Hay
Date
July 22, 2025, 2:40 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.775635] ==================================================================
[   19.775687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.775754] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.775846] 
[   19.775884] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.775967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.776020] Hardware name: linux,dummy-virt (DT)
[   19.776054] Call trace:
[   19.776079]  show_stack+0x20/0x38 (C)
[   19.776126]  dump_stack_lvl+0x8c/0xd0
[   19.776177]  print_report+0x118/0x5d0
[   19.776223]  kasan_report+0xdc/0x128
[   19.776318]  kasan_check_range+0x100/0x1a8
[   19.776371]  __kasan_check_write+0x20/0x30
[   19.776420]  kasan_atomics_helper+0xa6c/0x4858
[   19.776579]  kasan_atomics+0x198/0x2e0
[   19.776640]  kunit_try_run_case+0x170/0x3f0
[   19.776690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.776742]  kthread+0x328/0x630
[   19.776787]  ret_from_fork+0x10/0x20
[   19.776836] 
[   19.776869] Allocated by task 267:
[   19.776899]  kasan_save_stack+0x3c/0x68
[   19.776949]  kasan_save_track+0x20/0x40
[   19.777188]  kasan_save_alloc_info+0x40/0x58
[   19.777300]  __kasan_kmalloc+0xd4/0xd8
[   19.777342]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.777382]  kasan_atomics+0xb8/0x2e0
[   19.777426]  kunit_try_run_case+0x170/0x3f0
[   19.777469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.777513]  kthread+0x328/0x630
[   19.777551]  ret_from_fork+0x10/0x20
[   19.777590] 
[   19.777747] The buggy address belongs to the object at fff00000c7a1ae00
[   19.777747]  which belongs to the cache kmalloc-64 of size 64
[   19.777842] The buggy address is located 0 bytes to the right of
[   19.777842]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.777947] 
[   19.777970] The buggy address belongs to the physical page:
[   19.778029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.778147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.778306] page_type: f5(slab)
[   19.778356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.778409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.778451] page dumped because: kasan: bad access detected
[   19.778486] 
[   19.778506] Memory state around the buggy address:
[   19.778539]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.778626]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.778672] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.778825]                                      ^
[   19.778888]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.778988]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.779102] ==================================================================
[   20.010070] ==================================================================
[   20.010139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.010866] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.010943] 
[   20.010997] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.011771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.011838] Hardware name: linux,dummy-virt (DT)
[   20.011873] Call trace:
[   20.011897]  show_stack+0x20/0x38 (C)
[   20.011950]  dump_stack_lvl+0x8c/0xd0
[   20.012240]  print_report+0x118/0x5d0
[   20.012590]  kasan_report+0xdc/0x128
[   20.012771]  kasan_check_range+0x100/0x1a8
[   20.012883]  __kasan_check_write+0x20/0x30
[   20.012934]  kasan_atomics_helper+0x1190/0x4858
[   20.013241]  kasan_atomics+0x198/0x2e0
[   20.013718]  kunit_try_run_case+0x170/0x3f0
[   20.013912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.014004]  kthread+0x328/0x630
[   20.014458]  ret_from_fork+0x10/0x20
[   20.014878] 
[   20.014978] Allocated by task 267:
[   20.015054]  kasan_save_stack+0x3c/0x68
[   20.015131]  kasan_save_track+0x20/0x40
[   20.015321]  kasan_save_alloc_info+0x40/0x58
[   20.015568]  __kasan_kmalloc+0xd4/0xd8
[   20.015844]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.015916]  kasan_atomics+0xb8/0x2e0
[   20.015979]  kunit_try_run_case+0x170/0x3f0
[   20.016857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.016937]  kthread+0x328/0x630
[   20.016998]  ret_from_fork+0x10/0x20
[   20.017071] 
[   20.017120] The buggy address belongs to the object at fff00000c7a1ae00
[   20.017120]  which belongs to the cache kmalloc-64 of size 64
[   20.017554] The buggy address is located 0 bytes to the right of
[   20.017554]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.017650] 
[   20.017809] The buggy address belongs to the physical page:
[   20.018125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.018291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.018344] page_type: f5(slab)
[   20.018384] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.018736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.019091] page dumped because: kasan: bad access detected
[   20.019262] 
[   20.019301] Memory state around the buggy address:
[   20.019338]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.019686]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.019935] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.020143]                                      ^
[   20.020193]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.020391]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.020550] ==================================================================
[   20.069896] ==================================================================
[   20.070231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.070309] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.070362] 
[   20.070527] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.070657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.071047] Hardware name: linux,dummy-virt (DT)
[   20.071102] Call trace:
[   20.071314]  show_stack+0x20/0x38 (C)
[   20.071692]  dump_stack_lvl+0x8c/0xd0
[   20.071799]  print_report+0x118/0x5d0
[   20.071963]  kasan_report+0xdc/0x128
[   20.072181]  kasan_check_range+0x100/0x1a8
[   20.072337]  __kasan_check_write+0x20/0x30
[   20.072549]  kasan_atomics_helper+0x1414/0x4858
[   20.072623]  kasan_atomics+0x198/0x2e0
[   20.072668]  kunit_try_run_case+0x170/0x3f0
[   20.072888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.073020]  kthread+0x328/0x630
[   20.073434]  ret_from_fork+0x10/0x20
[   20.073671] 
[   20.073797] Allocated by task 267:
[   20.073864]  kasan_save_stack+0x3c/0x68
[   20.074621]  kasan_save_track+0x20/0x40
[   20.074806]  kasan_save_alloc_info+0x40/0x58
[   20.074894]  __kasan_kmalloc+0xd4/0xd8
[   20.075046]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.075238]  kasan_atomics+0xb8/0x2e0
[   20.075469]  kunit_try_run_case+0x170/0x3f0
[   20.075542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.076405]  kthread+0x328/0x630
[   20.076507]  ret_from_fork+0x10/0x20
[   20.076568] 
[   20.076623] The buggy address belongs to the object at fff00000c7a1ae00
[   20.076623]  which belongs to the cache kmalloc-64 of size 64
[   20.076729] The buggy address is located 0 bytes to the right of
[   20.076729]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.077175] 
[   20.077227] The buggy address belongs to the physical page:
[   20.077304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.077540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.077597] page_type: f5(slab)
[   20.077990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.078383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.078535] page dumped because: kasan: bad access detected
[   20.078888] 
[   20.078949] Memory state around the buggy address:
[   20.079108]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.079300]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.079697] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.079903]                                      ^
[   20.079945]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.080408]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.080717] ==================================================================
[   20.138991] ==================================================================
[   20.139312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.139376] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.139586] 
[   20.139808] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.140025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.140060] Hardware name: linux,dummy-virt (DT)
[   20.140106] Call trace:
[   20.140138]  show_stack+0x20/0x38 (C)
[   20.140365]  dump_stack_lvl+0x8c/0xd0
[   20.140437]  print_report+0x118/0x5d0
[   20.140738]  kasan_report+0xdc/0x128
[   20.141026]  __asan_report_load8_noabort+0x20/0x30
[   20.141095]  kasan_atomics_helper+0x3df4/0x4858
[   20.141344]  kasan_atomics+0x198/0x2e0
[   20.141646]  kunit_try_run_case+0x170/0x3f0
[   20.141754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.141932]  kthread+0x328/0x630
[   20.142032]  ret_from_fork+0x10/0x20
[   20.142085] 
[   20.142169] Allocated by task 267:
[   20.142213]  kasan_save_stack+0x3c/0x68
[   20.142255]  kasan_save_track+0x20/0x40
[   20.142442]  kasan_save_alloc_info+0x40/0x58
[   20.142610]  __kasan_kmalloc+0xd4/0xd8
[   20.142902]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.142968]  kasan_atomics+0xb8/0x2e0
[   20.143123]  kunit_try_run_case+0x170/0x3f0
[   20.143307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.143537]  kthread+0x328/0x630
[   20.143590]  ret_from_fork+0x10/0x20
[   20.143840] 
[   20.143886] The buggy address belongs to the object at fff00000c7a1ae00
[   20.143886]  which belongs to the cache kmalloc-64 of size 64
[   20.144118] The buggy address is located 0 bytes to the right of
[   20.144118]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.144299] 
[   20.144795] The buggy address belongs to the physical page:
[   20.144912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.145357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.145694] page_type: f5(slab)
[   20.145749] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.146129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.146447] page dumped because: kasan: bad access detected
[   20.146620] 
[   20.146667] Memory state around the buggy address:
[   20.146705]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.146985]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.147039] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.147089]                                      ^
[   20.147127]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.147331]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.147461] ==================================================================
[   20.001787] ==================================================================
[   20.002041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.002126] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.002180] 
[   20.002241] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.002396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.002428] Hardware name: linux,dummy-virt (DT)
[   20.002492] Call trace:
[   20.002517]  show_stack+0x20/0x38 (C)
[   20.002783]  dump_stack_lvl+0x8c/0xd0
[   20.003219]  print_report+0x118/0x5d0
[   20.003556]  kasan_report+0xdc/0x128
[   20.003639]  kasan_check_range+0x100/0x1a8
[   20.003844]  __kasan_check_write+0x20/0x30
[   20.004000]  kasan_atomics_helper+0x1128/0x4858
[   20.004205]  kasan_atomics+0x198/0x2e0
[   20.004299]  kunit_try_run_case+0x170/0x3f0
[   20.004423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.004679]  kthread+0x328/0x630
[   20.005056]  ret_from_fork+0x10/0x20
[   20.005345] 
[   20.005454] Allocated by task 267:
[   20.005549]  kasan_save_stack+0x3c/0x68
[   20.005820]  kasan_save_track+0x20/0x40
[   20.006098]  kasan_save_alloc_info+0x40/0x58
[   20.006215]  __kasan_kmalloc+0xd4/0xd8
[   20.006429]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.006613]  kasan_atomics+0xb8/0x2e0
[   20.006706]  kunit_try_run_case+0x170/0x3f0
[   20.006786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.007114]  kthread+0x328/0x630
[   20.007352]  ret_from_fork+0x10/0x20
[   20.007419] 
[   20.007653] The buggy address belongs to the object at fff00000c7a1ae00
[   20.007653]  which belongs to the cache kmalloc-64 of size 64
[   20.007848] The buggy address is located 0 bytes to the right of
[   20.007848]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.008249] 
[   20.008313] The buggy address belongs to the physical page:
[   20.008635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.008855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.008915] page_type: f5(slab)
[   20.008955] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.009139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.009215] page dumped because: kasan: bad access detected
[   20.009252] 
[   20.009272] Memory state around the buggy address:
[   20.009327]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.009385]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.009433] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.009474]                                      ^
[   20.009510]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.009553]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.009594] ==================================================================
[   19.624115] ==================================================================
[   19.624964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   19.625128] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.626054]  ret_from_fork+0x10/0x20
[   19.626655]  kasan_atomics+0xb8/0x2e0
[   19.627265] The buggy address is located 0 bytes to the right of
[   19.627265]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.627625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.627887] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.628063] ==================================================================
[   20.119781] ==================================================================
[   20.120014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.120076] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.120130] 
[   20.120390] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.120538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.120569] Hardware name: linux,dummy-virt (DT)
[   20.120603] Call trace:
[   20.120626]  show_stack+0x20/0x38 (C)
[   20.120842]  dump_stack_lvl+0x8c/0xd0
[   20.121190]  print_report+0x118/0x5d0
[   20.121261]  kasan_report+0xdc/0x128
[   20.121324]  __asan_report_load8_noabort+0x20/0x30
[   20.121523]  kasan_atomics_helper+0x3db0/0x4858
[   20.121635]  kasan_atomics+0x198/0x2e0
[   20.121772]  kunit_try_run_case+0x170/0x3f0
[   20.122045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.122360]  kthread+0x328/0x630
[   20.122535]  ret_from_fork+0x10/0x20
[   20.122589] 
[   20.122660] Allocated by task 267:
[   20.122709]  kasan_save_stack+0x3c/0x68
[   20.122778]  kasan_save_track+0x20/0x40
[   20.123003]  kasan_save_alloc_info+0x40/0x58
[   20.123072]  __kasan_kmalloc+0xd4/0xd8
[   20.123318]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.123563]  kasan_atomics+0xb8/0x2e0
[   20.123779]  kunit_try_run_case+0x170/0x3f0
[   20.123912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.124201]  kthread+0x328/0x630
[   20.124337]  ret_from_fork+0x10/0x20
[   20.124789] 
[   20.124955] The buggy address belongs to the object at fff00000c7a1ae00
[   20.124955]  which belongs to the cache kmalloc-64 of size 64
[   20.125173] The buggy address is located 0 bytes to the right of
[   20.125173]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.125463] 
[   20.125603] The buggy address belongs to the physical page:
[   20.125912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.125989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.126480] page_type: f5(slab)
[   20.126637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.126959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.127032] page dumped because: kasan: bad access detected
[   20.127075] 
[   20.127235] Memory state around the buggy address:
[   20.127474]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.127931]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.128047] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.128118]                                      ^
[   20.128336]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.128593]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.128836] ==================================================================
[   20.081688] ==================================================================
[   20.081761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.081875] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.082123] 
[   20.082269] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.082687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.082820] Hardware name: linux,dummy-virt (DT)
[   20.082938] Call trace:
[   20.082999]  show_stack+0x20/0x38 (C)
[   20.083156]  dump_stack_lvl+0x8c/0xd0
[   20.083211]  print_report+0x118/0x5d0
[   20.083259]  kasan_report+0xdc/0x128
[   20.083320]  kasan_check_range+0x100/0x1a8
[   20.083496]  __kasan_check_write+0x20/0x30
[   20.083714]  kasan_atomics_helper+0x147c/0x4858
[   20.084011]  kasan_atomics+0x198/0x2e0
[   20.084222]  kunit_try_run_case+0x170/0x3f0
[   20.084277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.084344]  kthread+0x328/0x630
[   20.084391]  ret_from_fork+0x10/0x20
[   20.084476] 
[   20.084505] Allocated by task 267:
[   20.084537]  kasan_save_stack+0x3c/0x68
[   20.084595]  kasan_save_track+0x20/0x40
[   20.084655]  kasan_save_alloc_info+0x40/0x58
[   20.084705]  __kasan_kmalloc+0xd4/0xd8
[   20.084743]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.084783]  kasan_atomics+0xb8/0x2e0
[   20.084820]  kunit_try_run_case+0x170/0x3f0
[   20.084860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.084912]  kthread+0x328/0x630
[   20.084956]  ret_from_fork+0x10/0x20
[   20.084992] 
[   20.085015] The buggy address belongs to the object at fff00000c7a1ae00
[   20.085015]  which belongs to the cache kmalloc-64 of size 64
[   20.085074] The buggy address is located 0 bytes to the right of
[   20.085074]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.085139] 
[   20.085180] The buggy address belongs to the physical page:
[   20.085221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.085275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.085334] page_type: f5(slab)
[   20.085378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.085437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.088358] page dumped because: kasan: bad access detected
[   20.088639] 
[   20.088983] Memory state around the buggy address:
[   20.089041]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.089151]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.089588] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.089785]                                      ^
[   20.090058]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.090408]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.090756] ==================================================================
[   19.764125] ==================================================================
[   19.764183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.764234] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.764381] 
[   19.764432] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.764515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.764655] Hardware name: linux,dummy-virt (DT)
[   19.764693] Call trace:
[   19.764798]  show_stack+0x20/0x38 (C)
[   19.764897]  dump_stack_lvl+0x8c/0xd0
[   19.764956]  print_report+0x118/0x5d0
[   19.765011]  kasan_report+0xdc/0x128
[   19.765058]  kasan_check_range+0x100/0x1a8
[   19.765134]  __kasan_check_write+0x20/0x30
[   19.765211]  kasan_atomics_helper+0x99c/0x4858
[   19.765261]  kasan_atomics+0x198/0x2e0
[   19.765320]  kunit_try_run_case+0x170/0x3f0
[   19.765370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.765540]  kthread+0x328/0x630
[   19.765593]  ret_from_fork+0x10/0x20
[   19.765642] 
[   19.765662] Allocated by task 267:
[   19.765728]  kasan_save_stack+0x3c/0x68
[   19.765799]  kasan_save_track+0x20/0x40
[   19.765857]  kasan_save_alloc_info+0x40/0x58
[   19.765913]  __kasan_kmalloc+0xd4/0xd8
[   19.765950]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.766006]  kasan_atomics+0xb8/0x2e0
[   19.766053]  kunit_try_run_case+0x170/0x3f0
[   19.766301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.766360]  kthread+0x328/0x630
[   19.766398]  ret_from_fork+0x10/0x20
[   19.766543] 
[   19.766592] The buggy address belongs to the object at fff00000c7a1ae00
[   19.766592]  which belongs to the cache kmalloc-64 of size 64
[   19.766652] The buggy address is located 0 bytes to the right of
[   19.766652]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.766725] 
[   19.766748] The buggy address belongs to the physical page:
[   19.767933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.768023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.768134] page_type: f5(slab)
[   19.768232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.768474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.768589] page dumped because: kasan: bad access detected
[   19.768645] 
[   19.768666] Memory state around the buggy address:
[   19.768908]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.768969]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.769074] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.769163]                                      ^
[   19.769309]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.769411]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.769493] ==================================================================
[   20.062555] ==================================================================
[   20.062652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.062738] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.062854] 
[   20.062928] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.063137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.063411] Hardware name: linux,dummy-virt (DT)
[   20.063772] Call trace:
[   20.063932]  show_stack+0x20/0x38 (C)
[   20.064063]  dump_stack_lvl+0x8c/0xd0
[   20.064120]  print_report+0x118/0x5d0
[   20.064692]  kasan_report+0xdc/0x128
[   20.064862]  __asan_report_load8_noabort+0x20/0x30
[   20.065047]  kasan_atomics_helper+0x3f04/0x4858
[   20.065219]  kasan_atomics+0x198/0x2e0
[   20.065310]  kunit_try_run_case+0x170/0x3f0
[   20.065365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.065418]  kthread+0x328/0x630
[   20.065515]  ret_from_fork+0x10/0x20
[   20.065585] 
[   20.065616] Allocated by task 267:
[   20.065661]  kasan_save_stack+0x3c/0x68
[   20.065710]  kasan_save_track+0x20/0x40
[   20.065747]  kasan_save_alloc_info+0x40/0x58
[   20.065796]  __kasan_kmalloc+0xd4/0xd8
[   20.065832]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.065881]  kasan_atomics+0xb8/0x2e0
[   20.065918]  kunit_try_run_case+0x170/0x3f0
[   20.065958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.065999]  kthread+0x328/0x630
[   20.066053]  ret_from_fork+0x10/0x20
[   20.066093] 
[   20.066115] The buggy address belongs to the object at fff00000c7a1ae00
[   20.066115]  which belongs to the cache kmalloc-64 of size 64
[   20.066180] The buggy address is located 0 bytes to the right of
[   20.066180]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.066260] 
[   20.066301] The buggy address belongs to the physical page:
[   20.066335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.066389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.066439] page_type: f5(slab)
[   20.066479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.066552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.066596] page dumped because: kasan: bad access detected
[   20.066650] 
[   20.066671] Memory state around the buggy address:
[   20.067134]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.067632]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.067706] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.067781]                                      ^
[   20.067858]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.067966]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.068007] ==================================================================
[   19.883618] ==================================================================
[   19.883680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.883735] Read of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.884032] 
[   19.884203] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.884377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.884412] Hardware name: linux,dummy-virt (DT)
[   19.884513] Call trace:
[   19.885068]  show_stack+0x20/0x38 (C)
[   19.885299]  dump_stack_lvl+0x8c/0xd0
[   19.885361]  print_report+0x118/0x5d0
[   19.885440]  kasan_report+0xdc/0x128
[   19.885507]  __asan_report_load4_noabort+0x20/0x30
[   19.885560]  kasan_atomics_helper+0x3dd8/0x4858
[   19.885709]  kasan_atomics+0x198/0x2e0
[   19.885755]  kunit_try_run_case+0x170/0x3f0
[   19.886003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.886120]  kthread+0x328/0x630
[   19.886428]  ret_from_fork+0x10/0x20
[   19.886624] 
[   19.886653] Allocated by task 267:
[   19.886686]  kasan_save_stack+0x3c/0x68
[   19.886729]  kasan_save_track+0x20/0x40
[   19.886837]  kasan_save_alloc_info+0x40/0x58
[   19.886969]  __kasan_kmalloc+0xd4/0xd8
[   19.887028]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.887381]  kasan_atomics+0xb8/0x2e0
[   19.887444]  kunit_try_run_case+0x170/0x3f0
[   19.887487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.887638]  kthread+0x328/0x630
[   19.887693]  ret_from_fork+0x10/0x20
[   19.887731] 
[   19.887761] The buggy address belongs to the object at fff00000c7a1ae00
[   19.887761]  which belongs to the cache kmalloc-64 of size 64
[   19.887822] The buggy address is located 0 bytes to the right of
[   19.887822]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.887887] 
[   19.887919] The buggy address belongs to the physical page:
[   19.887962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.888032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.888082] page_type: f5(slab)
[   19.888144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.888197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.888242] page dumped because: kasan: bad access detected
[   19.888305] 
[   19.888327] Memory state around the buggy address:
[   19.888368]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.888429]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.888481] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.888523]                                      ^
[   19.888562]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.888607]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.888650] ==================================================================
[   19.984102] ==================================================================
[   19.984155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.984493] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.984625] 
[   19.984662] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.984770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.984815] Hardware name: linux,dummy-virt (DT)
[   19.984849] Call trace:
[   19.984878]  show_stack+0x20/0x38 (C)
[   19.984930]  dump_stack_lvl+0x8c/0xd0
[   19.984982]  print_report+0x118/0x5d0
[   19.985029]  kasan_report+0xdc/0x128
[   19.985072]  kasan_check_range+0x100/0x1a8
[   19.985129]  __kasan_check_write+0x20/0x30
[   19.985177]  kasan_atomics_helper+0x1058/0x4858
[   19.985225]  kasan_atomics+0x198/0x2e0
[   19.985268]  kunit_try_run_case+0x170/0x3f0
[   19.985329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.985378]  kthread+0x328/0x630
[   19.985431]  ret_from_fork+0x10/0x20
[   19.985488] 
[   19.985510] Allocated by task 267:
[   19.985539]  kasan_save_stack+0x3c/0x68
[   19.985580]  kasan_save_track+0x20/0x40
[   19.985617]  kasan_save_alloc_info+0x40/0x58
[   19.985665]  __kasan_kmalloc+0xd4/0xd8
[   19.985709]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.985748]  kasan_atomics+0xb8/0x2e0
[   19.985787]  kunit_try_run_case+0x170/0x3f0
[   19.985835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.985878]  kthread+0x328/0x630
[   19.985914]  ret_from_fork+0x10/0x20
[   19.985961] 
[   19.985983] The buggy address belongs to the object at fff00000c7a1ae00
[   19.985983]  which belongs to the cache kmalloc-64 of size 64
[   19.986050] The buggy address is located 0 bytes to the right of
[   19.986050]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.986123] 
[   19.986153] The buggy address belongs to the physical page:
[   19.986186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.986247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.987171] page_type: f5(slab)
[   19.987221] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.987275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.987331] page dumped because: kasan: bad access detected
[   19.987378] 
[   19.987421] Memory state around the buggy address:
[   19.987470]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.987898]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.988252] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.988607]                                      ^
[   19.988671]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.988730]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.989080] ==================================================================
[   20.148785] ==================================================================
[   20.148847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.149156] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.149301] 
[   20.149360] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.149470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.149552] Hardware name: linux,dummy-virt (DT)
[   20.149588] Call trace:
[   20.149642]  show_stack+0x20/0x38 (C)
[   20.149705]  dump_stack_lvl+0x8c/0xd0
[   20.149759]  print_report+0x118/0x5d0
[   20.149995]  kasan_report+0xdc/0x128
[   20.150050]  kasan_check_range+0x100/0x1a8
[   20.150109]  __kasan_check_write+0x20/0x30
[   20.150269]  kasan_atomics_helper+0x16d0/0x4858
[   20.150687]  kasan_atomics+0x198/0x2e0
[   20.150933]  kunit_try_run_case+0x170/0x3f0
[   20.150992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.151045]  kthread+0x328/0x630
[   20.151483]  ret_from_fork+0x10/0x20
[   20.151841] 
[   20.151944] Allocated by task 267:
[   20.151992]  kasan_save_stack+0x3c/0x68
[   20.152082]  kasan_save_track+0x20/0x40
[   20.152124]  kasan_save_alloc_info+0x40/0x58
[   20.152169]  __kasan_kmalloc+0xd4/0xd8
[   20.152222]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.152261]  kasan_atomics+0xb8/0x2e0
[   20.152307]  kunit_try_run_case+0x170/0x3f0
[   20.152370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.152413]  kthread+0x328/0x630
[   20.152450]  ret_from_fork+0x10/0x20
[   20.152488] 
[   20.152516] The buggy address belongs to the object at fff00000c7a1ae00
[   20.152516]  which belongs to the cache kmalloc-64 of size 64
[   20.152577] The buggy address is located 0 bytes to the right of
[   20.152577]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.152658] 
[   20.152698] The buggy address belongs to the physical page:
[   20.152740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.152793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.152842] page_type: f5(slab)
[   20.152890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.152943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.152987] page dumped because: kasan: bad access detected
[   20.153030] 
[   20.153066] Memory state around the buggy address:
[   20.153099]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.153143]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.153189] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.153230]                                      ^
[   20.153265]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.153340]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.154178] ==================================================================
[   20.091922] ==================================================================
[   20.091985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.092040] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.092101] 
[   20.092135] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.092395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.092438] Hardware name: linux,dummy-virt (DT)
[   20.092474] Call trace:
[   20.092499]  show_stack+0x20/0x38 (C)
[   20.092956]  dump_stack_lvl+0x8c/0xd0
[   20.093122]  print_report+0x118/0x5d0
[   20.093194]  kasan_report+0xdc/0x128
[   20.093240]  kasan_check_range+0x100/0x1a8
[   20.093345]  __kasan_check_write+0x20/0x30
[   20.093393]  kasan_atomics_helper+0x14e4/0x4858
[   20.093449]  kasan_atomics+0x198/0x2e0
[   20.093500]  kunit_try_run_case+0x170/0x3f0
[   20.093683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.093909]  kthread+0x328/0x630
[   20.093972]  ret_from_fork+0x10/0x20
[   20.094194] 
[   20.094230] Allocated by task 267:
[   20.094361]  kasan_save_stack+0x3c/0x68
[   20.095401]  kasan_save_track+0x20/0x40
[   20.095696]  kasan_save_alloc_info+0x40/0x58
[   20.095816]  __kasan_kmalloc+0xd4/0xd8
[   20.095895]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.096539]  kasan_atomics+0xb8/0x2e0
[   20.096614]  kunit_try_run_case+0x170/0x3f0
[   20.096667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.096761]  kthread+0x328/0x630
[   20.096827]  ret_from_fork+0x10/0x20
[   20.096899] 
[   20.097459] The buggy address belongs to the object at fff00000c7a1ae00
[   20.097459]  which belongs to the cache kmalloc-64 of size 64
[   20.097525] The buggy address is located 0 bytes to the right of
[   20.097525]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.098181] 
[   20.098314] The buggy address belongs to the physical page:
[   20.098354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.098437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.098809] page_type: f5(slab)
[   20.099042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.099301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.099358] page dumped because: kasan: bad access detected
[   20.099539] 
[   20.099633] Memory state around the buggy address:
[   20.099799]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.099861]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.100091] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.100429]                                      ^
[   20.100540]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.101001]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.101181] ==================================================================
[   20.102020] ==================================================================
[   20.102597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.102669] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.102934] 
[   20.103349] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.103463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.103492] Hardware name: linux,dummy-virt (DT)
[   20.103528] Call trace:
[   20.103552]  show_stack+0x20/0x38 (C)
[   20.103604]  dump_stack_lvl+0x8c/0xd0
[   20.103656]  print_report+0x118/0x5d0
[   20.104085]  kasan_report+0xdc/0x128
[   20.104443]  kasan_check_range+0x100/0x1a8
[   20.104568]  __kasan_check_write+0x20/0x30
[   20.104688]  kasan_atomics_helper+0x154c/0x4858
[   20.104827]  kasan_atomics+0x198/0x2e0
[   20.104875]  kunit_try_run_case+0x170/0x3f0
[   20.104981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.105328]  kthread+0x328/0x630
[   20.105581]  ret_from_fork+0x10/0x20
[   20.105853] 
[   20.105911] Allocated by task 267:
[   20.105990]  kasan_save_stack+0x3c/0x68
[   20.106053]  kasan_save_track+0x20/0x40
[   20.106254]  kasan_save_alloc_info+0x40/0x58
[   20.106480]  __kasan_kmalloc+0xd4/0xd8
[   20.106678]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.106853]  kasan_atomics+0xb8/0x2e0
[   20.106942]  kunit_try_run_case+0x170/0x3f0
[   20.107049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.107233]  kthread+0x328/0x630
[   20.107598]  ret_from_fork+0x10/0x20
[   20.107732] 
[   20.107858] The buggy address belongs to the object at fff00000c7a1ae00
[   20.107858]  which belongs to the cache kmalloc-64 of size 64
[   20.108075] The buggy address is located 0 bytes to the right of
[   20.108075]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.108148] 
[   20.108394] The buggy address belongs to the physical page:
[   20.108967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.109470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.109750] page_type: f5(slab)
[   20.109821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.110138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.110330] page dumped because: kasan: bad access detected
[   20.110562] 
[   20.110761] Memory state around the buggy address:
[   20.110802]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.110849]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.110894] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.111494]                                      ^
[   20.111663]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.111890]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.112175] ==================================================================
[   20.184815] ==================================================================
[   20.185230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.185310] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.185361] 
[   20.185461] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.185557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.185586] Hardware name: linux,dummy-virt (DT)
[   20.185827] Call trace:
[   20.186133]  show_stack+0x20/0x38 (C)
[   20.186207]  dump_stack_lvl+0x8c/0xd0
[   20.186354]  print_report+0x118/0x5d0
[   20.186425]  kasan_report+0xdc/0x128
[   20.186753]  kasan_check_range+0x100/0x1a8
[   20.187022]  __kasan_check_write+0x20/0x30
[   20.187243]  kasan_atomics_helper+0x17ec/0x4858
[   20.187314]  kasan_atomics+0x198/0x2e0
[   20.187486]  kunit_try_run_case+0x170/0x3f0
[   20.187570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.187624]  kthread+0x328/0x630
[   20.187966]  ret_from_fork+0x10/0x20
[   20.188376] 
[   20.188469] Allocated by task 267:
[   20.188538]  kasan_save_stack+0x3c/0x68
[   20.188582]  kasan_save_track+0x20/0x40
[   20.188659]  kasan_save_alloc_info+0x40/0x58
[   20.189057]  __kasan_kmalloc+0xd4/0xd8
[   20.189397]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.189587]  kasan_atomics+0xb8/0x2e0
[   20.189706]  kunit_try_run_case+0x170/0x3f0
[   20.189832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.190494]  kthread+0x328/0x630
[   20.190749]  ret_from_fork+0x10/0x20
[   20.190833] 
[   20.190867] The buggy address belongs to the object at fff00000c7a1ae00
[   20.190867]  which belongs to the cache kmalloc-64 of size 64
[   20.190987] The buggy address is located 0 bytes to the right of
[   20.190987]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.191142] 
[   20.191232] The buggy address belongs to the physical page:
[   20.191385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.191484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.191589] page_type: f5(slab)
[   20.191797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.192052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.192319] page dumped because: kasan: bad access detected
[   20.192512] 
[   20.192577] Memory state around the buggy address:
[   20.192660]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.192707]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.192753] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.192804]                                      ^
[   20.192841]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.192897]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.192936] ==================================================================
[   20.027500] ==================================================================
[   20.028025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.028150] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.028323] 
[   20.028360] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.028982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.029032] Hardware name: linux,dummy-virt (DT)
[   20.029087] Call trace:
[   20.029138]  show_stack+0x20/0x38 (C)
[   20.029316]  dump_stack_lvl+0x8c/0xd0
[   20.029578]  print_report+0x118/0x5d0
[   20.029771]  kasan_report+0xdc/0x128
[   20.029982]  kasan_check_range+0x100/0x1a8
[   20.030259]  __kasan_check_write+0x20/0x30
[   20.031854]  kasan_atomics_helper+0x126c/0x4858
[   20.031971]  kasan_atomics+0x198/0x2e0
[   20.032532]  kunit_try_run_case+0x170/0x3f0
[   20.032830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.035162]  kthread+0x328/0x630
[   20.035386]  ret_from_fork+0x10/0x20
[   20.035439] 
[   20.035460] Allocated by task 267:
[   20.035638]  kasan_save_stack+0x3c/0x68
[   20.035971]  kasan_save_track+0x20/0x40
[   20.036574]  kasan_save_alloc_info+0x40/0x58
[   20.036855]  __kasan_kmalloc+0xd4/0xd8
[   20.036916]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.037030]  kasan_atomics+0xb8/0x2e0
[   20.037126]  kunit_try_run_case+0x170/0x3f0
[   20.037255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.037669]  kthread+0x328/0x630
[   20.037831]  ret_from_fork+0x10/0x20
[   20.038001] 
[   20.038034] The buggy address belongs to the object at fff00000c7a1ae00
[   20.038034]  which belongs to the cache kmalloc-64 of size 64
[   20.038148] The buggy address is located 0 bytes to the right of
[   20.038148]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.038354] 
[   20.038644] The buggy address belongs to the physical page:
[   20.038962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.039051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.039720] page_type: f5(slab)
[   20.039773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.040317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.040515] page dumped because: kasan: bad access detected
[   20.040558] 
[   20.040692] Memory state around the buggy address:
[   20.040959]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.041138]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.041399] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.041454]                                      ^
[   20.041492]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.042317]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.042441] ==================================================================
[   19.756381] ==================================================================
[   19.756433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.756482] Read of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.756532] 
[   19.756562] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.756641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.756669] Hardware name: linux,dummy-virt (DT)
[   19.756701] Call trace:
[   19.756724]  show_stack+0x20/0x38 (C)
[   19.756772]  dump_stack_lvl+0x8c/0xd0
[   19.756823]  print_report+0x118/0x5d0
[   19.756873]  kasan_report+0xdc/0x128
[   19.756918]  __asan_report_load4_noabort+0x20/0x30
[   19.757105]  kasan_atomics_helper+0x42d8/0x4858
[   19.757161]  kasan_atomics+0x198/0x2e0
[   19.757205]  kunit_try_run_case+0x170/0x3f0
[   19.757255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.757321]  kthread+0x328/0x630
[   19.757375]  ret_from_fork+0x10/0x20
[   19.757430] 
[   19.757450] Allocated by task 267:
[   19.757478]  kasan_save_stack+0x3c/0x68
[   19.757654]  kasan_save_track+0x20/0x40
[   19.757694]  kasan_save_alloc_info+0x40/0x58
[   19.757734]  __kasan_kmalloc+0xd4/0xd8
[   19.758026]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.758118]  kasan_atomics+0xb8/0x2e0
[   19.758175]  kunit_try_run_case+0x170/0x3f0
[   19.758215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.758271]  kthread+0x328/0x630
[   19.758320]  ret_from_fork+0x10/0x20
[   19.758368] 
[   19.758391] The buggy address belongs to the object at fff00000c7a1ae00
[   19.758391]  which belongs to the cache kmalloc-64 of size 64
[   19.758449] The buggy address is located 0 bytes to the right of
[   19.758449]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.758777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.759065]                                      ^
[   19.759193] ==================================================================
[   19.946184] ==================================================================
[   19.946315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.946535] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.946648] 
[   19.946698] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.946855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.946902] Hardware name: linux,dummy-virt (DT)
[   19.946935] Call trace:
[   19.947099]  show_stack+0x20/0x38 (C)
[   19.947159]  dump_stack_lvl+0x8c/0xd0
[   19.947467]  print_report+0x118/0x5d0
[   19.947916]  kasan_report+0xdc/0x128
[   19.948073]  kasan_check_range+0x100/0x1a8
[   19.948181]  __kasan_check_write+0x20/0x30
[   19.948367]  kasan_atomics_helper+0xeb8/0x4858
[   19.948437]  kasan_atomics+0x198/0x2e0
[   19.948659]  kunit_try_run_case+0x170/0x3f0
[   19.949069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.949183]  kthread+0x328/0x630
[   19.949465]  ret_from_fork+0x10/0x20
[   19.949644] 
[   19.949669] Allocated by task 267:
[   19.949759]  kasan_save_stack+0x3c/0x68
[   19.950017]  kasan_save_track+0x20/0x40
[   19.950295]  kasan_save_alloc_info+0x40/0x58
[   19.951100]  __kasan_kmalloc+0xd4/0xd8
[   19.951152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.951192]  kasan_atomics+0xb8/0x2e0
[   19.951227]  kunit_try_run_case+0x170/0x3f0
[   19.951269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.951324]  kthread+0x328/0x630
[   19.951363]  ret_from_fork+0x10/0x20
[   19.951401] 
[   19.951647] The buggy address belongs to the object at fff00000c7a1ae00
[   19.951647]  which belongs to the cache kmalloc-64 of size 64
[   19.951973] The buggy address is located 0 bytes to the right of
[   19.951973]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.952211] 
[   19.952245] The buggy address belongs to the physical page:
[   19.952719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.952964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.953083] page_type: f5(slab)
[   19.953124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.953726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.953823] page dumped because: kasan: bad access detected
[   19.953908] 
[   19.953930] Memory state around the buggy address:
[   19.954148]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.954236]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.954636] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.954798]                                      ^
[   19.954926]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.954989]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.955191] ==================================================================
[   19.769864] ==================================================================
[   19.769940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   19.770054] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.770106] 
[   19.770166] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.770275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.770335] Hardware name: linux,dummy-virt (DT)
[   19.770390] Call trace:
[   19.770415]  show_stack+0x20/0x38 (C)
[   19.770482]  dump_stack_lvl+0x8c/0xd0
[   19.770573]  print_report+0x118/0x5d0
[   19.770618]  kasan_report+0xdc/0x128
[   19.770664]  kasan_check_range+0x100/0x1a8
[   19.770711]  __kasan_check_write+0x20/0x30
[   19.770760]  kasan_atomics_helper+0xa04/0x4858
[   19.770807]  kasan_atomics+0x198/0x2e0
[   19.771475]  kunit_try_run_case+0x170/0x3f0
[   19.771588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.771905]  kthread+0x328/0x630
[   19.772000]  ret_from_fork+0x10/0x20
[   19.772080] 
[   19.772129] Allocated by task 267:
[   19.772218]  kasan_save_stack+0x3c/0x68
[   19.772332]  kasan_save_track+0x20/0x40
[   19.772398]  kasan_save_alloc_info+0x40/0x58
[   19.772439]  __kasan_kmalloc+0xd4/0xd8
[   19.772476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.772629]  kasan_atomics+0xb8/0x2e0
[   19.772673]  kunit_try_run_case+0x170/0x3f0
[   19.772715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.772759]  kthread+0x328/0x630
[   19.772840]  ret_from_fork+0x10/0x20
[   19.772945] 
[   19.772976] The buggy address belongs to the object at fff00000c7a1ae00
[   19.772976]  which belongs to the cache kmalloc-64 of size 64
[   19.773157] The buggy address is located 0 bytes to the right of
[   19.773157]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.773291] 
[   19.773314] The buggy address belongs to the physical page:
[   19.773346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.773521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.773579] page_type: f5(slab)
[   19.773616] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.773701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.773846] page dumped because: kasan: bad access detected
[   19.773923] 
[   19.774009] Memory state around the buggy address:
[   19.774065]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.774137]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.774182] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.774384]                                      ^
[   19.774452]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.774498]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.774785] ==================================================================
[   19.967647] ==================================================================
[   19.967700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.967754] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.968162] 
[   19.968305] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.968434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.968614] Hardware name: linux,dummy-virt (DT)
[   19.968660] Call trace:
[   19.968865]  show_stack+0x20/0x38 (C)
[   19.968935]  dump_stack_lvl+0x8c/0xd0
[   19.968988]  print_report+0x118/0x5d0
[   19.969041]  kasan_report+0xdc/0x128
[   19.969087]  kasan_check_range+0x100/0x1a8
[   19.969201]  __kasan_check_write+0x20/0x30
[   19.969256]  kasan_atomics_helper+0xf88/0x4858
[   19.969596]  kasan_atomics+0x198/0x2e0
[   19.969648]  kunit_try_run_case+0x170/0x3f0
[   19.969995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.970098]  kthread+0x328/0x630
[   19.970209]  ret_from_fork+0x10/0x20
[   19.970263] 
[   19.970296] Allocated by task 267:
[   19.970361]  kasan_save_stack+0x3c/0x68
[   19.970431]  kasan_save_track+0x20/0x40
[   19.970469]  kasan_save_alloc_info+0x40/0x58
[   19.970632]  __kasan_kmalloc+0xd4/0xd8
[   19.970813]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.971144]  kasan_atomics+0xb8/0x2e0
[   19.971212]  kunit_try_run_case+0x170/0x3f0
[   19.971459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.971605]  kthread+0x328/0x630
[   19.971682]  ret_from_fork+0x10/0x20
[   19.971739] 
[   19.971761] The buggy address belongs to the object at fff00000c7a1ae00
[   19.971761]  which belongs to the cache kmalloc-64 of size 64
[   19.971822] The buggy address is located 0 bytes to the right of
[   19.971822]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.971887] 
[   19.972171] The buggy address belongs to the physical page:
[   19.972547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.972835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.973057] page_type: f5(slab)
[   19.973123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.973317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.973489] page dumped because: kasan: bad access detected
[   19.973757] 
[   19.973818] Memory state around the buggy address:
[   19.973977]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.974026]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.974081] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.974129]                                      ^
[   19.974178]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.974239]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.974292] ==================================================================
[   19.912987] ==================================================================
[   19.913135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.913188] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.913632] 
[   19.913716] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.914076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.914231] Hardware name: linux,dummy-virt (DT)
[   19.914279] Call trace:
[   19.914318]  show_stack+0x20/0x38 (C)
[   19.914578]  dump_stack_lvl+0x8c/0xd0
[   19.914811]  print_report+0x118/0x5d0
[   19.914961]  kasan_report+0xdc/0x128
[   19.915069]  kasan_check_range+0x100/0x1a8
[   19.915131]  __kasan_check_read+0x20/0x30
[   19.915386]  kasan_atomics_helper+0xdd4/0x4858
[   19.915579]  kasan_atomics+0x198/0x2e0
[   19.915996]  kunit_try_run_case+0x170/0x3f0
[   19.916112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.916237]  kthread+0x328/0x630
[   19.916371]  ret_from_fork+0x10/0x20
[   19.916485] 
[   19.916513] Allocated by task 267:
[   19.916677]  kasan_save_stack+0x3c/0x68
[   19.916930]  kasan_save_track+0x20/0x40
[   19.916994]  kasan_save_alloc_info+0x40/0x58
[   19.917234]  __kasan_kmalloc+0xd4/0xd8
[   19.917297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.917341]  kasan_atomics+0xb8/0x2e0
[   19.917379]  kunit_try_run_case+0x170/0x3f0
[   19.917616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.917700]  kthread+0x328/0x630
[   19.917741]  ret_from_fork+0x10/0x20
[   19.917780] 
[   19.917812] The buggy address belongs to the object at fff00000c7a1ae00
[   19.917812]  which belongs to the cache kmalloc-64 of size 64
[   19.917872] The buggy address is located 0 bytes to the right of
[   19.917872]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.917937] 
[   19.917968] The buggy address belongs to the physical page:
[   19.918010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.918066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.918115] page_type: f5(slab)
[   19.918163] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.918215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.918267] page dumped because: kasan: bad access detected
[   19.918334] 
[   19.918361] Memory state around the buggy address:
[   19.918412]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.918469]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.918514] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.918554]                                      ^
[   19.918598]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.918650]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.918700] ==================================================================
[   19.920653] ==================================================================
[   19.920833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.920895] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.921333] 
[   19.921386] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.921475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.921504] Hardware name: linux,dummy-virt (DT)
[   19.921537] Call trace:
[   19.921885]  show_stack+0x20/0x38 (C)
[   19.921957]  dump_stack_lvl+0x8c/0xd0
[   19.922012]  print_report+0x118/0x5d0
[   19.922390]  kasan_report+0xdc/0x128
[   19.922530]  __asan_report_load8_noabort+0x20/0x30
[   19.922587]  kasan_atomics_helper+0x3f58/0x4858
[   19.922839]  kasan_atomics+0x198/0x2e0
[   19.922906]  kunit_try_run_case+0x170/0x3f0
[   19.922959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.923274]  kthread+0x328/0x630
[   19.923401]  ret_from_fork+0x10/0x20
[   19.923757] 
[   19.923812] Allocated by task 267:
[   19.923946]  kasan_save_stack+0x3c/0x68
[   19.924042]  kasan_save_track+0x20/0x40
[   19.924344]  kasan_save_alloc_info+0x40/0x58
[   19.924395]  __kasan_kmalloc+0xd4/0xd8
[   19.924801]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.925071]  kasan_atomics+0xb8/0x2e0
[   19.925217]  kunit_try_run_case+0x170/0x3f0
[   19.925472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.926029]  kthread+0x328/0x630
[   19.926080]  ret_from_fork+0x10/0x20
[   19.926420] 
[   19.926627] The buggy address belongs to the object at fff00000c7a1ae00
[   19.926627]  which belongs to the cache kmalloc-64 of size 64
[   19.926994] The buggy address is located 0 bytes to the right of
[   19.926994]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.927224] 
[   19.927315] The buggy address belongs to the physical page:
[   19.927435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.927547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.927760] page_type: f5(slab)
[   19.927969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.928208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.928302] page dumped because: kasan: bad access detected
[   19.928576] 
[   19.928674] Memory state around the buggy address:
[   19.929003]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.929203]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.929532] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.929764]                                      ^
[   19.929835]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.930049]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.930231] ==================================================================
[   19.931494] ==================================================================
[   19.931557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.931608] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.931658] 
[   19.931689] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.931771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.931799] Hardware name: linux,dummy-virt (DT)
[   19.931832] Call trace:
[   19.931855]  show_stack+0x20/0x38 (C)
[   19.931905]  dump_stack_lvl+0x8c/0xd0
[   19.931956]  print_report+0x118/0x5d0
[   19.932003]  kasan_report+0xdc/0x128
[   19.932049]  kasan_check_range+0x100/0x1a8
[   19.932096]  __kasan_check_write+0x20/0x30
[   19.932144]  kasan_atomics_helper+0xe44/0x4858
[   19.932192]  kasan_atomics+0x198/0x2e0
[   19.932235]  kunit_try_run_case+0x170/0x3f0
[   19.932299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.932360]  kthread+0x328/0x630
[   19.932420]  ret_from_fork+0x10/0x20
[   19.932469] 
[   19.932489] Allocated by task 267:
[   19.932528]  kasan_save_stack+0x3c/0x68
[   19.932574]  kasan_save_track+0x20/0x40
[   19.932614]  kasan_save_alloc_info+0x40/0x58
[   19.932653]  __kasan_kmalloc+0xd4/0xd8
[   19.932688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.932737]  kasan_atomics+0xb8/0x2e0
[   19.932774]  kunit_try_run_case+0x170/0x3f0
[   19.932815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.932868]  kthread+0x328/0x630
[   19.932916]  ret_from_fork+0x10/0x20
[   19.932955] 
[   19.932981] The buggy address belongs to the object at fff00000c7a1ae00
[   19.932981]  which belongs to the cache kmalloc-64 of size 64
[   19.933039] The buggy address is located 0 bytes to the right of
[   19.933039]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.933103] 
[   19.933125] The buggy address belongs to the physical page:
[   19.933157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.933210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.933260] page_type: f5(slab)
[   19.933905] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.934522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.934582] page dumped because: kasan: bad access detected
[   19.934617] 
[   19.934794] Memory state around the buggy address:
[   19.935077]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.935200]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.935258] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.935355]                                      ^
[   19.935391]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.935454]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.935495] ==================================================================
[   20.021631] ==================================================================
[   20.021732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.021782] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.021836] 
[   20.022363] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.022615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.022674] Hardware name: linux,dummy-virt (DT)
[   20.022830] Call trace:
[   20.022890]  show_stack+0x20/0x38 (C)
[   20.023046]  dump_stack_lvl+0x8c/0xd0
[   20.023120]  print_report+0x118/0x5d0
[   20.023174]  kasan_report+0xdc/0x128
[   20.023221]  kasan_check_range+0x100/0x1a8
[   20.023406]  __kasan_check_write+0x20/0x30
[   20.023585]  kasan_atomics_helper+0x11f8/0x4858
[   20.023854]  kasan_atomics+0x198/0x2e0
[   20.024065]  kunit_try_run_case+0x170/0x3f0
[   20.024182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.024365]  kthread+0x328/0x630
[   20.024431]  ret_from_fork+0x10/0x20
[   20.024638] 
[   20.024857] Allocated by task 267:
[   20.024899]  kasan_save_stack+0x3c/0x68
[   20.024945]  kasan_save_track+0x20/0x40
[   20.024995]  kasan_save_alloc_info+0x40/0x58
[   20.025061]  __kasan_kmalloc+0xd4/0xd8
[   20.025112]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.025161]  kasan_atomics+0xb8/0x2e0
[   20.025198]  kunit_try_run_case+0x170/0x3f0
[   20.025240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.025293]  kthread+0x328/0x630
[   20.025337]  ret_from_fork+0x10/0x20
[   20.025376] 
[   20.025412] The buggy address belongs to the object at fff00000c7a1ae00
[   20.025412]  which belongs to the cache kmalloc-64 of size 64
[   20.025492] The buggy address is located 0 bytes to the right of
[   20.025492]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.025568] 
[   20.025608] The buggy address belongs to the physical page:
[   20.025664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.025718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.025768] page_type: f5(slab)
[   20.025807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.025868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.025926] page dumped because: kasan: bad access detected
[   20.025966] 
[   20.025997] Memory state around the buggy address:
[   20.026040]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.026087]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.026132] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.026188]                                      ^
[   20.026223]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.026267]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.026747] ==================================================================
[   19.975644] ==================================================================
[   19.975728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.975781] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.976159] 
[   19.976222] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.976320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.976501] Hardware name: linux,dummy-virt (DT)
[   19.976546] Call trace:
[   19.976764]  show_stack+0x20/0x38 (C)
[   19.976826]  dump_stack_lvl+0x8c/0xd0
[   19.976888]  print_report+0x118/0x5d0
[   19.976934]  kasan_report+0xdc/0x128
[   19.977060]  kasan_check_range+0x100/0x1a8
[   19.977145]  __kasan_check_write+0x20/0x30
[   19.977196]  kasan_atomics_helper+0xff0/0x4858
[   19.977408]  kasan_atomics+0x198/0x2e0
[   19.977464]  kunit_try_run_case+0x170/0x3f0
[   19.977645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.977914]  kthread+0x328/0x630
[   19.978095]  ret_from_fork+0x10/0x20
[   19.978156] 
[   19.978176] Allocated by task 267:
[   19.978267]  kasan_save_stack+0x3c/0x68
[   19.978331]  kasan_save_track+0x20/0x40
[   19.978369]  kasan_save_alloc_info+0x40/0x58
[   19.978577]  __kasan_kmalloc+0xd4/0xd8
[   19.978752]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.979082]  kasan_atomics+0xb8/0x2e0
[   19.979178]  kunit_try_run_case+0x170/0x3f0
[   19.979329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.979493]  kthread+0x328/0x630
[   19.979579]  ret_from_fork+0x10/0x20
[   19.979627] 
[   19.979650] The buggy address belongs to the object at fff00000c7a1ae00
[   19.979650]  which belongs to the cache kmalloc-64 of size 64
[   19.979712] The buggy address is located 0 bytes to the right of
[   19.979712]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.980055] 
[   19.980133] The buggy address belongs to the physical page:
[   19.980487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.980898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.981367] page_type: f5(slab)
[   19.981436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.981633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.981862] page dumped because: kasan: bad access detected
[   19.981923] 
[   19.982396] Memory state around the buggy address:
[   19.982465]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.982522]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.982861] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.983097]                                      ^
[   19.983148]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.983341]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.983440] ==================================================================
[   20.053438] ==================================================================
[   20.053501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.053815] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.054011] 
[   20.054056] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.054146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.054266] Hardware name: linux,dummy-virt (DT)
[   20.054327] Call trace:
[   20.054354]  show_stack+0x20/0x38 (C)
[   20.054406]  dump_stack_lvl+0x8c/0xd0
[   20.054459]  print_report+0x118/0x5d0
[   20.054504]  kasan_report+0xdc/0x128
[   20.054550]  kasan_check_range+0x100/0x1a8
[   20.054597]  __kasan_check_write+0x20/0x30
[   20.054645]  kasan_atomics_helper+0x1384/0x4858
[   20.054716]  kasan_atomics+0x198/0x2e0
[   20.054771]  kunit_try_run_case+0x170/0x3f0
[   20.054821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.054873]  kthread+0x328/0x630
[   20.054919]  ret_from_fork+0x10/0x20
[   20.054968] 
[   20.054989] Allocated by task 267:
[   20.055023]  kasan_save_stack+0x3c/0x68
[   20.055065]  kasan_save_track+0x20/0x40
[   20.055103]  kasan_save_alloc_info+0x40/0x58
[   20.055144]  __kasan_kmalloc+0xd4/0xd8
[   20.055795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.056107]  kasan_atomics+0xb8/0x2e0
[   20.056297]  kunit_try_run_case+0x170/0x3f0
[   20.056879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.056996]  kthread+0x328/0x630
[   20.057197]  ret_from_fork+0x10/0x20
[   20.057391] 
[   20.057593] The buggy address belongs to the object at fff00000c7a1ae00
[   20.057593]  which belongs to the cache kmalloc-64 of size 64
[   20.057690] The buggy address is located 0 bytes to the right of
[   20.057690]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.058180] 
[   20.058475] The buggy address belongs to the physical page:
[   20.058627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.059039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.059131] page_type: f5(slab)
[   20.059172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.059233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.059276] page dumped because: kasan: bad access detected
[   20.059859] 
[   20.060069] Memory state around the buggy address:
[   20.060142]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.060357]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.060734] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.061159]                                      ^
[   20.061320]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.061519]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.061820] ==================================================================
[   20.166001] ==================================================================
[   20.166064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.166244] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.166374] 
[   20.166427] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.166704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.166774] Hardware name: linux,dummy-virt (DT)
[   20.166857] Call trace:
[   20.166883]  show_stack+0x20/0x38 (C)
[   20.166937]  dump_stack_lvl+0x8c/0xd0
[   20.166988]  print_report+0x118/0x5d0
[   20.167273]  kasan_report+0xdc/0x128
[   20.167669]  kasan_check_range+0x100/0x1a8
[   20.167795]  __kasan_check_write+0x20/0x30
[   20.167889]  kasan_atomics_helper+0x175c/0x4858
[   20.168069]  kasan_atomics+0x198/0x2e0
[   20.168295]  kunit_try_run_case+0x170/0x3f0
[   20.168386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.168751]  kthread+0x328/0x630
[   20.169063]  ret_from_fork+0x10/0x20
[   20.169415] 
[   20.169577] Allocated by task 267:
[   20.169624]  kasan_save_stack+0x3c/0x68
[   20.169703]  kasan_save_track+0x20/0x40
[   20.169741]  kasan_save_alloc_info+0x40/0x58
[   20.169781]  __kasan_kmalloc+0xd4/0xd8
[   20.169819]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.169887]  kasan_atomics+0xb8/0x2e0
[   20.169943]  kunit_try_run_case+0x170/0x3f0
[   20.169985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.170029]  kthread+0x328/0x630
[   20.170066]  ret_from_fork+0x10/0x20
[   20.170103] 
[   20.170139] The buggy address belongs to the object at fff00000c7a1ae00
[   20.170139]  which belongs to the cache kmalloc-64 of size 64
[   20.170199] The buggy address is located 0 bytes to the right of
[   20.170199]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.170273] 
[   20.170316] The buggy address belongs to the physical page:
[   20.170358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.170411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.170471] page_type: f5(slab)
[   20.170511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.170562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.170605] page dumped because: kasan: bad access detected
[   20.170652] 
[   20.170681] Memory state around the buggy address:
[   20.170715]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.171074]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.171522] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.171620]                                      ^
[   20.171669]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.171725]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.171807] ==================================================================
[   20.043232] ==================================================================
[   20.043359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.043413] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.043602] 
[   20.043650] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.043933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.043977] Hardware name: linux,dummy-virt (DT)
[   20.044323] Call trace:
[   20.044428]  show_stack+0x20/0x38 (C)
[   20.044526]  dump_stack_lvl+0x8c/0xd0
[   20.044623]  print_report+0x118/0x5d0
[   20.044812]  kasan_report+0xdc/0x128
[   20.044929]  kasan_check_range+0x100/0x1a8
[   20.044990]  __kasan_check_write+0x20/0x30
[   20.045152]  kasan_atomics_helper+0x12d8/0x4858
[   20.045450]  kasan_atomics+0x198/0x2e0
[   20.045602]  kunit_try_run_case+0x170/0x3f0
[   20.045731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.045816]  kthread+0x328/0x630
[   20.046045]  ret_from_fork+0x10/0x20
[   20.046138] 
[   20.046219] Allocated by task 267:
[   20.046443]  kasan_save_stack+0x3c/0x68
[   20.046559]  kasan_save_track+0x20/0x40
[   20.046602]  kasan_save_alloc_info+0x40/0x58
[   20.046868]  __kasan_kmalloc+0xd4/0xd8
[   20.046980]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.047091]  kasan_atomics+0xb8/0x2e0
[   20.047363]  kunit_try_run_case+0x170/0x3f0
[   20.047505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.048363]  kthread+0x328/0x630
[   20.048443]  ret_from_fork+0x10/0x20
[   20.048517] 
[   20.048562] The buggy address belongs to the object at fff00000c7a1ae00
[   20.048562]  which belongs to the cache kmalloc-64 of size 64
[   20.048646] The buggy address is located 0 bytes to the right of
[   20.048646]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.048714] 
[   20.048736] The buggy address belongs to the physical page:
[   20.049103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.049260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.049639] page_type: f5(slab)
[   20.050053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.050400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.050682] page dumped because: kasan: bad access detected
[   20.050864] 
[   20.051330] Memory state around the buggy address:
[   20.051406]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.051487]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.051543] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.051583]                                      ^
[   20.051620]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.051972]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.052175] ==================================================================
[   19.903131] ==================================================================
[   19.903612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.903682] Read of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.903736] 
[   19.903773] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.903852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.903881] Hardware name: linux,dummy-virt (DT)
[   19.904080] Call trace:
[   19.904215]  show_stack+0x20/0x38 (C)
[   19.904357]  dump_stack_lvl+0x8c/0xd0
[   19.904416]  print_report+0x118/0x5d0
[   19.904464]  kasan_report+0xdc/0x128
[   19.904901]  __asan_report_load4_noabort+0x20/0x30
[   19.905221]  kasan_atomics_helper+0x3e04/0x4858
[   19.905303]  kasan_atomics+0x198/0x2e0
[   19.905436]  kunit_try_run_case+0x170/0x3f0
[   19.905520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.905574]  kthread+0x328/0x630
[   19.905889]  ret_from_fork+0x10/0x20
[   19.906133] 
[   19.906167] Allocated by task 267:
[   19.906332]  kasan_save_stack+0x3c/0x68
[   19.906380]  kasan_save_track+0x20/0x40
[   19.906418]  kasan_save_alloc_info+0x40/0x58
[   19.906460]  __kasan_kmalloc+0xd4/0xd8
[   19.906497]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.906537]  kasan_atomics+0xb8/0x2e0
[   19.906591]  kunit_try_run_case+0x170/0x3f0
[   19.906643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.906689]  kthread+0x328/0x630
[   19.906744]  ret_from_fork+0x10/0x20
[   19.906799] 
[   19.906854] The buggy address belongs to the object at fff00000c7a1ae00
[   19.906854]  which belongs to the cache kmalloc-64 of size 64
[   19.906915] The buggy address is located 0 bytes to the right of
[   19.906915]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.907239] 
[   19.907339] The buggy address belongs to the physical page:
[   19.907660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.908103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.908504] page_type: f5(slab)
[   19.908604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.908769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.909071] page dumped because: kasan: bad access detected
[   19.909488] 
[   19.909659] Memory state around the buggy address:
[   19.909725]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.910150]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.910390] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.910436]                                      ^
[   19.910695]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.911092]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.911150] ==================================================================
[   19.633071] ==================================================================
[   19.633143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   19.633271] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.633950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.634376]  print_report+0x118/0x5d0
[   19.635182]  kasan_atomics+0x198/0x2e0
[   19.635775]  ret_from_fork+0x10/0x20
[   19.636661]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.637249] The buggy address is located 0 bytes to the right of
[   19.637249]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.637670] page dumped because: kasan: bad access detected
[   19.637825]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.638056] ==================================================================
[   20.154466] ==================================================================
[   20.155009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.155277] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.155346] 
[   20.155619] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.156068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.156303] Hardware name: linux,dummy-virt (DT)
[   20.156632] Call trace:
[   20.156912]  show_stack+0x20/0x38 (C)
[   20.157063]  dump_stack_lvl+0x8c/0xd0
[   20.157120]  print_report+0x118/0x5d0
[   20.157236]  kasan_report+0xdc/0x128
[   20.157728]  __asan_report_load8_noabort+0x20/0x30
[   20.158077]  kasan_atomics_helper+0x3e10/0x4858
[   20.158374]  kasan_atomics+0x198/0x2e0
[   20.158630]  kunit_try_run_case+0x170/0x3f0
[   20.158861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.159155]  kthread+0x328/0x630
[   20.159343]  ret_from_fork+0x10/0x20
[   20.159402] 
[   20.159436] Allocated by task 267:
[   20.159467]  kasan_save_stack+0x3c/0x68
[   20.159717]  kasan_save_track+0x20/0x40
[   20.160011]  kasan_save_alloc_info+0x40/0x58
[   20.160322]  __kasan_kmalloc+0xd4/0xd8
[   20.160478]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.160610]  kasan_atomics+0xb8/0x2e0
[   20.160694]  kunit_try_run_case+0x170/0x3f0
[   20.160742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.161067]  kthread+0x328/0x630
[   20.161484]  ret_from_fork+0x10/0x20
[   20.161716] 
[   20.161772] The buggy address belongs to the object at fff00000c7a1ae00
[   20.161772]  which belongs to the cache kmalloc-64 of size 64
[   20.161852] The buggy address is located 0 bytes to the right of
[   20.161852]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.162413] 
[   20.162484] The buggy address belongs to the physical page:
[   20.162820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.162919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.163002] page_type: f5(slab)
[   20.163046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.163297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.163568] page dumped because: kasan: bad access detected
[   20.163826] 
[   20.164026] Memory state around the buggy address:
[   20.164069]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.164139]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.164501] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.164585]                                      ^
[   20.164912]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.164968]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.165321] ==================================================================
[   19.890105] ==================================================================
[   19.890162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.890577] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.890649] 
[   19.890772] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.890860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.891082] Hardware name: linux,dummy-virt (DT)
[   19.891337] Call trace:
[   19.891749]  show_stack+0x20/0x38 (C)
[   19.892004]  dump_stack_lvl+0x8c/0xd0
[   19.892315]  print_report+0x118/0x5d0
[   19.892482]  kasan_report+0xdc/0x128
[   19.892942]  kasan_check_range+0x100/0x1a8
[   19.893054]  __kasan_check_write+0x20/0x30
[   19.893432]  kasan_atomics_helper+0xd3c/0x4858
[   19.893804]  kasan_atomics+0x198/0x2e0
[   19.894133]  kunit_try_run_case+0x170/0x3f0
[   19.894278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.894508]  kthread+0x328/0x630
[   19.895143]  ret_from_fork+0x10/0x20
[   19.895542] 
[   19.895574] Allocated by task 267:
[   19.895606]  kasan_save_stack+0x3c/0x68
[   19.895650]  kasan_save_track+0x20/0x40
[   19.895689]  kasan_save_alloc_info+0x40/0x58
[   19.896431]  __kasan_kmalloc+0xd4/0xd8
[   19.896604]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.896653]  kasan_atomics+0xb8/0x2e0
[   19.896888]  kunit_try_run_case+0x170/0x3f0
[   19.896961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.897101]  kthread+0x328/0x630
[   19.897437]  ret_from_fork+0x10/0x20
[   19.897699] 
[   19.897910] The buggy address belongs to the object at fff00000c7a1ae00
[   19.897910]  which belongs to the cache kmalloc-64 of size 64
[   19.898349] The buggy address is located 0 bytes to the right of
[   19.898349]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.898471] 
[   19.898704] The buggy address belongs to the physical page:
[   19.898861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.899109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.899166] page_type: f5(slab)
[   19.899400] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.900023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.900361] page dumped because: kasan: bad access detected
[   19.900572] 
[   19.900633] Memory state around the buggy address:
[   19.900993]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.901294]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.901834] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.901980]                                      ^
[   19.902065]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.902305]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.902577] ==================================================================
[   19.990531] ==================================================================
[   19.990584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.990636] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.991025] 
[   19.991107] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.991392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.991453] Hardware name: linux,dummy-virt (DT)
[   19.991706] Call trace:
[   19.991916]  show_stack+0x20/0x38 (C)
[   19.992006]  dump_stack_lvl+0x8c/0xd0
[   19.992324]  print_report+0x118/0x5d0
[   19.992517]  kasan_report+0xdc/0x128
[   19.992673]  kasan_check_range+0x100/0x1a8
[   19.992950]  __kasan_check_write+0x20/0x30
[   19.993095]  kasan_atomics_helper+0x10c0/0x4858
[   19.993445]  kasan_atomics+0x198/0x2e0
[   19.993619]  kunit_try_run_case+0x170/0x3f0
[   19.993875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.994082]  kthread+0x328/0x630
[   19.994340]  ret_from_fork+0x10/0x20
[   19.994557] 
[   19.994600] Allocated by task 267:
[   19.994708]  kasan_save_stack+0x3c/0x68
[   19.994800]  kasan_save_track+0x20/0x40
[   19.994839]  kasan_save_alloc_info+0x40/0x58
[   19.995085]  __kasan_kmalloc+0xd4/0xd8
[   19.995202]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.995380]  kasan_atomics+0xb8/0x2e0
[   19.995800]  kunit_try_run_case+0x170/0x3f0
[   19.995948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.996052]  kthread+0x328/0x630
[   19.996880]  ret_from_fork+0x10/0x20
[   19.996966] 
[   19.997078] The buggy address belongs to the object at fff00000c7a1ae00
[   19.997078]  which belongs to the cache kmalloc-64 of size 64
[   19.997143] The buggy address is located 0 bytes to the right of
[   19.997143]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.997473] 
[   19.997563] The buggy address belongs to the physical page:
[   19.997865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.997977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.998460] page_type: f5(slab)
[   19.998524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.998870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.999255] page dumped because: kasan: bad access detected
[   19.999527] 
[   19.999576] Memory state around the buggy address:
[   19.999726]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.999988]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.000245] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.000430]                                      ^
[   20.000490]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.000727]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.000924] ==================================================================
[   20.112746] ==================================================================
[   20.112799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.112849] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.112900] 
[   20.112931] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.113012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.113042] Hardware name: linux,dummy-virt (DT)
[   20.113095] Call trace:
[   20.113119]  show_stack+0x20/0x38 (C)
[   20.113178]  dump_stack_lvl+0x8c/0xd0
[   20.113237]  print_report+0x118/0x5d0
[   20.113298]  kasan_report+0xdc/0x128
[   20.113352]  kasan_check_range+0x100/0x1a8
[   20.113410]  __kasan_check_write+0x20/0x30
[   20.113473]  kasan_atomics_helper+0x15b4/0x4858
[   20.113530]  kasan_atomics+0x198/0x2e0
[   20.113576]  kunit_try_run_case+0x170/0x3f0
[   20.113632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.113708]  kthread+0x328/0x630
[   20.113764]  ret_from_fork+0x10/0x20
[   20.113813] 
[   20.113834] Allocated by task 267:
[   20.113864]  kasan_save_stack+0x3c/0x68
[   20.113910]  kasan_save_track+0x20/0x40
[   20.113957]  kasan_save_alloc_info+0x40/0x58
[   20.114006]  __kasan_kmalloc+0xd4/0xd8
[   20.114044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.114085]  kasan_atomics+0xb8/0x2e0
[   20.114126]  kunit_try_run_case+0x170/0x3f0
[   20.114166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.114208]  kthread+0x328/0x630
[   20.114246]  ret_from_fork+0x10/0x20
[   20.114725] 
[   20.115212] The buggy address belongs to the object at fff00000c7a1ae00
[   20.115212]  which belongs to the cache kmalloc-64 of size 64
[   20.115312] The buggy address is located 0 bytes to the right of
[   20.115312]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.115412] 
[   20.115523] The buggy address belongs to the physical page:
[   20.115558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.115893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.116121] page_type: f5(slab)
[   20.116514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.116741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.117319] page dumped because: kasan: bad access detected
[   20.117699] 
[   20.117794] Memory state around the buggy address:
[   20.117899]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.118139]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.118508] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.118654]                                      ^
[   20.118909]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.118981]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.119251] ==================================================================
[   20.129582] ==================================================================
[   20.129714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.130083] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.130322] 
[   20.130368] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.130451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.130662] Hardware name: linux,dummy-virt (DT)
[   20.130723] Call trace:
[   20.130751]  show_stack+0x20/0x38 (C)
[   20.131068]  dump_stack_lvl+0x8c/0xd0
[   20.131457]  print_report+0x118/0x5d0
[   20.131532]  kasan_report+0xdc/0x128
[   20.131631]  kasan_check_range+0x100/0x1a8
[   20.131694]  __kasan_check_write+0x20/0x30
[   20.131743]  kasan_atomics_helper+0x1644/0x4858
[   20.131792]  kasan_atomics+0x198/0x2e0
[   20.131838]  kunit_try_run_case+0x170/0x3f0
[   20.132410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.132596]  kthread+0x328/0x630
[   20.132796]  ret_from_fork+0x10/0x20
[   20.132966] 
[   20.132999] Allocated by task 267:
[   20.133029]  kasan_save_stack+0x3c/0x68
[   20.133633]  kasan_save_track+0x20/0x40
[   20.133974]  kasan_save_alloc_info+0x40/0x58
[   20.134087]  __kasan_kmalloc+0xd4/0xd8
[   20.134144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.134257]  kasan_atomics+0xb8/0x2e0
[   20.134308]  kunit_try_run_case+0x170/0x3f0
[   20.134412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.134687]  kthread+0x328/0x630
[   20.134835]  ret_from_fork+0x10/0x20
[   20.135065] 
[   20.135260] The buggy address belongs to the object at fff00000c7a1ae00
[   20.135260]  which belongs to the cache kmalloc-64 of size 64
[   20.136011] The buggy address is located 0 bytes to the right of
[   20.136011]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.136124] 
[   20.136179] The buggy address belongs to the physical page:
[   20.136232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.136571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.136650] page_type: f5(slab)
[   20.137178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.137548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.137598] page dumped because: kasan: bad access detected
[   20.137878] 
[   20.137999] Memory state around the buggy address:
[   20.138046]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.138093]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.138147] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.138208]                                      ^
[   20.138245]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.138298]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.138337] ==================================================================
[   19.936554] ==================================================================
[   19.936888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.937300] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.937371] 
[   19.937508] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.937628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.937702] Hardware name: linux,dummy-virt (DT)
[   19.937736] Call trace:
[   19.937774]  show_stack+0x20/0x38 (C)
[   19.937829]  dump_stack_lvl+0x8c/0xd0
[   19.937886]  print_report+0x118/0x5d0
[   19.938086]  kasan_report+0xdc/0x128
[   19.938140]  __asan_report_store8_noabort+0x20/0x30
[   19.938296]  kasan_atomics_helper+0x3e5c/0x4858
[   19.938688]  kasan_atomics+0x198/0x2e0
[   19.938763]  kunit_try_run_case+0x170/0x3f0
[   19.938926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.939079]  kthread+0x328/0x630
[   19.939176]  ret_from_fork+0x10/0x20
[   19.939237] 
[   19.939504] Allocated by task 267:
[   19.939757]  kasan_save_stack+0x3c/0x68
[   19.940043]  kasan_save_track+0x20/0x40
[   19.940239]  kasan_save_alloc_info+0x40/0x58
[   19.940382]  __kasan_kmalloc+0xd4/0xd8
[   19.940461]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.940593]  kasan_atomics+0xb8/0x2e0
[   19.940632]  kunit_try_run_case+0x170/0x3f0
[   19.940835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.941070]  kthread+0x328/0x630
[   19.941147]  ret_from_fork+0x10/0x20
[   19.941331] 
[   19.941400] The buggy address belongs to the object at fff00000c7a1ae00
[   19.941400]  which belongs to the cache kmalloc-64 of size 64
[   19.941841] The buggy address is located 0 bytes to the right of
[   19.941841]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.942022] 
[   19.942331] The buggy address belongs to the physical page:
[   19.942385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.942546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.942637] page_type: f5(slab)
[   19.942678] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.942943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.943434] page dumped because: kasan: bad access detected
[   19.943653] 
[   19.943681] Memory state around the buggy address:
[   19.943895]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.944069]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.944175] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.944427]                                      ^
[   19.944607]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.944711]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.944754] ==================================================================
[   19.779690] ==================================================================
[   19.779741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.779790] Write of size 4 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.779840] 
[   19.780065] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.780180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.780218] Hardware name: linux,dummy-virt (DT)
[   19.780261] Call trace:
[   19.780296]  show_stack+0x20/0x38 (C)
[   19.780346]  dump_stack_lvl+0x8c/0xd0
[   19.780396]  print_report+0x118/0x5d0
[   19.780442]  kasan_report+0xdc/0x128
[   19.780489]  kasan_check_range+0x100/0x1a8
[   19.780538]  __kasan_check_write+0x20/0x30
[   19.780694]  kunit_try_run_case+0x170/0x3f0
[   19.780964]  kasan_save_stack+0x3c/0x68
[   19.781016]  kasan_save_track+0x20/0x40
[   19.781063]  kasan_save_alloc_info+0x40/0x58
[   19.781105]  __kasan_kmalloc+0xd4/0xd8
[   19.781142]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.781191]  kasan_atomics+0xb8/0x2e0
[   19.781228]  kunit_try_run_case+0x170/0x3f0
[   19.781269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.781847]  kthread+0x328/0x630
[   19.781907]  ret_from_fork+0x10/0x20
[   19.782040] 
[   19.782087] The buggy address belongs to the object at fff00000c7a1ae00
[   19.782087]  which belongs to the cache kmalloc-64 of size 64
[   19.782149] The buggy address is located 0 bytes to the right of
[   19.782149]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.782215] 
[   19.782273] The buggy address belongs to the physical page:
[   19.782321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.782374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.782423] page_type: f5(slab)
[   19.782498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.782681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.782815] 
[   19.783188]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.783644]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.784896] 
[   19.785038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.785098] Call trace:
[   19.785516]  kasan_atomics_helper+0x3dcc/0x4858
[   19.785772]  kthread+0x328/0x630
[   19.786313]  kasan_save_alloc_info+0x40/0x58
[   19.786353]  __kasan_kmalloc+0xd4/0xd8
[   19.786390]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.786698] 
[   19.786779] The buggy address is located 0 bytes to the right of
[   19.786779]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.787392] page_type: f5(slab)
[   19.787792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.787902] page dumped because: kasan: bad access detected
[   19.788343] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.788417]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.789140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.789697]  kasan_report+0xdc/0x128
[   19.790416] 
[   19.792307]  kasan_save_alloc_info+0x40/0x58
[   19.792464]  __kasan_kmalloc+0xd4/0xd8
[   19.792505]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.793337]  kasan_atomics+0xb8/0x2e0
[   19.793529]  kunit_try_run_case+0x170/0x3f0
[   19.794038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.794415]  kthread+0x328/0x630
[   19.796682] 
[   19.797534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.798169] 
[   19.799599]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.801453]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.804821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.805008]  print_report+0x118/0x5d0
[   19.809247]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.809372]  kasan_atomics+0xb8/0x2e0
[   19.809572]  kunit_try_run_case+0x170/0x3f0
[   19.810595] 
[   19.810753] 
[   19.810775] The buggy address belongs to the physical page:
[   19.811978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.812493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.814998]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.815858]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.826825]  kasan_report+0xdc/0x128
[   19.828379]  kunit_try_run_case+0x170/0x3f0
[   19.829994]  kasan_save_stack+0x3c/0x68
[   19.831527]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.832495]  kasan_atomics+0xb8/0x2e0
[   19.832551]  kunit_try_run_case+0x170/0x3f0
[   19.833254]  kthread+0x328/0x630
[   19.833605] 
[   19.833801] The buggy address is located 0 bytes to the right of
[   19.833801]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.837261] page dumped because: kasan: bad access detected
[   19.838446]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.838628] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.841593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   19.845319]  dump_stack_lvl+0x8c/0xd0
[   19.847410]  kasan_atomics+0x198/0x2e0
[   19.852478]  kasan_atomics+0xb8/0x2e0
[   19.853582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.853740]  kthread+0x328/0x630
[   19.854184]  ret_from_fork+0x10/0x20
[   19.854677] The buggy address is located 0 bytes to the right of
[   19.854677]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.856738] page dumped because: kasan: bad access detected
[   19.857723]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.865458] ==================================================================
[   19.956507] ==================================================================
[   19.956702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.956756] Write of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   19.956807] 
[   19.957076] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   19.957542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.957720] Hardware name: linux,dummy-virt (DT)
[   19.957788] Call trace:
[   19.957815]  show_stack+0x20/0x38 (C)
[   19.958023]  dump_stack_lvl+0x8c/0xd0
[   19.958222]  print_report+0x118/0x5d0
[   19.958277]  kasan_report+0xdc/0x128
[   19.958337]  kasan_check_range+0x100/0x1a8
[   19.958385]  __kasan_check_write+0x20/0x30
[   19.958434]  kasan_atomics_helper+0xf20/0x4858
[   19.958482]  kasan_atomics+0x198/0x2e0
[   19.958562]  kunit_try_run_case+0x170/0x3f0
[   19.958624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.958686]  kthread+0x328/0x630
[   19.959330]  ret_from_fork+0x10/0x20
[   19.959504] 
[   19.959545] Allocated by task 267:
[   19.959986]  kasan_save_stack+0x3c/0x68
[   19.960221]  kasan_save_track+0x20/0x40
[   19.960555]  kasan_save_alloc_info+0x40/0x58
[   19.960834]  __kasan_kmalloc+0xd4/0xd8
[   19.961070]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.961141]  kasan_atomics+0xb8/0x2e0
[   19.961481]  kunit_try_run_case+0x170/0x3f0
[   19.961924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.961981]  kthread+0x328/0x630
[   19.962690]  ret_from_fork+0x10/0x20
[   19.962946] 
[   19.963014] The buggy address belongs to the object at fff00000c7a1ae00
[   19.963014]  which belongs to the cache kmalloc-64 of size 64
[   19.963360] The buggy address is located 0 bytes to the right of
[   19.963360]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   19.963655] 
[   19.963771] The buggy address belongs to the physical page:
[   19.963825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   19.964234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.964387] page_type: f5(slab)
[   19.964515] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.964756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.964899] page dumped because: kasan: bad access detected
[   19.965062] 
[   19.965315] Memory state around the buggy address:
[   19.965659]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.965828]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.966016] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.966202]                                      ^
[   19.966244]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.966300]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.966342] ==================================================================
[   20.173996] ==================================================================
[   20.174072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.174124] Read of size 8 at addr fff00000c7a1ae30 by task kunit_try_catch/267
[   20.174183] 
[   20.174397] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT 
[   20.174861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.175027] Hardware name: linux,dummy-virt (DT)
[   20.175180] Call trace:
[   20.175305]  show_stack+0x20/0x38 (C)
[   20.175773]  dump_stack_lvl+0x8c/0xd0
[   20.175990]  print_report+0x118/0x5d0
[   20.176089]  kasan_report+0xdc/0x128
[   20.176139]  __asan_report_load8_noabort+0x20/0x30
[   20.176399]  kasan_atomics_helper+0x3e20/0x4858
[   20.176749]  kasan_atomics+0x198/0x2e0
[   20.176976]  kunit_try_run_case+0x170/0x3f0
[   20.177100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.177230]  kthread+0x328/0x630
[   20.177693]  ret_from_fork+0x10/0x20
[   20.177851] 
[   20.178047] Allocated by task 267:
[   20.178340]  kasan_save_stack+0x3c/0x68
[   20.178408]  kasan_save_track+0x20/0x40
[   20.178602]  kasan_save_alloc_info+0x40/0x58
[   20.178645]  __kasan_kmalloc+0xd4/0xd8
[   20.178993]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.179131]  kasan_atomics+0xb8/0x2e0
[   20.179431]  kunit_try_run_case+0x170/0x3f0
[   20.179632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.179749]  kthread+0x328/0x630
[   20.179868]  ret_from_fork+0x10/0x20
[   20.179925] 
[   20.179947] The buggy address belongs to the object at fff00000c7a1ae00
[   20.179947]  which belongs to the cache kmalloc-64 of size 64
[   20.180007] The buggy address is located 0 bytes to the right of
[   20.180007]  allocated 48-byte region [fff00000c7a1ae00, fff00000c7a1ae30)
[   20.180253] 
[   20.180395] The buggy address belongs to the physical page:
[   20.180638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a1a
[   20.181008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.181496] page_type: f5(slab)
[   20.181671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.181777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.181823] page dumped because: kasan: bad access detected
[   20.182600] 
[   20.182635] Memory state around the buggy address:
[   20.182675]  fff00000c7a1ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.182967]  fff00000c7a1ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.183199] >fff00000c7a1ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.183342]                                      ^
[   20.183492]  fff00000c7a1ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.183548]  fff00000c7a1af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.183967] ==================================================================

[   14.218503] ==================================================================
[   14.218878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.219258] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.219645] 
[   14.219771] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.219812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.219824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.219844] Call Trace:
[   14.219859]  <TASK>
[   14.219873]  dump_stack_lvl+0x73/0xb0
[   14.219899]  print_report+0xd1/0x610
[   14.219922]  ? __virt_addr_valid+0x1db/0x2d0
[   14.219943]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.219964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.219988]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.220010]  kasan_report+0x141/0x180
[   14.220034]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.220063]  __asan_report_load4_noabort+0x18/0x20
[   14.220085]  kasan_atomics_helper+0x4a02/0x5450
[   14.220109]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.220132]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.220154]  ? kasan_atomics+0x152/0x310
[   14.220180]  kasan_atomics+0x1dc/0x310
[   14.220199]  ? __pfx_kasan_atomics+0x10/0x10
[   14.220221]  ? __pfx_read_tsc+0x10/0x10
[   14.220251]  ? ktime_get_ts64+0x86/0x230
[   14.220275]  kunit_try_run_case+0x1a5/0x480
[   14.220297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.220316]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.220336]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.220382]  ? __kthread_parkme+0x82/0x180
[   14.220404]  ? preempt_count_sub+0x50/0x80
[   14.220429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.220451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.220475]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.220499]  kthread+0x337/0x6f0
[   14.220516]  ? trace_preempt_on+0x20/0xc0
[   14.220540]  ? __pfx_kthread+0x10/0x10
[   14.220559]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.220581]  ? calculate_sigpending+0x7b/0xa0
[   14.220603]  ? __pfx_kthread+0x10/0x10
[   14.220622]  ret_from_fork+0x41/0x80
[   14.220644]  ? __pfx_kthread+0x10/0x10
[   14.220662]  ret_from_fork_asm+0x1a/0x30
[   14.220694]  </TASK>
[   14.220705] 
[   14.227703] Allocated by task 285:
[   14.227883]  kasan_save_stack+0x45/0x70
[   14.228079]  kasan_save_track+0x18/0x40
[   14.228303]  kasan_save_alloc_info+0x3b/0x50
[   14.228535]  __kasan_kmalloc+0xb7/0xc0
[   14.228721]  __kmalloc_cache_noprof+0x189/0x420
[   14.228922]  kasan_atomics+0x95/0x310
[   14.229129]  kunit_try_run_case+0x1a5/0x480
[   14.229313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.229509]  kthread+0x337/0x6f0
[   14.229629]  ret_from_fork+0x41/0x80
[   14.229760]  ret_from_fork_asm+0x1a/0x30
[   14.229898] 
[   14.229968] The buggy address belongs to the object at ffff888103d00c80
[   14.229968]  which belongs to the cache kmalloc-64 of size 64
[   14.230474] The buggy address is located 0 bytes to the right of
[   14.230474]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.231046] 
[   14.231163] The buggy address belongs to the physical page:
[   14.231458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.231851] flags: 0x200000000000000(node=0|zone=2)
[   14.232082] page_type: f5(slab)
[   14.232289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.232648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.232985] page dumped because: kasan: bad access detected
[   14.233208] 
[   14.233314] Memory state around the buggy address:
[   14.233552]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.233855]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.234159] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.234498]                                      ^
[   14.234723]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.234939]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.235287] ==================================================================
[   14.146974] ==================================================================
[   14.147363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.147912] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.148192] 
[   14.148286] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.148328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.148340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.148360] Call Trace:
[   14.148375]  <TASK>
[   14.148405]  dump_stack_lvl+0x73/0xb0
[   14.148430]  print_report+0xd1/0x610
[   14.148452]  ? __virt_addr_valid+0x1db/0x2d0
[   14.148474]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.148495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.148528]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.148551]  kasan_report+0x141/0x180
[   14.148585]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.148612]  __asan_report_load4_noabort+0x18/0x20
[   14.148634]  kasan_atomics_helper+0x4a36/0x5450
[   14.148658]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.148681]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.148712]  ? kasan_atomics+0x152/0x310
[   14.148735]  kasan_atomics+0x1dc/0x310
[   14.148755]  ? __pfx_kasan_atomics+0x10/0x10
[   14.148787]  ? __pfx_read_tsc+0x10/0x10
[   14.148808]  ? ktime_get_ts64+0x86/0x230
[   14.148833]  kunit_try_run_case+0x1a5/0x480
[   14.148855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.148883]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.148904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.148935]  ? __kthread_parkme+0x82/0x180
[   14.148967]  ? preempt_count_sub+0x50/0x80
[   14.148994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.149016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.149048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.149072]  kthread+0x337/0x6f0
[   14.149090]  ? trace_preempt_on+0x20/0xc0
[   14.149124]  ? __pfx_kthread+0x10/0x10
[   14.149143]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.149165]  ? calculate_sigpending+0x7b/0xa0
[   14.149187]  ? __pfx_kthread+0x10/0x10
[   14.149206]  ret_from_fork+0x41/0x80
[   14.149243]  ? __pfx_kthread+0x10/0x10
[   14.149262]  ret_from_fork_asm+0x1a/0x30
[   14.149305]  </TASK>
[   14.149316] 
[   14.156694] Allocated by task 285:
[   14.156848]  kasan_save_stack+0x45/0x70
[   14.157035]  kasan_save_track+0x18/0x40
[   14.157202]  kasan_save_alloc_info+0x3b/0x50
[   14.157457]  __kasan_kmalloc+0xb7/0xc0
[   14.157632]  __kmalloc_cache_noprof+0x189/0x420
[   14.157857]  kasan_atomics+0x95/0x310
[   14.158057]  kunit_try_run_case+0x1a5/0x480
[   14.158247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.158447]  kthread+0x337/0x6f0
[   14.158569]  ret_from_fork+0x41/0x80
[   14.158700]  ret_from_fork_asm+0x1a/0x30
[   14.158839] 
[   14.158908] The buggy address belongs to the object at ffff888103d00c80
[   14.158908]  which belongs to the cache kmalloc-64 of size 64
[   14.159281] The buggy address is located 0 bytes to the right of
[   14.159281]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.159865] 
[   14.159959] The buggy address belongs to the physical page:
[   14.160205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.160585] flags: 0x200000000000000(node=0|zone=2)
[   14.160813] page_type: f5(slab)
[   14.160984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.161250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.161506] page dumped because: kasan: bad access detected
[   14.161761] 
[   14.161868] Memory state around the buggy address:
[   14.162100]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.162471]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.162761] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.163058]                                      ^
[   14.163298]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.163634]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.163926] ==================================================================
[   14.623010] ==================================================================
[   14.623325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.623644] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.624320] 
[   14.624435] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.624481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.624495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.624517] Call Trace:
[   14.624532]  <TASK>
[   14.624545]  dump_stack_lvl+0x73/0xb0
[   14.624572]  print_report+0xd1/0x610
[   14.624595]  ? __virt_addr_valid+0x1db/0x2d0
[   14.624616]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.624638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.624661]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.624684]  kasan_report+0x141/0x180
[   14.624708]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.624736]  kasan_check_range+0x10c/0x1c0
[   14.624756]  __kasan_check_write+0x18/0x20
[   14.624776]  kasan_atomics_helper+0x1c18/0x5450
[   14.624800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.624823]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.624845]  ? kasan_atomics+0x152/0x310
[   14.624869]  kasan_atomics+0x1dc/0x310
[   14.624889]  ? __pfx_kasan_atomics+0x10/0x10
[   14.624910]  ? __pfx_read_tsc+0x10/0x10
[   14.624935]  ? ktime_get_ts64+0x86/0x230
[   14.624961]  kunit_try_run_case+0x1a5/0x480
[   14.624982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.625001]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.625023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.625047]  ? __kthread_parkme+0x82/0x180
[   14.625069]  ? preempt_count_sub+0x50/0x80
[   14.625095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.625116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.625140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.625163]  kthread+0x337/0x6f0
[   14.625181]  ? trace_preempt_on+0x20/0xc0
[   14.625204]  ? __pfx_kthread+0x10/0x10
[   14.625233]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.625256]  ? calculate_sigpending+0x7b/0xa0
[   14.625277]  ? __pfx_kthread+0x10/0x10
[   14.625296]  ret_from_fork+0x41/0x80
[   14.625317]  ? __pfx_kthread+0x10/0x10
[   14.625335]  ret_from_fork_asm+0x1a/0x30
[   14.625467]  </TASK>
[   14.625482] 
[   14.632701] Allocated by task 285:
[   14.632843]  kasan_save_stack+0x45/0x70
[   14.633031]  kasan_save_track+0x18/0x40
[   14.633201]  kasan_save_alloc_info+0x3b/0x50
[   14.633350]  __kasan_kmalloc+0xb7/0xc0
[   14.633478]  __kmalloc_cache_noprof+0x189/0x420
[   14.633626]  kasan_atomics+0x95/0x310
[   14.633749]  kunit_try_run_case+0x1a5/0x480
[   14.633886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.634103]  kthread+0x337/0x6f0
[   14.634272]  ret_from_fork+0x41/0x80
[   14.634450]  ret_from_fork_asm+0x1a/0x30
[   14.634638] 
[   14.634728] The buggy address belongs to the object at ffff888103d00c80
[   14.634728]  which belongs to the cache kmalloc-64 of size 64
[   14.635375] The buggy address is located 0 bytes to the right of
[   14.635375]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.635744] 
[   14.635814] The buggy address belongs to the physical page:
[   14.636023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.636380] flags: 0x200000000000000(node=0|zone=2)
[   14.636614] page_type: f5(slab)
[   14.636776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.637125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.637368] page dumped because: kasan: bad access detected
[   14.637627] 
[   14.637718] Memory state around the buggy address:
[   14.637923]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.638192]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.638508] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.638727]                                      ^
[   14.638906]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.639242]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.639816] ==================================================================
[   14.868753] ==================================================================
[   14.869113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   14.869496] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.869845] 
[   14.869951] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.869991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.870003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.870023] Call Trace:
[   14.870036]  <TASK>
[   14.870051]  dump_stack_lvl+0x73/0xb0
[   14.870075]  print_report+0xd1/0x610
[   14.870098]  ? __virt_addr_valid+0x1db/0x2d0
[   14.870122]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.870147]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.870174]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.870196]  kasan_report+0x141/0x180
[   14.870219]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.870258]  __asan_report_load8_noabort+0x18/0x20
[   14.870281]  kasan_atomics_helper+0x4fa5/0x5450
[   14.870304]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.870328]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.870370]  ? kasan_atomics+0x152/0x310
[   14.870394]  kasan_atomics+0x1dc/0x310
[   14.870413]  ? __pfx_kasan_atomics+0x10/0x10
[   14.870435]  ? __pfx_read_tsc+0x10/0x10
[   14.870456]  ? ktime_get_ts64+0x86/0x230
[   14.870481]  kunit_try_run_case+0x1a5/0x480
[   14.870503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.870522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.870544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.870569]  ? __kthread_parkme+0x82/0x180
[   14.870591]  ? preempt_count_sub+0x50/0x80
[   14.870617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.870638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.870662]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.870685]  kthread+0x337/0x6f0
[   14.870703]  ? trace_preempt_on+0x20/0xc0
[   14.870726]  ? __pfx_kthread+0x10/0x10
[   14.870745]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.870768]  ? calculate_sigpending+0x7b/0xa0
[   14.870789]  ? __pfx_kthread+0x10/0x10
[   14.870808]  ret_from_fork+0x41/0x80
[   14.870829]  ? __pfx_kthread+0x10/0x10
[   14.870847]  ret_from_fork_asm+0x1a/0x30
[   14.870878]  </TASK>
[   14.870888] 
[   14.880536] Allocated by task 285:
[   14.880730]  kasan_save_stack+0x45/0x70
[   14.880940]  kasan_save_track+0x18/0x40
[   14.881132]  kasan_save_alloc_info+0x3b/0x50
[   14.881656]  __kasan_kmalloc+0xb7/0xc0
[   14.881927]  __kmalloc_cache_noprof+0x189/0x420
[   14.882380]  kasan_atomics+0x95/0x310
[   14.882623]  kunit_try_run_case+0x1a5/0x480
[   14.882933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.883189]  kthread+0x337/0x6f0
[   14.883596]  ret_from_fork+0x41/0x80
[   14.883841]  ret_from_fork_asm+0x1a/0x30
[   14.884149] 
[   14.884261] The buggy address belongs to the object at ffff888103d00c80
[   14.884261]  which belongs to the cache kmalloc-64 of size 64
[   14.884943] The buggy address is located 0 bytes to the right of
[   14.884943]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.885738] 
[   14.885976] The buggy address belongs to the physical page:
[   14.886494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.886959] flags: 0x200000000000000(node=0|zone=2)
[   14.887459] page_type: f5(slab)
[   14.887704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.888147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.888614] page dumped because: kasan: bad access detected
[   14.889056] 
[   14.889159] Memory state around the buggy address:
[   14.889584]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.890033]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.890482] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.890920]                                      ^
[   14.891140]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.891663]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.892334] ==================================================================
[   14.722247] ==================================================================
[   14.722634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   14.722973] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.723282] 
[   14.723409] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.723454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.723468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.723490] Call Trace:
[   14.723506]  <TASK>
[   14.723522]  dump_stack_lvl+0x73/0xb0
[   14.723548]  print_report+0xd1/0x610
[   14.723571]  ? __virt_addr_valid+0x1db/0x2d0
[   14.723593]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.723615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.723639]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.723662]  kasan_report+0x141/0x180
[   14.723685]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.723713]  kasan_check_range+0x10c/0x1c0
[   14.723734]  __kasan_check_write+0x18/0x20
[   14.723755]  kasan_atomics_helper+0x1eaa/0x5450
[   14.723779]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.723802]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.723824]  ? kasan_atomics+0x152/0x310
[   14.723848]  kasan_atomics+0x1dc/0x310
[   14.723868]  ? __pfx_kasan_atomics+0x10/0x10
[   14.723890]  ? __pfx_read_tsc+0x10/0x10
[   14.723911]  ? ktime_get_ts64+0x86/0x230
[   14.723936]  kunit_try_run_case+0x1a5/0x480
[   14.723958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.723978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.724000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.724025]  ? __kthread_parkme+0x82/0x180
[   14.724047]  ? preempt_count_sub+0x50/0x80
[   14.724073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.724094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.724118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.724142]  kthread+0x337/0x6f0
[   14.724160]  ? trace_preempt_on+0x20/0xc0
[   14.724185]  ? __pfx_kthread+0x10/0x10
[   14.724204]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.724237]  ? calculate_sigpending+0x7b/0xa0
[   14.724259]  ? __pfx_kthread+0x10/0x10
[   14.724278]  ret_from_fork+0x41/0x80
[   14.724300]  ? __pfx_kthread+0x10/0x10
[   14.724320]  ret_from_fork_asm+0x1a/0x30
[   14.724372]  </TASK>
[   14.724385] 
[   14.731418] Allocated by task 285:
[   14.731551]  kasan_save_stack+0x45/0x70
[   14.731750]  kasan_save_track+0x18/0x40
[   14.731941]  kasan_save_alloc_info+0x3b/0x50
[   14.732146]  __kasan_kmalloc+0xb7/0xc0
[   14.732340]  __kmalloc_cache_noprof+0x189/0x420
[   14.732577]  kasan_atomics+0x95/0x310
[   14.732763]  kunit_try_run_case+0x1a5/0x480
[   14.732969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.733216]  kthread+0x337/0x6f0
[   14.733396]  ret_from_fork+0x41/0x80
[   14.733558]  ret_from_fork_asm+0x1a/0x30
[   14.733696] 
[   14.733766] The buggy address belongs to the object at ffff888103d00c80
[   14.733766]  which belongs to the cache kmalloc-64 of size 64
[   14.734219] The buggy address is located 0 bytes to the right of
[   14.734219]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.734827] 
[   14.734925] The buggy address belongs to the physical page:
[   14.735144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.735497] flags: 0x200000000000000(node=0|zone=2)
[   14.735662] page_type: f5(slab)
[   14.735817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.736167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.736501] page dumped because: kasan: bad access detected
[   14.736723] 
[   14.736819] Memory state around the buggy address:
[   14.737019]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.737285]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.737624] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.737911]                                      ^
[   14.738099]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.738324]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.738555] ==================================================================
[   14.757258] ==================================================================
[   14.757785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   14.758154] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.758519] 
[   14.758632] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.758700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.758713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.758750] Call Trace:
[   14.758766]  <TASK>
[   14.758794]  dump_stack_lvl+0x73/0xb0
[   14.758835]  print_report+0xd1/0x610
[   14.758872]  ? __virt_addr_valid+0x1db/0x2d0
[   14.758907]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.758942]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.758979]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.759003]  kasan_report+0x141/0x180
[   14.759027]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.759056]  __asan_report_load8_noabort+0x18/0x20
[   14.759077]  kasan_atomics_helper+0x4f71/0x5450
[   14.759102]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.759125]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.759147]  ? kasan_atomics+0x152/0x310
[   14.759171]  kasan_atomics+0x1dc/0x310
[   14.759191]  ? __pfx_kasan_atomics+0x10/0x10
[   14.759213]  ? __pfx_read_tsc+0x10/0x10
[   14.759243]  ? ktime_get_ts64+0x86/0x230
[   14.759269]  kunit_try_run_case+0x1a5/0x480
[   14.759291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.759311]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.759332]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.759391]  ? __kthread_parkme+0x82/0x180
[   14.759414]  ? preempt_count_sub+0x50/0x80
[   14.759439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.759461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.759485]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.759511]  kthread+0x337/0x6f0
[   14.759529]  ? trace_preempt_on+0x20/0xc0
[   14.759553]  ? __pfx_kthread+0x10/0x10
[   14.759572]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.759596]  ? calculate_sigpending+0x7b/0xa0
[   14.759618]  ? __pfx_kthread+0x10/0x10
[   14.759637]  ret_from_fork+0x41/0x80
[   14.759658]  ? __pfx_kthread+0x10/0x10
[   14.759677]  ret_from_fork_asm+0x1a/0x30
[   14.759709]  </TASK>
[   14.759722] 
[   14.767156] Allocated by task 285:
[   14.767321]  kasan_save_stack+0x45/0x70
[   14.767559]  kasan_save_track+0x18/0x40
[   14.767752]  kasan_save_alloc_info+0x3b/0x50
[   14.767936]  __kasan_kmalloc+0xb7/0xc0
[   14.768125]  __kmalloc_cache_noprof+0x189/0x420
[   14.768330]  kasan_atomics+0x95/0x310
[   14.768544]  kunit_try_run_case+0x1a5/0x480
[   14.768729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.768927]  kthread+0x337/0x6f0
[   14.769046]  ret_from_fork+0x41/0x80
[   14.769177]  ret_from_fork_asm+0x1a/0x30
[   14.769414] 
[   14.769528] The buggy address belongs to the object at ffff888103d00c80
[   14.769528]  which belongs to the cache kmalloc-64 of size 64
[   14.770051] The buggy address is located 0 bytes to the right of
[   14.770051]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.770666] 
[   14.770763] The buggy address belongs to the physical page:
[   14.771006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.771401] flags: 0x200000000000000(node=0|zone=2)
[   14.771640] page_type: f5(slab)
[   14.771807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.772077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.772316] page dumped because: kasan: bad access detected
[   14.772515] 
[   14.772591] Memory state around the buggy address:
[   14.772816]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.773164]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.773536] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.773888]                                      ^
[   14.774136]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.774541]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.774793] ==================================================================
[   13.674308] ==================================================================
[   13.674576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.675036] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.675314] 
[   13.675460] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.675509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.675522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.675546] Call Trace:
[   13.675567]  <TASK>
[   13.675587]  dump_stack_lvl+0x73/0xb0
[   13.675615]  print_report+0xd1/0x610
[   13.675639]  ? __virt_addr_valid+0x1db/0x2d0
[   13.675663]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.675686]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.675710]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.675733]  kasan_report+0x141/0x180
[   13.675756]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.675784]  __asan_report_store4_noabort+0x1b/0x30
[   13.675807]  kasan_atomics_helper+0x4b6e/0x5450
[   13.675830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.675854]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.675876]  ? kasan_atomics+0x152/0x310
[   13.675901]  kasan_atomics+0x1dc/0x310
[   13.675921]  ? __pfx_kasan_atomics+0x10/0x10
[   13.675942]  ? __pfx_read_tsc+0x10/0x10
[   13.675964]  ? ktime_get_ts64+0x86/0x230
[   13.675990]  kunit_try_run_case+0x1a5/0x480
[   13.676013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.676032]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.676054]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.676080]  ? __kthread_parkme+0x82/0x180
[   13.676102]  ? preempt_count_sub+0x50/0x80
[   13.676128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.676150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.676173]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.676198]  kthread+0x337/0x6f0
[   13.676216]  ? trace_preempt_on+0x20/0xc0
[   13.676253]  ? __pfx_kthread+0x10/0x10
[   13.676272]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.676295]  ? calculate_sigpending+0x7b/0xa0
[   13.676318]  ? __pfx_kthread+0x10/0x10
[   13.676336]  ret_from_fork+0x41/0x80
[   13.676381]  ? __pfx_kthread+0x10/0x10
[   13.676401]  ret_from_fork_asm+0x1a/0x30
[   13.676449]  </TASK>
[   13.676461] 
[   13.687532] Allocated by task 285:
[   13.688017]  kasan_save_stack+0x45/0x70
[   13.688720]  kasan_save_track+0x18/0x40
[   13.688908]  kasan_save_alloc_info+0x3b/0x50
[   13.689221]  __kasan_kmalloc+0xb7/0xc0
[   13.689395]  __kmalloc_cache_noprof+0x189/0x420
[   13.689851]  kasan_atomics+0x95/0x310
[   13.690200]  kunit_try_run_case+0x1a5/0x480
[   13.690469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.690909]  kthread+0x337/0x6f0
[   13.691107]  ret_from_fork+0x41/0x80
[   13.691390]  ret_from_fork_asm+0x1a/0x30
[   13.691603] 
[   13.691697] The buggy address belongs to the object at ffff888103d00c80
[   13.691697]  which belongs to the cache kmalloc-64 of size 64
[   13.692594] The buggy address is located 0 bytes to the right of
[   13.692594]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.693315] 
[   13.693559] The buggy address belongs to the physical page:
[   13.694055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.694537] flags: 0x200000000000000(node=0|zone=2)
[   13.694832] page_type: f5(slab)
[   13.695006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.695495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.695928] page dumped because: kasan: bad access detected
[   13.696285] 
[   13.696467] Memory state around the buggy address:
[   13.696861]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.697160]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.697476] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.697997]                                      ^
[   13.698178]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.698755]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.699058] ==================================================================
[   14.164547] ==================================================================
[   14.164923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.165297] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.165637] 
[   14.165741] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.165784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.165796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.165816] Call Trace:
[   14.165831]  <TASK>
[   14.165845]  dump_stack_lvl+0x73/0xb0
[   14.165869]  print_report+0xd1/0x610
[   14.165892]  ? __virt_addr_valid+0x1db/0x2d0
[   14.165913]  ? kasan_atomics_helper+0x1079/0x5450
[   14.165935]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.165957]  ? kasan_atomics_helper+0x1079/0x5450
[   14.165980]  kasan_report+0x141/0x180
[   14.166003]  ? kasan_atomics_helper+0x1079/0x5450
[   14.166030]  kasan_check_range+0x10c/0x1c0
[   14.166051]  __kasan_check_write+0x18/0x20
[   14.166071]  kasan_atomics_helper+0x1079/0x5450
[   14.166095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.166117]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.166139]  ? kasan_atomics+0x152/0x310
[   14.166163]  kasan_atomics+0x1dc/0x310
[   14.166184]  ? __pfx_kasan_atomics+0x10/0x10
[   14.166205]  ? __pfx_read_tsc+0x10/0x10
[   14.166236]  ? ktime_get_ts64+0x86/0x230
[   14.166271]  kunit_try_run_case+0x1a5/0x480
[   14.166293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.166312]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.166369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.166394]  ? __kthread_parkme+0x82/0x180
[   14.166416]  ? preempt_count_sub+0x50/0x80
[   14.166453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.166474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.166498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.166522]  kthread+0x337/0x6f0
[   14.166539]  ? trace_preempt_on+0x20/0xc0
[   14.166563]  ? __pfx_kthread+0x10/0x10
[   14.166582]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.166614]  ? calculate_sigpending+0x7b/0xa0
[   14.166636]  ? __pfx_kthread+0x10/0x10
[   14.166655]  ret_from_fork+0x41/0x80
[   14.166687]  ? __pfx_kthread+0x10/0x10
[   14.166706]  ret_from_fork_asm+0x1a/0x30
[   14.166738]  </TASK>
[   14.166748] 
[   14.174215] Allocated by task 285:
[   14.174412]  kasan_save_stack+0x45/0x70
[   14.174614]  kasan_save_track+0x18/0x40
[   14.174773]  kasan_save_alloc_info+0x3b/0x50
[   14.175000]  __kasan_kmalloc+0xb7/0xc0
[   14.175172]  __kmalloc_cache_noprof+0x189/0x420
[   14.175422]  kasan_atomics+0x95/0x310
[   14.175621]  kunit_try_run_case+0x1a5/0x480
[   14.175823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.176000]  kthread+0x337/0x6f0
[   14.176117]  ret_from_fork+0x41/0x80
[   14.176264]  ret_from_fork_asm+0x1a/0x30
[   14.176496] 
[   14.176590] The buggy address belongs to the object at ffff888103d00c80
[   14.176590]  which belongs to the cache kmalloc-64 of size 64
[   14.177147] The buggy address is located 0 bytes to the right of
[   14.177147]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.177684] 
[   14.177757] The buggy address belongs to the physical page:
[   14.177928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.178259] flags: 0x200000000000000(node=0|zone=2)
[   14.178539] page_type: f5(slab)
[   14.178734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.179081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.179454] page dumped because: kasan: bad access detected
[   14.179685] 
[   14.179780] Memory state around the buggy address:
[   14.179949]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.180291]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.180616] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.180901]                                      ^
[   14.181125]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.181459]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.181760] ==================================================================
[   14.007313] ==================================================================
[   14.007683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.008011] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.008318] 
[   14.008446] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.008491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.008503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.008525] Call Trace:
[   14.008541]  <TASK>
[   14.008556]  dump_stack_lvl+0x73/0xb0
[   14.008580]  print_report+0xd1/0x610
[   14.008603]  ? __virt_addr_valid+0x1db/0x2d0
[   14.008624]  ? kasan_atomics_helper+0xc70/0x5450
[   14.008646]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.008669]  ? kasan_atomics_helper+0xc70/0x5450
[   14.008692]  kasan_report+0x141/0x180
[   14.008715]  ? kasan_atomics_helper+0xc70/0x5450
[   14.008743]  kasan_check_range+0x10c/0x1c0
[   14.008764]  __kasan_check_write+0x18/0x20
[   14.008785]  kasan_atomics_helper+0xc70/0x5450
[   14.008808]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.008831]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.008853]  ? kasan_atomics+0x152/0x310
[   14.008876]  kasan_atomics+0x1dc/0x310
[   14.008897]  ? __pfx_kasan_atomics+0x10/0x10
[   14.008923]  ? __pfx_read_tsc+0x10/0x10
[   14.008943]  ? ktime_get_ts64+0x86/0x230
[   14.008969]  kunit_try_run_case+0x1a5/0x480
[   14.008990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.009009]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.009030]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.009056]  ? __kthread_parkme+0x82/0x180
[   14.009077]  ? preempt_count_sub+0x50/0x80
[   14.009103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.009125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.009148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.009172]  kthread+0x337/0x6f0
[   14.009189]  ? trace_preempt_on+0x20/0xc0
[   14.009215]  ? __pfx_kthread+0x10/0x10
[   14.009245]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.009268]  ? calculate_sigpending+0x7b/0xa0
[   14.009289]  ? __pfx_kthread+0x10/0x10
[   14.009309]  ret_from_fork+0x41/0x80
[   14.009330]  ? __pfx_kthread+0x10/0x10
[   14.009348]  ret_from_fork_asm+0x1a/0x30
[   14.009380]  </TASK>
[   14.009391] 
[   14.016546] Allocated by task 285:
[   14.016725]  kasan_save_stack+0x45/0x70
[   14.016967]  kasan_save_track+0x18/0x40
[   14.017160]  kasan_save_alloc_info+0x3b/0x50
[   14.017375]  __kasan_kmalloc+0xb7/0xc0
[   14.017645]  __kmalloc_cache_noprof+0x189/0x420
[   14.018091]  kasan_atomics+0x95/0x310
[   14.018235]  kunit_try_run_case+0x1a5/0x480
[   14.018426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.018685]  kthread+0x337/0x6f0
[   14.018850]  ret_from_fork+0x41/0x80
[   14.019005]  ret_from_fork_asm+0x1a/0x30
[   14.019175] 
[   14.019270] The buggy address belongs to the object at ffff888103d00c80
[   14.019270]  which belongs to the cache kmalloc-64 of size 64
[   14.019723] The buggy address is located 0 bytes to the right of
[   14.019723]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.020205] 
[   14.020314] The buggy address belongs to the physical page:
[   14.020739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.021061] flags: 0x200000000000000(node=0|zone=2)
[   14.021273] page_type: f5(slab)
[   14.021513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.021812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.022112] page dumped because: kasan: bad access detected
[   14.022345] 
[   14.022450] Memory state around the buggy address:
[   14.022654]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.022936]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.023213] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.023545]                                      ^
[   14.023743]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.024003]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.024296] ==================================================================
[   14.257601] ==================================================================
[   14.258300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.258962] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.259553] 
[   14.259646] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.259692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.259704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.259727] Call Trace:
[   14.259746]  <TASK>
[   14.259763]  dump_stack_lvl+0x73/0xb0
[   14.259790]  print_report+0xd1/0x610
[   14.259814]  ? __virt_addr_valid+0x1db/0x2d0
[   14.259836]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.259858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.259881]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.259904]  kasan_report+0x141/0x180
[   14.259927]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.259955]  __asan_report_load4_noabort+0x18/0x20
[   14.259976]  kasan_atomics_helper+0x49e8/0x5450
[   14.260000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.260022]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.260044]  ? kasan_atomics+0x152/0x310
[   14.260068]  kasan_atomics+0x1dc/0x310
[   14.260088]  ? __pfx_kasan_atomics+0x10/0x10
[   14.260109]  ? __pfx_read_tsc+0x10/0x10
[   14.260129]  ? ktime_get_ts64+0x86/0x230
[   14.260155]  kunit_try_run_case+0x1a5/0x480
[   14.260177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.260196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.260217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.260261]  ? __kthread_parkme+0x82/0x180
[   14.260283]  ? preempt_count_sub+0x50/0x80
[   14.260309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.260330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.260384]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.260408]  kthread+0x337/0x6f0
[   14.260426]  ? trace_preempt_on+0x20/0xc0
[   14.260470]  ? __pfx_kthread+0x10/0x10
[   14.260489]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.260512]  ? calculate_sigpending+0x7b/0xa0
[   14.260544]  ? __pfx_kthread+0x10/0x10
[   14.260564]  ret_from_fork+0x41/0x80
[   14.260584]  ? __pfx_kthread+0x10/0x10
[   14.260603]  ret_from_fork_asm+0x1a/0x30
[   14.260635]  </TASK>
[   14.260646] 
[   14.274193] Allocated by task 285:
[   14.274363]  kasan_save_stack+0x45/0x70
[   14.274752]  kasan_save_track+0x18/0x40
[   14.275128]  kasan_save_alloc_info+0x3b/0x50
[   14.275546]  __kasan_kmalloc+0xb7/0xc0
[   14.275903]  __kmalloc_cache_noprof+0x189/0x420
[   14.276321]  kasan_atomics+0x95/0x310
[   14.276659]  kunit_try_run_case+0x1a5/0x480
[   14.276984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.277160]  kthread+0x337/0x6f0
[   14.277435]  ret_from_fork+0x41/0x80
[   14.277779]  ret_from_fork_asm+0x1a/0x30
[   14.278142] 
[   14.278315] The buggy address belongs to the object at ffff888103d00c80
[   14.278315]  which belongs to the cache kmalloc-64 of size 64
[   14.279267] The buggy address is located 0 bytes to the right of
[   14.279267]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.279880] 
[   14.279954] The buggy address belongs to the physical page:
[   14.280127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.280724] flags: 0x200000000000000(node=0|zone=2)
[   14.281188] page_type: f5(slab)
[   14.281535] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.282189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.282864] page dumped because: kasan: bad access detected
[   14.283391] 
[   14.283559] Memory state around the buggy address:
[   14.283992]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.284474]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.284693] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.284909]                                      ^
[   14.285077]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.285474]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.286081] ==================================================================
[   13.823664] ==================================================================
[   13.824365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   13.825105] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.825430] 
[   13.825552] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.825600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.825613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.825637] Call Trace:
[   13.825658]  <TASK>
[   13.825677]  dump_stack_lvl+0x73/0xb0
[   13.825705]  print_report+0xd1/0x610
[   13.825728]  ? __virt_addr_valid+0x1db/0x2d0
[   13.825751]  ? kasan_atomics_helper+0x697/0x5450
[   13.825772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.825795]  ? kasan_atomics_helper+0x697/0x5450
[   13.825818]  kasan_report+0x141/0x180
[   13.825842]  ? kasan_atomics_helper+0x697/0x5450
[   13.825870]  kasan_check_range+0x10c/0x1c0
[   13.825891]  __kasan_check_write+0x18/0x20
[   13.825911]  kasan_atomics_helper+0x697/0x5450
[   13.825935]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.825957]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.825980]  ? kasan_atomics+0x152/0x310
[   13.826003]  kasan_atomics+0x1dc/0x310
[   13.826023]  ? __pfx_kasan_atomics+0x10/0x10
[   13.826045]  ? __pfx_read_tsc+0x10/0x10
[   13.826066]  ? ktime_get_ts64+0x86/0x230
[   13.826092]  kunit_try_run_case+0x1a5/0x480
[   13.826114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.826133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.826155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.826179]  ? __kthread_parkme+0x82/0x180
[   13.826202]  ? preempt_count_sub+0x50/0x80
[   13.826239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.826260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.826284]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.826307]  kthread+0x337/0x6f0
[   13.826324]  ? trace_preempt_on+0x20/0xc0
[   13.826349]  ? __pfx_kthread+0x10/0x10
[   13.826379]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.826402]  ? calculate_sigpending+0x7b/0xa0
[   13.826424]  ? __pfx_kthread+0x10/0x10
[   13.826442]  ret_from_fork+0x41/0x80
[   13.826465]  ? __pfx_kthread+0x10/0x10
[   13.826483]  ret_from_fork_asm+0x1a/0x30
[   13.826514]  </TASK>
[   13.826525] 
[   13.835375] Allocated by task 285:
[   13.835539]  kasan_save_stack+0x45/0x70
[   13.835749]  kasan_save_track+0x18/0x40
[   13.835952]  kasan_save_alloc_info+0x3b/0x50
[   13.836127]  __kasan_kmalloc+0xb7/0xc0
[   13.836330]  __kmalloc_cache_noprof+0x189/0x420
[   13.836530]  kasan_atomics+0x95/0x310
[   13.836710]  kunit_try_run_case+0x1a5/0x480
[   13.836856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.837039]  kthread+0x337/0x6f0
[   13.837185]  ret_from_fork+0x41/0x80
[   13.837375]  ret_from_fork_asm+0x1a/0x30
[   13.837601] 
[   13.837694] The buggy address belongs to the object at ffff888103d00c80
[   13.837694]  which belongs to the cache kmalloc-64 of size 64
[   13.838121] The buggy address is located 0 bytes to the right of
[   13.838121]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.838818] 
[   13.838915] The buggy address belongs to the physical page:
[   13.839136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.839503] flags: 0x200000000000000(node=0|zone=2)
[   13.839723] page_type: f5(slab)
[   13.839907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.840208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.840496] page dumped because: kasan: bad access detected
[   13.840752] 
[   13.840866] Memory state around the buggy address:
[   13.841119]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.841406]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.841770] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.842068]                                      ^
[   13.842266]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.842605]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.842854] ==================================================================
[   14.129302] ==================================================================
[   14.129605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.129908] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.130199] 
[   14.130529] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.130575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.130588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.130610] Call Trace:
[   14.130627]  <TASK>
[   14.130643]  dump_stack_lvl+0x73/0xb0
[   14.130668]  print_report+0xd1/0x610
[   14.130690]  ? __virt_addr_valid+0x1db/0x2d0
[   14.130712]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.130746]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.130770]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.130793]  kasan_report+0x141/0x180
[   14.130827]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.130855]  kasan_check_range+0x10c/0x1c0
[   14.130876]  __kasan_check_write+0x18/0x20
[   14.130897]  kasan_atomics_helper+0xfa9/0x5450
[   14.130929]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.130952]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.130974]  ? kasan_atomics+0x152/0x310
[   14.131008]  kasan_atomics+0x1dc/0x310
[   14.131028]  ? __pfx_kasan_atomics+0x10/0x10
[   14.131051]  ? __pfx_read_tsc+0x10/0x10
[   14.131072]  ? ktime_get_ts64+0x86/0x230
[   14.131106]  kunit_try_run_case+0x1a5/0x480
[   14.131127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.131147]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.131178]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.131203]  ? __kthread_parkme+0x82/0x180
[   14.131235]  ? preempt_count_sub+0x50/0x80
[   14.131262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.131283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.131308]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.131331]  kthread+0x337/0x6f0
[   14.131370]  ? trace_preempt_on+0x20/0xc0
[   14.131394]  ? __pfx_kthread+0x10/0x10
[   14.131412]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.131436]  ? calculate_sigpending+0x7b/0xa0
[   14.131458]  ? __pfx_kthread+0x10/0x10
[   14.131478]  ret_from_fork+0x41/0x80
[   14.131509]  ? __pfx_kthread+0x10/0x10
[   14.131528]  ret_from_fork_asm+0x1a/0x30
[   14.131561]  </TASK>
[   14.131583] 
[   14.138975] Allocated by task 285:
[   14.139110]  kasan_save_stack+0x45/0x70
[   14.139269]  kasan_save_track+0x18/0x40
[   14.139474]  kasan_save_alloc_info+0x3b/0x50
[   14.139686]  __kasan_kmalloc+0xb7/0xc0
[   14.139894]  __kmalloc_cache_noprof+0x189/0x420
[   14.140113]  kasan_atomics+0x95/0x310
[   14.140318]  kunit_try_run_case+0x1a5/0x480
[   14.140548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.140813]  kthread+0x337/0x6f0
[   14.140982]  ret_from_fork+0x41/0x80
[   14.141164]  ret_from_fork_asm+0x1a/0x30
[   14.141402] 
[   14.141488] The buggy address belongs to the object at ffff888103d00c80
[   14.141488]  which belongs to the cache kmalloc-64 of size 64
[   14.141974] The buggy address is located 0 bytes to the right of
[   14.141974]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.142495] 
[   14.142614] The buggy address belongs to the physical page:
[   14.142842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.143168] flags: 0x200000000000000(node=0|zone=2)
[   14.143456] page_type: f5(slab)
[   14.143615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.143854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.144080] page dumped because: kasan: bad access detected
[   14.144270] 
[   14.144381] Memory state around the buggy address:
[   14.144677]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.145000]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.145324] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.145701]                                      ^
[   14.145857]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.146074]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.146349] ==================================================================
[   14.364399] ==================================================================
[   14.364845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.365238] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.365792] 
[   14.365914] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.365970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.365982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.366003] Call Trace:
[   14.366017]  <TASK>
[   14.366030]  dump_stack_lvl+0x73/0xb0
[   14.366055]  print_report+0xd1/0x610
[   14.366079]  ? __virt_addr_valid+0x1db/0x2d0
[   14.366101]  ? kasan_atomics_helper+0x1467/0x5450
[   14.366122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.366146]  ? kasan_atomics_helper+0x1467/0x5450
[   14.366168]  kasan_report+0x141/0x180
[   14.366191]  ? kasan_atomics_helper+0x1467/0x5450
[   14.366219]  kasan_check_range+0x10c/0x1c0
[   14.366250]  __kasan_check_write+0x18/0x20
[   14.366270]  kasan_atomics_helper+0x1467/0x5450
[   14.366294]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.366317]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.366339]  ? kasan_atomics+0x152/0x310
[   14.366371]  kasan_atomics+0x1dc/0x310
[   14.366391]  ? __pfx_kasan_atomics+0x10/0x10
[   14.366413]  ? __pfx_read_tsc+0x10/0x10
[   14.366434]  ? ktime_get_ts64+0x86/0x230
[   14.366459]  kunit_try_run_case+0x1a5/0x480
[   14.366481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.366501]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.366523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.366548]  ? __kthread_parkme+0x82/0x180
[   14.366570]  ? preempt_count_sub+0x50/0x80
[   14.366597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.366618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.366642]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.366666]  kthread+0x337/0x6f0
[   14.366683]  ? trace_preempt_on+0x20/0xc0
[   14.366708]  ? __pfx_kthread+0x10/0x10
[   14.366727]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.366750]  ? calculate_sigpending+0x7b/0xa0
[   14.366772]  ? __pfx_kthread+0x10/0x10
[   14.366791]  ret_from_fork+0x41/0x80
[   14.366818]  ? __pfx_kthread+0x10/0x10
[   14.366840]  ret_from_fork_asm+0x1a/0x30
[   14.366872]  </TASK>
[   14.366883] 
[   14.374580] Allocated by task 285:
[   14.374739]  kasan_save_stack+0x45/0x70
[   14.374939]  kasan_save_track+0x18/0x40
[   14.375122]  kasan_save_alloc_info+0x3b/0x50
[   14.375278]  __kasan_kmalloc+0xb7/0xc0
[   14.375412]  __kmalloc_cache_noprof+0x189/0x420
[   14.375563]  kasan_atomics+0x95/0x310
[   14.375692]  kunit_try_run_case+0x1a5/0x480
[   14.375836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.376012]  kthread+0x337/0x6f0
[   14.376132]  ret_from_fork+0x41/0x80
[   14.376288]  ret_from_fork_asm+0x1a/0x30
[   14.376483] 
[   14.376574] The buggy address belongs to the object at ffff888103d00c80
[   14.376574]  which belongs to the cache kmalloc-64 of size 64
[   14.377101] The buggy address is located 0 bytes to the right of
[   14.377101]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.378177] 
[   14.378283] The buggy address belongs to the physical page:
[   14.378555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.378872] flags: 0x200000000000000(node=0|zone=2)
[   14.379036] page_type: f5(slab)
[   14.379156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.379803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.380120] page dumped because: kasan: bad access detected
[   14.380335] 
[   14.380502] Memory state around the buggy address:
[   14.380723]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.380944]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.381159] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.381413]                                      ^
[   14.381636]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.381957]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.382307] ==================================================================
[   13.759967] ==================================================================
[   13.760207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.760714] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.761342] 
[   13.761551] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.761596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.761609] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.761631] Call Trace:
[   13.761649]  <TASK>
[   13.761666]  dump_stack_lvl+0x73/0xb0
[   13.761693]  print_report+0xd1/0x610
[   13.761716]  ? __virt_addr_valid+0x1db/0x2d0
[   13.761738]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.761761]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.761784]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.761807]  kasan_report+0x141/0x180
[   13.761830]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.761858]  __asan_report_store4_noabort+0x1b/0x30
[   13.761880]  kasan_atomics_helper+0x4b3a/0x5450
[   13.761904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.761927]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.761950]  ? kasan_atomics+0x152/0x310
[   13.761974]  kasan_atomics+0x1dc/0x310
[   13.761994]  ? __pfx_kasan_atomics+0x10/0x10
[   13.762015]  ? __pfx_read_tsc+0x10/0x10
[   13.762064]  ? ktime_get_ts64+0x86/0x230
[   13.762090]  kunit_try_run_case+0x1a5/0x480
[   13.762112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.762132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.762153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.762179]  ? __kthread_parkme+0x82/0x180
[   13.762200]  ? preempt_count_sub+0x50/0x80
[   13.762236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.762278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.762301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.762326]  kthread+0x337/0x6f0
[   13.762344]  ? trace_preempt_on+0x20/0xc0
[   13.762376]  ? __pfx_kthread+0x10/0x10
[   13.762395]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.762418]  ? calculate_sigpending+0x7b/0xa0
[   13.762440]  ? __pfx_kthread+0x10/0x10
[   13.762460]  ret_from_fork+0x41/0x80
[   13.762481]  ? __pfx_kthread+0x10/0x10
[   13.762500]  ret_from_fork_asm+0x1a/0x30
[   13.762532]  </TASK>
[   13.762544] 
[   13.770909] Allocated by task 285:
[   13.771153]  kasan_save_stack+0x45/0x70
[   13.771389]  kasan_save_track+0x18/0x40
[   13.771586]  kasan_save_alloc_info+0x3b/0x50
[   13.771796]  __kasan_kmalloc+0xb7/0xc0
[   13.771956]  __kmalloc_cache_noprof+0x189/0x420
[   13.772105]  kasan_atomics+0x95/0x310
[   13.772242]  kunit_try_run_case+0x1a5/0x480
[   13.772427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.772681]  kthread+0x337/0x6f0
[   13.772809]  ret_from_fork+0x41/0x80
[   13.772941]  ret_from_fork_asm+0x1a/0x30
[   13.773079] 
[   13.773148] The buggy address belongs to the object at ffff888103d00c80
[   13.773148]  which belongs to the cache kmalloc-64 of size 64
[   13.773717] The buggy address is located 0 bytes to the right of
[   13.773717]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.774258] 
[   13.774394] The buggy address belongs to the physical page:
[   13.774644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.774884] flags: 0x200000000000000(node=0|zone=2)
[   13.775043] page_type: f5(slab)
[   13.775162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.775452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.775783] page dumped because: kasan: bad access detected
[   13.776027] 
[   13.776117] Memory state around the buggy address:
[   13.776366]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.776703]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.777031] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.777357]                                      ^
[   13.777554]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.777876]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.778206] ==================================================================
[   14.420187] ==================================================================
[   14.420490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.420875] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.421600] 
[   14.421725] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.421794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.421807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.421840] Call Trace:
[   14.421855]  <TASK>
[   14.421882]  dump_stack_lvl+0x73/0xb0
[   14.421920]  print_report+0xd1/0x610
[   14.421957]  ? __virt_addr_valid+0x1db/0x2d0
[   14.422003]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.422026]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.422050]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.422086]  kasan_report+0x141/0x180
[   14.422109]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.422137]  kasan_check_range+0x10c/0x1c0
[   14.422159]  __kasan_check_write+0x18/0x20
[   14.422179]  kasan_atomics_helper+0x15b6/0x5450
[   14.422203]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.422236]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.422258]  ? kasan_atomics+0x152/0x310
[   14.422282]  kasan_atomics+0x1dc/0x310
[   14.422301]  ? __pfx_kasan_atomics+0x10/0x10
[   14.422323]  ? __pfx_read_tsc+0x10/0x10
[   14.422344]  ? ktime_get_ts64+0x86/0x230
[   14.422370]  kunit_try_run_case+0x1a5/0x480
[   14.422391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.422410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.422431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.422457]  ? __kthread_parkme+0x82/0x180
[   14.422478]  ? preempt_count_sub+0x50/0x80
[   14.422505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.422527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.422553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.422577]  kthread+0x337/0x6f0
[   14.422595]  ? trace_preempt_on+0x20/0xc0
[   14.422619]  ? __pfx_kthread+0x10/0x10
[   14.422638]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.422661]  ? calculate_sigpending+0x7b/0xa0
[   14.422683]  ? __pfx_kthread+0x10/0x10
[   14.422703]  ret_from_fork+0x41/0x80
[   14.422724]  ? __pfx_kthread+0x10/0x10
[   14.422743]  ret_from_fork_asm+0x1a/0x30
[   14.422774]  </TASK>
[   14.422786] 
[   14.431205] Allocated by task 285:
[   14.431484]  kasan_save_stack+0x45/0x70
[   14.431699]  kasan_save_track+0x18/0x40
[   14.431961]  kasan_save_alloc_info+0x3b/0x50
[   14.432196]  __kasan_kmalloc+0xb7/0xc0
[   14.432383]  __kmalloc_cache_noprof+0x189/0x420
[   14.432607]  kasan_atomics+0x95/0x310
[   14.432825]  kunit_try_run_case+0x1a5/0x480
[   14.433025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.433258]  kthread+0x337/0x6f0
[   14.433394]  ret_from_fork+0x41/0x80
[   14.433609]  ret_from_fork_asm+0x1a/0x30
[   14.433860] 
[   14.433962] The buggy address belongs to the object at ffff888103d00c80
[   14.433962]  which belongs to the cache kmalloc-64 of size 64
[   14.434506] The buggy address is located 0 bytes to the right of
[   14.434506]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.435064] 
[   14.435136] The buggy address belongs to the physical page:
[   14.435409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.435775] flags: 0x200000000000000(node=0|zone=2)
[   14.436017] page_type: f5(slab)
[   14.436212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.436577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.436910] page dumped because: kasan: bad access detected
[   14.437179] 
[   14.437290] Memory state around the buggy address:
[   14.437607]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.437949]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.438280] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.438674]                                      ^
[   14.438848]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.439219]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.439661] ==================================================================
[   13.989631] ==================================================================
[   13.990136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   13.990642] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.990900] 
[   13.990988] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.991033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.991046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.991068] Call Trace:
[   13.991083]  <TASK>
[   13.991098]  dump_stack_lvl+0x73/0xb0
[   13.991122]  print_report+0xd1/0x610
[   13.991146]  ? __virt_addr_valid+0x1db/0x2d0
[   13.991167]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.991189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.991212]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.991248]  kasan_report+0x141/0x180
[   13.991272]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.991299]  kasan_check_range+0x10c/0x1c0
[   13.991320]  __kasan_check_write+0x18/0x20
[   13.991340]  kasan_atomics_helper+0xb6a/0x5450
[   13.991377]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.991401]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.991423]  ? kasan_atomics+0x152/0x310
[   13.991447]  kasan_atomics+0x1dc/0x310
[   13.991466]  ? __pfx_kasan_atomics+0x10/0x10
[   13.991488]  ? __pfx_read_tsc+0x10/0x10
[   13.991508]  ? ktime_get_ts64+0x86/0x230
[   13.991534]  kunit_try_run_case+0x1a5/0x480
[   13.991556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.991575]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.991597]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.991622]  ? __kthread_parkme+0x82/0x180
[   13.991644]  ? preempt_count_sub+0x50/0x80
[   13.991671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.991693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.991717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.991741]  kthread+0x337/0x6f0
[   13.991759]  ? trace_preempt_on+0x20/0xc0
[   13.991784]  ? __pfx_kthread+0x10/0x10
[   13.991802]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.991825]  ? calculate_sigpending+0x7b/0xa0
[   13.991847]  ? __pfx_kthread+0x10/0x10
[   13.991866]  ret_from_fork+0x41/0x80
[   13.991887]  ? __pfx_kthread+0x10/0x10
[   13.991906]  ret_from_fork_asm+0x1a/0x30
[   13.991937]  </TASK>
[   13.991948] 
[   13.999177] Allocated by task 285:
[   13.999366]  kasan_save_stack+0x45/0x70
[   13.999561]  kasan_save_track+0x18/0x40
[   13.999751]  kasan_save_alloc_info+0x3b/0x50
[   13.999958]  __kasan_kmalloc+0xb7/0xc0
[   14.000143]  __kmalloc_cache_noprof+0x189/0x420
[   14.000374]  kasan_atomics+0x95/0x310
[   14.000512]  kunit_try_run_case+0x1a5/0x480
[   14.000699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.000958]  kthread+0x337/0x6f0
[   14.001076]  ret_from_fork+0x41/0x80
[   14.001208]  ret_from_fork_asm+0x1a/0x30
[   14.001367] 
[   14.001461] The buggy address belongs to the object at ffff888103d00c80
[   14.001461]  which belongs to the cache kmalloc-64 of size 64
[   14.001997] The buggy address is located 0 bytes to the right of
[   14.001997]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.002548] 
[   14.002645] The buggy address belongs to the physical page:
[   14.002889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.003201] flags: 0x200000000000000(node=0|zone=2)
[   14.003440] page_type: f5(slab)
[   14.003570] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.003886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.004116] page dumped because: kasan: bad access detected
[   14.004296] 
[   14.004377] Memory state around the buggy address:
[   14.004600]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.004913]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.005241] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.005727]                                      ^
[   14.005915]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.006150]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.006571] ==================================================================
[   14.518497] ==================================================================
[   14.519160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.519627] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.520017] 
[   14.520110] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.520154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.520166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.520214] Call Trace:
[   14.520247]  <TASK>
[   14.520280]  dump_stack_lvl+0x73/0xb0
[   14.520314]  print_report+0xd1/0x610
[   14.520336]  ? __virt_addr_valid+0x1db/0x2d0
[   14.520370]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.520394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.520416]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.520455]  kasan_report+0x141/0x180
[   14.520492]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.520533]  kasan_check_range+0x10c/0x1c0
[   14.520567]  __kasan_check_write+0x18/0x20
[   14.520588]  kasan_atomics_helper+0x18b1/0x5450
[   14.520626]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.520662]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.520697]  ? kasan_atomics+0x152/0x310
[   14.520734]  kasan_atomics+0x1dc/0x310
[   14.520768]  ? __pfx_kasan_atomics+0x10/0x10
[   14.520802]  ? __pfx_read_tsc+0x10/0x10
[   14.520837]  ? ktime_get_ts64+0x86/0x230
[   14.520881]  kunit_try_run_case+0x1a5/0x480
[   14.520905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.520929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.520951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.520976]  ? __kthread_parkme+0x82/0x180
[   14.520997]  ? preempt_count_sub+0x50/0x80
[   14.521023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.521044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.521067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.521092]  kthread+0x337/0x6f0
[   14.521109]  ? trace_preempt_on+0x20/0xc0
[   14.521133]  ? __pfx_kthread+0x10/0x10
[   14.521152]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.521176]  ? calculate_sigpending+0x7b/0xa0
[   14.521197]  ? __pfx_kthread+0x10/0x10
[   14.521217]  ret_from_fork+0x41/0x80
[   14.521249]  ? __pfx_kthread+0x10/0x10
[   14.521268]  ret_from_fork_asm+0x1a/0x30
[   14.521300]  </TASK>
[   14.521312] 
[   14.529396] Allocated by task 285:
[   14.529551]  kasan_save_stack+0x45/0x70
[   14.529776]  kasan_save_track+0x18/0x40
[   14.529980]  kasan_save_alloc_info+0x3b/0x50
[   14.530210]  __kasan_kmalloc+0xb7/0xc0
[   14.530452]  __kmalloc_cache_noprof+0x189/0x420
[   14.530673]  kasan_atomics+0x95/0x310
[   14.530860]  kunit_try_run_case+0x1a5/0x480
[   14.531113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.531349]  kthread+0x337/0x6f0
[   14.531553]  ret_from_fork+0x41/0x80
[   14.531737]  ret_from_fork_asm+0x1a/0x30
[   14.531962] 
[   14.532092] The buggy address belongs to the object at ffff888103d00c80
[   14.532092]  which belongs to the cache kmalloc-64 of size 64
[   14.532626] The buggy address is located 0 bytes to the right of
[   14.532626]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.533174] 
[   14.533316] The buggy address belongs to the physical page:
[   14.533635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.533887] flags: 0x200000000000000(node=0|zone=2)
[   14.534046] page_type: f5(slab)
[   14.534162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.534420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.534775] page dumped because: kasan: bad access detected
[   14.535047] 
[   14.535138] Memory state around the buggy address:
[   14.535366]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.535674]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.535979] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.536278]                                      ^
[   14.536581]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.536854]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.537084] ==================================================================
[   14.834878] ==================================================================
[   14.835237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   14.835605] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.835953] 
[   14.836064] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.836106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.836118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.836139] Call Trace:
[   14.836154]  <TASK>
[   14.836168]  dump_stack_lvl+0x73/0xb0
[   14.836192]  print_report+0xd1/0x610
[   14.836215]  ? __virt_addr_valid+0x1db/0x2d0
[   14.836247]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.836269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.836292]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.836315]  kasan_report+0x141/0x180
[   14.836338]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.836386]  __asan_report_load8_noabort+0x18/0x20
[   14.836407]  kasan_atomics_helper+0x4fb2/0x5450
[   14.836431]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.836453]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.836475]  ? kasan_atomics+0x152/0x310
[   14.836499]  kasan_atomics+0x1dc/0x310
[   14.836518]  ? __pfx_kasan_atomics+0x10/0x10
[   14.836540]  ? __pfx_read_tsc+0x10/0x10
[   14.836561]  ? ktime_get_ts64+0x86/0x230
[   14.836586]  kunit_try_run_case+0x1a5/0x480
[   14.836607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.836627]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.836648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.836673]  ? __kthread_parkme+0x82/0x180
[   14.836695]  ? preempt_count_sub+0x50/0x80
[   14.836720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.836741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.836765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.836789]  kthread+0x337/0x6f0
[   14.836806]  ? trace_preempt_on+0x20/0xc0
[   14.836830]  ? __pfx_kthread+0x10/0x10
[   14.836848]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.836871]  ? calculate_sigpending+0x7b/0xa0
[   14.836893]  ? __pfx_kthread+0x10/0x10
[   14.836912]  ret_from_fork+0x41/0x80
[   14.836937]  ? __pfx_kthread+0x10/0x10
[   14.836956]  ret_from_fork_asm+0x1a/0x30
[   14.836987]  </TASK>
[   14.836997] 
[   14.844019] Allocated by task 285:
[   14.844202]  kasan_save_stack+0x45/0x70
[   14.844439]  kasan_save_track+0x18/0x40
[   14.844635]  kasan_save_alloc_info+0x3b/0x50
[   14.844839]  __kasan_kmalloc+0xb7/0xc0
[   14.845008]  __kmalloc_cache_noprof+0x189/0x420
[   14.845231]  kasan_atomics+0x95/0x310
[   14.845412]  kunit_try_run_case+0x1a5/0x480
[   14.845577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.845797]  kthread+0x337/0x6f0
[   14.845945]  ret_from_fork+0x41/0x80
[   14.846103]  ret_from_fork_asm+0x1a/0x30
[   14.846279] 
[   14.846398] The buggy address belongs to the object at ffff888103d00c80
[   14.846398]  which belongs to the cache kmalloc-64 of size 64
[   14.846861] The buggy address is located 0 bytes to the right of
[   14.846861]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.847244] 
[   14.847313] The buggy address belongs to the physical page:
[   14.847502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.847740] flags: 0x200000000000000(node=0|zone=2)
[   14.847985] page_type: f5(slab)
[   14.848154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.848527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.848858] page dumped because: kasan: bad access detected
[   14.849108] 
[   14.849199] Memory state around the buggy address:
[   14.849450]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.849762]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.849983] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.850211]                                      ^
[   14.850467]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.850784]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.851061] ==================================================================
[   14.346499] ==================================================================
[   14.346887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.347194] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.347693] 
[   14.347799] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.347843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.347854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.347888] Call Trace:
[   14.347905]  <TASK>
[   14.347920]  dump_stack_lvl+0x73/0xb0
[   14.347947]  print_report+0xd1/0x610
[   14.347971]  ? __virt_addr_valid+0x1db/0x2d0
[   14.348001]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.348023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.348057]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.348079]  kasan_report+0x141/0x180
[   14.348104]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.348134]  __asan_report_load8_noabort+0x18/0x20
[   14.348163]  kasan_atomics_helper+0x4eae/0x5450
[   14.348187]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.348211]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.348249]  ? kasan_atomics+0x152/0x310
[   14.348274]  kasan_atomics+0x1dc/0x310
[   14.348293]  ? __pfx_kasan_atomics+0x10/0x10
[   14.348315]  ? __pfx_read_tsc+0x10/0x10
[   14.348335]  ? ktime_get_ts64+0x86/0x230
[   14.348374]  kunit_try_run_case+0x1a5/0x480
[   14.348404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.348424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.348445]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.348481]  ? __kthread_parkme+0x82/0x180
[   14.348502]  ? preempt_count_sub+0x50/0x80
[   14.348529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.348558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.348582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.348606]  kthread+0x337/0x6f0
[   14.348633]  ? trace_preempt_on+0x20/0xc0
[   14.348658]  ? __pfx_kthread+0x10/0x10
[   14.348677]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.348700]  ? calculate_sigpending+0x7b/0xa0
[   14.348723]  ? __pfx_kthread+0x10/0x10
[   14.348742]  ret_from_fork+0x41/0x80
[   14.348764]  ? __pfx_kthread+0x10/0x10
[   14.348782]  ret_from_fork_asm+0x1a/0x30
[   14.348815]  </TASK>
[   14.348825] 
[   14.356364] Allocated by task 285:
[   14.356550]  kasan_save_stack+0x45/0x70
[   14.356750]  kasan_save_track+0x18/0x40
[   14.356938]  kasan_save_alloc_info+0x3b/0x50
[   14.357086]  __kasan_kmalloc+0xb7/0xc0
[   14.357220]  __kmalloc_cache_noprof+0x189/0x420
[   14.357472]  kasan_atomics+0x95/0x310
[   14.357676]  kunit_try_run_case+0x1a5/0x480
[   14.357883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.358134]  kthread+0x337/0x6f0
[   14.358306]  ret_from_fork+0x41/0x80
[   14.358646]  ret_from_fork_asm+0x1a/0x30
[   14.358812] 
[   14.358884] The buggy address belongs to the object at ffff888103d00c80
[   14.358884]  which belongs to the cache kmalloc-64 of size 64
[   14.359248] The buggy address is located 0 bytes to the right of
[   14.359248]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.359613] 
[   14.359686] The buggy address belongs to the physical page:
[   14.359859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.360097] flags: 0x200000000000000(node=0|zone=2)
[   14.360284] page_type: f5(slab)
[   14.360451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.360785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.361155] page dumped because: kasan: bad access detected
[   14.361520] 
[   14.361613] Memory state around the buggy address:
[   14.361832]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.362145]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.362575] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.362795]                                      ^
[   14.362949]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.363168]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.363455] ==================================================================
[   14.575565] ==================================================================
[   14.576024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.576363] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.576667] 
[   14.576778] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.576821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.576834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.576866] Call Trace:
[   14.576880]  <TASK>
[   14.576894]  dump_stack_lvl+0x73/0xb0
[   14.576926]  print_report+0xd1/0x610
[   14.576962]  ? __virt_addr_valid+0x1db/0x2d0
[   14.576985]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.577007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.577030]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.577052]  kasan_report+0x141/0x180
[   14.577075]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.577103]  kasan_check_range+0x10c/0x1c0
[   14.577125]  __kasan_check_write+0x18/0x20
[   14.577145]  kasan_atomics_helper+0x1a7f/0x5450
[   14.577169]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.577192]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.577214]  ? kasan_atomics+0x152/0x310
[   14.577248]  kasan_atomics+0x1dc/0x310
[   14.577268]  ? __pfx_kasan_atomics+0x10/0x10
[   14.577289]  ? __pfx_read_tsc+0x10/0x10
[   14.577310]  ? ktime_get_ts64+0x86/0x230
[   14.577336]  kunit_try_run_case+0x1a5/0x480
[   14.577357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.577376]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.577398]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.577423]  ? __kthread_parkme+0x82/0x180
[   14.577445]  ? preempt_count_sub+0x50/0x80
[   14.577471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.577491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.577515]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.577539]  kthread+0x337/0x6f0
[   14.577557]  ? trace_preempt_on+0x20/0xc0
[   14.577580]  ? __pfx_kthread+0x10/0x10
[   14.577599]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.577621]  ? calculate_sigpending+0x7b/0xa0
[   14.577643]  ? __pfx_kthread+0x10/0x10
[   14.577662]  ret_from_fork+0x41/0x80
[   14.577683]  ? __pfx_kthread+0x10/0x10
[   14.577701]  ret_from_fork_asm+0x1a/0x30
[   14.577733]  </TASK>
[   14.577744] 
[   14.585665] Allocated by task 285:
[   14.585826]  kasan_save_stack+0x45/0x70
[   14.586030]  kasan_save_track+0x18/0x40
[   14.586243]  kasan_save_alloc_info+0x3b/0x50
[   14.586526]  __kasan_kmalloc+0xb7/0xc0
[   14.586671]  __kmalloc_cache_noprof+0x189/0x420
[   14.586876]  kasan_atomics+0x95/0x310
[   14.587084]  kunit_try_run_case+0x1a5/0x480
[   14.587257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.587534]  kthread+0x337/0x6f0
[   14.587698]  ret_from_fork+0x41/0x80
[   14.587892]  ret_from_fork_asm+0x1a/0x30
[   14.588071] 
[   14.588181] The buggy address belongs to the object at ffff888103d00c80
[   14.588181]  which belongs to the cache kmalloc-64 of size 64
[   14.588772] The buggy address is located 0 bytes to the right of
[   14.588772]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.589173] 
[   14.589272] The buggy address belongs to the physical page:
[   14.589534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.590036] flags: 0x200000000000000(node=0|zone=2)
[   14.590198] page_type: f5(slab)
[   14.590347] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.590719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.591016] page dumped because: kasan: bad access detected
[   14.591301] 
[   14.591407] Memory state around the buggy address:
[   14.591610]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.591896]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.592180] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.593262]                                      ^
[   14.593628]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.594941]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.595524] ==================================================================
[   14.798119] ==================================================================
[   14.798641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   14.798987] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.799320] 
[   14.799469] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.799528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.799554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.799576] Call Trace:
[   14.799606]  <TASK>
[   14.799621]  dump_stack_lvl+0x73/0xb0
[   14.799647]  print_report+0xd1/0x610
[   14.799670]  ? __virt_addr_valid+0x1db/0x2d0
[   14.799706]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.799741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.799765]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.799788]  kasan_report+0x141/0x180
[   14.799811]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.799839]  __asan_report_load8_noabort+0x18/0x20
[   14.799861]  kasan_atomics_helper+0x4f98/0x5450
[   14.799885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.799908]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.799930]  ? kasan_atomics+0x152/0x310
[   14.799954]  kasan_atomics+0x1dc/0x310
[   14.799974]  ? __pfx_kasan_atomics+0x10/0x10
[   14.799997]  ? __pfx_read_tsc+0x10/0x10
[   14.800018]  ? ktime_get_ts64+0x86/0x230
[   14.800045]  kunit_try_run_case+0x1a5/0x480
[   14.800066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.800085]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.800107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.800133]  ? __kthread_parkme+0x82/0x180
[   14.800173]  ? preempt_count_sub+0x50/0x80
[   14.800199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.800220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.800253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.800277]  kthread+0x337/0x6f0
[   14.800294]  ? trace_preempt_on+0x20/0xc0
[   14.800318]  ? __pfx_kthread+0x10/0x10
[   14.800337]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.800379]  ? calculate_sigpending+0x7b/0xa0
[   14.800401]  ? __pfx_kthread+0x10/0x10
[   14.800438]  ret_from_fork+0x41/0x80
[   14.800461]  ? __pfx_kthread+0x10/0x10
[   14.800480]  ret_from_fork_asm+0x1a/0x30
[   14.800512]  </TASK>
[   14.800524] 
[   14.807954] Allocated by task 285:
[   14.808156]  kasan_save_stack+0x45/0x70
[   14.808391]  kasan_save_track+0x18/0x40
[   14.808580]  kasan_save_alloc_info+0x3b/0x50
[   14.808786]  __kasan_kmalloc+0xb7/0xc0
[   14.808968]  __kmalloc_cache_noprof+0x189/0x420
[   14.809173]  kasan_atomics+0x95/0x310
[   14.809389]  kunit_try_run_case+0x1a5/0x480
[   14.809586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.809848]  kthread+0x337/0x6f0
[   14.810008]  ret_from_fork+0x41/0x80
[   14.810182]  ret_from_fork_asm+0x1a/0x30
[   14.810437] 
[   14.810555] The buggy address belongs to the object at ffff888103d00c80
[   14.810555]  which belongs to the cache kmalloc-64 of size 64
[   14.811086] The buggy address is located 0 bytes to the right of
[   14.811086]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.813363] 
[   14.813476] The buggy address belongs to the physical page:
[   14.813681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.814079] flags: 0x200000000000000(node=0|zone=2)
[   14.814298] page_type: f5(slab)
[   14.814510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.814844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.815145] page dumped because: kasan: bad access detected
[   14.815432] 
[   14.815520] Memory state around the buggy address:
[   14.815683]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.816025]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.816307] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.816663]                                      ^
[   14.816854]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.817195]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.817492] ==================================================================
[   13.646506] ==================================================================
[   13.647138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.647612] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.647988] 
[   13.648091] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.648137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.648148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.648169] Call Trace:
[   13.648182]  <TASK>
[   13.648197]  dump_stack_lvl+0x73/0xb0
[   13.648235]  print_report+0xd1/0x610
[   13.648257]  ? __virt_addr_valid+0x1db/0x2d0
[   13.648279]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.648300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.648323]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.648345]  kasan_report+0x141/0x180
[   13.648367]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.648394]  __asan_report_load4_noabort+0x18/0x20
[   13.648414]  kasan_atomics_helper+0x4b88/0x5450
[   13.648437]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.648459]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.648480]  ? kasan_atomics+0x152/0x310
[   13.648503]  kasan_atomics+0x1dc/0x310
[   13.648522]  ? __pfx_kasan_atomics+0x10/0x10
[   13.648543]  ? __pfx_read_tsc+0x10/0x10
[   13.648677]  ? ktime_get_ts64+0x86/0x230
[   13.648704]  kunit_try_run_case+0x1a5/0x480
[   13.648744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.648764]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.648786]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.648812]  ? __kthread_parkme+0x82/0x180
[   13.648834]  ? preempt_count_sub+0x50/0x80
[   13.648860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.648881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.648906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.648936]  kthread+0x337/0x6f0
[   13.648954]  ? trace_preempt_on+0x20/0xc0
[   13.648979]  ? __pfx_kthread+0x10/0x10
[   13.648998]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.649021]  ? calculate_sigpending+0x7b/0xa0
[   13.649044]  ? __pfx_kthread+0x10/0x10
[   13.649063]  ret_from_fork+0x41/0x80
[   13.649085]  ? __pfx_kthread+0x10/0x10
[   13.649104]  ret_from_fork_asm+0x1a/0x30
[   13.649135]  </TASK>
[   13.649147] 
[   13.659996] Allocated by task 285:
[   13.660319]  kasan_save_stack+0x45/0x70
[   13.660783]  kasan_save_track+0x18/0x40
[   13.660988]  kasan_save_alloc_info+0x3b/0x50
[   13.661184]  __kasan_kmalloc+0xb7/0xc0
[   13.661366]  __kmalloc_cache_noprof+0x189/0x420
[   13.661571]  kasan_atomics+0x95/0x310
[   13.662250]  kunit_try_run_case+0x1a5/0x480
[   13.662981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.663441]  kthread+0x337/0x6f0
[   13.663731]  ret_from_fork+0x41/0x80
[   13.664046]  ret_from_fork_asm+0x1a/0x30
[   13.664386] 
[   13.664480] The buggy address belongs to the object at ffff888103d00c80
[   13.664480]  which belongs to the cache kmalloc-64 of size 64
[   13.665209] The buggy address is located 0 bytes to the right of
[   13.665209]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.666195] 
[   13.666298] The buggy address belongs to the physical page:
[   13.667157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.668206] flags: 0x200000000000000(node=0|zone=2)
[   13.668825] page_type: f5(slab)
[   13.669152] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.669863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.670318] page dumped because: kasan: bad access detected
[   13.670559] 
[   13.670644] Memory state around the buggy address:
[   13.671191]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.671542]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.672085] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.672624]                                      ^
[   13.673058]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.673368]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.673658] ==================================================================
[   14.498892] ==================================================================
[   14.499275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.499569] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.500105] 
[   14.500243] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.500286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.500310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.500331] Call Trace:
[   14.500347]  <TASK>
[   14.500372]  dump_stack_lvl+0x73/0xb0
[   14.500397]  print_report+0xd1/0x610
[   14.500449]  ? __virt_addr_valid+0x1db/0x2d0
[   14.500472]  ? kasan_atomics_helper+0x1818/0x5450
[   14.500493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.500528]  ? kasan_atomics_helper+0x1818/0x5450
[   14.500551]  kasan_report+0x141/0x180
[   14.500601]  ? kasan_atomics_helper+0x1818/0x5450
[   14.500629]  kasan_check_range+0x10c/0x1c0
[   14.500650]  __kasan_check_write+0x18/0x20
[   14.500681]  kasan_atomics_helper+0x1818/0x5450
[   14.500705]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.500753]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.500776]  ? kasan_atomics+0x152/0x310
[   14.500802]  kasan_atomics+0x1dc/0x310
[   14.500832]  ? __pfx_kasan_atomics+0x10/0x10
[   14.500854]  ? __pfx_read_tsc+0x10/0x10
[   14.500899]  ? ktime_get_ts64+0x86/0x230
[   14.500930]  kunit_try_run_case+0x1a5/0x480
[   14.500978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.501011]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.501033]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.501071]  ? __kthread_parkme+0x82/0x180
[   14.501107]  ? preempt_count_sub+0x50/0x80
[   14.501146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.501179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.501216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.501263]  kthread+0x337/0x6f0
[   14.501294]  ? trace_preempt_on+0x20/0xc0
[   14.501332]  ? __pfx_kthread+0x10/0x10
[   14.501351]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.501387]  ? calculate_sigpending+0x7b/0xa0
[   14.501423]  ? __pfx_kthread+0x10/0x10
[   14.501455]  ret_from_fork+0x41/0x80
[   14.501489]  ? __pfx_kthread+0x10/0x10
[   14.501508]  ret_from_fork_asm+0x1a/0x30
[   14.501565]  </TASK>
[   14.501576] 
[   14.509492] Allocated by task 285:
[   14.509622]  kasan_save_stack+0x45/0x70
[   14.509765]  kasan_save_track+0x18/0x40
[   14.509897]  kasan_save_alloc_info+0x3b/0x50
[   14.510039]  __kasan_kmalloc+0xb7/0xc0
[   14.510284]  __kmalloc_cache_noprof+0x189/0x420
[   14.510523]  kasan_atomics+0x95/0x310
[   14.510741]  kunit_try_run_case+0x1a5/0x480
[   14.510954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.511200]  kthread+0x337/0x6f0
[   14.511369]  ret_from_fork+0x41/0x80
[   14.511547]  ret_from_fork_asm+0x1a/0x30
[   14.511740] 
[   14.511832] The buggy address belongs to the object at ffff888103d00c80
[   14.511832]  which belongs to the cache kmalloc-64 of size 64
[   14.512351] The buggy address is located 0 bytes to the right of
[   14.512351]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.513291] 
[   14.513362] The buggy address belongs to the physical page:
[   14.513527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.513756] flags: 0x200000000000000(node=0|zone=2)
[   14.513983] page_type: f5(slab)
[   14.514149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.514666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.515090] page dumped because: kasan: bad access detected
[   14.515370] 
[   14.515453] Memory state around the buggy address:
[   14.515632]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.515982]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.516296] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.516562]                                      ^
[   14.516801]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.517121]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.517523] ==================================================================
[   14.912436] ==================================================================
[   14.912805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   14.913089] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.913321] 
[   14.913422] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.913466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.913478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.913499] Call Trace:
[   14.913513]  <TASK>
[   14.913526]  dump_stack_lvl+0x73/0xb0
[   14.913551]  print_report+0xd1/0x610
[   14.913574]  ? __virt_addr_valid+0x1db/0x2d0
[   14.913595]  ? kasan_atomics_helper+0x5115/0x5450
[   14.913617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.913640]  ? kasan_atomics_helper+0x5115/0x5450
[   14.913662]  kasan_report+0x141/0x180
[   14.913686]  ? kasan_atomics_helper+0x5115/0x5450
[   14.913714]  __asan_report_load8_noabort+0x18/0x20
[   14.913735]  kasan_atomics_helper+0x5115/0x5450
[   14.913759]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.913783]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.913805]  ? kasan_atomics+0x152/0x310
[   14.913829]  kasan_atomics+0x1dc/0x310
[   14.913849]  ? __pfx_kasan_atomics+0x10/0x10
[   14.913870]  ? __pfx_read_tsc+0x10/0x10
[   14.913891]  ? ktime_get_ts64+0x86/0x230
[   14.913917]  kunit_try_run_case+0x1a5/0x480
[   14.913938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.913957]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.913979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.914004]  ? __kthread_parkme+0x82/0x180
[   14.914026]  ? preempt_count_sub+0x50/0x80
[   14.914051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.914072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.914096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.914120]  kthread+0x337/0x6f0
[   14.914137]  ? trace_preempt_on+0x20/0xc0
[   14.914161]  ? __pfx_kthread+0x10/0x10
[   14.914180]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.914203]  ? calculate_sigpending+0x7b/0xa0
[   14.914235]  ? __pfx_kthread+0x10/0x10
[   14.914254]  ret_from_fork+0x41/0x80
[   14.914275]  ? __pfx_kthread+0x10/0x10
[   14.914293]  ret_from_fork_asm+0x1a/0x30
[   14.914325]  </TASK>
[   14.914336] 
[   14.921526] Allocated by task 285:
[   14.921700]  kasan_save_stack+0x45/0x70
[   14.921895]  kasan_save_track+0x18/0x40
[   14.922086]  kasan_save_alloc_info+0x3b/0x50
[   14.922252]  __kasan_kmalloc+0xb7/0xc0
[   14.922412]  __kmalloc_cache_noprof+0x189/0x420
[   14.922567]  kasan_atomics+0x95/0x310
[   14.922754]  kunit_try_run_case+0x1a5/0x480
[   14.922957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.923207]  kthread+0x337/0x6f0
[   14.923410]  ret_from_fork+0x41/0x80
[   14.923602]  ret_from_fork_asm+0x1a/0x30
[   14.923798] 
[   14.923880] The buggy address belongs to the object at ffff888103d00c80
[   14.923880]  which belongs to the cache kmalloc-64 of size 64
[   14.924362] The buggy address is located 0 bytes to the right of
[   14.924362]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.924835] 
[   14.924934] The buggy address belongs to the physical page:
[   14.925147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.925508] flags: 0x200000000000000(node=0|zone=2)
[   14.925700] page_type: f5(slab)
[   14.925820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.926050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.926424] page dumped because: kasan: bad access detected
[   14.926679] 
[   14.926770] Memory state around the buggy address:
[   14.926992]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.927286]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.927601] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.927834]                                      ^
[   14.928057]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928409]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928674] ==================================================================
[   13.882024] ==================================================================
[   13.882396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   13.882923] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.883258] 
[   13.883388] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.883431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.883444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.883467] Call Trace:
[   13.883484]  <TASK>
[   13.883500]  dump_stack_lvl+0x73/0xb0
[   13.883526]  print_report+0xd1/0x610
[   13.883551]  ? __virt_addr_valid+0x1db/0x2d0
[   13.883574]  ? kasan_atomics_helper+0x860/0x5450
[   13.883597]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.883621]  ? kasan_atomics_helper+0x860/0x5450
[   13.883643]  kasan_report+0x141/0x180
[   13.883668]  ? kasan_atomics_helper+0x860/0x5450
[   13.883695]  kasan_check_range+0x10c/0x1c0
[   13.883718]  __kasan_check_write+0x18/0x20
[   13.883740]  kasan_atomics_helper+0x860/0x5450
[   13.883765]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.883791]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.883816]  ? kasan_atomics+0x152/0x310
[   13.883841]  kasan_atomics+0x1dc/0x310
[   13.883860]  ? __pfx_kasan_atomics+0x10/0x10
[   13.883883]  ? __pfx_read_tsc+0x10/0x10
[   13.883904]  ? ktime_get_ts64+0x86/0x230
[   13.884387]  kunit_try_run_case+0x1a5/0x480
[   13.884420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.884441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.884462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.884488]  ? __kthread_parkme+0x82/0x180
[   13.884513]  ? preempt_count_sub+0x50/0x80
[   13.884542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.884563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.884587]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.884611]  kthread+0x337/0x6f0
[   13.884630]  ? trace_preempt_on+0x20/0xc0
[   13.884654]  ? __pfx_kthread+0x10/0x10
[   13.884673]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.884695]  ? calculate_sigpending+0x7b/0xa0
[   13.884718]  ? __pfx_kthread+0x10/0x10
[   13.884737]  ret_from_fork+0x41/0x80
[   13.884759]  ? __pfx_kthread+0x10/0x10
[   13.884778]  ret_from_fork_asm+0x1a/0x30
[   13.884811]  </TASK>
[   13.884822] 
[   13.895418] Allocated by task 285:
[   13.895736]  kasan_save_stack+0x45/0x70
[   13.896043]  kasan_save_track+0x18/0x40
[   13.896336]  kasan_save_alloc_info+0x3b/0x50
[   13.896684]  __kasan_kmalloc+0xb7/0xc0
[   13.896875]  __kmalloc_cache_noprof+0x189/0x420
[   13.897206]  kasan_atomics+0x95/0x310
[   13.897396]  kunit_try_run_case+0x1a5/0x480
[   13.897668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.898082]  kthread+0x337/0x6f0
[   13.898349]  ret_from_fork+0x41/0x80
[   13.898515]  ret_from_fork_asm+0x1a/0x30
[   13.898803] 
[   13.898883] The buggy address belongs to the object at ffff888103d00c80
[   13.898883]  which belongs to the cache kmalloc-64 of size 64
[   13.899384] The buggy address is located 0 bytes to the right of
[   13.899384]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.900213] 
[   13.900308] The buggy address belongs to the physical page:
[   13.900770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.901174] flags: 0x200000000000000(node=0|zone=2)
[   13.901563] page_type: f5(slab)
[   13.901716] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.902203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.902704] page dumped because: kasan: bad access detected
[   13.903023] 
[   13.903097] Memory state around the buggy address:
[   13.903328]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.903843]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.904211] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.904650]                                      ^
[   13.904965]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.905364]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.905729] ==================================================================
[   14.383256] ==================================================================
[   14.383630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.383979] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.384203] 
[   14.384300] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.384342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.384355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.384375] Call Trace:
[   14.384391]  <TASK>
[   14.384405]  dump_stack_lvl+0x73/0xb0
[   14.384428]  print_report+0xd1/0x610
[   14.384451]  ? __virt_addr_valid+0x1db/0x2d0
[   14.384473]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.384495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.384519]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.384541]  kasan_report+0x141/0x180
[   14.384565]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.384592]  __asan_report_store8_noabort+0x1b/0x30
[   14.384614]  kasan_atomics_helper+0x50d4/0x5450
[   14.384638]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.384661]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.384683]  ? kasan_atomics+0x152/0x310
[   14.384707]  kasan_atomics+0x1dc/0x310
[   14.384727]  ? __pfx_kasan_atomics+0x10/0x10
[   14.384760]  ? __pfx_read_tsc+0x10/0x10
[   14.384782]  ? ktime_get_ts64+0x86/0x230
[   14.384808]  kunit_try_run_case+0x1a5/0x480
[   14.384840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.384860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.384881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.384906]  ? __kthread_parkme+0x82/0x180
[   14.384933]  ? preempt_count_sub+0x50/0x80
[   14.384959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.384980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.385004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.385028]  kthread+0x337/0x6f0
[   14.385045]  ? trace_preempt_on+0x20/0xc0
[   14.385069]  ? __pfx_kthread+0x10/0x10
[   14.385088]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.385111]  ? calculate_sigpending+0x7b/0xa0
[   14.385134]  ? __pfx_kthread+0x10/0x10
[   14.385154]  ret_from_fork+0x41/0x80
[   14.385175]  ? __pfx_kthread+0x10/0x10
[   14.385194]  ret_from_fork_asm+0x1a/0x30
[   14.385235]  </TASK>
[   14.385246] 
[   14.392757] Allocated by task 285:
[   14.392948]  kasan_save_stack+0x45/0x70
[   14.393150]  kasan_save_track+0x18/0x40
[   14.393377]  kasan_save_alloc_info+0x3b/0x50
[   14.393605]  __kasan_kmalloc+0xb7/0xc0
[   14.393793]  __kmalloc_cache_noprof+0x189/0x420
[   14.394009]  kasan_atomics+0x95/0x310
[   14.394191]  kunit_try_run_case+0x1a5/0x480
[   14.394399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.394648]  kthread+0x337/0x6f0
[   14.394809]  ret_from_fork+0x41/0x80
[   14.394989]  ret_from_fork_asm+0x1a/0x30
[   14.395190] 
[   14.395271] The buggy address belongs to the object at ffff888103d00c80
[   14.395271]  which belongs to the cache kmalloc-64 of size 64
[   14.395617] The buggy address is located 0 bytes to the right of
[   14.395617]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.396328] 
[   14.396494] The buggy address belongs to the physical page:
[   14.396747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.397104] flags: 0x200000000000000(node=0|zone=2)
[   14.397366] page_type: f5(slab)
[   14.397599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.397949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.398181] page dumped because: kasan: bad access detected
[   14.398529] 
[   14.398623] Memory state around the buggy address:
[   14.398850]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.399165]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.399512] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.399794]                                      ^
[   14.400017]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.400333]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.400620] ==================================================================
[   14.893505] ==================================================================
[   14.894019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   14.894754] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.895122] 
[   14.895417] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.895469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.895483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.895504] Call Trace:
[   14.895522]  <TASK>
[   14.895540]  dump_stack_lvl+0x73/0xb0
[   14.895574]  print_report+0xd1/0x610
[   14.895598]  ? __virt_addr_valid+0x1db/0x2d0
[   14.895619]  ? kasan_atomics_helper+0x224c/0x5450
[   14.895641]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.895664]  ? kasan_atomics_helper+0x224c/0x5450
[   14.895687]  kasan_report+0x141/0x180
[   14.895710]  ? kasan_atomics_helper+0x224c/0x5450
[   14.895739]  kasan_check_range+0x10c/0x1c0
[   14.895760]  __kasan_check_write+0x18/0x20
[   14.895781]  kasan_atomics_helper+0x224c/0x5450
[   14.895805]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.895828]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.895850]  ? kasan_atomics+0x152/0x310
[   14.895873]  kasan_atomics+0x1dc/0x310
[   14.895893]  ? __pfx_kasan_atomics+0x10/0x10
[   14.895915]  ? __pfx_read_tsc+0x10/0x10
[   14.895936]  ? ktime_get_ts64+0x86/0x230
[   14.895961]  kunit_try_run_case+0x1a5/0x480
[   14.895982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.896002]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.896023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.896047]  ? __kthread_parkme+0x82/0x180
[   14.896069]  ? preempt_count_sub+0x50/0x80
[   14.896095]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.896116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.896140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.896164]  kthread+0x337/0x6f0
[   14.896181]  ? trace_preempt_on+0x20/0xc0
[   14.896204]  ? __pfx_kthread+0x10/0x10
[   14.896233]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.896256]  ? calculate_sigpending+0x7b/0xa0
[   14.896277]  ? __pfx_kthread+0x10/0x10
[   14.896296]  ret_from_fork+0x41/0x80
[   14.896317]  ? __pfx_kthread+0x10/0x10
[   14.896335]  ret_from_fork_asm+0x1a/0x30
[   14.896426]  </TASK>
[   14.896438] 
[   14.904612] Allocated by task 285:
[   14.904798]  kasan_save_stack+0x45/0x70
[   14.905010]  kasan_save_track+0x18/0x40
[   14.905183]  kasan_save_alloc_info+0x3b/0x50
[   14.905420]  __kasan_kmalloc+0xb7/0xc0
[   14.905581]  __kmalloc_cache_noprof+0x189/0x420
[   14.905800]  kasan_atomics+0x95/0x310
[   14.905956]  kunit_try_run_case+0x1a5/0x480
[   14.906154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.906428]  kthread+0x337/0x6f0
[   14.906587]  ret_from_fork+0x41/0x80
[   14.906720]  ret_from_fork_asm+0x1a/0x30
[   14.906860] 
[   14.906930] The buggy address belongs to the object at ffff888103d00c80
[   14.906930]  which belongs to the cache kmalloc-64 of size 64
[   14.907334] The buggy address is located 0 bytes to the right of
[   14.907334]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.907905] 
[   14.908002] The buggy address belongs to the physical page:
[   14.908261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.908637] flags: 0x200000000000000(node=0|zone=2)
[   14.908842] page_type: f5(slab)
[   14.908970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.909201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.909576] page dumped because: kasan: bad access detected
[   14.909832] 
[   14.909927] Memory state around the buggy address:
[   14.910149]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.910472]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.910763] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.911062]                                      ^
[   14.911270]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.911569]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.911864] ==================================================================
[   13.864271] ==================================================================
[   13.864533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   13.864762] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.865330] 
[   13.865526] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.865572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.865585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.865608] Call Trace:
[   13.865626]  <TASK>
[   13.865641]  dump_stack_lvl+0x73/0xb0
[   13.865668]  print_report+0xd1/0x610
[   13.865692]  ? __virt_addr_valid+0x1db/0x2d0
[   13.865715]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.865737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.865760]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.865783]  kasan_report+0x141/0x180
[   13.865807]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.865834]  kasan_check_range+0x10c/0x1c0
[   13.865855]  __kasan_check_write+0x18/0x20
[   13.865875]  kasan_atomics_helper+0x7c7/0x5450
[   13.865898]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.865923]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.865945]  ? kasan_atomics+0x152/0x310
[   13.865969]  kasan_atomics+0x1dc/0x310
[   13.866010]  ? __pfx_kasan_atomics+0x10/0x10
[   13.866032]  ? __pfx_read_tsc+0x10/0x10
[   13.866053]  ? ktime_get_ts64+0x86/0x230
[   13.866079]  kunit_try_run_case+0x1a5/0x480
[   13.866102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.866121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.866143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.866168]  ? __kthread_parkme+0x82/0x180
[   13.866190]  ? preempt_count_sub+0x50/0x80
[   13.866218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.866254]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.866278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.866302]  kthread+0x337/0x6f0
[   13.866320]  ? trace_preempt_on+0x20/0xc0
[   13.866344]  ? __pfx_kthread+0x10/0x10
[   13.866363]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.866386]  ? calculate_sigpending+0x7b/0xa0
[   13.866409]  ? __pfx_kthread+0x10/0x10
[   13.866428]  ret_from_fork+0x41/0x80
[   13.866459]  ? __pfx_kthread+0x10/0x10
[   13.866478]  ret_from_fork_asm+0x1a/0x30
[   13.866510]  </TASK>
[   13.866522] 
[   13.873738] Allocated by task 285:
[   13.873862]  kasan_save_stack+0x45/0x70
[   13.874005]  kasan_save_track+0x18/0x40
[   13.874194]  kasan_save_alloc_info+0x3b/0x50
[   13.874410]  __kasan_kmalloc+0xb7/0xc0
[   13.874595]  __kmalloc_cache_noprof+0x189/0x420
[   13.874900]  kasan_atomics+0x95/0x310
[   13.875081]  kunit_try_run_case+0x1a5/0x480
[   13.875288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.875577]  kthread+0x337/0x6f0
[   13.875694]  ret_from_fork+0x41/0x80
[   13.875822]  ret_from_fork_asm+0x1a/0x30
[   13.875979] 
[   13.876074] The buggy address belongs to the object at ffff888103d00c80
[   13.876074]  which belongs to the cache kmalloc-64 of size 64
[   13.876618] The buggy address is located 0 bytes to the right of
[   13.876618]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.877096] 
[   13.877167] The buggy address belongs to the physical page:
[   13.877609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.877901] flags: 0x200000000000000(node=0|zone=2)
[   13.878061] page_type: f5(slab)
[   13.878181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.878494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.878819] page dumped because: kasan: bad access detected
[   13.879139] 
[   13.879335] Memory state around the buggy address:
[   13.879504]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.879715]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.879926] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.880131]                                      ^
[   13.880319]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.880637]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.880957] ==================================================================
[   13.742137] ==================================================================
[   13.742444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.742774] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.743279] 
[   13.743368] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.743429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.743442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.743463] Call Trace:
[   13.743481]  <TASK>
[   13.743497]  dump_stack_lvl+0x73/0xb0
[   13.743522]  print_report+0xd1/0x610
[   13.743545]  ? __virt_addr_valid+0x1db/0x2d0
[   13.743568]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.743589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.743615]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.743672]  kasan_report+0x141/0x180
[   13.743697]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.743724]  kasan_check_range+0x10c/0x1c0
[   13.743745]  __kasan_check_write+0x18/0x20
[   13.743765]  kasan_atomics_helper+0x4a0/0x5450
[   13.743806]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.743830]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.743851]  ? kasan_atomics+0x152/0x310
[   13.743890]  kasan_atomics+0x1dc/0x310
[   13.743910]  ? __pfx_kasan_atomics+0x10/0x10
[   13.743931]  ? __pfx_read_tsc+0x10/0x10
[   13.743953]  ? ktime_get_ts64+0x86/0x230
[   13.743978]  kunit_try_run_case+0x1a5/0x480
[   13.744000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.744020]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.744042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.744067]  ? __kthread_parkme+0x82/0x180
[   13.744089]  ? preempt_count_sub+0x50/0x80
[   13.744115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.744135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.744178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.744203]  kthread+0x337/0x6f0
[   13.744221]  ? trace_preempt_on+0x20/0xc0
[   13.744256]  ? __pfx_kthread+0x10/0x10
[   13.744274]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.744297]  ? calculate_sigpending+0x7b/0xa0
[   13.744320]  ? __pfx_kthread+0x10/0x10
[   13.744339]  ret_from_fork+0x41/0x80
[   13.744362]  ? __pfx_kthread+0x10/0x10
[   13.744381]  ret_from_fork_asm+0x1a/0x30
[   13.744432]  </TASK>
[   13.744443] 
[   13.752150] Allocated by task 285:
[   13.752351]  kasan_save_stack+0x45/0x70
[   13.752560]  kasan_save_track+0x18/0x40
[   13.752735]  kasan_save_alloc_info+0x3b/0x50
[   13.752947]  __kasan_kmalloc+0xb7/0xc0
[   13.753139]  __kmalloc_cache_noprof+0x189/0x420
[   13.753328]  kasan_atomics+0x95/0x310
[   13.753534]  kunit_try_run_case+0x1a5/0x480
[   13.753711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.753962]  kthread+0x337/0x6f0
[   13.754104]  ret_from_fork+0x41/0x80
[   13.754321]  ret_from_fork_asm+0x1a/0x30
[   13.754540] 
[   13.754636] The buggy address belongs to the object at ffff888103d00c80
[   13.754636]  which belongs to the cache kmalloc-64 of size 64
[   13.755097] The buggy address is located 0 bytes to the right of
[   13.755097]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.755649] 
[   13.755769] The buggy address belongs to the physical page:
[   13.755990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.756243] flags: 0x200000000000000(node=0|zone=2)
[   13.756409] page_type: f5(slab)
[   13.756530] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.756761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.756992] page dumped because: kasan: bad access detected
[   13.757163] 
[   13.757256] Memory state around the buggy address:
[   13.757482]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.757798]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.758112] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.758431]                                      ^
[   13.758650]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.758960]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.759402] ==================================================================
[   14.658081] ==================================================================
[   14.658340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.658699] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.659026] 
[   14.659132] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.659173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.659185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.659205] Call Trace:
[   14.659219]  <TASK>
[   14.659245]  dump_stack_lvl+0x73/0xb0
[   14.659271]  print_report+0xd1/0x610
[   14.659295]  ? __virt_addr_valid+0x1db/0x2d0
[   14.659316]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.659339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.659372]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.659396]  kasan_report+0x141/0x180
[   14.659419]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.659447]  kasan_check_range+0x10c/0x1c0
[   14.659468]  __kasan_check_write+0x18/0x20
[   14.659489]  kasan_atomics_helper+0x1ce1/0x5450
[   14.659513]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.659536]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.659558]  ? kasan_atomics+0x152/0x310
[   14.659582]  kasan_atomics+0x1dc/0x310
[   14.659602]  ? __pfx_kasan_atomics+0x10/0x10
[   14.659623]  ? __pfx_read_tsc+0x10/0x10
[   14.659644]  ? ktime_get_ts64+0x86/0x230
[   14.659669]  kunit_try_run_case+0x1a5/0x480
[   14.659690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.659709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.659730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.659758]  ? __kthread_parkme+0x82/0x180
[   14.659780]  ? preempt_count_sub+0x50/0x80
[   14.659806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.659827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.659850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.659874]  kthread+0x337/0x6f0
[   14.659891]  ? trace_preempt_on+0x20/0xc0
[   14.659915]  ? __pfx_kthread+0x10/0x10
[   14.659934]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.659956]  ? calculate_sigpending+0x7b/0xa0
[   14.659978]  ? __pfx_kthread+0x10/0x10
[   14.659998]  ret_from_fork+0x41/0x80
[   14.660018]  ? __pfx_kthread+0x10/0x10
[   14.660037]  ret_from_fork_asm+0x1a/0x30
[   14.660068]  </TASK>
[   14.660079] 
[   14.667877] Allocated by task 285:
[   14.668010]  kasan_save_stack+0x45/0x70
[   14.668202]  kasan_save_track+0x18/0x40
[   14.668419]  kasan_save_alloc_info+0x3b/0x50
[   14.668585]  __kasan_kmalloc+0xb7/0xc0
[   14.668765]  __kmalloc_cache_noprof+0x189/0x420
[   14.668958]  kasan_atomics+0x95/0x310
[   14.669146]  kunit_try_run_case+0x1a5/0x480
[   14.669351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.669583]  kthread+0x337/0x6f0
[   14.669726]  ret_from_fork+0x41/0x80
[   14.669908]  ret_from_fork_asm+0x1a/0x30
[   14.670060] 
[   14.670154] The buggy address belongs to the object at ffff888103d00c80
[   14.670154]  which belongs to the cache kmalloc-64 of size 64
[   14.670620] The buggy address is located 0 bytes to the right of
[   14.670620]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.671103] 
[   14.671198] The buggy address belongs to the physical page:
[   14.671512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.671833] flags: 0x200000000000000(node=0|zone=2)
[   14.672059] page_type: f5(slab)
[   14.672200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.672530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.672767] page dumped because: kasan: bad access detected
[   14.672942] 
[   14.673012] Memory state around the buggy address:
[   14.673166]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.673472]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.673802] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.674113]                                      ^
[   14.674344]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.674658]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.674924] ==================================================================
[   13.844602] ==================================================================
[   13.845040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   13.845702] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.845948] 
[   13.846041] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.846087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.846100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.846123] Call Trace:
[   13.846142]  <TASK>
[   13.846159]  dump_stack_lvl+0x73/0xb0
[   13.846186]  print_report+0xd1/0x610
[   13.846209]  ? __virt_addr_valid+0x1db/0x2d0
[   13.846571]  ? kasan_atomics_helper+0x72f/0x5450
[   13.846603]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.846627]  ? kasan_atomics_helper+0x72f/0x5450
[   13.846651]  kasan_report+0x141/0x180
[   13.846693]  ? kasan_atomics_helper+0x72f/0x5450
[   13.846721]  kasan_check_range+0x10c/0x1c0
[   13.846742]  __kasan_check_write+0x18/0x20
[   13.846762]  kasan_atomics_helper+0x72f/0x5450
[   13.846786]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.846809]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.846832]  ? kasan_atomics+0x152/0x310
[   13.846856]  kasan_atomics+0x1dc/0x310
[   13.846877]  ? __pfx_kasan_atomics+0x10/0x10
[   13.846898]  ? __pfx_read_tsc+0x10/0x10
[   13.846920]  ? ktime_get_ts64+0x86/0x230
[   13.846947]  kunit_try_run_case+0x1a5/0x480
[   13.846969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.846989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.847011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.847036]  ? __kthread_parkme+0x82/0x180
[   13.847058]  ? preempt_count_sub+0x50/0x80
[   13.847084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.847106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.847145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.847170]  kthread+0x337/0x6f0
[   13.847187]  ? trace_preempt_on+0x20/0xc0
[   13.847212]  ? __pfx_kthread+0x10/0x10
[   13.847241]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.847263]  ? calculate_sigpending+0x7b/0xa0
[   13.847286]  ? __pfx_kthread+0x10/0x10
[   13.847305]  ret_from_fork+0x41/0x80
[   13.847327]  ? __pfx_kthread+0x10/0x10
[   13.847345]  ret_from_fork_asm+0x1a/0x30
[   13.847389]  </TASK>
[   13.847401] 
[   13.854671] Allocated by task 285:
[   13.854848]  kasan_save_stack+0x45/0x70
[   13.855064]  kasan_save_track+0x18/0x40
[   13.855331]  kasan_save_alloc_info+0x3b/0x50
[   13.855537]  __kasan_kmalloc+0xb7/0xc0
[   13.855777]  __kmalloc_cache_noprof+0x189/0x420
[   13.855989]  kasan_atomics+0x95/0x310
[   13.856170]  kunit_try_run_case+0x1a5/0x480
[   13.856342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.856589]  kthread+0x337/0x6f0
[   13.856768]  ret_from_fork+0x41/0x80
[   13.856898]  ret_from_fork_asm+0x1a/0x30
[   13.857038] 
[   13.857106] The buggy address belongs to the object at ffff888103d00c80
[   13.857106]  which belongs to the cache kmalloc-64 of size 64
[   13.857988] The buggy address is located 0 bytes to the right of
[   13.857988]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.858521] 
[   13.858593] The buggy address belongs to the physical page:
[   13.858833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.859174] flags: 0x200000000000000(node=0|zone=2)
[   13.859457] page_type: f5(slab)
[   13.859603] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.859900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.860214] page dumped because: kasan: bad access detected
[   13.860447] 
[   13.860567] Memory state around the buggy address:
[   13.860759]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.861064]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.861286] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.861787]                                      ^
[   13.861980]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.862203]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.862767] ==================================================================
[   14.328112] ==================================================================
[   14.328748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.329293] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.329658] 
[   14.329747] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.329793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.329805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.329828] Call Trace:
[   14.329846]  <TASK>
[   14.329863]  dump_stack_lvl+0x73/0xb0
[   14.329890]  print_report+0xd1/0x610
[   14.329913]  ? __virt_addr_valid+0x1db/0x2d0
[   14.329936]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.329957]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.329981]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.330005]  kasan_report+0x141/0x180
[   14.330040]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.330068]  kasan_check_range+0x10c/0x1c0
[   14.330100]  __kasan_check_read+0x15/0x20
[   14.330129]  kasan_atomics_helper+0x13b5/0x5450
[   14.330152]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.330176]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.330209]  ? kasan_atomics+0x152/0x310
[   14.330241]  kasan_atomics+0x1dc/0x310
[   14.330262]  ? __pfx_kasan_atomics+0x10/0x10
[   14.330283]  ? __pfx_read_tsc+0x10/0x10
[   14.330304]  ? ktime_get_ts64+0x86/0x230
[   14.330330]  kunit_try_run_case+0x1a5/0x480
[   14.330353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.330374]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.330395]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.330420]  ? __kthread_parkme+0x82/0x180
[   14.330443]  ? preempt_count_sub+0x50/0x80
[   14.330469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.330490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.330514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.330539]  kthread+0x337/0x6f0
[   14.330557]  ? trace_preempt_on+0x20/0xc0
[   14.330590]  ? __pfx_kthread+0x10/0x10
[   14.330610]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.330633]  ? calculate_sigpending+0x7b/0xa0
[   14.330666]  ? __pfx_kthread+0x10/0x10
[   14.330685]  ret_from_fork+0x41/0x80
[   14.330706]  ? __pfx_kthread+0x10/0x10
[   14.330725]  ret_from_fork_asm+0x1a/0x30
[   14.330757]  </TASK>
[   14.330768] 
[   14.338514] Allocated by task 285:
[   14.338682]  kasan_save_stack+0x45/0x70
[   14.338887]  kasan_save_track+0x18/0x40
[   14.339078]  kasan_save_alloc_info+0x3b/0x50
[   14.339300]  __kasan_kmalloc+0xb7/0xc0
[   14.339542]  __kmalloc_cache_noprof+0x189/0x420
[   14.339756]  kasan_atomics+0x95/0x310
[   14.339927]  kunit_try_run_case+0x1a5/0x480
[   14.340138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.340340]  kthread+0x337/0x6f0
[   14.340519]  ret_from_fork+0x41/0x80
[   14.340701]  ret_from_fork_asm+0x1a/0x30
[   14.340878] 
[   14.340996] The buggy address belongs to the object at ffff888103d00c80
[   14.340996]  which belongs to the cache kmalloc-64 of size 64
[   14.341360] The buggy address is located 0 bytes to the right of
[   14.341360]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.341910] 
[   14.342003] The buggy address belongs to the physical page:
[   14.342236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.342617] flags: 0x200000000000000(node=0|zone=2)
[   14.342828] page_type: f5(slab)
[   14.343014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.343332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.343649] page dumped because: kasan: bad access detected
[   14.343867] 
[   14.343956] Memory state around the buggy address:
[   14.344156]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.344498]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.344730] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.344951]                                      ^
[   14.345104]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.345375]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.345748] ==================================================================
[   13.954784] ==================================================================
[   13.955069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   13.955701] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.956028] 
[   13.956140] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.956185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.956197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.956219] Call Trace:
[   13.956243]  <TASK>
[   13.956257]  dump_stack_lvl+0x73/0xb0
[   13.956284]  print_report+0xd1/0x610
[   13.956308]  ? __virt_addr_valid+0x1db/0x2d0
[   13.956329]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.956351]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.956375]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.956397]  kasan_report+0x141/0x180
[   13.956430]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.956458]  kasan_check_range+0x10c/0x1c0
[   13.956479]  __kasan_check_write+0x18/0x20
[   13.956500]  kasan_atomics_helper+0xa2b/0x5450
[   13.956524]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.956547]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.956569]  ? kasan_atomics+0x152/0x310
[   13.956595]  kasan_atomics+0x1dc/0x310
[   13.956615]  ? __pfx_kasan_atomics+0x10/0x10
[   13.956637]  ? __pfx_read_tsc+0x10/0x10
[   13.956657]  ? ktime_get_ts64+0x86/0x230
[   13.956684]  kunit_try_run_case+0x1a5/0x480
[   13.956705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.956725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.956747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.956772]  ? __kthread_parkme+0x82/0x180
[   13.956794]  ? preempt_count_sub+0x50/0x80
[   13.956822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.956844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.956867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.956892]  kthread+0x337/0x6f0
[   13.956909]  ? trace_preempt_on+0x20/0xc0
[   13.956939]  ? __pfx_kthread+0x10/0x10
[   13.956958]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.956981]  ? calculate_sigpending+0x7b/0xa0
[   13.957003]  ? __pfx_kthread+0x10/0x10
[   13.957023]  ret_from_fork+0x41/0x80
[   13.957045]  ? __pfx_kthread+0x10/0x10
[   13.957065]  ret_from_fork_asm+0x1a/0x30
[   13.957097]  </TASK>
[   13.957108] 
[   13.964345] Allocated by task 285:
[   13.964502]  kasan_save_stack+0x45/0x70
[   13.964705]  kasan_save_track+0x18/0x40
[   13.964862]  kasan_save_alloc_info+0x3b/0x50
[   13.965063]  __kasan_kmalloc+0xb7/0xc0
[   13.965219]  __kmalloc_cache_noprof+0x189/0x420
[   13.965454]  kasan_atomics+0x95/0x310
[   13.965613]  kunit_try_run_case+0x1a5/0x480
[   13.965788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.966010]  kthread+0x337/0x6f0
[   13.966165]  ret_from_fork+0x41/0x80
[   13.966333]  ret_from_fork_asm+0x1a/0x30
[   13.966512] 
[   13.966606] The buggy address belongs to the object at ffff888103d00c80
[   13.966606]  which belongs to the cache kmalloc-64 of size 64
[   13.967076] The buggy address is located 0 bytes to the right of
[   13.967076]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.967623] 
[   13.967715] The buggy address belongs to the physical page:
[   13.967906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.968263] flags: 0x200000000000000(node=0|zone=2)
[   13.968580] page_type: f5(slab)
[   13.968712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.969039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.969324] page dumped because: kasan: bad access detected
[   13.969693] 
[   13.969796] Memory state around the buggy address:
[   13.970000]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.970261]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.970478] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.970693]                                      ^
[   13.970848]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.971064]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.971312] ==================================================================
[   13.723493] ==================================================================
[   13.723931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.724195] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.724531] 
[   13.724714] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.724761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.724774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.724797] Call Trace:
[   13.724815]  <TASK>
[   13.724833]  dump_stack_lvl+0x73/0xb0
[   13.724860]  print_report+0xd1/0x610
[   13.724883]  ? __virt_addr_valid+0x1db/0x2d0
[   13.724905]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.724933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.724955]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.724978]  kasan_report+0x141/0x180
[   13.725001]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.725029]  __asan_report_load4_noabort+0x18/0x20
[   13.725051]  kasan_atomics_helper+0x4b54/0x5450
[   13.725074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.725097]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.725120]  ? kasan_atomics+0x152/0x310
[   13.725144]  kasan_atomics+0x1dc/0x310
[   13.725164]  ? __pfx_kasan_atomics+0x10/0x10
[   13.725185]  ? __pfx_read_tsc+0x10/0x10
[   13.725207]  ? ktime_get_ts64+0x86/0x230
[   13.725244]  kunit_try_run_case+0x1a5/0x480
[   13.725266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.725286]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.725308]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.725333]  ? __kthread_parkme+0x82/0x180
[   13.725367]  ? preempt_count_sub+0x50/0x80
[   13.725393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.725414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.725438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.725462]  kthread+0x337/0x6f0
[   13.725480]  ? trace_preempt_on+0x20/0xc0
[   13.725506]  ? __pfx_kthread+0x10/0x10
[   13.725525]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.725548]  ? calculate_sigpending+0x7b/0xa0
[   13.725571]  ? __pfx_kthread+0x10/0x10
[   13.725611]  ret_from_fork+0x41/0x80
[   13.725634]  ? __pfx_kthread+0x10/0x10
[   13.725653]  ret_from_fork_asm+0x1a/0x30
[   13.725685]  </TASK>
[   13.725697] 
[   13.733422] Allocated by task 285:
[   13.733595]  kasan_save_stack+0x45/0x70
[   13.733738]  kasan_save_track+0x18/0x40
[   13.733871]  kasan_save_alloc_info+0x3b/0x50
[   13.734044]  __kasan_kmalloc+0xb7/0xc0
[   13.734327]  __kmalloc_cache_noprof+0x189/0x420
[   13.734783]  kasan_atomics+0x95/0x310
[   13.734968]  kunit_try_run_case+0x1a5/0x480
[   13.735147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.735429]  kthread+0x337/0x6f0
[   13.735591]  ret_from_fork+0x41/0x80
[   13.735749]  ret_from_fork_asm+0x1a/0x30
[   13.735954] 
[   13.736067] The buggy address belongs to the object at ffff888103d00c80
[   13.736067]  which belongs to the cache kmalloc-64 of size 64
[   13.736614] The buggy address is located 0 bytes to the right of
[   13.736614]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.737177] 
[   13.737280] The buggy address belongs to the physical page:
[   13.737524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.737867] flags: 0x200000000000000(node=0|zone=2)
[   13.738096] page_type: f5(slab)
[   13.738269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.738494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.738711] page dumped because: kasan: bad access detected
[   13.739113] 
[   13.739207] Memory state around the buggy address:
[   13.739534]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.739874]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.740207] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.740563]                                      ^
[   13.740718]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.740988]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.741306] ==================================================================
[   13.931794] ==================================================================
[   13.932358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   13.933128] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.933602] 
[   13.933704] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.933755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.933768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.933790] Call Trace:
[   13.933810]  <TASK>
[   13.933829]  dump_stack_lvl+0x73/0xb0
[   13.934066]  print_report+0xd1/0x610
[   13.934095]  ? __virt_addr_valid+0x1db/0x2d0
[   13.934118]  ? kasan_atomics_helper+0x992/0x5450
[   13.934140]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.934166]  ? kasan_atomics_helper+0x992/0x5450
[   13.934189]  kasan_report+0x141/0x180
[   13.934213]  ? kasan_atomics_helper+0x992/0x5450
[   13.934252]  kasan_check_range+0x10c/0x1c0
[   13.934273]  __kasan_check_write+0x18/0x20
[   13.934293]  kasan_atomics_helper+0x992/0x5450
[   13.934318]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.934341]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.934422]  ? kasan_atomics+0x152/0x310
[   13.934449]  kasan_atomics+0x1dc/0x310
[   13.934470]  ? __pfx_kasan_atomics+0x10/0x10
[   13.934492]  ? __pfx_read_tsc+0x10/0x10
[   13.934514]  ? ktime_get_ts64+0x86/0x230
[   13.934540]  kunit_try_run_case+0x1a5/0x480
[   13.934563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.934582]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.934605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.934631]  ? __kthread_parkme+0x82/0x180
[   13.934653]  ? preempt_count_sub+0x50/0x80
[   13.934682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.934704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.934729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.934753]  kthread+0x337/0x6f0
[   13.934771]  ? trace_preempt_on+0x20/0xc0
[   13.934795]  ? __pfx_kthread+0x10/0x10
[   13.934814]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.934838]  ? calculate_sigpending+0x7b/0xa0
[   13.934860]  ? __pfx_kthread+0x10/0x10
[   13.934880]  ret_from_fork+0x41/0x80
[   13.934902]  ? __pfx_kthread+0x10/0x10
[   13.934920]  ret_from_fork_asm+0x1a/0x30
[   13.934952]  </TASK>
[   13.934964] 
[   13.944706] Allocated by task 285:
[   13.944881]  kasan_save_stack+0x45/0x70
[   13.945080]  kasan_save_track+0x18/0x40
[   13.945275]  kasan_save_alloc_info+0x3b/0x50
[   13.945446]  __kasan_kmalloc+0xb7/0xc0
[   13.945636]  __kmalloc_cache_noprof+0x189/0x420
[   13.945844]  kasan_atomics+0x95/0x310
[   13.946034]  kunit_try_run_case+0x1a5/0x480
[   13.946220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.947049]  kthread+0x337/0x6f0
[   13.947185]  ret_from_fork+0x41/0x80
[   13.947501]  ret_from_fork_asm+0x1a/0x30
[   13.947769] 
[   13.947932] The buggy address belongs to the object at ffff888103d00c80
[   13.947932]  which belongs to the cache kmalloc-64 of size 64
[   13.948594] The buggy address is located 0 bytes to the right of
[   13.948594]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.949216] 
[   13.949307] The buggy address belongs to the physical page:
[   13.949726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.950021] flags: 0x200000000000000(node=0|zone=2)
[   13.950362] page_type: f5(slab)
[   13.950532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.950978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.951320] page dumped because: kasan: bad access detected
[   13.951557] 
[   13.951656] Memory state around the buggy address:
[   13.952000]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.952422]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.952794] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.953088]                                      ^
[   13.953466]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.953768]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.954054] ==================================================================
[   14.479092] ==================================================================
[   14.479335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.479817] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.480277] 
[   14.480466] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.480537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.480550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.480597] Call Trace:
[   14.480613]  <TASK>
[   14.480645]  dump_stack_lvl+0x73/0xb0
[   14.480708]  print_report+0xd1/0x610
[   14.480747]  ? __virt_addr_valid+0x1db/0x2d0
[   14.480804]  ? kasan_atomics_helper+0x177f/0x5450
[   14.480826]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.480849]  ? kasan_atomics_helper+0x177f/0x5450
[   14.480883]  kasan_report+0x141/0x180
[   14.480906]  ? kasan_atomics_helper+0x177f/0x5450
[   14.480937]  kasan_check_range+0x10c/0x1c0
[   14.480958]  __kasan_check_write+0x18/0x20
[   14.480978]  kasan_atomics_helper+0x177f/0x5450
[   14.481002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.481025]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.481047]  ? kasan_atomics+0x152/0x310
[   14.481072]  kasan_atomics+0x1dc/0x310
[   14.481092]  ? __pfx_kasan_atomics+0x10/0x10
[   14.481113]  ? __pfx_read_tsc+0x10/0x10
[   14.481134]  ? ktime_get_ts64+0x86/0x230
[   14.481160]  kunit_try_run_case+0x1a5/0x480
[   14.481181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.481200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.481232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.481257]  ? __kthread_parkme+0x82/0x180
[   14.481279]  ? preempt_count_sub+0x50/0x80
[   14.481305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.481326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.481350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.481374]  kthread+0x337/0x6f0
[   14.481391]  ? trace_preempt_on+0x20/0xc0
[   14.481415]  ? __pfx_kthread+0x10/0x10
[   14.481434]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.481457]  ? calculate_sigpending+0x7b/0xa0
[   14.481479]  ? __pfx_kthread+0x10/0x10
[   14.481497]  ret_from_fork+0x41/0x80
[   14.481518]  ? __pfx_kthread+0x10/0x10
[   14.481565]  ret_from_fork_asm+0x1a/0x30
[   14.481598]  </TASK>
[   14.481608] 
[   14.489351] Allocated by task 285:
[   14.489503]  kasan_save_stack+0x45/0x70
[   14.489645]  kasan_save_track+0x18/0x40
[   14.489815]  kasan_save_alloc_info+0x3b/0x50
[   14.490063]  __kasan_kmalloc+0xb7/0xc0
[   14.490264]  __kmalloc_cache_noprof+0x189/0x420
[   14.490614]  kasan_atomics+0x95/0x310
[   14.490790]  kunit_try_run_case+0x1a5/0x480
[   14.491022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.491305]  kthread+0x337/0x6f0
[   14.491545]  ret_from_fork+0x41/0x80
[   14.491768]  ret_from_fork_asm+0x1a/0x30
[   14.491959] 
[   14.492077] The buggy address belongs to the object at ffff888103d00c80
[   14.492077]  which belongs to the cache kmalloc-64 of size 64
[   14.492686] The buggy address is located 0 bytes to the right of
[   14.492686]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.493266] 
[   14.493381] The buggy address belongs to the physical page:
[   14.493658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.494041] flags: 0x200000000000000(node=0|zone=2)
[   14.494301] page_type: f5(slab)
[   14.494593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.494930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.495203] page dumped because: kasan: bad access detected
[   14.495565] 
[   14.495695] Memory state around the buggy address:
[   14.495900]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.496256]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.496581] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.497046]                                      ^
[   14.497195]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.497813]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.498102] ==================================================================
[   14.024912] ==================================================================
[   14.025257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.025580] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.025995] 
[   14.026097] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.026140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.026152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.026173] Call Trace:
[   14.026187]  <TASK>
[   14.026201]  dump_stack_lvl+0x73/0xb0
[   14.026236]  print_report+0xd1/0x610
[   14.026259]  ? __virt_addr_valid+0x1db/0x2d0
[   14.026280]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.026302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.026326]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.026348]  kasan_report+0x141/0x180
[   14.026384]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.026412]  __asan_report_load4_noabort+0x18/0x20
[   14.026433]  kasan_atomics_helper+0x4a84/0x5450
[   14.026458]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.026481]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.026502]  ? kasan_atomics+0x152/0x310
[   14.026526]  kasan_atomics+0x1dc/0x310
[   14.026546]  ? __pfx_kasan_atomics+0x10/0x10
[   14.026568]  ? __pfx_read_tsc+0x10/0x10
[   14.026588]  ? ktime_get_ts64+0x86/0x230
[   14.026613]  kunit_try_run_case+0x1a5/0x480
[   14.026634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.026653]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.026675]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.026700]  ? __kthread_parkme+0x82/0x180
[   14.026720]  ? preempt_count_sub+0x50/0x80
[   14.026748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.026769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.026792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.026817]  kthread+0x337/0x6f0
[   14.026834]  ? trace_preempt_on+0x20/0xc0
[   14.026858]  ? __pfx_kthread+0x10/0x10
[   14.026876]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.026899]  ? calculate_sigpending+0x7b/0xa0
[   14.026920]  ? __pfx_kthread+0x10/0x10
[   14.026939]  ret_from_fork+0x41/0x80
[   14.026960]  ? __pfx_kthread+0x10/0x10
[   14.026979]  ret_from_fork_asm+0x1a/0x30
[   14.027009]  </TASK>
[   14.027021] 
[   14.033838] Allocated by task 285:
[   14.034028]  kasan_save_stack+0x45/0x70
[   14.034233]  kasan_save_track+0x18/0x40
[   14.034495]  kasan_save_alloc_info+0x3b/0x50
[   14.034700]  __kasan_kmalloc+0xb7/0xc0
[   14.034884]  __kmalloc_cache_noprof+0x189/0x420
[   14.035098]  kasan_atomics+0x95/0x310
[   14.035291]  kunit_try_run_case+0x1a5/0x480
[   14.035668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.035924]  kthread+0x337/0x6f0
[   14.036090]  ret_from_fork+0x41/0x80
[   14.036279]  ret_from_fork_asm+0x1a/0x30
[   14.036610] 
[   14.036683] The buggy address belongs to the object at ffff888103d00c80
[   14.036683]  which belongs to the cache kmalloc-64 of size 64
[   14.037038] The buggy address is located 0 bytes to the right of
[   14.037038]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.037705] 
[   14.037802] The buggy address belongs to the physical page:
[   14.038054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.038383] flags: 0x200000000000000(node=0|zone=2)
[   14.038578] page_type: f5(slab)
[   14.038738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.039044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.039342] page dumped because: kasan: bad access detected
[   14.039556] 
[   14.039624] Memory state around the buggy address:
[   14.039779]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.040002]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.040332] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.040666]                                      ^
[   14.040893]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.041183]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.041531] ==================================================================
[   14.096972] ==================================================================
[   14.097847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.098704] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.099551] 
[   14.099780] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.099964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.099978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.100120] Call Trace:
[   14.100151]  <TASK>
[   14.100167]  dump_stack_lvl+0x73/0xb0
[   14.100407]  print_report+0xd1/0x610
[   14.100447]  ? __virt_addr_valid+0x1db/0x2d0
[   14.100469]  ? kasan_atomics_helper+0xf10/0x5450
[   14.100507]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.100531]  ? kasan_atomics_helper+0xf10/0x5450
[   14.100565]  kasan_report+0x141/0x180
[   14.100588]  ? kasan_atomics_helper+0xf10/0x5450
[   14.100692]  kasan_check_range+0x10c/0x1c0
[   14.100719]  __kasan_check_write+0x18/0x20
[   14.100740]  kasan_atomics_helper+0xf10/0x5450
[   14.100844]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.100948]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.100976]  ? kasan_atomics+0x152/0x310
[   14.101001]  kasan_atomics+0x1dc/0x310
[   14.101432]  ? __pfx_kasan_atomics+0x10/0x10
[   14.101462]  ? __pfx_read_tsc+0x10/0x10
[   14.101484]  ? ktime_get_ts64+0x86/0x230
[   14.101527]  kunit_try_run_case+0x1a5/0x480
[   14.101549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.101581]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.101602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.101627]  ? __kthread_parkme+0x82/0x180
[   14.101667]  ? preempt_count_sub+0x50/0x80
[   14.101695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.101730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.101755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.101862]  kthread+0x337/0x6f0
[   14.101886]  ? trace_preempt_on+0x20/0xc0
[   14.101992]  ? __pfx_kthread+0x10/0x10
[   14.102014]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.102115]  ? calculate_sigpending+0x7b/0xa0
[   14.102142]  ? __pfx_kthread+0x10/0x10
[   14.102162]  ret_from_fork+0x41/0x80
[   14.102289]  ? __pfx_kthread+0x10/0x10
[   14.102309]  ret_from_fork_asm+0x1a/0x30
[   14.102342]  </TASK>
[   14.102496] 
[   14.117502] Allocated by task 285:
[   14.117866]  kasan_save_stack+0x45/0x70
[   14.118019]  kasan_save_track+0x18/0x40
[   14.118155]  kasan_save_alloc_info+0x3b/0x50
[   14.118313]  __kasan_kmalloc+0xb7/0xc0
[   14.118697]  __kmalloc_cache_noprof+0x189/0x420
[   14.119124]  kasan_atomics+0x95/0x310
[   14.119490]  kunit_try_run_case+0x1a5/0x480
[   14.119882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.120399]  kthread+0x337/0x6f0
[   14.120712]  ret_from_fork+0x41/0x80
[   14.121044]  ret_from_fork_asm+0x1a/0x30
[   14.121441] 
[   14.121580] The buggy address belongs to the object at ffff888103d00c80
[   14.121580]  which belongs to the cache kmalloc-64 of size 64
[   14.122144] The buggy address is located 0 bytes to the right of
[   14.122144]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.122946] 
[   14.123104] The buggy address belongs to the physical page:
[   14.123625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.124292] flags: 0x200000000000000(node=0|zone=2)
[   14.124758] page_type: f5(slab)
[   14.125045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.125291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.125934] page dumped because: kasan: bad access detected
[   14.126448] 
[   14.126601] Memory state around the buggy address:
[   14.127041]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.127514]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.127737] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.127950]                                      ^
[   14.128104]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.128335]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.128640] ==================================================================
[   14.537942] ==================================================================
[   14.538339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.538714] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.539060] 
[   14.539182] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.539268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.539281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.539325] Call Trace:
[   14.539339]  <TASK>
[   14.539353]  dump_stack_lvl+0x73/0xb0
[   14.539399]  print_report+0xd1/0x610
[   14.539423]  ? __virt_addr_valid+0x1db/0x2d0
[   14.539445]  ? kasan_atomics_helper+0x194a/0x5450
[   14.539467]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.539491]  ? kasan_atomics_helper+0x194a/0x5450
[   14.539514]  kasan_report+0x141/0x180
[   14.539564]  ? kasan_atomics_helper+0x194a/0x5450
[   14.539593]  kasan_check_range+0x10c/0x1c0
[   14.539614]  __kasan_check_write+0x18/0x20
[   14.539646]  kasan_atomics_helper+0x194a/0x5450
[   14.539670]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.539719]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.539741]  ? kasan_atomics+0x152/0x310
[   14.539764]  kasan_atomics+0x1dc/0x310
[   14.539796]  ? __pfx_kasan_atomics+0x10/0x10
[   14.539817]  ? __pfx_read_tsc+0x10/0x10
[   14.539851]  ? ktime_get_ts64+0x86/0x230
[   14.539902]  kunit_try_run_case+0x1a5/0x480
[   14.539948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.539981]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.540027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.540066]  ? __kthread_parkme+0x82/0x180
[   14.540126]  ? preempt_count_sub+0x50/0x80
[   14.540164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.540209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.540263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.540287]  kthread+0x337/0x6f0
[   14.540304]  ? trace_preempt_on+0x20/0xc0
[   14.540339]  ? __pfx_kthread+0x10/0x10
[   14.540370]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.540393]  ? calculate_sigpending+0x7b/0xa0
[   14.540415]  ? __pfx_kthread+0x10/0x10
[   14.540434]  ret_from_fork+0x41/0x80
[   14.540456]  ? __pfx_kthread+0x10/0x10
[   14.540474]  ret_from_fork_asm+0x1a/0x30
[   14.540505]  </TASK>
[   14.540517] 
[   14.548719] Allocated by task 285:
[   14.548843]  kasan_save_stack+0x45/0x70
[   14.549026]  kasan_save_track+0x18/0x40
[   14.549159]  kasan_save_alloc_info+0x3b/0x50
[   14.549329]  __kasan_kmalloc+0xb7/0xc0
[   14.549703]  __kmalloc_cache_noprof+0x189/0x420
[   14.549923]  kasan_atomics+0x95/0x310
[   14.550094]  kunit_try_run_case+0x1a5/0x480
[   14.550245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.550427]  kthread+0x337/0x6f0
[   14.550615]  ret_from_fork+0x41/0x80
[   14.550796]  ret_from_fork_asm+0x1a/0x30
[   14.550993] 
[   14.551110] The buggy address belongs to the object at ffff888103d00c80
[   14.551110]  which belongs to the cache kmalloc-64 of size 64
[   14.551537] The buggy address is located 0 bytes to the right of
[   14.551537]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.552499] 
[   14.552579] The buggy address belongs to the physical page:
[   14.552806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.553165] flags: 0x200000000000000(node=0|zone=2)
[   14.553426] page_type: f5(slab)
[   14.553553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.553787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.554015] page dumped because: kasan: bad access detected
[   14.554264] 
[   14.554357] Memory state around the buggy address:
[   14.554579]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.554896]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.555216] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.555445]                                      ^
[   14.555603]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556126]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556564] ==================================================================
[   14.818109] ==================================================================
[   14.818603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   14.818901] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.819173] 
[   14.819291] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.819336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.819368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.819390] Call Trace:
[   14.819408]  <TASK>
[   14.819423]  dump_stack_lvl+0x73/0xb0
[   14.819450]  print_report+0xd1/0x610
[   14.819473]  ? __virt_addr_valid+0x1db/0x2d0
[   14.819495]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.819517]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.819540]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.819563]  kasan_report+0x141/0x180
[   14.819586]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.819613]  kasan_check_range+0x10c/0x1c0
[   14.819634]  __kasan_check_write+0x18/0x20
[   14.819655]  kasan_atomics_helper+0x20c8/0x5450
[   14.819678]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.819701]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.819723]  ? kasan_atomics+0x152/0x310
[   14.819747]  kasan_atomics+0x1dc/0x310
[   14.819767]  ? __pfx_kasan_atomics+0x10/0x10
[   14.819789]  ? __pfx_read_tsc+0x10/0x10
[   14.819810]  ? ktime_get_ts64+0x86/0x230
[   14.819835]  kunit_try_run_case+0x1a5/0x480
[   14.819858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.819877]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.819898]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.819923]  ? __kthread_parkme+0x82/0x180
[   14.819945]  ? preempt_count_sub+0x50/0x80
[   14.819973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.819994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.820017]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.820041]  kthread+0x337/0x6f0
[   14.820059]  ? trace_preempt_on+0x20/0xc0
[   14.820083]  ? __pfx_kthread+0x10/0x10
[   14.820102]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.820124]  ? calculate_sigpending+0x7b/0xa0
[   14.820146]  ? __pfx_kthread+0x10/0x10
[   14.820165]  ret_from_fork+0x41/0x80
[   14.820187]  ? __pfx_kthread+0x10/0x10
[   14.820205]  ret_from_fork_asm+0x1a/0x30
[   14.820246]  </TASK>
[   14.820258] 
[   14.827464] Allocated by task 285:
[   14.827623]  kasan_save_stack+0x45/0x70
[   14.827795]  kasan_save_track+0x18/0x40
[   14.827988]  kasan_save_alloc_info+0x3b/0x50
[   14.828162]  __kasan_kmalloc+0xb7/0xc0
[   14.828387]  __kmalloc_cache_noprof+0x189/0x420
[   14.828582]  kasan_atomics+0x95/0x310
[   14.828742]  kunit_try_run_case+0x1a5/0x480
[   14.828929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.829153]  kthread+0x337/0x6f0
[   14.829303]  ret_from_fork+0x41/0x80
[   14.829501]  ret_from_fork_asm+0x1a/0x30
[   14.829642] 
[   14.829712] The buggy address belongs to the object at ffff888103d00c80
[   14.829712]  which belongs to the cache kmalloc-64 of size 64
[   14.830242] The buggy address is located 0 bytes to the right of
[   14.830242]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.830674] 
[   14.830769] The buggy address belongs to the physical page:
[   14.831022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.831357] flags: 0x200000000000000(node=0|zone=2)
[   14.831523] page_type: f5(slab)
[   14.831644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.831875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.832100] page dumped because: kasan: bad access detected
[   14.832391] 
[   14.832486] Memory state around the buggy address:
[   14.832703]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.833021]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.833360] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.833673]                                      ^
[   14.833831]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.834047]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.834278] ==================================================================
[   13.622070] ==================================================================
[   13.622514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.622859] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.623433] 
[   13.623525] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.623569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.623580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.623600] Call Trace:
[   13.623613]  <TASK>
[   13.623626]  dump_stack_lvl+0x73/0xb0
[   13.623652]  print_report+0xd1/0x610
[   13.623790]  ? __virt_addr_valid+0x1db/0x2d0
[   13.623813]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.623863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.623887]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.623909]  kasan_report+0x141/0x180
[   13.623933]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.623960]  __asan_report_store4_noabort+0x1b/0x30
[   13.623981]  kasan_atomics_helper+0x4ba2/0x5450
[   13.624020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.624043]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.624077]  ? kasan_atomics+0x152/0x310
[   13.624100]  kasan_atomics+0x1dc/0x310
[   13.624133]  ? __pfx_kasan_atomics+0x10/0x10
[   13.624167]  ? __pfx_read_tsc+0x10/0x10
[   13.624200]  ? ktime_get_ts64+0x86/0x230
[   13.624248]  kunit_try_run_case+0x1a5/0x480
[   13.624270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.624302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.624336]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.624371]  ? __kthread_parkme+0x82/0x180
[   13.624392]  ? preempt_count_sub+0x50/0x80
[   13.624417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.624438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.624461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.624484]  kthread+0x337/0x6f0
[   13.624501]  ? trace_preempt_on+0x20/0xc0
[   13.624525]  ? __pfx_kthread+0x10/0x10
[   13.624543]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.624564]  ? calculate_sigpending+0x7b/0xa0
[   13.624586]  ? __pfx_kthread+0x10/0x10
[   13.624621]  ret_from_fork+0x41/0x80
[   13.624641]  ? __pfx_kthread+0x10/0x10
[   13.624659]  ret_from_fork_asm+0x1a/0x30
[   13.624703]  </TASK>
[   13.624713] 
[   13.635926] Allocated by task 285:
[   13.636125]  kasan_save_stack+0x45/0x70
[   13.636332]  kasan_save_track+0x18/0x40
[   13.636505]  kasan_save_alloc_info+0x3b/0x50
[   13.637086]  __kasan_kmalloc+0xb7/0xc0
[   13.637468]  __kmalloc_cache_noprof+0x189/0x420
[   13.637764]  kasan_atomics+0x95/0x310
[   13.637934]  kunit_try_run_case+0x1a5/0x480
[   13.638117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.638350]  kthread+0x337/0x6f0
[   13.638501]  ret_from_fork+0x41/0x80
[   13.639241]  ret_from_fork_asm+0x1a/0x30
[   13.639457] 
[   13.639529] The buggy address belongs to the object at ffff888103d00c80
[   13.639529]  which belongs to the cache kmalloc-64 of size 64
[   13.640187] The buggy address is located 0 bytes to the right of
[   13.640187]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.640718] 
[   13.640821] The buggy address belongs to the physical page:
[   13.641055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.641386] flags: 0x200000000000000(node=0|zone=2)
[   13.641742] page_type: f5(slab)
[   13.641889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.642217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.642577] page dumped because: kasan: bad access detected
[   13.642800] 
[   13.642884] Memory state around the buggy address:
[   13.643278]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.643850]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.644147] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.644501]                                      ^
[   13.644744]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.645242]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.645579] ==================================================================
[   13.797676] ==================================================================
[   13.798155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   13.798549] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.798874] 
[   13.799022] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.799068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.799081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.799131] Call Trace:
[   13.799152]  <TASK>
[   13.799169]  dump_stack_lvl+0x73/0xb0
[   13.799196]  print_report+0xd1/0x610
[   13.799220]  ? __virt_addr_valid+0x1db/0x2d0
[   13.799254]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.799276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.799299]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.799323]  kasan_report+0x141/0x180
[   13.799346]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.799410]  kasan_check_range+0x10c/0x1c0
[   13.799432]  __kasan_check_write+0x18/0x20
[   13.799453]  kasan_atomics_helper+0x5fe/0x5450
[   13.799476]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.799500]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.799522]  ? kasan_atomics+0x152/0x310
[   13.799576]  kasan_atomics+0x1dc/0x310
[   13.799596]  ? __pfx_kasan_atomics+0x10/0x10
[   13.799618]  ? __pfx_read_tsc+0x10/0x10
[   13.799640]  ? ktime_get_ts64+0x86/0x230
[   13.799666]  kunit_try_run_case+0x1a5/0x480
[   13.799717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.799738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.799761]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.799786]  ? __kthread_parkme+0x82/0x180
[   13.799808]  ? preempt_count_sub+0x50/0x80
[   13.799838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.799891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.799917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.799945]  kthread+0x337/0x6f0
[   13.799964]  ? trace_preempt_on+0x20/0xc0
[   13.799988]  ? __pfx_kthread+0x10/0x10
[   13.800037]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.800060]  ? calculate_sigpending+0x7b/0xa0
[   13.800082]  ? __pfx_kthread+0x10/0x10
[   13.800101]  ret_from_fork+0x41/0x80
[   13.800123]  ? __pfx_kthread+0x10/0x10
[   13.800168]  ret_from_fork_asm+0x1a/0x30
[   13.800202]  </TASK>
[   13.800213] 
[   13.813042] Allocated by task 285:
[   13.813389]  kasan_save_stack+0x45/0x70
[   13.813750]  kasan_save_track+0x18/0x40
[   13.814101]  kasan_save_alloc_info+0x3b/0x50
[   13.814545]  __kasan_kmalloc+0xb7/0xc0
[   13.814889]  __kmalloc_cache_noprof+0x189/0x420
[   13.815300]  kasan_atomics+0x95/0x310
[   13.815692]  kunit_try_run_case+0x1a5/0x480
[   13.816063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.816609]  kthread+0x337/0x6f0
[   13.816911]  ret_from_fork+0x41/0x80
[   13.817267]  ret_from_fork_asm+0x1a/0x30
[   13.817669] 
[   13.817826] The buggy address belongs to the object at ffff888103d00c80
[   13.817826]  which belongs to the cache kmalloc-64 of size 64
[   13.818484] The buggy address is located 0 bytes to the right of
[   13.818484]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.818851] 
[   13.818925] The buggy address belongs to the physical page:
[   13.819097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.819350] flags: 0x200000000000000(node=0|zone=2)
[   13.819541] page_type: f5(slab)
[   13.819712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.820002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.820236] page dumped because: kasan: bad access detected
[   13.820511] 
[   13.820606] Memory state around the buggy address:
[   13.820833]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.821151]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.821385] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.821706]                                      ^
[   13.822097]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.822559]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.822915] ==================================================================
[   14.310041] ==================================================================
[   14.310512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.310849] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.311186] 
[   14.311368] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.311413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.311425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.311447] Call Trace:
[   14.311476]  <TASK>
[   14.311494]  dump_stack_lvl+0x73/0xb0
[   14.311520]  print_report+0xd1/0x610
[   14.311555]  ? __virt_addr_valid+0x1db/0x2d0
[   14.311577]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.311602]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.311626]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.311658]  kasan_report+0x141/0x180
[   14.311681]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.311709]  __asan_report_load4_noabort+0x18/0x20
[   14.311741]  kasan_atomics_helper+0x49ce/0x5450
[   14.311765]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.311788]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.311810]  ? kasan_atomics+0x152/0x310
[   14.311835]  kasan_atomics+0x1dc/0x310
[   14.311855]  ? __pfx_kasan_atomics+0x10/0x10
[   14.311876]  ? __pfx_read_tsc+0x10/0x10
[   14.311897]  ? ktime_get_ts64+0x86/0x230
[   14.311923]  kunit_try_run_case+0x1a5/0x480
[   14.311945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.311965]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.311987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.312012]  ? __kthread_parkme+0x82/0x180
[   14.312034]  ? preempt_count_sub+0x50/0x80
[   14.312060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.312081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.312105]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.312129]  kthread+0x337/0x6f0
[   14.312156]  ? trace_preempt_on+0x20/0xc0
[   14.312180]  ? __pfx_kthread+0x10/0x10
[   14.312199]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.312243]  ? calculate_sigpending+0x7b/0xa0
[   14.312265]  ? __pfx_kthread+0x10/0x10
[   14.312284]  ret_from_fork+0x41/0x80
[   14.312311]  ? __pfx_kthread+0x10/0x10
[   14.312330]  ret_from_fork_asm+0x1a/0x30
[   14.312362]  </TASK>
[   14.312373] 
[   14.320065] Allocated by task 285:
[   14.320263]  kasan_save_stack+0x45/0x70
[   14.320534]  kasan_save_track+0x18/0x40
[   14.320750]  kasan_save_alloc_info+0x3b/0x50
[   14.320897]  __kasan_kmalloc+0xb7/0xc0
[   14.321037]  __kmalloc_cache_noprof+0x189/0x420
[   14.321288]  kasan_atomics+0x95/0x310
[   14.321602]  kunit_try_run_case+0x1a5/0x480
[   14.321806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.322034]  kthread+0x337/0x6f0
[   14.322154]  ret_from_fork+0x41/0x80
[   14.322326]  ret_from_fork_asm+0x1a/0x30
[   14.322533] 
[   14.322629] The buggy address belongs to the object at ffff888103d00c80
[   14.322629]  which belongs to the cache kmalloc-64 of size 64
[   14.323058] The buggy address is located 0 bytes to the right of
[   14.323058]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.323688] 
[   14.323797] The buggy address belongs to the physical page:
[   14.324031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.324383] flags: 0x200000000000000(node=0|zone=2)
[   14.324593] page_type: f5(slab)
[   14.324773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.325101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.325477] page dumped because: kasan: bad access detected
[   14.325650] 
[   14.325720] Memory state around the buggy address:
[   14.325875]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.326092]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.326318] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.326581]                                      ^
[   14.326815]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.327127]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.327446] ==================================================================
[   14.640392] ==================================================================
[   14.640753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.641016] Read of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.641253] 
[   14.641337] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.641379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.641391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.641412] Call Trace:
[   14.641429]  <TASK>
[   14.641446]  dump_stack_lvl+0x73/0xb0
[   14.641469]  print_report+0xd1/0x610
[   14.641492]  ? __virt_addr_valid+0x1db/0x2d0
[   14.641514]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.641536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.641559]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.641582]  kasan_report+0x141/0x180
[   14.641605]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.641633]  __asan_report_load8_noabort+0x18/0x20
[   14.641655]  kasan_atomics_helper+0x4f30/0x5450
[   14.641678]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.641702]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.641724]  ? kasan_atomics+0x152/0x310
[   14.641747]  kasan_atomics+0x1dc/0x310
[   14.641767]  ? __pfx_kasan_atomics+0x10/0x10
[   14.641788]  ? __pfx_read_tsc+0x10/0x10
[   14.641809]  ? ktime_get_ts64+0x86/0x230
[   14.641834]  kunit_try_run_case+0x1a5/0x480
[   14.641855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.641874]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.641896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.641920]  ? __kthread_parkme+0x82/0x180
[   14.641943]  ? preempt_count_sub+0x50/0x80
[   14.641968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.641988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.642012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.642036]  kthread+0x337/0x6f0
[   14.642054]  ? trace_preempt_on+0x20/0xc0
[   14.642078]  ? __pfx_kthread+0x10/0x10
[   14.642096]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.642119]  ? calculate_sigpending+0x7b/0xa0
[   14.642141]  ? __pfx_kthread+0x10/0x10
[   14.642159]  ret_from_fork+0x41/0x80
[   14.642180]  ? __pfx_kthread+0x10/0x10
[   14.642199]  ret_from_fork_asm+0x1a/0x30
[   14.642241]  </TASK>
[   14.642251] 
[   14.650155] Allocated by task 285:
[   14.650464]  kasan_save_stack+0x45/0x70
[   14.650610]  kasan_save_track+0x18/0x40
[   14.650787]  kasan_save_alloc_info+0x3b/0x50
[   14.651007]  __kasan_kmalloc+0xb7/0xc0
[   14.651195]  __kmalloc_cache_noprof+0x189/0x420
[   14.651376]  kasan_atomics+0x95/0x310
[   14.651561]  kunit_try_run_case+0x1a5/0x480
[   14.651746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.651929]  kthread+0x337/0x6f0
[   14.652048]  ret_from_fork+0x41/0x80
[   14.652244]  ret_from_fork_asm+0x1a/0x30
[   14.652539] 
[   14.652637] The buggy address belongs to the object at ffff888103d00c80
[   14.652637]  which belongs to the cache kmalloc-64 of size 64
[   14.653125] The buggy address is located 0 bytes to the right of
[   14.653125]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.653669] 
[   14.653767] The buggy address belongs to the physical page:
[   14.653985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.654306] flags: 0x200000000000000(node=0|zone=2)
[   14.654578] page_type: f5(slab)
[   14.654736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.655022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.655282] page dumped because: kasan: bad access detected
[   14.655454] 
[   14.655522] Memory state around the buggy address:
[   14.655676]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.655891]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.656106] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.656381]                                      ^
[   14.656712]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.657032]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.657354] ==================================================================
[   13.601493] ==================================================================
[   13.602470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.602826] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.603155] 
[   13.603351] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.603404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.603416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.603459] Call Trace:
[   13.603473]  <TASK>
[   13.603507]  dump_stack_lvl+0x73/0xb0
[   13.603551]  print_report+0xd1/0x610
[   13.603576]  ? __virt_addr_valid+0x1db/0x2d0
[   13.603600]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.603622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.603644]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.603666]  kasan_report+0x141/0x180
[   13.603689]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.603716]  __asan_report_load4_noabort+0x18/0x20
[   13.603736]  kasan_atomics_helper+0x4bbc/0x5450
[   13.603759]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.603829]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.603852]  ? kasan_atomics+0x152/0x310
[   13.603876]  kasan_atomics+0x1dc/0x310
[   13.603916]  ? __pfx_kasan_atomics+0x10/0x10
[   13.603937]  ? __pfx_read_tsc+0x10/0x10
[   13.603973]  ? ktime_get_ts64+0x86/0x230
[   13.604000]  kunit_try_run_case+0x1a5/0x480
[   13.604023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.604042]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.604064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.604089]  ? __kthread_parkme+0x82/0x180
[   13.604111]  ? preempt_count_sub+0x50/0x80
[   13.604137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.604158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.604181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.604205]  kthread+0x337/0x6f0
[   13.604234]  ? trace_preempt_on+0x20/0xc0
[   13.604259]  ? __pfx_kthread+0x10/0x10
[   13.604277]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.604300]  ? calculate_sigpending+0x7b/0xa0
[   13.604322]  ? __pfx_kthread+0x10/0x10
[   13.604340]  ret_from_fork+0x41/0x80
[   13.604371]  ? __pfx_kthread+0x10/0x10
[   13.604389]  ret_from_fork_asm+0x1a/0x30
[   13.604420]  </TASK>
[   13.604432] 
[   13.612888] Allocated by task 285:
[   13.613081]  kasan_save_stack+0x45/0x70
[   13.613302]  kasan_save_track+0x18/0x40
[   13.613507]  kasan_save_alloc_info+0x3b/0x50
[   13.613827]  __kasan_kmalloc+0xb7/0xc0
[   13.614026]  __kmalloc_cache_noprof+0x189/0x420
[   13.614272]  kasan_atomics+0x95/0x310
[   13.614459]  kunit_try_run_case+0x1a5/0x480
[   13.614687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.614937]  kthread+0x337/0x6f0
[   13.615102]  ret_from_fork+0x41/0x80
[   13.615342]  ret_from_fork_asm+0x1a/0x30
[   13.615549] 
[   13.615719] The buggy address belongs to the object at ffff888103d00c80
[   13.615719]  which belongs to the cache kmalloc-64 of size 64
[   13.616095] The buggy address is located 0 bytes to the right of
[   13.616095]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.617046] 
[   13.617148] The buggy address belongs to the physical page:
[   13.617416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.617912] flags: 0x200000000000000(node=0|zone=2)
[   13.618142] page_type: f5(slab)
[   13.618321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.618698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.618957] page dumped because: kasan: bad access detected
[   13.619131] 
[   13.619198] Memory state around the buggy address:
[   13.619485]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.619806]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.620131] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.620528]                                      ^
[   13.620803]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.621028]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.621255] ==================================================================
[   14.440451] ==================================================================
[   14.440795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.441377] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.441648] 
[   14.441781] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.441837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.441849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.441871] Call Trace:
[   14.441886]  <TASK>
[   14.441929]  dump_stack_lvl+0x73/0xb0
[   14.441954]  print_report+0xd1/0x610
[   14.441977]  ? __virt_addr_valid+0x1db/0x2d0
[   14.442009]  ? kasan_atomics_helper+0x164f/0x5450
[   14.442031]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.442071]  ? kasan_atomics_helper+0x164f/0x5450
[   14.442107]  kasan_report+0x141/0x180
[   14.442131]  ? kasan_atomics_helper+0x164f/0x5450
[   14.442172]  kasan_check_range+0x10c/0x1c0
[   14.442207]  __kasan_check_write+0x18/0x20
[   14.442250]  kasan_atomics_helper+0x164f/0x5450
[   14.442275]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.442312]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.442347]  ? kasan_atomics+0x152/0x310
[   14.442383]  kasan_atomics+0x1dc/0x310
[   14.442403]  ? __pfx_kasan_atomics+0x10/0x10
[   14.442425]  ? __pfx_read_tsc+0x10/0x10
[   14.442445]  ? ktime_get_ts64+0x86/0x230
[   14.442481]  kunit_try_run_case+0x1a5/0x480
[   14.442502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.442521]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.442554]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.442579]  ? __kthread_parkme+0x82/0x180
[   14.442602]  ? preempt_count_sub+0x50/0x80
[   14.442629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.442650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.442675]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.442699]  kthread+0x337/0x6f0
[   14.442716]  ? trace_preempt_on+0x20/0xc0
[   14.442740]  ? __pfx_kthread+0x10/0x10
[   14.442759]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.442782]  ? calculate_sigpending+0x7b/0xa0
[   14.442804]  ? __pfx_kthread+0x10/0x10
[   14.442824]  ret_from_fork+0x41/0x80
[   14.442846]  ? __pfx_kthread+0x10/0x10
[   14.442865]  ret_from_fork_asm+0x1a/0x30
[   14.442897]  </TASK>
[   14.442909] 
[   14.450804] Allocated by task 285:
[   14.451036]  kasan_save_stack+0x45/0x70
[   14.451249]  kasan_save_track+0x18/0x40
[   14.451469]  kasan_save_alloc_info+0x3b/0x50
[   14.451702]  __kasan_kmalloc+0xb7/0xc0
[   14.451833]  __kmalloc_cache_noprof+0x189/0x420
[   14.451981]  kasan_atomics+0x95/0x310
[   14.452106]  kunit_try_run_case+0x1a5/0x480
[   14.452313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.452837]  kthread+0x337/0x6f0
[   14.453072]  ret_from_fork+0x41/0x80
[   14.453300]  ret_from_fork_asm+0x1a/0x30
[   14.453565] 
[   14.453653] The buggy address belongs to the object at ffff888103d00c80
[   14.453653]  which belongs to the cache kmalloc-64 of size 64
[   14.454123] The buggy address is located 0 bytes to the right of
[   14.454123]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.454744] 
[   14.454870] The buggy address belongs to the physical page:
[   14.455122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.455527] flags: 0x200000000000000(node=0|zone=2)
[   14.455844] page_type: f5(slab)
[   14.456050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.456407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.456731] page dumped because: kasan: bad access detected
[   14.457007] 
[   14.457137] Memory state around the buggy address:
[   14.457333]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.457607]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.457888] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.458192]                                      ^
[   14.458427]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.458756]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.459060] ==================================================================
[   14.596007] ==================================================================
[   14.596262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.597239] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.598478] 
[   14.598860] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.598906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.598919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.598940] Call Trace:
[   14.598958]  <TASK>
[   14.598973]  dump_stack_lvl+0x73/0xb0
[   14.598999]  print_report+0xd1/0x610
[   14.599022]  ? __virt_addr_valid+0x1db/0x2d0
[   14.599044]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.599066]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.599090]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.599113]  kasan_report+0x141/0x180
[   14.599136]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.599164]  kasan_check_range+0x10c/0x1c0
[   14.599184]  __kasan_check_write+0x18/0x20
[   14.599204]  kasan_atomics_helper+0x1b22/0x5450
[   14.599239]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.599262]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.599284]  ? kasan_atomics+0x152/0x310
[   14.599307]  kasan_atomics+0x1dc/0x310
[   14.599327]  ? __pfx_kasan_atomics+0x10/0x10
[   14.599369]  ? __pfx_read_tsc+0x10/0x10
[   14.599390]  ? ktime_get_ts64+0x86/0x230
[   14.599416]  kunit_try_run_case+0x1a5/0x480
[   14.599437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.599456]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.599478]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.599503]  ? __kthread_parkme+0x82/0x180
[   14.599524]  ? preempt_count_sub+0x50/0x80
[   14.599550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.599571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.599594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.599618]  kthread+0x337/0x6f0
[   14.599635]  ? trace_preempt_on+0x20/0xc0
[   14.599659]  ? __pfx_kthread+0x10/0x10
[   14.599678]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.599700]  ? calculate_sigpending+0x7b/0xa0
[   14.599722]  ? __pfx_kthread+0x10/0x10
[   14.599741]  ret_from_fork+0x41/0x80
[   14.599762]  ? __pfx_kthread+0x10/0x10
[   14.599783]  ret_from_fork_asm+0x1a/0x30
[   14.599815]  </TASK>
[   14.599825] 
[   14.612129] Allocated by task 285:
[   14.612272]  kasan_save_stack+0x45/0x70
[   14.612938]  kasan_save_track+0x18/0x40
[   14.613327]  kasan_save_alloc_info+0x3b/0x50
[   14.613739]  __kasan_kmalloc+0xb7/0xc0
[   14.614104]  __kmalloc_cache_noprof+0x189/0x420
[   14.614559]  kasan_atomics+0x95/0x310
[   14.614947]  kunit_try_run_case+0x1a5/0x480
[   14.615336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.615816]  kthread+0x337/0x6f0
[   14.616119]  ret_from_fork+0x41/0x80
[   14.616534]  ret_from_fork_asm+0x1a/0x30
[   14.616908] 
[   14.617043] The buggy address belongs to the object at ffff888103d00c80
[   14.617043]  which belongs to the cache kmalloc-64 of size 64
[   14.617685] The buggy address is located 0 bytes to the right of
[   14.617685]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.618038] 
[   14.618109] The buggy address belongs to the physical page:
[   14.618358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.619059] flags: 0x200000000000000(node=0|zone=2)
[   14.619535] page_type: f5(slab)
[   14.619707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.619933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.620152] page dumped because: kasan: bad access detected
[   14.620369] 
[   14.620437] Memory state around the buggy address:
[   14.620645]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.620918]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.621220] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.621513]                                      ^
[   14.621663]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.621967]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.622250] ==================================================================
[   13.699929] ==================================================================
[   13.700563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.701049] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.701489] 
[   13.701803] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.701856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.701870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.701892] Call Trace:
[   13.701908]  <TASK>
[   13.701926]  dump_stack_lvl+0x73/0xb0
[   13.701955]  print_report+0xd1/0x610
[   13.702174]  ? __virt_addr_valid+0x1db/0x2d0
[   13.702203]  ? kasan_atomics_helper+0x3df/0x5450
[   13.702238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.702262]  ? kasan_atomics_helper+0x3df/0x5450
[   13.702285]  kasan_report+0x141/0x180
[   13.702310]  ? kasan_atomics_helper+0x3df/0x5450
[   13.702337]  kasan_check_range+0x10c/0x1c0
[   13.702370]  __kasan_check_read+0x15/0x20
[   13.702390]  kasan_atomics_helper+0x3df/0x5450
[   13.702414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.702437]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.702461]  ? kasan_atomics+0x152/0x310
[   13.702485]  kasan_atomics+0x1dc/0x310
[   13.702505]  ? __pfx_kasan_atomics+0x10/0x10
[   13.702527]  ? __pfx_read_tsc+0x10/0x10
[   13.702549]  ? ktime_get_ts64+0x86/0x230
[   13.702575]  kunit_try_run_case+0x1a5/0x480
[   13.702598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.702618]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.702640]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.702665]  ? __kthread_parkme+0x82/0x180
[   13.702687]  ? preempt_count_sub+0x50/0x80
[   13.702713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.702734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.702758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.702782]  kthread+0x337/0x6f0
[   13.702800]  ? trace_preempt_on+0x20/0xc0
[   13.702824]  ? __pfx_kthread+0x10/0x10
[   13.702843]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.702868]  ? calculate_sigpending+0x7b/0xa0
[   13.702890]  ? __pfx_kthread+0x10/0x10
[   13.702910]  ret_from_fork+0x41/0x80
[   13.702932]  ? __pfx_kthread+0x10/0x10
[   13.702950]  ret_from_fork_asm+0x1a/0x30
[   13.702983]  </TASK>
[   13.702995] 
[   13.713584] Allocated by task 285:
[   13.713768]  kasan_save_stack+0x45/0x70
[   13.714088]  kasan_save_track+0x18/0x40
[   13.714444]  kasan_save_alloc_info+0x3b/0x50
[   13.714733]  __kasan_kmalloc+0xb7/0xc0
[   13.715007]  __kmalloc_cache_noprof+0x189/0x420
[   13.715258]  kasan_atomics+0x95/0x310
[   13.715625]  kunit_try_run_case+0x1a5/0x480
[   13.715931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.716191]  kthread+0x337/0x6f0
[   13.716454]  ret_from_fork+0x41/0x80
[   13.716761]  ret_from_fork_asm+0x1a/0x30
[   13.716934] 
[   13.717034] The buggy address belongs to the object at ffff888103d00c80
[   13.717034]  which belongs to the cache kmalloc-64 of size 64
[   13.717786] The buggy address is located 0 bytes to the right of
[   13.717786]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.718550] 
[   13.718751] The buggy address belongs to the physical page:
[   13.718984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.719306] flags: 0x200000000000000(node=0|zone=2)
[   13.719565] page_type: f5(slab)
[   13.719686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.719991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.720324] page dumped because: kasan: bad access detected
[   13.720579] 
[   13.720749] Memory state around the buggy address:
[   13.720958]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.721233]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.721482] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.721815]                                      ^
[   13.722029]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.722471]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.722703] ==================================================================
[   14.459763] ==================================================================
[   14.460114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.460692] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.460965] 
[   14.461048] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.461089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.461101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.461121] Call Trace:
[   14.461163]  <TASK>
[   14.461178]  dump_stack_lvl+0x73/0xb0
[   14.461203]  print_report+0xd1/0x610
[   14.461244]  ? __virt_addr_valid+0x1db/0x2d0
[   14.461266]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.461289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.461338]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.461362]  kasan_report+0x141/0x180
[   14.461386]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.461433]  kasan_check_range+0x10c/0x1c0
[   14.461455]  __kasan_check_write+0x18/0x20
[   14.461476]  kasan_atomics_helper+0x16e7/0x5450
[   14.461499]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.461548]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.461571]  ? kasan_atomics+0x152/0x310
[   14.461595]  kasan_atomics+0x1dc/0x310
[   14.461626]  ? __pfx_kasan_atomics+0x10/0x10
[   14.461647]  ? __pfx_read_tsc+0x10/0x10
[   14.461694]  ? ktime_get_ts64+0x86/0x230
[   14.461720]  kunit_try_run_case+0x1a5/0x480
[   14.461741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.461771]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.461793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.461844]  ? __kthread_parkme+0x82/0x180
[   14.461866]  ? preempt_count_sub+0x50/0x80
[   14.461893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.461924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.461949]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.461998]  kthread+0x337/0x6f0
[   14.462016]  ? trace_preempt_on+0x20/0xc0
[   14.462040]  ? __pfx_kthread+0x10/0x10
[   14.462069]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.462093]  ? calculate_sigpending+0x7b/0xa0
[   14.462140]  ? __pfx_kthread+0x10/0x10
[   14.462159]  ret_from_fork+0x41/0x80
[   14.462181]  ? __pfx_kthread+0x10/0x10
[   14.462200]  ret_from_fork_asm+0x1a/0x30
[   14.462250]  </TASK>
[   14.462260] 
[   14.470605] Allocated by task 285:
[   14.470778]  kasan_save_stack+0x45/0x70
[   14.470997]  kasan_save_track+0x18/0x40
[   14.471246]  kasan_save_alloc_info+0x3b/0x50
[   14.471559]  __kasan_kmalloc+0xb7/0xc0
[   14.471760]  __kmalloc_cache_noprof+0x189/0x420
[   14.471953]  kasan_atomics+0x95/0x310
[   14.472082]  kunit_try_run_case+0x1a5/0x480
[   14.472340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.472653]  kthread+0x337/0x6f0
[   14.472844]  ret_from_fork+0x41/0x80
[   14.473058]  ret_from_fork_asm+0x1a/0x30
[   14.473263] 
[   14.473366] The buggy address belongs to the object at ffff888103d00c80
[   14.473366]  which belongs to the cache kmalloc-64 of size 64
[   14.473845] The buggy address is located 0 bytes to the right of
[   14.473845]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.474309] 
[   14.474444] The buggy address belongs to the physical page:
[   14.474708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.475066] flags: 0x200000000000000(node=0|zone=2)
[   14.475313] page_type: f5(slab)
[   14.475497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.475849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.476171] page dumped because: kasan: bad access detected
[   14.476436] 
[   14.476539] Memory state around the buggy address:
[   14.476734]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.476951]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.477160] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.477572]                                      ^
[   14.477800]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.478123]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.478647] ==================================================================
[   14.699212] ==================================================================
[   14.700415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   14.700852] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.701086] 
[   14.701174] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.701219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.701250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.701272] Call Trace:
[   14.701290]  <TASK>
[   14.701306]  dump_stack_lvl+0x73/0xb0
[   14.701332]  print_report+0xd1/0x610
[   14.701355]  ? __virt_addr_valid+0x1db/0x2d0
[   14.701377]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.701400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.701423]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.701446]  kasan_report+0x141/0x180
[   14.701470]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.701498]  kasan_check_range+0x10c/0x1c0
[   14.701519]  __kasan_check_write+0x18/0x20
[   14.701540]  kasan_atomics_helper+0x1e12/0x5450
[   14.701564]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.701588]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.701610]  ? kasan_atomics+0x152/0x310
[   14.701635]  kasan_atomics+0x1dc/0x310
[   14.701655]  ? __pfx_kasan_atomics+0x10/0x10
[   14.701677]  ? __pfx_read_tsc+0x10/0x10
[   14.701698]  ? ktime_get_ts64+0x86/0x230
[   14.701724]  kunit_try_run_case+0x1a5/0x480
[   14.701746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.701765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.701804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.701830]  ? __kthread_parkme+0x82/0x180
[   14.701852]  ? preempt_count_sub+0x50/0x80
[   14.701878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.701899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.701923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.701946]  kthread+0x337/0x6f0
[   14.701964]  ? trace_preempt_on+0x20/0xc0
[   14.701988]  ? __pfx_kthread+0x10/0x10
[   14.702007]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.702030]  ? calculate_sigpending+0x7b/0xa0
[   14.702052]  ? __pfx_kthread+0x10/0x10
[   14.702072]  ret_from_fork+0x41/0x80
[   14.702093]  ? __pfx_kthread+0x10/0x10
[   14.702112]  ret_from_fork_asm+0x1a/0x30
[   14.702143]  </TASK>
[   14.702154] 
[   14.713718] Allocated by task 285:
[   14.713882]  kasan_save_stack+0x45/0x70
[   14.714088]  kasan_save_track+0x18/0x40
[   14.714254]  kasan_save_alloc_info+0x3b/0x50
[   14.714532]  __kasan_kmalloc+0xb7/0xc0
[   14.714708]  __kmalloc_cache_noprof+0x189/0x420
[   14.714889]  kasan_atomics+0x95/0x310
[   14.715064]  kunit_try_run_case+0x1a5/0x480
[   14.715249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.715425]  kthread+0x337/0x6f0
[   14.715543]  ret_from_fork+0x41/0x80
[   14.715675]  ret_from_fork_asm+0x1a/0x30
[   14.715813] 
[   14.715885] The buggy address belongs to the object at ffff888103d00c80
[   14.715885]  which belongs to the cache kmalloc-64 of size 64
[   14.716630] The buggy address is located 0 bytes to the right of
[   14.716630]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.716999] 
[   14.717070] The buggy address belongs to the physical page:
[   14.717485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.717813] flags: 0x200000000000000(node=0|zone=2)
[   14.718027] page_type: f5(slab)
[   14.718185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.719021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.719363] page dumped because: kasan: bad access detected
[   14.719592] 
[   14.719688] Memory state around the buggy address:
[   14.719918]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.720210]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.720536] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.720799]                                      ^
[   14.720962]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.721207]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.721558] ==================================================================
[   13.778883] ==================================================================
[   13.779248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   13.779592] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.779923] 
[   13.780038] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.780083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.780096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.780118] Call Trace:
[   13.780138]  <TASK>
[   13.780155]  dump_stack_lvl+0x73/0xb0
[   13.780179]  print_report+0xd1/0x610
[   13.780203]  ? __virt_addr_valid+0x1db/0x2d0
[   13.780235]  ? kasan_atomics_helper+0x565/0x5450
[   13.780258]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.780282]  ? kasan_atomics_helper+0x565/0x5450
[   13.780304]  kasan_report+0x141/0x180
[   13.780327]  ? kasan_atomics_helper+0x565/0x5450
[   13.780354]  kasan_check_range+0x10c/0x1c0
[   13.780375]  __kasan_check_write+0x18/0x20
[   13.780395]  kasan_atomics_helper+0x565/0x5450
[   13.780419]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.780441]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.780463]  ? kasan_atomics+0x152/0x310
[   13.780487]  kasan_atomics+0x1dc/0x310
[   13.780506]  ? __pfx_kasan_atomics+0x10/0x10
[   13.780528]  ? __pfx_read_tsc+0x10/0x10
[   13.780549]  ? ktime_get_ts64+0x86/0x230
[   13.780575]  kunit_try_run_case+0x1a5/0x480
[   13.780596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.780615]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.780637]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.780661]  ? __kthread_parkme+0x82/0x180
[   13.780684]  ? preempt_count_sub+0x50/0x80
[   13.780711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.780732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.780756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.780779]  kthread+0x337/0x6f0
[   13.780797]  ? trace_preempt_on+0x20/0xc0
[   13.780820]  ? __pfx_kthread+0x10/0x10
[   13.780839]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.780862]  ? calculate_sigpending+0x7b/0xa0
[   13.780884]  ? __pfx_kthread+0x10/0x10
[   13.780940]  ret_from_fork+0x41/0x80
[   13.780964]  ? __pfx_kthread+0x10/0x10
[   13.780983]  ret_from_fork_asm+0x1a/0x30
[   13.781017]  </TASK>
[   13.781029] 
[   13.788765] Allocated by task 285:
[   13.788954]  kasan_save_stack+0x45/0x70
[   13.789158]  kasan_save_track+0x18/0x40
[   13.789374]  kasan_save_alloc_info+0x3b/0x50
[   13.789609]  __kasan_kmalloc+0xb7/0xc0
[   13.789753]  __kmalloc_cache_noprof+0x189/0x420
[   13.789906]  kasan_atomics+0x95/0x310
[   13.790037]  kunit_try_run_case+0x1a5/0x480
[   13.790264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.790729]  kthread+0x337/0x6f0
[   13.790897]  ret_from_fork+0x41/0x80
[   13.791114]  ret_from_fork_asm+0x1a/0x30
[   13.791332] 
[   13.791486] The buggy address belongs to the object at ffff888103d00c80
[   13.791486]  which belongs to the cache kmalloc-64 of size 64
[   13.792005] The buggy address is located 0 bytes to the right of
[   13.792005]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.792593] 
[   13.792691] The buggy address belongs to the physical page:
[   13.792952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.793312] flags: 0x200000000000000(node=0|zone=2)
[   13.793628] page_type: f5(slab)
[   13.793793] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.794162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.794546] page dumped because: kasan: bad access detected
[   13.794790] 
[   13.794883] Memory state around the buggy address:
[   13.795107]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.795453]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.795786] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.796093]                                      ^
[   13.796352]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.796662]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.796971] ==================================================================
[   14.200422] ==================================================================
[   14.200687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.201056] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.201480] 
[   14.201612] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.201656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.201680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.201703] Call Trace:
[   14.201717]  <TASK>
[   14.201730]  dump_stack_lvl+0x73/0xb0
[   14.201767]  print_report+0xd1/0x610
[   14.201790]  ? __virt_addr_valid+0x1db/0x2d0
[   14.201811]  ? kasan_atomics_helper+0x1148/0x5450
[   14.201844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.201868]  ? kasan_atomics_helper+0x1148/0x5450
[   14.201891]  kasan_report+0x141/0x180
[   14.201924]  ? kasan_atomics_helper+0x1148/0x5450
[   14.201952]  kasan_check_range+0x10c/0x1c0
[   14.201985]  __kasan_check_write+0x18/0x20
[   14.202005]  kasan_atomics_helper+0x1148/0x5450
[   14.202029]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.202062]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.202084]  ? kasan_atomics+0x152/0x310
[   14.202108]  kasan_atomics+0x1dc/0x310
[   14.202139]  ? __pfx_kasan_atomics+0x10/0x10
[   14.202161]  ? __pfx_read_tsc+0x10/0x10
[   14.202181]  ? ktime_get_ts64+0x86/0x230
[   14.202216]  kunit_try_run_case+0x1a5/0x480
[   14.202246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.202265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.202296]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.202321]  ? __kthread_parkme+0x82/0x180
[   14.202366]  ? preempt_count_sub+0x50/0x80
[   14.202393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.202415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.202450]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.202474]  kthread+0x337/0x6f0
[   14.202491]  ? trace_preempt_on+0x20/0xc0
[   14.202526]  ? __pfx_kthread+0x10/0x10
[   14.202544]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.202567]  ? calculate_sigpending+0x7b/0xa0
[   14.202601]  ? __pfx_kthread+0x10/0x10
[   14.202620]  ret_from_fork+0x41/0x80
[   14.202641]  ? __pfx_kthread+0x10/0x10
[   14.202671]  ret_from_fork_asm+0x1a/0x30
[   14.202702]  </TASK>
[   14.202713] 
[   14.210768] Allocated by task 285:
[   14.210942]  kasan_save_stack+0x45/0x70
[   14.211147]  kasan_save_track+0x18/0x40
[   14.211371]  kasan_save_alloc_info+0x3b/0x50
[   14.211597]  __kasan_kmalloc+0xb7/0xc0
[   14.211742]  __kmalloc_cache_noprof+0x189/0x420
[   14.211895]  kasan_atomics+0x95/0x310
[   14.212083]  kunit_try_run_case+0x1a5/0x480
[   14.212306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.212584]  kthread+0x337/0x6f0
[   14.212747]  ret_from_fork+0x41/0x80
[   14.212905]  ret_from_fork_asm+0x1a/0x30
[   14.213050] 
[   14.213143] The buggy address belongs to the object at ffff888103d00c80
[   14.213143]  which belongs to the cache kmalloc-64 of size 64
[   14.213660] The buggy address is located 0 bytes to the right of
[   14.213660]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.214027] 
[   14.214098] The buggy address belongs to the physical page:
[   14.214279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.214546] flags: 0x200000000000000(node=0|zone=2)
[   14.214709] page_type: f5(slab)
[   14.214831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.215062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.215409] page dumped because: kasan: bad access detected
[   14.215658] 
[   14.215748] Memory state around the buggy address:
[   14.215968]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.216290]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.216632] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.216947]                                      ^
[   14.217190]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.217544]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.217879] ==================================================================
[   14.078141] ==================================================================
[   14.078600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.079324] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.079665] 
[   14.079769] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.079811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.079823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.079845] Call Trace:
[   14.079859]  <TASK>
[   14.079875]  dump_stack_lvl+0x73/0xb0
[   14.079898]  print_report+0xd1/0x610
[   14.079921]  ? __virt_addr_valid+0x1db/0x2d0
[   14.079943]  ? kasan_atomics_helper+0xe78/0x5450
[   14.079965]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.079988]  ? kasan_atomics_helper+0xe78/0x5450
[   14.080011]  kasan_report+0x141/0x180
[   14.080034]  ? kasan_atomics_helper+0xe78/0x5450
[   14.080061]  kasan_check_range+0x10c/0x1c0
[   14.080083]  __kasan_check_write+0x18/0x20
[   14.080103]  kasan_atomics_helper+0xe78/0x5450
[   14.080127]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.080150]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.080172]  ? kasan_atomics+0x152/0x310
[   14.080196]  kasan_atomics+0x1dc/0x310
[   14.080216]  ? __pfx_kasan_atomics+0x10/0x10
[   14.080250]  ? __pfx_read_tsc+0x10/0x10
[   14.080270]  ? ktime_get_ts64+0x86/0x230
[   14.080296]  kunit_try_run_case+0x1a5/0x480
[   14.080318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.080337]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.080359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.080395]  ? __kthread_parkme+0x82/0x180
[   14.080417]  ? preempt_count_sub+0x50/0x80
[   14.080443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.080464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.080488]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.080512]  kthread+0x337/0x6f0
[   14.080529]  ? trace_preempt_on+0x20/0xc0
[   14.080553]  ? __pfx_kthread+0x10/0x10
[   14.080572]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.080595]  ? calculate_sigpending+0x7b/0xa0
[   14.080617]  ? __pfx_kthread+0x10/0x10
[   14.080636]  ret_from_fork+0x41/0x80
[   14.080657]  ? __pfx_kthread+0x10/0x10
[   14.080676]  ret_from_fork_asm+0x1a/0x30
[   14.080707]  </TASK>
[   14.080718] 
[   14.087917] Allocated by task 285:
[   14.088112]  kasan_save_stack+0x45/0x70
[   14.088264]  kasan_save_track+0x18/0x40
[   14.088482]  kasan_save_alloc_info+0x3b/0x50
[   14.088685]  __kasan_kmalloc+0xb7/0xc0
[   14.088884]  __kmalloc_cache_noprof+0x189/0x420
[   14.089039]  kasan_atomics+0x95/0x310
[   14.089166]  kunit_try_run_case+0x1a5/0x480
[   14.089316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.089822]  kthread+0x337/0x6f0
[   14.089988]  ret_from_fork+0x41/0x80
[   14.090164]  ret_from_fork_asm+0x1a/0x30
[   14.090771] 
[   14.091039] The buggy address belongs to the object at ffff888103d00c80
[   14.091039]  which belongs to the cache kmalloc-64 of size 64
[   14.092034] The buggy address is located 0 bytes to the right of
[   14.092034]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.092534] 
[   14.092634] The buggy address belongs to the physical page:
[   14.092878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.093169] flags: 0x200000000000000(node=0|zone=2)
[   14.093481] page_type: f5(slab)
[   14.093665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.093897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.094117] page dumped because: kasan: bad access detected
[   14.094292] 
[   14.094359] Memory state around the buggy address:
[   14.094509]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.094716]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.095005] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.095319]                                      ^
[   14.095538]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.095846]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.096142] ==================================================================
[   14.236045] ==================================================================
[   14.236473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.236797] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.237029] 
[   14.237114] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.237157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.237170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.237191] Call Trace:
[   14.237206]  <TASK>
[   14.237233]  dump_stack_lvl+0x73/0xb0
[   14.237257]  print_report+0xd1/0x610
[   14.237281]  ? __virt_addr_valid+0x1db/0x2d0
[   14.237302]  ? kasan_atomics_helper+0x1217/0x5450
[   14.237324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.237369]  ? kasan_atomics_helper+0x1217/0x5450
[   14.237393]  kasan_report+0x141/0x180
[   14.237417]  ? kasan_atomics_helper+0x1217/0x5450
[   14.237444]  kasan_check_range+0x10c/0x1c0
[   14.237464]  __kasan_check_write+0x18/0x20
[   14.237485]  kasan_atomics_helper+0x1217/0x5450
[   14.237508]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.237531]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.237553]  ? kasan_atomics+0x152/0x310
[   14.237577]  kasan_atomics+0x1dc/0x310
[   14.237596]  ? __pfx_kasan_atomics+0x10/0x10
[   14.237618]  ? __pfx_read_tsc+0x10/0x10
[   14.237640]  ? ktime_get_ts64+0x86/0x230
[   14.237675]  kunit_try_run_case+0x1a5/0x480
[   14.237696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.237716]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.237749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.237774]  ? __kthread_parkme+0x82/0x180
[   14.237796]  ? preempt_count_sub+0x50/0x80
[   14.237834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.237856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.237879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.237915]  kthread+0x337/0x6f0
[   14.237933]  ? trace_preempt_on+0x20/0xc0
[   14.237957]  ? __pfx_kthread+0x10/0x10
[   14.237986]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.238009]  ? calculate_sigpending+0x7b/0xa0
[   14.238031]  ? __pfx_kthread+0x10/0x10
[   14.238061]  ret_from_fork+0x41/0x80
[   14.238083]  ? __pfx_kthread+0x10/0x10
[   14.238101]  ret_from_fork_asm+0x1a/0x30
[   14.238144]  </TASK>
[   14.238155] 
[   14.245726] Allocated by task 285:
[   14.245928]  kasan_save_stack+0x45/0x70
[   14.246161]  kasan_save_track+0x18/0x40
[   14.246413]  kasan_save_alloc_info+0x3b/0x50
[   14.246620]  __kasan_kmalloc+0xb7/0xc0
[   14.246807]  __kmalloc_cache_noprof+0x189/0x420
[   14.247035]  kasan_atomics+0x95/0x310
[   14.247248]  kunit_try_run_case+0x1a5/0x480
[   14.247478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.247655]  kthread+0x337/0x6f0
[   14.247774]  ret_from_fork+0x41/0x80
[   14.247959]  ret_from_fork_asm+0x1a/0x30
[   14.248183] 
[   14.248365] The buggy address belongs to the object at ffff888103d00c80
[   14.248365]  which belongs to the cache kmalloc-64 of size 64
[   14.249374] The buggy address is located 0 bytes to the right of
[   14.249374]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.250005] 
[   14.250162] The buggy address belongs to the physical page:
[   14.250653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.251292] flags: 0x200000000000000(node=0|zone=2)
[   14.251536] page_type: f5(slab)
[   14.251658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.251892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.252118] page dumped because: kasan: bad access detected
[   14.252299] 
[   14.252426] Memory state around the buggy address:
[   14.252876]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.253535]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.254155] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.254793]                                      ^
[   14.255232]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.255881]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.256524] ==================================================================
[   14.675497] ==================================================================
[   14.675975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   14.676303] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.676621] 
[   14.676731] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.676773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.676785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.676806] Call Trace:
[   14.676820]  <TASK>
[   14.676835]  dump_stack_lvl+0x73/0xb0
[   14.676860]  print_report+0xd1/0x610
[   14.676883]  ? __virt_addr_valid+0x1db/0x2d0
[   14.676905]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.676933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.676956]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.676980]  kasan_report+0x141/0x180
[   14.677004]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.677032]  kasan_check_range+0x10c/0x1c0
[   14.677053]  __kasan_check_write+0x18/0x20
[   14.677074]  kasan_atomics_helper+0x1d7a/0x5450
[   14.677098]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.677122]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.677144]  ? kasan_atomics+0x152/0x310
[   14.677168]  kasan_atomics+0x1dc/0x310
[   14.677188]  ? __pfx_kasan_atomics+0x10/0x10
[   14.677210]  ? __pfx_read_tsc+0x10/0x10
[   14.677242]  ? ktime_get_ts64+0x86/0x230
[   14.677267]  kunit_try_run_case+0x1a5/0x480
[   14.677289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.677308]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.677329]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.677365]  ? __kthread_parkme+0x82/0x180
[   14.677386]  ? preempt_count_sub+0x50/0x80
[   14.677412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.677433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.677456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.677480]  kthread+0x337/0x6f0
[   14.677498]  ? trace_preempt_on+0x20/0xc0
[   14.677522]  ? __pfx_kthread+0x10/0x10
[   14.677541]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.677564]  ? calculate_sigpending+0x7b/0xa0
[   14.677585]  ? __pfx_kthread+0x10/0x10
[   14.677605]  ret_from_fork+0x41/0x80
[   14.677626]  ? __pfx_kthread+0x10/0x10
[   14.677645]  ret_from_fork_asm+0x1a/0x30
[   14.677677]  </TASK>
[   14.677688] 
[   14.685176] Allocated by task 285:
[   14.685349]  kasan_save_stack+0x45/0x70
[   14.685540]  kasan_save_track+0x18/0x40
[   14.685708]  kasan_save_alloc_info+0x3b/0x50
[   14.685892]  __kasan_kmalloc+0xb7/0xc0
[   14.686043]  __kmalloc_cache_noprof+0x189/0x420
[   14.686196]  kasan_atomics+0x95/0x310
[   14.686937]  kunit_try_run_case+0x1a5/0x480
[   14.688052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.688461]  kthread+0x337/0x6f0
[   14.688586]  ret_from_fork+0x41/0x80
[   14.688726]  ret_from_fork_asm+0x1a/0x30
[   14.688867] 
[   14.688944] The buggy address belongs to the object at ffff888103d00c80
[   14.688944]  which belongs to the cache kmalloc-64 of size 64
[   14.689934] The buggy address is located 0 bytes to the right of
[   14.689934]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.691077] 
[   14.691245] The buggy address belongs to the physical page:
[   14.691853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.692547] flags: 0x200000000000000(node=0|zone=2)
[   14.692943] page_type: f5(slab)
[   14.693066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.693310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.693538] page dumped because: kasan: bad access detected
[   14.693826] 
[   14.693980] Memory state around the buggy address:
[   14.694410]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.694990]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.695698] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.696309]                                      ^
[   14.696824]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.697469]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.698163] ==================================================================
[   13.971981] ==================================================================
[   13.972344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   13.972687] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.973023] 
[   13.973129] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.973171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.973182] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.973203] Call Trace:
[   13.973220]  <TASK>
[   13.973249]  dump_stack_lvl+0x73/0xb0
[   13.973273]  print_report+0xd1/0x610
[   13.973296]  ? __virt_addr_valid+0x1db/0x2d0
[   13.973318]  ? kasan_atomics_helper+0xac7/0x5450
[   13.973340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.973365]  ? kasan_atomics_helper+0xac7/0x5450
[   13.973387]  kasan_report+0x141/0x180
[   13.973411]  ? kasan_atomics_helper+0xac7/0x5450
[   13.973438]  kasan_check_range+0x10c/0x1c0
[   13.973459]  __kasan_check_write+0x18/0x20
[   13.973479]  kasan_atomics_helper+0xac7/0x5450
[   13.973502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.973527]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.973549]  ? kasan_atomics+0x152/0x310
[   13.973573]  kasan_atomics+0x1dc/0x310
[   13.973592]  ? __pfx_kasan_atomics+0x10/0x10
[   13.973614]  ? __pfx_read_tsc+0x10/0x10
[   13.973634]  ? ktime_get_ts64+0x86/0x230
[   13.973659]  kunit_try_run_case+0x1a5/0x480
[   13.973681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.973700]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.973721]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.973746]  ? __kthread_parkme+0x82/0x180
[   13.973768]  ? preempt_count_sub+0x50/0x80
[   13.973794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.973815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.973839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.973864]  kthread+0x337/0x6f0
[   13.973882]  ? trace_preempt_on+0x20/0xc0
[   13.973906]  ? __pfx_kthread+0x10/0x10
[   13.973925]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.973950]  ? calculate_sigpending+0x7b/0xa0
[   13.973975]  ? __pfx_kthread+0x10/0x10
[   13.973995]  ret_from_fork+0x41/0x80
[   13.974017]  ? __pfx_kthread+0x10/0x10
[   13.974036]  ret_from_fork_asm+0x1a/0x30
[   13.974067]  </TASK>
[   13.974078] 
[   13.981374] Allocated by task 285:
[   13.981538]  kasan_save_stack+0x45/0x70
[   13.981752]  kasan_save_track+0x18/0x40
[   13.981946]  kasan_save_alloc_info+0x3b/0x50
[   13.982160]  __kasan_kmalloc+0xb7/0xc0
[   13.982360]  __kmalloc_cache_noprof+0x189/0x420
[   13.982580]  kasan_atomics+0x95/0x310
[   13.982766]  kunit_try_run_case+0x1a5/0x480
[   13.982979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.983238]  kthread+0x337/0x6f0
[   13.983448]  ret_from_fork+0x41/0x80
[   13.983642]  ret_from_fork_asm+0x1a/0x30
[   13.983817] 
[   13.983902] The buggy address belongs to the object at ffff888103d00c80
[   13.983902]  which belongs to the cache kmalloc-64 of size 64
[   13.984328] The buggy address is located 0 bytes to the right of
[   13.984328]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.984865] 
[   13.984953] The buggy address belongs to the physical page:
[   13.985171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.985639] flags: 0x200000000000000(node=0|zone=2)
[   13.985853] page_type: f5(slab)
[   13.985983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.986312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.986758] page dumped because: kasan: bad access detected
[   13.986966] 
[   13.987052] Memory state around the buggy address:
[   13.987255]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.987471]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.987686] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.987899]                                      ^
[   13.988053]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.988296]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.988939] ==================================================================
[   14.775495] ==================================================================
[   14.775869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   14.776207] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.776475] 
[   14.776561] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.776603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.776616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.776637] Call Trace:
[   14.776654]  <TASK>
[   14.776669]  dump_stack_lvl+0x73/0xb0
[   14.776693]  print_report+0xd1/0x610
[   14.776715]  ? __virt_addr_valid+0x1db/0x2d0
[   14.776736]  ? kasan_atomics_helper+0x2006/0x5450
[   14.776758]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.776781]  ? kasan_atomics_helper+0x2006/0x5450
[   14.776804]  kasan_report+0x141/0x180
[   14.776827]  ? kasan_atomics_helper+0x2006/0x5450
[   14.776854]  kasan_check_range+0x10c/0x1c0
[   14.776875]  __kasan_check_write+0x18/0x20
[   14.776896]  kasan_atomics_helper+0x2006/0x5450
[   14.776924]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.776947]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.776969]  ? kasan_atomics+0x152/0x310
[   14.776992]  kasan_atomics+0x1dc/0x310
[   14.777012]  ? __pfx_kasan_atomics+0x10/0x10
[   14.777034]  ? __pfx_read_tsc+0x10/0x10
[   14.777054]  ? ktime_get_ts64+0x86/0x230
[   14.777079]  kunit_try_run_case+0x1a5/0x480
[   14.777100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.777120]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.777140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.777165]  ? __kthread_parkme+0x82/0x180
[   14.777187]  ? preempt_count_sub+0x50/0x80
[   14.777212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.777294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.777320]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.777362]  kthread+0x337/0x6f0
[   14.777380]  ? trace_preempt_on+0x20/0xc0
[   14.777405]  ? __pfx_kthread+0x10/0x10
[   14.777424]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.777447]  ? calculate_sigpending+0x7b/0xa0
[   14.777470]  ? __pfx_kthread+0x10/0x10
[   14.777489]  ret_from_fork+0x41/0x80
[   14.777511]  ? __pfx_kthread+0x10/0x10
[   14.777529]  ret_from_fork_asm+0x1a/0x30
[   14.777561]  </TASK>
[   14.777572] 
[   14.788744] Allocated by task 285:
[   14.788930]  kasan_save_stack+0x45/0x70
[   14.789135]  kasan_save_track+0x18/0x40
[   14.789546]  kasan_save_alloc_info+0x3b/0x50
[   14.789846]  __kasan_kmalloc+0xb7/0xc0
[   14.790130]  __kmalloc_cache_noprof+0x189/0x420
[   14.790524]  kasan_atomics+0x95/0x310
[   14.790727]  kunit_try_run_case+0x1a5/0x480
[   14.791046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.791329]  kthread+0x337/0x6f0
[   14.791665]  ret_from_fork+0x41/0x80
[   14.791942]  ret_from_fork_asm+0x1a/0x30
[   14.792112] 
[   14.792212] The buggy address belongs to the object at ffff888103d00c80
[   14.792212]  which belongs to the cache kmalloc-64 of size 64
[   14.792888] The buggy address is located 0 bytes to the right of
[   14.792888]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.793441] 
[   14.793543] The buggy address belongs to the physical page:
[   14.793765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.794130] flags: 0x200000000000000(node=0|zone=2)
[   14.794387] page_type: f5(slab)
[   14.794555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.794885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.795219] page dumped because: kasan: bad access detected
[   14.795455] 
[   14.795550] Memory state around the buggy address:
[   14.795784]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.796096]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.796461] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.796742]                                      ^
[   14.796957]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.797281]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.797595] ==================================================================
[   14.852130] ==================================================================
[   14.852494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   14.852830] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.853131] 
[   14.853217] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.853269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.853280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.853301] Call Trace:
[   14.853406]  <TASK>
[   14.853421]  dump_stack_lvl+0x73/0xb0
[   14.853448]  print_report+0xd1/0x610
[   14.853471]  ? __virt_addr_valid+0x1db/0x2d0
[   14.853493]  ? kasan_atomics_helper+0x218a/0x5450
[   14.853514]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.853537]  ? kasan_atomics_helper+0x218a/0x5450
[   14.853560]  kasan_report+0x141/0x180
[   14.853583]  ? kasan_atomics_helper+0x218a/0x5450
[   14.853610]  kasan_check_range+0x10c/0x1c0
[   14.853632]  __kasan_check_write+0x18/0x20
[   14.853652]  kasan_atomics_helper+0x218a/0x5450
[   14.853676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.853699]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.853721]  ? kasan_atomics+0x152/0x310
[   14.853745]  kasan_atomics+0x1dc/0x310
[   14.853764]  ? __pfx_kasan_atomics+0x10/0x10
[   14.853786]  ? __pfx_read_tsc+0x10/0x10
[   14.853806]  ? ktime_get_ts64+0x86/0x230
[   14.853831]  kunit_try_run_case+0x1a5/0x480
[   14.853852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.853872]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.853892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.853917]  ? __kthread_parkme+0x82/0x180
[   14.853939]  ? preempt_count_sub+0x50/0x80
[   14.853964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.853985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.854009]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.854032]  kthread+0x337/0x6f0
[   14.854050]  ? trace_preempt_on+0x20/0xc0
[   14.854073]  ? __pfx_kthread+0x10/0x10
[   14.854092]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.854115]  ? calculate_sigpending+0x7b/0xa0
[   14.854137]  ? __pfx_kthread+0x10/0x10
[   14.854155]  ret_from_fork+0x41/0x80
[   14.854177]  ? __pfx_kthread+0x10/0x10
[   14.854195]  ret_from_fork_asm+0x1a/0x30
[   14.854238]  </TASK>
[   14.854250] 
[   14.861436] Allocated by task 285:
[   14.861592]  kasan_save_stack+0x45/0x70
[   14.861763]  kasan_save_track+0x18/0x40
[   14.861936]  kasan_save_alloc_info+0x3b/0x50
[   14.862120]  __kasan_kmalloc+0xb7/0xc0
[   14.862297]  __kmalloc_cache_noprof+0x189/0x420
[   14.862519]  kasan_atomics+0x95/0x310
[   14.862667]  kunit_try_run_case+0x1a5/0x480
[   14.862866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.863080]  kthread+0x337/0x6f0
[   14.863242]  ret_from_fork+0x41/0x80
[   14.863426]  ret_from_fork_asm+0x1a/0x30
[   14.863598] 
[   14.863691] The buggy address belongs to the object at ffff888103d00c80
[   14.863691]  which belongs to the cache kmalloc-64 of size 64
[   14.864150] The buggy address is located 0 bytes to the right of
[   14.864150]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.864550] 
[   14.864622] The buggy address belongs to the physical page:
[   14.864794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.865038] flags: 0x200000000000000(node=0|zone=2)
[   14.865199] page_type: f5(slab)
[   14.865400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.865739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.866072] page dumped because: kasan: bad access detected
[   14.866334] 
[   14.866445] Memory state around the buggy address:
[   14.866664]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.866979]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.867285] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.867575]                                      ^
[   14.867777]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.867993]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.868206] ==================================================================
[   14.557039] ==================================================================
[   14.557419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.558154] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.558532] 
[   14.558637] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.558680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.558694] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.558716] Call Trace:
[   14.558734]  <TASK>
[   14.558750]  dump_stack_lvl+0x73/0xb0
[   14.558774]  print_report+0xd1/0x610
[   14.558808]  ? __virt_addr_valid+0x1db/0x2d0
[   14.558830]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.558852]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.558887]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.558911]  kasan_report+0x141/0x180
[   14.558934]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.558962]  kasan_check_range+0x10c/0x1c0
[   14.558983]  __kasan_check_write+0x18/0x20
[   14.559012]  kasan_atomics_helper+0x19e3/0x5450
[   14.559035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.559059]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.559092]  ? kasan_atomics+0x152/0x310
[   14.559117]  kasan_atomics+0x1dc/0x310
[   14.559138]  ? __pfx_kasan_atomics+0x10/0x10
[   14.559160]  ? __pfx_read_tsc+0x10/0x10
[   14.559187]  ? ktime_get_ts64+0x86/0x230
[   14.559212]  kunit_try_run_case+0x1a5/0x480
[   14.559249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559269]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.559290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.559315]  ? __kthread_parkme+0x82/0x180
[   14.559337]  ? preempt_count_sub+0x50/0x80
[   14.559376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.559430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.559454]  kthread+0x337/0x6f0
[   14.559481]  ? trace_preempt_on+0x20/0xc0
[   14.559505]  ? __pfx_kthread+0x10/0x10
[   14.559523]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.559546]  ? calculate_sigpending+0x7b/0xa0
[   14.559576]  ? __pfx_kthread+0x10/0x10
[   14.559596]  ret_from_fork+0x41/0x80
[   14.559617]  ? __pfx_kthread+0x10/0x10
[   14.559636]  ret_from_fork_asm+0x1a/0x30
[   14.559678]  </TASK>
[   14.559688] 
[   14.567306] Allocated by task 285:
[   14.567536]  kasan_save_stack+0x45/0x70
[   14.567723]  kasan_save_track+0x18/0x40
[   14.567863]  kasan_save_alloc_info+0x3b/0x50
[   14.568095]  __kasan_kmalloc+0xb7/0xc0
[   14.568277]  __kmalloc_cache_noprof+0x189/0x420
[   14.568581]  kasan_atomics+0x95/0x310
[   14.568794]  kunit_try_run_case+0x1a5/0x480
[   14.568962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.569140]  kthread+0x337/0x6f0
[   14.569270]  ret_from_fork+0x41/0x80
[   14.569495]  ret_from_fork_asm+0x1a/0x30
[   14.569716] 
[   14.569809] The buggy address belongs to the object at ffff888103d00c80
[   14.569809]  which belongs to the cache kmalloc-64 of size 64
[   14.570339] The buggy address is located 0 bytes to the right of
[   14.570339]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.570735] 
[   14.570829] The buggy address belongs to the physical page:
[   14.571100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.571459] flags: 0x200000000000000(node=0|zone=2)
[   14.571695] page_type: f5(slab)
[   14.571854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.572151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.572441] page dumped because: kasan: bad access detected
[   14.572712] 
[   14.572804] Memory state around the buggy address:
[   14.573030]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.573274]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.573745] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.574009]                                      ^
[   14.574166]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.574504]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.574891] ==================================================================
[   14.042121] ==================================================================
[   14.042532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.042907] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.043385] 
[   14.043522] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.043566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.043578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.043599] Call Trace:
[   14.043613]  <TASK>
[   14.043627]  dump_stack_lvl+0x73/0xb0
[   14.043652]  print_report+0xd1/0x610
[   14.043675]  ? __virt_addr_valid+0x1db/0x2d0
[   14.043697]  ? kasan_atomics_helper+0xd47/0x5450
[   14.043719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.043743]  ? kasan_atomics_helper+0xd47/0x5450
[   14.043766]  kasan_report+0x141/0x180
[   14.043789]  ? kasan_atomics_helper+0xd47/0x5450
[   14.043817]  kasan_check_range+0x10c/0x1c0
[   14.043838]  __kasan_check_write+0x18/0x20
[   14.043858]  kasan_atomics_helper+0xd47/0x5450
[   14.043882]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.043905]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.043927]  ? kasan_atomics+0x152/0x310
[   14.043951]  kasan_atomics+0x1dc/0x310
[   14.043971]  ? __pfx_kasan_atomics+0x10/0x10
[   14.043993]  ? __pfx_read_tsc+0x10/0x10
[   14.044013]  ? ktime_get_ts64+0x86/0x230
[   14.044039]  kunit_try_run_case+0x1a5/0x480
[   14.044060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.044080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.044101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.044126]  ? __kthread_parkme+0x82/0x180
[   14.044148]  ? preempt_count_sub+0x50/0x80
[   14.044174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.044196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.044220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.044255]  kthread+0x337/0x6f0
[   14.044273]  ? trace_preempt_on+0x20/0xc0
[   14.044296]  ? __pfx_kthread+0x10/0x10
[   14.044314]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.044338]  ? calculate_sigpending+0x7b/0xa0
[   14.044370]  ? __pfx_kthread+0x10/0x10
[   14.044389]  ret_from_fork+0x41/0x80
[   14.044410]  ? __pfx_kthread+0x10/0x10
[   14.044428]  ret_from_fork_asm+0x1a/0x30
[   14.044460]  </TASK>
[   14.044471] 
[   14.051853] Allocated by task 285:
[   14.052025]  kasan_save_stack+0x45/0x70
[   14.052201]  kasan_save_track+0x18/0x40
[   14.052373]  kasan_save_alloc_info+0x3b/0x50
[   14.052521]  __kasan_kmalloc+0xb7/0xc0
[   14.052654]  __kmalloc_cache_noprof+0x189/0x420
[   14.052882]  kasan_atomics+0x95/0x310
[   14.053068]  kunit_try_run_case+0x1a5/0x480
[   14.053283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.053634]  kthread+0x337/0x6f0
[   14.053783]  ret_from_fork+0x41/0x80
[   14.053939]  ret_from_fork_asm+0x1a/0x30
[   14.054102] 
[   14.054196] The buggy address belongs to the object at ffff888103d00c80
[   14.054196]  which belongs to the cache kmalloc-64 of size 64
[   14.054665] The buggy address is located 0 bytes to the right of
[   14.054665]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.055106] 
[   14.055178] The buggy address belongs to the physical page:
[   14.055363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.055626] flags: 0x200000000000000(node=0|zone=2)
[   14.055864] page_type: f5(slab)
[   14.056029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.056534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.056761] page dumped because: kasan: bad access detected
[   14.056937] 
[   14.057006] Memory state around the buggy address:
[   14.057232]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.057780]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.058112] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.058418]                                      ^
[   14.058642]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.058905]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.059175] ==================================================================
[   13.907536] ==================================================================
[   13.907947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   13.908433] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   13.908825] 
[   13.908930] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   13.909219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.909246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.909269] Call Trace:
[   13.909291]  <TASK>
[   13.909311]  dump_stack_lvl+0x73/0xb0
[   13.909339]  print_report+0xd1/0x610
[   13.909375]  ? __virt_addr_valid+0x1db/0x2d0
[   13.909399]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.909421]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.909445]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.909468]  kasan_report+0x141/0x180
[   13.909493]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.909523]  kasan_check_range+0x10c/0x1c0
[   13.909546]  __kasan_check_write+0x18/0x20
[   13.909566]  kasan_atomics_helper+0x8f9/0x5450
[   13.909590]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.909614]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.909637]  ? kasan_atomics+0x152/0x310
[   13.909661]  kasan_atomics+0x1dc/0x310
[   13.909681]  ? __pfx_kasan_atomics+0x10/0x10
[   13.909703]  ? __pfx_read_tsc+0x10/0x10
[   13.909725]  ? ktime_get_ts64+0x86/0x230
[   13.909753]  kunit_try_run_case+0x1a5/0x480
[   13.909775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.909794]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.909816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.909841]  ? __kthread_parkme+0x82/0x180
[   13.909864]  ? preempt_count_sub+0x50/0x80
[   13.909890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.909911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.909935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.909960]  kthread+0x337/0x6f0
[   13.909977]  ? trace_preempt_on+0x20/0xc0
[   13.910001]  ? __pfx_kthread+0x10/0x10
[   13.910020]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.910042]  ? calculate_sigpending+0x7b/0xa0
[   13.910064]  ? __pfx_kthread+0x10/0x10
[   13.910084]  ret_from_fork+0x41/0x80
[   13.910105]  ? __pfx_kthread+0x10/0x10
[   13.910123]  ret_from_fork_asm+0x1a/0x30
[   13.910155]  </TASK>
[   13.910167] 
[   13.920727] Allocated by task 285:
[   13.920927]  kasan_save_stack+0x45/0x70
[   13.921128]  kasan_save_track+0x18/0x40
[   13.921323]  kasan_save_alloc_info+0x3b/0x50
[   13.921832]  __kasan_kmalloc+0xb7/0xc0
[   13.922136]  __kmalloc_cache_noprof+0x189/0x420
[   13.922367]  kasan_atomics+0x95/0x310
[   13.922613]  kunit_try_run_case+0x1a5/0x480
[   13.922968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.923289]  kthread+0x337/0x6f0
[   13.923469]  ret_from_fork+0x41/0x80
[   13.923792]  ret_from_fork_asm+0x1a/0x30
[   13.924087] 
[   13.924189] The buggy address belongs to the object at ffff888103d00c80
[   13.924189]  which belongs to the cache kmalloc-64 of size 64
[   13.924893] The buggy address is located 0 bytes to the right of
[   13.924893]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   13.925598] 
[   13.925698] The buggy address belongs to the physical page:
[   13.925887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   13.926259] flags: 0x200000000000000(node=0|zone=2)
[   13.926578] page_type: f5(slab)
[   13.926724] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.927053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.927740] page dumped because: kasan: bad access detected
[   13.927926] 
[   13.928192] Memory state around the buggy address:
[   13.928467]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.928834]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.929215] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.929684]                                      ^
[   13.929933]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.930239]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.930700] ==================================================================
[   14.182670] ==================================================================
[   14.183007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.183327] Read of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.184063] 
[   14.184178] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.184249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.184262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.184284] Call Trace:
[   14.184302]  <TASK>
[   14.184317]  dump_stack_lvl+0x73/0xb0
[   14.184363]  print_report+0xd1/0x610
[   14.184386]  ? __virt_addr_valid+0x1db/0x2d0
[   14.184417]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.184439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.184462]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.184496]  kasan_report+0x141/0x180
[   14.184519]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.184546]  __asan_report_load4_noabort+0x18/0x20
[   14.184568]  kasan_atomics_helper+0x4a1c/0x5450
[   14.184592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.184615]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.184636]  ? kasan_atomics+0x152/0x310
[   14.184660]  kasan_atomics+0x1dc/0x310
[   14.184680]  ? __pfx_kasan_atomics+0x10/0x10
[   14.184701]  ? __pfx_read_tsc+0x10/0x10
[   14.184722]  ? ktime_get_ts64+0x86/0x230
[   14.184747]  kunit_try_run_case+0x1a5/0x480
[   14.184769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.184788]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.184809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.184834]  ? __kthread_parkme+0x82/0x180
[   14.184856]  ? preempt_count_sub+0x50/0x80
[   14.184884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.184906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.184934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.184958]  kthread+0x337/0x6f0
[   14.184975]  ? trace_preempt_on+0x20/0xc0
[   14.185000]  ? __pfx_kthread+0x10/0x10
[   14.185087]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.185111]  ? calculate_sigpending+0x7b/0xa0
[   14.185133]  ? __pfx_kthread+0x10/0x10
[   14.185153]  ret_from_fork+0x41/0x80
[   14.185175]  ? __pfx_kthread+0x10/0x10
[   14.185193]  ret_from_fork_asm+0x1a/0x30
[   14.185235]  </TASK>
[   14.185247] 
[   14.192658] Allocated by task 285:
[   14.192791]  kasan_save_stack+0x45/0x70
[   14.192938]  kasan_save_track+0x18/0x40
[   14.193074]  kasan_save_alloc_info+0x3b/0x50
[   14.193220]  __kasan_kmalloc+0xb7/0xc0
[   14.193460]  __kmalloc_cache_noprof+0x189/0x420
[   14.193679]  kasan_atomics+0x95/0x310
[   14.193860]  kunit_try_run_case+0x1a5/0x480
[   14.194064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.194319]  kthread+0x337/0x6f0
[   14.194498]  ret_from_fork+0x41/0x80
[   14.194679]  ret_from_fork_asm+0x1a/0x30
[   14.194874] 
[   14.194966] The buggy address belongs to the object at ffff888103d00c80
[   14.194966]  which belongs to the cache kmalloc-64 of size 64
[   14.195503] The buggy address is located 0 bytes to the right of
[   14.195503]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.195870] 
[   14.195942] The buggy address belongs to the physical page:
[   14.196117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.196537] flags: 0x200000000000000(node=0|zone=2)
[   14.196773] page_type: f5(slab)
[   14.196949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.197315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.197691] page dumped because: kasan: bad access detected
[   14.197904] 
[   14.198016] Memory state around the buggy address:
[   14.198196]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.198468]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.198792] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.199117]                                      ^
[   14.199319]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.199602]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.199815] ==================================================================
[   14.287250] ==================================================================
[   14.288411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.289115] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.289918] 
[   14.290112] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.290171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.290185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.290219] Call Trace:
[   14.290248]  <TASK>
[   14.290265]  dump_stack_lvl+0x73/0xb0
[   14.290304]  print_report+0xd1/0x610
[   14.290327]  ? __virt_addr_valid+0x1db/0x2d0
[   14.290369]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.290392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.290416]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.290439]  kasan_report+0x141/0x180
[   14.290462]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.290499]  kasan_check_range+0x10c/0x1c0
[   14.290520]  __kasan_check_write+0x18/0x20
[   14.290541]  kasan_atomics_helper+0x12e6/0x5450
[   14.290577]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.290600]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.290623]  ? kasan_atomics+0x152/0x310
[   14.290657]  kasan_atomics+0x1dc/0x310
[   14.290677]  ? __pfx_kasan_atomics+0x10/0x10
[   14.290698]  ? __pfx_read_tsc+0x10/0x10
[   14.290719]  ? ktime_get_ts64+0x86/0x230
[   14.290745]  kunit_try_run_case+0x1a5/0x480
[   14.290768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.290787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.290809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.290834]  ? __kthread_parkme+0x82/0x180
[   14.290856]  ? preempt_count_sub+0x50/0x80
[   14.290883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.290904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.290928]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.290951]  kthread+0x337/0x6f0
[   14.290968]  ? trace_preempt_on+0x20/0xc0
[   14.290993]  ? __pfx_kthread+0x10/0x10
[   14.291012]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.291034]  ? calculate_sigpending+0x7b/0xa0
[   14.291057]  ? __pfx_kthread+0x10/0x10
[   14.291076]  ret_from_fork+0x41/0x80
[   14.291097]  ? __pfx_kthread+0x10/0x10
[   14.291116]  ret_from_fork_asm+0x1a/0x30
[   14.291148]  </TASK>
[   14.291159] 
[   14.301810] Allocated by task 285:
[   14.302006]  kasan_save_stack+0x45/0x70
[   14.302198]  kasan_save_track+0x18/0x40
[   14.302432]  kasan_save_alloc_info+0x3b/0x50
[   14.302581]  __kasan_kmalloc+0xb7/0xc0
[   14.302715]  __kmalloc_cache_noprof+0x189/0x420
[   14.302928]  kasan_atomics+0x95/0x310
[   14.303114]  kunit_try_run_case+0x1a5/0x480
[   14.303367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.303573]  kthread+0x337/0x6f0
[   14.303692]  ret_from_fork+0x41/0x80
[   14.303832]  ret_from_fork_asm+0x1a/0x30
[   14.304029] 
[   14.304133] The buggy address belongs to the object at ffff888103d00c80
[   14.304133]  which belongs to the cache kmalloc-64 of size 64
[   14.304814] The buggy address is located 0 bytes to the right of
[   14.304814]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.305343] 
[   14.305445] The buggy address belongs to the physical page:
[   14.305691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.306023] flags: 0x200000000000000(node=0|zone=2)
[   14.306282] page_type: f5(slab)
[   14.306441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.306796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.307022] page dumped because: kasan: bad access detected
[   14.307199] 
[   14.307379] Memory state around the buggy address:
[   14.307626]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.307941]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.308266] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.308586]                                      ^
[   14.308741]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.309007]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.309351] ==================================================================
[   14.739173] ==================================================================
[   14.739895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   14.740256] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.740616] 
[   14.740726] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.740769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.740781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.740802] Call Trace:
[   14.740817]  <TASK>
[   14.740832]  dump_stack_lvl+0x73/0xb0
[   14.740857]  print_report+0xd1/0x610
[   14.740879]  ? __virt_addr_valid+0x1db/0x2d0
[   14.740901]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.740928]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.740951]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.740974]  kasan_report+0x141/0x180
[   14.740997]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.741025]  kasan_check_range+0x10c/0x1c0
[   14.741046]  __kasan_check_write+0x18/0x20
[   14.741067]  kasan_atomics_helper+0x1f43/0x5450
[   14.741090]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.741114]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.741136]  ? kasan_atomics+0x152/0x310
[   14.741160]  kasan_atomics+0x1dc/0x310
[   14.741180]  ? __pfx_kasan_atomics+0x10/0x10
[   14.741202]  ? __pfx_read_tsc+0x10/0x10
[   14.741233]  ? ktime_get_ts64+0x86/0x230
[   14.741259]  kunit_try_run_case+0x1a5/0x480
[   14.741281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.741301]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.741323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.741368]  ? __kthread_parkme+0x82/0x180
[   14.741390]  ? preempt_count_sub+0x50/0x80
[   14.741416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.741437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.741461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.741485]  kthread+0x337/0x6f0
[   14.741503]  ? trace_preempt_on+0x20/0xc0
[   14.741527]  ? __pfx_kthread+0x10/0x10
[   14.741546]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.741569]  ? calculate_sigpending+0x7b/0xa0
[   14.741591]  ? __pfx_kthread+0x10/0x10
[   14.741609]  ret_from_fork+0x41/0x80
[   14.741631]  ? __pfx_kthread+0x10/0x10
[   14.741649]  ret_from_fork_asm+0x1a/0x30
[   14.741680]  </TASK>
[   14.741690] 
[   14.748802] Allocated by task 285:
[   14.748985]  kasan_save_stack+0x45/0x70
[   14.749200]  kasan_save_track+0x18/0x40
[   14.749503]  kasan_save_alloc_info+0x3b/0x50
[   14.749681]  __kasan_kmalloc+0xb7/0xc0
[   14.749846]  __kmalloc_cache_noprof+0x189/0x420
[   14.750087]  kasan_atomics+0x95/0x310
[   14.750326]  kunit_try_run_case+0x1a5/0x480
[   14.750590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.750877]  kthread+0x337/0x6f0
[   14.751051]  ret_from_fork+0x41/0x80
[   14.751241]  ret_from_fork_asm+0x1a/0x30
[   14.751465] 
[   14.751558] The buggy address belongs to the object at ffff888103d00c80
[   14.751558]  which belongs to the cache kmalloc-64 of size 64
[   14.752075] The buggy address is located 0 bytes to the right of
[   14.752075]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.752651] 
[   14.752747] The buggy address belongs to the physical page:
[   14.752999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.753371] flags: 0x200000000000000(node=0|zone=2)
[   14.753600] page_type: f5(slab)
[   14.753767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.754020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.754382] page dumped because: kasan: bad access detected
[   14.754652] 
[   14.754733] Memory state around the buggy address:
[   14.754961]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.755263]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.755583] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.755890]                                      ^
[   14.756125]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.756444]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.756744] ==================================================================
[   14.401191] ==================================================================
[   14.402068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.402410] Write of size 8 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.402714] 
[   14.402835] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.402886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.402899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.402920] Call Trace:
[   14.402935]  <TASK>
[   14.402961]  dump_stack_lvl+0x73/0xb0
[   14.402986]  print_report+0xd1/0x610
[   14.403009]  ? __virt_addr_valid+0x1db/0x2d0
[   14.403042]  ? kasan_atomics_helper+0x151d/0x5450
[   14.403065]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.403088]  ? kasan_atomics_helper+0x151d/0x5450
[   14.403123]  kasan_report+0x141/0x180
[   14.403146]  ? kasan_atomics_helper+0x151d/0x5450
[   14.403174]  kasan_check_range+0x10c/0x1c0
[   14.403205]  __kasan_check_write+0x18/0x20
[   14.403241]  kasan_atomics_helper+0x151d/0x5450
[   14.403264]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.403287]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.403321]  ? kasan_atomics+0x152/0x310
[   14.403345]  kasan_atomics+0x1dc/0x310
[   14.403374]  ? __pfx_kasan_atomics+0x10/0x10
[   14.403415]  ? __pfx_read_tsc+0x10/0x10
[   14.403436]  ? ktime_get_ts64+0x86/0x230
[   14.403462]  kunit_try_run_case+0x1a5/0x480
[   14.403494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.403514]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.403535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.403561]  ? __kthread_parkme+0x82/0x180
[   14.403583]  ? preempt_count_sub+0x50/0x80
[   14.403610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.403630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.403711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.403739]  kthread+0x337/0x6f0
[   14.403758]  ? trace_preempt_on+0x20/0xc0
[   14.403782]  ? __pfx_kthread+0x10/0x10
[   14.403801]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.403825]  ? calculate_sigpending+0x7b/0xa0
[   14.403847]  ? __pfx_kthread+0x10/0x10
[   14.403866]  ret_from_fork+0x41/0x80
[   14.403887]  ? __pfx_kthread+0x10/0x10
[   14.403917]  ret_from_fork_asm+0x1a/0x30
[   14.403948]  </TASK>
[   14.403958] 
[   14.411903] Allocated by task 285:
[   14.412118]  kasan_save_stack+0x45/0x70
[   14.412357]  kasan_save_track+0x18/0x40
[   14.412587]  kasan_save_alloc_info+0x3b/0x50
[   14.412788]  __kasan_kmalloc+0xb7/0xc0
[   14.413027]  __kmalloc_cache_noprof+0x189/0x420
[   14.413283]  kasan_atomics+0x95/0x310
[   14.413543]  kunit_try_run_case+0x1a5/0x480
[   14.413733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.413904]  kthread+0x337/0x6f0
[   14.414018]  ret_from_fork+0x41/0x80
[   14.414196]  ret_from_fork_asm+0x1a/0x30
[   14.414430] 
[   14.414525] The buggy address belongs to the object at ffff888103d00c80
[   14.414525]  which belongs to the cache kmalloc-64 of size 64
[   14.415078] The buggy address is located 0 bytes to the right of
[   14.415078]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.415671] 
[   14.415794] The buggy address belongs to the physical page:
[   14.416011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.416429] flags: 0x200000000000000(node=0|zone=2)
[   14.416589] page_type: f5(slab)
[   14.416704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.416931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.417150] page dumped because: kasan: bad access detected
[   14.417373] 
[   14.417466] Memory state around the buggy address:
[   14.417689]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.418010]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.418384] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.418758]                                      ^
[   14.419013]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.419365]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.419694] ==================================================================
[   14.060546] ==================================================================
[   14.060798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.061043] Write of size 4 at addr ffff888103d00cb0 by task kunit_try_catch/285
[   14.061714] 
[   14.061959] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.15.8-rc1 #1 PREEMPT(voluntary) 
[   14.062004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.062018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.062038] Call Trace:
[   14.062055]  <TASK>
[   14.062070]  dump_stack_lvl+0x73/0xb0
[   14.062096]  print_report+0xd1/0x610
[   14.062119]  ? __virt_addr_valid+0x1db/0x2d0
[   14.062140]  ? kasan_atomics_helper+0xde0/0x5450
[   14.062162]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.062186]  ? kasan_atomics_helper+0xde0/0x5450
[   14.062208]  kasan_report+0x141/0x180
[   14.062244]  ? kasan_atomics_helper+0xde0/0x5450
[   14.062273]  kasan_check_range+0x10c/0x1c0
[   14.062294]  __kasan_check_write+0x18/0x20
[   14.062314]  kasan_atomics_helper+0xde0/0x5450
[   14.062338]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.062371]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.062393]  ? kasan_atomics+0x152/0x310
[   14.062418]  kasan_atomics+0x1dc/0x310
[   14.062438]  ? __pfx_kasan_atomics+0x10/0x10
[   14.062460]  ? __pfx_read_tsc+0x10/0x10
[   14.062481]  ? ktime_get_ts64+0x86/0x230
[   14.062506]  kunit_try_run_case+0x1a5/0x480
[   14.062528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.062547]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.062569]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.062594]  ? __kthread_parkme+0x82/0x180
[   14.062616]  ? preempt_count_sub+0x50/0x80
[   14.062642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.062663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.062687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.062712]  kthread+0x337/0x6f0
[   14.062730]  ? trace_preempt_on+0x20/0xc0
[   14.062754]  ? __pfx_kthread+0x10/0x10
[   14.062773]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.062796]  ? calculate_sigpending+0x7b/0xa0
[   14.062817]  ? __pfx_kthread+0x10/0x10
[   14.062837]  ret_from_fork+0x41/0x80
[   14.062858]  ? __pfx_kthread+0x10/0x10
[   14.062876]  ret_from_fork_asm+0x1a/0x30
[   14.062908]  </TASK>
[   14.062920] 
[   14.070164] Allocated by task 285:
[   14.070306]  kasan_save_stack+0x45/0x70
[   14.070679]  kasan_save_track+0x18/0x40
[   14.070870]  kasan_save_alloc_info+0x3b/0x50
[   14.071076]  __kasan_kmalloc+0xb7/0xc0
[   14.071274]  __kmalloc_cache_noprof+0x189/0x420
[   14.071573]  kasan_atomics+0x95/0x310
[   14.071840]  kunit_try_run_case+0x1a5/0x480
[   14.072032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.072205]  kthread+0x337/0x6f0
[   14.072331]  ret_from_fork+0x41/0x80
[   14.072462]  ret_from_fork_asm+0x1a/0x30
[   14.072671] 
[   14.072765] The buggy address belongs to the object at ffff888103d00c80
[   14.072765]  which belongs to the cache kmalloc-64 of size 64
[   14.073308] The buggy address is located 0 bytes to the right of
[   14.073308]  allocated 48-byte region [ffff888103d00c80, ffff888103d00cb0)
[   14.073904] 
[   14.074008] The buggy address belongs to the physical page:
[   14.074268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d00
[   14.074527] flags: 0x200000000000000(node=0|zone=2)
[   14.074691] page_type: f5(slab)
[   14.074812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.075042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.075356] page dumped because: kasan: bad access detected
[   14.075604] 
[   14.075696] Memory state around the buggy address:
[   14.075914]  ffff888103d00b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.076237]  ffff888103d00c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.076805] >ffff888103d00c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.077031]                                      ^
[   14.077185]  ffff888103d00d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.077415]  ffff888103d00d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.077629] ==================================================================