10
[   14.092170]  ? ktime_get_ts64+0x86/0x230
[   14.092195]  kunit_try_run_case+0x1a5/0x480
[   14.092216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.092235]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.092260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.092284]  ? __kthread_parkme+0x82/0x180
[   14.092305]  ? preempt_count_sub+0x50/0x80
[   14.092331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.092352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.092375]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.092399]  kthread+0x337/0x6f0
[   14.092416]  ? trace_preempt_on+0x20/0xc0
[   14.092439]  ? __pfx_kthread+0x10/0x10
[   14.092458]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.092482]  ? calculate_sigpending+0x7b/0xa0
[   14.092505]  ? __pfx_kthread+0x10/0x10
[   14.092524]  ret_from_fork+0x41/0x80
[   14.092547]  ? __pfx_kthread+0x10/0x10
[   14.092565]  ret_from_fork_asm+0x1a/0x30
[   14.092596]  </TASK>
[   14.092607] 
[   14.100091] Allocated by task 284:
[   14.100265]  kasan_save_stack+0x45/0x70
[   14.100460]  kasan_save_track+0x18/0x40
[   14.100653]  kasan_save_alloc_info+0x3b/0x50
[   14.100905]  __kasan_kmalloc+0xb7/0xc0
[   14.101077]  __kmalloc_cache_noprof+0x189/0x420
[   14.101231]  kasan_atomics+0x95/0x310
[   14.101358]  kunit_try_run_case+0x1a5/0x480
[   14.101500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.101734]  kthread+0x337/0x6f0
[   14.101998]  ret_from_fork+0x41/0x80
[   14.102184]  ret_from_fork_asm+0x1a/0x30
[   14.102382] 
[   14.102480] The buggy address belongs to the object at ffff888103a31d80
[   14.102480]  which belongs to the cache kmalloc-64 of size 64
[   14.102989] The buggy address is located 0 bytes to the right of
[   14.102989]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.103482] 
[   14.103569] The buggy address belongs to the physical page:
[   14.103785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.104114] flags: 0x200000000000000(node=0|zone=2)
[   14.104318] page_type: f5(slab)
[   14.104475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.104719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.104951] page dumped because: kasan: bad access detected
[   14.105119] 
[   14.105193] Memory state around the buggy address:
[   14.105344]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.105556]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.105799] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.106179]                                      ^
[   14.106400]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.106714]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.107335] ==================================================================
[   14.423264] ==================================================================
[   14.423523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.423942] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.424266] 
[   14.424374] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.424428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.424441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.424463] Call Trace:
[   14.424489]  <TASK>
[   14.424503]  dump_stack_lvl+0x73/0xb0
[   14.424529]  print_report+0xd1/0x610
[   14.424552]  ? __virt_addr_valid+0x1db/0x2d0
[   14.424582]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.424604]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.424627]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.424661]  kasan_report+0x141/0x180
[   14.424683]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.424711]  kasan_check_range+0x10c/0x1c0
[   14.424742]  __kasan_check_write+0x18/0x20
[   14.424762]  kasan_atomics_helper+0x1c18/0x5450
[   14.424786]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.424829]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.424850]  ? ret_from_fork_asm+0x1a/0x30
[   14.424872]  ? kasan_atomics+0x152/0x310
[   14.424904]  kasan_atomics+0x1dc/0x310
[   14.424924]  ? __pfx_kasan_atomics+0x10/0x10
[   14.424946]  ? __pfx_read_tsc+0x10/0x10
[   14.424965]  ? ktime_get_ts64+0x86/0x230
[   14.424999]  kunit_try_run_case+0x1a5/0x480
[   14.425020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.425039]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.425075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.425099]  ? __kthread_parkme+0x82/0x180
[   14.425121]  ? preempt_count_sub+0x50/0x80
[   14.425150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.425170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.425193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.425217]  kthread+0x337/0x6f0
[   14.425244]  ? trace_preempt_on+0x20/0xc0
[   14.425270]  ? __pfx_kthread+0x10/0x10
[   14.425288]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.425322]  ? calculate_sigpending+0x7b/0xa0
[   14.425344]  ? __pfx_kthread+0x10/0x10
[   14.425363]  ret_from_fork+0x41/0x80
[   14.425384]  ? __pfx_kthread+0x10/0x10
[   14.425402]  ret_from_fork_asm+0x1a/0x30
[   14.425432]  </TASK>
[   14.425443] 
[   14.435168] Allocated by task 284:
[   14.435498]  kasan_save_stack+0x45/0x70
[   14.435827]  kasan_save_track+0x18/0x40
[   14.436030]  kasan_save_alloc_info+0x3b/0x50
[   14.436321]  __kasan_kmalloc+0xb7/0xc0
[   14.436460]  __kmalloc_cache_noprof+0x189/0x420
[   14.436832]  kasan_atomics+0x95/0x310
[   14.437021]  kunit_try_run_case+0x1a5/0x480
[   14.437241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.437487]  kthread+0x337/0x6f0
[   14.437650]  ret_from_fork+0x41/0x80
[   14.437815]  ret_from_fork_asm+0x1a/0x30
[   14.438300] 
[   14.438395] The buggy address belongs to the object at ffff888103a31d80
[   14.438395]  which belongs to the cache kmalloc-64 of size 64
[   14.439143] The buggy address is located 0 bytes to the right of
[   14.439143]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.439739] 
[   14.439824] The buggy address belongs to the physical page:
[   14.440270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.440558] flags: 0x200000000000000(node=0|zone=2)
[   14.440796] page_type: f5(slab)
[   14.440953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.441275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.441573] page dumped because: kasan: bad access detected
[   14.441790] 
[   14.442332] Memory state around the buggy address:
[   14.442519]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.442993]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.443397] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.443868]                                      ^
[   14.444186]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.444540]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.444979] ==================================================================
[   14.505515] ==================================================================
[   14.505918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   14.506167] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.506698] 
[   14.506778] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.506835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.506848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.506868] Call Trace:
[   14.506893]  <TASK>
[   14.506906]  dump_stack_lvl+0x73/0xb0
[   14.506928]  print_report+0xd1/0x610
[   14.506951]  ? __virt_addr_valid+0x1db/0x2d0
[   14.506999]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.507021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.507043]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.507065]  kasan_report+0x141/0x180
[   14.507088]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.507115]  kasan_check_range+0x10c/0x1c0
[   14.507136]  __kasan_check_write+0x18/0x20
[   14.507156]  kasan_atomics_helper+0x1e12/0x5450
[   14.507179]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.507202]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.507223]  ? ret_from_fork_asm+0x1a/0x30
[   14.507244]  ? kasan_atomics+0x152/0x310
[   14.507267]  kasan_atomics+0x1dc/0x310
[   14.507286]  ? __pfx_kasan_atomics+0x10/0x10
[   14.507308]  ? __pfx_read_tsc+0x10/0x10
[   14.507327]  ? ktime_get_ts64+0x86/0x230
[   14.507352]  kunit_try_run_case+0x1a5/0x480
[   14.507373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.507392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.507434]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.507459]  ? __kthread_parkme+0x82/0x180
[   14.507481]  ? preempt_count_sub+0x50/0x80
[   14.507504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.507526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.507549]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.507572]  kthread+0x337/0x6f0
[   14.507589]  ? trace_preempt_on+0x20/0xc0
[   14.507612]  ? __pfx_kthread+0x10/0x10
[   14.507630]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.507652]  ? calculate_sigpending+0x7b/0xa0
[   14.507673]  ? __pfx_kthread+0x10/0x10
[   14.507692]  ret_from_fork+0x41/0x80
[   14.507732]  ? __pfx_kthread+0x10/0x10
[   14.507750]  ret_from_fork_asm+0x1a/0x30
[   14.507780]  </TASK>
[   14.507792] 
[   14.516841] Allocated by task 284:
[   14.516986]  kasan_save_stack+0x45/0x70
[   14.517194]  kasan_save_track+0x18/0x40
[   14.517432]  kasan_save_alloc_info+0x3b/0x50
[   14.517637]  __kasan_kmalloc+0xb7/0xc0
[   14.517796]  __kmalloc_cache_noprof+0x189/0x420
[   14.518001]  kasan_atomics+0x95/0x310
[   14.518186]  kunit_try_run_case+0x1a5/0x480
[   14.518359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.518544]  kthread+0x337/0x6f0
[   14.518713]  ret_from_fork+0x41/0x80
[   14.518960]  ret_from_fork_asm+0x1a/0x30
[   14.519127] 
[   14.519223] The buggy address belongs to the object at ffff888103a31d80
[   14.519223]  which belongs to the cache kmalloc-64 of size 64
[   14.519658] The buggy address is located 0 bytes to the right of
[   14.519658]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.520028] 
[   14.520125] The buggy address belongs to the physical page:
[   14.520375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.520726] flags: 0x200000000000000(node=0|zone=2)
[   14.520960] page_type: f5(slab)
[   14.521082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.521317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.521652] page dumped because: kasan: bad access detected
[   14.522004] 
[   14.522098] Memory state around the buggy address:
[   14.522325]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.522623]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.522968] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.523182]                                      ^
[   14.523412]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.523670]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.524047] ==================================================================
[   13.879363] ==================================================================
[   13.879663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   13.880090] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.880429] 
[   13.880535] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.880576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.880588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.880609] Call Trace:
[   13.880622]  <TASK>
[   13.880637]  dump_stack_lvl+0x73/0xb0
[   13.880661]  print_report+0xd1/0x610
[   13.880684]  ? __virt_addr_valid+0x1db/0x2d0
[   13.880705]  ? kasan_atomics_helper+0xde0/0x5450
[   13.880726]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.880749]  ? kasan_atomics_helper+0xde0/0x5450
[   13.880772]  kasan_report+0x141/0x180
[   13.880795]  ? kasan_atomics_helper+0xde0/0x5450
[   13.880822]  kasan_check_range+0x10c/0x1c0
[   13.880843]  __kasan_check_write+0x18/0x20
[   13.880864]  kasan_atomics_helper+0xde0/0x5450
[   13.880897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.880920]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.880941]  ? ret_from_fork_asm+0x1a/0x30
[   13.880963]  ? kasan_atomics+0x152/0x310
[   13.880986]  kasan_atomics+0x1dc/0x310
[   13.881006]  ? __pfx_kasan_atomics+0x10/0x10
[   13.881026]  ? __pfx_read_tsc+0x10/0x10
[   13.881046]  ? ktime_get_ts64+0x86/0x230
[   13.881070]  kunit_try_run_case+0x1a5/0x480
[   13.881091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.881111]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.881139]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.881162]  ? __kthread_parkme+0x82/0x180
[   13.881184]  ? preempt_count_sub+0x50/0x80
[   13.881209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.881230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.881253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.881277]  kthread+0x337/0x6f0
[   13.881305]  ? trace_preempt_on+0x20/0xc0
[   13.881329]  ? __pfx_kthread+0x10/0x10
[   13.881347]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.881381]  ? calculate_sigpending+0x7b/0xa0
[   13.881403]  ? __pfx_kthread+0x10/0x10
[   13.881422]  ret_from_fork+0x41/0x80
[   13.881443]  ? __pfx_kthread+0x10/0x10
[   13.881460]  ret_from_fork_asm+0x1a/0x30
[   13.881490]  </TASK>
[   13.881501] 
[   13.889091] Allocated by task 284:
[   13.889227]  kasan_save_stack+0x45/0x70
[   13.889467]  kasan_save_track+0x18/0x40
[   13.889657]  kasan_save_alloc_info+0x3b/0x50
[   13.889863]  __kasan_kmalloc+0xb7/0xc0
[   13.890055]  __kmalloc_cache_noprof+0x189/0x420
[   13.890270]  kasan_atomics+0x95/0x310
[   13.890444]  kunit_try_run_case+0x1a5/0x480
[   13.890587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.890761]  kthread+0x337/0x6f0
[   13.890980]  ret_from_fork+0x41/0x80
[   13.891164]  ret_from_fork_asm+0x1a/0x30
[   13.891376] 
[   13.891487] The buggy address belongs to the object at ffff888103a31d80
[   13.891487]  which belongs to the cache kmalloc-64 of size 64
[   13.892202] The buggy address is located 0 bytes to the right of
[   13.892202]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.892635] 
[   13.892705] The buggy address belongs to the physical page:
[   13.893032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.893415] flags: 0x200000000000000(node=0|zone=2)
[   13.893587] page_type: f5(slab)
[   13.893706] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.894020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.894389] page dumped because: kasan: bad access detected
[   13.894668] 
[   13.894775] Memory state around the buggy address:
[   13.895085]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.895350]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.895562] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.895770]                                      ^
[   13.896002]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.896315]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.896641] ==================================================================
[   14.717830] ==================================================================
[   14.718192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   14.718517] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.718916] 
[   14.719051] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.719095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.719108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.719126] Call Trace:
[   14.719142]  <TASK>
[   14.719156]  dump_stack_lvl+0x73/0xb0
[   14.719180]  print_report+0xd1/0x610
[   14.719223]  ? __virt_addr_valid+0x1db/0x2d0
[   14.719244]  ? kasan_atomics_helper+0x224c/0x5450
[   14.719266]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.719289]  ? kasan_atomics_helper+0x224c/0x5450
[   14.719312]  kasan_report+0x141/0x180
[   14.719335]  ? kasan_atomics_helper+0x224c/0x5450
[   14.719362]  kasan_check_range+0x10c/0x1c0
[   14.719402]  __kasan_check_write+0x18/0x20
[   14.719423]  kasan_atomics_helper+0x224c/0x5450
[   14.719447]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.719469]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.719490]  ? ret_from_fork_asm+0x1a/0x30
[   14.719512]  ? kasan_atomics+0x152/0x310
[   14.719535]  kasan_atomics+0x1dc/0x310
[   14.719555]  ? __pfx_kasan_atomics+0x10/0x10
[   14.719576]  ? __pfx_read_tsc+0x10/0x10
[   14.719595]  ? ktime_get_ts64+0x86/0x230
[   14.719619]  kunit_try_run_case+0x1a5/0x480
[   14.719641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.719660]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.719684]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.719709]  ? __kthread_parkme+0x82/0x180
[   14.719731]  ? preempt_count_sub+0x50/0x80
[   14.719755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.719776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.719836]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.719860]  kthread+0x337/0x6f0
[   14.719877]  ? trace_preempt_on+0x20/0xc0
[   14.719909]  ? __pfx_kthread+0x10/0x10
[   14.719928]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.719970]  ? calculate_sigpending+0x7b/0xa0
[   14.719992]  ? __pfx_kthread+0x10/0x10
[   14.720011]  ret_from_fork+0x41/0x80
[   14.720032]  ? __pfx_kthread+0x10/0x10
[   14.720051]  ret_from_fork_asm+0x1a/0x30
[   14.720081]  </TASK>
[   14.720091] 
[   14.727365] Allocated by task 284:
[   14.727491]  kasan_save_stack+0x45/0x70
[   14.727631]  kasan_save_track+0x18/0x40
[   14.727778]  kasan_save_alloc_info+0x3b/0x50
[   14.728018]  __kasan_kmalloc+0xb7/0xc0
[   14.728233]  __kmalloc_cache_noprof+0x189/0x420
[   14.728490]  kasan_atomics+0x95/0x310
[   14.728677]  kunit_try_run_case+0x1a5/0x480
[   14.728919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.729182]  kthread+0x337/0x6f0
[   14.729369]  ret_from_fork+0x41/0x80
[   14.729530]  ret_from_fork_asm+0x1a/0x30
[   14.729704] 
[   14.729846] The buggy address belongs to the object at ffff888103a31d80
[   14.729846]  which belongs to the cache kmalloc-64 of size 64
[   14.730232] The buggy address is located 0 bytes to the right of
[   14.730232]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.730583] 
[   14.730651] The buggy address belongs to the physical page:
[   14.730944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.731294] flags: 0x200000000000000(node=0|zone=2)
[   14.731523] page_type: f5(slab)
[   14.731685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.732061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.732394] page dumped because: kasan: bad access detected
[   14.732580] 
[   14.732647] Memory state around the buggy address:
[   14.732814]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.733094]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.733437] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.733756]                                      ^
[   14.734029]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.734336]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.734634] ==================================================================
[   13.659352] ==================================================================
[   13.659610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   13.660093] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.660419] 
[   13.660503] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.660544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.660556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.660575] Call Trace:
[   13.660587]  <TASK>
[   13.660602]  dump_stack_lvl+0x73/0xb0
[   13.660624]  print_report+0xd1/0x610
[   13.660647]  ? __virt_addr_valid+0x1db/0x2d0
[   13.660667]  ? kasan_atomics_helper+0x72f/0x5450
[   13.660767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.660796]  ? kasan_atomics_helper+0x72f/0x5450
[   13.660820]  kasan_report+0x141/0x180
[   13.660858]  ? kasan_atomics_helper+0x72f/0x5450
[   13.660892]  kasan_check_range+0x10c/0x1c0
[   13.660913]  __kasan_check_write+0x18/0x20
[   13.660942]  kasan_atomics_helper+0x72f/0x5450
[   13.660965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.660988]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.661019]  ? ret_from_fork_asm+0x1a/0x30
[   13.661041]  ? kasan_atomics+0x152/0x310
[   13.661064]  kasan_atomics+0x1dc/0x310
[   13.661084]  ? __pfx_kasan_atomics+0x10/0x10
[   13.661105]  ? __pfx_read_tsc+0x10/0x10
[   13.661124]  ? ktime_get_ts64+0x86/0x230
[   13.661156]  kunit_try_run_case+0x1a5/0x480
[   13.661177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.661195]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.661219]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.661243]  ? __kthread_parkme+0x82/0x180
[   13.661264]  ? preempt_count_sub+0x50/0x80
[   13.661303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.661323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.661347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.661397]  kthread+0x337/0x6f0
[   13.661414]  ? trace_preempt_on+0x20/0xc0
[   13.661437]  ? __pfx_kthread+0x10/0x10
[   13.661456]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.661478]  ? calculate_sigpending+0x7b/0xa0
[   13.661499]  ? __pfx_kthread+0x10/0x10
[   13.661518]  ret_from_fork+0x41/0x80
[   13.661539]  ? __pfx_kthread+0x10/0x10
[   13.661558]  ret_from_fork_asm+0x1a/0x30
[   13.661588]  </TASK>
[   13.661599] 
[   13.670394] Allocated by task 284:
[   13.670580]  kasan_save_stack+0x45/0x70
[   13.670973]  kasan_save_track+0x18/0x40
[   13.671204]  kasan_save_alloc_info+0x3b/0x50
[   13.671415]  __kasan_kmalloc+0xb7/0xc0
[   13.671618]  __kmalloc_cache_noprof+0x189/0x420
[   13.671979]  kasan_atomics+0x95/0x310
[   13.672155]  kunit_try_run_case+0x1a5/0x480
[   13.672392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.672628]  kthread+0x337/0x6f0
[   13.672861]  ret_from_fork+0x41/0x80
[   13.673007]  ret_from_fork_asm+0x1a/0x30
[   13.673155] 
[   13.673227] The buggy address belongs to the object at ffff888103a31d80
[   13.673227]  which belongs to the cache kmalloc-64 of size 64
[   13.673689] The buggy address is located 0 bytes to the right of
[   13.673689]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.674242] 
[   13.674337] The buggy address belongs to the physical page:
[   13.674593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.675181] flags: 0x200000000000000(node=0|zone=2)
[   13.675446] page_type: f5(slab)
[   13.675629] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.676232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.676571] page dumped because: kasan: bad access detected
[   13.677041] 
[   13.677162] Memory state around the buggy address:
[   13.677390]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.677629]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.678062] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.678387]                                      ^
[   13.678536]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.679025]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.679342] ==================================================================
[   13.584649] ==================================================================
[   13.585003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   13.585447] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.585764] 
[   13.585945] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.585991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.586004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.586024] Call Trace:
[   13.586039]  <TASK>
[   13.586055]  dump_stack_lvl+0x73/0xb0
[   13.586079]  print_report+0xd1/0x610
[   13.586102]  ? __virt_addr_valid+0x1db/0x2d0
[   13.586122]  ? kasan_atomics_helper+0x565/0x5450
[   13.586188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.586223]  ? kasan_atomics_helper+0x565/0x5450
[   13.586254]  kasan_report+0x141/0x180
[   13.586278]  ? kasan_atomics_helper+0x565/0x5450
[   13.586306]  kasan_check_range+0x10c/0x1c0
[   13.586337]  __kasan_check_write+0x18/0x20
[   13.586358]  kasan_atomics_helper+0x565/0x5450
[   13.586382]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.586405]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.586425]  ? ret_from_fork_asm+0x1a/0x30
[   13.586447]  ? kasan_atomics+0x152/0x310
[   13.586470]  kasan_atomics+0x1dc/0x310
[   13.586489]  ? __pfx_kasan_atomics+0x10/0x10
[   13.586510]  ? __pfx_read_tsc+0x10/0x10
[   13.586530]  ? ktime_get_ts64+0x86/0x230
[   13.586563]  kunit_try_run_case+0x1a5/0x480
[   13.586585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.586603]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.586638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.586661]  ? __kthread_parkme+0x82/0x180
[   13.586684]  ? preempt_count_sub+0x50/0x80
[   13.586768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.586800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.586824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.586848]  kthread+0x337/0x6f0
[   13.586876]  ? trace_preempt_on+0x20/0xc0
[   13.586908]  ? __pfx_kthread+0x10/0x10
[   13.586927]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.586950]  ? calculate_sigpending+0x7b/0xa0
[   13.586972]  ? __pfx_kthread+0x10/0x10
[   13.586990]  ret_from_fork+0x41/0x80
[   13.587012]  ? __pfx_kthread+0x10/0x10
[   13.587030]  ret_from_fork_asm+0x1a/0x30
[   13.587059]  </TASK>
[   13.587070] 
[   13.597548] Allocated by task 284:
[   13.597895]  kasan_save_stack+0x45/0x70
[   13.598086]  kasan_save_track+0x18/0x40
[   13.598449]  kasan_save_alloc_info+0x3b/0x50
[   13.599058]  __kasan_kmalloc+0xb7/0xc0
[   13.599198]  __kmalloc_cache_noprof+0x189/0x420
[   13.599346]  kasan_atomics+0x95/0x310
[   13.599471]  kunit_try_run_case+0x1a5/0x480
[   13.599609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.599777]  kthread+0x337/0x6f0
[   13.600133]  ret_from_fork+0x41/0x80
[   13.600937]  ret_from_fork_asm+0x1a/0x30
[   13.601475] 
[   13.601670] The buggy address belongs to the object at ffff888103a31d80
[   13.601670]  which belongs to the cache kmalloc-64 of size 64
[   13.603142] The buggy address is located 0 bytes to the right of
[   13.603142]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.604515] 
[   13.604687] The buggy address belongs to the physical page:
[   13.605088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.605335] flags: 0x200000000000000(node=0|zone=2)
[   13.605494] page_type: f5(slab)
[   13.605610] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.605852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.606826] page dumped because: kasan: bad access detected
[   13.607159] 
[   13.607234] Memory state around the buggy address:
[   13.607602]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.608189]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.608696] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.609246]                                      ^
[   13.609420]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.609986]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.610534] ==================================================================
[   13.976091] ==================================================================
[   13.976833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   13.977146] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.977513] 
[   13.977615] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.977657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.977680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.977700] Call Trace:
[   13.977715]  <TASK>
[   13.977730]  dump_stack_lvl+0x73/0xb0
[   13.977765]  print_report+0xd1/0x610
[   13.977789]  ? __virt_addr_valid+0x1db/0x2d0
[   13.977820]  ? kasan_atomics_helper+0x1079/0x5450
[   13.977842]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.977865]  ? kasan_atomics_helper+0x1079/0x5450
[   13.977906]  kasan_report+0x141/0x180
[   13.977930]  ? kasan_atomics_helper+0x1079/0x5450
[   13.977958]  kasan_check_range+0x10c/0x1c0
[   13.977991]  __kasan_check_write+0x18/0x20
[   13.978012]  kasan_atomics_helper+0x1079/0x5450
[   13.978035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.978058]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.978088]  ? ret_from_fork_asm+0x1a/0x30
[   13.978109]  ? kasan_atomics+0x152/0x310
[   13.978132]  kasan_atomics+0x1dc/0x310
[   13.978164]  ? __pfx_kasan_atomics+0x10/0x10
[   13.978186]  ? __pfx_read_tsc+0x10/0x10
[   13.978206]  ? ktime_get_ts64+0x86/0x230
[   13.978238]  kunit_try_run_case+0x1a5/0x480
[   13.978260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.978279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.978304]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.978339]  ? __kthread_parkme+0x82/0x180
[   13.978362]  ? preempt_count_sub+0x50/0x80
[   13.978387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.978416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.978439]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.978463]  kthread+0x337/0x6f0
[   13.978491]  ? trace_preempt_on+0x20/0xc0
[   13.978514]  ? __pfx_kthread+0x10/0x10
[   13.978533]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.978555]  ? calculate_sigpending+0x7b/0xa0
[   13.978576]  ? __pfx_kthread+0x10/0x10
[   13.978595]  ret_from_fork+0x41/0x80
[   13.978616]  ? __pfx_kthread+0x10/0x10
[   13.978634]  ret_from_fork_asm+0x1a/0x30
[   13.978664]  </TASK>
[   13.978675] 
[   13.986456] Allocated by task 284:
[   13.986630]  kasan_save_stack+0x45/0x70
[   13.986836]  kasan_save_track+0x18/0x40
[   13.987009]  kasan_save_alloc_info+0x3b/0x50
[   13.987157]  __kasan_kmalloc+0xb7/0xc0
[   13.987289]  __kmalloc_cache_noprof+0x189/0x420
[   13.987470]  kasan_atomics+0x95/0x310
[   13.987653]  kunit_try_run_case+0x1a5/0x480
[   13.987912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.988168]  kthread+0x337/0x6f0
[   13.988309]  ret_from_fork+0x41/0x80
[   13.988499]  ret_from_fork_asm+0x1a/0x30
[   13.988681] 
[   13.988789] The buggy address belongs to the object at ffff888103a31d80
[   13.988789]  which belongs to the cache kmalloc-64 of size 64
[   13.989291] The buggy address is located 0 bytes to the right of
[   13.989291]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.989826] 
[   13.989913] The buggy address belongs to the physical page:
[   13.990167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.990405] flags: 0x200000000000000(node=0|zone=2)
[   13.990564] page_type: f5(slab)
[   13.990682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.991209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.991564] page dumped because: kasan: bad access detected
[   13.991812] 
[   13.991911] Memory state around the buggy address:
[   13.992135]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.992432]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.992679] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.993088]                                      ^
[   13.993318]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.993595]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.993830] ==================================================================
[   13.551804] ==================================================================
[   13.552389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.553232] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.554030] 
[   13.554287] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.554342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.554354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.554376] Call Trace:
[   13.554388]  <TASK>
[   13.554403]  dump_stack_lvl+0x73/0xb0
[   13.554428]  print_report+0xd1/0x610
[   13.554451]  ? __virt_addr_valid+0x1db/0x2d0
[   13.554472]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.554494]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.554531]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.554553]  kasan_report+0x141/0x180
[   13.554583]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.554611]  __asan_report_store4_noabort+0x1b/0x30
[   13.554632]  kasan_atomics_helper+0x4b3a/0x5450
[   13.554655]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.554699]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.554720]  ? ret_from_fork_asm+0x1a/0x30
[   13.554741]  ? kasan_atomics+0x152/0x310
[   13.554765]  kasan_atomics+0x1dc/0x310
[   13.554784]  ? __pfx_kasan_atomics+0x10/0x10
[   13.554805]  ? __pfx_read_tsc+0x10/0x10
[   13.554825]  ? ktime_get_ts64+0x86/0x230
[   13.554866]  kunit_try_run_case+0x1a5/0x480
[   13.554904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.554923]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.554947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.554971]  ? __kthread_parkme+0x82/0x180
[   13.554994]  ? preempt_count_sub+0x50/0x80
[   13.555018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.555039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.555063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.555087]  kthread+0x337/0x6f0
[   13.555104]  ? trace_preempt_on+0x20/0xc0
[   13.555128]  ? __pfx_kthread+0x10/0x10
[   13.555146]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.555168]  ? calculate_sigpending+0x7b/0xa0
[   13.555189]  ? __pfx_kthread+0x10/0x10
[   13.555208]  ret_from_fork+0x41/0x80
[   13.555228]  ? __pfx_kthread+0x10/0x10
[   13.555247]  ret_from_fork_asm+0x1a/0x30
[   13.555277]  </TASK>
[   13.555287] 
[   13.569953] Allocated by task 284:
[   13.570352]  kasan_save_stack+0x45/0x70
[   13.570817]  kasan_save_track+0x18/0x40
[   13.571019]  kasan_save_alloc_info+0x3b/0x50
[   13.571476]  __kasan_kmalloc+0xb7/0xc0
[   13.571948]  __kmalloc_cache_noprof+0x189/0x420
[   13.572343]  kasan_atomics+0x95/0x310
[   13.572554]  kunit_try_run_case+0x1a5/0x480
[   13.572749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.573384]  kthread+0x337/0x6f0
[   13.573800]  ret_from_fork+0x41/0x80
[   13.574225]  ret_from_fork_asm+0x1a/0x30
[   13.574523] 
[   13.574714] The buggy address belongs to the object at ffff888103a31d80
[   13.574714]  which belongs to the cache kmalloc-64 of size 64
[   13.575632] The buggy address is located 0 bytes to the right of
[   13.575632]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.576517] 
[   13.576743] The buggy address belongs to the physical page:
[   13.577312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.577558] flags: 0x200000000000000(node=0|zone=2)
[   13.577777] page_type: f5(slab)
[   13.578235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.579100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.579799] page dumped because: kasan: bad access detected
[   13.580343] 
[   13.580540] Memory state around the buggy address:
[   13.580767]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.581427]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.581648] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.582318]                                      ^
[   13.582857]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.583483]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.584210] ==================================================================
[   14.469662] ==================================================================
[   14.470179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.470527] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.470899] 
[   14.470981] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.471023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.471035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.471055] Call Trace:
[   14.471070]  <TASK>
[   14.471085]  dump_stack_lvl+0x73/0xb0
[   14.471109]  print_report+0xd1/0x610
[   14.471153]  ? __virt_addr_valid+0x1db/0x2d0
[   14.471174]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.471197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.471219]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.471242]  kasan_report+0x141/0x180
[   14.471265]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.471292]  kasan_check_range+0x10c/0x1c0
[   14.471312]  __kasan_check_write+0x18/0x20
[   14.471332]  kasan_atomics_helper+0x1ce1/0x5450
[   14.471356]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.471379]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.471399]  ? ret_from_fork_asm+0x1a/0x30
[   14.471420]  ? kasan_atomics+0x152/0x310
[   14.471443]  kasan_atomics+0x1dc/0x310
[   14.471462]  ? __pfx_kasan_atomics+0x10/0x10
[   14.471483]  ? __pfx_read_tsc+0x10/0x10
[   14.471503]  ? ktime_get_ts64+0x86/0x230
[   14.471546]  kunit_try_run_case+0x1a5/0x480
[   14.471567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.471587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.471611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.471635]  ? __kthread_parkme+0x82/0x180
[   14.471657]  ? preempt_count_sub+0x50/0x80
[   14.471682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.471703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.471726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.471750]  kthread+0x337/0x6f0
[   14.471766]  ? trace_preempt_on+0x20/0xc0
[   14.471790]  ? __pfx_kthread+0x10/0x10
[   14.471818]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.471840]  ? calculate_sigpending+0x7b/0xa0
[   14.471862]  ? __pfx_kthread+0x10/0x10
[   14.471890]  ret_from_fork+0x41/0x80
[   14.471912]  ? __pfx_kthread+0x10/0x10
[   14.471930]  ret_from_fork_asm+0x1a/0x30
[   14.471960]  </TASK>
[   14.471970] 
[   14.479549] Allocated by task 284:
[   14.479721]  kasan_save_stack+0x45/0x70
[   14.479986]  kasan_save_track+0x18/0x40
[   14.480200]  kasan_save_alloc_info+0x3b/0x50
[   14.480388]  __kasan_kmalloc+0xb7/0xc0
[   14.480520]  __kmalloc_cache_noprof+0x189/0x420
[   14.480726]  kasan_atomics+0x95/0x310
[   14.480919]  kunit_try_run_case+0x1a5/0x480
[   14.481202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.481376]  kthread+0x337/0x6f0
[   14.481494]  ret_from_fork+0x41/0x80
[   14.481624]  ret_from_fork_asm+0x1a/0x30
[   14.481794] 
[   14.481897] The buggy address belongs to the object at ffff888103a31d80
[   14.481897]  which belongs to the cache kmalloc-64 of size 64
[   14.482417] The buggy address is located 0 bytes to the right of
[   14.482417]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.482933] 
[   14.483004] The buggy address belongs to the physical page:
[   14.483173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.483407] flags: 0x200000000000000(node=0|zone=2)
[   14.483640] page_type: f5(slab)
[   14.483825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.484188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.484554] page dumped because: kasan: bad access detected
[   14.484814] 
[   14.484932] Memory state around the buggy address:
[   14.485087]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.485310]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.485627] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.486104]                                      ^
[   14.486268]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.486589]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.486801] ==================================================================
[   13.473021] ==================================================================
[   13.473274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.474303] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.474895] 
[   13.474991] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.475141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.475157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.475178] Call Trace:
[   13.475193]  <TASK>
[   13.475209]  dump_stack_lvl+0x73/0xb0
[   13.475236]  print_report+0xd1/0x610
[   13.475258]  ? __virt_addr_valid+0x1db/0x2d0
[   13.475280]  ? kasan_atomics_helper+0x3df/0x5450
[   13.475302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.475325]  ? kasan_atomics_helper+0x3df/0x5450
[   13.475348]  kasan_report+0x141/0x180
[   13.475371]  ? kasan_atomics_helper+0x3df/0x5450
[   13.475398]  kasan_check_range+0x10c/0x1c0
[   13.475419]  __kasan_check_read+0x15/0x20
[   13.475438]  kasan_atomics_helper+0x3df/0x5450
[   13.475463]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.475486]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.475507]  ? ret_from_fork_asm+0x1a/0x30
[   13.475528]  ? kasan_atomics+0x152/0x310
[   13.475552]  kasan_atomics+0x1dc/0x310
[   13.475571]  ? __pfx_kasan_atomics+0x10/0x10
[   13.475592]  ? __pfx_read_tsc+0x10/0x10
[   13.475612]  ? ktime_get_ts64+0x86/0x230
[   13.475636]  kunit_try_run_case+0x1a5/0x480
[   13.475657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.475676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.475701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.475726]  ? __kthread_parkme+0x82/0x180
[   13.475771]  ? preempt_count_sub+0x50/0x80
[   13.475797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.475818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.475842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.475866]  kthread+0x337/0x6f0
[   13.475895]  ? trace_preempt_on+0x20/0xc0
[   13.475919]  ? __pfx_kthread+0x10/0x10
[   13.475937]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.475959]  ? calculate_sigpending+0x7b/0xa0
[   13.475981]  ? __pfx_kthread+0x10/0x10
[   13.475999]  ret_from_fork+0x41/0x80
[   13.476020]  ? __pfx_kthread+0x10/0x10
[   13.476039]  ret_from_fork_asm+0x1a/0x30
[   13.476069]  </TASK>
[   13.476080] 
[   13.488093] Allocated by task 284:
[   13.488271]  kasan_save_stack+0x45/0x70
[   13.488426]  kasan_save_track+0x18/0x40
[   13.488850]  kasan_save_alloc_info+0x3b/0x50
[   13.489177]  __kasan_kmalloc+0xb7/0xc0
[   13.489457]  __kmalloc_cache_noprof+0x189/0x420
[   13.489738]  kasan_atomics+0x95/0x310
[   13.489895]  kunit_try_run_case+0x1a5/0x480
[   13.490149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.490500]  kthread+0x337/0x6f0
[   13.490665]  ret_from_fork+0x41/0x80
[   13.490812]  ret_from_fork_asm+0x1a/0x30
[   13.491367] 
[   13.491569] The buggy address belongs to the object at ffff888103a31d80
[   13.491569]  which belongs to the cache kmalloc-64 of size 64
[   13.492452] The buggy address is located 0 bytes to the right of
[   13.492452]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.493374] 
[   13.493457] The buggy address belongs to the physical page:
[   13.493728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.494362] flags: 0x200000000000000(node=0|zone=2)
[   13.494686] page_type: f5(slab)
[   13.495048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.495385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.495949] page dumped because: kasan: bad access detected
[   13.496190] 
[   13.496275] Memory state around the buggy address:
[   13.496631]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.497106]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.497536] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.498134]                                      ^
[   13.498314]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.498914]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.499252] ==================================================================
[   13.734626] ==================================================================
[   13.734923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   13.735217] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.735553] 
[   13.735688] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.735733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.735745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.735766] Call Trace:
[   13.735779]  <TASK>
[   13.735813]  dump_stack_lvl+0x73/0xb0
[   13.735838]  print_report+0xd1/0x610
[   13.735862]  ? __virt_addr_valid+0x1db/0x2d0
[   13.735892]  ? kasan_atomics_helper+0x992/0x5450
[   13.735915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.735939]  ? kasan_atomics_helper+0x992/0x5450
[   13.735964]  kasan_report+0x141/0x180
[   13.735988]  ? kasan_atomics_helper+0x992/0x5450
[   13.736016]  kasan_check_range+0x10c/0x1c0
[   13.736048]  __kasan_check_write+0x18/0x20
[   13.736070]  kasan_atomics_helper+0x992/0x5450
[   13.736095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.736130]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.736152]  ? ret_from_fork_asm+0x1a/0x30
[   13.736174]  ? kasan_atomics+0x152/0x310
[   13.736200]  kasan_atomics+0x1dc/0x310
[   13.736221]  ? __pfx_kasan_atomics+0x10/0x10
[   13.736244]  ? __pfx_read_tsc+0x10/0x10
[   13.736264]  ? ktime_get_ts64+0x86/0x230
[   13.736290]  kunit_try_run_case+0x1a5/0x480
[   13.736313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.736333]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.736359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.736385]  ? __kthread_parkme+0x82/0x180
[   13.736408]  ? preempt_count_sub+0x50/0x80
[   13.736434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.736456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.736481]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.736507]  kthread+0x337/0x6f0
[   13.736525]  ? trace_preempt_on+0x20/0xc0
[   13.736550]  ? __pfx_kthread+0x10/0x10
[   13.736569]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.736593]  ? calculate_sigpending+0x7b/0xa0
[   13.736616]  ? __pfx_kthread+0x10/0x10
[   13.736645]  ret_from_fork+0x41/0x80
[   13.736667]  ? __pfx_kthread+0x10/0x10
[   13.736686]  ret_from_fork_asm+0x1a/0x30
[   13.736728]  </TASK>
[   13.736739] 
[   13.745598] Allocated by task 284:
[   13.745772]  kasan_save_stack+0x45/0x70
[   13.745978]  kasan_save_track+0x18/0x40
[   13.746161]  kasan_save_alloc_info+0x3b/0x50
[   13.746352]  __kasan_kmalloc+0xb7/0xc0
[   13.746520]  __kmalloc_cache_noprof+0x189/0x420
[   13.746724]  kasan_atomics+0x95/0x310
[   13.747482]  kunit_try_run_case+0x1a5/0x480
[   13.747702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.748217]  kthread+0x337/0x6f0
[   13.748659]  ret_from_fork+0x41/0x80
[   13.749060]  ret_from_fork_asm+0x1a/0x30
[   13.749397] 
[   13.749619] The buggy address belongs to the object at ffff888103a31d80
[   13.749619]  which belongs to the cache kmalloc-64 of size 64
[   13.750497] The buggy address is located 0 bytes to the right of
[   13.750497]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.751447] 
[   13.751562] The buggy address belongs to the physical page:
[   13.751803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.752139] flags: 0x200000000000000(node=0|zone=2)
[   13.752362] page_type: f5(slab)
[   13.752514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.753153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.753628] page dumped because: kasan: bad access detected
[   13.754267] 
[   13.754512] Memory state around the buggy address:
[   13.754747]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.755402]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.755894] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.756400]                                      ^
[   13.756829]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.757301]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.757605] ==================================================================
[   13.861183] ==================================================================
[   13.861599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   13.861951] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.862172] 
[   13.862250] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.862304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.862316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.862336] Call Trace:
[   13.862349]  <TASK>
[   13.862363]  dump_stack_lvl+0x73/0xb0
[   13.862387]  print_report+0xd1/0x610
[   13.862409]  ? __virt_addr_valid+0x1db/0x2d0
[   13.862442]  ? kasan_atomics_helper+0xd47/0x5450
[   13.862464]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.862487]  ? kasan_atomics_helper+0xd47/0x5450
[   13.862521]  kasan_report+0x141/0x180
[   13.862544]  ? kasan_atomics_helper+0xd47/0x5450
[   13.862571]  kasan_check_range+0x10c/0x1c0
[   13.862592]  __kasan_check_write+0x18/0x20
[   13.862612]  kasan_atomics_helper+0xd47/0x5450
[   13.862636]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.862658]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.862679]  ? ret_from_fork_asm+0x1a/0x30
[   13.862700]  ? kasan_atomics+0x152/0x310
[   13.862723]  kasan_atomics+0x1dc/0x310
[   13.862743]  ? __pfx_kasan_atomics+0x10/0x10
[   13.862774]  ? __pfx_read_tsc+0x10/0x10
[   13.862794]  ? ktime_get_ts64+0x86/0x230
[   13.862818]  kunit_try_run_case+0x1a5/0x480
[   13.862850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.862869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.862902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.862926]  ? __kthread_parkme+0x82/0x180
[   13.862948]  ? preempt_count_sub+0x50/0x80
[   13.862972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.862993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.863017]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.863041]  kthread+0x337/0x6f0
[   13.863058]  ? trace_preempt_on+0x20/0xc0
[   13.863081]  ? __pfx_kthread+0x10/0x10
[   13.863099]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.863121]  ? calculate_sigpending+0x7b/0xa0
[   13.863142]  ? __pfx_kthread+0x10/0x10
[   13.863161]  ret_from_fork+0x41/0x80
[   13.863181]  ? __pfx_kthread+0x10/0x10
[   13.863199]  ret_from_fork_asm+0x1a/0x30
[   13.863240]  </TASK>
[   13.863250] 
[   13.871293] Allocated by task 284:
[   13.871417]  kasan_save_stack+0x45/0x70
[   13.871613]  kasan_save_track+0x18/0x40
[   13.871840]  kasan_save_alloc_info+0x3b/0x50
[   13.872034]  __kasan_kmalloc+0xb7/0xc0
[   13.872166]  __kmalloc_cache_noprof+0x189/0x420
[   13.872317]  kasan_atomics+0x95/0x310
[   13.872525]  kunit_try_run_case+0x1a5/0x480
[   13.872731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.873032]  kthread+0x337/0x6f0
[   13.873244]  ret_from_fork+0x41/0x80
[   13.873415]  ret_from_fork_asm+0x1a/0x30
[   13.873650] 
[   13.873744] The buggy address belongs to the object at ffff888103a31d80
[   13.873744]  which belongs to the cache kmalloc-64 of size 64
[   13.874230] The buggy address is located 0 bytes to the right of
[   13.874230]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.874593] 
[   13.874665] The buggy address belongs to the physical page:
[   13.874869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.875253] flags: 0x200000000000000(node=0|zone=2)
[   13.875485] page_type: f5(slab)
[   13.875651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.876230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.876465] page dumped because: kasan: bad access detected
[   13.876634] 
[   13.876704] Memory state around the buggy address:
[   13.876976]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.877330]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.877673] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.878050]                                      ^
[   13.878272]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.878540]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.878892] ==================================================================
[   14.073082] ==================================================================
[   14.073392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.073672] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.074102] 
[   14.074187] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.074229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.074241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.074262] Call Trace:
[   14.074274]  <TASK>
[   14.074288]  dump_stack_lvl+0x73/0xb0
[   14.074312]  print_report+0xd1/0x610
[   14.074335]  ? __virt_addr_valid+0x1db/0x2d0
[   14.074356]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.074378]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.074401]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.074423]  kasan_report+0x141/0x180
[   14.074447]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.074474]  __asan_report_load4_noabort+0x18/0x20
[   14.074495]  kasan_atomics_helper+0x49e8/0x5450
[   14.074518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.074541]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.074562]  ? ret_from_fork_asm+0x1a/0x30
[   14.074583]  ? kasan_atomics+0x152/0x310
[   14.074606]  kasan_atomics+0x1dc/0x310
[   14.074626]  ? __pfx_kasan_atomics+0x10/0x10
[   14.074647]  ? __pfx_read_tsc+0x10/0x10
[   14.074667]  ? ktime_get_ts64+0x86/0x230
[   14.074691]  kunit_try_run_case+0x1a5/0x480
[   14.074712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.074731]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.074755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.074779]  ? __kthread_parkme+0x82/0x180
[   14.074801]  ? preempt_count_sub+0x50/0x80
[   14.074826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.074847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.074870]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.074906]  kthread+0x337/0x6f0
[   14.074924]  ? trace_preempt_on+0x20/0xc0
[   14.074947]  ? __pfx_kthread+0x10/0x10
[   14.074965]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.074987]  ? calculate_sigpending+0x7b/0xa0
[   14.075009]  ? __pfx_kthread+0x10/0x10
[   14.075028]  ret_from_fork+0x41/0x80
[   14.075049]  ? __pfx_kthread+0x10/0x10
[   14.075068]  ret_from_fork_asm+0x1a/0x30
[   14.075098]  </TASK>
[   14.075108] 
[   14.082524] Allocated by task 284:
[   14.082664]  kasan_save_stack+0x45/0x70
[   14.082912]  kasan_save_track+0x18/0x40
[   14.083067]  kasan_save_alloc_info+0x3b/0x50
[   14.083215]  __kasan_kmalloc+0xb7/0xc0
[   14.083350]  __kmalloc_cache_noprof+0x189/0x420
[   14.083560]  kasan_atomics+0x95/0x310
[   14.083749]  kunit_try_run_case+0x1a5/0x480
[   14.084121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.084359]  kthread+0x337/0x6f0
[   14.084499]  ret_from_fork+0x41/0x80
[   14.084667]  ret_from_fork_asm+0x1a/0x30
[   14.084853] 
[   14.084944] The buggy address belongs to the object at ffff888103a31d80
[   14.084944]  which belongs to the cache kmalloc-64 of size 64
[   14.085418] The buggy address is located 0 bytes to the right of
[   14.085418]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.085938] 
[   14.086033] The buggy address belongs to the physical page:
[   14.086249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.086562] flags: 0x200000000000000(node=0|zone=2)
[   14.086778] page_type: f5(slab)
[   14.086941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.087258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.087550] page dumped because: kasan: bad access detected
[   14.087779] 
[   14.087913] Memory state around the buggy address:
[   14.088078]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.088291]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.088502] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.088711]                                      ^
[   14.088902]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.089230]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.089815] ==================================================================
[   14.252870] ==================================================================
[   14.253225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.253489] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.253870] 
[   14.253999] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.254041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.254053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.254073] Call Trace:
[   14.254088]  <TASK>
[   14.254102]  dump_stack_lvl+0x73/0xb0
[   14.254126]  print_report+0xd1/0x610
[   14.254149]  ? __virt_addr_valid+0x1db/0x2d0
[   14.254170]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.254192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.254216]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.254239]  kasan_report+0x141/0x180
[   14.254262]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.254290]  kasan_check_range+0x10c/0x1c0
[   14.254311]  __kasan_check_write+0x18/0x20
[   14.254331]  kasan_atomics_helper+0x16e7/0x5450
[   14.254355]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.254377]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.254398]  ? ret_from_fork_asm+0x1a/0x30
[   14.254420]  ? kasan_atomics+0x152/0x310
[   14.254443]  kasan_atomics+0x1dc/0x310
[   14.254463]  ? __pfx_kasan_atomics+0x10/0x10
[   14.254485]  ? __pfx_read_tsc+0x10/0x10
[   14.254504]  ? ktime_get_ts64+0x86/0x230
[   14.254529]  kunit_try_run_case+0x1a5/0x480
[   14.254551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.254570]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.254594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.254619]  ? __kthread_parkme+0x82/0x180
[   14.254641]  ? preempt_count_sub+0x50/0x80
[   14.254666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.254687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.254710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.254733]  kthread+0x337/0x6f0
[   14.254749]  ? trace_preempt_on+0x20/0xc0
[   14.254772]  ? __pfx_kthread+0x10/0x10
[   14.254791]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.254829]  ? calculate_sigpending+0x7b/0xa0
[   14.254851]  ? __pfx_kthread+0x10/0x10
[   14.254869]  ret_from_fork+0x41/0x80
[   14.254899]  ? __pfx_kthread+0x10/0x10
[   14.254918]  ret_from_fork_asm+0x1a/0x30
[   14.254948]  </TASK>
[   14.254959] 
[   14.262498] Allocated by task 284:
[   14.262679]  kasan_save_stack+0x45/0x70
[   14.262902]  kasan_save_track+0x18/0x40
[   14.263040]  kasan_save_alloc_info+0x3b/0x50
[   14.263243]  __kasan_kmalloc+0xb7/0xc0
[   14.263416]  __kmalloc_cache_noprof+0x189/0x420
[   14.263625]  kasan_atomics+0x95/0x310
[   14.263785]  kunit_try_run_case+0x1a5/0x480
[   14.264001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.264201]  kthread+0x337/0x6f0
[   14.264370]  ret_from_fork+0x41/0x80
[   14.264520]  ret_from_fork_asm+0x1a/0x30
[   14.264718] 
[   14.264798] The buggy address belongs to the object at ffff888103a31d80
[   14.264798]  which belongs to the cache kmalloc-64 of size 64
[   14.265169] The buggy address is located 0 bytes to the right of
[   14.265169]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.265527] 
[   14.265599] The buggy address belongs to the physical page:
[   14.265769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.266199] flags: 0x200000000000000(node=0|zone=2)
[   14.266430] page_type: f5(slab)
[   14.266594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.266963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.267294] page dumped because: kasan: bad access detected
[   14.267540] 
[   14.267619] Memory state around the buggy address:
[   14.267772]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.268016]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.268232] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.268533]                                      ^
[   14.268781]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.269130]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.269452] ==================================================================
[   14.309761] ==================================================================
[   14.310145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.310578] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.311118] 
[   14.311226] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.311270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.311283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.311303] Call Trace:
[   14.311319]  <TASK>
[   14.311334]  dump_stack_lvl+0x73/0xb0
[   14.311359]  print_report+0xd1/0x610
[   14.311381]  ? __virt_addr_valid+0x1db/0x2d0
[   14.311402]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.311424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.311447]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.311470]  kasan_report+0x141/0x180
[   14.311492]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.311520]  kasan_check_range+0x10c/0x1c0
[   14.311540]  __kasan_check_write+0x18/0x20
[   14.311560]  kasan_atomics_helper+0x18b1/0x5450
[   14.311584]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.311607]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.311628]  ? ret_from_fork_asm+0x1a/0x30
[   14.311650]  ? kasan_atomics+0x152/0x310
[   14.311673]  kasan_atomics+0x1dc/0x310
[   14.311692]  ? __pfx_kasan_atomics+0x10/0x10
[   14.311714]  ? __pfx_read_tsc+0x10/0x10
[   14.311733]  ? ktime_get_ts64+0x86/0x230
[   14.311757]  kunit_try_run_case+0x1a5/0x480
[   14.311778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.311991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.312026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.312052]  ? __kthread_parkme+0x82/0x180
[   14.312074]  ? preempt_count_sub+0x50/0x80
[   14.312099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.312120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.312179]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.312203]  kthread+0x337/0x6f0
[   14.312221]  ? trace_preempt_on+0x20/0xc0
[   14.312245]  ? __pfx_kthread+0x10/0x10
[   14.312263]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.312286]  ? calculate_sigpending+0x7b/0xa0
[   14.312307]  ? __pfx_kthread+0x10/0x10
[   14.312327]  ret_from_fork+0x41/0x80
[   14.312347]  ? __pfx_kthread+0x10/0x10
[   14.312365]  ret_from_fork_asm+0x1a/0x30
[   14.312396]  </TASK>
[   14.312406] 
[   14.324065] Allocated by task 284:
[   14.324338]  kasan_save_stack+0x45/0x70
[   14.324539]  kasan_save_track+0x18/0x40
[   14.324714]  kasan_save_alloc_info+0x3b/0x50
[   14.325144]  __kasan_kmalloc+0xb7/0xc0
[   14.325514]  __kmalloc_cache_noprof+0x189/0x420
[   14.325859]  kasan_atomics+0x95/0x310
[   14.326048]  kunit_try_run_case+0x1a5/0x480
[   14.326239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.326474]  kthread+0x337/0x6f0
[   14.326627]  ret_from_fork+0x41/0x80
[   14.327107]  ret_from_fork_asm+0x1a/0x30
[   14.327382] 
[   14.327609] The buggy address belongs to the object at ffff888103a31d80
[   14.327609]  which belongs to the cache kmalloc-64 of size 64
[   14.328383] The buggy address is located 0 bytes to the right of
[   14.328383]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.329088] 
[   14.329191] The buggy address belongs to the physical page:
[   14.329427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.329754] flags: 0x200000000000000(node=0|zone=2)
[   14.330335] page_type: f5(slab)
[   14.330634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.331296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.331719] page dumped because: kasan: bad access detected
[   14.332159] 
[   14.332258] Memory state around the buggy address:
[   14.332702]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.333232]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.333658] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.334174]                                      ^
[   14.334515]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.334999]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.335434] ==================================================================
[   14.337001] ==================================================================
[   14.337271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.337509] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.337760] 
[   14.337978] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.338047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.338059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.338079] Call Trace:
[   14.338094]  <TASK>
[   14.338110]  dump_stack_lvl+0x73/0xb0
[   14.338135]  print_report+0xd1/0x610
[   14.338158]  ? __virt_addr_valid+0x1db/0x2d0
[   14.338179]  ? kasan_atomics_helper+0x194a/0x5450
[   14.338200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.338223]  ? kasan_atomics_helper+0x194a/0x5450
[   14.338245]  kasan_report+0x141/0x180
[   14.338268]  ? kasan_atomics_helper+0x194a/0x5450
[   14.338295]  kasan_check_range+0x10c/0x1c0
[   14.338316]  __kasan_check_write+0x18/0x20
[   14.338335]  kasan_atomics_helper+0x194a/0x5450
[   14.338359]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.338381]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.338402]  ? ret_from_fork_asm+0x1a/0x30
[   14.338423]  ? kasan_atomics+0x152/0x310
[   14.338446]  kasan_atomics+0x1dc/0x310
[   14.338465]  ? __pfx_kasan_atomics+0x10/0x10
[   14.338486]  ? __pfx_read_tsc+0x10/0x10
[   14.338505]  ? ktime_get_ts64+0x86/0x230
[   14.338530]  kunit_try_run_case+0x1a5/0x480
[   14.338551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.338569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.338594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.338618]  ? __kthread_parkme+0x82/0x180
[   14.338640]  ? preempt_count_sub+0x50/0x80
[   14.338665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.338686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.338710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.338733]  kthread+0x337/0x6f0
[   14.338751]  ? trace_preempt_on+0x20/0xc0
[   14.338775]  ? __pfx_kthread+0x10/0x10
[   14.338794]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.338816]  ? calculate_sigpending+0x7b/0xa0
[   14.338838]  ? __pfx_kthread+0x10/0x10
[   14.338857]  ret_from_fork+0x41/0x80
[   14.338887]  ? __pfx_kthread+0x10/0x10
[   14.338905]  ret_from_fork_asm+0x1a/0x30
[   14.338935]  </TASK>
[   14.338946] 
[   14.350196] Allocated by task 284:
[   14.350467]  kasan_save_stack+0x45/0x70
[   14.350662]  kasan_save_track+0x18/0x40
[   14.350839]  kasan_save_alloc_info+0x3b/0x50
[   14.351011]  __kasan_kmalloc+0xb7/0xc0
[   14.351233]  __kmalloc_cache_noprof+0x189/0x420
[   14.351488]  kasan_atomics+0x95/0x310
[   14.351635]  kunit_try_run_case+0x1a5/0x480
[   14.351771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.351946]  kthread+0x337/0x6f0
[   14.352295]  ret_from_fork+0x41/0x80
[   14.352472]  ret_from_fork_asm+0x1a/0x30
[   14.352644] 
[   14.352712] The buggy address belongs to the object at ffff888103a31d80
[   14.352712]  which belongs to the cache kmalloc-64 of size 64
[   14.353359] The buggy address is located 0 bytes to the right of
[   14.353359]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.353822] 
[   14.353926] The buggy address belongs to the physical page:
[   14.354177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.354469] flags: 0x200000000000000(node=0|zone=2)
[   14.354697] page_type: f5(slab)
[   14.354894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.355189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.355467] page dumped because: kasan: bad access detected
[   14.355679] 
[   14.355757] Memory state around the buggy address:
[   14.355981]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.356258]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.356514] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.356790]                                      ^
[   14.356989]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.357231]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.357434] ==================================================================
[   13.758766] ==================================================================
[   13.759500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   13.760209] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.760602] 
[   13.760826] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.760995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.761014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.761035] Call Trace:
[   13.761051]  <TASK>
[   13.761081]  dump_stack_lvl+0x73/0xb0
[   13.761111]  print_report+0xd1/0x610
[   13.761147]  ? __virt_addr_valid+0x1db/0x2d0
[   13.761170]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.761194]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.761219]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.761243]  kasan_report+0x141/0x180
[   13.761267]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.761295]  kasan_check_range+0x10c/0x1c0
[   13.761317]  __kasan_check_write+0x18/0x20
[   13.761339]  kasan_atomics_helper+0xa2b/0x5450
[   13.761363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.761388]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.761410]  ? ret_from_fork_asm+0x1a/0x30
[   13.761433]  ? kasan_atomics+0x152/0x310
[   13.761458]  kasan_atomics+0x1dc/0x310
[   13.761479]  ? __pfx_kasan_atomics+0x10/0x10
[   13.761501]  ? __pfx_read_tsc+0x10/0x10
[   13.761522]  ? ktime_get_ts64+0x86/0x230
[   13.761548]  kunit_try_run_case+0x1a5/0x480
[   13.761570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.761591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.761618]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.761644]  ? __kthread_parkme+0x82/0x180
[   13.761668]  ? preempt_count_sub+0x50/0x80
[   13.761694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.761716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.761742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.761767]  kthread+0x337/0x6f0
[   13.761786]  ? trace_preempt_on+0x20/0xc0
[   13.761837]  ? __pfx_kthread+0x10/0x10
[   13.761859]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.761892]  ? calculate_sigpending+0x7b/0xa0
[   13.761915]  ? __pfx_kthread+0x10/0x10
[   13.761935]  ret_from_fork+0x41/0x80
[   13.761957]  ? __pfx_kthread+0x10/0x10
[   13.761976]  ret_from_fork_asm+0x1a/0x30
[   13.762008]  </TASK>
[   13.762020] 
[   13.773855] Allocated by task 284:
[   13.774243]  kasan_save_stack+0x45/0x70
[   13.774569]  kasan_save_track+0x18/0x40
[   13.774983]  kasan_save_alloc_info+0x3b/0x50
[   13.775185]  __kasan_kmalloc+0xb7/0xc0
[   13.775359]  __kmalloc_cache_noprof+0x189/0x420
[   13.775560]  kasan_atomics+0x95/0x310
[   13.775730]  kunit_try_run_case+0x1a5/0x480
[   13.776203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.776667]  kthread+0x337/0x6f0
[   13.777035]  ret_from_fork+0x41/0x80
[   13.777229]  ret_from_fork_asm+0x1a/0x30
[   13.777415] 
[   13.777509] The buggy address belongs to the object at ffff888103a31d80
[   13.777509]  which belongs to the cache kmalloc-64 of size 64
[   13.778286] The buggy address is located 0 bytes to the right of
[   13.778286]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.778788] 
[   13.779268] The buggy address belongs to the physical page:
[   13.779711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.780274] flags: 0x200000000000000(node=0|zone=2)
[   13.780705] page_type: f5(slab)
[   13.781032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.781599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.782055] page dumped because: kasan: bad access detected
[   13.782518] 
[   13.782621] Memory state around the buggy address:
[   13.783055]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.783429]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.783728] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.784500]                                      ^
[   13.784788]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.785096]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.785391] ==================================================================
[   14.357840] ==================================================================
[   14.358187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.358515] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.359089] 
[   14.359170] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.359212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.359225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.359244] Call Trace:
[   14.359258]  <TASK>
[   14.359273]  dump_stack_lvl+0x73/0xb0
[   14.359297]  print_report+0xd1/0x610
[   14.359320]  ? __virt_addr_valid+0x1db/0x2d0
[   14.359342]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.359363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.359386]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.359409]  kasan_report+0x141/0x180
[   14.359432]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.359459]  kasan_check_range+0x10c/0x1c0
[   14.359479]  __kasan_check_write+0x18/0x20
[   14.359500]  kasan_atomics_helper+0x19e3/0x5450
[   14.359523]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.359546]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.359567]  ? ret_from_fork_asm+0x1a/0x30
[   14.359588]  ? kasan_atomics+0x152/0x310
[   14.359612]  kasan_atomics+0x1dc/0x310
[   14.359632]  ? __pfx_kasan_atomics+0x10/0x10
[   14.359654]  ? __pfx_read_tsc+0x10/0x10
[   14.359673]  ? ktime_get_ts64+0x86/0x230
[   14.359699]  kunit_try_run_case+0x1a5/0x480
[   14.359721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.359740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.359765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.359789]  ? __kthread_parkme+0x82/0x180
[   14.359811]  ? preempt_count_sub+0x50/0x80
[   14.359836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.359857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.359894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.359918]  kthread+0x337/0x6f0
[   14.359937]  ? trace_preempt_on+0x20/0xc0
[   14.359961]  ? __pfx_kthread+0x10/0x10
[   14.359980]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.360003]  ? calculate_sigpending+0x7b/0xa0
[   14.360024]  ? __pfx_kthread+0x10/0x10
[   14.360042]  ret_from_fork+0x41/0x80
[   14.360063]  ? __pfx_kthread+0x10/0x10
[   14.360081]  ret_from_fork_asm+0x1a/0x30
[   14.360111]  </TASK>
[   14.360122] 
[   14.368379] Allocated by task 284:
[   14.368540]  kasan_save_stack+0x45/0x70
[   14.368685]  kasan_save_track+0x18/0x40
[   14.368821]  kasan_save_alloc_info+0x3b/0x50
[   14.369046]  __kasan_kmalloc+0xb7/0xc0
[   14.369240]  __kmalloc_cache_noprof+0x189/0x420
[   14.369456]  kasan_atomics+0x95/0x310
[   14.369637]  kunit_try_run_case+0x1a5/0x480
[   14.369858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.370052]  kthread+0x337/0x6f0
[   14.370170]  ret_from_fork+0x41/0x80
[   14.370299]  ret_from_fork_asm+0x1a/0x30
[   14.370483] 
[   14.370579] The buggy address belongs to the object at ffff888103a31d80
[   14.370579]  which belongs to the cache kmalloc-64 of size 64
[   14.371341] The buggy address is located 0 bytes to the right of
[   14.371341]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.371903] 
[   14.371977] The buggy address belongs to the physical page:
[   14.372222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.372530] flags: 0x200000000000000(node=0|zone=2)
[   14.372742] page_type: f5(slab)
[   14.372898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.373217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.373469] page dumped because: kasan: bad access detected
[   14.373716] 
[   14.373810] Memory state around the buggy address:
[   14.373974]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.374189]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.374403] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.374713]                                      ^
[   14.374939]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.375244]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.375511] ==================================================================
[   14.445547] ==================================================================
[   14.446275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.446729] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.447331] 
[   14.447443] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.447572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.447589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.447609] Call Trace:
[   14.447623]  <TASK>
[   14.447638]  dump_stack_lvl+0x73/0xb0
[   14.447665]  print_report+0xd1/0x610
[   14.447689]  ? __virt_addr_valid+0x1db/0x2d0
[   14.447710]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.447731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.447754]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.447777]  kasan_report+0x141/0x180
[   14.447799]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.447827]  __asan_report_load8_noabort+0x18/0x20
[   14.447848]  kasan_atomics_helper+0x4f30/0x5450
[   14.447873]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.447909]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.447930]  ? ret_from_fork_asm+0x1a/0x30
[   14.447951]  ? kasan_atomics+0x152/0x310
[   14.447974]  kasan_atomics+0x1dc/0x310
[   14.447994]  ? __pfx_kasan_atomics+0x10/0x10
[   14.448015]  ? __pfx_read_tsc+0x10/0x10
[   14.448034]  ? ktime_get_ts64+0x86/0x230
[   14.448059]  kunit_try_run_case+0x1a5/0x480
[   14.448080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.448099]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.448123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.448146]  ? __kthread_parkme+0x82/0x180
[   14.448168]  ? preempt_count_sub+0x50/0x80
[   14.448193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.448213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.448236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.448260]  kthread+0x337/0x6f0
[   14.448277]  ? trace_preempt_on+0x20/0xc0
[   14.448300]  ? __pfx_kthread+0x10/0x10
[   14.448317]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.448340]  ? calculate_sigpending+0x7b/0xa0
[   14.448361]  ? __pfx_kthread+0x10/0x10
[   14.448380]  ret_from_fork+0x41/0x80
[   14.448400]  ? __pfx_kthread+0x10/0x10
[   14.448418]  ret_from_fork_asm+0x1a/0x30
[   14.448448]  </TASK>
[   14.448459] 
[   14.458711] Allocated by task 284:
[   14.459111]  kasan_save_stack+0x45/0x70
[   14.459414]  kasan_save_track+0x18/0x40
[   14.459571]  kasan_save_alloc_info+0x3b/0x50
[   14.459927]  __kasan_kmalloc+0xb7/0xc0
[   14.460220]  __kmalloc_cache_noprof+0x189/0x420
[   14.460518]  kasan_atomics+0x95/0x310
[   14.460811]  kunit_try_run_case+0x1a5/0x480
[   14.461030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.461365]  kthread+0x337/0x6f0
[   14.461538]  ret_from_fork+0x41/0x80
[   14.461708]  ret_from_fork_asm+0x1a/0x30
[   14.462113] 
[   14.462363] The buggy address belongs to the object at ffff888103a31d80
[   14.462363]  which belongs to the cache kmalloc-64 of size 64
[   14.462977] The buggy address is located 0 bytes to the right of
[   14.462977]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.463527] 
[   14.463767] The buggy address belongs to the physical page:
[   14.464116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.464503] flags: 0x200000000000000(node=0|zone=2)
[   14.464829] page_type: f5(slab)
[   14.464981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.465315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.465637] page dumped because: kasan: bad access detected
[   14.465891] 
[   14.466258] Memory state around the buggy address:
[   14.466454]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.466875]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.467276] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.467657]                                      ^
[   14.468006]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.468261]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.468571] ==================================================================
[   14.654297] ==================================================================
[   14.654639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   14.655049] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.655725] 
[   14.655837] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.655965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.655977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.655997] Call Trace:
[   14.656011]  <TASK>
[   14.656126]  dump_stack_lvl+0x73/0xb0
[   14.656157]  print_report+0xd1/0x610
[   14.656180]  ? __virt_addr_valid+0x1db/0x2d0
[   14.656202]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.656223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.656247]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.656270]  kasan_report+0x141/0x180
[   14.656293]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.656321]  __asan_report_load8_noabort+0x18/0x20
[   14.656343]  kasan_atomics_helper+0x4fb2/0x5450
[   14.656366]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.656389]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.656410]  ? ret_from_fork_asm+0x1a/0x30
[   14.656431]  ? kasan_atomics+0x152/0x310
[   14.656455]  kasan_atomics+0x1dc/0x310
[   14.656474]  ? __pfx_kasan_atomics+0x10/0x10
[   14.656495]  ? __pfx_read_tsc+0x10/0x10
[   14.656515]  ? ktime_get_ts64+0x86/0x230
[   14.656539]  kunit_try_run_case+0x1a5/0x480
[   14.656561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.656579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.656604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.656628]  ? __kthread_parkme+0x82/0x180
[   14.656650]  ? preempt_count_sub+0x50/0x80
[   14.656675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.656696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.656719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.656743]  kthread+0x337/0x6f0
[   14.656760]  ? trace_preempt_on+0x20/0xc0
[   14.656783]  ? __pfx_kthread+0x10/0x10
[   14.656801]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.656823]  ? calculate_sigpending+0x7b/0xa0
[   14.656845]  ? __pfx_kthread+0x10/0x10
[   14.656863]  ret_from_fork+0x41/0x80
[   14.656895]  ? __pfx_kthread+0x10/0x10
[   14.656914]  ret_from_fork_asm+0x1a/0x30
[   14.656944]  </TASK>
[   14.656955] 
[   14.666615] Allocated by task 284:
[   14.666966]  kasan_save_stack+0x45/0x70
[   14.667150]  kasan_save_track+0x18/0x40
[   14.667324]  kasan_save_alloc_info+0x3b/0x50
[   14.667500]  __kasan_kmalloc+0xb7/0xc0
[   14.667671]  __kmalloc_cache_noprof+0x189/0x420
[   14.667875]  kasan_atomics+0x95/0x310
[   14.668408]  kunit_try_run_case+0x1a5/0x480
[   14.668563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.668904]  kthread+0x337/0x6f0
[   14.669058]  ret_from_fork+0x41/0x80
[   14.669308]  ret_from_fork_asm+0x1a/0x30
[   14.669612] 
[   14.669706] The buggy address belongs to the object at ffff888103a31d80
[   14.669706]  which belongs to the cache kmalloc-64 of size 64
[   14.670398] The buggy address is located 0 bytes to the right of
[   14.670398]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.670979] 
[   14.671065] The buggy address belongs to the physical page:
[   14.671295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.671614] flags: 0x200000000000000(node=0|zone=2)
[   14.671827] page_type: f5(slab)
[   14.672306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.672587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.673010] page dumped because: kasan: bad access detected
[   14.673324] 
[   14.673398] Memory state around the buggy address:
[   14.673627]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.674223]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.674606] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.674857]                                      ^
[   14.675290]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.675662]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.676066] ==================================================================
[   13.994392] ==================================================================
[   13.994772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   13.995093] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.995349] 
[   13.995431] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.995471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.995483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.995502] Call Trace:
[   13.995515]  <TASK>
[   13.995529]  dump_stack_lvl+0x73/0xb0
[   13.995552]  print_report+0xd1/0x610
[   13.995574]  ? __virt_addr_valid+0x1db/0x2d0
[   13.995595]  ? kasan_atomics_helper+0x4a1c/0x5450
[   13.995617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.995640]  ? kasan_atomics_helper+0x4a1c/0x5450
[   13.995662]  kasan_report+0x141/0x180
[   13.995686]  ? kasan_atomics_helper+0x4a1c/0x5450
[   13.995724]  __asan_report_load4_noabort+0x18/0x20
[   13.995746]  kasan_atomics_helper+0x4a1c/0x5450
[   13.995769]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.995803]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.995833]  ? ret_from_fork_asm+0x1a/0x30
[   13.995854]  ? kasan_atomics+0x152/0x310
[   13.995891]  kasan_atomics+0x1dc/0x310
[   13.995920]  ? __pfx_kasan_atomics+0x10/0x10
[   13.995942]  ? __pfx_read_tsc+0x10/0x10
[   13.995961]  ? ktime_get_ts64+0x86/0x230
[   13.995996]  kunit_try_run_case+0x1a5/0x480
[   13.996017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.996036]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.996061]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.996085]  ? __kthread_parkme+0x82/0x180
[   13.996107]  ? preempt_count_sub+0x50/0x80
[   13.996131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.996152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.996175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.996199]  kthread+0x337/0x6f0
[   13.996216]  ? trace_preempt_on+0x20/0xc0
[   13.996239]  ? __pfx_kthread+0x10/0x10
[   13.996258]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.996289]  ? calculate_sigpending+0x7b/0xa0
[   13.996310]  ? __pfx_kthread+0x10/0x10
[   13.996329]  ret_from_fork+0x41/0x80
[   13.996360]  ? __pfx_kthread+0x10/0x10
[   13.996379]  ret_from_fork_asm+0x1a/0x30
[   13.996409]  </TASK>
[   13.996420] 
[   14.004189] Allocated by task 284:
[   14.004373]  kasan_save_stack+0x45/0x70
[   14.004558]  kasan_save_track+0x18/0x40
[   14.004694]  kasan_save_alloc_info+0x3b/0x50
[   14.004838]  __kasan_kmalloc+0xb7/0xc0
[   14.004980]  __kmalloc_cache_noprof+0x189/0x420
[   14.005141]  kasan_atomics+0x95/0x310
[   14.005272]  kunit_try_run_case+0x1a5/0x480
[   14.005413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.005666]  kthread+0x337/0x6f0
[   14.006024]  ret_from_fork+0x41/0x80
[   14.006229]  ret_from_fork_asm+0x1a/0x30
[   14.006424] 
[   14.006518] The buggy address belongs to the object at ffff888103a31d80
[   14.006518]  which belongs to the cache kmalloc-64 of size 64
[   14.006922] The buggy address is located 0 bytes to the right of
[   14.006922]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.007285] 
[   14.007355] The buggy address belongs to the physical page:
[   14.007525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.007953] flags: 0x200000000000000(node=0|zone=2)
[   14.008201] page_type: f5(slab)
[   14.008392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.008779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.009166] page dumped because: kasan: bad access detected
[   14.009430] 
[   14.009547] Memory state around the buggy address:
[   14.009769]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.010348]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.010568] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.011014]                                      ^
[   14.011212]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.011425]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.011634] ==================================================================
[   13.898178] ==================================================================
[   13.898960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   13.899321] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.899655] 
[   13.899933] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.899979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.899991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.900012] Call Trace:
[   13.900025]  <TASK>
[   13.900050]  dump_stack_lvl+0x73/0xb0
[   13.900075]  print_report+0xd1/0x610
[   13.900099]  ? __virt_addr_valid+0x1db/0x2d0
[   13.900131]  ? kasan_atomics_helper+0xe78/0x5450
[   13.900154]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.900177]  ? kasan_atomics_helper+0xe78/0x5450
[   13.900200]  kasan_report+0x141/0x180
[   13.900223]  ? kasan_atomics_helper+0xe78/0x5450
[   13.900251]  kasan_check_range+0x10c/0x1c0
[   13.900271]  __kasan_check_write+0x18/0x20
[   13.900291]  kasan_atomics_helper+0xe78/0x5450
[   13.900315]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.900348]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.900369]  ? ret_from_fork_asm+0x1a/0x30
[   13.900390]  ? kasan_atomics+0x152/0x310
[   13.900423]  kasan_atomics+0x1dc/0x310
[   13.900444]  ? __pfx_kasan_atomics+0x10/0x10
[   13.900465]  ? __pfx_read_tsc+0x10/0x10
[   13.900484]  ? ktime_get_ts64+0x86/0x230
[   13.900509]  kunit_try_run_case+0x1a5/0x480
[   13.900530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.900550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.900574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.900598]  ? __kthread_parkme+0x82/0x180
[   13.900620]  ? preempt_count_sub+0x50/0x80
[   13.900644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.900675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.900698]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.900721]  kthread+0x337/0x6f0
[   13.900748]  ? trace_preempt_on+0x20/0xc0
[   13.900773]  ? __pfx_kthread+0x10/0x10
[   13.900791]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.900826]  ? calculate_sigpending+0x7b/0xa0
[   13.900848]  ? __pfx_kthread+0x10/0x10
[   13.900873]  ret_from_fork+0x41/0x80
[   13.900903]  ? __pfx_kthread+0x10/0x10
[   13.900921]  ret_from_fork_asm+0x1a/0x30
[   13.900963]  </TASK>
[   13.900974] 
[   13.908777] Allocated by task 284:
[   13.908991]  kasan_save_stack+0x45/0x70
[   13.909183]  kasan_save_track+0x18/0x40
[   13.909462]  kasan_save_alloc_info+0x3b/0x50
[   13.909652]  __kasan_kmalloc+0xb7/0xc0
[   13.909863]  __kmalloc_cache_noprof+0x189/0x420
[   13.910076]  kasan_atomics+0x95/0x310
[   13.910229]  kunit_try_run_case+0x1a5/0x480
[   13.910382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.910651]  kthread+0x337/0x6f0
[   13.910814]  ret_from_fork+0x41/0x80
[   13.910994]  ret_from_fork_asm+0x1a/0x30
[   13.911263] 
[   13.911334] The buggy address belongs to the object at ffff888103a31d80
[   13.911334]  which belongs to the cache kmalloc-64 of size 64
[   13.911897] The buggy address is located 0 bytes to the right of
[   13.911897]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.912278] 
[   13.912348] The buggy address belongs to the physical page:
[   13.912519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.912823] flags: 0x200000000000000(node=0|zone=2)
[   13.913142] page_type: f5(slab)
[   13.913333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.913671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.914119] page dumped because: kasan: bad access detected
[   13.914287] 
[   13.914356] Memory state around the buggy address:
[   13.914507]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.914716]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.915320] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.915643]                                      ^
[   13.915906]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.916237]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.916446] ==================================================================
[   14.145551] ==================================================================
[   14.146017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.146249] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.146569] 
[   14.146672] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.146713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.146725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.146745] Call Trace:
[   14.146759]  <TASK>
[   14.146772]  dump_stack_lvl+0x73/0xb0
[   14.146795]  print_report+0xd1/0x610
[   14.146818]  ? __virt_addr_valid+0x1db/0x2d0
[   14.146839]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.146860]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.146894]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.146917]  kasan_report+0x141/0x180
[   14.146939]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.146967]  __asan_report_load8_noabort+0x18/0x20
[   14.146988]  kasan_atomics_helper+0x4eae/0x5450
[   14.147012]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.147035]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.147056]  ? ret_from_fork_asm+0x1a/0x30
[   14.147077]  ? kasan_atomics+0x152/0x310
[   14.147101]  kasan_atomics+0x1dc/0x310
[   14.147121]  ? __pfx_kasan_atomics+0x10/0x10
[   14.147143]  ? __pfx_read_tsc+0x10/0x10
[   14.147162]  ? ktime_get_ts64+0x86/0x230
[   14.147186]  kunit_try_run_case+0x1a5/0x480
[   14.147207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.147227]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.147251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.147276]  ? __kthread_parkme+0x82/0x180
[   14.147298]  ? preempt_count_sub+0x50/0x80
[   14.147323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.147343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.147366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.147389]  kthread+0x337/0x6f0
[   14.147406]  ? trace_preempt_on+0x20/0xc0
[   14.147429]  ? __pfx_kthread+0x10/0x10
[   14.147448]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.147469]  ? calculate_sigpending+0x7b/0xa0
[   14.147491]  ? __pfx_kthread+0x10/0x10
[   14.147510]  ret_from_fork+0x41/0x80
[   14.147531]  ? __pfx_kthread+0x10/0x10
[   14.147549]  ret_from_fork_asm+0x1a/0x30
[   14.147579]  </TASK>
[   14.147589] 
[   14.154709] Allocated by task 284:
[   14.154945]  kasan_save_stack+0x45/0x70
[   14.155147]  kasan_save_track+0x18/0x40
[   14.155343]  kasan_save_alloc_info+0x3b/0x50
[   14.155552]  __kasan_kmalloc+0xb7/0xc0
[   14.155751]  __kmalloc_cache_noprof+0x189/0x420
[   14.156142]  kasan_atomics+0x95/0x310
[   14.156368]  kunit_try_run_case+0x1a5/0x480
[   14.156574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.156790]  kthread+0x337/0x6f0
[   14.156938]  ret_from_fork+0x41/0x80
[   14.157114]  ret_from_fork_asm+0x1a/0x30
[   14.157253] 
[   14.157348] The buggy address belongs to the object at ffff888103a31d80
[   14.157348]  which belongs to the cache kmalloc-64 of size 64
[   14.157840] The buggy address is located 0 bytes to the right of
[   14.157840]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.158378] 
[   14.158448] The buggy address belongs to the physical page:
[   14.158617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.158851] flags: 0x200000000000000(node=0|zone=2)
[   14.159252] page_type: f5(slab)
[   14.159422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.159746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.160152] page dumped because: kasan: bad access detected
[   14.160373] 
[   14.160455] Memory state around the buggy address:
[   14.160661]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.160959]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.161225] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.161436]                                      ^
[   14.161587]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.161799]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.162083] ==================================================================
[   14.162787] ==================================================================
[   14.163184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.163524] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.164081] 
[   14.164190] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.164232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.164243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.164263] Call Trace:
[   14.164277]  <TASK>
[   14.164291]  dump_stack_lvl+0x73/0xb0
[   14.164313]  print_report+0xd1/0x610
[   14.164336]  ? __virt_addr_valid+0x1db/0x2d0
[   14.164357]  ? kasan_atomics_helper+0x1467/0x5450
[   14.164379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.164405]  ? kasan_atomics_helper+0x1467/0x5450
[   14.164429]  kasan_report+0x141/0x180
[   14.164452]  ? kasan_atomics_helper+0x1467/0x5450
[   14.164480]  kasan_check_range+0x10c/0x1c0
[   14.164501]  __kasan_check_write+0x18/0x20
[   14.164521]  kasan_atomics_helper+0x1467/0x5450
[   14.164544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.164567]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.164587]  ? ret_from_fork_asm+0x1a/0x30
[   14.164608]  ? kasan_atomics+0x152/0x310
[   14.164631]  kasan_atomics+0x1dc/0x310
[   14.164653]  ? __pfx_kasan_atomics+0x10/0x10
[   14.164674]  ? __pfx_read_tsc+0x10/0x10
[   14.164694]  ? ktime_get_ts64+0x86/0x230
[   14.164719]  kunit_try_run_case+0x1a5/0x480
[   14.164739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.164758]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.164782]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.164806]  ? __kthread_parkme+0x82/0x180
[   14.164827]  ? preempt_count_sub+0x50/0x80
[   14.164852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.164872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.164906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.164929]  kthread+0x337/0x6f0
[   14.164946]  ? trace_preempt_on+0x20/0xc0
[   14.164970]  ? __pfx_kthread+0x10/0x10
[   14.164987]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.165010]  ? calculate_sigpending+0x7b/0xa0
[   14.165030]  ? __pfx_kthread+0x10/0x10
[   14.165049]  ret_from_fork+0x41/0x80
[   14.165069]  ? __pfx_kthread+0x10/0x10
[   14.165088]  ret_from_fork_asm+0x1a/0x30
[   14.165118]  </TASK>
[   14.165132] 
[   14.172852] Allocated by task 284:
[   14.173016]  kasan_save_stack+0x45/0x70
[   14.173211]  kasan_save_track+0x18/0x40
[   14.173369]  kasan_save_alloc_info+0x3b/0x50
[   14.173566]  __kasan_kmalloc+0xb7/0xc0
[   14.173723]  __kmalloc_cache_noprof+0x189/0x420
[   14.173967]  kasan_atomics+0x95/0x310
[   14.174097]  kunit_try_run_case+0x1a5/0x480
[   14.174238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.174437]  kthread+0x337/0x6f0
[   14.174609]  ret_from_fork+0x41/0x80
[   14.174790]  ret_from_fork_asm+0x1a/0x30
[   14.175017] 
[   14.175088] The buggy address belongs to the object at ffff888103a31d80
[   14.175088]  which belongs to the cache kmalloc-64 of size 64
[   14.175672] The buggy address is located 0 bytes to the right of
[   14.175672]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.176223] 
[   14.176308] The buggy address belongs to the physical page:
[   14.176530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.176949] flags: 0x200000000000000(node=0|zone=2)
[   14.177201] page_type: f5(slab)
[   14.177360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.177655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.177919] page dumped because: kasan: bad access detected
[   14.178093] 
[   14.178166] Memory state around the buggy address:
[   14.178324]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.178538]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.178750] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.179074]                                      ^
[   14.179296]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.179612]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.179936] ==================================================================
[   13.447642] ==================================================================
[   13.448050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.448314] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.448700] 
[   13.448784] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.448939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.448952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.448991] Call Trace:
[   13.449004]  <TASK>
[   13.449019]  dump_stack_lvl+0x73/0xb0
[   13.449296]  print_report+0xd1/0x610
[   13.449319]  ? __virt_addr_valid+0x1db/0x2d0
[   13.449341]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.449363]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.449386]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.449409]  kasan_report+0x141/0x180
[   13.449432]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.449459]  __asan_report_store4_noabort+0x1b/0x30
[   13.449480]  kasan_atomics_helper+0x4b6e/0x5450
[   13.449504]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.449527]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.449548]  ? ret_from_fork_asm+0x1a/0x30
[   13.449570]  ? kasan_atomics+0x152/0x310
[   13.449593]  kasan_atomics+0x1dc/0x310
[   13.449613]  ? __pfx_kasan_atomics+0x10/0x10
[   13.449634]  ? __pfx_read_tsc+0x10/0x10
[   13.449654]  ? ktime_get_ts64+0x86/0x230
[   13.449679]  kunit_try_run_case+0x1a5/0x480
[   13.449701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.449719]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.449744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.449768]  ? __kthread_parkme+0x82/0x180
[   13.449790]  ? preempt_count_sub+0x50/0x80
[   13.449815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.449836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.449859]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.449893]  kthread+0x337/0x6f0
[   13.449911]  ? trace_preempt_on+0x20/0xc0
[   13.449934]  ? __pfx_kthread+0x10/0x10
[   13.449952]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.450463]  ? calculate_sigpending+0x7b/0xa0
[   13.450496]  ? __pfx_kthread+0x10/0x10
[   13.450517]  ret_from_fork+0x41/0x80
[   13.450539]  ? __pfx_kthread+0x10/0x10
[   13.450558]  ret_from_fork_asm+0x1a/0x30
[   13.450589]  </TASK>
[   13.450601] 
[   13.461484] Allocated by task 284:
[   13.461675]  kasan_save_stack+0x45/0x70
[   13.461858]  kasan_save_track+0x18/0x40
[   13.462032]  kasan_save_alloc_info+0x3b/0x50
[   13.462222]  __kasan_kmalloc+0xb7/0xc0
[   13.462389]  __kmalloc_cache_noprof+0x189/0x420
[   13.462582]  kasan_atomics+0x95/0x310
[   13.462738]  kunit_try_run_case+0x1a5/0x480
[   13.463634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.463895]  kthread+0x337/0x6f0
[   13.464069]  ret_from_fork+0x41/0x80
[   13.464565]  ret_from_fork_asm+0x1a/0x30
[   13.464869] 
[   13.464984] The buggy address belongs to the object at ffff888103a31d80
[   13.464984]  which belongs to the cache kmalloc-64 of size 64
[   13.465909] The buggy address is located 0 bytes to the right of
[   13.465909]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.466633] 
[   13.466890] The buggy address belongs to the physical page:
[   13.467249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.467685] flags: 0x200000000000000(node=0|zone=2)
[   13.467936] page_type: f5(slab)
[   13.468104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.468396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.468731] page dumped because: kasan: bad access detected
[   13.469341] 
[   13.469427] Memory state around the buggy address:
[   13.469585]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.470232]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.470753] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.471108]                                      ^
[   13.471481]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.472024]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.472441] ==================================================================
[   14.198759] ==================================================================
[   14.199255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.199627] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.199972] 
[   14.200057] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.200099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.200111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.200130] Call Trace:
[   14.200143]  <TASK>
[   14.200157]  dump_stack_lvl+0x73/0xb0
[   14.200179]  print_report+0xd1/0x610
[   14.200202]  ? __virt_addr_valid+0x1db/0x2d0
[   14.200222]  ? kasan_atomics_helper+0x151d/0x5450
[   14.200244]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.200267]  ? kasan_atomics_helper+0x151d/0x5450
[   14.200290]  kasan_report+0x141/0x180
[   14.200313]  ? kasan_atomics_helper+0x151d/0x5450
[   14.200340]  kasan_check_range+0x10c/0x1c0
[   14.200360]  __kasan_check_write+0x18/0x20
[   14.200380]  kasan_atomics_helper+0x151d/0x5450
[   14.200403]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.200426]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.200447]  ? ret_from_fork_asm+0x1a/0x30
[   14.200468]  ? kasan_atomics+0x152/0x310
[   14.200491]  kasan_atomics+0x1dc/0x310
[   14.200511]  ? __pfx_kasan_atomics+0x10/0x10
[   14.200531]  ? __pfx_read_tsc+0x10/0x10
[   14.200551]  ? ktime_get_ts64+0x86/0x230
[   14.200575]  kunit_try_run_case+0x1a5/0x480
[   14.200596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.200614]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.200638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.200662]  ? __kthread_parkme+0x82/0x180
[   14.200683]  ? preempt_count_sub+0x50/0x80
[   14.200707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.200728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.200751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.200773]  kthread+0x337/0x6f0
[   14.200790]  ? trace_preempt_on+0x20/0xc0
[   14.200813]  ? __pfx_kthread+0x10/0x10
[   14.200831]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.200853]  ? calculate_sigpending+0x7b/0xa0
[   14.200874]  ? __pfx_kthread+0x10/0x10
[   14.200904]  ret_from_fork+0x41/0x80
[   14.200925]  ? __pfx_kthread+0x10/0x10
[   14.200942]  ret_from_fork_asm+0x1a/0x30
[   14.200972]  </TASK>
[   14.200983] 
[   14.208329] Allocated by task 284:
[   14.208452]  kasan_save_stack+0x45/0x70
[   14.208758]  kasan_save_track+0x18/0x40
[   14.209139]  kasan_save_alloc_info+0x3b/0x50
[   14.209348]  __kasan_kmalloc+0xb7/0xc0
[   14.209537]  __kmalloc_cache_noprof+0x189/0x420
[   14.209758]  kasan_atomics+0x95/0x310
[   14.210000]  kunit_try_run_case+0x1a5/0x480
[   14.210147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.210324]  kthread+0x337/0x6f0
[   14.210444]  ret_from_fork+0x41/0x80
[   14.210575]  ret_from_fork_asm+0x1a/0x30
[   14.210712] 
[   14.210781] The buggy address belongs to the object at ffff888103a31d80
[   14.210781]  which belongs to the cache kmalloc-64 of size 64
[   14.211146] The buggy address is located 0 bytes to the right of
[   14.211146]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.211702] 
[   14.211798] The buggy address belongs to the physical page:
[   14.212063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.212656] flags: 0x200000000000000(node=0|zone=2)
[   14.212827] page_type: f5(slab)
[   14.212955] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.213187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.213412] page dumped because: kasan: bad access detected
[   14.213580] 
[   14.213648] Memory state around the buggy address:
[   14.213799]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.214133]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.214448] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.214763]                                      ^
[   14.214991]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.215309]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.215642] ==================================================================
[   14.216462] ==================================================================
[   14.216791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.217038] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.217268] 
[   14.217350] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.217391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.217403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.217462] Call Trace:
[   14.217478]  <TASK>
[   14.217492]  dump_stack_lvl+0x73/0xb0
[   14.217516]  print_report+0xd1/0x610
[   14.217538]  ? __virt_addr_valid+0x1db/0x2d0
[   14.217559]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.217581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.217605]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.217627]  kasan_report+0x141/0x180
[   14.217650]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.217678]  kasan_check_range+0x10c/0x1c0
[   14.217698]  __kasan_check_write+0x18/0x20
[   14.217719]  kasan_atomics_helper+0x15b6/0x5450
[   14.217742]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.217764]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.217785]  ? ret_from_fork_asm+0x1a/0x30
[   14.217807]  ? kasan_atomics+0x152/0x310
[   14.217832]  kasan_atomics+0x1dc/0x310
[   14.217851]  ? __pfx_kasan_atomics+0x10/0x10
[   14.217872]  ? __pfx_read_tsc+0x10/0x10
[   14.217900]  ? ktime_get_ts64+0x86/0x230
[   14.217925]  kunit_try_run_case+0x1a5/0x480
[   14.217947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.217966]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.217990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.218014]  ? __kthread_parkme+0x82/0x180
[   14.218036]  ? preempt_count_sub+0x50/0x80
[   14.218061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.218082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.218106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.218129]  kthread+0x337/0x6f0
[   14.218146]  ? trace_preempt_on+0x20/0xc0
[   14.218168]  ? __pfx_kthread+0x10/0x10
[   14.218186]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.218208]  ? calculate_sigpending+0x7b/0xa0
[   14.218230]  ? __pfx_kthread+0x10/0x10
[   14.218248]  ret_from_fork+0x41/0x80
[   14.218269]  ? __pfx_kthread+0x10/0x10
[   14.218287]  ret_from_fork_asm+0x1a/0x30
[   14.218317]  </TASK>
[   14.218328] 
[   14.226330] Allocated by task 284:
[   14.226561]  kasan_save_stack+0x45/0x70
[   14.226767]  kasan_save_track+0x18/0x40
[   14.226971]  kasan_save_alloc_info+0x3b/0x50
[   14.227179]  __kasan_kmalloc+0xb7/0xc0
[   14.227378]  __kmalloc_cache_noprof+0x189/0x420
[   14.227757]  kasan_atomics+0x95/0x310
[   14.228087]  kunit_try_run_case+0x1a5/0x480
[   14.228305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.228479]  kthread+0x337/0x6f0
[   14.228596]  ret_from_fork+0x41/0x80
[   14.228724]  ret_from_fork_asm+0x1a/0x30
[   14.228906] 
[   14.229004] The buggy address belongs to the object at ffff888103a31d80
[   14.229004]  which belongs to the cache kmalloc-64 of size 64
[   14.229538] The buggy address is located 0 bytes to the right of
[   14.229538]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.230136] 
[   14.230207] The buggy address belongs to the physical page:
[   14.230377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.230614] flags: 0x200000000000000(node=0|zone=2)
[   14.230780] page_type: f5(slab)
[   14.231109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.231459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.231806] page dumped because: kasan: bad access detected
[   14.232268] 
[   14.232372] Memory state around the buggy address:
[   14.232599]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.232930]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.233215] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.233461]                                      ^
[   14.233687]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.234004]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.234261] ==================================================================
[   13.698846] ==================================================================
[   13.699181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   13.699526] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.699869] 
[   13.699999] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.700056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.700069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.700101] Call Trace:
[   13.700115]  <TASK>
[   13.700130]  dump_stack_lvl+0x73/0xb0
[   13.700155]  print_report+0xd1/0x610
[   13.700179]  ? __virt_addr_valid+0x1db/0x2d0
[   13.700201]  ? kasan_atomics_helper+0x860/0x5450
[   13.700224]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.700249]  ? kasan_atomics_helper+0x860/0x5450
[   13.700273]  kasan_report+0x141/0x180
[   13.700297]  ? kasan_atomics_helper+0x860/0x5450
[   13.700325]  kasan_check_range+0x10c/0x1c0
[   13.700347]  __kasan_check_write+0x18/0x20
[   13.700369]  kasan_atomics_helper+0x860/0x5450
[   13.700394]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.700417]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.700441]  ? ret_from_fork_asm+0x1a/0x30
[   13.700473]  ? kasan_atomics+0x152/0x310
[   13.700498]  kasan_atomics+0x1dc/0x310
[   13.700520]  ? __pfx_kasan_atomics+0x10/0x10
[   13.700553]  ? __pfx_read_tsc+0x10/0x10
[   13.700574]  ? ktime_get_ts64+0x86/0x230
[   13.700599]  kunit_try_run_case+0x1a5/0x480
[   13.700622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.700643]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.700667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.700694]  ? __kthread_parkme+0x82/0x180
[   13.700716]  ? preempt_count_sub+0x50/0x80
[   13.700742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.700765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.700789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.700834]  kthread+0x337/0x6f0
[   13.700852]  ? trace_preempt_on+0x20/0xc0
[   13.700876]  ? __pfx_kthread+0x10/0x10
[   13.700903]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.700927]  ? calculate_sigpending+0x7b/0xa0
[   13.700950]  ? __pfx_kthread+0x10/0x10
[   13.700969]  ret_from_fork+0x41/0x80
[   13.700991]  ? __pfx_kthread+0x10/0x10
[   13.701010]  ret_from_fork_asm+0x1a/0x30
[   13.701042]  </TASK>
[   13.701052] 
[   13.708544] Allocated by task 284:
[   13.708724]  kasan_save_stack+0x45/0x70
[   13.708954]  kasan_save_track+0x18/0x40
[   13.709166]  kasan_save_alloc_info+0x3b/0x50
[   13.709359]  __kasan_kmalloc+0xb7/0xc0
[   13.709558]  __kmalloc_cache_noprof+0x189/0x420
[   13.709772]  kasan_atomics+0x95/0x310
[   13.709995]  kunit_try_run_case+0x1a5/0x480
[   13.710191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.710419]  kthread+0x337/0x6f0
[   13.710603]  ret_from_fork+0x41/0x80
[   13.710754]  ret_from_fork_asm+0x1a/0x30
[   13.710930] 
[   13.711003] The buggy address belongs to the object at ffff888103a31d80
[   13.711003]  which belongs to the cache kmalloc-64 of size 64
[   13.711358] The buggy address is located 0 bytes to the right of
[   13.711358]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.711961] 
[   13.712063] The buggy address belongs to the physical page:
[   13.712322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.712677] flags: 0x200000000000000(node=0|zone=2)
[   13.712964] page_type: f5(slab)
[   13.713140] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.713428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.713655] page dumped because: kasan: bad access detected
[   13.713852] 
[   13.713953] Memory state around the buggy address:
[   13.714206]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.714558]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.714935] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.715281]                                      ^
[   13.715506]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.715752]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.716127] ==================================================================
[   13.785955] ==================================================================
[   13.787026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   13.787340] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.787646] 
[   13.787746] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.787792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.787804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.787825] Call Trace:
[   13.787838]  <TASK>
[   13.787853]  dump_stack_lvl+0x73/0xb0
[   13.787888]  print_report+0xd1/0x610
[   13.787923]  ? __virt_addr_valid+0x1db/0x2d0
[   13.787946]  ? kasan_atomics_helper+0xac7/0x5450
[   13.787969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.788005]  ? kasan_atomics_helper+0xac7/0x5450
[   13.788028]  kasan_report+0x141/0x180
[   13.788053]  ? kasan_atomics_helper+0xac7/0x5450
[   13.788082]  kasan_check_range+0x10c/0x1c0
[   13.788104]  __kasan_check_write+0x18/0x20
[   13.788126]  kasan_atomics_helper+0xac7/0x5450
[   13.788151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.788175]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.788199]  ? ret_from_fork_asm+0x1a/0x30
[   13.788222]  ? kasan_atomics+0x152/0x310
[   13.788256]  kasan_atomics+0x1dc/0x310
[   13.788277]  ? __pfx_kasan_atomics+0x10/0x10
[   13.788299]  ? __pfx_read_tsc+0x10/0x10
[   13.788330]  ? ktime_get_ts64+0x86/0x230
[   13.788357]  kunit_try_run_case+0x1a5/0x480
[   13.788380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.788400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.788426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.788452]  ? __kthread_parkme+0x82/0x180
[   13.788475]  ? preempt_count_sub+0x50/0x80
[   13.788502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.788524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.788550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.788575]  kthread+0x337/0x6f0
[   13.788602]  ? trace_preempt_on+0x20/0xc0
[   13.788627]  ? __pfx_kthread+0x10/0x10
[   13.788647]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.788681]  ? calculate_sigpending+0x7b/0xa0
[   13.788703]  ? __pfx_kthread+0x10/0x10
[   13.788723]  ret_from_fork+0x41/0x80
[   13.788754]  ? __pfx_kthread+0x10/0x10
[   13.788774]  ret_from_fork_asm+0x1a/0x30
[   13.788805]  </TASK>
[   13.788816] 
[   13.796587] Allocated by task 284:
[   13.796722]  kasan_save_stack+0x45/0x70
[   13.797081]  kasan_save_track+0x18/0x40
[   13.797286]  kasan_save_alloc_info+0x3b/0x50
[   13.797525]  __kasan_kmalloc+0xb7/0xc0
[   13.797721]  __kmalloc_cache_noprof+0x189/0x420
[   13.797953]  kasan_atomics+0x95/0x310
[   13.798087]  kunit_try_run_case+0x1a5/0x480
[   13.798293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.798578]  kthread+0x337/0x6f0
[   13.798749]  ret_from_fork+0x41/0x80
[   13.798995]  ret_from_fork_asm+0x1a/0x30
[   13.799164] 
[   13.799280] The buggy address belongs to the object at ffff888103a31d80
[   13.799280]  which belongs to the cache kmalloc-64 of size 64
[   13.799767] The buggy address is located 0 bytes to the right of
[   13.799767]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.800401] 
[   13.800520] The buggy address belongs to the physical page:
[   13.800720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.800972] flags: 0x200000000000000(node=0|zone=2)
[   13.801141] page_type: f5(slab)
[   13.801272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.801641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.801981] page dumped because: kasan: bad access detected
[   13.802489] 
[   13.802583] Memory state around the buggy address:
[   13.802776]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.803161]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.803439] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.803654]                                      ^
[   13.803834]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.804194]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.804545] ==================================================================
[   14.566059] ==================================================================
[   14.566788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   14.567131] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.567466] 
[   14.567679] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.567725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.567736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.567756] Call Trace:
[   14.567771]  <TASK>
[   14.567902]  dump_stack_lvl+0x73/0xb0
[   14.567934]  print_report+0xd1/0x610
[   14.567957]  ? __virt_addr_valid+0x1db/0x2d0
[   14.567979]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.568001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.568023]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.568045]  kasan_report+0x141/0x180
[   14.568068]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.568190]  __asan_report_load8_noabort+0x18/0x20
[   14.568212]  kasan_atomics_helper+0x4f71/0x5450
[   14.568235]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.568258]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.568279]  ? ret_from_fork_asm+0x1a/0x30
[   14.568300]  ? kasan_atomics+0x152/0x310
[   14.568324]  kasan_atomics+0x1dc/0x310
[   14.568344]  ? __pfx_kasan_atomics+0x10/0x10
[   14.568365]  ? __pfx_read_tsc+0x10/0x10
[   14.568384]  ? ktime_get_ts64+0x86/0x230
[   14.568409]  kunit_try_run_case+0x1a5/0x480
[   14.568431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.568451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.568476]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.568500]  ? __kthread_parkme+0x82/0x180
[   14.568522]  ? preempt_count_sub+0x50/0x80
[   14.568546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.568568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.568592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.568615]  kthread+0x337/0x6f0
[   14.568632]  ? trace_preempt_on+0x20/0xc0
[   14.568655]  ? __pfx_kthread+0x10/0x10
[   14.568674]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.568696]  ? calculate_sigpending+0x7b/0xa0
[   14.568718]  ? __pfx_kthread+0x10/0x10
[   14.568737]  ret_from_fork+0x41/0x80
[   14.568757]  ? __pfx_kthread+0x10/0x10
[   14.568775]  ret_from_fork_asm+0x1a/0x30
[   14.568815]  </TASK>
[   14.568826] 
[   14.578502] Allocated by task 284:
[   14.578787]  kasan_save_stack+0x45/0x70
[   14.579130]  kasan_save_track+0x18/0x40
[   14.579291]  kasan_save_alloc_info+0x3b/0x50
[   14.579602]  __kasan_kmalloc+0xb7/0xc0
[   14.579784]  __kmalloc_cache_noprof+0x189/0x420
[   14.580151]  kasan_atomics+0x95/0x310
[   14.580295]  kunit_try_run_case+0x1a5/0x480
[   14.580497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.580727]  kthread+0x337/0x6f0
[   14.580927]  ret_from_fork+0x41/0x80
[   14.581365]  ret_from_fork_asm+0x1a/0x30
[   14.581561] 
[   14.581650] The buggy address belongs to the object at ffff888103a31d80
[   14.581650]  which belongs to the cache kmalloc-64 of size 64
[   14.582350] The buggy address is located 0 bytes to the right of
[   14.582350]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.582999] 
[   14.583080] The buggy address belongs to the physical page:
[   14.583316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.583781] flags: 0x200000000000000(node=0|zone=2)
[   14.584059] page_type: f5(slab)
[   14.584221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.584535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.584844] page dumped because: kasan: bad access detected
[   14.585081] 
[   14.585168] Memory state around the buggy address:
[   14.585374]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.585675]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.586386] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.586643]                                      ^
[   14.587045]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.587419]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.587695] ==================================================================
[   13.716620] ==================================================================
[   13.717050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   13.717371] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.717654] 
[   13.717770] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.717834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.717847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.717868] Call Trace:
[   13.717890]  <TASK>
[   13.717905]  dump_stack_lvl+0x73/0xb0
[   13.717931]  print_report+0xd1/0x610
[   13.717954]  ? __virt_addr_valid+0x1db/0x2d0
[   13.717976]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.717999]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.718024]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.718047]  kasan_report+0x141/0x180
[   13.718071]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.718099]  kasan_check_range+0x10c/0x1c0
[   13.718121]  __kasan_check_write+0x18/0x20
[   13.718142]  kasan_atomics_helper+0x8f9/0x5450
[   13.718166]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.718191]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.718212]  ? ret_from_fork_asm+0x1a/0x30
[   13.718235]  ? kasan_atomics+0x152/0x310
[   13.718259]  kasan_atomics+0x1dc/0x310
[   13.718280]  ? __pfx_kasan_atomics+0x10/0x10
[   13.718302]  ? __pfx_read_tsc+0x10/0x10
[   13.718323]  ? ktime_get_ts64+0x86/0x230
[   13.718348]  kunit_try_run_case+0x1a5/0x480
[   13.718372]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.718392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.718428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.718454]  ? __kthread_parkme+0x82/0x180
[   13.718478]  ? preempt_count_sub+0x50/0x80
[   13.718515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.718537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.718562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.718588]  kthread+0x337/0x6f0
[   13.718605]  ? trace_preempt_on+0x20/0xc0
[   13.718629]  ? __pfx_kthread+0x10/0x10
[   13.718649]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.718672]  ? calculate_sigpending+0x7b/0xa0
[   13.718695]  ? __pfx_kthread+0x10/0x10
[   13.718714]  ret_from_fork+0x41/0x80
[   13.718736]  ? __pfx_kthread+0x10/0x10
[   13.718755]  ret_from_fork_asm+0x1a/0x30
[   13.718786]  </TASK>
[   13.718815] 
[   13.726641] Allocated by task 284:
[   13.726836]  kasan_save_stack+0x45/0x70
[   13.726988]  kasan_save_track+0x18/0x40
[   13.727124]  kasan_save_alloc_info+0x3b/0x50
[   13.727300]  __kasan_kmalloc+0xb7/0xc0
[   13.727503]  __kmalloc_cache_noprof+0x189/0x420
[   13.727722]  kasan_atomics+0x95/0x310
[   13.727941]  kunit_try_run_case+0x1a5/0x480
[   13.728147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.728383]  kthread+0x337/0x6f0
[   13.728500]  ret_from_fork+0x41/0x80
[   13.728682]  ret_from_fork_asm+0x1a/0x30
[   13.728933] 
[   13.729028] The buggy address belongs to the object at ffff888103a31d80
[   13.729028]  which belongs to the cache kmalloc-64 of size 64
[   13.729518] The buggy address is located 0 bytes to the right of
[   13.729518]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.730074] 
[   13.730173] The buggy address belongs to the physical page:
[   13.730416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.730658] flags: 0x200000000000000(node=0|zone=2)
[   13.730841] page_type: f5(slab)
[   13.730983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.731250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.731599] page dumped because: kasan: bad access detected
[   13.731885] 
[   13.731980] Memory state around the buggy address:
[   13.732204]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.732539]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.732847] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.733183]                                      ^
[   13.733425]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.733708]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.734071] ==================================================================
[   14.180583] ==================================================================
[   14.181041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.181282] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.181517] 
[   14.181625] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.181667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.181679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.181700] Call Trace:
[   14.181714]  <TASK>
[   14.181729]  dump_stack_lvl+0x73/0xb0
[   14.181751]  print_report+0xd1/0x610
[   14.181775]  ? __virt_addr_valid+0x1db/0x2d0
[   14.181796]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.181817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.181840]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.181862]  kasan_report+0x141/0x180
[   14.181897]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.181925]  __asan_report_store8_noabort+0x1b/0x30
[   14.181947]  kasan_atomics_helper+0x50d4/0x5450
[   14.181970]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.181992]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.182013]  ? ret_from_fork_asm+0x1a/0x30
[   14.182035]  ? kasan_atomics+0x152/0x310
[   14.182059]  kasan_atomics+0x1dc/0x310
[   14.182079]  ? __pfx_kasan_atomics+0x10/0x10
[   14.182099]  ? __pfx_read_tsc+0x10/0x10
[   14.182118]  ? ktime_get_ts64+0x86/0x230
[   14.182143]  kunit_try_run_case+0x1a5/0x480
[   14.182163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.182182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.182206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.182230]  ? __kthread_parkme+0x82/0x180
[   14.182251]  ? preempt_count_sub+0x50/0x80
[   14.182277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.182297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.182320]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.182343]  kthread+0x337/0x6f0
[   14.182360]  ? trace_preempt_on+0x20/0xc0
[   14.182383]  ? __pfx_kthread+0x10/0x10
[   14.182401]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.182424]  ? calculate_sigpending+0x7b/0xa0
[   14.182445]  ? __pfx_kthread+0x10/0x10
[   14.182464]  ret_from_fork+0x41/0x80
[   14.182485]  ? __pfx_kthread+0x10/0x10
[   14.182502]  ret_from_fork_asm+0x1a/0x30
[   14.182533]  </TASK>
[   14.182543] 
[   14.190827] Allocated by task 284:
[   14.191017]  kasan_save_stack+0x45/0x70
[   14.191229]  kasan_save_track+0x18/0x40
[   14.191397]  kasan_save_alloc_info+0x3b/0x50
[   14.191596]  __kasan_kmalloc+0xb7/0xc0
[   14.191762]  __kmalloc_cache_noprof+0x189/0x420
[   14.192044]  kasan_atomics+0x95/0x310
[   14.192234]  kunit_try_run_case+0x1a5/0x480
[   14.192392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.192566]  kthread+0x337/0x6f0
[   14.192684]  ret_from_fork+0x41/0x80
[   14.192813]  ret_from_fork_asm+0x1a/0x30
[   14.193034] 
[   14.193141] The buggy address belongs to the object at ffff888103a31d80
[   14.193141]  which belongs to the cache kmalloc-64 of size 64
[   14.193616] The buggy address is located 0 bytes to the right of
[   14.193616]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.194357] 
[   14.194456] The buggy address belongs to the physical page:
[   14.194710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.195072] flags: 0x200000000000000(node=0|zone=2)
[   14.195274] page_type: f5(slab)
[   14.195425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.195654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.195927] page dumped because: kasan: bad access detected
[   14.196188] 
[   14.196280] Memory state around the buggy address:
[   14.196441]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.196742]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.197120] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.197338]                                      ^
[   14.197492]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.197794]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.198131] ==================================================================
[   14.699599] ==================================================================
[   14.700057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   14.700624] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.701174] 
[   14.701306] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.701351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.701364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.701383] Call Trace:
[   14.701398]  <TASK>
[   14.701414]  dump_stack_lvl+0x73/0xb0
[   14.701440]  print_report+0xd1/0x610
[   14.701536]  ? __virt_addr_valid+0x1db/0x2d0
[   14.701560]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.701583]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.701607]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.701629]  kasan_report+0x141/0x180
[   14.701653]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.701679]  __asan_report_load8_noabort+0x18/0x20
[   14.701701]  kasan_atomics_helper+0x4fa5/0x5450
[   14.701725]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.701748]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.701768]  ? ret_from_fork_asm+0x1a/0x30
[   14.701790]  ? kasan_atomics+0x152/0x310
[   14.701815]  kasan_atomics+0x1dc/0x310
[   14.701835]  ? __pfx_kasan_atomics+0x10/0x10
[   14.701856]  ? __pfx_read_tsc+0x10/0x10
[   14.701875]  ? ktime_get_ts64+0x86/0x230
[   14.701914]  kunit_try_run_case+0x1a5/0x480
[   14.701937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.701955]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.701980]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.702004]  ? __kthread_parkme+0x82/0x180
[   14.702025]  ? preempt_count_sub+0x50/0x80
[   14.702051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.702071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.702095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.702119]  kthread+0x337/0x6f0
[   14.702136]  ? trace_preempt_on+0x20/0xc0
[   14.702158]  ? __pfx_kthread+0x10/0x10
[   14.702177]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.702199]  ? calculate_sigpending+0x7b/0xa0
[   14.702220]  ? __pfx_kthread+0x10/0x10
[   14.702239]  ret_from_fork+0x41/0x80
[   14.702261]  ? __pfx_kthread+0x10/0x10
[   14.702279]  ret_from_fork_asm+0x1a/0x30
[   14.702309]  </TASK>
[   14.702320] 
[   14.709650] Allocated by task 284:
[   14.709824]  kasan_save_stack+0x45/0x70
[   14.709977]  kasan_save_track+0x18/0x40
[   14.710112]  kasan_save_alloc_info+0x3b/0x50
[   14.710273]  __kasan_kmalloc+0xb7/0xc0
[   14.710464]  __kmalloc_cache_noprof+0x189/0x420
[   14.710670]  kasan_atomics+0x95/0x310
[   14.710904]  kunit_try_run_case+0x1a5/0x480
[   14.711164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.711472]  kthread+0x337/0x6f0
[   14.711642]  ret_from_fork+0x41/0x80
[   14.711832]  ret_from_fork_asm+0x1a/0x30
[   14.712062] 
[   14.712137] The buggy address belongs to the object at ffff888103a31d80
[   14.712137]  which belongs to the cache kmalloc-64 of size 64
[   14.712787] The buggy address is located 0 bytes to the right of
[   14.712787]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.713255] 
[   14.713329] The buggy address belongs to the physical page:
[   14.713499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.713864] flags: 0x200000000000000(node=0|zone=2)
[   14.714131] page_type: f5(slab)
[   14.714295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.714625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.714933] page dumped because: kasan: bad access detected
[   14.715100] 
[   14.715168] Memory state around the buggy address:
[   14.715372]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.715716]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.716075] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.716365]                                      ^
[   14.716591]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.716929]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.717228] ==================================================================
[   14.012584] ==================================================================
[   14.013492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.013950] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.014283] 
[   14.014405] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.014447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.014469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.014489] Call Trace:
[   14.014504]  <TASK>
[   14.014520]  dump_stack_lvl+0x73/0xb0
[   14.014556]  print_report+0xd1/0x610
[   14.014580]  ? __virt_addr_valid+0x1db/0x2d0
[   14.014601]  ? kasan_atomics_helper+0x1148/0x5450
[   14.014632]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.014656]  ? kasan_atomics_helper+0x1148/0x5450
[   14.014679]  kasan_report+0x141/0x180
[   14.014712]  ? kasan_atomics_helper+0x1148/0x5450
[   14.014739]  kasan_check_range+0x10c/0x1c0
[   14.014762]  __kasan_check_write+0x18/0x20
[   14.014791]  kasan_atomics_helper+0x1148/0x5450
[   14.014814]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.014837]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.014888]  ? ret_from_fork_asm+0x1a/0x30
[   14.014910]  ? kasan_atomics+0x152/0x310
[   14.014934]  kasan_atomics+0x1dc/0x310
[   14.014954]  ? __pfx_kasan_atomics+0x10/0x10
[   14.014975]  ? __pfx_read_tsc+0x10/0x10
[   14.015003]  ? ktime_get_ts64+0x86/0x230
[   14.015028]  kunit_try_run_case+0x1a5/0x480
[   14.015050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.015079]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.015104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.015128]  ? __kthread_parkme+0x82/0x180
[   14.015158]  ? preempt_count_sub+0x50/0x80
[   14.015184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.015205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.015238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.015261]  kthread+0x337/0x6f0
[   14.015278]  ? trace_preempt_on+0x20/0xc0
[   14.015302]  ? __pfx_kthread+0x10/0x10
[   14.015320]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.015352]  ? calculate_sigpending+0x7b/0xa0
[   14.015374]  ? __pfx_kthread+0x10/0x10
[   14.015392]  ret_from_fork+0x41/0x80
[   14.015423]  ? __pfx_kthread+0x10/0x10
[   14.015442]  ret_from_fork_asm+0x1a/0x30
[   14.015472]  </TASK>
[   14.015484] 
[   14.023063] Allocated by task 284:
[   14.023190]  kasan_save_stack+0x45/0x70
[   14.023332]  kasan_save_track+0x18/0x40
[   14.023468]  kasan_save_alloc_info+0x3b/0x50
[   14.023678]  __kasan_kmalloc+0xb7/0xc0
[   14.023938]  __kmalloc_cache_noprof+0x189/0x420
[   14.024189]  kasan_atomics+0x95/0x310
[   14.024384]  kunit_try_run_case+0x1a5/0x480
[   14.024595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.024958]  kthread+0x337/0x6f0
[   14.025156]  ret_from_fork+0x41/0x80
[   14.025369]  ret_from_fork_asm+0x1a/0x30
[   14.025577] 
[   14.025698] The buggy address belongs to the object at ffff888103a31d80
[   14.025698]  which belongs to the cache kmalloc-64 of size 64
[   14.026249] The buggy address is located 0 bytes to the right of
[   14.026249]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.026707] 
[   14.026815] The buggy address belongs to the physical page:
[   14.027091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.027443] flags: 0x200000000000000(node=0|zone=2)
[   14.027639] page_type: f5(slab)
[   14.027788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.028145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.028395] page dumped because: kasan: bad access detected
[   14.028648] 
[   14.028740] Memory state around the buggy address:
[   14.028974]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.029289]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.029587] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.029898]                                      ^
[   14.030121]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.030419]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.030693] ==================================================================
[   14.542513] ==================================================================
[   14.543236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   14.543561] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.544333] 
[   14.544448] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.544492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.544503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.544524] Call Trace:
[   14.544536]  <TASK>
[   14.544550]  dump_stack_lvl+0x73/0xb0
[   14.544574]  print_report+0xd1/0x610
[   14.544596]  ? __virt_addr_valid+0x1db/0x2d0
[   14.544617]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.544639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.544661]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.544684]  kasan_report+0x141/0x180
[   14.544707]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.544735]  kasan_check_range+0x10c/0x1c0
[   14.544756]  __kasan_check_write+0x18/0x20
[   14.544776]  kasan_atomics_helper+0x1f43/0x5450
[   14.544799]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.544821]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.544842]  ? ret_from_fork_asm+0x1a/0x30
[   14.544863]  ? kasan_atomics+0x152/0x310
[   14.544899]  kasan_atomics+0x1dc/0x310
[   14.544919]  ? __pfx_kasan_atomics+0x10/0x10
[   14.544941]  ? __pfx_read_tsc+0x10/0x10
[   14.544962]  ? ktime_get_ts64+0x86/0x230
[   14.544986]  kunit_try_run_case+0x1a5/0x480
[   14.545007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.545026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.545051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.545075]  ? __kthread_parkme+0x82/0x180
[   14.545097]  ? preempt_count_sub+0x50/0x80
[   14.545121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.545147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.545171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.545195]  kthread+0x337/0x6f0
[   14.545212]  ? trace_preempt_on+0x20/0xc0
[   14.545235]  ? __pfx_kthread+0x10/0x10
[   14.545253]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.545276]  ? calculate_sigpending+0x7b/0xa0
[   14.545297]  ? __pfx_kthread+0x10/0x10
[   14.545316]  ret_from_fork+0x41/0x80
[   14.545337]  ? __pfx_kthread+0x10/0x10
[   14.545354]  ret_from_fork_asm+0x1a/0x30
[   14.545384]  </TASK>
[   14.545396] 
[   14.555991] Allocated by task 284:
[   14.556311]  kasan_save_stack+0x45/0x70
[   14.556612]  kasan_save_track+0x18/0x40
[   14.556898]  kasan_save_alloc_info+0x3b/0x50
[   14.557054]  __kasan_kmalloc+0xb7/0xc0
[   14.557327]  __kmalloc_cache_noprof+0x189/0x420
[   14.557572]  kasan_atomics+0x95/0x310
[   14.557855]  kunit_try_run_case+0x1a5/0x480
[   14.558056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.558361]  kthread+0x337/0x6f0
[   14.558523]  ret_from_fork+0x41/0x80
[   14.558684]  ret_from_fork_asm+0x1a/0x30
[   14.559083] 
[   14.559161] The buggy address belongs to the object at ffff888103a31d80
[   14.559161]  which belongs to the cache kmalloc-64 of size 64
[   14.559808] The buggy address is located 0 bytes to the right of
[   14.559808]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.560430] 
[   14.560524] The buggy address belongs to the physical page:
[   14.560723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.561255] flags: 0x200000000000000(node=0|zone=2)
[   14.561538] page_type: f5(slab)
[   14.561665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.562021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.562479] page dumped because: kasan: bad access detected
[   14.562780] 
[   14.562861] Memory state around the buggy address:
[   14.563193]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.563469]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.563765] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.564342]                                      ^
[   14.564559]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.564984]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.565356] ==================================================================
[   13.823751] ==================================================================
[   13.824432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   13.824680] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.824920] 
[   13.825055] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.825102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.825113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.825139] Call Trace:
[   13.825151]  <TASK>
[   13.825165]  dump_stack_lvl+0x73/0xb0
[   13.825191]  print_report+0xd1/0x610
[   13.825216]  ? __virt_addr_valid+0x1db/0x2d0
[   13.825238]  ? kasan_atomics_helper+0xc70/0x5450
[   13.825261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.825286]  ? kasan_atomics_helper+0xc70/0x5450
[   13.825310]  kasan_report+0x141/0x180
[   13.825334]  ? kasan_atomics_helper+0xc70/0x5450
[   13.825363]  kasan_check_range+0x10c/0x1c0
[   13.825384]  __kasan_check_write+0x18/0x20
[   13.825406]  kasan_atomics_helper+0xc70/0x5450
[   13.825431]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.825455]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.825477]  ? ret_from_fork_asm+0x1a/0x30
[   13.825499]  ? kasan_atomics+0x152/0x310
[   13.825524]  kasan_atomics+0x1dc/0x310
[   13.825544]  ? __pfx_kasan_atomics+0x10/0x10
[   13.825567]  ? __pfx_read_tsc+0x10/0x10
[   13.825587]  ? ktime_get_ts64+0x86/0x230
[   13.825613]  kunit_try_run_case+0x1a5/0x480
[   13.825636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.825657]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.825682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.825708]  ? __kthread_parkme+0x82/0x180
[   13.825731]  ? preempt_count_sub+0x50/0x80
[   13.825757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.825779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.825804]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.825838]  kthread+0x337/0x6f0
[   13.825856]  ? trace_preempt_on+0x20/0xc0
[   13.825897]  ? __pfx_kthread+0x10/0x10
[   13.825918]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.825942]  ? calculate_sigpending+0x7b/0xa0
[   13.825965]  ? __pfx_kthread+0x10/0x10
[   13.825985]  ret_from_fork+0x41/0x80
[   13.826006]  ? __pfx_kthread+0x10/0x10
[   13.826026]  ret_from_fork_asm+0x1a/0x30
[   13.826058]  </TASK>
[   13.826070] 
[   13.833915] Allocated by task 284:
[   13.834125]  kasan_save_stack+0x45/0x70
[   13.834333]  kasan_save_track+0x18/0x40
[   13.834556]  kasan_save_alloc_info+0x3b/0x50
[   13.834773]  __kasan_kmalloc+0xb7/0xc0
[   13.835169]  __kmalloc_cache_noprof+0x189/0x420
[   13.835344]  kasan_atomics+0x95/0x310
[   13.835474]  kunit_try_run_case+0x1a5/0x480
[   13.835665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.836066]  kthread+0x337/0x6f0
[   13.836226]  ret_from_fork+0x41/0x80
[   13.836403]  ret_from_fork_asm+0x1a/0x30
[   13.836605] 
[   13.836715] The buggy address belongs to the object at ffff888103a31d80
[   13.836715]  which belongs to the cache kmalloc-64 of size 64
[   13.837265] The buggy address is located 0 bytes to the right of
[   13.837265]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.837780] 
[   13.837941] The buggy address belongs to the physical page:
[   13.838200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.838538] flags: 0x200000000000000(node=0|zone=2)
[   13.838761] page_type: f5(slab)
[   13.839026] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.839386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.839719] page dumped because: kasan: bad access detected
[   13.839986] 
[   13.840070] Memory state around the buggy address:
[   13.840262]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.840523]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.840868] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.841208]                                      ^
[   13.841431]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.841752]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.842010] ==================================================================
[   13.611239] ==================================================================
[   13.611928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   13.612240] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.612581] 
[   13.612996] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.613044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.613057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.613077] Call Trace:
[   13.613092]  <TASK>
[   13.613107]  dump_stack_lvl+0x73/0xb0
[   13.613139]  print_report+0xd1/0x610
[   13.613162]  ? __virt_addr_valid+0x1db/0x2d0
[   13.613305]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.613329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.613352]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.613374]  kasan_report+0x141/0x180
[   13.613398]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.613425]  kasan_check_range+0x10c/0x1c0
[   13.613445]  __kasan_check_write+0x18/0x20
[   13.613465]  kasan_atomics_helper+0x5fe/0x5450
[   13.613488]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.613511]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.613531]  ? ret_from_fork_asm+0x1a/0x30
[   13.613552]  ? kasan_atomics+0x152/0x310
[   13.613576]  kasan_atomics+0x1dc/0x310
[   13.613595]  ? __pfx_kasan_atomics+0x10/0x10
[   13.613617]  ? __pfx_read_tsc+0x10/0x10
[   13.613636]  ? ktime_get_ts64+0x86/0x230
[   13.613661]  kunit_try_run_case+0x1a5/0x480
[   13.613705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.613724]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.613748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.613773]  ? __kthread_parkme+0x82/0x180
[   13.613794]  ? preempt_count_sub+0x50/0x80
[   13.613818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.613838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.613861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.613895]  kthread+0x337/0x6f0
[   13.613911]  ? trace_preempt_on+0x20/0xc0
[   13.613934]  ? __pfx_kthread+0x10/0x10
[   13.613953]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.613975]  ? calculate_sigpending+0x7b/0xa0
[   13.613996]  ? __pfx_kthread+0x10/0x10
[   13.614015]  ret_from_fork+0x41/0x80
[   13.614035]  ? __pfx_kthread+0x10/0x10
[   13.614055]  ret_from_fork_asm+0x1a/0x30
[   13.614086]  </TASK>
[   13.614097] 
[   13.626660] Allocated by task 284:
[   13.627082]  kasan_save_stack+0x45/0x70
[   13.627255]  kasan_save_track+0x18/0x40
[   13.627648]  kasan_save_alloc_info+0x3b/0x50
[   13.628019]  __kasan_kmalloc+0xb7/0xc0
[   13.628339]  __kmalloc_cache_noprof+0x189/0x420
[   13.628781]  kasan_atomics+0x95/0x310
[   13.629202]  kunit_try_run_case+0x1a5/0x480
[   13.629662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.630201]  kthread+0x337/0x6f0
[   13.630340]  ret_from_fork+0x41/0x80
[   13.630827]  ret_from_fork_asm+0x1a/0x30
[   13.631245] 
[   13.631393] The buggy address belongs to the object at ffff888103a31d80
[   13.631393]  which belongs to the cache kmalloc-64 of size 64
[   13.632401] The buggy address is located 0 bytes to the right of
[   13.632401]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.633416] 
[   13.633524] The buggy address belongs to the physical page:
[   13.633797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.634383] flags: 0x200000000000000(node=0|zone=2)
[   13.634630] page_type: f5(slab)
[   13.634773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.635252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.635689] page dumped because: kasan: bad access detected
[   13.635959] 
[   13.636030] Memory state around the buggy address:
[   13.636212]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.636721]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.637294] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.637592]                                      ^
[   13.637757]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.638289]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.638619] ==================================================================
[   13.499929] ==================================================================
[   13.500260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.500582] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.501286] 
[   13.501390] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.501436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.501519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.501540] Call Trace:
[   13.501554]  <TASK>
[   13.501626]  dump_stack_lvl+0x73/0xb0
[   13.501656]  print_report+0xd1/0x610
[   13.501681]  ? __virt_addr_valid+0x1db/0x2d0
[   13.501703]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.501726]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.501750]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.501773]  kasan_report+0x141/0x180
[   13.501798]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.501826]  __asan_report_load4_noabort+0x18/0x20
[   13.501847]  kasan_atomics_helper+0x4b54/0x5450
[   13.501871]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.501907]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.501928]  ? ret_from_fork_asm+0x1a/0x30
[   13.501949]  ? kasan_atomics+0x152/0x310
[   13.501973]  kasan_atomics+0x1dc/0x310
[   13.501993]  ? __pfx_kasan_atomics+0x10/0x10
[   13.502014]  ? __pfx_read_tsc+0x10/0x10
[   13.502033]  ? ktime_get_ts64+0x86/0x230
[   13.502059]  kunit_try_run_case+0x1a5/0x480
[   13.502080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.502098]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.502123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.502147]  ? __kthread_parkme+0x82/0x180
[   13.502169]  ? preempt_count_sub+0x50/0x80
[   13.502194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.502214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.502237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.502261]  kthread+0x337/0x6f0
[   13.502278]  ? trace_preempt_on+0x20/0xc0
[   13.502301]  ? __pfx_kthread+0x10/0x10
[   13.502320]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.502342]  ? calculate_sigpending+0x7b/0xa0
[   13.502363]  ? __pfx_kthread+0x10/0x10
[   13.502382]  ret_from_fork+0x41/0x80
[   13.502402]  ? __pfx_kthread+0x10/0x10
[   13.502421]  ret_from_fork_asm+0x1a/0x30
[   13.502452]  </TASK>
[   13.502464] 
[   13.513241] Allocated by task 284:
[   13.513433]  kasan_save_stack+0x45/0x70
[   13.513629]  kasan_save_track+0x18/0x40
[   13.513918]  kasan_save_alloc_info+0x3b/0x50
[   13.514128]  __kasan_kmalloc+0xb7/0xc0
[   13.514501]  __kmalloc_cache_noprof+0x189/0x420
[   13.514824]  kasan_atomics+0x95/0x310
[   13.515087]  kunit_try_run_case+0x1a5/0x480
[   13.515364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.515550]  kthread+0x337/0x6f0
[   13.515841]  ret_from_fork+0x41/0x80
[   13.516152]  ret_from_fork_asm+0x1a/0x30
[   13.516381] 
[   13.516488] The buggy address belongs to the object at ffff888103a31d80
[   13.516488]  which belongs to the cache kmalloc-64 of size 64
[   13.517289] The buggy address is located 0 bytes to the right of
[   13.517289]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.517999] 
[   13.518093] The buggy address belongs to the physical page:
[   13.518316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.518734] flags: 0x200000000000000(node=0|zone=2)
[   13.519159] page_type: f5(slab)
[   13.519331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.519785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.520056] page dumped because: kasan: bad access detected
[   13.520443] 
[   13.520536] Memory state around the buggy address:
[   13.520868]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.521197]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.521482] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.521772]                                      ^
[   13.522171]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.522716]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.523044] ==================================================================
[   14.588494] ==================================================================
[   14.589221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   14.589680] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.590112] 
[   14.590212] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.590256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.590269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.590290] Call Trace:
[   14.590305]  <TASK>
[   14.590319]  dump_stack_lvl+0x73/0xb0
[   14.590343]  print_report+0xd1/0x610
[   14.590367]  ? __virt_addr_valid+0x1db/0x2d0
[   14.590388]  ? kasan_atomics_helper+0x2006/0x5450
[   14.590485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.590509]  ? kasan_atomics_helper+0x2006/0x5450
[   14.590531]  kasan_report+0x141/0x180
[   14.590554]  ? kasan_atomics_helper+0x2006/0x5450
[   14.590581]  kasan_check_range+0x10c/0x1c0
[   14.590602]  __kasan_check_write+0x18/0x20
[   14.590623]  kasan_atomics_helper+0x2006/0x5450
[   14.590791]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.590814]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.590835]  ? ret_from_fork_asm+0x1a/0x30
[   14.590856]  ? kasan_atomics+0x152/0x310
[   14.590893]  kasan_atomics+0x1dc/0x310
[   14.590912]  ? __pfx_kasan_atomics+0x10/0x10
[   14.590934]  ? __pfx_read_tsc+0x10/0x10
[   14.590953]  ? ktime_get_ts64+0x86/0x230
[   14.590978]  kunit_try_run_case+0x1a5/0x480
[   14.591000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.591019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.591043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.591068]  ? __kthread_parkme+0x82/0x180
[   14.591090]  ? preempt_count_sub+0x50/0x80
[   14.591116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.591136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.591160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.591183]  kthread+0x337/0x6f0
[   14.591200]  ? trace_preempt_on+0x20/0xc0
[   14.591223]  ? __pfx_kthread+0x10/0x10
[   14.591241]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.591264]  ? calculate_sigpending+0x7b/0xa0
[   14.591286]  ? __pfx_kthread+0x10/0x10
[   14.591304]  ret_from_fork+0x41/0x80
[   14.591325]  ? __pfx_kthread+0x10/0x10
[   14.591343]  ret_from_fork_asm+0x1a/0x30
[   14.591373]  </TASK>
[   14.591383] 
[   14.601408] Allocated by task 284:
[   14.601701]  kasan_save_stack+0x45/0x70
[   14.601931]  kasan_save_track+0x18/0x40
[   14.602103]  kasan_save_alloc_info+0x3b/0x50
[   14.602297]  __kasan_kmalloc+0xb7/0xc0
[   14.602473]  __kmalloc_cache_noprof+0x189/0x420
[   14.602676]  kasan_atomics+0x95/0x310
[   14.602842]  kunit_try_run_case+0x1a5/0x480
[   14.603464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.603775]  kthread+0x337/0x6f0
[   14.603923]  ret_from_fork+0x41/0x80
[   14.604254]  ret_from_fork_asm+0x1a/0x30
[   14.604412] 
[   14.604578] The buggy address belongs to the object at ffff888103a31d80
[   14.604578]  which belongs to the cache kmalloc-64 of size 64
[   14.605391] The buggy address is located 0 bytes to the right of
[   14.605391]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.606035] 
[   14.606141] The buggy address belongs to the physical page:
[   14.606479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.606910] flags: 0x200000000000000(node=0|zone=2)
[   14.607146] page_type: f5(slab)
[   14.607426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.607817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.608113] page dumped because: kasan: bad access detected
[   14.608346] 
[   14.608434] Memory state around the buggy address:
[   14.608625]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.609216]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.609577] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.609844]                                      ^
[   14.610207]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.610512]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.610912] ==================================================================
[   14.270103] ==================================================================
[   14.270444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.270835] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.271166] 
[   14.271262] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.271304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.271316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.271336] Call Trace:
[   14.271349]  <TASK>
[   14.271364]  dump_stack_lvl+0x73/0xb0
[   14.271387]  print_report+0xd1/0x610
[   14.271410]  ? __virt_addr_valid+0x1db/0x2d0
[   14.271431]  ? kasan_atomics_helper+0x177f/0x5450
[   14.271454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.271478]  ? kasan_atomics_helper+0x177f/0x5450
[   14.271500]  kasan_report+0x141/0x180
[   14.271524]  ? kasan_atomics_helper+0x177f/0x5450
[   14.271551]  kasan_check_range+0x10c/0x1c0
[   14.271572]  __kasan_check_write+0x18/0x20
[   14.271592]  kasan_atomics_helper+0x177f/0x5450
[   14.271616]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.271639]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.271660]  ? ret_from_fork_asm+0x1a/0x30
[   14.271682]  ? kasan_atomics+0x152/0x310
[   14.271706]  kasan_atomics+0x1dc/0x310
[   14.271725]  ? __pfx_kasan_atomics+0x10/0x10
[   14.271747]  ? __pfx_read_tsc+0x10/0x10
[   14.271766]  ? ktime_get_ts64+0x86/0x230
[   14.271790]  kunit_try_run_case+0x1a5/0x480
[   14.271833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.271852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.271877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.271909]  ? __kthread_parkme+0x82/0x180
[   14.271931]  ? preempt_count_sub+0x50/0x80
[   14.271957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.271978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.272001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.272025]  kthread+0x337/0x6f0
[   14.272042]  ? trace_preempt_on+0x20/0xc0
[   14.272065]  ? __pfx_kthread+0x10/0x10
[   14.272084]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.272106]  ? calculate_sigpending+0x7b/0xa0
[   14.272127]  ? __pfx_kthread+0x10/0x10
[   14.272146]  ret_from_fork+0x41/0x80
[   14.272167]  ? __pfx_kthread+0x10/0x10
[   14.272184]  ret_from_fork_asm+0x1a/0x30
[   14.272215]  </TASK>
[   14.272225] 
[   14.279633] Allocated by task 284:
[   14.279790]  kasan_save_stack+0x45/0x70
[   14.280007]  kasan_save_track+0x18/0x40
[   14.280176]  kasan_save_alloc_info+0x3b/0x50
[   14.280319]  __kasan_kmalloc+0xb7/0xc0
[   14.280451]  __kmalloc_cache_noprof+0x189/0x420
[   14.280602]  kasan_atomics+0x95/0x310
[   14.280729]  kunit_try_run_case+0x1a5/0x480
[   14.280901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.281075]  kthread+0x337/0x6f0
[   14.281198]  ret_from_fork+0x41/0x80
[   14.281326]  ret_from_fork_asm+0x1a/0x30
[   14.281518] 
[   14.281613] The buggy address belongs to the object at ffff888103a31d80
[   14.281613]  which belongs to the cache kmalloc-64 of size 64
[   14.282164] The buggy address is located 0 bytes to the right of
[   14.282164]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.282713] 
[   14.282835] The buggy address belongs to the physical page:
[   14.283094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.283382] flags: 0x200000000000000(node=0|zone=2)
[   14.283540] page_type: f5(slab)
[   14.283658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.283917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.284141] page dumped because: kasan: bad access detected
[   14.284325] 
[   14.284417] Memory state around the buggy address:
[   14.284639]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.284992]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.285332] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.285653]                                      ^
[   14.285919]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.286247]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.286564] ==================================================================
[   13.842474] ==================================================================
[   13.843013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   13.843393] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.843780] 
[   13.843956] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.844018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.844033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.844071] Call Trace:
[   13.844086]  <TASK>
[   13.844103]  dump_stack_lvl+0x73/0xb0
[   13.844129]  print_report+0xd1/0x610
[   13.844156]  ? __virt_addr_valid+0x1db/0x2d0
[   13.844181]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.844208]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.844236]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.844263]  kasan_report+0x141/0x180
[   13.844289]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.844321]  __asan_report_load4_noabort+0x18/0x20
[   13.844347]  kasan_atomics_helper+0x4a84/0x5450
[   13.844375]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.844402]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.844428]  ? ret_from_fork_asm+0x1a/0x30
[   13.844454]  ? kasan_atomics+0x152/0x310
[   13.844482]  kasan_atomics+0x1dc/0x310
[   13.844504]  ? __pfx_kasan_atomics+0x10/0x10
[   13.844529]  ? __pfx_read_tsc+0x10/0x10
[   13.844551]  ? ktime_get_ts64+0x86/0x230
[   13.844580]  kunit_try_run_case+0x1a5/0x480
[   13.844605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.844628]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.844660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.844699]  ? __kthread_parkme+0x82/0x180
[   13.844725]  ? preempt_count_sub+0x50/0x80
[   13.844765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.844790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.844819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.844850]  kthread+0x337/0x6f0
[   13.844869]  ? trace_preempt_on+0x20/0xc0
[   13.844904]  ? __pfx_kthread+0x10/0x10
[   13.844925]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.844951]  ? calculate_sigpending+0x7b/0xa0
[   13.844977]  ? __pfx_kthread+0x10/0x10
[   13.844998]  ret_from_fork+0x41/0x80
[   13.845022]  ? __pfx_kthread+0x10/0x10
[   13.845044]  ret_from_fork_asm+0x1a/0x30
[   13.845077]  </TASK>
[   13.845090] 
[   13.853102] Allocated by task 284:
[   13.853283]  kasan_save_stack+0x45/0x70
[   13.853485]  kasan_save_track+0x18/0x40
[   13.853624]  kasan_save_alloc_info+0x3b/0x50
[   13.853772]  __kasan_kmalloc+0xb7/0xc0
[   13.853935]  __kmalloc_cache_noprof+0x189/0x420
[   13.854157]  kasan_atomics+0x95/0x310
[   13.854370]  kunit_try_run_case+0x1a5/0x480
[   13.854599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.854858]  kthread+0x337/0x6f0
[   13.854993]  ret_from_fork+0x41/0x80
[   13.855123]  ret_from_fork_asm+0x1a/0x30
[   13.855314] 
[   13.855409] The buggy address belongs to the object at ffff888103a31d80
[   13.855409]  which belongs to the cache kmalloc-64 of size 64
[   13.855962] The buggy address is located 0 bytes to the right of
[   13.855962]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.856485] 
[   13.856582] The buggy address belongs to the physical page:
[   13.856844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.857102] flags: 0x200000000000000(node=0|zone=2)
[   13.857269] page_type: f5(slab)
[   13.857387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.857621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.858173] page dumped because: kasan: bad access detected
[   13.858423] 
[   13.858515] Memory state around the buggy address:
[   13.858736]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.859264]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.859480] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.859691]                                      ^
[   13.859863]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.860195]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.860561] ==================================================================
[   13.680293] ==================================================================
[   13.680597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   13.681171] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.681598] 
[   13.681736] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.681787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.681822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.681842] Call Trace:
[   13.681854]  <TASK>
[   13.681868]  dump_stack_lvl+0x73/0xb0
[   13.681900]  print_report+0xd1/0x610
[   13.681924]  ? __virt_addr_valid+0x1db/0x2d0
[   13.681945]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.681967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.681990]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.682012]  kasan_report+0x141/0x180
[   13.682036]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.682072]  kasan_check_range+0x10c/0x1c0
[   13.682093]  __kasan_check_write+0x18/0x20
[   13.682113]  kasan_atomics_helper+0x7c7/0x5450
[   13.682146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.682169]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.682190]  ? ret_from_fork_asm+0x1a/0x30
[   13.682212]  ? kasan_atomics+0x152/0x310
[   13.682235]  kasan_atomics+0x1dc/0x310
[   13.682254]  ? __pfx_kasan_atomics+0x10/0x10
[   13.682275]  ? __pfx_read_tsc+0x10/0x10
[   13.682295]  ? ktime_get_ts64+0x86/0x230
[   13.682319]  kunit_try_run_case+0x1a5/0x480
[   13.682349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.682368]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.682392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.682426]  ? __kthread_parkme+0x82/0x180
[   13.682448]  ? preempt_count_sub+0x50/0x80
[   13.682472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.682493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.682526]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.682549]  kthread+0x337/0x6f0
[   13.682566]  ? trace_preempt_on+0x20/0xc0
[   13.682599]  ? __pfx_kthread+0x10/0x10
[   13.682617]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.682639]  ? calculate_sigpending+0x7b/0xa0
[   13.682660]  ? __pfx_kthread+0x10/0x10
[   13.682679]  ret_from_fork+0x41/0x80
[   13.682699]  ? __pfx_kthread+0x10/0x10
[   13.682718]  ret_from_fork_asm+0x1a/0x30
[   13.682748]  </TASK>
[   13.682759] 
[   13.690619] Allocated by task 284:
[   13.690823]  kasan_save_stack+0x45/0x70
[   13.690977]  kasan_save_track+0x18/0x40
[   13.691147]  kasan_save_alloc_info+0x3b/0x50
[   13.691375]  __kasan_kmalloc+0xb7/0xc0
[   13.691571]  __kmalloc_cache_noprof+0x189/0x420
[   13.691725]  kasan_atomics+0x95/0x310
[   13.691917]  kunit_try_run_case+0x1a5/0x480
[   13.692127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.692406]  kthread+0x337/0x6f0
[   13.692548]  ret_from_fork+0x41/0x80
[   13.692748]  ret_from_fork_asm+0x1a/0x30
[   13.692974] 
[   13.693082] The buggy address belongs to the object at ffff888103a31d80
[   13.693082]  which belongs to the cache kmalloc-64 of size 64
[   13.693603] The buggy address is located 0 bytes to the right of
[   13.693603]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.694036] 
[   13.694109] The buggy address belongs to the physical page:
[   13.694279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.694643] flags: 0x200000000000000(node=0|zone=2)
[   13.694916] page_type: f5(slab)
[   13.695086] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.695424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.695647] page dumped because: kasan: bad access detected
[   13.695838] 
[   13.695918] Memory state around the buggy address:
[   13.696143]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.696492]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.696866] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.697220]                                      ^
[   13.697457]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.697776]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.698082] ==================================================================
[   14.107901] ==================================================================
[   14.108252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.108595] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.108958] 
[   14.109041] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.109082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.109093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.109113] Call Trace:
[   14.109134]  <TASK>
[   14.109148]  dump_stack_lvl+0x73/0xb0
[   14.109171]  print_report+0xd1/0x610
[   14.109194]  ? __virt_addr_valid+0x1db/0x2d0
[   14.109215]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.109237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.109260]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.109282]  kasan_report+0x141/0x180
[   14.109305]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.109333]  __asan_report_load4_noabort+0x18/0x20
[   14.109354]  kasan_atomics_helper+0x49ce/0x5450
[   14.109377]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.109400]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.109421]  ? ret_from_fork_asm+0x1a/0x30
[   14.109443]  ? kasan_atomics+0x152/0x310
[   14.109466]  kasan_atomics+0x1dc/0x310
[   14.109486]  ? __pfx_kasan_atomics+0x10/0x10
[   14.109507]  ? __pfx_read_tsc+0x10/0x10
[   14.109526]  ? ktime_get_ts64+0x86/0x230
[   14.109551]  kunit_try_run_case+0x1a5/0x480
[   14.109572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.109591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.109614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.109638]  ? __kthread_parkme+0x82/0x180
[   14.109660]  ? preempt_count_sub+0x50/0x80
[   14.109685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.109705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.109728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.109752]  kthread+0x337/0x6f0
[   14.109769]  ? trace_preempt_on+0x20/0xc0
[   14.109792]  ? __pfx_kthread+0x10/0x10
[   14.109821]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.109843]  ? calculate_sigpending+0x7b/0xa0
[   14.109864]  ? __pfx_kthread+0x10/0x10
[   14.109892]  ret_from_fork+0x41/0x80
[   14.109913]  ? __pfx_kthread+0x10/0x10
[   14.109931]  ret_from_fork_asm+0x1a/0x30
[   14.109961]  </TASK>
[   14.109972] 
[   14.117588] Allocated by task 284:
[   14.117765]  kasan_save_stack+0x45/0x70
[   14.118099]  kasan_save_track+0x18/0x40
[   14.118264]  kasan_save_alloc_info+0x3b/0x50
[   14.118445]  __kasan_kmalloc+0xb7/0xc0
[   14.118629]  __kmalloc_cache_noprof+0x189/0x420
[   14.118859]  kasan_atomics+0x95/0x310
[   14.119036]  kunit_try_run_case+0x1a5/0x480
[   14.119178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.119352]  kthread+0x337/0x6f0
[   14.119468]  ret_from_fork+0x41/0x80
[   14.119596]  ret_from_fork_asm+0x1a/0x30
[   14.119732] 
[   14.119803] The buggy address belongs to the object at ffff888103a31d80
[   14.119803]  which belongs to the cache kmalloc-64 of size 64
[   14.120156] The buggy address is located 0 bytes to the right of
[   14.120156]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.120604] 
[   14.120699] The buggy address belongs to the physical page:
[   14.121264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.121616] flags: 0x200000000000000(node=0|zone=2)
[   14.121848] page_type: f5(slab)
[   14.122023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.122271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.122495] page dumped because: kasan: bad access detected
[   14.122664] 
[   14.122732] Memory state around the buggy address:
[   14.122892]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.123105]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.123316] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.123681]                                      ^
[   14.124017]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.124336]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.124654] ==================================================================
[   13.916989] ==================================================================
[   13.917532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   13.917988] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.918211] 
[   13.918319] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.918371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.918383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.918403] Call Trace:
[   13.918417]  <TASK>
[   13.918430]  dump_stack_lvl+0x73/0xb0
[   13.918465]  print_report+0xd1/0x610
[   13.918489]  ? __virt_addr_valid+0x1db/0x2d0
[   13.918509]  ? kasan_atomics_helper+0xf10/0x5450
[   13.918539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.918563]  ? kasan_atomics_helper+0xf10/0x5450
[   13.918587]  kasan_report+0x141/0x180
[   13.918621]  ? kasan_atomics_helper+0xf10/0x5450
[   13.918648]  kasan_check_range+0x10c/0x1c0
[   13.918670]  __kasan_check_write+0x18/0x20
[   13.918698]  kasan_atomics_helper+0xf10/0x5450
[   13.918722]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.918744]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.918776]  ? ret_from_fork_asm+0x1a/0x30
[   13.918797]  ? kasan_atomics+0x152/0x310
[   13.918821]  kasan_atomics+0x1dc/0x310
[   13.918840]  ? __pfx_kasan_atomics+0x10/0x10
[   13.918861]  ? __pfx_read_tsc+0x10/0x10
[   13.918896]  ? ktime_get_ts64+0x86/0x230
[   13.918922]  kunit_try_run_case+0x1a5/0x480
[   13.918943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.918972]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.918996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.919020]  ? __kthread_parkme+0x82/0x180
[   13.919042]  ? preempt_count_sub+0x50/0x80
[   13.919075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.919095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.919119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.919152]  kthread+0x337/0x6f0
[   13.919170]  ? trace_preempt_on+0x20/0xc0
[   13.919193]  ? __pfx_kthread+0x10/0x10
[   13.919211]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.919233]  ? calculate_sigpending+0x7b/0xa0
[   13.919255]  ? __pfx_kthread+0x10/0x10
[   13.919273]  ret_from_fork+0x41/0x80
[   13.919294]  ? __pfx_kthread+0x10/0x10
[   13.919312]  ret_from_fork_asm+0x1a/0x30
[   13.919351]  </TASK>
[   13.919362] 
[   13.927330] Allocated by task 284:
[   13.927551]  kasan_save_stack+0x45/0x70
[   13.927775]  kasan_save_track+0x18/0x40
[   13.928066]  kasan_save_alloc_info+0x3b/0x50
[   13.928242]  __kasan_kmalloc+0xb7/0xc0
[   13.928427]  __kmalloc_cache_noprof+0x189/0x420
[   13.928579]  kasan_atomics+0x95/0x310
[   13.928785]  kunit_try_run_case+0x1a5/0x480
[   13.928999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.929232]  kthread+0x337/0x6f0
[   13.929350]  ret_from_fork+0x41/0x80
[   13.929479]  ret_from_fork_asm+0x1a/0x30
[   13.929688] 
[   13.929782] The buggy address belongs to the object at ffff888103a31d80
[   13.929782]  which belongs to the cache kmalloc-64 of size 64
[   13.930350] The buggy address is located 0 bytes to the right of
[   13.930350]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.930871] 
[   13.930958] The buggy address belongs to the physical page:
[   13.931201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.931457] flags: 0x200000000000000(node=0|zone=2)
[   13.931617] page_type: f5(slab)
[   13.931737] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.931973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.932345] page dumped because: kasan: bad access detected
[   13.932595] 
[   13.932686] Memory state around the buggy address:
[   13.932913]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.933197]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.933409] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.933617]                                      ^
[   13.933769]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.934377]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.934695] ==================================================================
[   13.425796] ==================================================================
[   13.426462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.427091] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.427313] 
[   13.427396] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.427442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.427453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.427473] Call Trace:
[   13.427485]  <TASK>
[   13.427499]  dump_stack_lvl+0x73/0xb0
[   13.427523]  print_report+0xd1/0x610
[   13.427545]  ? __virt_addr_valid+0x1db/0x2d0
[   13.427566]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.427614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.427733]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.427758]  kasan_report+0x141/0x180
[   13.427781]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.427911]  __asan_report_load4_noabort+0x18/0x20
[   13.427953]  kasan_atomics_helper+0x4b88/0x5450
[   13.427976]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.428146]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.428171]  ? ret_from_fork_asm+0x1a/0x30
[   13.428193]  ? kasan_atomics+0x152/0x310
[   13.428215]  kasan_atomics+0x1dc/0x310
[   13.428234]  ? __pfx_kasan_atomics+0x10/0x10
[   13.428255]  ? __pfx_read_tsc+0x10/0x10
[   13.428274]  ? ktime_get_ts64+0x86/0x230
[   13.428298]  kunit_try_run_case+0x1a5/0x480
[   13.428318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.428336]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.428361]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.428385]  ? __kthread_parkme+0x82/0x180
[   13.428406]  ? preempt_count_sub+0x50/0x80
[   13.428430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.428450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.428473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.428496]  kthread+0x337/0x6f0
[   13.428512]  ? trace_preempt_on+0x20/0xc0
[   13.428535]  ? __pfx_kthread+0x10/0x10
[   13.428552]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.428573]  ? calculate_sigpending+0x7b/0xa0
[   13.428594]  ? __pfx_kthread+0x10/0x10
[   13.428611]  ret_from_fork+0x41/0x80
[   13.428630]  ? __pfx_kthread+0x10/0x10
[   13.428647]  ret_from_fork_asm+0x1a/0x30
[   13.428676]  </TASK>
[   13.428686] 
[   13.439019] Allocated by task 284:
[   13.439389]  kasan_save_stack+0x45/0x70
[   13.439601]  kasan_save_track+0x18/0x40
[   13.439974]  kasan_save_alloc_info+0x3b/0x50
[   13.440240]  __kasan_kmalloc+0xb7/0xc0
[   13.440464]  __kmalloc_cache_noprof+0x189/0x420
[   13.440680]  kasan_atomics+0x95/0x310
[   13.440930]  kunit_try_run_case+0x1a5/0x480
[   13.441093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.441318]  kthread+0x337/0x6f0
[   13.441465]  ret_from_fork+0x41/0x80
[   13.441595]  ret_from_fork_asm+0x1a/0x30
[   13.441785] 
[   13.441927] The buggy address belongs to the object at ffff888103a31d80
[   13.441927]  which belongs to the cache kmalloc-64 of size 64
[   13.442423] The buggy address is located 0 bytes to the right of
[   13.442423]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.442875] 
[   13.442953] The buggy address belongs to the physical page:
[   13.443193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.443553] flags: 0x200000000000000(node=0|zone=2)
[   13.443716] page_type: f5(slab)
[   13.443831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.444308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.444855] page dumped because: kasan: bad access detected
[   13.445073] 
[   13.445175] Memory state around the buggy address:
[   13.445343]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.445549]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.445855] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.446124]                                      ^
[   13.446270]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.446672]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.447116] ==================================================================
[   14.052369] ==================================================================
[   14.052851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.053147] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.053370] 
[   14.053455] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.053497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.053509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.053530] Call Trace:
[   14.053544]  <TASK>
[   14.053560]  dump_stack_lvl+0x73/0xb0
[   14.053583]  print_report+0xd1/0x610
[   14.053606]  ? __virt_addr_valid+0x1db/0x2d0
[   14.053627]  ? kasan_atomics_helper+0x1217/0x5450
[   14.053650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.053674]  ? kasan_atomics_helper+0x1217/0x5450
[   14.053697]  kasan_report+0x141/0x180
[   14.053720]  ? kasan_atomics_helper+0x1217/0x5450
[   14.053748]  kasan_check_range+0x10c/0x1c0
[   14.053769]  __kasan_check_write+0x18/0x20
[   14.053789]  kasan_atomics_helper+0x1217/0x5450
[   14.053827]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.053850]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.053871]  ? ret_from_fork_asm+0x1a/0x30
[   14.053903]  ? kasan_atomics+0x152/0x310
[   14.053927]  kasan_atomics+0x1dc/0x310
[   14.053946]  ? __pfx_kasan_atomics+0x10/0x10
[   14.053968]  ? __pfx_read_tsc+0x10/0x10
[   14.053987]  ? ktime_get_ts64+0x86/0x230
[   14.054011]  kunit_try_run_case+0x1a5/0x480
[   14.054032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.054051]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.054076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.054100]  ? __kthread_parkme+0x82/0x180
[   14.054122]  ? preempt_count_sub+0x50/0x80
[   14.054147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.054167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.054191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.054215]  kthread+0x337/0x6f0
[   14.054232]  ? trace_preempt_on+0x20/0xc0
[   14.054255]  ? __pfx_kthread+0x10/0x10
[   14.054273]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.054295]  ? calculate_sigpending+0x7b/0xa0
[   14.054317]  ? __pfx_kthread+0x10/0x10
[   14.054336]  ret_from_fork+0x41/0x80
[   14.054356]  ? __pfx_kthread+0x10/0x10
[   14.054374]  ret_from_fork_asm+0x1a/0x30
[   14.054404]  </TASK>
[   14.054415] 
[   14.065347] Allocated by task 284:
[   14.065495]  kasan_save_stack+0x45/0x70
[   14.065698]  kasan_save_track+0x18/0x40
[   14.065934]  kasan_save_alloc_info+0x3b/0x50
[   14.066112]  __kasan_kmalloc+0xb7/0xc0
[   14.066263]  __kmalloc_cache_noprof+0x189/0x420
[   14.066480]  kasan_atomics+0x95/0x310
[   14.066645]  kunit_try_run_case+0x1a5/0x480
[   14.066840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.067087]  kthread+0x337/0x6f0
[   14.067237]  ret_from_fork+0x41/0x80
[   14.067390]  ret_from_fork_asm+0x1a/0x30
[   14.067562] 
[   14.067632] The buggy address belongs to the object at ffff888103a31d80
[   14.067632]  which belongs to the cache kmalloc-64 of size 64
[   14.067986] The buggy address is located 0 bytes to the right of
[   14.067986]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.068722] 
[   14.068820] The buggy address belongs to the physical page:
[   14.069100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.069344] flags: 0x200000000000000(node=0|zone=2)
[   14.069505] page_type: f5(slab)
[   14.069623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.070010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.070347] page dumped because: kasan: bad access detected
[   14.070601] 
[   14.070696] Memory state around the buggy address:
[   14.070935]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.071263]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.071587] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.071942]                                      ^
[   14.072135]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.072348]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.072618] ==================================================================
[   14.235133] ==================================================================
[   14.235388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.235621] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.235842] 
[   14.235935] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.235978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.235990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.236010] Call Trace:
[   14.236024]  <TASK>
[   14.236037]  dump_stack_lvl+0x73/0xb0
[   14.236060]  print_report+0xd1/0x610
[   14.236083]  ? __virt_addr_valid+0x1db/0x2d0
[   14.236105]  ? kasan_atomics_helper+0x164f/0x5450
[   14.236127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.236150]  ? kasan_atomics_helper+0x164f/0x5450
[   14.236173]  kasan_report+0x141/0x180
[   14.236195]  ? kasan_atomics_helper+0x164f/0x5450
[   14.236223]  kasan_check_range+0x10c/0x1c0
[   14.236243]  __kasan_check_write+0x18/0x20
[   14.236263]  kasan_atomics_helper+0x164f/0x5450
[   14.236287]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.236310]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.236331]  ? ret_from_fork_asm+0x1a/0x30
[   14.236352]  ? kasan_atomics+0x152/0x310
[   14.236375]  kasan_atomics+0x1dc/0x310
[   14.236394]  ? __pfx_kasan_atomics+0x10/0x10
[   14.236416]  ? __pfx_read_tsc+0x10/0x10
[   14.236436]  ? ktime_get_ts64+0x86/0x230
[   14.236460]  kunit_try_run_case+0x1a5/0x480
[   14.236480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.236499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.236523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.236547]  ? __kthread_parkme+0x82/0x180
[   14.236569]  ? preempt_count_sub+0x50/0x80
[   14.236593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.236613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.236636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.236660]  kthread+0x337/0x6f0
[   14.236676]  ? trace_preempt_on+0x20/0xc0
[   14.236700]  ? __pfx_kthread+0x10/0x10
[   14.236717]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.236740]  ? calculate_sigpending+0x7b/0xa0
[   14.236761]  ? __pfx_kthread+0x10/0x10
[   14.236780]  ret_from_fork+0x41/0x80
[   14.236800]  ? __pfx_kthread+0x10/0x10
[   14.236818]  ret_from_fork_asm+0x1a/0x30
[   14.236847]  </TASK>
[   14.236858] 
[   14.245076] Allocated by task 284:
[   14.245206]  kasan_save_stack+0x45/0x70
[   14.245348]  kasan_save_track+0x18/0x40
[   14.245483]  kasan_save_alloc_info+0x3b/0x50
[   14.245626]  __kasan_kmalloc+0xb7/0xc0
[   14.245757]  __kmalloc_cache_noprof+0x189/0x420
[   14.246180]  kasan_atomics+0x95/0x310
[   14.246367]  kunit_try_run_case+0x1a5/0x480
[   14.246573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.246836]  kthread+0x337/0x6f0
[   14.247014]  ret_from_fork+0x41/0x80
[   14.247201]  ret_from_fork_asm+0x1a/0x30
[   14.247401] 
[   14.247496] The buggy address belongs to the object at ffff888103a31d80
[   14.247496]  which belongs to the cache kmalloc-64 of size 64
[   14.248028] The buggy address is located 0 bytes to the right of
[   14.248028]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.248514] 
[   14.248587] The buggy address belongs to the physical page:
[   14.248757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.249017] flags: 0x200000000000000(node=0|zone=2)
[   14.249257] page_type: f5(slab)
[   14.249425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.249772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.250116] page dumped because: kasan: bad access detected
[   14.250335] 
[   14.250420] Memory state around the buggy address:
[   14.250607]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.250943]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.251200] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.251413]                                      ^
[   14.251580]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.252019]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.252339] ==================================================================
[   14.031362] ==================================================================
[   14.031766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.032103] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.032424] 
[   14.032538] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.032589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.032602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.032621] Call Trace:
[   14.032645]  <TASK>
[   14.032658]  dump_stack_lvl+0x73/0xb0
[   14.032682]  print_report+0xd1/0x610
[   14.032705]  ? __virt_addr_valid+0x1db/0x2d0
[   14.032726]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.032747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.032781]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.032803]  kasan_report+0x141/0x180
[   14.032838]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.032865]  __asan_report_load4_noabort+0x18/0x20
[   14.032894]  kasan_atomics_helper+0x4a02/0x5450
[   14.032918]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.032941]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.032962]  ? ret_from_fork_asm+0x1a/0x30
[   14.032983]  ? kasan_atomics+0x152/0x310
[   14.033007]  kasan_atomics+0x1dc/0x310
[   14.033027]  ? __pfx_kasan_atomics+0x10/0x10
[   14.033048]  ? __pfx_read_tsc+0x10/0x10
[   14.033067]  ? ktime_get_ts64+0x86/0x230
[   14.033092]  kunit_try_run_case+0x1a5/0x480
[   14.033113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.033140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.033164]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.033189]  ? __kthread_parkme+0x82/0x180
[   14.033210]  ? preempt_count_sub+0x50/0x80
[   14.033235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.033255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.033279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.033303]  kthread+0x337/0x6f0
[   14.033320]  ? trace_preempt_on+0x20/0xc0
[   14.033344]  ? __pfx_kthread+0x10/0x10
[   14.033361]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.033393]  ? calculate_sigpending+0x7b/0xa0
[   14.033414]  ? __pfx_kthread+0x10/0x10
[   14.033433]  ret_from_fork+0x41/0x80
[   14.033465]  ? __pfx_kthread+0x10/0x10
[   14.033484]  ret_from_fork_asm+0x1a/0x30
[   14.033515]  </TASK>
[   14.033525] 
[   14.041246] Allocated by task 284:
[   14.041369]  kasan_save_stack+0x45/0x70
[   14.041511]  kasan_save_track+0x18/0x40
[   14.041669]  kasan_save_alloc_info+0x3b/0x50
[   14.041894]  __kasan_kmalloc+0xb7/0xc0
[   14.042083]  __kmalloc_cache_noprof+0x189/0x420
[   14.042302]  kasan_atomics+0x95/0x310
[   14.042492]  kunit_try_run_case+0x1a5/0x480
[   14.042725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.042968]  kthread+0x337/0x6f0
[   14.043102]  ret_from_fork+0x41/0x80
[   14.043286]  ret_from_fork_asm+0x1a/0x30
[   14.043477] 
[   14.043594] The buggy address belongs to the object at ffff888103a31d80
[   14.043594]  which belongs to the cache kmalloc-64 of size 64
[   14.044231] The buggy address is located 0 bytes to the right of
[   14.044231]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.044762] 
[   14.044915] The buggy address belongs to the physical page:
[   14.045140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.045431] flags: 0x200000000000000(node=0|zone=2)
[   14.045591] page_type: f5(slab)
[   14.045709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.046193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.046528] page dumped because: kasan: bad access detected
[   14.046734] 
[   14.046804] Memory state around the buggy address:
[   14.047438]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.048253]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.048481] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.048692]                                      ^
[   14.049939]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.050541]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.051346] ==================================================================
[   14.611444] ==================================================================
[   14.611742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   14.612202] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.612431] 
[   14.612542] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.612586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.612599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.612619] Call Trace:
[   14.612633]  <TASK>
[   14.612649]  dump_stack_lvl+0x73/0xb0
[   14.612674]  print_report+0xd1/0x610
[   14.612698]  ? __virt_addr_valid+0x1db/0x2d0
[   14.612720]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.612741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.612764]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.612787]  kasan_report+0x141/0x180
[   14.613351]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.613388]  __asan_report_load8_noabort+0x18/0x20
[   14.613411]  kasan_atomics_helper+0x4f98/0x5450
[   14.613435]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.613459]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.613480]  ? ret_from_fork_asm+0x1a/0x30
[   14.613501]  ? kasan_atomics+0x152/0x310
[   14.613525]  kasan_atomics+0x1dc/0x310
[   14.613545]  ? __pfx_kasan_atomics+0x10/0x10
[   14.613567]  ? __pfx_read_tsc+0x10/0x10
[   14.613586]  ? ktime_get_ts64+0x86/0x230
[   14.613611]  kunit_try_run_case+0x1a5/0x480
[   14.613632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.613652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.613676]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.613700]  ? __kthread_parkme+0x82/0x180
[   14.613722]  ? preempt_count_sub+0x50/0x80
[   14.613747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.613768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.613792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.613816]  kthread+0x337/0x6f0
[   14.613832]  ? trace_preempt_on+0x20/0xc0
[   14.613856]  ? __pfx_kthread+0x10/0x10
[   14.613874]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.613908]  ? calculate_sigpending+0x7b/0xa0
[   14.613929]  ? __pfx_kthread+0x10/0x10
[   14.613948]  ret_from_fork+0x41/0x80
[   14.613969]  ? __pfx_kthread+0x10/0x10
[   14.613987]  ret_from_fork_asm+0x1a/0x30
[   14.614017]  </TASK>
[   14.614028] 
[   14.623657] Allocated by task 284:
[   14.623993]  kasan_save_stack+0x45/0x70
[   14.624184]  kasan_save_track+0x18/0x40
[   14.624491]  kasan_save_alloc_info+0x3b/0x50
[   14.624677]  __kasan_kmalloc+0xb7/0xc0
[   14.625007]  __kmalloc_cache_noprof+0x189/0x420
[   14.625229]  kasan_atomics+0x95/0x310
[   14.625499]  kunit_try_run_case+0x1a5/0x480
[   14.625669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.626104]  kthread+0x337/0x6f0
[   14.626336]  ret_from_fork+0x41/0x80
[   14.626610]  ret_from_fork_asm+0x1a/0x30
[   14.626799] 
[   14.626930] The buggy address belongs to the object at ffff888103a31d80
[   14.626930]  which belongs to the cache kmalloc-64 of size 64
[   14.627659] The buggy address is located 0 bytes to the right of
[   14.627659]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.628296] 
[   14.628379] The buggy address belongs to the physical page:
[   14.628611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.629179] flags: 0x200000000000000(node=0|zone=2)
[   14.629403] page_type: f5(slab)
[   14.629717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.630162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.630568] page dumped because: kasan: bad access detected
[   14.630818] 
[   14.630994] Memory state around the buggy address:
[   14.631263]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.631543]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.632002] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.632286]                                      ^
[   14.632602]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.633009]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.633266] ==================================================================
[   14.375905] ==================================================================
[   14.376241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.376573] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.376994] 
[   14.377101] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.377150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.377162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.377182] Call Trace:
[   14.377194]  <TASK>
[   14.377208]  dump_stack_lvl+0x73/0xb0
[   14.377231]  print_report+0xd1/0x610
[   14.377254]  ? __virt_addr_valid+0x1db/0x2d0
[   14.377275]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.377296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.377319]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.377342]  kasan_report+0x141/0x180
[   14.377365]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.377392]  kasan_check_range+0x10c/0x1c0
[   14.377413]  __kasan_check_write+0x18/0x20
[   14.377433]  kasan_atomics_helper+0x1a7f/0x5450
[   14.377456]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.377479]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.377500]  ? ret_from_fork_asm+0x1a/0x30
[   14.377521]  ? kasan_atomics+0x152/0x310
[   14.377545]  kasan_atomics+0x1dc/0x310
[   14.377564]  ? __pfx_kasan_atomics+0x10/0x10
[   14.377585]  ? __pfx_read_tsc+0x10/0x10
[   14.377605]  ? ktime_get_ts64+0x86/0x230
[   14.377629]  kunit_try_run_case+0x1a5/0x480
[   14.377650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.377669]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.377694]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.377718]  ? __kthread_parkme+0x82/0x180
[   14.377741]  ? preempt_count_sub+0x50/0x80
[   14.377766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.377786]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.377818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.377842]  kthread+0x337/0x6f0
[   14.377860]  ? trace_preempt_on+0x20/0xc0
[   14.377893]  ? __pfx_kthread+0x10/0x10
[   14.377912]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.377935]  ? calculate_sigpending+0x7b/0xa0
[   14.377958]  ? __pfx_kthread+0x10/0x10
[   14.377978]  ret_from_fork+0x41/0x80
[   14.377999]  ? __pfx_kthread+0x10/0x10
[   14.378017]  ret_from_fork_asm+0x1a/0x30
[   14.378048]  </TASK>
[   14.378059] 
[   14.385274] Allocated by task 284:
[   14.385532]  kasan_save_stack+0x45/0x70
[   14.385680]  kasan_save_track+0x18/0x40
[   14.385822]  kasan_save_alloc_info+0x3b/0x50
[   14.386038]  __kasan_kmalloc+0xb7/0xc0
[   14.386227]  __kmalloc_cache_noprof+0x189/0x420
[   14.386405]  kasan_atomics+0x95/0x310
[   14.386584]  kunit_try_run_case+0x1a5/0x480
[   14.386726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.386997]  kthread+0x337/0x6f0
[   14.387219]  ret_from_fork+0x41/0x80
[   14.387382]  ret_from_fork_asm+0x1a/0x30
[   14.387561] 
[   14.387629] The buggy address belongs to the object at ffff888103a31d80
[   14.387629]  which belongs to the cache kmalloc-64 of size 64
[   14.388150] The buggy address is located 0 bytes to the right of
[   14.388150]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.388550] 
[   14.388641] The buggy address belongs to the physical page:
[   14.388995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.389345] flags: 0x200000000000000(node=0|zone=2)
[   14.389542] page_type: f5(slab)
[   14.389675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.390054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.390312] page dumped because: kasan: bad access detected
[   14.390477] 
[   14.390543] Memory state around the buggy address:
[   14.390691]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.390959]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.391268] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.391570]                                      ^
[   14.391799]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.392129]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.392348] ==================================================================
[   14.524551] ==================================================================
[   14.525027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   14.525264] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.525591] 
[   14.525696] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.525738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.525749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.525769] Call Trace:
[   14.525783]  <TASK>
[   14.525797]  dump_stack_lvl+0x73/0xb0
[   14.525821]  print_report+0xd1/0x610
[   14.525843]  ? __virt_addr_valid+0x1db/0x2d0
[   14.525864]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.525897]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.525921]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.525943]  kasan_report+0x141/0x180
[   14.525966]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.525993]  kasan_check_range+0x10c/0x1c0
[   14.526014]  __kasan_check_write+0x18/0x20
[   14.526034]  kasan_atomics_helper+0x1eaa/0x5450
[   14.526057]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.526079]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.526101]  ? ret_from_fork_asm+0x1a/0x30
[   14.526122]  ? kasan_atomics+0x152/0x310
[   14.526146]  kasan_atomics+0x1dc/0x310
[   14.526166]  ? __pfx_kasan_atomics+0x10/0x10
[   14.526187]  ? __pfx_read_tsc+0x10/0x10
[   14.526206]  ? ktime_get_ts64+0x86/0x230
[   14.526230]  kunit_try_run_case+0x1a5/0x480
[   14.526250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.526269]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.526293]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.526317]  ? __kthread_parkme+0x82/0x180
[   14.526339]  ? preempt_count_sub+0x50/0x80
[   14.526364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.526384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.526407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.526431]  kthread+0x337/0x6f0
[   14.526448]  ? trace_preempt_on+0x20/0xc0
[   14.526471]  ? __pfx_kthread+0x10/0x10
[   14.526489]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.526511]  ? calculate_sigpending+0x7b/0xa0
[   14.526532]  ? __pfx_kthread+0x10/0x10
[   14.526551]  ret_from_fork+0x41/0x80
[   14.526571]  ? __pfx_kthread+0x10/0x10
[   14.526589]  ret_from_fork_asm+0x1a/0x30
[   14.526619]  </TASK>
[   14.526630] 
[   14.534356] Allocated by task 284:
[   14.534503]  kasan_save_stack+0x45/0x70
[   14.534664]  kasan_save_track+0x18/0x40
[   14.534852]  kasan_save_alloc_info+0x3b/0x50
[   14.535098]  __kasan_kmalloc+0xb7/0xc0
[   14.535247]  __kmalloc_cache_noprof+0x189/0x420
[   14.535454]  kasan_atomics+0x95/0x310
[   14.535582]  kunit_try_run_case+0x1a5/0x480
[   14.535731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.536064]  kthread+0x337/0x6f0
[   14.536261]  ret_from_fork+0x41/0x80
[   14.536408]  ret_from_fork_asm+0x1a/0x30
[   14.536546] 
[   14.536615] The buggy address belongs to the object at ffff888103a31d80
[   14.536615]  which belongs to the cache kmalloc-64 of size 64
[   14.537404] The buggy address is located 0 bytes to the right of
[   14.537404]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.537786] 
[   14.537856] The buggy address belongs to the physical page:
[   14.538247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.538596] flags: 0x200000000000000(node=0|zone=2)
[   14.538844] page_type: f5(slab)
[   14.539003] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.539258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.539480] page dumped because: kasan: bad access detected
[   14.539691] 
[   14.539785] Memory state around the buggy address:
[   14.540264]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.540558]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.540770] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.541210]                                      ^
[   14.541428]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.541639]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.542031] ==================================================================
[   14.735132] ==================================================================
[   14.735474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   14.735807] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.736151] 
[   14.736248] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.736291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.736303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.736324] Call Trace:
[   14.736338]  <TASK>
[   14.736351]  dump_stack_lvl+0x73/0xb0
[   14.736374]  print_report+0xd1/0x610
[   14.736397]  ? __virt_addr_valid+0x1db/0x2d0
[   14.736418]  ? kasan_atomics_helper+0x5115/0x5450
[   14.736441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.736463]  ? kasan_atomics_helper+0x5115/0x5450
[   14.736487]  kasan_report+0x141/0x180
[   14.736510]  ? kasan_atomics_helper+0x5115/0x5450
[   14.736537]  __asan_report_load8_noabort+0x18/0x20
[   14.736559]  kasan_atomics_helper+0x5115/0x5450
[   14.736583]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.736605]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.736627]  ? ret_from_fork_asm+0x1a/0x30
[   14.736648]  ? kasan_atomics+0x152/0x310
[   14.736672]  kasan_atomics+0x1dc/0x310
[   14.736691]  ? __pfx_kasan_atomics+0x10/0x10
[   14.736712]  ? __pfx_read_tsc+0x10/0x10
[   14.736756]  ? ktime_get_ts64+0x86/0x230
[   14.736781]  kunit_try_run_case+0x1a5/0x480
[   14.736825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.736845]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.736869]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.736904]  ? __kthread_parkme+0x82/0x180
[   14.736927]  ? preempt_count_sub+0x50/0x80
[   14.736951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.736972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.736996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.737019]  kthread+0x337/0x6f0
[   14.737036]  ? trace_preempt_on+0x20/0xc0
[   14.737059]  ? __pfx_kthread+0x10/0x10
[   14.737077]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.737099]  ? calculate_sigpending+0x7b/0xa0
[   14.737121]  ? __pfx_kthread+0x10/0x10
[   14.737144]  ret_from_fork+0x41/0x80
[   14.737164]  ? __pfx_kthread+0x10/0x10
[   14.737183]  ret_from_fork_asm+0x1a/0x30
[   14.737213]  </TASK>
[   14.737223] 
[   14.744632] Allocated by task 284:
[   14.744839]  kasan_save_stack+0x45/0x70
[   14.745072]  kasan_save_track+0x18/0x40
[   14.745275]  kasan_save_alloc_info+0x3b/0x50
[   14.745485]  __kasan_kmalloc+0xb7/0xc0
[   14.745676]  __kmalloc_cache_noprof+0x189/0x420
[   14.745933]  kasan_atomics+0x95/0x310
[   14.746136]  kunit_try_run_case+0x1a5/0x480
[   14.746324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.746569]  kthread+0x337/0x6f0
[   14.746737]  ret_from_fork+0x41/0x80
[   14.746904]  ret_from_fork_asm+0x1a/0x30
[   14.747043] 
[   14.747113] The buggy address belongs to the object at ffff888103a31d80
[   14.747113]  which belongs to the cache kmalloc-64 of size 64
[   14.747564] The buggy address is located 0 bytes to the right of
[   14.747564]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.748145] 
[   14.748239] The buggy address belongs to the physical page:
[   14.748487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.748818] flags: 0x200000000000000(node=0|zone=2)
[   14.748991] page_type: f5(slab)
[   14.749111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.749460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.749843] page dumped because: kasan: bad access detected
[   14.750090] 
[   14.750159] Memory state around the buggy address:
[   14.750310]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.750524]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.750852] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.751195]                                      ^
[   14.751393]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.751610]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.751853] ==================================================================
[   13.953668] ==================================================================
[   13.954077] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   13.954311] Read of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.954531] 
[   13.954613] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.954653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.954665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.954685] Call Trace:
[   13.954698]  <TASK>
[   13.954711]  dump_stack_lvl+0x73/0xb0
[   13.954733]  print_report+0xd1/0x610
[   13.954755]  ? __virt_addr_valid+0x1db/0x2d0
[   13.954775]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.954797]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.954820]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.954843]  kasan_report+0x141/0x180
[   13.954866]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.954904]  __asan_report_load4_noabort+0x18/0x20
[   13.954940]  kasan_atomics_helper+0x4a36/0x5450
[   13.954964]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.954987]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.955020]  ? ret_from_fork_asm+0x1a/0x30
[   13.955042]  ? kasan_atomics+0x152/0x310
[   13.955066]  kasan_atomics+0x1dc/0x310
[   13.955085]  ? __pfx_kasan_atomics+0x10/0x10
[   13.955115]  ? __pfx_read_tsc+0x10/0x10
[   13.955135]  ? ktime_get_ts64+0x86/0x230
[   13.955159]  kunit_try_run_case+0x1a5/0x480
[   13.955192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.955212]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.955236]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.955260]  ? __kthread_parkme+0x82/0x180
[   13.955282]  ? preempt_count_sub+0x50/0x80
[   13.955306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.955327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.955351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.955374]  kthread+0x337/0x6f0
[   13.955391]  ? trace_preempt_on+0x20/0xc0
[   13.955414]  ? __pfx_kthread+0x10/0x10
[   13.955441]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.955464]  ? calculate_sigpending+0x7b/0xa0
[   13.955485]  ? __pfx_kthread+0x10/0x10
[   13.955514]  ret_from_fork+0x41/0x80
[   13.955535]  ? __pfx_kthread+0x10/0x10
[   13.955553]  ret_from_fork_asm+0x1a/0x30
[   13.955584]  </TASK>
[   13.955594] 
[   13.968063] Allocated by task 284:
[   13.968331]  kasan_save_stack+0x45/0x70
[   13.968538]  kasan_save_track+0x18/0x40
[   13.968747]  kasan_save_alloc_info+0x3b/0x50
[   13.968901]  __kasan_kmalloc+0xb7/0xc0
[   13.969040]  __kmalloc_cache_noprof+0x189/0x420
[   13.969289]  kasan_atomics+0x95/0x310
[   13.969472]  kunit_try_run_case+0x1a5/0x480
[   13.969636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.969809]  kthread+0x337/0x6f0
[   13.969987]  ret_from_fork+0x41/0x80
[   13.970176]  ret_from_fork_asm+0x1a/0x30
[   13.970405] 
[   13.970515] The buggy address belongs to the object at ffff888103a31d80
[   13.970515]  which belongs to the cache kmalloc-64 of size 64
[   13.970933] The buggy address is located 0 bytes to the right of
[   13.970933]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.971517] 
[   13.971626] The buggy address belongs to the physical page:
[   13.971876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.972222] flags: 0x200000000000000(node=0|zone=2)
[   13.972458] page_type: f5(slab)
[   13.972612] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.972841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.973214] page dumped because: kasan: bad access detected
[   13.973462] 
[   13.973704] Memory state around the buggy address:
[   13.973947]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.974269]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.974583] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.974918]                                      ^
[   13.975116]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.975357]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.975568] ==================================================================
[   13.398389] ==================================================================
[   13.398790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.399335] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.399697] 
[   13.399808] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.399851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.399863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.399930] Call Trace:
[   13.399945]  <TASK>
[   13.399959]  dump_stack_lvl+0x73/0xb0
[   13.399983]  print_report+0xd1/0x610
[   13.400005]  ? __virt_addr_valid+0x1db/0x2d0
[   13.400025]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.400046]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.400068]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.400117]  kasan_report+0x141/0x180
[   13.400163]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.400189]  __asan_report_store4_noabort+0x1b/0x30
[   13.400209]  kasan_atomics_helper+0x4ba2/0x5450
[   13.400232]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.400254]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.400273]  ? ret_from_fork_asm+0x1a/0x30
[   13.400294]  ? kasan_atomics+0x152/0x310
[   13.400316]  kasan_atomics+0x1dc/0x310
[   13.400334]  ? __pfx_kasan_atomics+0x10/0x10
[   13.400354]  ? __pfx_read_tsc+0x10/0x10
[   13.400373]  ? ktime_get_ts64+0x86/0x230
[   13.400397]  kunit_try_run_case+0x1a5/0x480
[   13.400417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.400435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.400459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.400483]  ? __kthread_parkme+0x82/0x180
[   13.400504]  ? preempt_count_sub+0x50/0x80
[   13.400528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.400547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.400570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.400592]  kthread+0x337/0x6f0
[   13.400609]  ? trace_preempt_on+0x20/0xc0
[   13.400631]  ? __pfx_kthread+0x10/0x10
[   13.400649]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.400670]  ? calculate_sigpending+0x7b/0xa0
[   13.400691]  ? __pfx_kthread+0x10/0x10
[   13.400723]  ret_from_fork+0x41/0x80
[   13.400743]  ? __pfx_kthread+0x10/0x10
[   13.400760]  ret_from_fork_asm+0x1a/0x30
[   13.400790]  </TASK>
[   13.400799] 
[   13.412621] Allocated by task 284:
[   13.413048]  kasan_save_stack+0x45/0x70
[   13.413419]  kasan_save_track+0x18/0x40
[   13.413598]  kasan_save_alloc_info+0x3b/0x50
[   13.413964]  __kasan_kmalloc+0xb7/0xc0
[   13.414300]  __kmalloc_cache_noprof+0x189/0x420
[   13.414715]  kasan_atomics+0x95/0x310
[   13.414964]  kunit_try_run_case+0x1a5/0x480
[   13.415385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.415601]  kthread+0x337/0x6f0
[   13.416083]  ret_from_fork+0x41/0x80
[   13.416259]  ret_from_fork_asm+0x1a/0x30
[   13.416555] 
[   13.416741] The buggy address belongs to the object at ffff888103a31d80
[   13.416741]  which belongs to the cache kmalloc-64 of size 64
[   13.417424] The buggy address is located 0 bytes to the right of
[   13.417424]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.418253] 
[   13.418341] The buggy address belongs to the physical page:
[   13.418828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.419385] flags: 0x200000000000000(node=0|zone=2)
[   13.419732] page_type: f5(slab)
[   13.420042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.420615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.421076] page dumped because: kasan: bad access detected
[   13.421574] 
[   13.421735] Memory state around the buggy address:
[   13.421905]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.422657]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.423327] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.423709]                                      ^
[   13.424220]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.424527]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.424937] ==================================================================
[   14.676632] ==================================================================
[   14.677144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   14.677677] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.678128] 
[   14.678336] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.678384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.678396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.678417] Call Trace:
[   14.678434]  <TASK>
[   14.678449]  dump_stack_lvl+0x73/0xb0
[   14.678474]  print_report+0xd1/0x610
[   14.678497]  ? __virt_addr_valid+0x1db/0x2d0
[   14.678519]  ? kasan_atomics_helper+0x218a/0x5450
[   14.678541]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.678564]  ? kasan_atomics_helper+0x218a/0x5450
[   14.678587]  kasan_report+0x141/0x180
[   14.678610]  ? kasan_atomics_helper+0x218a/0x5450
[   14.678637]  kasan_check_range+0x10c/0x1c0
[   14.678658]  __kasan_check_write+0x18/0x20
[   14.678678]  kasan_atomics_helper+0x218a/0x5450
[   14.678702]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.678725]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.678745]  ? ret_from_fork_asm+0x1a/0x30
[   14.678767]  ? kasan_atomics+0x152/0x310
[   14.678790]  kasan_atomics+0x1dc/0x310
[   14.679006]  ? __pfx_kasan_atomics+0x10/0x10
[   14.679034]  ? __pfx_read_tsc+0x10/0x10
[   14.679054]  ? ktime_get_ts64+0x86/0x230
[   14.679080]  kunit_try_run_case+0x1a5/0x480
[   14.679103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.679122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.679147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.679171]  ? __kthread_parkme+0x82/0x180
[   14.679193]  ? preempt_count_sub+0x50/0x80
[   14.679218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.679238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.679262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.679286]  kthread+0x337/0x6f0
[   14.679303]  ? trace_preempt_on+0x20/0xc0
[   14.679326]  ? __pfx_kthread+0x10/0x10
[   14.679344]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.679367]  ? calculate_sigpending+0x7b/0xa0
[   14.679388]  ? __pfx_kthread+0x10/0x10
[   14.679407]  ret_from_fork+0x41/0x80
[   14.679428]  ? __pfx_kthread+0x10/0x10
[   14.679446]  ret_from_fork_asm+0x1a/0x30
[   14.679476]  </TASK>
[   14.679487] 
[   14.689556] Allocated by task 284:
[   14.689964]  kasan_save_stack+0x45/0x70
[   14.690160]  kasan_save_track+0x18/0x40
[   14.690444]  kasan_save_alloc_info+0x3b/0x50
[   14.690655]  __kasan_kmalloc+0xb7/0xc0
[   14.690831]  __kmalloc_cache_noprof+0x189/0x420
[   14.691198]  kasan_atomics+0x95/0x310
[   14.691378]  kunit_try_run_case+0x1a5/0x480
[   14.691680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.691963]  kthread+0x337/0x6f0
[   14.692243]  ret_from_fork+0x41/0x80
[   14.692417]  ret_from_fork_asm+0x1a/0x30
[   14.692593] 
[   14.692693] The buggy address belongs to the object at ffff888103a31d80
[   14.692693]  which belongs to the cache kmalloc-64 of size 64
[   14.693400] The buggy address is located 0 bytes to the right of
[   14.693400]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.694033] 
[   14.694278] The buggy address belongs to the physical page:
[   14.694510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.695020] flags: 0x200000000000000(node=0|zone=2)
[   14.695251] page_type: f5(slab)
[   14.695472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.695753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.696250] page dumped because: kasan: bad access detected
[   14.696548] 
[   14.696638] Memory state around the buggy address:
[   14.696815]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.697320]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.697625] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.698042]                                      ^
[   14.698201]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.698623]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.698996] ==================================================================
[   13.935339] ==================================================================
[   13.935689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   13.935933] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.936597] 
[   13.936680] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.936721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.936732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.936752] Call Trace:
[   13.936765]  <TASK>
[   13.936780]  dump_stack_lvl+0x73/0xb0
[   13.936803]  print_report+0xd1/0x610
[   13.936825]  ? __virt_addr_valid+0x1db/0x2d0
[   13.936847]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.936868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.936902]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.936924]  kasan_report+0x141/0x180
[   13.936947]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.936975]  kasan_check_range+0x10c/0x1c0
[   13.936996]  __kasan_check_write+0x18/0x20
[   13.937016]  kasan_atomics_helper+0xfa9/0x5450
[   13.937039]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.937062]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.937083]  ? ret_from_fork_asm+0x1a/0x30
[   13.937104]  ? kasan_atomics+0x152/0x310
[   13.937132]  kasan_atomics+0x1dc/0x310
[   13.937152]  ? __pfx_kasan_atomics+0x10/0x10
[   13.937173]  ? __pfx_read_tsc+0x10/0x10
[   13.937192]  ? ktime_get_ts64+0x86/0x230
[   13.937217]  kunit_try_run_case+0x1a5/0x480
[   13.937238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.937257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.937281]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.937306]  ? __kthread_parkme+0x82/0x180
[   13.937327]  ? preempt_count_sub+0x50/0x80
[   13.937353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.937373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.937396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.937420]  kthread+0x337/0x6f0
[   13.937437]  ? trace_preempt_on+0x20/0xc0
[   13.937460]  ? __pfx_kthread+0x10/0x10
[   13.937478]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.937500]  ? calculate_sigpending+0x7b/0xa0
[   13.937521]  ? __pfx_kthread+0x10/0x10
[   13.937540]  ret_from_fork+0x41/0x80
[   13.937560]  ? __pfx_kthread+0x10/0x10
[   13.937578]  ret_from_fork_asm+0x1a/0x30
[   13.937608]  </TASK>
[   13.937619] 
[   13.945576] Allocated by task 284:
[   13.945716]  kasan_save_stack+0x45/0x70
[   13.945859]  kasan_save_track+0x18/0x40
[   13.946004]  kasan_save_alloc_info+0x3b/0x50
[   13.946148]  __kasan_kmalloc+0xb7/0xc0
[   13.946279]  __kmalloc_cache_noprof+0x189/0x420
[   13.946429]  kasan_atomics+0x95/0x310
[   13.946557]  kunit_try_run_case+0x1a5/0x480
[   13.946819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.947098]  kthread+0x337/0x6f0
[   13.947265]  ret_from_fork+0x41/0x80
[   13.947443]  ret_from_fork_asm+0x1a/0x30
[   13.947636] 
[   13.947730] The buggy address belongs to the object at ffff888103a31d80
[   13.947730]  which belongs to the cache kmalloc-64 of size 64
[   13.948404] The buggy address is located 0 bytes to the right of
[   13.948404]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.948766] 
[   13.948902] The buggy address belongs to the physical page:
[   13.949161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.949543] flags: 0x200000000000000(node=0|zone=2)
[   13.949802] page_type: f5(slab)
[   13.949973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.950305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.950533] page dumped because: kasan: bad access detected
[   13.950718] 
[   13.950810] Memory state around the buggy address:
[   13.951060]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.951395]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.951739] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.952155]                                      ^
[   13.952386]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.952687]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.953091] ==================================================================
[   13.639269] ==================================================================
[   13.639590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   13.640107] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.640608] 
[   13.640782] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.640827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.640840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.640860] Call Trace:
[   13.640874]  <TASK>
[   13.640899]  dump_stack_lvl+0x73/0xb0
[   13.640924]  print_report+0xd1/0x610
[   13.640946]  ? __virt_addr_valid+0x1db/0x2d0
[   13.640967]  ? kasan_atomics_helper+0x697/0x5450
[   13.640999]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.641041]  ? kasan_atomics_helper+0x697/0x5450
[   13.641064]  kasan_report+0x141/0x180
[   13.641087]  ? kasan_atomics_helper+0x697/0x5450
[   13.641114]  kasan_check_range+0x10c/0x1c0
[   13.641142]  __kasan_check_write+0x18/0x20
[   13.641161]  kasan_atomics_helper+0x697/0x5450
[   13.641186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.641209]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.641229]  ? ret_from_fork_asm+0x1a/0x30
[   13.641318]  ? kasan_atomics+0x152/0x310
[   13.641353]  kasan_atomics+0x1dc/0x310
[   13.641373]  ? __pfx_kasan_atomics+0x10/0x10
[   13.641394]  ? __pfx_read_tsc+0x10/0x10
[   13.641413]  ? ktime_get_ts64+0x86/0x230
[   13.641437]  kunit_try_run_case+0x1a5/0x480
[   13.641459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.641478]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.641502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.641526]  ? __kthread_parkme+0x82/0x180
[   13.641548]  ? preempt_count_sub+0x50/0x80
[   13.641573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.641592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.641615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.641639]  kthread+0x337/0x6f0
[   13.641655]  ? trace_preempt_on+0x20/0xc0
[   13.641679]  ? __pfx_kthread+0x10/0x10
[   13.641697]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.641720]  ? calculate_sigpending+0x7b/0xa0
[   13.641741]  ? __pfx_kthread+0x10/0x10
[   13.641760]  ret_from_fork+0x41/0x80
[   13.641780]  ? __pfx_kthread+0x10/0x10
[   13.641799]  ret_from_fork_asm+0x1a/0x30
[   13.641829]  </TASK>
[   13.641840] 
[   13.650241] Allocated by task 284:
[   13.650422]  kasan_save_stack+0x45/0x70
[   13.650674]  kasan_save_track+0x18/0x40
[   13.651053]  kasan_save_alloc_info+0x3b/0x50
[   13.651286]  __kasan_kmalloc+0xb7/0xc0
[   13.651476]  __kmalloc_cache_noprof+0x189/0x420
[   13.651689]  kasan_atomics+0x95/0x310
[   13.651981]  kunit_try_run_case+0x1a5/0x480
[   13.652258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.652445]  kthread+0x337/0x6f0
[   13.652561]  ret_from_fork+0x41/0x80
[   13.652796]  ret_from_fork_asm+0x1a/0x30
[   13.652999] 
[   13.653095] The buggy address belongs to the object at ffff888103a31d80
[   13.653095]  which belongs to the cache kmalloc-64 of size 64
[   13.653571] The buggy address is located 0 bytes to the right of
[   13.653571]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.654139] 
[   13.654317] The buggy address belongs to the physical page:
[   13.654572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.655137] flags: 0x200000000000000(node=0|zone=2)
[   13.655363] page_type: f5(slab)
[   13.655556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.656014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.656343] page dumped because: kasan: bad access detected
[   13.656571] 
[   13.656741] Memory state around the buggy address:
[   13.657015]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.657238]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.657450] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.657818]                                      ^
[   13.658061]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.658376]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.658847] ==================================================================
[   14.126995] ==================================================================
[   14.127498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.127845] Read of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.128189] 
[   14.128302] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.128343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.128355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.128615] Call Trace:
[   14.128636]  <TASK>
[   14.128650]  dump_stack_lvl+0x73/0xb0
[   14.128676]  print_report+0xd1/0x610
[   14.128708]  ? __virt_addr_valid+0x1db/0x2d0
[   14.128730]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.128752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.128775]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.128798]  kasan_report+0x141/0x180
[   14.128821]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.128848]  kasan_check_range+0x10c/0x1c0
[   14.128869]  __kasan_check_read+0x15/0x20
[   14.128903]  kasan_atomics_helper+0x13b5/0x5450
[   14.128927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.128950]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.128971]  ? ret_from_fork_asm+0x1a/0x30
[   14.128992]  ? kasan_atomics+0x152/0x310
[   14.129016]  kasan_atomics+0x1dc/0x310
[   14.129035]  ? __pfx_kasan_atomics+0x10/0x10
[   14.129057]  ? __pfx_read_tsc+0x10/0x10
[   14.129077]  ? ktime_get_ts64+0x86/0x230
[   14.129102]  kunit_try_run_case+0x1a5/0x480
[   14.129123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.129151]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.129175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.129200]  ? __kthread_parkme+0x82/0x180
[   14.129221]  ? preempt_count_sub+0x50/0x80
[   14.129246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.129267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.129291]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.129315]  kthread+0x337/0x6f0
[   14.129332]  ? trace_preempt_on+0x20/0xc0
[   14.129355]  ? __pfx_kthread+0x10/0x10
[   14.129374]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.129396]  ? calculate_sigpending+0x7b/0xa0
[   14.129418]  ? __pfx_kthread+0x10/0x10
[   14.129436]  ret_from_fork+0x41/0x80
[   14.129457]  ? __pfx_kthread+0x10/0x10
[   14.129475]  ret_from_fork_asm+0x1a/0x30
[   14.129505]  </TASK>
[   14.129515] 
[   14.137173] Allocated by task 284:
[   14.137351]  kasan_save_stack+0x45/0x70
[   14.137524]  kasan_save_track+0x18/0x40
[   14.137659]  kasan_save_alloc_info+0x3b/0x50
[   14.137803]  __kasan_kmalloc+0xb7/0xc0
[   14.138003]  __kmalloc_cache_noprof+0x189/0x420
[   14.138228]  kasan_atomics+0x95/0x310
[   14.138410]  kunit_try_run_case+0x1a5/0x480
[   14.138606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.138779]  kthread+0x337/0x6f0
[   14.139134]  ret_from_fork+0x41/0x80
[   14.139318]  ret_from_fork_asm+0x1a/0x30
[   14.139486] 
[   14.139578] The buggy address belongs to the object at ffff888103a31d80
[   14.139578]  which belongs to the cache kmalloc-64 of size 64
[   14.140085] The buggy address is located 0 bytes to the right of
[   14.140085]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.140591] 
[   14.140674] The buggy address belongs to the physical page:
[   14.140890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.141132] flags: 0x200000000000000(node=0|zone=2)
[   14.141291] page_type: f5(slab)
[   14.141407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.141634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.142353] page dumped because: kasan: bad access detected
[   14.142608] 
[   14.142699] Memory state around the buggy address:
[   14.143074]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.143396]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.143714] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.144086]                                      ^
[   14.144287]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.144564]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.144774] ==================================================================
[   14.287181] ==================================================================
[   14.287518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.287888] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.288111] 
[   14.288193] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.288233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.288245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.288265] Call Trace:
[   14.288277]  <TASK>
[   14.288291]  dump_stack_lvl+0x73/0xb0
[   14.288313]  print_report+0xd1/0x610
[   14.288336]  ? __virt_addr_valid+0x1db/0x2d0
[   14.288357]  ? kasan_atomics_helper+0x1818/0x5450
[   14.288379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.288401]  ? kasan_atomics_helper+0x1818/0x5450
[   14.288424]  kasan_report+0x141/0x180
[   14.288447]  ? kasan_atomics_helper+0x1818/0x5450
[   14.288474]  kasan_check_range+0x10c/0x1c0
[   14.288495]  __kasan_check_write+0x18/0x20
[   14.288515]  kasan_atomics_helper+0x1818/0x5450
[   14.288539]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.288562]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.288583]  ? ret_from_fork_asm+0x1a/0x30
[   14.288604]  ? kasan_atomics+0x152/0x310
[   14.288627]  kasan_atomics+0x1dc/0x310
[   14.288647]  ? __pfx_kasan_atomics+0x10/0x10
[   14.288668]  ? __pfx_read_tsc+0x10/0x10
[   14.288688]  ? ktime_get_ts64+0x86/0x230
[   14.288712]  kunit_try_run_case+0x1a5/0x480
[   14.288734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.288753]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.288777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.288822]  ? __kthread_parkme+0x82/0x180
[   14.288844]  ? preempt_count_sub+0x50/0x80
[   14.288869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.288897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.288921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.288944]  kthread+0x337/0x6f0
[   14.288962]  ? trace_preempt_on+0x20/0xc0
[   14.288985]  ? __pfx_kthread+0x10/0x10
[   14.289003]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.289025]  ? calculate_sigpending+0x7b/0xa0
[   14.289047]  ? __pfx_kthread+0x10/0x10
[   14.289065]  ret_from_fork+0x41/0x80
[   14.289086]  ? __pfx_kthread+0x10/0x10
[   14.289104]  ret_from_fork_asm+0x1a/0x30
[   14.289138]  </TASK>
[   14.289149] 
[   14.296447] Allocated by task 284:
[   14.296574]  kasan_save_stack+0x45/0x70
[   14.296767]  kasan_save_track+0x18/0x40
[   14.296969]  kasan_save_alloc_info+0x3b/0x50
[   14.297179]  __kasan_kmalloc+0xb7/0xc0
[   14.297364]  __kmalloc_cache_noprof+0x189/0x420
[   14.297579]  kasan_atomics+0x95/0x310
[   14.297759]  kunit_try_run_case+0x1a5/0x480
[   14.299443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.299728]  kthread+0x337/0x6f0
[   14.299937]  ret_from_fork+0x41/0x80
[   14.300120]  ret_from_fork_asm+0x1a/0x30
[   14.300317] 
[   14.300412] The buggy address belongs to the object at ffff888103a31d80
[   14.300412]  which belongs to the cache kmalloc-64 of size 64
[   14.300769] The buggy address is located 0 bytes to the right of
[   14.300769]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.302125] 
[   14.302242] The buggy address belongs to the physical page:
[   14.302695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.303326] flags: 0x200000000000000(node=0|zone=2)
[   14.303678] page_type: f5(slab)
[   14.304073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.304580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.305225] page dumped because: kasan: bad access detected
[   14.305537] 
[   14.305638] Memory state around the buggy address:
[   14.306060]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.306494]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.306996] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.307476]                                      ^
[   14.307701]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.308211]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.308517] ==================================================================
[   13.523723] ==================================================================
[   13.524240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.524477] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.525414] 
[   13.525532] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.525576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.525588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.525608] Call Trace:
[   13.525621]  <TASK>
[   13.525637]  dump_stack_lvl+0x73/0xb0
[   13.525662]  print_report+0xd1/0x610
[   13.525706]  ? __virt_addr_valid+0x1db/0x2d0
[   13.525727]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.525749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.525773]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.525795]  kasan_report+0x141/0x180
[   13.525819]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.525845]  kasan_check_range+0x10c/0x1c0
[   13.525866]  __kasan_check_write+0x18/0x20
[   13.525898]  kasan_atomics_helper+0x4a0/0x5450
[   13.525922]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.525944]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.525965]  ? ret_from_fork_asm+0x1a/0x30
[   13.525986]  ? kasan_atomics+0x152/0x310
[   13.526010]  kasan_atomics+0x1dc/0x310
[   13.526029]  ? __pfx_kasan_atomics+0x10/0x10
[   13.526050]  ? __pfx_read_tsc+0x10/0x10
[   13.526069]  ? ktime_get_ts64+0x86/0x230
[   13.526094]  kunit_try_run_case+0x1a5/0x480
[   13.526115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.526134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.526158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.526182]  ? __kthread_parkme+0x82/0x180
[   13.526204]  ? preempt_count_sub+0x50/0x80
[   13.526228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.526249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.526272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.526296]  kthread+0x337/0x6f0
[   13.526312]  ? trace_preempt_on+0x20/0xc0
[   13.526335]  ? __pfx_kthread+0x10/0x10
[   13.526354]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.526376]  ? calculate_sigpending+0x7b/0xa0
[   13.526397]  ? __pfx_kthread+0x10/0x10
[   13.526416]  ret_from_fork+0x41/0x80
[   13.526436]  ? __pfx_kthread+0x10/0x10
[   13.526454]  ret_from_fork_asm+0x1a/0x30
[   13.526484]  </TASK>
[   13.526495] 
[   13.535826] Allocated by task 284:
[   13.536537]  kasan_save_stack+0x45/0x70
[   13.537448]  kasan_save_track+0x18/0x40
[   13.537925]  kasan_save_alloc_info+0x3b/0x50
[   13.538385]  __kasan_kmalloc+0xb7/0xc0
[   13.538807]  __kmalloc_cache_noprof+0x189/0x420
[   13.539301]  kasan_atomics+0x95/0x310
[   13.539670]  kunit_try_run_case+0x1a5/0x480
[   13.540197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.540796]  kthread+0x337/0x6f0
[   13.541194]  ret_from_fork+0x41/0x80
[   13.541676]  ret_from_fork_asm+0x1a/0x30
[   13.542178] 
[   13.542257] The buggy address belongs to the object at ffff888103a31d80
[   13.542257]  which belongs to the cache kmalloc-64 of size 64
[   13.542595] The buggy address is located 0 bytes to the right of
[   13.542595]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.543646] 
[   13.543931] The buggy address belongs to the physical page:
[   13.544456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.545184] flags: 0x200000000000000(node=0|zone=2)
[   13.545495] page_type: f5(slab)
[   13.545617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.546186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.546615] page dumped because: kasan: bad access detected
[   13.547185] 
[   13.547368] Memory state around the buggy address:
[   13.547590]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.548312]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.549064] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.549646]                                      ^
[   13.550151]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.550704]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.551325] ==================================================================
[   14.487382] ==================================================================
[   14.487854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   14.488110] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.488379] 
[   14.488509] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.488553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.488565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.488585] Call Trace:
[   14.488598]  <TASK>
[   14.488612]  dump_stack_lvl+0x73/0xb0
[   14.488635]  print_report+0xd1/0x610
[   14.488657]  ? __virt_addr_valid+0x1db/0x2d0
[   14.488678]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.488700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.488722]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.488745]  kasan_report+0x141/0x180
[   14.488768]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.488795]  kasan_check_range+0x10c/0x1c0
[   14.488816]  __kasan_check_write+0x18/0x20
[   14.488857]  kasan_atomics_helper+0x1d7a/0x5450
[   14.488890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.488913]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.488933]  ? ret_from_fork_asm+0x1a/0x30
[   14.488955]  ? kasan_atomics+0x152/0x310
[   14.488978]  kasan_atomics+0x1dc/0x310
[   14.488997]  ? __pfx_kasan_atomics+0x10/0x10
[   14.489037]  ? __pfx_read_tsc+0x10/0x10
[   14.489057]  ? ktime_get_ts64+0x86/0x230
[   14.489081]  kunit_try_run_case+0x1a5/0x480
[   14.489102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.489121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.489149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.489174]  ? __kthread_parkme+0x82/0x180
[   14.489196]  ? preempt_count_sub+0x50/0x80
[   14.489220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.489241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.489264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.489288]  kthread+0x337/0x6f0
[   14.489304]  ? trace_preempt_on+0x20/0xc0
[   14.489328]  ? __pfx_kthread+0x10/0x10
[   14.489346]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.489368]  ? calculate_sigpending+0x7b/0xa0
[   14.489390]  ? __pfx_kthread+0x10/0x10
[   14.489409]  ret_from_fork+0x41/0x80
[   14.489429]  ? __pfx_kthread+0x10/0x10
[   14.489466]  ret_from_fork_asm+0x1a/0x30
[   14.489496]  </TASK>
[   14.489506] 
[   14.497328] Allocated by task 284:
[   14.497521]  kasan_save_stack+0x45/0x70
[   14.497931]  kasan_save_track+0x18/0x40
[   14.498165]  kasan_save_alloc_info+0x3b/0x50
[   14.498377]  __kasan_kmalloc+0xb7/0xc0
[   14.498511]  __kmalloc_cache_noprof+0x189/0x420
[   14.498662]  kasan_atomics+0x95/0x310
[   14.498841]  kunit_try_run_case+0x1a5/0x480
[   14.499058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.499309]  kthread+0x337/0x6f0
[   14.499475]  ret_from_fork+0x41/0x80
[   14.499655]  ret_from_fork_asm+0x1a/0x30
[   14.499921] 
[   14.500024] The buggy address belongs to the object at ffff888103a31d80
[   14.500024]  which belongs to the cache kmalloc-64 of size 64
[   14.500456] The buggy address is located 0 bytes to the right of
[   14.500456]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.501026] 
[   14.501096] The buggy address belongs to the physical page:
[   14.501275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.501512] flags: 0x200000000000000(node=0|zone=2)
[   14.501672] page_type: f5(slab)
[   14.501847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.502203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.502547] page dumped because: kasan: bad access detected
[   14.502832] 
[   14.502956] Memory state around the buggy address:
[   14.503201]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.503455]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.503699] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.504022]                                      ^
[   14.504222]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.504434]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.504710] ==================================================================
[   13.805198] ==================================================================
[   13.805564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   13.805935] Write of size 4 at addr ffff888103a31db0 by task kunit_try_catch/284
[   13.806258] 
[   13.806393] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   13.806438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.806450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.806470] Call Trace:
[   13.806485]  <TASK>
[   13.806500]  dump_stack_lvl+0x73/0xb0
[   13.806524]  print_report+0xd1/0x610
[   13.806557]  ? __virt_addr_valid+0x1db/0x2d0
[   13.806580]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.806613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.806638]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.806663]  kasan_report+0x141/0x180
[   13.806687]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.806716]  kasan_check_range+0x10c/0x1c0
[   13.806739]  __kasan_check_write+0x18/0x20
[   13.806760]  kasan_atomics_helper+0xb6a/0x5450
[   13.806785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.806818]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.806841]  ? ret_from_fork_asm+0x1a/0x30
[   13.806863]  ? kasan_atomics+0x152/0x310
[   13.806897]  kasan_atomics+0x1dc/0x310
[   13.806918]  ? __pfx_kasan_atomics+0x10/0x10
[   13.806941]  ? __pfx_read_tsc+0x10/0x10
[   13.806961]  ? ktime_get_ts64+0x86/0x230
[   13.806996]  kunit_try_run_case+0x1a5/0x480
[   13.807019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.807039]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.807075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.807102]  ? __kthread_parkme+0x82/0x180
[   13.807125]  ? preempt_count_sub+0x50/0x80
[   13.807160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.807183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.807208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.807244]  kthread+0x337/0x6f0
[   13.807262]  ? trace_preempt_on+0x20/0xc0
[   13.807286]  ? __pfx_kthread+0x10/0x10
[   13.807314]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.807338]  ? calculate_sigpending+0x7b/0xa0
[   13.807361]  ? __pfx_kthread+0x10/0x10
[   13.807391]  ret_from_fork+0x41/0x80
[   13.807412]  ? __pfx_kthread+0x10/0x10
[   13.807432]  ret_from_fork_asm+0x1a/0x30
[   13.807463]  </TASK>
[   13.807474] 
[   13.815453] Allocated by task 284:
[   13.815580]  kasan_save_stack+0x45/0x70
[   13.815721]  kasan_save_track+0x18/0x40
[   13.815856]  kasan_save_alloc_info+0x3b/0x50
[   13.816010]  __kasan_kmalloc+0xb7/0xc0
[   13.816228]  __kmalloc_cache_noprof+0x189/0x420
[   13.816449]  kasan_atomics+0x95/0x310
[   13.816632]  kunit_try_run_case+0x1a5/0x480
[   13.816837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.817245]  kthread+0x337/0x6f0
[   13.817412]  ret_from_fork+0x41/0x80
[   13.817577]  ret_from_fork_asm+0x1a/0x30
[   13.817715] 
[   13.817785] The buggy address belongs to the object at ffff888103a31d80
[   13.817785]  which belongs to the cache kmalloc-64 of size 64
[   13.818324] The buggy address is located 0 bytes to the right of
[   13.818324]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   13.818739] 
[   13.818811] The buggy address belongs to the physical page:
[   13.819065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   13.819456] flags: 0x200000000000000(node=0|zone=2)
[   13.819719] page_type: f5(slab)
[   13.819923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.820251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.820588] page dumped because: kasan: bad access detected
[   13.820820] 
[   13.820946] Memory state around the buggy address:
[   13.821159]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.821460]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.821762] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.822072]                                      ^
[   13.822311]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.822611]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.823006] ==================================================================
[   14.392755] ==================================================================
[   14.393231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.393572] Write of size 8 at addr ffff888103a31db0 by task kunit_try_catch/284
[   14.393916] 
[   14.394431] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT(voluntary) 
[   14.394477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.394490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.394509] Call Trace:
[   14.394524]  <TASK>
[   14.394538]  dump_stack_lvl+0x73/0xb0
[   14.394563]  print_report+0xd1/0x610
[   14.394585]  ? __virt_addr_valid+0x1db/0x2d0
[   14.394606]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.394628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.394650]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.394673]  kasan_report+0x141/0x180
[   14.394696]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.394723]  kasan_check_range+0x10c/0x1c0
[   14.394744]  __kasan_check_write+0x18/0x20
[   14.394764]  kasan_atomics_helper+0x1b22/0x5450
[   14.394787]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.395061]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.395091]  ? ret_from_fork_asm+0x1a/0x30
[   14.395114]  ? kasan_atomics+0x152/0x310
[   14.395138]  kasan_atomics+0x1dc/0x310
[   14.395158]  ? __pfx_kasan_atomics+0x10/0x10
[   14.395180]  ? __pfx_read_tsc+0x10/0x10
[   14.395200]  ? ktime_get_ts64+0x86/0x230
[   14.395224]  kunit_try_run_case+0x1a5/0x480
[   14.395245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.395264]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.395288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.395312]  ? __kthread_parkme+0x82/0x180
[   14.395334]  ? preempt_count_sub+0x50/0x80
[   14.395358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.395379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.395402]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.395426]  kthread+0x337/0x6f0
[   14.395443]  ? trace_preempt_on+0x20/0xc0
[   14.395467]  ? __pfx_kthread+0x10/0x10
[   14.395485]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.395507]  ? calculate_sigpending+0x7b/0xa0
[   14.395528]  ? __pfx_kthread+0x10/0x10
[   14.395546]  ret_from_fork+0x41/0x80
[   14.395567]  ? __pfx_kthread+0x10/0x10
[   14.395585]  ret_from_fork_asm+0x1a/0x30
[   14.395616]  </TASK>
[   14.395627] 
[   14.413576] Allocated by task 284:
[   14.413711]  kasan_save_stack+0x45/0x70
[   14.414123]  kasan_save_track+0x18/0x40
[   14.414546]  kasan_save_alloc_info+0x3b/0x50
[   14.415127]  __kasan_kmalloc+0xb7/0xc0
[   14.415652]  __kmalloc_cache_noprof+0x189/0x420
[   14.416234]  kasan_atomics+0x95/0x310
[   14.416377]  kunit_try_run_case+0x1a5/0x480
[   14.416525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.416704]  kthread+0x337/0x6f0
[   14.416828]  ret_from_fork+0x41/0x80
[   14.417030]  ret_from_fork_asm+0x1a/0x30
[   14.417242] 
[   14.417315] The buggy address belongs to the object at ffff888103a31d80
[   14.417315]  which belongs to the cache kmalloc-64 of size 64
[   14.417789] The buggy address is located 0 bytes to the right of
[   14.417789]  allocated 48-byte region [ffff888103a31d80, ffff888103a31db0)
[   14.418280] 
[   14.418379] The buggy address belongs to the physical page:
[   14.418638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a31
[   14.418900] flags: 0x200000000000000(node=0|zone=2)
[   14.419134] page_type: f5(slab)
[   14.419306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.419545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.420213] page dumped because: kasan: bad access detected
[   14.420450] 
[   14.420567] Memory state around the buggy address:
[   14.420809]  ffff888103a31c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.421065]  ffff888103a31d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.421378] >ffff888103a31d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.421710]                                      ^
[   14.421939]  ffff888103a31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.422270]  ffff888103a31e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.422565] ==================================================================