Hay
Date
July 6, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.012307] ==================================================================
[   21.012582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.012651] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.012702] 
[   21.012743] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.012823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.013407] Hardware name: linux,dummy-virt (DT)
[   21.013505] Call trace:
[   21.013689]  show_stack+0x20/0x38 (C)
[   21.013747]  dump_stack_lvl+0x8c/0xd0
[   21.013796]  print_report+0x118/0x608
[   21.013843]  kasan_report+0xdc/0x128
[   21.014063]  __asan_report_store8_noabort+0x20/0x30
[   21.014446]  kasan_atomics_helper+0x3e5c/0x4858
[   21.014642]  kasan_atomics+0x198/0x2e0
[   21.014693]  kunit_try_run_case+0x170/0x3f0
[   21.014753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.014833]  kthread+0x328/0x630
[   21.014875]  ret_from_fork+0x10/0x20
[   21.014932] 
[   21.014955] Allocated by task 265:
[   21.014984]  kasan_save_stack+0x3c/0x68
[   21.015036]  kasan_save_track+0x20/0x40
[   21.015077]  kasan_save_alloc_info+0x40/0x58
[   21.015118]  __kasan_kmalloc+0xd4/0xd8
[   21.015165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.015217]  kasan_atomics+0xb8/0x2e0
[   21.015254]  kunit_try_run_case+0x170/0x3f0
[   21.015296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.015353]  kthread+0x328/0x630
[   21.015397]  ret_from_fork+0x10/0x20
[   21.015435] 
[   21.015455] The buggy address belongs to the object at fff00000c56d1100
[   21.015455]  which belongs to the cache kmalloc-64 of size 64
[   21.015514] The buggy address is located 0 bytes to the right of
[   21.015514]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.015579] 
[   21.015609] The buggy address belongs to the physical page:
[   21.015658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.015711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.015761] page_type: f5(slab)
[   21.015809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.015871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.015918] page dumped because: kasan: bad access detected
[   21.015954] 
[   21.015973] Memory state around the buggy address:
[   21.016007]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.016052]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.016096] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.016136]                                      ^
[   21.016178]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.016616]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.017022] ==================================================================
[   21.155301] ==================================================================
[   21.155438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   21.155497] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.155550] 
[   21.155581] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.155661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.155716] Hardware name: linux,dummy-virt (DT)
[   21.155749] Call trace:
[   21.155774]  show_stack+0x20/0x38 (C)
[   21.155846]  dump_stack_lvl+0x8c/0xd0
[   21.155895]  print_report+0x118/0x608
[   21.155942]  kasan_report+0xdc/0x128
[   21.155989]  kasan_check_range+0x100/0x1a8
[   21.156153]  __kasan_check_write+0x20/0x30
[   21.156255]  kasan_atomics_helper+0x15b4/0x4858
[   21.156308]  kasan_atomics+0x198/0x2e0
[   21.156410]  kunit_try_run_case+0x170/0x3f0
[   21.156477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.156558]  kthread+0x328/0x630
[   21.156785]  ret_from_fork+0x10/0x20
[   21.156988] 
[   21.157015] Allocated by task 265:
[   21.157084]  kasan_save_stack+0x3c/0x68
[   21.157207]  kasan_save_track+0x20/0x40
[   21.157284]  kasan_save_alloc_info+0x40/0x58
[   21.157328]  __kasan_kmalloc+0xd4/0xd8
[   21.157367]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.157407]  kasan_atomics+0xb8/0x2e0
[   21.157445]  kunit_try_run_case+0x170/0x3f0
[   21.157515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.157561]  kthread+0x328/0x630
[   21.157830]  ret_from_fork+0x10/0x20
[   21.157906] 
[   21.158177] The buggy address belongs to the object at fff00000c56d1100
[   21.158177]  which belongs to the cache kmalloc-64 of size 64
[   21.158401] The buggy address is located 0 bytes to the right of
[   21.158401]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.158603] 
[   21.158660] The buggy address belongs to the physical page:
[   21.158788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.158894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.158982] page_type: f5(slab)
[   21.159101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.159164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.159217] page dumped because: kasan: bad access detected
[   21.159270] 
[   21.159290] Memory state around the buggy address:
[   21.159324]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.159378]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.159423] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.159465]                                      ^
[   21.159498]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159542]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159590] ==================================================================
[   21.200639] ==================================================================
[   21.200826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   21.201066] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.201156] 
[   21.201203] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.201399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.201822] Hardware name: linux,dummy-virt (DT)
[   21.201897] Call trace:
[   21.201944]  show_stack+0x20/0x38 (C)
[   21.202005]  dump_stack_lvl+0x8c/0xd0
[   21.202055]  print_report+0x118/0x608
[   21.202103]  kasan_report+0xdc/0x128
[   21.202161]  kasan_check_range+0x100/0x1a8
[   21.202219]  __kasan_check_write+0x20/0x30
[   21.202266]  kasan_atomics_helper+0x17ec/0x4858
[   21.202315]  kasan_atomics+0x198/0x2e0
[   21.202380]  kunit_try_run_case+0x170/0x3f0
[   21.202437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.202642]  kthread+0x328/0x630
[   21.202769]  ret_from_fork+0x10/0x20
[   21.203139] 
[   21.203228] Allocated by task 265:
[   21.203324]  kasan_save_stack+0x3c/0x68
[   21.203429]  kasan_save_track+0x20/0x40
[   21.203517]  kasan_save_alloc_info+0x40/0x58
[   21.203624]  __kasan_kmalloc+0xd4/0xd8
[   21.203743]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.203822]  kasan_atomics+0xb8/0x2e0
[   21.203861]  kunit_try_run_case+0x170/0x3f0
[   21.203900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.203947]  kthread+0x328/0x630
[   21.203981]  ret_from_fork+0x10/0x20
[   21.204145] 
[   21.204260] The buggy address belongs to the object at fff00000c56d1100
[   21.204260]  which belongs to the cache kmalloc-64 of size 64
[   21.204353] The buggy address is located 0 bytes to the right of
[   21.204353]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.204477] 
[   21.204498] The buggy address belongs to the physical page:
[   21.204531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.204757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.204865] page_type: f5(slab)
[   21.204961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.205075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.205226] page dumped because: kasan: bad access detected
[   21.205335] 
[   21.205455] Memory state around the buggy address:
[   21.205514]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.205560]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.205817] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.205979]                                      ^
[   21.206055]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.206236]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.206515] ==================================================================
[   21.036580] ==================================================================
[   21.036761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.036823] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.037257] 
[   21.037601] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.037732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.038257] Hardware name: linux,dummy-virt (DT)
[   21.038348] Call trace:
[   21.038696]  show_stack+0x20/0x38 (C)
[   21.038847]  dump_stack_lvl+0x8c/0xd0
[   21.039157]  print_report+0x118/0x608
[   21.039386]  kasan_report+0xdc/0x128
[   21.039584]  kasan_check_range+0x100/0x1a8
[   21.039739]  __kasan_check_write+0x20/0x30
[   21.039794]  kasan_atomics_helper+0xf88/0x4858
[   21.039846]  kasan_atomics+0x198/0x2e0
[   21.040019]  kunit_try_run_case+0x170/0x3f0
[   21.040514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.040689]  kthread+0x328/0x630
[   21.040775]  ret_from_fork+0x10/0x20
[   21.041037] 
[   21.041065] Allocated by task 265:
[   21.041097]  kasan_save_stack+0x3c/0x68
[   21.041676]  kasan_save_track+0x20/0x40
[   21.041832]  kasan_save_alloc_info+0x40/0x58
[   21.042098]  __kasan_kmalloc+0xd4/0xd8
[   21.042234]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.042373]  kasan_atomics+0xb8/0x2e0
[   21.042519]  kunit_try_run_case+0x170/0x3f0
[   21.042652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.042780]  kthread+0x328/0x630
[   21.042853]  ret_from_fork+0x10/0x20
[   21.043057] 
[   21.043225] The buggy address belongs to the object at fff00000c56d1100
[   21.043225]  which belongs to the cache kmalloc-64 of size 64
[   21.043337] The buggy address is located 0 bytes to the right of
[   21.043337]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.043525] 
[   21.043570] The buggy address belongs to the physical page:
[   21.043604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.043658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.044301] page_type: f5(slab)
[   21.044460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.044697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.044781] page dumped because: kasan: bad access detected
[   21.044957] 
[   21.045265] Memory state around the buggy address:
[   21.045612]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.045857]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.046263] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.046394]                                      ^
[   21.046446]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.046567]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.046984] ==================================================================
[   20.992631] ==================================================================
[   20.992848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.993107] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   20.993161] 
[   20.993208] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.993287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.993684] Hardware name: linux,dummy-virt (DT)
[   20.994015] Call trace:
[   20.994334]  show_stack+0x20/0x38 (C)
[   20.994489]  dump_stack_lvl+0x8c/0xd0
[   20.994699]  print_report+0x118/0x608
[   20.994851]  kasan_report+0xdc/0x128
[   20.994901]  __asan_report_load8_noabort+0x20/0x30
[   20.995325]  kasan_atomics_helper+0x3f58/0x4858
[   20.995576]  kasan_atomics+0x198/0x2e0
[   20.995795]  kunit_try_run_case+0x170/0x3f0
[   20.995973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.996155]  kthread+0x328/0x630
[   20.996378]  ret_from_fork+0x10/0x20
[   20.996794] 
[   20.996879] Allocated by task 265:
[   20.997013]  kasan_save_stack+0x3c/0x68
[   20.997109]  kasan_save_track+0x20/0x40
[   20.997290]  kasan_save_alloc_info+0x40/0x58
[   20.997452]  __kasan_kmalloc+0xd4/0xd8
[   20.997599]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.997648]  kasan_atomics+0xb8/0x2e0
[   20.997852]  kunit_try_run_case+0x170/0x3f0
[   20.998068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.998368]  kthread+0x328/0x630
[   20.998525]  ret_from_fork+0x10/0x20
[   20.998766] 
[   20.998823] The buggy address belongs to the object at fff00000c56d1100
[   20.998823]  which belongs to the cache kmalloc-64 of size 64
[   20.998900] The buggy address is located 0 bytes to the right of
[   20.998900]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.998966] 
[   20.999139] The buggy address belongs to the physical page:
[   20.999204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   20.999272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.999333] page_type: f5(slab)
[   20.999380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.999433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.999486] page dumped because: kasan: bad access detected
[   20.999529] 
[   20.999550] Memory state around the buggy address:
[   20.999584]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.999630]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.999674] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.999728]                                      ^
[   20.999769]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.999814]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.999864] ==================================================================
[   21.146502] ==================================================================
[   21.146552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   21.146604] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.146654] 
[   21.146686] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.146766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.146795] Hardware name: linux,dummy-virt (DT)
[   21.146828] Call trace:
[   21.146854]  show_stack+0x20/0x38 (C)
[   21.146901]  dump_stack_lvl+0x8c/0xd0
[   21.146949]  print_report+0x118/0x608
[   21.146996]  kasan_report+0xdc/0x128
[   21.147043]  kasan_check_range+0x100/0x1a8
[   21.147091]  __kasan_check_write+0x20/0x30
[   21.147138]  kasan_atomics_helper+0x14e4/0x4858
[   21.147187]  kasan_atomics+0x198/0x2e0
[   21.147249]  kunit_try_run_case+0x170/0x3f0
[   21.147298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.147352]  kthread+0x328/0x630
[   21.147394]  ret_from_fork+0x10/0x20
[   21.147442] 
[   21.147462] Allocated by task 265:
[   21.147490]  kasan_save_stack+0x3c/0x68
[   21.147532]  kasan_save_track+0x20/0x40
[   21.147571]  kasan_save_alloc_info+0x40/0x58
[   21.147613]  __kasan_kmalloc+0xd4/0xd8
[   21.147652]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.147692]  kasan_atomics+0xb8/0x2e0
[   21.147730]  kunit_try_run_case+0x170/0x3f0
[   21.147769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.147813]  kthread+0x328/0x630
[   21.147848]  ret_from_fork+0x10/0x20
[   21.147885] 
[   21.147905] The buggy address belongs to the object at fff00000c56d1100
[   21.147905]  which belongs to the cache kmalloc-64 of size 64
[   21.147964] The buggy address is located 0 bytes to the right of
[   21.147964]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.148028] 
[   21.148048] The buggy address belongs to the physical page:
[   21.148080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.148133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.148180] page_type: f5(slab)
[   21.148297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.148364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.148407] page dumped because: kasan: bad access detected
[   21.148441] 
[   21.148461] Memory state around the buggy address:
[   21.148495]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.148567]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.148642] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.148685]                                      ^
[   21.148718]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.148768]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.148824] ==================================================================
[   21.194228] ==================================================================
[   21.194545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   21.194623] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.194680] 
[   21.194715] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.195029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.195071] Hardware name: linux,dummy-virt (DT)
[   21.195222] Call trace:
[   21.195248]  show_stack+0x20/0x38 (C)
[   21.195302]  dump_stack_lvl+0x8c/0xd0
[   21.195483]  print_report+0x118/0x608
[   21.195565]  kasan_report+0xdc/0x128
[   21.195774]  __asan_report_load8_noabort+0x20/0x30
[   21.195841]  kasan_atomics_helper+0x3e20/0x4858
[   21.195953]  kasan_atomics+0x198/0x2e0
[   21.196079]  kunit_try_run_case+0x170/0x3f0
[   21.196149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.196221]  kthread+0x328/0x630
[   21.196265]  ret_from_fork+0x10/0x20
[   21.196314] 
[   21.196345] Allocated by task 265:
[   21.196392]  kasan_save_stack+0x3c/0x68
[   21.196436]  kasan_save_track+0x20/0x40
[   21.196499]  kasan_save_alloc_info+0x40/0x58
[   21.196584]  __kasan_kmalloc+0xd4/0xd8
[   21.196624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.196665]  kasan_atomics+0xb8/0x2e0
[   21.196705]  kunit_try_run_case+0x170/0x3f0
[   21.196840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.197065]  kthread+0x328/0x630
[   21.197142]  ret_from_fork+0x10/0x20
[   21.197184] 
[   21.197408] The buggy address belongs to the object at fff00000c56d1100
[   21.197408]  which belongs to the cache kmalloc-64 of size 64
[   21.197598] The buggy address is located 0 bytes to the right of
[   21.197598]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.197952] 
[   21.198239] The buggy address belongs to the physical page:
[   21.198319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.198375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.198453] page_type: f5(slab)
[   21.198494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.198546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.198589] page dumped because: kasan: bad access detected
[   21.198749] 
[   21.198883] Memory state around the buggy address:
[   21.199181]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.199269]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.199315] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.199646]                                      ^
[   21.199753]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.200029]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.200134] ==================================================================
[   21.018594] ==================================================================
[   21.018647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.018699] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.018964] 
[   21.019007] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.019107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.019323] Hardware name: linux,dummy-virt (DT)
[   21.019619] Call trace:
[   21.019966]  show_stack+0x20/0x38 (C)
[   21.020053]  dump_stack_lvl+0x8c/0xd0
[   21.020269]  print_report+0x118/0x608
[   21.020331]  kasan_report+0xdc/0x128
[   21.020382]  kasan_check_range+0x100/0x1a8
[   21.020451]  __kasan_check_write+0x20/0x30
[   21.020700]  kasan_atomics_helper+0xeb8/0x4858
[   21.020805]  kasan_atomics+0x198/0x2e0
[   21.021115]  kunit_try_run_case+0x170/0x3f0
[   21.021328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.021548]  kthread+0x328/0x630
[   21.021638]  ret_from_fork+0x10/0x20
[   21.021771] 
[   21.021894] Allocated by task 265:
[   21.022061]  kasan_save_stack+0x3c/0x68
[   21.022309]  kasan_save_track+0x20/0x40
[   21.022513]  kasan_save_alloc_info+0x40/0x58
[   21.022706]  __kasan_kmalloc+0xd4/0xd8
[   21.022791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.023115]  kasan_atomics+0xb8/0x2e0
[   21.023185]  kunit_try_run_case+0x170/0x3f0
[   21.023367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.023893]  kthread+0x328/0x630
[   21.024308]  ret_from_fork+0x10/0x20
[   21.024361] 
[   21.024397] The buggy address belongs to the object at fff00000c56d1100
[   21.024397]  which belongs to the cache kmalloc-64 of size 64
[   21.024634] The buggy address is located 0 bytes to the right of
[   21.024634]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.025075] 
[   21.025301] The buggy address belongs to the physical page:
[   21.025639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.026121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.026457] page_type: f5(slab)
[   21.026560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.026795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.027009] page dumped because: kasan: bad access detected
[   21.027180] 
[   21.027657] Memory state around the buggy address:
[   21.027821]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.027914]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.028342] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.029004]                                      ^
[   21.029089]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.029245]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.029646] ==================================================================
[   21.065700] ==================================================================
[   21.065869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   21.065922] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.065974] 
[   21.066135] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.066928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.067240] Hardware name: linux,dummy-virt (DT)
[   21.067315] Call trace:
[   21.067342]  show_stack+0x20/0x38 (C)
[   21.067731]  dump_stack_lvl+0x8c/0xd0
[   21.067864]  print_report+0x118/0x608
[   21.068280]  kasan_report+0xdc/0x128
[   21.068424]  kasan_check_range+0x100/0x1a8
[   21.068602]  __kasan_check_write+0x20/0x30
[   21.068692]  kasan_atomics_helper+0x10c0/0x4858
[   21.069249]  kasan_atomics+0x198/0x2e0
[   21.069481]  kunit_try_run_case+0x170/0x3f0
[   21.069962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.070050]  kthread+0x328/0x630
[   21.070222]  ret_from_fork+0x10/0x20
[   21.070443] 
[   21.070494] Allocated by task 265:
[   21.070688]  kasan_save_stack+0x3c/0x68
[   21.070805]  kasan_save_track+0x20/0x40
[   21.071205]  kasan_save_alloc_info+0x40/0x58
[   21.071537]  __kasan_kmalloc+0xd4/0xd8
[   21.071681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.071989]  kasan_atomics+0xb8/0x2e0
[   21.072164]  kunit_try_run_case+0x170/0x3f0
[   21.072487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.072621]  kthread+0x328/0x630
[   21.073098]  ret_from_fork+0x10/0x20
[   21.073297] 
[   21.073705] The buggy address belongs to the object at fff00000c56d1100
[   21.073705]  which belongs to the cache kmalloc-64 of size 64
[   21.073869] The buggy address is located 0 bytes to the right of
[   21.073869]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.073939] 
[   21.073962] The buggy address belongs to the physical page:
[   21.073994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.074566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.074680] page_type: f5(slab)
[   21.075110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.075383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.075459] page dumped because: kasan: bad access detected
[   21.075755] 
[   21.075990] Memory state around the buggy address:
[   21.076095]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.076347]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.076672] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.076814]                                      ^
[   21.077023]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.077228]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.077441] ==================================================================
[   21.078537] ==================================================================
[   21.078598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   21.078983] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.079133] 
[   21.079218] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.079463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.079527] Hardware name: linux,dummy-virt (DT)
[   21.079772] Call trace:
[   21.080026]  show_stack+0x20/0x38 (C)
[   21.080393]  dump_stack_lvl+0x8c/0xd0
[   21.080603]  print_report+0x118/0x608
[   21.080664]  kasan_report+0xdc/0x128
[   21.081042]  kasan_check_range+0x100/0x1a8
[   21.081114]  __kasan_check_write+0x20/0x30
[   21.081287]  kasan_atomics_helper+0x1128/0x4858
[   21.081373]  kasan_atomics+0x198/0x2e0
[   21.081429]  kunit_try_run_case+0x170/0x3f0
[   21.081783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.082280]  kthread+0x328/0x630
[   21.082411]  ret_from_fork+0x10/0x20
[   21.082492] 
[   21.082531] Allocated by task 265:
[   21.082573]  kasan_save_stack+0x3c/0x68
[   21.082629]  kasan_save_track+0x20/0x40
[   21.082693]  kasan_save_alloc_info+0x40/0x58
[   21.082748]  __kasan_kmalloc+0xd4/0xd8
[   21.082817]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.082865]  kasan_atomics+0xb8/0x2e0
[   21.082907]  kunit_try_run_case+0x170/0x3f0
[   21.082948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.083014]  kthread+0x328/0x630
[   21.083050]  ret_from_fork+0x10/0x20
[   21.083137] 
[   21.083169] The buggy address belongs to the object at fff00000c56d1100
[   21.083169]  which belongs to the cache kmalloc-64 of size 64
[   21.083247] The buggy address is located 0 bytes to the right of
[   21.083247]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.083314] 
[   21.083335] The buggy address belongs to the physical page:
[   21.083378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.083430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.083500] page_type: f5(slab)
[   21.083550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.083621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.083669] page dumped because: kasan: bad access detected
[   21.083703] 
[   21.083722] Memory state around the buggy address:
[   21.083757]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.083802]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.083860] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.083901]                                      ^
[   21.083950]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.083995]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.084044] ==================================================================
[   21.171232] ==================================================================
[   21.171306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   21.171356] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.171442] 
[   21.171473] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.171698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.171762] Hardware name: linux,dummy-virt (DT)
[   21.171798] Call trace:
[   21.171849]  show_stack+0x20/0x38 (C)
[   21.171932]  dump_stack_lvl+0x8c/0xd0
[   21.172002]  print_report+0x118/0x608
[   21.172087]  kasan_report+0xdc/0x128
[   21.172158]  __asan_report_load8_noabort+0x20/0x30
[   21.172257]  kasan_atomics_helper+0x3df4/0x4858
[   21.172309]  kasan_atomics+0x198/0x2e0
[   21.172355]  kunit_try_run_case+0x170/0x3f0
[   21.172478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.172630]  kthread+0x328/0x630
[   21.172683]  ret_from_fork+0x10/0x20
[   21.172787] 
[   21.172812] Allocated by task 265:
[   21.173066]  kasan_save_stack+0x3c/0x68
[   21.173147]  kasan_save_track+0x20/0x40
[   21.173224]  kasan_save_alloc_info+0x40/0x58
[   21.173305]  __kasan_kmalloc+0xd4/0xd8
[   21.173362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.173409]  kasan_atomics+0xb8/0x2e0
[   21.173493]  kunit_try_run_case+0x170/0x3f0
[   21.173564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.173611]  kthread+0x328/0x630
[   21.173644]  ret_from_fork+0x10/0x20
[   21.173680] 
[   21.173919] The buggy address belongs to the object at fff00000c56d1100
[   21.173919]  which belongs to the cache kmalloc-64 of size 64
[   21.174056] The buggy address is located 0 bytes to the right of
[   21.174056]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.174180] 
[   21.174480] The buggy address belongs to the physical page:
[   21.174578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.174718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.174876] page_type: f5(slab)
[   21.174917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.174969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.175124] page dumped because: kasan: bad access detected
[   21.175244] 
[   21.175571] Memory state around the buggy address:
[   21.175643]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.175689]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.176035] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.176159]                                      ^
[   21.176402]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.176569]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.176695] ==================================================================
[   21.030489] ==================================================================
[   21.030803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.030878] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.030938] 
[   21.031149] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.031257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.031342] Hardware name: linux,dummy-virt (DT)
[   21.031379] Call trace:
[   21.031404]  show_stack+0x20/0x38 (C)
[   21.031800]  dump_stack_lvl+0x8c/0xd0
[   21.032062]  print_report+0x118/0x608
[   21.032279]  kasan_report+0xdc/0x128
[   21.032417]  kasan_check_range+0x100/0x1a8
[   21.032540]  __kasan_check_write+0x20/0x30
[   21.032734]  kasan_atomics_helper+0xf20/0x4858
[   21.032892]  kasan_atomics+0x198/0x2e0
[   21.033560]  kunit_try_run_case+0x170/0x3f0
[   21.033705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.033879]  kthread+0x328/0x630
[   21.033957]  ret_from_fork+0x10/0x20
[   21.034183] 
[   21.034375] Allocated by task 265:
[   21.034538]  kasan_save_stack+0x3c/0x68
[   21.034608]  kasan_save_track+0x20/0x40
[   21.034649]  kasan_save_alloc_info+0x40/0x58
[   21.034709]  __kasan_kmalloc+0xd4/0xd8
[   21.034747]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.034799]  kasan_atomics+0xb8/0x2e0
[   21.034839]  kunit_try_run_case+0x170/0x3f0
[   21.034892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.034953]  kthread+0x328/0x630
[   21.034987]  ret_from_fork+0x10/0x20
[   21.035026] 
[   21.035056] The buggy address belongs to the object at fff00000c56d1100
[   21.035056]  which belongs to the cache kmalloc-64 of size 64
[   21.035116] The buggy address is located 0 bytes to the right of
[   21.035116]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.035211] 
[   21.035256] The buggy address belongs to the physical page:
[   21.035289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.035356] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.035404] page_type: f5(slab)
[   21.035442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.035494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.035536] page dumped because: kasan: bad access detected
[   21.035579] 
[   21.035598] Memory state around the buggy address:
[   21.035645]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.035696]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.035740] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.035794]                                      ^
[   21.035826]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.035886]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.035926] ==================================================================
[   21.165442] ==================================================================
[   21.165556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   21.165677] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.165770] 
[   21.165939] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.166266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.166389] Hardware name: linux,dummy-virt (DT)
[   21.166534] Call trace:
[   21.166605]  show_stack+0x20/0x38 (C)
[   21.166774]  dump_stack_lvl+0x8c/0xd0
[   21.166821]  print_report+0x118/0x608
[   21.166869]  kasan_report+0xdc/0x128
[   21.166915]  kasan_check_range+0x100/0x1a8
[   21.167454]  __kasan_check_write+0x20/0x30
[   21.167534]  kasan_atomics_helper+0x1644/0x4858
[   21.167863]  kasan_atomics+0x198/0x2e0
[   21.168034]  kunit_try_run_case+0x170/0x3f0
[   21.168148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.168317]  kthread+0x328/0x630
[   21.168413]  ret_from_fork+0x10/0x20
[   21.168474] 
[   21.168496] Allocated by task 265:
[   21.168526]  kasan_save_stack+0x3c/0x68
[   21.168568]  kasan_save_track+0x20/0x40
[   21.168618]  kasan_save_alloc_info+0x40/0x58
[   21.168660]  __kasan_kmalloc+0xd4/0xd8
[   21.168703]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.168752]  kasan_atomics+0xb8/0x2e0
[   21.168789]  kunit_try_run_case+0x170/0x3f0
[   21.168835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.168884]  kthread+0x328/0x630
[   21.168918]  ret_from_fork+0x10/0x20
[   21.168965] 
[   21.168995] The buggy address belongs to the object at fff00000c56d1100
[   21.168995]  which belongs to the cache kmalloc-64 of size 64
[   21.169055] The buggy address is located 0 bytes to the right of
[   21.169055]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.169121] 
[   21.169142] The buggy address belongs to the physical page:
[   21.169174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.169236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.169285] page_type: f5(slab)
[   21.169322] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.169374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.169859] page dumped because: kasan: bad access detected
[   21.169960] 
[   21.170136] Memory state around the buggy address:
[   21.170175]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.170406]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.170497] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.170631]                                      ^
[   21.170760]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.170805]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.170845] ==================================================================
[   21.148937] ==================================================================
[   21.148995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   21.149051] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.149102] 
[   21.149130] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.149222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.149259] Hardware name: linux,dummy-virt (DT)
[   21.149289] Call trace:
[   21.149324]  show_stack+0x20/0x38 (C)
[   21.149372]  dump_stack_lvl+0x8c/0xd0
[   21.149419]  print_report+0x118/0x608
[   21.149492]  kasan_report+0xdc/0x128
[   21.149541]  kasan_check_range+0x100/0x1a8
[   21.149658]  __kasan_check_write+0x20/0x30
[   21.149741]  kasan_atomics_helper+0x154c/0x4858
[   21.149791]  kasan_atomics+0x198/0x2e0
[   21.149837]  kunit_try_run_case+0x170/0x3f0
[   21.149886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.149973]  kthread+0x328/0x630
[   21.150091]  ret_from_fork+0x10/0x20
[   21.150249] 
[   21.150282] Allocated by task 265:
[   21.150386]  kasan_save_stack+0x3c/0x68
[   21.150566]  kasan_save_track+0x20/0x40
[   21.150607]  kasan_save_alloc_info+0x40/0x58
[   21.150650]  __kasan_kmalloc+0xd4/0xd8
[   21.150688]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.150771]  kasan_atomics+0xb8/0x2e0
[   21.150812]  kunit_try_run_case+0x170/0x3f0
[   21.150887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.150933]  kthread+0x328/0x630
[   21.150968]  ret_from_fork+0x10/0x20
[   21.151006] 
[   21.151093] The buggy address belongs to the object at fff00000c56d1100
[   21.151093]  which belongs to the cache kmalloc-64 of size 64
[   21.151188] The buggy address is located 0 bytes to the right of
[   21.151188]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.151344] 
[   21.151395] The buggy address belongs to the physical page:
[   21.151479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.151785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.151905] page_type: f5(slab)
[   21.151984] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.152036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.152257] page dumped because: kasan: bad access detected
[   21.152493] 
[   21.152672] Memory state around the buggy address:
[   21.152756]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.152987]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.153302] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.153351]                                      ^
[   21.153386]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.153731]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.153930] ==================================================================
[   21.128451] ==================================================================
[   21.128499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   21.128545] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.128597] 
[   21.128626] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.128707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.128734] Hardware name: linux,dummy-virt (DT)
[   21.128765] Call trace:
[   21.128788]  show_stack+0x20/0x38 (C)
[   21.128837]  dump_stack_lvl+0x8c/0xd0
[   21.128883]  print_report+0x118/0x608
[   21.128931]  kasan_report+0xdc/0x128
[   21.128976]  kasan_check_range+0x100/0x1a8
[   21.129026]  __kasan_check_write+0x20/0x30
[   21.129072]  kasan_atomics_helper+0x1414/0x4858
[   21.130811]  kasan_atomics+0x198/0x2e0
[   21.130915]  kunit_try_run_case+0x170/0x3f0
[   21.131114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.131304]  kthread+0x328/0x630
[   21.131354]  ret_from_fork+0x10/0x20
[   21.131402] 
[   21.131433] Allocated by task 265:
[   21.131473]  kasan_save_stack+0x3c/0x68
[   21.131525]  kasan_save_track+0x20/0x40
[   21.131575]  kasan_save_alloc_info+0x40/0x58
[   21.131626]  __kasan_kmalloc+0xd4/0xd8
[   21.131674]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.131715]  kasan_atomics+0xb8/0x2e0
[   21.131752]  kunit_try_run_case+0x170/0x3f0
[   21.131793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.131839]  kthread+0x328/0x630
[   21.131881]  ret_from_fork+0x10/0x20
[   21.131926] 
[   21.131954] The buggy address belongs to the object at fff00000c56d1100
[   21.131954]  which belongs to the cache kmalloc-64 of size 64
[   21.132015] The buggy address is located 0 bytes to the right of
[   21.132015]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.132079] 
[   21.132109] The buggy address belongs to the physical page:
[   21.132165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.132240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.132306] page_type: f5(slab)
[   21.132351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.132411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.132454] page dumped because: kasan: bad access detected
[   21.132488] 
[   21.132529] Memory state around the buggy address:
[   21.132564]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.132609]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.132668] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.132710]                                      ^
[   21.132752]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.132805]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.132843] ==================================================================
[   20.963423] ==================================================================
[   20.963487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.963540] Write of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265
[   20.964022] 
[   20.964224] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.964321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.964349] Hardware name: linux,dummy-virt (DT)
[   20.964415] Call trace:
[   20.964442]  show_stack+0x20/0x38 (C)
[   20.964665]  dump_stack_lvl+0x8c/0xd0
[   20.964800]  print_report+0x118/0x608
[   20.964852]  kasan_report+0xdc/0x128
[   20.964900]  kasan_check_range+0x100/0x1a8
[   20.964955]  __kasan_check_write+0x20/0x30
[   20.965043]  kasan_atomics_helper+0xd3c/0x4858
[   20.965096]  kasan_atomics+0x198/0x2e0
[   20.965156]  kunit_try_run_case+0x170/0x3f0
[   20.965226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.965280]  kthread+0x328/0x630
[   20.965324]  ret_from_fork+0x10/0x20
[   20.965371] 
[   20.965392] Allocated by task 265:
[   20.965423]  kasan_save_stack+0x3c/0x68
[   20.965715]  kasan_save_track+0x20/0x40
[   20.966277]  kasan_save_alloc_info+0x40/0x58
[   20.966350]  __kasan_kmalloc+0xd4/0xd8
[   20.966391]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.966442]  kasan_atomics+0xb8/0x2e0
[   20.966626]  kunit_try_run_case+0x170/0x3f0
[   20.966670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.966717]  kthread+0x328/0x630
[   20.966895]  ret_from_fork+0x10/0x20
[   20.967097] 
[   20.967368] The buggy address belongs to the object at fff00000c56d1100
[   20.967368]  which belongs to the cache kmalloc-64 of size 64
[   20.967483] The buggy address is located 0 bytes to the right of
[   20.967483]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.967853] 
[   20.968040] The buggy address belongs to the physical page:
[   20.968309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   20.968505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.968924] page_type: f5(slab)
[   20.969309] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.969395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.969440] page dumped because: kasan: bad access detected
[   20.969736] 
[   20.969879] Memory state around the buggy address:
[   20.970115]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.970245]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.970299] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.970508]                                      ^
[   20.970770]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.971145]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.971329] ==================================================================
[   21.122891] ==================================================================
[   21.122938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   21.122988] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.123039] 
[   21.123070] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.123148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.123177] Hardware name: linux,dummy-virt (DT)
[   21.123225] Call trace:
[   21.123251]  show_stack+0x20/0x38 (C)
[   21.123299]  dump_stack_lvl+0x8c/0xd0
[   21.123347]  print_report+0x118/0x608
[   21.123394]  kasan_report+0xdc/0x128
[   21.123441]  __asan_report_load8_noabort+0x20/0x30
[   21.123491]  kasan_atomics_helper+0x3f04/0x4858
[   21.123540]  kasan_atomics+0x198/0x2e0
[   21.123587]  kunit_try_run_case+0x170/0x3f0
[   21.123636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.123688]  kthread+0x328/0x630
[   21.123732]  ret_from_fork+0x10/0x20
[   21.123780] 
[   21.123800] Allocated by task 265:
[   21.123829]  kasan_save_stack+0x3c/0x68
[   21.123870]  kasan_save_track+0x20/0x40
[   21.123909]  kasan_save_alloc_info+0x40/0x58
[   21.123951]  __kasan_kmalloc+0xd4/0xd8
[   21.123988]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.124029]  kasan_atomics+0xb8/0x2e0
[   21.124065]  kunit_try_run_case+0x170/0x3f0
[   21.124105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.124148]  kthread+0x328/0x630
[   21.124181]  ret_from_fork+0x10/0x20
[   21.127436] 
[   21.127460] The buggy address belongs to the object at fff00000c56d1100
[   21.127460]  which belongs to the cache kmalloc-64 of size 64
[   21.127530] The buggy address is located 0 bytes to the right of
[   21.127530]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.127596] 
[   21.127617] The buggy address belongs to the physical page:
[   21.127649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.127704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.127754] page_type: f5(slab)
[   21.127793] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.127845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.127888] page dumped because: kasan: bad access detected
[   21.127922] 
[   21.127942] Memory state around the buggy address:
[   21.127976]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.128020]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.128065] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.128105]                                      ^
[   21.128141]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.128183]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.128237] ==================================================================
[   21.133080] ==================================================================
[   21.133128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   21.133175] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.133977] 
[   21.134569] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.135126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.135202] Hardware name: linux,dummy-virt (DT)
[   21.135483] Call trace:
[   21.135713]  show_stack+0x20/0x38 (C)
[   21.136116]  dump_stack_lvl+0x8c/0xd0
[   21.136623]  print_report+0x118/0x608
[   21.136710]  kasan_report+0xdc/0x128
[   21.136786]  kasan_check_range+0x100/0x1a8
[   21.136938]  __kasan_check_write+0x20/0x30
[   21.137342]  kasan_atomics_helper+0x147c/0x4858
[   21.137527]  kasan_atomics+0x198/0x2e0
[   21.137624]  kunit_try_run_case+0x170/0x3f0
[   21.137802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.138145]  kthread+0x328/0x630
[   21.138376]  ret_from_fork+0x10/0x20
[   21.139136] 
[   21.139213] Allocated by task 265:
[   21.139265]  kasan_save_stack+0x3c/0x68
[   21.139383]  kasan_save_track+0x20/0x40
[   21.139634]  kasan_save_alloc_info+0x40/0x58
[   21.139989]  __kasan_kmalloc+0xd4/0xd8
[   21.140150]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.140355]  kasan_atomics+0xb8/0x2e0
[   21.140862]  kunit_try_run_case+0x170/0x3f0
[   21.141251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.141912]  kthread+0x328/0x630
[   21.142031]  ret_from_fork+0x10/0x20
[   21.142131] 
[   21.142444] The buggy address belongs to the object at fff00000c56d1100
[   21.142444]  which belongs to the cache kmalloc-64 of size 64
[   21.142699] The buggy address is located 0 bytes to the right of
[   21.142699]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.142877] 
[   21.142908] The buggy address belongs to the physical page:
[   21.142942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.143053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.143451] page_type: f5(slab)
[   21.143571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.143964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.144233] page dumped because: kasan: bad access detected
[   21.144653] 
[   21.144680] Memory state around the buggy address:
[   21.145048]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.145244]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.145489] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.145581]                                      ^
[   21.145619]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.145663]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.145702] ==================================================================
[   21.085214] ==================================================================
[   21.085269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   21.085321] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.085622] 
[   21.085719] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.085806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.085835] Hardware name: linux,dummy-virt (DT)
[   21.086045] Call trace:
[   21.086317]  show_stack+0x20/0x38 (C)
[   21.086600]  dump_stack_lvl+0x8c/0xd0
[   21.086704]  print_report+0x118/0x608
[   21.086892]  kasan_report+0xdc/0x128
[   21.086954]  kasan_check_range+0x100/0x1a8
[   21.087373]  __kasan_check_write+0x20/0x30
[   21.087625]  kasan_atomics_helper+0x1190/0x4858
[   21.087842]  kasan_atomics+0x198/0x2e0
[   21.087933]  kunit_try_run_case+0x170/0x3f0
[   21.088099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.088179]  kthread+0x328/0x630
[   21.088424]  ret_from_fork+0x10/0x20
[   21.088849] 
[   21.089035] Allocated by task 265:
[   21.089189]  kasan_save_stack+0x3c/0x68
[   21.089348]  kasan_save_track+0x20/0x40
[   21.089421]  kasan_save_alloc_info+0x40/0x58
[   21.089508]  __kasan_kmalloc+0xd4/0xd8
[   21.089929]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.090232]  kasan_atomics+0xb8/0x2e0
[   21.090594]  kunit_try_run_case+0x170/0x3f0
[   21.090878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.091138]  kthread+0x328/0x630
[   21.091253]  ret_from_fork+0x10/0x20
[   21.091575] 
[   21.091663] The buggy address belongs to the object at fff00000c56d1100
[   21.091663]  which belongs to the cache kmalloc-64 of size 64
[   21.092215] The buggy address is located 0 bytes to the right of
[   21.092215]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.092330] 
[   21.092374] The buggy address belongs to the physical page:
[   21.092814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.092898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.093208] page_type: f5(slab)
[   21.093491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.093581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.093884] page dumped because: kasan: bad access detected
[   21.094106] 
[   21.094395] Memory state around the buggy address:
[   21.094442]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.094846]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.095047] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.095125]                                      ^
[   21.095296]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.095541]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.095597] ==================================================================
[   20.871017] ==================================================================
[   20.871186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.871682] Call trace:
[   20.872573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.873333]  __kasan_kmalloc+0xd4/0xd8
[   20.874449] The buggy address is located 0 bytes to the right of
[   20.874449]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.875272]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.876982] Call trace:
[   20.878629] 
[   20.878678] Allocated by task 265:
[   20.878708]  kasan_save_stack+0x3c/0x68
[   20.878752]  kasan_save_track+0x20/0x40
[   20.878793]  kasan_save_alloc_info+0x40/0x58
[   20.879041]  __kasan_kmalloc+0xd4/0xd8
[   20.879091]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.879665]  kasan_atomics+0xb8/0x2e0
[   20.879809]  kunit_try_run_case+0x170/0x3f0
[   20.879925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.880025]  kthread+0x328/0x630
[   20.880061]  ret_from_fork+0x10/0x20
[   20.880144] 
[   20.880409] The buggy address belongs to the object at fff00000c56d1100
[   20.880409]  which belongs to the cache kmalloc-64 of size 64
[   20.880488] The buggy address is located 0 bytes to the right of
[   20.880488]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.880670] 
[   20.880868] The buggy address belongs to the physical page:
[   20.880954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   20.881059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.881182] page_type: f5(slab)
[   20.881291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.881418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.881569] page dumped because: kasan: bad access detected
[   20.881785] 
[   20.881867] Memory state around the buggy address:
[   20.881921]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.881983]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.882028] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.882384]                                      ^
[   20.882448]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.882494]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.882533] ==================================================================
[   21.176920] ==================================================================
[   21.176968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   21.177017] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.177067] 
[   21.177124] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.177219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.177248] Hardware name: linux,dummy-virt (DT)
[   21.177279] Call trace:
[   21.177304]  show_stack+0x20/0x38 (C)
[   21.177351]  dump_stack_lvl+0x8c/0xd0
[   21.177400]  print_report+0x118/0x608
[   21.177594]  kasan_report+0xdc/0x128
[   21.177872]  kasan_check_range+0x100/0x1a8
[   21.177990]  __kasan_check_write+0x20/0x30
[   21.178039]  kasan_atomics_helper+0x16d0/0x4858
[   21.178113]  kasan_atomics+0x198/0x2e0
[   21.178159]  kunit_try_run_case+0x170/0x3f0
[   21.178219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.178422]  kthread+0x328/0x630
[   21.178563]  ret_from_fork+0x10/0x20
[   21.178720] 
[   21.179019] Allocated by task 265:
[   21.179148]  kasan_save_stack+0x3c/0x68
[   21.179256]  kasan_save_track+0x20/0x40
[   21.179320]  kasan_save_alloc_info+0x40/0x58
[   21.179403]  __kasan_kmalloc+0xd4/0xd8
[   21.179501]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.179615]  kasan_atomics+0xb8/0x2e0
[   21.179693]  kunit_try_run_case+0x170/0x3f0
[   21.179788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.179835]  kthread+0x328/0x630
[   21.179918]  ret_from_fork+0x10/0x20
[   21.180495] 
[   21.180616] The buggy address belongs to the object at fff00000c56d1100
[   21.180616]  which belongs to the cache kmalloc-64 of size 64
[   21.180805] The buggy address is located 0 bytes to the right of
[   21.180805]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.180900] 
[   21.180960] The buggy address belongs to the physical page:
[   21.180994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.181210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.181410] page_type: f5(slab)
[   21.181573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.181920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.182044] page dumped because: kasan: bad access detected
[   21.182307] 
[   21.182332] Memory state around the buggy address:
[   21.182376]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.182422]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.182471] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.182634]                                      ^
[   21.182734]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183051]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183267] ==================================================================
[   21.183628] ==================================================================
[   21.183700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   21.183764] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.183826] 
[   21.183856] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.183948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.183989] Hardware name: linux,dummy-virt (DT)
[   21.184027] Call trace:
[   21.184099]  show_stack+0x20/0x38 (C)
[   21.184175]  dump_stack_lvl+0x8c/0xd0
[   21.184236]  print_report+0x118/0x608
[   21.184283]  kasan_report+0xdc/0x128
[   21.184331]  __asan_report_load8_noabort+0x20/0x30
[   21.184380]  kasan_atomics_helper+0x3e10/0x4858
[   21.184428]  kasan_atomics+0x198/0x2e0
[   21.184476]  kunit_try_run_case+0x170/0x3f0
[   21.184523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.184577]  kthread+0x328/0x630
[   21.184626]  ret_from_fork+0x10/0x20
[   21.184683] 
[   21.184704] Allocated by task 265:
[   21.184734]  kasan_save_stack+0x3c/0x68
[   21.184784]  kasan_save_track+0x20/0x40
[   21.184825]  kasan_save_alloc_info+0x40/0x58
[   21.184867]  __kasan_kmalloc+0xd4/0xd8
[   21.184905]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.184946]  kasan_atomics+0xb8/0x2e0
[   21.184990]  kunit_try_run_case+0x170/0x3f0
[   21.185038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185082]  kthread+0x328/0x630
[   21.185126]  ret_from_fork+0x10/0x20
[   21.185162] 
[   21.185182] The buggy address belongs to the object at fff00000c56d1100
[   21.185182]  which belongs to the cache kmalloc-64 of size 64
[   21.185734] The buggy address is located 0 bytes to the right of
[   21.185734]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.185827] 
[   21.185848] The buggy address belongs to the physical page:
[   21.186292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.186364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.186414] page_type: f5(slab)
[   21.186595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.186648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.186692] page dumped because: kasan: bad access detected
[   21.186847] 
[   21.186876] Memory state around the buggy address:
[   21.186931]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.187000]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.187051] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.187122]                                      ^
[   21.187204]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.187252]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.187426] ==================================================================
[   21.000134] ==================================================================
[   21.000545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.000942] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.001041] 
[   21.001076] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.001517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.001594] Hardware name: linux,dummy-virt (DT)
[   21.001888] Call trace:
[   21.001965]  show_stack+0x20/0x38 (C)
[   21.002159]  dump_stack_lvl+0x8c/0xd0
[   21.002434]  print_report+0x118/0x608
[   21.002560]  kasan_report+0xdc/0x128
[   21.002815]  kasan_check_range+0x100/0x1a8
[   21.003097]  __kasan_check_write+0x20/0x30
[   21.003303]  kasan_atomics_helper+0xe44/0x4858
[   21.003389]  kasan_atomics+0x198/0x2e0
[   21.003447]  kunit_try_run_case+0x170/0x3f0
[   21.003494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.004061]  kthread+0x328/0x630
[   21.004173]  ret_from_fork+0x10/0x20
[   21.004753] 
[   21.004781] Allocated by task 265:
[   21.004830]  kasan_save_stack+0x3c/0x68
[   21.005066]  kasan_save_track+0x20/0x40
[   21.005142]  kasan_save_alloc_info+0x40/0x58
[   21.005447]  __kasan_kmalloc+0xd4/0xd8
[   21.005737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.005998]  kasan_atomics+0xb8/0x2e0
[   21.006053]  kunit_try_run_case+0x170/0x3f0
[   21.006457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.006722]  kthread+0x328/0x630
[   21.006881]  ret_from_fork+0x10/0x20
[   21.006926] 
[   21.007366] The buggy address belongs to the object at fff00000c56d1100
[   21.007366]  which belongs to the cache kmalloc-64 of size 64
[   21.007723] The buggy address is located 0 bytes to the right of
[   21.007723]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.007797] 
[   21.007819] The buggy address belongs to the physical page:
[   21.008166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.008415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.008686] page_type: f5(slab)
[   21.008821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.008876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.009105] page dumped because: kasan: bad access detected
[   21.009453] 
[   21.009627] Memory state around the buggy address:
[   21.009756]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.009915]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.009964] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.010220]                                      ^
[   21.010467]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.010946]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.011257] ==================================================================
[   20.951317] ==================================================================
[   20.951371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.951553] Read of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265
[   20.951715] 
[   20.951861] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.952344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.952528] Hardware name: linux,dummy-virt (DT)
[   20.952571] Call trace:
[   20.952630]  show_stack+0x20/0x38 (C)
[   20.952811]  dump_stack_lvl+0x8c/0xd0
[   20.952930]  print_report+0x118/0x608
[   20.952984]  kasan_report+0xdc/0x128
[   20.953091]  __asan_report_load4_noabort+0x20/0x30
[   20.953143]  kasan_atomics_helper+0x3dd8/0x4858
[   20.953251]  kasan_atomics+0x198/0x2e0
[   20.953304]  kunit_try_run_case+0x170/0x3f0
[   20.953503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.953978]  kthread+0x328/0x630
[   20.954270]  ret_from_fork+0x10/0x20
[   20.954453] 
[   20.954544] Allocated by task 265:
[   20.954969]  kasan_save_stack+0x3c/0x68
[   20.955103]  kasan_save_track+0x20/0x40
[   20.955213]  kasan_save_alloc_info+0x40/0x58
[   20.955623]  __kasan_kmalloc+0xd4/0xd8
[   20.955803]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.955933]  kasan_atomics+0xb8/0x2e0
[   20.956102]  kunit_try_run_case+0x170/0x3f0
[   20.956350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.956445]  kthread+0x328/0x630
[   20.956485]  ret_from_fork+0x10/0x20
[   20.956683] 
[   20.956771] The buggy address belongs to the object at fff00000c56d1100
[   20.956771]  which belongs to the cache kmalloc-64 of size 64
[   20.957132] The buggy address is located 0 bytes to the right of
[   20.957132]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.957389] 
[   20.957446] The buggy address belongs to the physical page:
[   20.957646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   20.957925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.958160] page_type: f5(slab)
[   20.958431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.958693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.958863] page dumped because: kasan: bad access detected
[   20.959356] 
[   20.959435] Memory state around the buggy address:
[   20.959481]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.959537]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.959830] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.960285]                                      ^
[   20.960539]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.960769]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.960858] ==================================================================
[   21.097077] ==================================================================
[   21.097213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   21.097439] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.097877] 
[   21.098135] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.098449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.098519] Hardware name: linux,dummy-virt (DT)
[   21.098553] Call trace:
[   21.098584]  show_stack+0x20/0x38 (C)
[   21.098639]  dump_stack_lvl+0x8c/0xd0
[   21.098686]  print_report+0x118/0x608
[   21.099072]  kasan_report+0xdc/0x128
[   21.099345]  kasan_check_range+0x100/0x1a8
[   21.099530]  __kasan_check_write+0x20/0x30
[   21.099777]  kasan_atomics_helper+0x11f8/0x4858
[   21.100051]  kasan_atomics+0x198/0x2e0
[   21.100345]  kunit_try_run_case+0x170/0x3f0
[   21.100552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.100803]  kthread+0x328/0x630
[   21.100874]  ret_from_fork+0x10/0x20
[   21.100923] 
[   21.100993] Allocated by task 265:
[   21.101227]  kasan_save_stack+0x3c/0x68
[   21.101703]  kasan_save_track+0x20/0x40
[   21.101769]  kasan_save_alloc_info+0x40/0x58
[   21.101814]  __kasan_kmalloc+0xd4/0xd8
[   21.101852]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.101894]  kasan_atomics+0xb8/0x2e0
[   21.101931]  kunit_try_run_case+0x170/0x3f0
[   21.101972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.102016]  kthread+0x328/0x630
[   21.102050]  ret_from_fork+0x10/0x20
[   21.102088] 
[   21.102111] The buggy address belongs to the object at fff00000c56d1100
[   21.102111]  which belongs to the cache kmalloc-64 of size 64
[   21.102172] The buggy address is located 0 bytes to the right of
[   21.102172]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.102249] 
[   21.102271] The buggy address belongs to the physical page:
[   21.102304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.102357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.102408] page_type: f5(slab)
[   21.102451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.102503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.102546] page dumped because: kasan: bad access detected
[   21.102580] 
[   21.102600] Memory state around the buggy address:
[   21.102635]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.102679]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.102724] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.102764]                                      ^
[   21.102800]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.102841]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.102881] ==================================================================
[   21.058586] ==================================================================
[   21.058647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.058700] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.058849] 
[   21.058983] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.059168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.059497] Hardware name: linux,dummy-virt (DT)
[   21.059681] Call trace:
[   21.059887]  show_stack+0x20/0x38 (C)
[   21.060159]  dump_stack_lvl+0x8c/0xd0
[   21.060248]  print_report+0x118/0x608
[   21.060671]  kasan_report+0xdc/0x128
[   21.060914]  kasan_check_range+0x100/0x1a8
[   21.060988]  __kasan_check_write+0x20/0x30
[   21.061375]  kasan_atomics_helper+0x1058/0x4858
[   21.061637]  kasan_atomics+0x198/0x2e0
[   21.061740]  kunit_try_run_case+0x170/0x3f0
[   21.061919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.062156]  kthread+0x328/0x630
[   21.062237]  ret_from_fork+0x10/0x20
[   21.062607] 
[   21.062653] Allocated by task 265:
[   21.062758]  kasan_save_stack+0x3c/0x68
[   21.062821]  kasan_save_track+0x20/0x40
[   21.062862]  kasan_save_alloc_info+0x40/0x58
[   21.062910]  __kasan_kmalloc+0xd4/0xd8
[   21.062956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.062998]  kasan_atomics+0xb8/0x2e0
[   21.063042]  kunit_try_run_case+0x170/0x3f0
[   21.063082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.063134]  kthread+0x328/0x630
[   21.063170]  ret_from_fork+0x10/0x20
[   21.063227] 
[   21.063249] The buggy address belongs to the object at fff00000c56d1100
[   21.063249]  which belongs to the cache kmalloc-64 of size 64
[   21.063324] The buggy address is located 0 bytes to the right of
[   21.063324]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.063400] 
[   21.063423] The buggy address belongs to the physical page:
[   21.063471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.063534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.063584] page_type: f5(slab)
[   21.063633] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.063708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.063751] page dumped because: kasan: bad access detected
[   21.063785] 
[   21.063814] Memory state around the buggy address:
[   21.063853]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.063921]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.063967] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.064007]                                      ^
[   21.064050]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.064104]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.064142] ==================================================================
[   21.114840] ==================================================================
[   21.114892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   21.114942] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.114993] 
[   21.115064] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.115148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.115175] Hardware name: linux,dummy-virt (DT)
[   21.115506] Call trace:
[   21.115547]  show_stack+0x20/0x38 (C)
[   21.115603]  dump_stack_lvl+0x8c/0xd0
[   21.115650]  print_report+0x118/0x608
[   21.115699]  kasan_report+0xdc/0x128
[   21.115745]  kasan_check_range+0x100/0x1a8
[   21.115795]  __kasan_check_write+0x20/0x30
[   21.115841]  kasan_atomics_helper+0x1384/0x4858
[   21.115889]  kasan_atomics+0x198/0x2e0
[   21.115936]  kunit_try_run_case+0x170/0x3f0
[   21.116020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.116100]  kthread+0x328/0x630
[   21.116145]  ret_from_fork+0x10/0x20
[   21.116617] 
[   21.116655] Allocated by task 265:
[   21.116688]  kasan_save_stack+0x3c/0x68
[   21.116733]  kasan_save_track+0x20/0x40
[   21.117361]  kasan_save_alloc_info+0x40/0x58
[   21.117431]  __kasan_kmalloc+0xd4/0xd8
[   21.117627]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.117808]  kasan_atomics+0xb8/0x2e0
[   21.117905]  kunit_try_run_case+0x170/0x3f0
[   21.118416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.118514]  kthread+0x328/0x630
[   21.118672]  ret_from_fork+0x10/0x20
[   21.118874] 
[   21.118932] The buggy address belongs to the object at fff00000c56d1100
[   21.118932]  which belongs to the cache kmalloc-64 of size 64
[   21.119001] The buggy address is located 0 bytes to the right of
[   21.119001]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.119273] 
[   21.119424] The buggy address belongs to the physical page:
[   21.119757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.119819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.120147] page_type: f5(slab)
[   21.120542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.122260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.122313] page dumped because: kasan: bad access detected
[   21.122349] 
[   21.122369] Memory state around the buggy address:
[   21.122404]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.122456]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.122501] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.122542]                                      ^
[   21.122577]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.122621]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.122659] ==================================================================
[   20.982783] ==================================================================
[   20.982929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.983128] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   20.983208] 
[   20.983560] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.983679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.983713] Hardware name: linux,dummy-virt (DT)
[   20.983746] Call trace:
[   20.983770]  show_stack+0x20/0x38 (C)
[   20.983969]  dump_stack_lvl+0x8c/0xd0
[   20.984032]  print_report+0x118/0x608
[   20.984082]  kasan_report+0xdc/0x128
[   20.984487]  kasan_check_range+0x100/0x1a8
[   20.984630]  __kasan_check_read+0x20/0x30
[   20.984764]  kasan_atomics_helper+0xdd4/0x4858
[   20.984868]  kasan_atomics+0x198/0x2e0
[   20.984922]  kunit_try_run_case+0x170/0x3f0
[   20.984972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.985026]  kthread+0x328/0x630
[   20.985069]  ret_from_fork+0x10/0x20
[   20.985343] 
[   20.985918] Allocated by task 265:
[   20.985970]  kasan_save_stack+0x3c/0x68
[   20.986266]  kasan_save_track+0x20/0x40
[   20.986326]  kasan_save_alloc_info+0x40/0x58
[   20.986368]  __kasan_kmalloc+0xd4/0xd8
[   20.986408]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.986613]  kasan_atomics+0xb8/0x2e0
[   20.986841]  kunit_try_run_case+0x170/0x3f0
[   20.987624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.987775]  kthread+0x328/0x630
[   20.988707]  ret_from_fork+0x10/0x20
[   20.989008] 
[   20.989170] The buggy address belongs to the object at fff00000c56d1100
[   20.989170]  which belongs to the cache kmalloc-64 of size 64
[   20.989414] The buggy address is located 0 bytes to the right of
[   20.989414]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.989862] 
[   20.990040] The buggy address belongs to the physical page:
[   20.990149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   20.990367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.990733] page_type: f5(slab)
[   20.990825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.991011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.991094] page dumped because: kasan: bad access detected
[   20.991139] 
[   20.991168] Memory state around the buggy address:
[   20.991227]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.991279]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.991323] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.991361]                                      ^
[   20.991398]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.991442]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.991482] ==================================================================
[   20.887880] ==================================================================
[   20.887970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.888130] Write of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265
[   20.888242] 
[   20.888300] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.888411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.888517] Hardware name: linux,dummy-virt (DT)
[   20.888553] Call trace:
[   20.888613]  show_stack+0x20/0x38 (C)
[   20.888938]  kasan_report+0xdc/0x128
[   20.889286]  kasan_atomics_helper+0xad4/0x4858
[   20.890489]  kasan_save_alloc_info+0x40/0x58
[   20.890624]  __kasan_kmalloc+0xd4/0xd8
[   20.890785]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.890850]  kasan_atomics+0xb8/0x2e0
[   20.890887]  kunit_try_run_case+0x170/0x3f0
[   20.891098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.891349]  kthread+0x328/0x630
[   20.891515]  ret_from_fork+0x10/0x20
[   20.891555] 
[   20.891687] The buggy address belongs to the object at fff00000c56d1100
[   20.891687]  which belongs to the cache kmalloc-64 of size 64
[   20.891894] The buggy address is located 0 bytes to the right of
[   20.891894]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.892238] 
[   20.892281] The buggy address belongs to the physical page:
[   20.892331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   20.892388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.892439] page_type: f5(slab)
[   20.892488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.892542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.892814] page dumped because: kasan: bad access detected
[   20.893085] 
[   20.893126] Memory state around the buggy address:
[   20.893185]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.893500]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.893824] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.893871]                                      ^
[   20.894164]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.894347]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.896561] Read of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265
[   20.897057]  kasan_atomics_helper+0x3dcc/0x4858
[   20.898626]  kasan_save_alloc_info+0x40/0x58
[   20.898711]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.899007]  kasan_atomics+0xb8/0x2e0
[   20.899791] 
[   20.900508] 
[   20.901039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.901516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.901704] 
[   20.902054]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.902553]                                      ^
[   20.902912]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.904879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.907113]  kasan_save_alloc_info+0x40/0x58
[   20.907388]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.907470]  kasan_atomics+0xb8/0x2e0
[   20.907674]  kunit_try_run_case+0x170/0x3f0
[   20.907913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.908728] 
[   20.909162] 
[   20.909425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   20.910257] page dumped because: kasan: bad access detected
[   20.910676]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.911031]                                      ^
[   20.911554] ==================================================================
[   20.752721] ==================================================================
[   20.754706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   20.754864] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.755030] Call trace:
[   20.755423]  kasan_atomics+0x198/0x2e0
[   20.755723]  kasan_save_stack+0x3c/0x68
[   20.755888]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.757017] 
[   20.765721]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.766826] page dumped because: kasan: bad access detected
[   20.767906] Call trace:
[   20.768857]  kasan_save_stack+0x3c/0x68
[   20.769893] The buggy address is located 0 bytes to the right of
[   20.769893]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.771019]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.772574] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.776395]  kasan_atomics+0xb8/0x2e0
[   20.777803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   20.778455]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.780148]  kasan_atomics_helper+0x54c/0x4858
[   20.782047] The buggy address is located 0 bytes to the right of
[   20.782047]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.783785]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.785441] ==================================================================
[   20.973047] ==================================================================
[   20.973172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.973239] Read of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265
[   20.973291] 
[   20.973334] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.973426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.973459] Hardware name: linux,dummy-virt (DT)
[   20.973584] Call trace:
[   20.973786]  show_stack+0x20/0x38 (C)
[   20.974100]  dump_stack_lvl+0x8c/0xd0
[   20.974258]  print_report+0x118/0x608
[   20.974359]  kasan_report+0xdc/0x128
[   20.974416]  __asan_report_load4_noabort+0x20/0x30
[   20.974472]  kasan_atomics_helper+0x3e04/0x4858
[   20.974523]  kasan_atomics+0x198/0x2e0
[   20.975157]  kunit_try_run_case+0x170/0x3f0
[   20.975341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.975521]  kthread+0x328/0x630
[   20.975637]  ret_from_fork+0x10/0x20
[   20.976217] 
[   20.976723] Allocated by task 265:
[   20.977123]  kasan_save_stack+0x3c/0x68
[   20.977219]  kasan_save_track+0x20/0x40
[   20.977397]  kasan_save_alloc_info+0x40/0x58
[   20.977538]  __kasan_kmalloc+0xd4/0xd8
[   20.977580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.977743]  kasan_atomics+0xb8/0x2e0
[   20.978026]  kunit_try_run_case+0x170/0x3f0
[   20.978103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.978339]  kthread+0x328/0x630
[   20.978531]  ret_from_fork+0x10/0x20
[   20.978612] 
[   20.978673] The buggy address belongs to the object at fff00000c56d1100
[   20.978673]  which belongs to the cache kmalloc-64 of size 64
[   20.978982] The buggy address is located 0 bytes to the right of
[   20.978982]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.979323] 
[   20.979395] The buggy address belongs to the physical page:
[   20.979523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   20.979596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.979650] page_type: f5(slab)
[   20.979692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.979744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.979812] page dumped because: kasan: bad access detected
[   20.979855] 
[   20.979884] Memory state around the buggy address:
[   20.979942]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.979989]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.980039] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.980079]                                      ^
[   20.980122]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.980167]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.980218] ==================================================================
[   20.883133] ==================================================================
[   20.883266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.883318] Write of size 4 at addr fff00000c56d1130 by task kunit_try_catch/265
[   20.883370] 
[   20.883402] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.883484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.883623] Hardware name: linux,dummy-virt (DT)
[   20.883738] Call trace:
[   20.883786]  show_stack+0x20/0x38 (C)
[   20.883841]  dump_stack_lvl+0x8c/0xd0
[   20.883889]  print_report+0x118/0x608
[   20.884026]  kasan_report+0xdc/0x128
[   20.884230]  kasan_check_range+0x100/0x1a8
[   20.884292]  __kasan_check_write+0x20/0x30
[   20.884370]  kasan_atomics_helper+0xa6c/0x4858
[   20.884422]  kasan_atomics+0x198/0x2e0
[   20.884469]  kunit_try_run_case+0x170/0x3f0
[   20.884528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.884583]  kthread+0x328/0x630
[   20.884627]  ret_from_fork+0x10/0x20
[   20.884684] 
[   20.884705] Allocated by task 265:
[   20.884735]  kasan_save_stack+0x3c/0x68
[   20.884779]  kasan_save_track+0x20/0x40
[   20.884819]  kasan_save_alloc_info+0x40/0x58
[   20.884860]  __kasan_kmalloc+0xd4/0xd8
[   20.884913]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.884956]  kasan_atomics+0xb8/0x2e0
[   20.884994]  kunit_try_run_case+0x170/0x3f0
[   20.885034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.885096]  kthread+0x328/0x630
[   20.885131]  ret_from_fork+0x10/0x20
[   20.885169] 
[   20.885202] The buggy address belongs to the object at fff00000c56d1100
[   20.885202]  which belongs to the cache kmalloc-64 of size 64
[   20.885554] The buggy address is located 0 bytes to the right of
[   20.885554]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   20.885885] 
[   20.885913] The buggy address belongs to the physical page:
[   20.886014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   20.886095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.886243] page_type: f5(slab)
[   20.886282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.886372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.886486] page dumped because: kasan: bad access detected
[   20.886520] 
[   20.886580] Memory state around the buggy address:
[   20.886696]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.886913]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.886959] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.887029]                                      ^
[   20.887264]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.887463]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.887592] ==================================================================
[   21.159782] ==================================================================
[   21.159850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   21.159900] Read of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.159960] 
[   21.159999] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.160078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.160106] Hardware name: linux,dummy-virt (DT)
[   21.160138] Call trace:
[   21.160177]  show_stack+0x20/0x38 (C)
[   21.160453]  dump_stack_lvl+0x8c/0xd0
[   21.160528]  print_report+0x118/0x608
[   21.160761]  kasan_report+0xdc/0x128
[   21.160823]  __asan_report_load8_noabort+0x20/0x30
[   21.160902]  kasan_atomics_helper+0x3db0/0x4858
[   21.160953]  kasan_atomics+0x198/0x2e0
[   21.161000]  kunit_try_run_case+0x170/0x3f0
[   21.161049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.161103]  kthread+0x328/0x630
[   21.161147]  ret_from_fork+0x10/0x20
[   21.161357] 
[   21.161430] Allocated by task 265:
[   21.161488]  kasan_save_stack+0x3c/0x68
[   21.161553]  kasan_save_track+0x20/0x40
[   21.161821]  kasan_save_alloc_info+0x40/0x58
[   21.161943]  __kasan_kmalloc+0xd4/0xd8
[   21.162003]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.162068]  kasan_atomics+0xb8/0x2e0
[   21.162174]  kunit_try_run_case+0x170/0x3f0
[   21.162267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.162356]  kthread+0x328/0x630
[   21.162421]  ret_from_fork+0x10/0x20
[   21.162607] 
[   21.162706] The buggy address belongs to the object at fff00000c56d1100
[   21.162706]  which belongs to the cache kmalloc-64 of size 64
[   21.162768] The buggy address is located 0 bytes to the right of
[   21.162768]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.162834] 
[   21.162855] The buggy address belongs to the physical page:
[   21.163030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.163178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.163293] page_type: f5(slab)
[   21.163388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.163476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.163682] page dumped because: kasan: bad access detected
[   21.163827] 
[   21.163851] Memory state around the buggy address:
[   21.163981]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.164063]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.164128] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.164180]                                      ^
[   21.164228]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.164271]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.164591] ==================================================================
[   21.103081] ==================================================================
[   21.103128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   21.103172] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.103323] 
[   21.103361] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.103492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.103560] Hardware name: linux,dummy-virt (DT)
[   21.103626] Call trace:
[   21.103650]  show_stack+0x20/0x38 (C)
[   21.103717]  dump_stack_lvl+0x8c/0xd0
[   21.103787]  print_report+0x118/0x608
[   21.103836]  kasan_report+0xdc/0x128
[   21.103882]  kasan_check_range+0x100/0x1a8
[   21.103949]  __kasan_check_write+0x20/0x30
[   21.103996]  kasan_atomics_helper+0x126c/0x4858
[   21.104045]  kasan_atomics+0x198/0x2e0
[   21.104278]  kunit_try_run_case+0x170/0x3f0
[   21.104328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.104521]  kthread+0x328/0x630
[   21.104626]  ret_from_fork+0x10/0x20
[   21.104692] 
[   21.104741] Allocated by task 265:
[   21.104773]  kasan_save_stack+0x3c/0x68
[   21.104852]  kasan_save_track+0x20/0x40
[   21.105020]  kasan_save_alloc_info+0x40/0x58
[   21.105106]  __kasan_kmalloc+0xd4/0xd8
[   21.105226]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.105271]  kasan_atomics+0xb8/0x2e0
[   21.105308]  kunit_try_run_case+0x170/0x3f0
[   21.105387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.105488]  kthread+0x328/0x630
[   21.105612]  ret_from_fork+0x10/0x20
[   21.105699] 
[   21.105721] The buggy address belongs to the object at fff00000c56d1100
[   21.105721]  which belongs to the cache kmalloc-64 of size 64
[   21.105780] The buggy address is located 0 bytes to the right of
[   21.105780]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.105845] 
[   21.105866] The buggy address belongs to the physical page:
[   21.106157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.106316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.106418] page_type: f5(slab)
[   21.106461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.106515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.106558] page dumped because: kasan: bad access detected
[   21.106602] 
[   21.106633] Memory state around the buggy address:
[   21.106668]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.106713]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.106764] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.106804]                                      ^
[   21.106840]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.106882]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.106922] ==================================================================
[   21.107326] ==================================================================
[   21.107546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   21.107654] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.107707] 
[   21.107736] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.107816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.107843] Hardware name: linux,dummy-virt (DT)
[   21.107876] Call trace:
[   21.107899]  show_stack+0x20/0x38 (C)
[   21.108102]  dump_stack_lvl+0x8c/0xd0
[   21.108163]  print_report+0x118/0x608
[   21.108225]  kasan_report+0xdc/0x128
[   21.108271]  kasan_check_range+0x100/0x1a8
[   21.108321]  __kasan_check_write+0x20/0x30
[   21.108545]  kasan_atomics_helper+0x12d8/0x4858
[   21.108763]  kasan_atomics+0x198/0x2e0
[   21.108894]  kunit_try_run_case+0x170/0x3f0
[   21.109009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.109091]  kthread+0x328/0x630
[   21.109219]  ret_from_fork+0x10/0x20
[   21.109283] 
[   21.109304] Allocated by task 265:
[   21.109334]  kasan_save_stack+0x3c/0x68
[   21.109444]  kasan_save_track+0x20/0x40
[   21.109608]  kasan_save_alloc_info+0x40/0x58
[   21.109898]  __kasan_kmalloc+0xd4/0xd8
[   21.110180]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.110343]  kasan_atomics+0xb8/0x2e0
[   21.110522]  kunit_try_run_case+0x170/0x3f0
[   21.110634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.110784]  kthread+0x328/0x630
[   21.110865]  ret_from_fork+0x10/0x20
[   21.110972] 
[   21.111110] The buggy address belongs to the object at fff00000c56d1100
[   21.111110]  which belongs to the cache kmalloc-64 of size 64
[   21.111172] The buggy address is located 0 bytes to the right of
[   21.111172]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.111247] 
[   21.111268] The buggy address belongs to the physical page:
[   21.111607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.111717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.111881] page_type: f5(slab)
[   21.112027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.112266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.112411] page dumped because: kasan: bad access detected
[   21.112551] 
[   21.112572] Memory state around the buggy address:
[   21.112864]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.113097]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.113280] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.113649]                                      ^
[   21.113693]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.113737]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.113777] ==================================================================
[   21.187761] ==================================================================
[   21.187937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   21.187999] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.188048] 
[   21.188143] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.188245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.188471] Hardware name: linux,dummy-virt (DT)
[   21.188514] Call trace:
[   21.188537]  show_stack+0x20/0x38 (C)
[   21.188590]  dump_stack_lvl+0x8c/0xd0
[   21.188785]  print_report+0x118/0x608
[   21.188859]  kasan_report+0xdc/0x128
[   21.188921]  kasan_check_range+0x100/0x1a8
[   21.188973]  __kasan_check_write+0x20/0x30
[   21.189094]  kasan_atomics_helper+0x175c/0x4858
[   21.189208]  kasan_atomics+0x198/0x2e0
[   21.189369]  kunit_try_run_case+0x170/0x3f0
[   21.189427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.189548]  kthread+0x328/0x630
[   21.189606]  ret_from_fork+0x10/0x20
[   21.189764] 
[   21.189825] Allocated by task 265:
[   21.189855]  kasan_save_stack+0x3c/0x68
[   21.190015]  kasan_save_track+0x20/0x40
[   21.190058]  kasan_save_alloc_info+0x40/0x58
[   21.190309]  __kasan_kmalloc+0xd4/0xd8
[   21.190435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.190547]  kasan_atomics+0xb8/0x2e0
[   21.190851]  kunit_try_run_case+0x170/0x3f0
[   21.191030]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.191141]  kthread+0x328/0x630
[   21.191257]  ret_from_fork+0x10/0x20
[   21.191354] 
[   21.191504] The buggy address belongs to the object at fff00000c56d1100
[   21.191504]  which belongs to the cache kmalloc-64 of size 64
[   21.191594] The buggy address is located 0 bytes to the right of
[   21.191594]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.191660] 
[   21.191681] The buggy address belongs to the physical page:
[   21.191728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.191780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.191961] page_type: f5(slab)
[   21.192012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.192553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.192838] page dumped because: kasan: bad access detected
[   21.192935] 
[   21.192956] Memory state around the buggy address:
[   21.192993]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.193325]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.193431] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.193526]                                      ^
[   21.193562]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.193751]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.193869] ==================================================================
[   21.049032] ==================================================================
[   21.049104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.049283] Write of size 8 at addr fff00000c56d1130 by task kunit_try_catch/265
[   21.049383] 
[   21.049419] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.049747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.049855] Hardware name: linux,dummy-virt (DT)
[   21.049966] Call trace:
[   21.049990]  show_stack+0x20/0x38 (C)
[   21.050044]  dump_stack_lvl+0x8c/0xd0
[   21.050451]  print_report+0x118/0x608
[   21.050528]  kasan_report+0xdc/0x128
[   21.050728]  kasan_check_range+0x100/0x1a8
[   21.050933]  __kasan_check_write+0x20/0x30
[   21.051015]  kasan_atomics_helper+0xff0/0x4858
[   21.051067]  kasan_atomics+0x198/0x2e0
[   21.051288]  kunit_try_run_case+0x170/0x3f0
[   21.051618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.051884]  kthread+0x328/0x630
[   21.052165]  ret_from_fork+0x10/0x20
[   21.052284] 
[   21.052309] Allocated by task 265:
[   21.052395]  kasan_save_stack+0x3c/0x68
[   21.052795]  kasan_save_track+0x20/0x40
[   21.052967]  kasan_save_alloc_info+0x40/0x58
[   21.053083]  __kasan_kmalloc+0xd4/0xd8
[   21.053245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.053335]  kasan_atomics+0xb8/0x2e0
[   21.053376]  kunit_try_run_case+0x170/0x3f0
[   21.053437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.053845]  kthread+0x328/0x630
[   21.054005]  ret_from_fork+0x10/0x20
[   21.054167] 
[   21.054311] The buggy address belongs to the object at fff00000c56d1100
[   21.054311]  which belongs to the cache kmalloc-64 of size 64
[   21.054443] The buggy address is located 0 bytes to the right of
[   21.054443]  allocated 48-byte region [fff00000c56d1100, fff00000c56d1130)
[   21.054658] 
[   21.054847] The buggy address belongs to the physical page:
[   21.055211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056d1
[   21.055488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.055637] page_type: f5(slab)
[   21.055689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.055742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.055920] page dumped because: kasan: bad access detected
[   21.056174] 
[   21.056342] Memory state around the buggy address:
[   21.056575]  fff00000c56d1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.056654]  fff00000c56d1080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.056979] >fff00000c56d1100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.057037]                                      ^
[   21.057077]  fff00000c56d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.057122]  fff00000c56d1200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.057547] ==================================================================

[   14.309738] ==================================================================
[   14.310003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.310730] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.311083] 
[   14.311237] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.311322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.311337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.311371] Call Trace:
[   14.311389]  <TASK>
[   14.311406]  dump_stack_lvl+0x73/0xb0
[   14.311436]  print_report+0xd1/0x650
[   14.311460]  ? __virt_addr_valid+0x1db/0x2d0
[   14.311484]  ? kasan_atomics_helper+0x860/0x5450
[   14.311506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.311532]  ? kasan_atomics_helper+0x860/0x5450
[   14.311555]  kasan_report+0x141/0x180
[   14.311579]  ? kasan_atomics_helper+0x860/0x5450
[   14.311607]  kasan_check_range+0x10c/0x1c0
[   14.311632]  __kasan_check_write+0x18/0x20
[   14.311652]  kasan_atomics_helper+0x860/0x5450
[   14.311677]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.311701]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.311727]  ? kasan_save_alloc_info+0x3b/0x50
[   14.311752]  ? kasan_atomics+0x152/0x310
[   14.311782]  kasan_atomics+0x1dc/0x310
[   14.311807]  ? __pfx_kasan_atomics+0x10/0x10
[   14.311834]  ? __pfx_read_tsc+0x10/0x10
[   14.311856]  ? ktime_get_ts64+0x86/0x230
[   14.311882]  kunit_try_run_case+0x1a5/0x480
[   14.311907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.311931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.311967]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.311992]  ? __kthread_parkme+0x82/0x180
[   14.312013]  ? preempt_count_sub+0x50/0x80
[   14.312038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.312064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.312089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.312114]  kthread+0x337/0x6f0
[   14.312191]  ? trace_preempt_on+0x20/0xc0
[   14.312252]  ? __pfx_kthread+0x10/0x10
[   14.312276]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.312327]  ? calculate_sigpending+0x7b/0xa0
[   14.312365]  ? __pfx_kthread+0x10/0x10
[   14.312402]  ret_from_fork+0x116/0x1d0
[   14.312436]  ? __pfx_kthread+0x10/0x10
[   14.312480]  ret_from_fork_asm+0x1a/0x30
[   14.312529]  </TASK>
[   14.312564] 
[   14.322846] Allocated by task 282:
[   14.323316]  kasan_save_stack+0x45/0x70
[   14.323568]  kasan_save_track+0x18/0x40
[   14.323768]  kasan_save_alloc_info+0x3b/0x50
[   14.324003]  __kasan_kmalloc+0xb7/0xc0
[   14.324344]  __kmalloc_cache_noprof+0x189/0x420
[   14.324668]  kasan_atomics+0x95/0x310
[   14.324911]  kunit_try_run_case+0x1a5/0x480
[   14.325197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.325461]  kthread+0x337/0x6f0
[   14.325733]  ret_from_fork+0x116/0x1d0
[   14.325929]  ret_from_fork_asm+0x1a/0x30
[   14.326189] 
[   14.326311] The buggy address belongs to the object at ffff888103a18380
[   14.326311]  which belongs to the cache kmalloc-64 of size 64
[   14.326957] The buggy address is located 0 bytes to the right of
[   14.326957]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.327736] 
[   14.327839] The buggy address belongs to the physical page:
[   14.328105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.328466] flags: 0x200000000000000(node=0|zone=2)
[   14.328828] page_type: f5(slab)
[   14.328962] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.329197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.329635] page dumped because: kasan: bad access detected
[   14.329914] 
[   14.330030] Memory state around the buggy address:
[   14.330589]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.331104]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.331448] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.331817]                                      ^
[   14.331993]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.332647]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.333042] ==================================================================
[   15.001827] ==================================================================
[   15.002664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.003352] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.003996] 
[   15.004222] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.004269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.004283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.004307] Call Trace:
[   15.004324]  <TASK>
[   15.004340]  dump_stack_lvl+0x73/0xb0
[   15.004380]  print_report+0xd1/0x650
[   15.004404]  ? __virt_addr_valid+0x1db/0x2d0
[   15.004428]  ? kasan_atomics_helper+0x177f/0x5450
[   15.004461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.004486]  ? kasan_atomics_helper+0x177f/0x5450
[   15.004509]  kasan_report+0x141/0x180
[   15.004532]  ? kasan_atomics_helper+0x177f/0x5450
[   15.004560]  kasan_check_range+0x10c/0x1c0
[   15.004585]  __kasan_check_write+0x18/0x20
[   15.004606]  kasan_atomics_helper+0x177f/0x5450
[   15.004630]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.004654]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.004679]  ? kasan_save_alloc_info+0x3b/0x50
[   15.004704]  ? kasan_atomics+0x152/0x310
[   15.004732]  kasan_atomics+0x1dc/0x310
[   15.004757]  ? __pfx_kasan_atomics+0x10/0x10
[   15.004783]  ? __pfx_read_tsc+0x10/0x10
[   15.004805]  ? ktime_get_ts64+0x86/0x230
[   15.004831]  kunit_try_run_case+0x1a5/0x480
[   15.004857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.004880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.004905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.004930]  ? __kthread_parkme+0x82/0x180
[   15.004963]  ? preempt_count_sub+0x50/0x80
[   15.004989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.005014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.005038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.005069]  kthread+0x337/0x6f0
[   15.005090]  ? trace_preempt_on+0x20/0xc0
[   15.005114]  ? __pfx_kthread+0x10/0x10
[   15.005135]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.005158]  ? calculate_sigpending+0x7b/0xa0
[   15.005183]  ? __pfx_kthread+0x10/0x10
[   15.005206]  ret_from_fork+0x116/0x1d0
[   15.005226]  ? __pfx_kthread+0x10/0x10
[   15.005248]  ret_from_fork_asm+0x1a/0x30
[   15.005280]  </TASK>
[   15.005293] 
[   15.018144] Allocated by task 282:
[   15.018488]  kasan_save_stack+0x45/0x70
[   15.018861]  kasan_save_track+0x18/0x40
[   15.019254]  kasan_save_alloc_info+0x3b/0x50
[   15.019535]  __kasan_kmalloc+0xb7/0xc0
[   15.019673]  __kmalloc_cache_noprof+0x189/0x420
[   15.019832]  kasan_atomics+0x95/0x310
[   15.020001]  kunit_try_run_case+0x1a5/0x480
[   15.020378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.020758]  kthread+0x337/0x6f0
[   15.020882]  ret_from_fork+0x116/0x1d0
[   15.021028]  ret_from_fork_asm+0x1a/0x30
[   15.021433] 
[   15.021614] The buggy address belongs to the object at ffff888103a18380
[   15.021614]  which belongs to the cache kmalloc-64 of size 64
[   15.022720] The buggy address is located 0 bytes to the right of
[   15.022720]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.023694] 
[   15.023824] The buggy address belongs to the physical page:
[   15.024221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.024470] flags: 0x200000000000000(node=0|zone=2)
[   15.024636] page_type: f5(slab)
[   15.024759] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.025008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.025341] page dumped because: kasan: bad access detected
[   15.025556] 
[   15.025655] Memory state around the buggy address:
[   15.025903]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.026214]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.026535] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.026790]                                      ^
[   15.027269]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.027521]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.028168] ==================================================================
[   14.288585] ==================================================================
[   14.288953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.289617] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.289852] 
[   14.289952] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.289998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.290012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.290036] Call Trace:
[   14.290054]  <TASK>
[   14.290070]  dump_stack_lvl+0x73/0xb0
[   14.290099]  print_report+0xd1/0x650
[   14.290124]  ? __virt_addr_valid+0x1db/0x2d0
[   14.290148]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.290171]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.290195]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.290219]  kasan_report+0x141/0x180
[   14.290242]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.290270]  kasan_check_range+0x10c/0x1c0
[   14.290295]  __kasan_check_write+0x18/0x20
[   14.290316]  kasan_atomics_helper+0x7c7/0x5450
[   14.290340]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.290365]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.290391]  ? kasan_save_alloc_info+0x3b/0x50
[   14.290415]  ? kasan_atomics+0x152/0x310
[   14.290444]  kasan_atomics+0x1dc/0x310
[   14.290468]  ? __pfx_kasan_atomics+0x10/0x10
[   14.290494]  ? __pfx_read_tsc+0x10/0x10
[   14.290516]  ? ktime_get_ts64+0x86/0x230
[   14.290542]  kunit_try_run_case+0x1a5/0x480
[   14.290567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.290591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.290616]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.290642]  ? __kthread_parkme+0x82/0x180
[   14.290663]  ? preempt_count_sub+0x50/0x80
[   14.290688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.290713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.290736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.290761]  kthread+0x337/0x6f0
[   14.290783]  ? trace_preempt_on+0x20/0xc0
[   14.290806]  ? __pfx_kthread+0x10/0x10
[   14.290829]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.290851]  ? calculate_sigpending+0x7b/0xa0
[   14.290877]  ? __pfx_kthread+0x10/0x10
[   14.290900]  ret_from_fork+0x116/0x1d0
[   14.290920]  ? __pfx_kthread+0x10/0x10
[   14.290951]  ret_from_fork_asm+0x1a/0x30
[   14.290982]  </TASK>
[   14.290996] 
[   14.299708] Allocated by task 282:
[   14.299848]  kasan_save_stack+0x45/0x70
[   14.300006]  kasan_save_track+0x18/0x40
[   14.300140]  kasan_save_alloc_info+0x3b/0x50
[   14.300285]  __kasan_kmalloc+0xb7/0xc0
[   14.300418]  __kmalloc_cache_noprof+0x189/0x420
[   14.300570]  kasan_atomics+0x95/0x310
[   14.300703]  kunit_try_run_case+0x1a5/0x480
[   14.300847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.301383]  kthread+0x337/0x6f0
[   14.301832]  ret_from_fork+0x116/0x1d0
[   14.302056]  ret_from_fork_asm+0x1a/0x30
[   14.302254] 
[   14.302369] The buggy address belongs to the object at ffff888103a18380
[   14.302369]  which belongs to the cache kmalloc-64 of size 64
[   14.302749] The buggy address is located 0 bytes to the right of
[   14.302749]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.303327] 
[   14.303406] The buggy address belongs to the physical page:
[   14.303923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.304579] flags: 0x200000000000000(node=0|zone=2)
[   14.304872] page_type: f5(slab)
[   14.305010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.305713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.306063] page dumped because: kasan: bad access detected
[   14.306373] 
[   14.306576] Memory state around the buggy address:
[   14.306842]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.307291]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.307731] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.308130]                                      ^
[   14.308289]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.308520]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.308885] ==================================================================
[   14.224813] ==================================================================
[   14.225191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.225630] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.225989] 
[   14.226121] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.226178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.226204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.226228] Call Trace:
[   14.226246]  <TASK>
[   14.226264]  dump_stack_lvl+0x73/0xb0
[   14.226325]  print_report+0xd1/0x650
[   14.226351]  ? __virt_addr_valid+0x1db/0x2d0
[   14.226387]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.226410]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.226434]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.226517]  kasan_report+0x141/0x180
[   14.226545]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.226574]  kasan_check_range+0x10c/0x1c0
[   14.226620]  __kasan_check_write+0x18/0x20
[   14.226642]  kasan_atomics_helper+0x5fe/0x5450
[   14.226680]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.226717]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.226756]  ? kasan_save_alloc_info+0x3b/0x50
[   14.226781]  ? kasan_atomics+0x152/0x310
[   14.226824]  kasan_atomics+0x1dc/0x310
[   14.226861]  ? __pfx_kasan_atomics+0x10/0x10
[   14.226895]  ? __pfx_read_tsc+0x10/0x10
[   14.226918]  ? ktime_get_ts64+0x86/0x230
[   14.226962]  kunit_try_run_case+0x1a5/0x480
[   14.226987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.227010]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.227036]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.227059]  ? __kthread_parkme+0x82/0x180
[   14.227090]  ? preempt_count_sub+0x50/0x80
[   14.227122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.227147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.227170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.227195]  kthread+0x337/0x6f0
[   14.227217]  ? trace_preempt_on+0x20/0xc0
[   14.227241]  ? __pfx_kthread+0x10/0x10
[   14.227263]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.227285]  ? calculate_sigpending+0x7b/0xa0
[   14.227310]  ? __pfx_kthread+0x10/0x10
[   14.227332]  ret_from_fork+0x116/0x1d0
[   14.227353]  ? __pfx_kthread+0x10/0x10
[   14.227374]  ret_from_fork_asm+0x1a/0x30
[   14.227407]  </TASK>
[   14.227419] 
[   14.237989] Allocated by task 282:
[   14.238216]  kasan_save_stack+0x45/0x70
[   14.238422]  kasan_save_track+0x18/0x40
[   14.238761]  kasan_save_alloc_info+0x3b/0x50
[   14.239077]  __kasan_kmalloc+0xb7/0xc0
[   14.239257]  __kmalloc_cache_noprof+0x189/0x420
[   14.239508]  kasan_atomics+0x95/0x310
[   14.239691]  kunit_try_run_case+0x1a5/0x480
[   14.239884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.240240]  kthread+0x337/0x6f0
[   14.240435]  ret_from_fork+0x116/0x1d0
[   14.240726]  ret_from_fork_asm+0x1a/0x30
[   14.240934] 
[   14.241106] The buggy address belongs to the object at ffff888103a18380
[   14.241106]  which belongs to the cache kmalloc-64 of size 64
[   14.241792] The buggy address is located 0 bytes to the right of
[   14.241792]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.242404] 
[   14.242484] The buggy address belongs to the physical page:
[   14.242669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.243276] flags: 0x200000000000000(node=0|zone=2)
[   14.243705] page_type: f5(slab)
[   14.243835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.244711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.244971] page dumped because: kasan: bad access detected
[   14.245155] 
[   14.245228] Memory state around the buggy address:
[   14.245515]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.245966]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.246177] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.246383]                                      ^
[   14.246534]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.246742]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.247036] ==================================================================
[   15.489184] ==================================================================
[   15.489705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.490279] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.490891] 
[   15.491030] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.491075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.491091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.491122] Call Trace:
[   15.491141]  <TASK>
[   15.491159]  dump_stack_lvl+0x73/0xb0
[   15.491189]  print_report+0xd1/0x650
[   15.491212]  ? __virt_addr_valid+0x1db/0x2d0
[   15.491237]  ? kasan_atomics_helper+0x5115/0x5450
[   15.491260]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.491284]  ? kasan_atomics_helper+0x5115/0x5450
[   15.491308]  kasan_report+0x141/0x180
[   15.491331]  ? kasan_atomics_helper+0x5115/0x5450
[   15.491359]  __asan_report_load8_noabort+0x18/0x20
[   15.491386]  kasan_atomics_helper+0x5115/0x5450
[   15.491411]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.491434]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.491460]  ? kasan_save_alloc_info+0x3b/0x50
[   15.491484]  ? kasan_atomics+0x152/0x310
[   15.491512]  kasan_atomics+0x1dc/0x310
[   15.491537]  ? __pfx_kasan_atomics+0x10/0x10
[   15.491563]  ? __pfx_read_tsc+0x10/0x10
[   15.491586]  ? ktime_get_ts64+0x86/0x230
[   15.491612]  kunit_try_run_case+0x1a5/0x480
[   15.491638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.491661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.491685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.491710]  ? __kthread_parkme+0x82/0x180
[   15.491731]  ? preempt_count_sub+0x50/0x80
[   15.491756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.491781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.491806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.491829]  kthread+0x337/0x6f0
[   15.491850]  ? trace_preempt_on+0x20/0xc0
[   15.491875]  ? __pfx_kthread+0x10/0x10
[   15.491897]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.491919]  ? calculate_sigpending+0x7b/0xa0
[   15.491953]  ? __pfx_kthread+0x10/0x10
[   15.491978]  ret_from_fork+0x116/0x1d0
[   15.491998]  ? __pfx_kthread+0x10/0x10
[   15.492020]  ret_from_fork_asm+0x1a/0x30
[   15.492052]  </TASK>
[   15.492065] 
[   15.499961] Allocated by task 282:
[   15.500658]  kasan_save_stack+0x45/0x70
[   15.500844]  kasan_save_track+0x18/0x40
[   15.501055]  kasan_save_alloc_info+0x3b/0x50
[   15.501251]  __kasan_kmalloc+0xb7/0xc0
[   15.501410]  __kmalloc_cache_noprof+0x189/0x420
[   15.501624]  kasan_atomics+0x95/0x310
[   15.501803]  kunit_try_run_case+0x1a5/0x480
[   15.502016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.502808]  kthread+0x337/0x6f0
[   15.502954]  ret_from_fork+0x116/0x1d0
[   15.503304]  ret_from_fork_asm+0x1a/0x30
[   15.503594] 
[   15.503808] The buggy address belongs to the object at ffff888103a18380
[   15.503808]  which belongs to the cache kmalloc-64 of size 64
[   15.504746] The buggy address is located 0 bytes to the right of
[   15.504746]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.505605] 
[   15.505704] The buggy address belongs to the physical page:
[   15.505958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.506444] flags: 0x200000000000000(node=0|zone=2)
[   15.506762] page_type: f5(slab)
[   15.506926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.507482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.507805] page dumped because: kasan: bad access detected
[   15.508141] 
[   15.508235] Memory state around the buggy address:
[   15.508431]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.508901]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.509378] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.509780]                                      ^
[   15.510091]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.510347]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.510660] ==================================================================
[   15.079152] ==================================================================
[   15.079783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.080197] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.080506] 
[   15.080614] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.080659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.080673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.080696] Call Trace:
[   15.080714]  <TASK>
[   15.080733]  dump_stack_lvl+0x73/0xb0
[   15.080762]  print_report+0xd1/0x650
[   15.080786]  ? __virt_addr_valid+0x1db/0x2d0
[   15.080810]  ? kasan_atomics_helper+0x194a/0x5450
[   15.080833]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.080857]  ? kasan_atomics_helper+0x194a/0x5450
[   15.080880]  kasan_report+0x141/0x180
[   15.080903]  ? kasan_atomics_helper+0x194a/0x5450
[   15.080932]  kasan_check_range+0x10c/0x1c0
[   15.080967]  __kasan_check_write+0x18/0x20
[   15.080988]  kasan_atomics_helper+0x194a/0x5450
[   15.081012]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.081037]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.081063]  ? kasan_save_alloc_info+0x3b/0x50
[   15.081088]  ? kasan_atomics+0x152/0x310
[   15.081117]  kasan_atomics+0x1dc/0x310
[   15.081141]  ? __pfx_kasan_atomics+0x10/0x10
[   15.081167]  ? __pfx_read_tsc+0x10/0x10
[   15.081213]  ? ktime_get_ts64+0x86/0x230
[   15.081238]  kunit_try_run_case+0x1a5/0x480
[   15.081264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.081288]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.081314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.081339]  ? __kthread_parkme+0x82/0x180
[   15.081361]  ? preempt_count_sub+0x50/0x80
[   15.081386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.081412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.081436]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.081460]  kthread+0x337/0x6f0
[   15.081482]  ? trace_preempt_on+0x20/0xc0
[   15.081506]  ? __pfx_kthread+0x10/0x10
[   15.081529]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.081551]  ? calculate_sigpending+0x7b/0xa0
[   15.081596]  ? __pfx_kthread+0x10/0x10
[   15.081619]  ret_from_fork+0x116/0x1d0
[   15.081639]  ? __pfx_kthread+0x10/0x10
[   15.081661]  ret_from_fork_asm+0x1a/0x30
[   15.081693]  </TASK>
[   15.081707] 
[   15.089664] Allocated by task 282:
[   15.089831]  kasan_save_stack+0x45/0x70
[   15.090055]  kasan_save_track+0x18/0x40
[   15.090225]  kasan_save_alloc_info+0x3b/0x50
[   15.090386]  __kasan_kmalloc+0xb7/0xc0
[   15.090525]  __kmalloc_cache_noprof+0x189/0x420
[   15.090747]  kasan_atomics+0x95/0x310
[   15.090949]  kunit_try_run_case+0x1a5/0x480
[   15.091161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.091441]  kthread+0x337/0x6f0
[   15.091576]  ret_from_fork+0x116/0x1d0
[   15.091711]  ret_from_fork_asm+0x1a/0x30
[   15.091851] 
[   15.091983] The buggy address belongs to the object at ffff888103a18380
[   15.091983]  which belongs to the cache kmalloc-64 of size 64
[   15.092838] The buggy address is located 0 bytes to the right of
[   15.092838]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.093351] 
[   15.093428] The buggy address belongs to the physical page:
[   15.093987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.094268] flags: 0x200000000000000(node=0|zone=2)
[   15.094435] page_type: f5(slab)
[   15.094561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.095340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.095716] page dumped because: kasan: bad access detected
[   15.095972] 
[   15.096046] Memory state around the buggy address:
[   15.096249]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.096589]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.096808] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.097145]                                      ^
[   15.097399]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.097745]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.098043] ==================================================================
[   14.897598] ==================================================================
[   14.898332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.898723] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.899174] 
[   14.899265] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.899309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.899322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.899355] Call Trace:
[   14.899373]  <TASK>
[   14.899390]  dump_stack_lvl+0x73/0xb0
[   14.899429]  print_report+0xd1/0x650
[   14.899453]  ? __virt_addr_valid+0x1db/0x2d0
[   14.899476]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.899499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.899523]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.899546]  kasan_report+0x141/0x180
[   14.899570]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.899598]  __asan_report_store8_noabort+0x1b/0x30
[   14.899621]  kasan_atomics_helper+0x50d4/0x5450
[   14.899645]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.899668]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.899693]  ? kasan_save_alloc_info+0x3b/0x50
[   14.899717]  ? kasan_atomics+0x152/0x310
[   14.899747]  kasan_atomics+0x1dc/0x310
[   14.899772]  ? __pfx_kasan_atomics+0x10/0x10
[   14.899798]  ? __pfx_read_tsc+0x10/0x10
[   14.899820]  ? ktime_get_ts64+0x86/0x230
[   14.899844]  kunit_try_run_case+0x1a5/0x480
[   14.899871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.899895]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.899920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.899954]  ? __kthread_parkme+0x82/0x180
[   14.899976]  ? preempt_count_sub+0x50/0x80
[   14.900001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.900026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.900050]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.900083]  kthread+0x337/0x6f0
[   14.900104]  ? trace_preempt_on+0x20/0xc0
[   14.900128]  ? __pfx_kthread+0x10/0x10
[   14.900151]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.900173]  ? calculate_sigpending+0x7b/0xa0
[   14.900198]  ? __pfx_kthread+0x10/0x10
[   14.900221]  ret_from_fork+0x116/0x1d0
[   14.900241]  ? __pfx_kthread+0x10/0x10
[   14.900262]  ret_from_fork_asm+0x1a/0x30
[   14.900294]  </TASK>
[   14.900306] 
[   14.907981] Allocated by task 282:
[   14.908176]  kasan_save_stack+0x45/0x70
[   14.908339]  kasan_save_track+0x18/0x40
[   14.908535]  kasan_save_alloc_info+0x3b/0x50
[   14.908694]  __kasan_kmalloc+0xb7/0xc0
[   14.908848]  __kmalloc_cache_noprof+0x189/0x420
[   14.909105]  kasan_atomics+0x95/0x310
[   14.909299]  kunit_try_run_case+0x1a5/0x480
[   14.909486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.909696]  kthread+0x337/0x6f0
[   14.909821]  ret_from_fork+0x116/0x1d0
[   14.909965]  ret_from_fork_asm+0x1a/0x30
[   14.910230] 
[   14.910331] The buggy address belongs to the object at ffff888103a18380
[   14.910331]  which belongs to the cache kmalloc-64 of size 64
[   14.910846] The buggy address is located 0 bytes to the right of
[   14.910846]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.911395] 
[   14.911484] The buggy address belongs to the physical page:
[   14.911710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.912048] flags: 0x200000000000000(node=0|zone=2)
[   14.912229] page_type: f5(slab)
[   14.912355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.912657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.913012] page dumped because: kasan: bad access detected
[   14.913425] 
[   14.913500] Memory state around the buggy address:
[   14.913658]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.913876]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.914157] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.914487]                                      ^
[   14.914716]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.915048]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.915296] ==================================================================
[   14.268113] ==================================================================
[   14.268588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.269017] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.269444] 
[   14.269655] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.269742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.269758] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.269781] Call Trace:
[   14.269799]  <TASK>
[   14.269824]  dump_stack_lvl+0x73/0xb0
[   14.269855]  print_report+0xd1/0x650
[   14.269895]  ? __virt_addr_valid+0x1db/0x2d0
[   14.269933]  ? kasan_atomics_helper+0x72f/0x5450
[   14.270001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.270039]  ? kasan_atomics_helper+0x72f/0x5450
[   14.270076]  kasan_report+0x141/0x180
[   14.270110]  ? kasan_atomics_helper+0x72f/0x5450
[   14.270137]  kasan_check_range+0x10c/0x1c0
[   14.270173]  __kasan_check_write+0x18/0x20
[   14.270194]  kasan_atomics_helper+0x72f/0x5450
[   14.270219]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.270243]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.270268]  ? kasan_save_alloc_info+0x3b/0x50
[   14.270293]  ? kasan_atomics+0x152/0x310
[   14.270321]  kasan_atomics+0x1dc/0x310
[   14.270346]  ? __pfx_kasan_atomics+0x10/0x10
[   14.270372]  ? __pfx_read_tsc+0x10/0x10
[   14.270393]  ? ktime_get_ts64+0x86/0x230
[   14.270419]  kunit_try_run_case+0x1a5/0x480
[   14.270462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.270512]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.270539]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.270738]  ? __kthread_parkme+0x82/0x180
[   14.270770]  ? preempt_count_sub+0x50/0x80
[   14.270796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.270858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.270884]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.270919]  kthread+0x337/0x6f0
[   14.270954]  ? trace_preempt_on+0x20/0xc0
[   14.270980]  ? __pfx_kthread+0x10/0x10
[   14.271002]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.271025]  ? calculate_sigpending+0x7b/0xa0
[   14.271050]  ? __pfx_kthread+0x10/0x10
[   14.271081]  ret_from_fork+0x116/0x1d0
[   14.271101]  ? __pfx_kthread+0x10/0x10
[   14.271155]  ret_from_fork_asm+0x1a/0x30
[   14.271202]  </TASK>
[   14.271216] 
[   14.279865] Allocated by task 282:
[   14.280051]  kasan_save_stack+0x45/0x70
[   14.280198]  kasan_save_track+0x18/0x40
[   14.280356]  kasan_save_alloc_info+0x3b/0x50
[   14.280727]  __kasan_kmalloc+0xb7/0xc0
[   14.280932]  __kmalloc_cache_noprof+0x189/0x420
[   14.281141]  kasan_atomics+0x95/0x310
[   14.281370]  kunit_try_run_case+0x1a5/0x480
[   14.281644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.281963]  kthread+0x337/0x6f0
[   14.282151]  ret_from_fork+0x116/0x1d0
[   14.282372]  ret_from_fork_asm+0x1a/0x30
[   14.282653] 
[   14.282758] The buggy address belongs to the object at ffff888103a18380
[   14.282758]  which belongs to the cache kmalloc-64 of size 64
[   14.283448] The buggy address is located 0 bytes to the right of
[   14.283448]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.284140] 
[   14.284266] The buggy address belongs to the physical page:
[   14.284625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.285077] flags: 0x200000000000000(node=0|zone=2)
[   14.285397] page_type: f5(slab)
[   14.285621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.285861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.286102] page dumped because: kasan: bad access detected
[   14.286279] 
[   14.286352] Memory state around the buggy address:
[   14.286510]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.286730]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.287093] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.287616]                                      ^
[   14.287783]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.288015]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.288234] ==================================================================
[   14.933560] ==================================================================
[   14.933906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.934440] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.934783] 
[   14.934874] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.934917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.934931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.934965] Call Trace:
[   14.934981]  <TASK>
[   14.934996]  dump_stack_lvl+0x73/0xb0
[   14.935025]  print_report+0xd1/0x650
[   14.935049]  ? __virt_addr_valid+0x1db/0x2d0
[   14.935073]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.935096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.935128]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.935152]  kasan_report+0x141/0x180
[   14.935176]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.935204]  kasan_check_range+0x10c/0x1c0
[   14.935229]  __kasan_check_write+0x18/0x20
[   14.935250]  kasan_atomics_helper+0x15b6/0x5450
[   14.935274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.935298]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.935335]  ? kasan_save_alloc_info+0x3b/0x50
[   14.935360]  ? kasan_atomics+0x152/0x310
[   14.935389]  kasan_atomics+0x1dc/0x310
[   14.935413]  ? __pfx_kasan_atomics+0x10/0x10
[   14.935439]  ? __pfx_read_tsc+0x10/0x10
[   14.935461]  ? ktime_get_ts64+0x86/0x230
[   14.935486]  kunit_try_run_case+0x1a5/0x480
[   14.935513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.935537]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.935561]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.935585]  ? __kthread_parkme+0x82/0x180
[   14.935607]  ? preempt_count_sub+0x50/0x80
[   14.935632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.935658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.935682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.935706]  kthread+0x337/0x6f0
[   14.935727]  ? trace_preempt_on+0x20/0xc0
[   14.935751]  ? __pfx_kthread+0x10/0x10
[   14.935774]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.935796]  ? calculate_sigpending+0x7b/0xa0
[   14.935821]  ? __pfx_kthread+0x10/0x10
[   14.935843]  ret_from_fork+0x116/0x1d0
[   14.935863]  ? __pfx_kthread+0x10/0x10
[   14.935886]  ret_from_fork_asm+0x1a/0x30
[   14.935917]  </TASK>
[   14.935930] 
[   14.944060] Allocated by task 282:
[   14.944248]  kasan_save_stack+0x45/0x70
[   14.944430]  kasan_save_track+0x18/0x40
[   14.944569]  kasan_save_alloc_info+0x3b/0x50
[   14.944792]  __kasan_kmalloc+0xb7/0xc0
[   14.944980]  __kmalloc_cache_noprof+0x189/0x420
[   14.945204]  kasan_atomics+0x95/0x310
[   14.945368]  kunit_try_run_case+0x1a5/0x480
[   14.945575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.945750]  kthread+0x337/0x6f0
[   14.945874]  ret_from_fork+0x116/0x1d0
[   14.946017]  ret_from_fork_asm+0x1a/0x30
[   14.946158] 
[   14.946232] The buggy address belongs to the object at ffff888103a18380
[   14.946232]  which belongs to the cache kmalloc-64 of size 64
[   14.946585] The buggy address is located 0 bytes to the right of
[   14.946585]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.947122] 
[   14.947236] The buggy address belongs to the physical page:
[   14.947495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.947850] flags: 0x200000000000000(node=0|zone=2)
[   14.948126] page_type: f5(slab)
[   14.948301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.948645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.948994] page dumped because: kasan: bad access detected
[   14.949210] 
[   14.949285] Memory state around the buggy address:
[   14.949443]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.949664]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.949900] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.950428]                                      ^
[   14.950661]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.951004]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.951580] ==================================================================
[   14.201568] ==================================================================
[   14.202003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.202466] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.202958] 
[   14.203170] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.203256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.203271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.203322] Call Trace:
[   14.203341]  <TASK>
[   14.203359]  dump_stack_lvl+0x73/0xb0
[   14.203390]  print_report+0xd1/0x650
[   14.203414]  ? __virt_addr_valid+0x1db/0x2d0
[   14.203437]  ? kasan_atomics_helper+0x565/0x5450
[   14.203460]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.203569]  ? kasan_atomics_helper+0x565/0x5450
[   14.203623]  kasan_report+0x141/0x180
[   14.203649]  ? kasan_atomics_helper+0x565/0x5450
[   14.203677]  kasan_check_range+0x10c/0x1c0
[   14.203704]  __kasan_check_write+0x18/0x20
[   14.203725]  kasan_atomics_helper+0x565/0x5450
[   14.203750]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.203774]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.203799]  ? kasan_save_alloc_info+0x3b/0x50
[   14.203825]  ? kasan_atomics+0x152/0x310
[   14.203879]  kasan_atomics+0x1dc/0x310
[   14.203904]  ? __pfx_kasan_atomics+0x10/0x10
[   14.203931]  ? __pfx_read_tsc+0x10/0x10
[   14.203970]  ? ktime_get_ts64+0x86/0x230
[   14.203996]  kunit_try_run_case+0x1a5/0x480
[   14.204048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.204083]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.204118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.204143]  ? __kthread_parkme+0x82/0x180
[   14.204164]  ? preempt_count_sub+0x50/0x80
[   14.204188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.204214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.204238]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.204262]  kthread+0x337/0x6f0
[   14.204283]  ? trace_preempt_on+0x20/0xc0
[   14.204308]  ? __pfx_kthread+0x10/0x10
[   14.204329]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.204352]  ? calculate_sigpending+0x7b/0xa0
[   14.204377]  ? __pfx_kthread+0x10/0x10
[   14.204400]  ret_from_fork+0x116/0x1d0
[   14.204419]  ? __pfx_kthread+0x10/0x10
[   14.204442]  ret_from_fork_asm+0x1a/0x30
[   14.204557]  </TASK>
[   14.204574] 
[   14.214362] Allocated by task 282:
[   14.214680]  kasan_save_stack+0x45/0x70
[   14.214880]  kasan_save_track+0x18/0x40
[   14.215080]  kasan_save_alloc_info+0x3b/0x50
[   14.215234]  __kasan_kmalloc+0xb7/0xc0
[   14.215369]  __kmalloc_cache_noprof+0x189/0x420
[   14.215878]  kasan_atomics+0x95/0x310
[   14.216115]  kunit_try_run_case+0x1a5/0x480
[   14.216336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.216715]  kthread+0x337/0x6f0
[   14.216843]  ret_from_fork+0x116/0x1d0
[   14.216992]  ret_from_fork_asm+0x1a/0x30
[   14.217181] 
[   14.217286] The buggy address belongs to the object at ffff888103a18380
[   14.217286]  which belongs to the cache kmalloc-64 of size 64
[   14.218351] The buggy address is located 0 bytes to the right of
[   14.218351]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.218712] 
[   14.218807] The buggy address belongs to the physical page:
[   14.219144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.219887] flags: 0x200000000000000(node=0|zone=2)
[   14.220439] page_type: f5(slab)
[   14.220742] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.221149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.221416] page dumped because: kasan: bad access detected
[   14.221611] 
[   14.221843] Memory state around the buggy address:
[   14.222143]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.222574]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.222801] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.223218]                                      ^
[   14.223618]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.223960]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.224263] ==================================================================
[   15.247739] ==================================================================
[   15.248301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.248785] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.249024] 
[   15.249227] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.249272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.249286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.249309] Call Trace:
[   15.249325]  <TASK>
[   15.249342]  dump_stack_lvl+0x73/0xb0
[   15.249370]  print_report+0xd1/0x650
[   15.249392]  ? __virt_addr_valid+0x1db/0x2d0
[   15.249416]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.249449]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.249472]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.249495]  kasan_report+0x141/0x180
[   15.249520]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.249548]  kasan_check_range+0x10c/0x1c0
[   15.249573]  __kasan_check_write+0x18/0x20
[   15.249593]  kasan_atomics_helper+0x1e12/0x5450
[   15.249617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.249641]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.249666]  ? kasan_save_alloc_info+0x3b/0x50
[   15.249691]  ? kasan_atomics+0x152/0x310
[   15.249720]  kasan_atomics+0x1dc/0x310
[   15.249745]  ? __pfx_kasan_atomics+0x10/0x10
[   15.249771]  ? __pfx_read_tsc+0x10/0x10
[   15.249792]  ? ktime_get_ts64+0x86/0x230
[   15.249818]  kunit_try_run_case+0x1a5/0x480
[   15.249842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249866]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.249890]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.249915]  ? __kthread_parkme+0x82/0x180
[   15.249937]  ? preempt_count_sub+0x50/0x80
[   15.249976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.250005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.250031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.250056]  kthread+0x337/0x6f0
[   15.250084]  ? trace_preempt_on+0x20/0xc0
[   15.250109]  ? __pfx_kthread+0x10/0x10
[   15.250131]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.250154]  ? calculate_sigpending+0x7b/0xa0
[   15.250178]  ? __pfx_kthread+0x10/0x10
[   15.250202]  ret_from_fork+0x116/0x1d0
[   15.250222]  ? __pfx_kthread+0x10/0x10
[   15.250244]  ret_from_fork_asm+0x1a/0x30
[   15.250277]  </TASK>
[   15.250289] 
[   15.257931] Allocated by task 282:
[   15.258081]  kasan_save_stack+0x45/0x70
[   15.258274]  kasan_save_track+0x18/0x40
[   15.258472]  kasan_save_alloc_info+0x3b/0x50
[   15.258683]  __kasan_kmalloc+0xb7/0xc0
[   15.258871]  __kmalloc_cache_noprof+0x189/0x420
[   15.259136]  kasan_atomics+0x95/0x310
[   15.259278]  kunit_try_run_case+0x1a5/0x480
[   15.259436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.259694]  kthread+0x337/0x6f0
[   15.259869]  ret_from_fork+0x116/0x1d0
[   15.260076]  ret_from_fork_asm+0x1a/0x30
[   15.260246] 
[   15.260336] The buggy address belongs to the object at ffff888103a18380
[   15.260336]  which belongs to the cache kmalloc-64 of size 64
[   15.260798] The buggy address is located 0 bytes to the right of
[   15.260798]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.261319] 
[   15.261415] The buggy address belongs to the physical page:
[   15.261629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.261874] flags: 0x200000000000000(node=0|zone=2)
[   15.262048] page_type: f5(slab)
[   15.262173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.262442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.263188] page dumped because: kasan: bad access detected
[   15.263371] 
[   15.263451] Memory state around the buggy address:
[   15.263622]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.263839]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.264198] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.264526]                                      ^
[   15.264755]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.265098]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.265426] ==================================================================
[   14.107791] ==================================================================
[   14.108084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.108358] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.109052] 
[   14.109222] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.109268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.109282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.109304] Call Trace:
[   14.109323]  <TASK>
[   14.109340]  dump_stack_lvl+0x73/0xb0
[   14.109370]  print_report+0xd1/0x650
[   14.109393]  ? __virt_addr_valid+0x1db/0x2d0
[   14.109417]  ? kasan_atomics_helper+0x3df/0x5450
[   14.109450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.109473]  ? kasan_atomics_helper+0x3df/0x5450
[   14.109496]  kasan_report+0x141/0x180
[   14.109529]  ? kasan_atomics_helper+0x3df/0x5450
[   14.109557]  kasan_check_range+0x10c/0x1c0
[   14.109582]  __kasan_check_read+0x15/0x20
[   14.109602]  kasan_atomics_helper+0x3df/0x5450
[   14.109636]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.109660]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.109684]  ? kasan_save_alloc_info+0x3b/0x50
[   14.109709]  ? kasan_atomics+0x152/0x310
[   14.109737]  kasan_atomics+0x1dc/0x310
[   14.109761]  ? __pfx_kasan_atomics+0x10/0x10
[   14.109786]  ? __pfx_read_tsc+0x10/0x10
[   14.109808]  ? ktime_get_ts64+0x86/0x230
[   14.109834]  kunit_try_run_case+0x1a5/0x480
[   14.109860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.109883]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.109906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.109931]  ? __kthread_parkme+0x82/0x180
[   14.109964]  ? preempt_count_sub+0x50/0x80
[   14.109988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.110013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.110038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.110234]  kthread+0x337/0x6f0
[   14.110258]  ? trace_preempt_on+0x20/0xc0
[   14.110284]  ? __pfx_kthread+0x10/0x10
[   14.110306]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.110329]  ? calculate_sigpending+0x7b/0xa0
[   14.110354]  ? __pfx_kthread+0x10/0x10
[   14.110378]  ret_from_fork+0x116/0x1d0
[   14.110398]  ? __pfx_kthread+0x10/0x10
[   14.110420]  ret_from_fork_asm+0x1a/0x30
[   14.110451]  </TASK>
[   14.110513] 
[   14.119956] Allocated by task 282:
[   14.120278]  kasan_save_stack+0x45/0x70
[   14.120430]  kasan_save_track+0x18/0x40
[   14.120832]  kasan_save_alloc_info+0x3b/0x50
[   14.121003]  __kasan_kmalloc+0xb7/0xc0
[   14.121138]  __kmalloc_cache_noprof+0x189/0x420
[   14.121333]  kasan_atomics+0x95/0x310
[   14.121525]  kunit_try_run_case+0x1a5/0x480
[   14.121954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.122273]  kthread+0x337/0x6f0
[   14.122414]  ret_from_fork+0x116/0x1d0
[   14.122684]  ret_from_fork_asm+0x1a/0x30
[   14.122833] 
[   14.122907] The buggy address belongs to the object at ffff888103a18380
[   14.122907]  which belongs to the cache kmalloc-64 of size 64
[   14.123558] The buggy address is located 0 bytes to the right of
[   14.123558]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.123926] 
[   14.124150] The buggy address belongs to the physical page:
[   14.124446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.124850] flags: 0x200000000000000(node=0|zone=2)
[   14.125356] page_type: f5(slab)
[   14.125615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.125862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.126298] page dumped because: kasan: bad access detected
[   14.126889] 
[   14.126995] Memory state around the buggy address:
[   14.127379]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.127692]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.127998] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.128359]                                      ^
[   14.128562]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.128953]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.129377] ==================================================================
[   14.153029] ==================================================================
[   14.153448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.154154] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.154828] 
[   14.154987] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.155034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.155050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.155073] Call Trace:
[   14.155092]  <TASK>
[   14.155113]  dump_stack_lvl+0x73/0xb0
[   14.155141]  print_report+0xd1/0x650
[   14.155164]  ? __virt_addr_valid+0x1db/0x2d0
[   14.155188]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.155210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.155271]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.155297]  kasan_report+0x141/0x180
[   14.155321]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.155378]  kasan_check_range+0x10c/0x1c0
[   14.155404]  __kasan_check_write+0x18/0x20
[   14.155436]  kasan_atomics_helper+0x4a0/0x5450
[   14.155517]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.155547]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.155572]  ? kasan_save_alloc_info+0x3b/0x50
[   14.155597]  ? kasan_atomics+0x152/0x310
[   14.155627]  kasan_atomics+0x1dc/0x310
[   14.155652]  ? __pfx_kasan_atomics+0x10/0x10
[   14.155678]  ? __pfx_read_tsc+0x10/0x10
[   14.155699]  ? ktime_get_ts64+0x86/0x230
[   14.155725]  kunit_try_run_case+0x1a5/0x480
[   14.155749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.155773]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.155798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.155824]  ? __kthread_parkme+0x82/0x180
[   14.155845]  ? preempt_count_sub+0x50/0x80
[   14.155870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.155895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.155919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.155957]  kthread+0x337/0x6f0
[   14.155978]  ? trace_preempt_on+0x20/0xc0
[   14.156002]  ? __pfx_kthread+0x10/0x10
[   14.156023]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.156046]  ? calculate_sigpending+0x7b/0xa0
[   14.156071]  ? __pfx_kthread+0x10/0x10
[   14.156093]  ret_from_fork+0x116/0x1d0
[   14.156113]  ? __pfx_kthread+0x10/0x10
[   14.156136]  ret_from_fork_asm+0x1a/0x30
[   14.156167]  </TASK>
[   14.156180] 
[   14.166855] Allocated by task 282:
[   14.167052]  kasan_save_stack+0x45/0x70
[   14.167519]  kasan_save_track+0x18/0x40
[   14.167862]  kasan_save_alloc_info+0x3b/0x50
[   14.168038]  __kasan_kmalloc+0xb7/0xc0
[   14.168246]  __kmalloc_cache_noprof+0x189/0x420
[   14.168654]  kasan_atomics+0x95/0x310
[   14.168877]  kunit_try_run_case+0x1a5/0x480
[   14.169106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.169585]  kthread+0x337/0x6f0
[   14.169796]  ret_from_fork+0x116/0x1d0
[   14.170059]  ret_from_fork_asm+0x1a/0x30
[   14.170282] 
[   14.170370] The buggy address belongs to the object at ffff888103a18380
[   14.170370]  which belongs to the cache kmalloc-64 of size 64
[   14.171285] The buggy address is located 0 bytes to the right of
[   14.171285]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.171861] 
[   14.172033] The buggy address belongs to the physical page:
[   14.172423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.172908] flags: 0x200000000000000(node=0|zone=2)
[   14.173115] page_type: f5(slab)
[   14.173353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.173788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.174157] page dumped because: kasan: bad access detected
[   14.174369] 
[   14.174469] Memory state around the buggy address:
[   14.174976]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.175570]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.176001] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.176433]                                      ^
[   14.176782]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.177121]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.177453] ==================================================================
[   14.669045] ==================================================================
[   14.669599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.670274] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.670895] 
[   14.671149] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.671197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.671222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.671245] Call Trace:
[   14.671262]  <TASK>
[   14.671278]  dump_stack_lvl+0x73/0xb0
[   14.671320]  print_report+0xd1/0x650
[   14.671344]  ? __virt_addr_valid+0x1db/0x2d0
[   14.671367]  ? kasan_atomics_helper+0x1079/0x5450
[   14.671390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.671414]  ? kasan_atomics_helper+0x1079/0x5450
[   14.671437]  kasan_report+0x141/0x180
[   14.671503]  ? kasan_atomics_helper+0x1079/0x5450
[   14.671533]  kasan_check_range+0x10c/0x1c0
[   14.671559]  __kasan_check_write+0x18/0x20
[   14.671580]  kasan_atomics_helper+0x1079/0x5450
[   14.671604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.671627]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.671654]  ? kasan_save_alloc_info+0x3b/0x50
[   14.671679]  ? kasan_atomics+0x152/0x310
[   14.671707]  kasan_atomics+0x1dc/0x310
[   14.671731]  ? __pfx_kasan_atomics+0x10/0x10
[   14.671758]  ? __pfx_read_tsc+0x10/0x10
[   14.671780]  ? ktime_get_ts64+0x86/0x230
[   14.671806]  kunit_try_run_case+0x1a5/0x480
[   14.671831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.671855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.671880]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.671905]  ? __kthread_parkme+0x82/0x180
[   14.671928]  ? preempt_count_sub+0x50/0x80
[   14.671966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.671992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.672016]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.672041]  kthread+0x337/0x6f0
[   14.672062]  ? trace_preempt_on+0x20/0xc0
[   14.672087]  ? __pfx_kthread+0x10/0x10
[   14.672109]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.672132]  ? calculate_sigpending+0x7b/0xa0
[   14.672157]  ? __pfx_kthread+0x10/0x10
[   14.672181]  ret_from_fork+0x116/0x1d0
[   14.672200]  ? __pfx_kthread+0x10/0x10
[   14.672223]  ret_from_fork_asm+0x1a/0x30
[   14.672255]  </TASK>
[   14.672269] 
[   14.686726] Allocated by task 282:
[   14.687090]  kasan_save_stack+0x45/0x70
[   14.687535]  kasan_save_track+0x18/0x40
[   14.687915]  kasan_save_alloc_info+0x3b/0x50
[   14.688324]  __kasan_kmalloc+0xb7/0xc0
[   14.688462]  __kmalloc_cache_noprof+0x189/0x420
[   14.688841]  kasan_atomics+0x95/0x310
[   14.689206]  kunit_try_run_case+0x1a5/0x480
[   14.689803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.690382]  kthread+0x337/0x6f0
[   14.690561]  ret_from_fork+0x116/0x1d0
[   14.690988]  ret_from_fork_asm+0x1a/0x30
[   14.691388] 
[   14.691475] The buggy address belongs to the object at ffff888103a18380
[   14.691475]  which belongs to the cache kmalloc-64 of size 64
[   14.691832] The buggy address is located 0 bytes to the right of
[   14.691832]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.692221] 
[   14.692354] The buggy address belongs to the physical page:
[   14.692716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.693118] flags: 0x200000000000000(node=0|zone=2)
[   14.693340] page_type: f5(slab)
[   14.693475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.693901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.694239] page dumped because: kasan: bad access detected
[   14.694601] 
[   14.694693] Memory state around the buggy address:
[   14.694967]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.695359]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.695635] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.695881]                                      ^
[   14.696114]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.696591]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.696808] ==================================================================
[   14.977242] ==================================================================
[   14.977565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.977986] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.978280] 
[   14.978392] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.978437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.978451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.978475] Call Trace:
[   14.978495]  <TASK>
[   14.978512]  dump_stack_lvl+0x73/0xb0
[   14.978540]  print_report+0xd1/0x650
[   14.978575]  ? __virt_addr_valid+0x1db/0x2d0
[   14.978601]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.978624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.978647]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.978671]  kasan_report+0x141/0x180
[   14.978695]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.978736]  kasan_check_range+0x10c/0x1c0
[   14.978761]  __kasan_check_write+0x18/0x20
[   14.978783]  kasan_atomics_helper+0x16e7/0x5450
[   14.978808]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.978831]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.978857]  ? kasan_save_alloc_info+0x3b/0x50
[   14.978883]  ? kasan_atomics+0x152/0x310
[   14.978912]  kasan_atomics+0x1dc/0x310
[   14.978937]  ? __pfx_kasan_atomics+0x10/0x10
[   14.978974]  ? __pfx_read_tsc+0x10/0x10
[   14.978996]  ? ktime_get_ts64+0x86/0x230
[   14.979022]  kunit_try_run_case+0x1a5/0x480
[   14.979048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.979080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.979104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.979134]  ? __kthread_parkme+0x82/0x180
[   14.979156]  ? preempt_count_sub+0x50/0x80
[   14.979181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.979206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.979230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.979256]  kthread+0x337/0x6f0
[   14.979277]  ? trace_preempt_on+0x20/0xc0
[   14.979301]  ? __pfx_kthread+0x10/0x10
[   14.979324]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.979346]  ? calculate_sigpending+0x7b/0xa0
[   14.979371]  ? __pfx_kthread+0x10/0x10
[   14.979394]  ret_from_fork+0x116/0x1d0
[   14.979414]  ? __pfx_kthread+0x10/0x10
[   14.979436]  ret_from_fork_asm+0x1a/0x30
[   14.979468]  </TASK>
[   14.979481] 
[   14.986869] Allocated by task 282:
[   14.987070]  kasan_save_stack+0x45/0x70
[   14.987236]  kasan_save_track+0x18/0x40
[   14.987373]  kasan_save_alloc_info+0x3b/0x50
[   14.987529]  __kasan_kmalloc+0xb7/0xc0
[   14.987727]  __kmalloc_cache_noprof+0x189/0x420
[   14.987958]  kasan_atomics+0x95/0x310
[   14.988253]  kunit_try_run_case+0x1a5/0x480
[   14.988452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.988628]  kthread+0x337/0x6f0
[   14.988751]  ret_from_fork+0x116/0x1d0
[   14.988884]  ret_from_fork_asm+0x1a/0x30
[   14.989882] 
[   14.990009] The buggy address belongs to the object at ffff888103a18380
[   14.990009]  which belongs to the cache kmalloc-64 of size 64
[   14.991727] The buggy address is located 0 bytes to the right of
[   14.991727]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.993249] 
[   14.993524] The buggy address belongs to the physical page:
[   14.993976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.995210] flags: 0x200000000000000(node=0|zone=2)
[   14.995628] page_type: f5(slab)
[   14.996129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.996604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.996844] page dumped because: kasan: bad access detected
[   14.997287] 
[   14.997497] Memory state around the buggy address:
[   14.997957]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.998621]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.999270] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.999492]                                      ^
[   14.999650]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.999867]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.000506] ==================================================================
[   15.052812] ==================================================================
[   15.053192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.053836] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.054205] 
[   15.054302] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.054348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.054363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.054387] Call Trace:
[   15.054406]  <TASK>
[   15.054437]  dump_stack_lvl+0x73/0xb0
[   15.054497]  print_report+0xd1/0x650
[   15.054521]  ? __virt_addr_valid+0x1db/0x2d0
[   15.054546]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.054568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.054592]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.054615]  kasan_report+0x141/0x180
[   15.054639]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.054667]  kasan_check_range+0x10c/0x1c0
[   15.054692]  __kasan_check_write+0x18/0x20
[   15.054713]  kasan_atomics_helper+0x18b1/0x5450
[   15.054737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.054776]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.054802]  ? kasan_save_alloc_info+0x3b/0x50
[   15.054838]  ? kasan_atomics+0x152/0x310
[   15.054867]  kasan_atomics+0x1dc/0x310
[   15.054891]  ? __pfx_kasan_atomics+0x10/0x10
[   15.054917]  ? __pfx_read_tsc+0x10/0x10
[   15.054951]  ? ktime_get_ts64+0x86/0x230
[   15.054977]  kunit_try_run_case+0x1a5/0x480
[   15.055002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.055026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.055050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.055085]  ? __kthread_parkme+0x82/0x180
[   15.055107]  ? preempt_count_sub+0x50/0x80
[   15.055155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.055180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.055205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.055229]  kthread+0x337/0x6f0
[   15.055251]  ? trace_preempt_on+0x20/0xc0
[   15.055276]  ? __pfx_kthread+0x10/0x10
[   15.055319]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.055342]  ? calculate_sigpending+0x7b/0xa0
[   15.055367]  ? __pfx_kthread+0x10/0x10
[   15.055391]  ret_from_fork+0x116/0x1d0
[   15.055411]  ? __pfx_kthread+0x10/0x10
[   15.055433]  ret_from_fork_asm+0x1a/0x30
[   15.055465]  </TASK>
[   15.055478] 
[   15.066452] Allocated by task 282:
[   15.066641]  kasan_save_stack+0x45/0x70
[   15.066835]  kasan_save_track+0x18/0x40
[   15.067029]  kasan_save_alloc_info+0x3b/0x50
[   15.067752]  __kasan_kmalloc+0xb7/0xc0
[   15.067973]  __kmalloc_cache_noprof+0x189/0x420
[   15.068445]  kasan_atomics+0x95/0x310
[   15.068807]  kunit_try_run_case+0x1a5/0x480
[   15.069025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.069688]  kthread+0x337/0x6f0
[   15.069900]  ret_from_fork+0x116/0x1d0
[   15.070269]  ret_from_fork_asm+0x1a/0x30
[   15.070473] 
[   15.070571] The buggy address belongs to the object at ffff888103a18380
[   15.070571]  which belongs to the cache kmalloc-64 of size 64
[   15.071065] The buggy address is located 0 bytes to the right of
[   15.071065]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.071589] 
[   15.071686] The buggy address belongs to the physical page:
[   15.071925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.072696] flags: 0x200000000000000(node=0|zone=2)
[   15.073089] page_type: f5(slab)
[   15.073392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.073898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.074602] page dumped because: kasan: bad access detected
[   15.075072] 
[   15.075237] Memory state around the buggy address:
[   15.075455]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.075749]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.076053] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.076348]                                      ^
[   15.076557]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.076848]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.077538] ==================================================================
[   15.284186] ==================================================================
[   15.284539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.284880] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.285231] 
[   15.285343] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.285385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.285399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.285421] Call Trace:
[   15.285438]  <TASK>
[   15.285456]  dump_stack_lvl+0x73/0xb0
[   15.285484]  print_report+0xd1/0x650
[   15.285507]  ? __virt_addr_valid+0x1db/0x2d0
[   15.285531]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.285554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.285576]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.285600]  kasan_report+0x141/0x180
[   15.285623]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.285650]  kasan_check_range+0x10c/0x1c0
[   15.285674]  __kasan_check_write+0x18/0x20
[   15.285695]  kasan_atomics_helper+0x1f43/0x5450
[   15.285719]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.285741]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.285767]  ? kasan_save_alloc_info+0x3b/0x50
[   15.285791]  ? kasan_atomics+0x152/0x310
[   15.285818]  kasan_atomics+0x1dc/0x310
[   15.285842]  ? __pfx_kasan_atomics+0x10/0x10
[   15.285868]  ? __pfx_read_tsc+0x10/0x10
[   15.285908]  ? ktime_get_ts64+0x86/0x230
[   15.285933]  kunit_try_run_case+0x1a5/0x480
[   15.285970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.285994]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.286018]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.286043]  ? __kthread_parkme+0x82/0x180
[   15.286066]  ? preempt_count_sub+0x50/0x80
[   15.286090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.286115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.286140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.286177]  kthread+0x337/0x6f0
[   15.286199]  ? trace_preempt_on+0x20/0xc0
[   15.286224]  ? __pfx_kthread+0x10/0x10
[   15.286245]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.286268]  ? calculate_sigpending+0x7b/0xa0
[   15.286293]  ? __pfx_kthread+0x10/0x10
[   15.286316]  ret_from_fork+0x116/0x1d0
[   15.286336]  ? __pfx_kthread+0x10/0x10
[   15.286358]  ret_from_fork_asm+0x1a/0x30
[   15.286391]  </TASK>
[   15.286403] 
[   15.294260] Allocated by task 282:
[   15.294453]  kasan_save_stack+0x45/0x70
[   15.294656]  kasan_save_track+0x18/0x40
[   15.294861]  kasan_save_alloc_info+0x3b/0x50
[   15.295095]  __kasan_kmalloc+0xb7/0xc0
[   15.295273]  __kmalloc_cache_noprof+0x189/0x420
[   15.295441]  kasan_atomics+0x95/0x310
[   15.295577]  kunit_try_run_case+0x1a5/0x480
[   15.295724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.295900]  kthread+0x337/0x6f0
[   15.296034]  ret_from_fork+0x116/0x1d0
[   15.296426]  ret_from_fork_asm+0x1a/0x30
[   15.296629] 
[   15.296727] The buggy address belongs to the object at ffff888103a18380
[   15.296727]  which belongs to the cache kmalloc-64 of size 64
[   15.297406] The buggy address is located 0 bytes to the right of
[   15.297406]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.297895] 
[   15.298244] The buggy address belongs to the physical page:
[   15.299692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.300134] flags: 0x200000000000000(node=0|zone=2)
[   15.300307] page_type: f5(slab)
[   15.300439] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.300682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.300921] page dumped because: kasan: bad access detected
[   15.301226] 
[   15.301321] Memory state around the buggy address:
[   15.301489]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.301748]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.302094] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.302340]                                      ^
[   15.302550]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.302880]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.303194] ==================================================================
[   14.577815] ==================================================================
[   14.578341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.578780] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.579033] 
[   14.579268] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.579315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.579341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.579365] Call Trace:
[   14.579381]  <TASK>
[   14.579399]  dump_stack_lvl+0x73/0xb0
[   14.579439]  print_report+0xd1/0x650
[   14.579486]  ? __virt_addr_valid+0x1db/0x2d0
[   14.579510]  ? kasan_atomics_helper+0xf10/0x5450
[   14.579543]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.579567]  ? kasan_atomics_helper+0xf10/0x5450
[   14.579590]  kasan_report+0x141/0x180
[   14.579614]  ? kasan_atomics_helper+0xf10/0x5450
[   14.579642]  kasan_check_range+0x10c/0x1c0
[   14.579667]  __kasan_check_write+0x18/0x20
[   14.579688]  kasan_atomics_helper+0xf10/0x5450
[   14.579712]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.579735]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.579760]  ? kasan_save_alloc_info+0x3b/0x50
[   14.579785]  ? kasan_atomics+0x152/0x310
[   14.579813]  kasan_atomics+0x1dc/0x310
[   14.579837]  ? __pfx_kasan_atomics+0x10/0x10
[   14.579863]  ? __pfx_read_tsc+0x10/0x10
[   14.579885]  ? ktime_get_ts64+0x86/0x230
[   14.579918]  kunit_try_run_case+0x1a5/0x480
[   14.579957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.579982]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.580006]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.580031]  ? __kthread_parkme+0x82/0x180
[   14.580067]  ? preempt_count_sub+0x50/0x80
[   14.580093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.580117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.580141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.580166]  kthread+0x337/0x6f0
[   14.580187]  ? trace_preempt_on+0x20/0xc0
[   14.580211]  ? __pfx_kthread+0x10/0x10
[   14.580233]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.580257]  ? calculate_sigpending+0x7b/0xa0
[   14.580282]  ? __pfx_kthread+0x10/0x10
[   14.580306]  ret_from_fork+0x116/0x1d0
[   14.580326]  ? __pfx_kthread+0x10/0x10
[   14.580348]  ret_from_fork_asm+0x1a/0x30
[   14.580381]  </TASK>
[   14.580394] 
[   14.594889] Allocated by task 282:
[   14.595036]  kasan_save_stack+0x45/0x70
[   14.595188]  kasan_save_track+0x18/0x40
[   14.595326]  kasan_save_alloc_info+0x3b/0x50
[   14.595476]  __kasan_kmalloc+0xb7/0xc0
[   14.595610]  __kmalloc_cache_noprof+0x189/0x420
[   14.595769]  kasan_atomics+0x95/0x310
[   14.595903]  kunit_try_run_case+0x1a5/0x480
[   14.596347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.596836]  kthread+0x337/0x6f0
[   14.597227]  ret_from_fork+0x116/0x1d0
[   14.597692]  ret_from_fork_asm+0x1a/0x30
[   14.598067] 
[   14.598226] The buggy address belongs to the object at ffff888103a18380
[   14.598226]  which belongs to the cache kmalloc-64 of size 64
[   14.600933] The buggy address is located 0 bytes to the right of
[   14.600933]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.602287] 
[   14.602411] The buggy address belongs to the physical page:
[   14.602595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.602838] flags: 0x200000000000000(node=0|zone=2)
[   14.603793] page_type: f5(slab)
[   14.604988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.606162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.607169] page dumped because: kasan: bad access detected
[   14.607508] 
[   14.607718] Memory state around the buggy address:
[   14.607895]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.608864]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.609233] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.609740]                                      ^
[   14.610093]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.610509]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.610987] ==================================================================
[   14.083402] ==================================================================
[   14.085039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.085784] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.086045] 
[   14.086148] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.086196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.086210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.086233] Call Trace:
[   14.086250]  <TASK>
[   14.086266]  dump_stack_lvl+0x73/0xb0
[   14.086296]  print_report+0xd1/0x650
[   14.086319]  ? __virt_addr_valid+0x1db/0x2d0
[   14.086343]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.086365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.086389]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.086411]  kasan_report+0x141/0x180
[   14.086435]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.086462]  __asan_report_store4_noabort+0x1b/0x30
[   14.086484]  kasan_atomics_helper+0x4b6e/0x5450
[   14.086508]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.086531]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.086556]  ? kasan_save_alloc_info+0x3b/0x50
[   14.086582]  ? kasan_atomics+0x152/0x310
[   14.086610]  kasan_atomics+0x1dc/0x310
[   14.086633]  ? __pfx_kasan_atomics+0x10/0x10
[   14.086659]  ? __pfx_read_tsc+0x10/0x10
[   14.086681]  ? ktime_get_ts64+0x86/0x230
[   14.086706]  kunit_try_run_case+0x1a5/0x480
[   14.086731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.086755]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.086780]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.086805]  ? __kthread_parkme+0x82/0x180
[   14.086827]  ? preempt_count_sub+0x50/0x80
[   14.086851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.086876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.086900]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.086925]  kthread+0x337/0x6f0
[   14.086957]  ? trace_preempt_on+0x20/0xc0
[   14.086982]  ? __pfx_kthread+0x10/0x10
[   14.087003]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.087026]  ? calculate_sigpending+0x7b/0xa0
[   14.087050]  ? __pfx_kthread+0x10/0x10
[   14.087073]  ret_from_fork+0x116/0x1d0
[   14.087093]  ? __pfx_kthread+0x10/0x10
[   14.087121]  ret_from_fork_asm+0x1a/0x30
[   14.087153]  </TASK>
[   14.087166] 
[   14.097716] Allocated by task 282:
[   14.097859]  kasan_save_stack+0x45/0x70
[   14.098085]  kasan_save_track+0x18/0x40
[   14.098311]  kasan_save_alloc_info+0x3b/0x50
[   14.098654]  __kasan_kmalloc+0xb7/0xc0
[   14.098860]  __kmalloc_cache_noprof+0x189/0x420
[   14.099035]  kasan_atomics+0x95/0x310
[   14.099178]  kunit_try_run_case+0x1a5/0x480
[   14.099416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.099674]  kthread+0x337/0x6f0
[   14.099847]  ret_from_fork+0x116/0x1d0
[   14.100227]  ret_from_fork_asm+0x1a/0x30
[   14.100379] 
[   14.100454] The buggy address belongs to the object at ffff888103a18380
[   14.100454]  which belongs to the cache kmalloc-64 of size 64
[   14.101182] The buggy address is located 0 bytes to the right of
[   14.101182]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.101776] 
[   14.101875] The buggy address belongs to the physical page:
[   14.102139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.102526] flags: 0x200000000000000(node=0|zone=2)
[   14.102773] page_type: f5(slab)
[   14.102897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.103279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.103879] page dumped because: kasan: bad access detected
[   14.104074] 
[   14.104202] Memory state around the buggy address:
[   14.104458]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.104747]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.105181] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.105399]                                      ^
[   14.105576]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.106012]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.106537] ==================================================================
[   15.353146] ==================================================================
[   15.353418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.354554] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.354879] 
[   15.355080] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.355139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.355154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.355178] Call Trace:
[   15.355196]  <TASK>
[   15.355213]  dump_stack_lvl+0x73/0xb0
[   15.355244]  print_report+0xd1/0x650
[   15.355267]  ? __virt_addr_valid+0x1db/0x2d0
[   15.355291]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.355314]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.355338]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.355361]  kasan_report+0x141/0x180
[   15.355384]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.355412]  __asan_report_load8_noabort+0x18/0x20
[   15.355437]  kasan_atomics_helper+0x4f98/0x5450
[   15.355461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.355484]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.355511]  ? kasan_save_alloc_info+0x3b/0x50
[   15.355535]  ? kasan_atomics+0x152/0x310
[   15.355564]  kasan_atomics+0x1dc/0x310
[   15.355588]  ? __pfx_kasan_atomics+0x10/0x10
[   15.355613]  ? __pfx_read_tsc+0x10/0x10
[   15.355636]  ? ktime_get_ts64+0x86/0x230
[   15.355661]  kunit_try_run_case+0x1a5/0x480
[   15.355686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.355709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.355735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.355759]  ? __kthread_parkme+0x82/0x180
[   15.355779]  ? preempt_count_sub+0x50/0x80
[   15.355804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.355829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.355853]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.355878]  kthread+0x337/0x6f0
[   15.355899]  ? trace_preempt_on+0x20/0xc0
[   15.355924]  ? __pfx_kthread+0x10/0x10
[   15.355957]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.355979]  ? calculate_sigpending+0x7b/0xa0
[   15.356004]  ? __pfx_kthread+0x10/0x10
[   15.356027]  ret_from_fork+0x116/0x1d0
[   15.356046]  ? __pfx_kthread+0x10/0x10
[   15.356082]  ret_from_fork_asm+0x1a/0x30
[   15.356114]  </TASK>
[   15.356127] 
[   15.365662] Allocated by task 282:
[   15.365845]  kasan_save_stack+0x45/0x70
[   15.366012]  kasan_save_track+0x18/0x40
[   15.366390]  kasan_save_alloc_info+0x3b/0x50
[   15.366671]  __kasan_kmalloc+0xb7/0xc0
[   15.366820]  __kmalloc_cache_noprof+0x189/0x420
[   15.367253]  kasan_atomics+0x95/0x310
[   15.367527]  kunit_try_run_case+0x1a5/0x480
[   15.367723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.368103]  kthread+0x337/0x6f0
[   15.368261]  ret_from_fork+0x116/0x1d0
[   15.368427]  ret_from_fork_asm+0x1a/0x30
[   15.368605] 
[   15.368692] The buggy address belongs to the object at ffff888103a18380
[   15.368692]  which belongs to the cache kmalloc-64 of size 64
[   15.369600] The buggy address is located 0 bytes to the right of
[   15.369600]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.370304] 
[   15.370561] The buggy address belongs to the physical page:
[   15.370835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.371336] flags: 0x200000000000000(node=0|zone=2)
[   15.371667] page_type: f5(slab)
[   15.371959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.372521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.372965] page dumped because: kasan: bad access detected
[   15.373429] 
[   15.373635] Memory state around the buggy address:
[   15.373924]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.374475]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.374885] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.375389]                                      ^
[   15.375625]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.375965]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.376445] ==================================================================
[   15.462693] ==================================================================
[   15.463073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.463406] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.464083] 
[   15.464214] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.464260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.464275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.464297] Call Trace:
[   15.464315]  <TASK>
[   15.464332]  dump_stack_lvl+0x73/0xb0
[   15.464363]  print_report+0xd1/0x650
[   15.464387]  ? __virt_addr_valid+0x1db/0x2d0
[   15.464410]  ? kasan_atomics_helper+0x224c/0x5450
[   15.464433]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.464458]  ? kasan_atomics_helper+0x224c/0x5450
[   15.464481]  kasan_report+0x141/0x180
[   15.464505]  ? kasan_atomics_helper+0x224c/0x5450
[   15.464532]  kasan_check_range+0x10c/0x1c0
[   15.464558]  __kasan_check_write+0x18/0x20
[   15.464580]  kasan_atomics_helper+0x224c/0x5450
[   15.464604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.464627]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.464652]  ? kasan_save_alloc_info+0x3b/0x50
[   15.464677]  ? kasan_atomics+0x152/0x310
[   15.464705]  kasan_atomics+0x1dc/0x310
[   15.464730]  ? __pfx_kasan_atomics+0x10/0x10
[   15.464755]  ? __pfx_read_tsc+0x10/0x10
[   15.464778]  ? ktime_get_ts64+0x86/0x230
[   15.464803]  kunit_try_run_case+0x1a5/0x480
[   15.464830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.464854]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.464878]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.464902]  ? __kthread_parkme+0x82/0x180
[   15.464924]  ? preempt_count_sub+0x50/0x80
[   15.464961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.464986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.465012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.465036]  kthread+0x337/0x6f0
[   15.465056]  ? trace_preempt_on+0x20/0xc0
[   15.465090]  ? __pfx_kthread+0x10/0x10
[   15.465113]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.465135]  ? calculate_sigpending+0x7b/0xa0
[   15.465160]  ? __pfx_kthread+0x10/0x10
[   15.465184]  ret_from_fork+0x116/0x1d0
[   15.465204]  ? __pfx_kthread+0x10/0x10
[   15.465226]  ret_from_fork_asm+0x1a/0x30
[   15.465259]  </TASK>
[   15.465272] 
[   15.475889] Allocated by task 282:
[   15.476303]  kasan_save_stack+0x45/0x70
[   15.476626]  kasan_save_track+0x18/0x40
[   15.476996]  kasan_save_alloc_info+0x3b/0x50
[   15.477329]  __kasan_kmalloc+0xb7/0xc0
[   15.477635]  __kmalloc_cache_noprof+0x189/0x420
[   15.477856]  kasan_atomics+0x95/0x310
[   15.478043]  kunit_try_run_case+0x1a5/0x480
[   15.478494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.478840]  kthread+0x337/0x6f0
[   15.479214]  ret_from_fork+0x116/0x1d0
[   15.479409]  ret_from_fork_asm+0x1a/0x30
[   15.479600] 
[   15.479694] The buggy address belongs to the object at ffff888103a18380
[   15.479694]  which belongs to the cache kmalloc-64 of size 64
[   15.480445] The buggy address is located 0 bytes to the right of
[   15.480445]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.481361] 
[   15.481579] The buggy address belongs to the physical page:
[   15.481951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.482688] flags: 0x200000000000000(node=0|zone=2)
[   15.483164] page_type: f5(slab)
[   15.483418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.483924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.484375] page dumped because: kasan: bad access detected
[   15.484614] 
[   15.484707] Memory state around the buggy address:
[   15.484920]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.485492]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.486091] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.486583]                                      ^
[   15.487053]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.487407]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.487709] ==================================================================
[   14.247487] ==================================================================
[   14.248008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.248461] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.248880] 
[   14.248987] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.249034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.249048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.249073] Call Trace:
[   14.249090]  <TASK>
[   14.249107]  dump_stack_lvl+0x73/0xb0
[   14.249136]  print_report+0xd1/0x650
[   14.249159]  ? __virt_addr_valid+0x1db/0x2d0
[   14.249184]  ? kasan_atomics_helper+0x697/0x5450
[   14.249207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.249230]  ? kasan_atomics_helper+0x697/0x5450
[   14.249254]  kasan_report+0x141/0x180
[   14.249278]  ? kasan_atomics_helper+0x697/0x5450
[   14.249306]  kasan_check_range+0x10c/0x1c0
[   14.249331]  __kasan_check_write+0x18/0x20
[   14.249352]  kasan_atomics_helper+0x697/0x5450
[   14.249376]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.249399]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.249425]  ? kasan_save_alloc_info+0x3b/0x50
[   14.249449]  ? kasan_atomics+0x152/0x310
[   14.249478]  kasan_atomics+0x1dc/0x310
[   14.249502]  ? __pfx_kasan_atomics+0x10/0x10
[   14.249529]  ? __pfx_read_tsc+0x10/0x10
[   14.249551]  ? ktime_get_ts64+0x86/0x230
[   14.249576]  kunit_try_run_case+0x1a5/0x480
[   14.249600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.249624]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.249648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.249674]  ? __kthread_parkme+0x82/0x180
[   14.249695]  ? preempt_count_sub+0x50/0x80
[   14.249720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.249746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.249770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.249795]  kthread+0x337/0x6f0
[   14.249816]  ? trace_preempt_on+0x20/0xc0
[   14.249841]  ? __pfx_kthread+0x10/0x10
[   14.249862]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.249885]  ? calculate_sigpending+0x7b/0xa0
[   14.249910]  ? __pfx_kthread+0x10/0x10
[   14.249933]  ret_from_fork+0x116/0x1d0
[   14.249963]  ? __pfx_kthread+0x10/0x10
[   14.249985]  ret_from_fork_asm+0x1a/0x30
[   14.250017]  </TASK>
[   14.250030] 
[   14.257971] Allocated by task 282:
[   14.258274]  kasan_save_stack+0x45/0x70
[   14.258541]  kasan_save_track+0x18/0x40
[   14.258747]  kasan_save_alloc_info+0x3b/0x50
[   14.258974]  __kasan_kmalloc+0xb7/0xc0
[   14.259243]  __kmalloc_cache_noprof+0x189/0x420
[   14.259468]  kasan_atomics+0x95/0x310
[   14.259667]  kunit_try_run_case+0x1a5/0x480
[   14.260016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.260271]  kthread+0x337/0x6f0
[   14.260422]  ret_from_fork+0x116/0x1d0
[   14.260558]  ret_from_fork_asm+0x1a/0x30
[   14.260701] 
[   14.260773] The buggy address belongs to the object at ffff888103a18380
[   14.260773]  which belongs to the cache kmalloc-64 of size 64
[   14.261123] The buggy address is located 0 bytes to the right of
[   14.261123]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.261475] 
[   14.261548] The buggy address belongs to the physical page:
[   14.261754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.262386] flags: 0x200000000000000(node=0|zone=2)
[   14.262809] page_type: f5(slab)
[   14.263001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.263546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.264003] page dumped because: kasan: bad access detected
[   14.264604] 
[   14.264759] Memory state around the buggy address:
[   14.265043]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.265378]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.265965] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.266356]                                      ^
[   14.266738]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.267231]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.267667] ==================================================================
[   14.462395] ==================================================================
[   14.463072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.463426] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.463776] 
[   14.463889] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.463934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.463958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.463981] Call Trace:
[   14.463998]  <TASK>
[   14.464014]  dump_stack_lvl+0x73/0xb0
[   14.464045]  print_report+0xd1/0x650
[   14.464086]  ? __virt_addr_valid+0x1db/0x2d0
[   14.464111]  ? kasan_atomics_helper+0xc70/0x5450
[   14.464133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.464157]  ? kasan_atomics_helper+0xc70/0x5450
[   14.464180]  kasan_report+0x141/0x180
[   14.464204]  ? kasan_atomics_helper+0xc70/0x5450
[   14.464232]  kasan_check_range+0x10c/0x1c0
[   14.464257]  __kasan_check_write+0x18/0x20
[   14.464278]  kasan_atomics_helper+0xc70/0x5450
[   14.464301]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.464325]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.464351]  ? kasan_save_alloc_info+0x3b/0x50
[   14.464374]  ? kasan_atomics+0x152/0x310
[   14.464403]  kasan_atomics+0x1dc/0x310
[   14.464426]  ? __pfx_kasan_atomics+0x10/0x10
[   14.464452]  ? __pfx_read_tsc+0x10/0x10
[   14.464474]  ? ktime_get_ts64+0x86/0x230
[   14.464500]  kunit_try_run_case+0x1a5/0x480
[   14.464525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.464548]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.464572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.464597]  ? __kthread_parkme+0x82/0x180
[   14.464618]  ? preempt_count_sub+0x50/0x80
[   14.464643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.464667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.464691]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.464716]  kthread+0x337/0x6f0
[   14.464736]  ? trace_preempt_on+0x20/0xc0
[   14.464760]  ? __pfx_kthread+0x10/0x10
[   14.464783]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.464804]  ? calculate_sigpending+0x7b/0xa0
[   14.464829]  ? __pfx_kthread+0x10/0x10
[   14.464852]  ret_from_fork+0x116/0x1d0
[   14.464871]  ? __pfx_kthread+0x10/0x10
[   14.464894]  ret_from_fork_asm+0x1a/0x30
[   14.464926]  </TASK>
[   14.464948] 
[   14.472932] Allocated by task 282:
[   14.473190]  kasan_save_stack+0x45/0x70
[   14.473395]  kasan_save_track+0x18/0x40
[   14.473893]  kasan_save_alloc_info+0x3b/0x50
[   14.474215]  __kasan_kmalloc+0xb7/0xc0
[   14.474368]  __kmalloc_cache_noprof+0x189/0x420
[   14.474727]  kasan_atomics+0x95/0x310
[   14.474918]  kunit_try_run_case+0x1a5/0x480
[   14.475168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.475355]  kthread+0x337/0x6f0
[   14.475478]  ret_from_fork+0x116/0x1d0
[   14.475614]  ret_from_fork_asm+0x1a/0x30
[   14.475806] 
[   14.475906] The buggy address belongs to the object at ffff888103a18380
[   14.475906]  which belongs to the cache kmalloc-64 of size 64
[   14.476418] The buggy address is located 0 bytes to the right of
[   14.476418]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.477257] 
[   14.477359] The buggy address belongs to the physical page:
[   14.477750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.478014] flags: 0x200000000000000(node=0|zone=2)
[   14.478182] page_type: f5(slab)
[   14.478450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.478796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.479154] page dumped because: kasan: bad access detected
[   14.479411] 
[   14.479508] Memory state around the buggy address:
[   14.479839]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.480190]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.480582] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.480830]                                      ^
[   14.480998]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.481772]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.482045] ==================================================================
[   15.183340] ==================================================================
[   15.183826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.184375] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.184747] 
[   15.184844] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.184886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.184900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.184922] Call Trace:
[   15.184949]  <TASK>
[   15.184963]  dump_stack_lvl+0x73/0xb0
[   15.184993]  print_report+0xd1/0x650
[   15.185016]  ? __virt_addr_valid+0x1db/0x2d0
[   15.185039]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.185061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.185097]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.185121]  kasan_report+0x141/0x180
[   15.185144]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.185173]  __asan_report_load8_noabort+0x18/0x20
[   15.185198]  kasan_atomics_helper+0x4f30/0x5450
[   15.185223]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.185246]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.185273]  ? kasan_save_alloc_info+0x3b/0x50
[   15.185298]  ? kasan_atomics+0x152/0x310
[   15.185326]  kasan_atomics+0x1dc/0x310
[   15.185351]  ? __pfx_kasan_atomics+0x10/0x10
[   15.185377]  ? __pfx_read_tsc+0x10/0x10
[   15.185400]  ? ktime_get_ts64+0x86/0x230
[   15.185427]  kunit_try_run_case+0x1a5/0x480
[   15.185453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.185478]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.185504]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.185531]  ? __kthread_parkme+0x82/0x180
[   15.185552]  ? preempt_count_sub+0x50/0x80
[   15.185578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.185604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.185628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.185653]  kthread+0x337/0x6f0
[   15.185676]  ? trace_preempt_on+0x20/0xc0
[   15.185701]  ? __pfx_kthread+0x10/0x10
[   15.185724]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.185746]  ? calculate_sigpending+0x7b/0xa0
[   15.185772]  ? __pfx_kthread+0x10/0x10
[   15.185794]  ret_from_fork+0x116/0x1d0
[   15.185814]  ? __pfx_kthread+0x10/0x10
[   15.185837]  ret_from_fork_asm+0x1a/0x30
[   15.185868]  </TASK>
[   15.185882] 
[   15.193383] Allocated by task 282:
[   15.193572]  kasan_save_stack+0x45/0x70
[   15.193775]  kasan_save_track+0x18/0x40
[   15.193955]  kasan_save_alloc_info+0x3b/0x50
[   15.194178]  __kasan_kmalloc+0xb7/0xc0
[   15.194316]  __kmalloc_cache_noprof+0x189/0x420
[   15.194542]  kasan_atomics+0x95/0x310
[   15.194734]  kunit_try_run_case+0x1a5/0x480
[   15.194883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.195069]  kthread+0x337/0x6f0
[   15.195264]  ret_from_fork+0x116/0x1d0
[   15.195458]  ret_from_fork_asm+0x1a/0x30
[   15.195658] 
[   15.195757] The buggy address belongs to the object at ffff888103a18380
[   15.195757]  which belongs to the cache kmalloc-64 of size 64
[   15.196158] The buggy address is located 0 bytes to the right of
[   15.196158]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.196725] 
[   15.196826] The buggy address belongs to the physical page:
[   15.197114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.197404] flags: 0x200000000000000(node=0|zone=2)
[   15.197620] page_type: f5(slab)
[   15.197792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.198133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.198375] page dumped because: kasan: bad access detected
[   15.198550] 
[   15.198624] Memory state around the buggy address:
[   15.198780]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.199110]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.199441] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.199755]                                      ^
[   15.199913]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.200138]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.200354] ==================================================================
[   15.120293] ==================================================================
[   15.121400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.121662] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.121893] 
[   15.121998] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.122043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.122065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.122086] Call Trace:
[   15.122104]  <TASK>
[   15.122122]  dump_stack_lvl+0x73/0xb0
[   15.122152]  print_report+0xd1/0x650
[   15.122175]  ? __virt_addr_valid+0x1db/0x2d0
[   15.122199]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.122223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.122247]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.122270]  kasan_report+0x141/0x180
[   15.122293]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.122321]  kasan_check_range+0x10c/0x1c0
[   15.122347]  __kasan_check_write+0x18/0x20
[   15.122368]  kasan_atomics_helper+0x1a7f/0x5450
[   15.122392]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.122415]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.122441]  ? kasan_save_alloc_info+0x3b/0x50
[   15.122466]  ? kasan_atomics+0x152/0x310
[   15.122494]  kasan_atomics+0x1dc/0x310
[   15.122518]  ? __pfx_kasan_atomics+0x10/0x10
[   15.122543]  ? __pfx_read_tsc+0x10/0x10
[   15.122565]  ? ktime_get_ts64+0x86/0x230
[   15.122591]  kunit_try_run_case+0x1a5/0x480
[   15.122617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.122642]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.122667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.122691]  ? __kthread_parkme+0x82/0x180
[   15.122713]  ? preempt_count_sub+0x50/0x80
[   15.122739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.122765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.122789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.122814]  kthread+0x337/0x6f0
[   15.122836]  ? trace_preempt_on+0x20/0xc0
[   15.122860]  ? __pfx_kthread+0x10/0x10
[   15.122882]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.122905]  ? calculate_sigpending+0x7b/0xa0
[   15.122929]  ? __pfx_kthread+0x10/0x10
[   15.123262]  ret_from_fork+0x116/0x1d0
[   15.123287]  ? __pfx_kthread+0x10/0x10
[   15.123312]  ret_from_fork_asm+0x1a/0x30
[   15.123526]  </TASK>
[   15.123551] 
[   15.136193] Allocated by task 282:
[   15.136517]  kasan_save_stack+0x45/0x70
[   15.136793]  kasan_save_track+0x18/0x40
[   15.136990]  kasan_save_alloc_info+0x3b/0x50
[   15.137336]  __kasan_kmalloc+0xb7/0xc0
[   15.137489]  __kmalloc_cache_noprof+0x189/0x420
[   15.137828]  kasan_atomics+0x95/0x310
[   15.138036]  kunit_try_run_case+0x1a5/0x480
[   15.138338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.138664]  kthread+0x337/0x6f0
[   15.138829]  ret_from_fork+0x116/0x1d0
[   15.139161]  ret_from_fork_asm+0x1a/0x30
[   15.139400] 
[   15.139486] The buggy address belongs to the object at ffff888103a18380
[   15.139486]  which belongs to the cache kmalloc-64 of size 64
[   15.140002] The buggy address is located 0 bytes to the right of
[   15.140002]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.140764] 
[   15.140987] The buggy address belongs to the physical page:
[   15.141231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.141726] flags: 0x200000000000000(node=0|zone=2)
[   15.142014] page_type: f5(slab)
[   15.142237] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.142661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.142991] page dumped because: kasan: bad access detected
[   15.143398] 
[   15.143480] Memory state around the buggy address:
[   15.143827]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.144174]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.144561] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.144922]                                      ^
[   15.145172]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.145470]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.145765] ==================================================================
[   14.422709] ==================================================================
[   14.423058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.423406] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.423699] 
[   14.423983] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.424032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.424046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.424069] Call Trace:
[   14.424085]  <TASK>
[   14.424102]  dump_stack_lvl+0x73/0xb0
[   14.424132]  print_report+0xd1/0x650
[   14.424156]  ? __virt_addr_valid+0x1db/0x2d0
[   14.424180]  ? kasan_atomics_helper+0xac7/0x5450
[   14.424201]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.424225]  ? kasan_atomics_helper+0xac7/0x5450
[   14.424248]  kasan_report+0x141/0x180
[   14.424272]  ? kasan_atomics_helper+0xac7/0x5450
[   14.424299]  kasan_check_range+0x10c/0x1c0
[   14.424325]  __kasan_check_write+0x18/0x20
[   14.424345]  kasan_atomics_helper+0xac7/0x5450
[   14.424369]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.424392]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.424417]  ? kasan_save_alloc_info+0x3b/0x50
[   14.424442]  ? kasan_atomics+0x152/0x310
[   14.424471]  kasan_atomics+0x1dc/0x310
[   14.424498]  ? __pfx_kasan_atomics+0x10/0x10
[   14.424526]  ? __pfx_read_tsc+0x10/0x10
[   14.424548]  ? ktime_get_ts64+0x86/0x230
[   14.424573]  kunit_try_run_case+0x1a5/0x480
[   14.424598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.424622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.424647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.424671]  ? __kthread_parkme+0x82/0x180
[   14.424746]  ? preempt_count_sub+0x50/0x80
[   14.424775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.424801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.424825]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.424849]  kthread+0x337/0x6f0
[   14.424871]  ? trace_preempt_on+0x20/0xc0
[   14.424895]  ? __pfx_kthread+0x10/0x10
[   14.424917]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.424950]  ? calculate_sigpending+0x7b/0xa0
[   14.424976]  ? __pfx_kthread+0x10/0x10
[   14.424999]  ret_from_fork+0x116/0x1d0
[   14.425019]  ? __pfx_kthread+0x10/0x10
[   14.425041]  ret_from_fork_asm+0x1a/0x30
[   14.425083]  </TASK>
[   14.425096] 
[   14.433760] Allocated by task 282:
[   14.433962]  kasan_save_stack+0x45/0x70
[   14.434171]  kasan_save_track+0x18/0x40
[   14.434331]  kasan_save_alloc_info+0x3b/0x50
[   14.434633]  __kasan_kmalloc+0xb7/0xc0
[   14.434832]  __kmalloc_cache_noprof+0x189/0x420
[   14.435049]  kasan_atomics+0x95/0x310
[   14.435234]  kunit_try_run_case+0x1a5/0x480
[   14.435417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.435827]  kthread+0x337/0x6f0
[   14.436034]  ret_from_fork+0x116/0x1d0
[   14.436191]  ret_from_fork_asm+0x1a/0x30
[   14.436400] 
[   14.436502] The buggy address belongs to the object at ffff888103a18380
[   14.436502]  which belongs to the cache kmalloc-64 of size 64
[   14.437051] The buggy address is located 0 bytes to the right of
[   14.437051]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.437552] 
[   14.437700] The buggy address belongs to the physical page:
[   14.437902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.438303] flags: 0x200000000000000(node=0|zone=2)
[   14.438571] page_type: f5(slab)
[   14.438698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.439039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.439390] page dumped because: kasan: bad access detected
[   14.439569] 
[   14.439642] Memory state around the buggy address:
[   14.439800]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.440031]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.440330] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.441060]                                      ^
[   14.441314]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.441670]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.441965] ==================================================================
[   14.772800] ==================================================================
[   14.773249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.773622] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.773846] 
[   14.773931] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.773984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.773999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.774022] Call Trace:
[   14.774039]  <TASK>
[   14.774057]  dump_stack_lvl+0x73/0xb0
[   14.774084]  print_report+0xd1/0x650
[   14.774109]  ? __virt_addr_valid+0x1db/0x2d0
[   14.774131]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.774165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.774189]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.774213]  kasan_report+0x141/0x180
[   14.774236]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.774264]  __asan_report_load4_noabort+0x18/0x20
[   14.774290]  kasan_atomics_helper+0x49e8/0x5450
[   14.774314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.774339]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.774364]  ? kasan_save_alloc_info+0x3b/0x50
[   14.774389]  ? kasan_atomics+0x152/0x310
[   14.774417]  kasan_atomics+0x1dc/0x310
[   14.774442]  ? __pfx_kasan_atomics+0x10/0x10
[   14.774468]  ? __pfx_read_tsc+0x10/0x10
[   14.774489]  ? ktime_get_ts64+0x86/0x230
[   14.774514]  kunit_try_run_case+0x1a5/0x480
[   14.774540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.774563]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.774587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.774612]  ? __kthread_parkme+0x82/0x180
[   14.774634]  ? preempt_count_sub+0x50/0x80
[   14.774659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.774684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.774710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.774735]  kthread+0x337/0x6f0
[   14.774756]  ? trace_preempt_on+0x20/0xc0
[   14.774780]  ? __pfx_kthread+0x10/0x10
[   14.774802]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.774825]  ? calculate_sigpending+0x7b/0xa0
[   14.774851]  ? __pfx_kthread+0x10/0x10
[   14.774874]  ret_from_fork+0x116/0x1d0
[   14.774894]  ? __pfx_kthread+0x10/0x10
[   14.774916]  ret_from_fork_asm+0x1a/0x30
[   14.774957]  </TASK>
[   14.774970] 
[   14.782591] Allocated by task 282:
[   14.782775]  kasan_save_stack+0x45/0x70
[   14.783003]  kasan_save_track+0x18/0x40
[   14.783453]  kasan_save_alloc_info+0x3b/0x50
[   14.783652]  __kasan_kmalloc+0xb7/0xc0
[   14.783784]  __kmalloc_cache_noprof+0x189/0x420
[   14.783950]  kasan_atomics+0x95/0x310
[   14.784086]  kunit_try_run_case+0x1a5/0x480
[   14.784231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.785593]  kthread+0x337/0x6f0
[   14.785775]  ret_from_fork+0x116/0x1d0
[   14.785977]  ret_from_fork_asm+0x1a/0x30
[   14.786540] 
[   14.786649] The buggy address belongs to the object at ffff888103a18380
[   14.786649]  which belongs to the cache kmalloc-64 of size 64
[   14.787699] The buggy address is located 0 bytes to the right of
[   14.787699]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.788652] 
[   14.788767] The buggy address belongs to the physical page:
[   14.789373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.789901] flags: 0x200000000000000(node=0|zone=2)
[   14.790354] page_type: f5(slab)
[   14.790645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.790990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.791544] page dumped because: kasan: bad access detected
[   14.791979] 
[   14.792235] Memory state around the buggy address:
[   14.792463]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.792775]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.793083] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.793381]                                      ^
[   14.793591]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.793884]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.794554] ==================================================================
[   15.228914] ==================================================================
[   15.229268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.230091] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.230416] 
[   15.230532] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.230581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.230595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.230619] Call Trace:
[   15.230638]  <TASK>
[   15.230656]  dump_stack_lvl+0x73/0xb0
[   15.230685]  print_report+0xd1/0x650
[   15.230709]  ? __virt_addr_valid+0x1db/0x2d0
[   15.230733]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.230756]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.230780]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.230803]  kasan_report+0x141/0x180
[   15.230826]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.230854]  kasan_check_range+0x10c/0x1c0
[   15.230879]  __kasan_check_write+0x18/0x20
[   15.230899]  kasan_atomics_helper+0x1d7a/0x5450
[   15.230927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.230964]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.230989]  ? kasan_save_alloc_info+0x3b/0x50
[   15.231014]  ? kasan_atomics+0x152/0x310
[   15.231043]  kasan_atomics+0x1dc/0x310
[   15.231068]  ? __pfx_kasan_atomics+0x10/0x10
[   15.231093]  ? __pfx_read_tsc+0x10/0x10
[   15.231120]  ? ktime_get_ts64+0x86/0x230
[   15.231145]  kunit_try_run_case+0x1a5/0x480
[   15.231171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.231194]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.231220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.231244]  ? __kthread_parkme+0x82/0x180
[   15.231266]  ? preempt_count_sub+0x50/0x80
[   15.231291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.231318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.231342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.231367]  kthread+0x337/0x6f0
[   15.231389]  ? trace_preempt_on+0x20/0xc0
[   15.231413]  ? __pfx_kthread+0x10/0x10
[   15.231435]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.231458]  ? calculate_sigpending+0x7b/0xa0
[   15.231483]  ? __pfx_kthread+0x10/0x10
[   15.231506]  ret_from_fork+0x116/0x1d0
[   15.231526]  ? __pfx_kthread+0x10/0x10
[   15.231548]  ret_from_fork_asm+0x1a/0x30
[   15.231580]  </TASK>
[   15.231592] 
[   15.239347] Allocated by task 282:
[   15.239485]  kasan_save_stack+0x45/0x70
[   15.239628]  kasan_save_track+0x18/0x40
[   15.239820]  kasan_save_alloc_info+0x3b/0x50
[   15.240074]  __kasan_kmalloc+0xb7/0xc0
[   15.240396]  __kmalloc_cache_noprof+0x189/0x420
[   15.240554]  kasan_atomics+0x95/0x310
[   15.240690]  kunit_try_run_case+0x1a5/0x480
[   15.240838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.241066]  kthread+0x337/0x6f0
[   15.241239]  ret_from_fork+0x116/0x1d0
[   15.241434]  ret_from_fork_asm+0x1a/0x30
[   15.241660] 
[   15.241770] The buggy address belongs to the object at ffff888103a18380
[   15.241770]  which belongs to the cache kmalloc-64 of size 64
[   15.242465] The buggy address is located 0 bytes to the right of
[   15.242465]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.242960] 
[   15.243060] The buggy address belongs to the physical page:
[   15.243336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.243676] flags: 0x200000000000000(node=0|zone=2)
[   15.243846] page_type: f5(slab)
[   15.243990] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.244335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.244840] page dumped because: kasan: bad access detected
[   15.245090] 
[   15.245192] Memory state around the buggy address:
[   15.245363]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.245583]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.245837] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.246195]                                      ^
[   15.246578]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246948]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.247238] ==================================================================
[   15.146853] ==================================================================
[   15.147226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.147690] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.148264] 
[   15.148472] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.148523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.148538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.148562] Call Trace:
[   15.148582]  <TASK>
[   15.148600]  dump_stack_lvl+0x73/0xb0
[   15.148631]  print_report+0xd1/0x650
[   15.148655]  ? __virt_addr_valid+0x1db/0x2d0
[   15.148678]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.148703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.148727]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.148751]  kasan_report+0x141/0x180
[   15.148775]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.148803]  kasan_check_range+0x10c/0x1c0
[   15.148828]  __kasan_check_write+0x18/0x20
[   15.148849]  kasan_atomics_helper+0x1b22/0x5450
[   15.148873]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.148896]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.148922]  ? kasan_save_alloc_info+0x3b/0x50
[   15.148960]  ? kasan_atomics+0x152/0x310
[   15.148988]  kasan_atomics+0x1dc/0x310
[   15.149012]  ? __pfx_kasan_atomics+0x10/0x10
[   15.149038]  ? __pfx_read_tsc+0x10/0x10
[   15.149059]  ? ktime_get_ts64+0x86/0x230
[   15.149086]  kunit_try_run_case+0x1a5/0x480
[   15.149112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.149136]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.149160]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.149185]  ? __kthread_parkme+0x82/0x180
[   15.149206]  ? preempt_count_sub+0x50/0x80
[   15.149231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.149257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.149281]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.149306]  kthread+0x337/0x6f0
[   15.149327]  ? trace_preempt_on+0x20/0xc0
[   15.149351]  ? __pfx_kthread+0x10/0x10
[   15.149374]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.149396]  ? calculate_sigpending+0x7b/0xa0
[   15.149422]  ? __pfx_kthread+0x10/0x10
[   15.149444]  ret_from_fork+0x116/0x1d0
[   15.149464]  ? __pfx_kthread+0x10/0x10
[   15.149486]  ret_from_fork_asm+0x1a/0x30
[   15.149518]  </TASK>
[   15.149531] 
[   15.157287] Allocated by task 282:
[   15.157490]  kasan_save_stack+0x45/0x70
[   15.157662]  kasan_save_track+0x18/0x40
[   15.157802]  kasan_save_alloc_info+0x3b/0x50
[   15.157968]  __kasan_kmalloc+0xb7/0xc0
[   15.158230]  __kmalloc_cache_noprof+0x189/0x420
[   15.158456]  kasan_atomics+0x95/0x310
[   15.158646]  kunit_try_run_case+0x1a5/0x480
[   15.158841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.159122]  kthread+0x337/0x6f0
[   15.159265]  ret_from_fork+0x116/0x1d0
[   15.159457]  ret_from_fork_asm+0x1a/0x30
[   15.159613] 
[   15.159712] The buggy address belongs to the object at ffff888103a18380
[   15.159712]  which belongs to the cache kmalloc-64 of size 64
[   15.160250] The buggy address is located 0 bytes to the right of
[   15.160250]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.160619] 
[   15.160695] The buggy address belongs to the physical page:
[   15.160934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.161304] flags: 0x200000000000000(node=0|zone=2)
[   15.161542] page_type: f5(slab)
[   15.161710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.162319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.162564] page dumped because: kasan: bad access detected
[   15.162736] 
[   15.162810] Memory state around the buggy address:
[   15.163045]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.163389]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.163694] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.163990]                                      ^
[   15.164273]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164557]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164843] ==================================================================
[   15.098690] ==================================================================
[   15.099463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.099757] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.100238] 
[   15.100570] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.100620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.100633] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.100657] Call Trace:
[   15.100746]  <TASK>
[   15.100766]  dump_stack_lvl+0x73/0xb0
[   15.100798]  print_report+0xd1/0x650
[   15.100824]  ? __virt_addr_valid+0x1db/0x2d0
[   15.100849]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.100873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.100897]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.100920]  kasan_report+0x141/0x180
[   15.100959]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.101011]  kasan_check_range+0x10c/0x1c0
[   15.101038]  __kasan_check_write+0x18/0x20
[   15.101059]  kasan_atomics_helper+0x19e3/0x5450
[   15.101112]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.101137]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.101163]  ? kasan_save_alloc_info+0x3b/0x50
[   15.101206]  ? kasan_atomics+0x152/0x310
[   15.101235]  kasan_atomics+0x1dc/0x310
[   15.101259]  ? __pfx_kasan_atomics+0x10/0x10
[   15.101285]  ? __pfx_read_tsc+0x10/0x10
[   15.101308]  ? ktime_get_ts64+0x86/0x230
[   15.101334]  kunit_try_run_case+0x1a5/0x480
[   15.101359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.101383]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.101408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.101433]  ? __kthread_parkme+0x82/0x180
[   15.101454]  ? preempt_count_sub+0x50/0x80
[   15.101479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.101520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.101545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.101570]  kthread+0x337/0x6f0
[   15.101592]  ? trace_preempt_on+0x20/0xc0
[   15.101616]  ? __pfx_kthread+0x10/0x10
[   15.101638]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.101661]  ? calculate_sigpending+0x7b/0xa0
[   15.101687]  ? __pfx_kthread+0x10/0x10
[   15.101710]  ret_from_fork+0x116/0x1d0
[   15.101731]  ? __pfx_kthread+0x10/0x10
[   15.101753]  ret_from_fork_asm+0x1a/0x30
[   15.101786]  </TASK>
[   15.101798] 
[   15.109686] Allocated by task 282:
[   15.109823]  kasan_save_stack+0x45/0x70
[   15.110047]  kasan_save_track+0x18/0x40
[   15.110255]  kasan_save_alloc_info+0x3b/0x50
[   15.110496]  __kasan_kmalloc+0xb7/0xc0
[   15.110706]  __kmalloc_cache_noprof+0x189/0x420
[   15.110957]  kasan_atomics+0x95/0x310
[   15.111134]  kunit_try_run_case+0x1a5/0x480
[   15.111360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.111604]  kthread+0x337/0x6f0
[   15.111751]  ret_from_fork+0x116/0x1d0
[   15.111980]  ret_from_fork_asm+0x1a/0x30
[   15.112232] 
[   15.112341] The buggy address belongs to the object at ffff888103a18380
[   15.112341]  which belongs to the cache kmalloc-64 of size 64
[   15.112822] The buggy address is located 0 bytes to the right of
[   15.112822]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.113387] 
[   15.113495] The buggy address belongs to the physical page:
[   15.113733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.114047] flags: 0x200000000000000(node=0|zone=2)
[   15.114214] page_type: f5(slab)
[   15.114341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.114933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.115299] page dumped because: kasan: bad access detected
[   15.115672] 
[   15.115748] Memory state around the buggy address:
[   15.115904]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.116242]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.116569] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.116917]                                      ^
[   15.117081]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.117299]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.118086] ==================================================================
[   14.635719] ==================================================================
[   14.636073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.636441] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.637022] 
[   14.637258] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.637324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.637339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.637362] Call Trace:
[   14.637381]  <TASK>
[   14.637411]  dump_stack_lvl+0x73/0xb0
[   14.637441]  print_report+0xd1/0x650
[   14.637519]  ? __virt_addr_valid+0x1db/0x2d0
[   14.637547]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.637604]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.637629]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.637663]  kasan_report+0x141/0x180
[   14.637687]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.637732]  __asan_report_load4_noabort+0x18/0x20
[   14.637767]  kasan_atomics_helper+0x4a36/0x5450
[   14.637792]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.637825]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.637851]  ? kasan_save_alloc_info+0x3b/0x50
[   14.637876]  ? kasan_atomics+0x152/0x310
[   14.637904]  kasan_atomics+0x1dc/0x310
[   14.637928]  ? __pfx_kasan_atomics+0x10/0x10
[   14.637964]  ? __pfx_read_tsc+0x10/0x10
[   14.638012]  ? ktime_get_ts64+0x86/0x230
[   14.638039]  kunit_try_run_case+0x1a5/0x480
[   14.638064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.638098]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.638122]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.638163]  ? __kthread_parkme+0x82/0x180
[   14.638193]  ? preempt_count_sub+0x50/0x80
[   14.638218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.638242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.638277]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.638302]  kthread+0x337/0x6f0
[   14.638323]  ? trace_preempt_on+0x20/0xc0
[   14.638347]  ? __pfx_kthread+0x10/0x10
[   14.638370]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.638392]  ? calculate_sigpending+0x7b/0xa0
[   14.638417]  ? __pfx_kthread+0x10/0x10
[   14.638440]  ret_from_fork+0x116/0x1d0
[   14.638460]  ? __pfx_kthread+0x10/0x10
[   14.638491]  ret_from_fork_asm+0x1a/0x30
[   14.638524]  </TASK>
[   14.638537] 
[   14.653437] Allocated by task 282:
[   14.653849]  kasan_save_stack+0x45/0x70
[   14.654286]  kasan_save_track+0x18/0x40
[   14.654726]  kasan_save_alloc_info+0x3b/0x50
[   14.655085]  __kasan_kmalloc+0xb7/0xc0
[   14.655238]  __kmalloc_cache_noprof+0x189/0x420
[   14.655736]  kasan_atomics+0x95/0x310
[   14.656198]  kunit_try_run_case+0x1a5/0x480
[   14.656354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.656701]  kthread+0x337/0x6f0
[   14.657131]  ret_from_fork+0x116/0x1d0
[   14.657564]  ret_from_fork_asm+0x1a/0x30
[   14.657949] 
[   14.658165] The buggy address belongs to the object at ffff888103a18380
[   14.658165]  which belongs to the cache kmalloc-64 of size 64
[   14.659220] The buggy address is located 0 bytes to the right of
[   14.659220]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.659923] 
[   14.660102] The buggy address belongs to the physical page:
[   14.660672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.661691] flags: 0x200000000000000(node=0|zone=2)
[   14.661869] page_type: f5(slab)
[   14.662009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.662452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.663269] page dumped because: kasan: bad access detected
[   14.663861] 
[   14.664048] Memory state around the buggy address:
[   14.664720]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.665557]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.666030] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.666548]                                      ^
[   14.667080]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.667576]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.668228] ==================================================================
[   14.717562] ==================================================================
[   14.717996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.718710] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.719036] 
[   14.719142] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.719201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.719215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.719239] Call Trace:
[   14.719254]  <TASK>
[   14.719270]  dump_stack_lvl+0x73/0xb0
[   14.719299]  print_report+0xd1/0x650
[   14.719322]  ? __virt_addr_valid+0x1db/0x2d0
[   14.719346]  ? kasan_atomics_helper+0x1148/0x5450
[   14.719369]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.719392]  ? kasan_atomics_helper+0x1148/0x5450
[   14.719415]  kasan_report+0x141/0x180
[   14.719439]  ? kasan_atomics_helper+0x1148/0x5450
[   14.719467]  kasan_check_range+0x10c/0x1c0
[   14.719492]  __kasan_check_write+0x18/0x20
[   14.719512]  kasan_atomics_helper+0x1148/0x5450
[   14.719536]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.719560]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.719584]  ? kasan_save_alloc_info+0x3b/0x50
[   14.719609]  ? kasan_atomics+0x152/0x310
[   14.719637]  kasan_atomics+0x1dc/0x310
[   14.719660]  ? __pfx_kasan_atomics+0x10/0x10
[   14.719687]  ? __pfx_read_tsc+0x10/0x10
[   14.719710]  ? ktime_get_ts64+0x86/0x230
[   14.719735]  kunit_try_run_case+0x1a5/0x480
[   14.719760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.719784]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.719809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.719833]  ? __kthread_parkme+0x82/0x180
[   14.719855]  ? preempt_count_sub+0x50/0x80
[   14.719879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.719905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.719929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.719964]  kthread+0x337/0x6f0
[   14.719985]  ? trace_preempt_on+0x20/0xc0
[   14.720010]  ? __pfx_kthread+0x10/0x10
[   14.720032]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.720055]  ? calculate_sigpending+0x7b/0xa0
[   14.720080]  ? __pfx_kthread+0x10/0x10
[   14.720102]  ret_from_fork+0x116/0x1d0
[   14.720122]  ? __pfx_kthread+0x10/0x10
[   14.720144]  ret_from_fork_asm+0x1a/0x30
[   14.720188]  </TASK>
[   14.720209] 
[   14.728245] Allocated by task 282:
[   14.728430]  kasan_save_stack+0x45/0x70
[   14.728605]  kasan_save_track+0x18/0x40
[   14.728743]  kasan_save_alloc_info+0x3b/0x50
[   14.728894]  __kasan_kmalloc+0xb7/0xc0
[   14.729085]  __kmalloc_cache_noprof+0x189/0x420
[   14.729317]  kasan_atomics+0x95/0x310
[   14.729612]  kunit_try_run_case+0x1a5/0x480
[   14.729758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.729933]  kthread+0x337/0x6f0
[   14.730063]  ret_from_fork+0x116/0x1d0
[   14.730195]  ret_from_fork_asm+0x1a/0x30
[   14.730435] 
[   14.730534] The buggy address belongs to the object at ffff888103a18380
[   14.730534]  which belongs to the cache kmalloc-64 of size 64
[   14.731072] The buggy address is located 0 bytes to the right of
[   14.731072]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.731556] 
[   14.731631] The buggy address belongs to the physical page:
[   14.731805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.732319] flags: 0x200000000000000(node=0|zone=2)
[   14.732559] page_type: f5(slab)
[   14.732735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.733095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.733395] page dumped because: kasan: bad access detected
[   14.733627] 
[   14.733726] Memory state around the buggy address:
[   14.733931]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.734230]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.734501] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.734806]                                      ^
[   14.735049]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.735334]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.735587] ==================================================================
[   15.265979] ==================================================================
[   15.266443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.266808] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.267178] 
[   15.267286] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.267329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.267342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.267365] Call Trace:
[   15.267381]  <TASK>
[   15.267397]  dump_stack_lvl+0x73/0xb0
[   15.267437]  print_report+0xd1/0x650
[   15.267469]  ? __virt_addr_valid+0x1db/0x2d0
[   15.267492]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.267515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.267539]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.267563]  kasan_report+0x141/0x180
[   15.267586]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.267613]  kasan_check_range+0x10c/0x1c0
[   15.267638]  __kasan_check_write+0x18/0x20
[   15.267659]  kasan_atomics_helper+0x1eaa/0x5450
[   15.267684]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.267707]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.267732]  ? kasan_save_alloc_info+0x3b/0x50
[   15.267757]  ? kasan_atomics+0x152/0x310
[   15.267785]  kasan_atomics+0x1dc/0x310
[   15.267809]  ? __pfx_kasan_atomics+0x10/0x10
[   15.267836]  ? __pfx_read_tsc+0x10/0x10
[   15.267858]  ? ktime_get_ts64+0x86/0x230
[   15.267884]  kunit_try_run_case+0x1a5/0x480
[   15.267910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.267933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.267969]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.267994]  ? __kthread_parkme+0x82/0x180
[   15.268015]  ? preempt_count_sub+0x50/0x80
[   15.268040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.268065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.268090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.268114]  kthread+0x337/0x6f0
[   15.268136]  ? trace_preempt_on+0x20/0xc0
[   15.268160]  ? __pfx_kthread+0x10/0x10
[   15.268183]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.268206]  ? calculate_sigpending+0x7b/0xa0
[   15.268231]  ? __pfx_kthread+0x10/0x10
[   15.268256]  ret_from_fork+0x116/0x1d0
[   15.268275]  ? __pfx_kthread+0x10/0x10
[   15.268297]  ret_from_fork_asm+0x1a/0x30
[   15.268330]  </TASK>
[   15.268344] 
[   15.276233] Allocated by task 282:
[   15.276399]  kasan_save_stack+0x45/0x70
[   15.276552]  kasan_save_track+0x18/0x40
[   15.276748]  kasan_save_alloc_info+0x3b/0x50
[   15.276925]  __kasan_kmalloc+0xb7/0xc0
[   15.277100]  __kmalloc_cache_noprof+0x189/0x420
[   15.277302]  kasan_atomics+0x95/0x310
[   15.277474]  kunit_try_run_case+0x1a5/0x480
[   15.277659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.277898]  kthread+0x337/0x6f0
[   15.278084]  ret_from_fork+0x116/0x1d0
[   15.278259]  ret_from_fork_asm+0x1a/0x30
[   15.278437] 
[   15.278527] The buggy address belongs to the object at ffff888103a18380
[   15.278527]  which belongs to the cache kmalloc-64 of size 64
[   15.278878] The buggy address is located 0 bytes to the right of
[   15.278878]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.279260] 
[   15.279337] The buggy address belongs to the physical page:
[   15.279512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.280091] flags: 0x200000000000000(node=0|zone=2)
[   15.280347] page_type: f5(slab)
[   15.280521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.280864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.281213] page dumped because: kasan: bad access detected
[   15.281674] 
[   15.281772] Memory state around the buggy address:
[   15.281955]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.282452]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.282721] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.283028]                                      ^
[   15.283306]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.283524]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.283740] ==================================================================
[   14.482442] ==================================================================
[   14.482750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.483009] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.483305] 
[   14.483423] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.483467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.483482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.483504] Call Trace:
[   14.483521]  <TASK>
[   14.483538]  dump_stack_lvl+0x73/0xb0
[   14.483566]  print_report+0xd1/0x650
[   14.483590]  ? __virt_addr_valid+0x1db/0x2d0
[   14.483613]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.483636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.483659]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.483682]  kasan_report+0x141/0x180
[   14.483705]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.483732]  __asan_report_load4_noabort+0x18/0x20
[   14.483758]  kasan_atomics_helper+0x4a84/0x5450
[   14.483842]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.483866]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.483892]  ? kasan_save_alloc_info+0x3b/0x50
[   14.483917]  ? kasan_atomics+0x152/0x310
[   14.483961]  kasan_atomics+0x1dc/0x310
[   14.483985]  ? __pfx_kasan_atomics+0x10/0x10
[   14.484011]  ? __pfx_read_tsc+0x10/0x10
[   14.484033]  ? ktime_get_ts64+0x86/0x230
[   14.484059]  kunit_try_run_case+0x1a5/0x480
[   14.484086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.484110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.484134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.484159]  ? __kthread_parkme+0x82/0x180
[   14.484179]  ? preempt_count_sub+0x50/0x80
[   14.484205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.484230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.484254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.484278]  kthread+0x337/0x6f0
[   14.484298]  ? trace_preempt_on+0x20/0xc0
[   14.484322]  ? __pfx_kthread+0x10/0x10
[   14.484344]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.484367]  ? calculate_sigpending+0x7b/0xa0
[   14.484392]  ? __pfx_kthread+0x10/0x10
[   14.484415]  ret_from_fork+0x116/0x1d0
[   14.484434]  ? __pfx_kthread+0x10/0x10
[   14.484456]  ret_from_fork_asm+0x1a/0x30
[   14.484531]  </TASK>
[   14.484544] 
[   14.492774] Allocated by task 282:
[   14.492976]  kasan_save_stack+0x45/0x70
[   14.493177]  kasan_save_track+0x18/0x40
[   14.493363]  kasan_save_alloc_info+0x3b/0x50
[   14.493571]  __kasan_kmalloc+0xb7/0xc0
[   14.493740]  __kmalloc_cache_noprof+0x189/0x420
[   14.493919]  kasan_atomics+0x95/0x310
[   14.494065]  kunit_try_run_case+0x1a5/0x480
[   14.494244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.494681]  kthread+0x337/0x6f0
[   14.494830]  ret_from_fork+0x116/0x1d0
[   14.495209]  ret_from_fork_asm+0x1a/0x30
[   14.495366] 
[   14.495441] The buggy address belongs to the object at ffff888103a18380
[   14.495441]  which belongs to the cache kmalloc-64 of size 64
[   14.495805] The buggy address is located 0 bytes to the right of
[   14.495805]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.496387] 
[   14.496603] The buggy address belongs to the physical page:
[   14.497085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.497378] flags: 0x200000000000000(node=0|zone=2)
[   14.497547] page_type: f5(slab)
[   14.497670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.498803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.499098] page dumped because: kasan: bad access detected
[   14.499340] 
[   14.499435] Memory state around the buggy address:
[   14.500000]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.500664]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.501001] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.501634]                                      ^
[   14.501869]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.502539]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.503328] ==================================================================
[   14.838027] ==================================================================
[   14.838524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.838782] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.839311] 
[   14.839460] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.839506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.839522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.839545] Call Trace:
[   14.839560]  <TASK>
[   14.839576]  dump_stack_lvl+0x73/0xb0
[   14.839604]  print_report+0xd1/0x650
[   14.839628]  ? __virt_addr_valid+0x1db/0x2d0
[   14.839651]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.839674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.839698]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.839722]  kasan_report+0x141/0x180
[   14.839745]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.839773]  kasan_check_range+0x10c/0x1c0
[   14.839797]  __kasan_check_read+0x15/0x20
[   14.839818]  kasan_atomics_helper+0x13b5/0x5450
[   14.839843]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.839866]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.839891]  ? kasan_save_alloc_info+0x3b/0x50
[   14.839916]  ? kasan_atomics+0x152/0x310
[   14.839957]  kasan_atomics+0x1dc/0x310
[   14.839981]  ? __pfx_kasan_atomics+0x10/0x10
[   14.840007]  ? __pfx_read_tsc+0x10/0x10
[   14.840030]  ? ktime_get_ts64+0x86/0x230
[   14.840055]  kunit_try_run_case+0x1a5/0x480
[   14.840081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.840105]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.840130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.840154]  ? __kthread_parkme+0x82/0x180
[   14.840175]  ? preempt_count_sub+0x50/0x80
[   14.840201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.840226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.840250]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.840274]  kthread+0x337/0x6f0
[   14.840296]  ? trace_preempt_on+0x20/0xc0
[   14.840321]  ? __pfx_kthread+0x10/0x10
[   14.840343]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.840366]  ? calculate_sigpending+0x7b/0xa0
[   14.840391]  ? __pfx_kthread+0x10/0x10
[   14.840414]  ret_from_fork+0x116/0x1d0
[   14.840434]  ? __pfx_kthread+0x10/0x10
[   14.840456]  ret_from_fork_asm+0x1a/0x30
[   14.840488]  </TASK>
[   14.840501] 
[   14.847956] Allocated by task 282:
[   14.848161]  kasan_save_stack+0x45/0x70
[   14.848309]  kasan_save_track+0x18/0x40
[   14.848447]  kasan_save_alloc_info+0x3b/0x50
[   14.848598]  __kasan_kmalloc+0xb7/0xc0
[   14.848732]  __kmalloc_cache_noprof+0x189/0x420
[   14.848889]  kasan_atomics+0x95/0x310
[   14.849035]  kunit_try_run_case+0x1a5/0x480
[   14.849185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.849361]  kthread+0x337/0x6f0
[   14.849558]  ret_from_fork+0x116/0x1d0
[   14.849747]  ret_from_fork_asm+0x1a/0x30
[   14.849954] 
[   14.850053] The buggy address belongs to the object at ffff888103a18380
[   14.850053]  which belongs to the cache kmalloc-64 of size 64
[   14.851004] The buggy address is located 0 bytes to the right of
[   14.851004]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.851576] 
[   14.851652] The buggy address belongs to the physical page:
[   14.851826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.852116] flags: 0x200000000000000(node=0|zone=2)
[   14.852361] page_type: f5(slab)
[   14.852537] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.852891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.853485] page dumped because: kasan: bad access detected
[   14.853749] 
[   14.853853] Memory state around the buggy address:
[   14.854084]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.854338]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.854560] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.854776]                                      ^
[   14.854933]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.855524]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.855844] ==================================================================
[   14.697552] ==================================================================
[   14.697862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.698269] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.698672] 
[   14.698765] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.698808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.698822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.698845] Call Trace:
[   14.698863]  <TASK>
[   14.698880]  dump_stack_lvl+0x73/0xb0
[   14.698911]  print_report+0xd1/0x650
[   14.698935]  ? __virt_addr_valid+0x1db/0x2d0
[   14.698973]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.698995]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.699020]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.699044]  kasan_report+0x141/0x180
[   14.699079]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.699107]  __asan_report_load4_noabort+0x18/0x20
[   14.699136]  kasan_atomics_helper+0x4a1c/0x5450
[   14.699161]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.699184]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.699210]  ? kasan_save_alloc_info+0x3b/0x50
[   14.699234]  ? kasan_atomics+0x152/0x310
[   14.699262]  kasan_atomics+0x1dc/0x310
[   14.699287]  ? __pfx_kasan_atomics+0x10/0x10
[   14.699322]  ? __pfx_read_tsc+0x10/0x10
[   14.699345]  ? ktime_get_ts64+0x86/0x230
[   14.699370]  kunit_try_run_case+0x1a5/0x480
[   14.699395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.699420]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.699445]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.699469]  ? __kthread_parkme+0x82/0x180
[   14.699491]  ? preempt_count_sub+0x50/0x80
[   14.699517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.699542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.699565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.699590]  kthread+0x337/0x6f0
[   14.699611]  ? trace_preempt_on+0x20/0xc0
[   14.699636]  ? __pfx_kthread+0x10/0x10
[   14.699658]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.699680]  ? calculate_sigpending+0x7b/0xa0
[   14.699705]  ? __pfx_kthread+0x10/0x10
[   14.699728]  ret_from_fork+0x116/0x1d0
[   14.699747]  ? __pfx_kthread+0x10/0x10
[   14.699770]  ret_from_fork_asm+0x1a/0x30
[   14.699801]  </TASK>
[   14.699814] 
[   14.708563] Allocated by task 282:
[   14.708753]  kasan_save_stack+0x45/0x70
[   14.708919]  kasan_save_track+0x18/0x40
[   14.709066]  kasan_save_alloc_info+0x3b/0x50
[   14.709414]  __kasan_kmalloc+0xb7/0xc0
[   14.709604]  __kmalloc_cache_noprof+0x189/0x420
[   14.709842]  kasan_atomics+0x95/0x310
[   14.710005]  kunit_try_run_case+0x1a5/0x480
[   14.710358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.710651]  kthread+0x337/0x6f0
[   14.710781]  ret_from_fork+0x116/0x1d0
[   14.710991]  ret_from_fork_asm+0x1a/0x30
[   14.711193] 
[   14.711268] The buggy address belongs to the object at ffff888103a18380
[   14.711268]  which belongs to the cache kmalloc-64 of size 64
[   14.711619] The buggy address is located 0 bytes to the right of
[   14.711619]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.712182] 
[   14.712283] The buggy address belongs to the physical page:
[   14.712505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.712793] flags: 0x200000000000000(node=0|zone=2)
[   14.713198] page_type: f5(slab)
[   14.713356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.713666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.714160] page dumped because: kasan: bad access detected
[   14.714338] 
[   14.714411] Memory state around the buggy address:
[   14.714569]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.714961]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.715666] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.716004]                                      ^
[   14.716163]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.716378]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.716593] ==================================================================
[   15.425670] ==================================================================
[   15.426019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.426702] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.427025] 
[   15.427166] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.427213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.427226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.427248] Call Trace:
[   15.427263]  <TASK>
[   15.427278]  dump_stack_lvl+0x73/0xb0
[   15.427309]  print_report+0xd1/0x650
[   15.427331]  ? __virt_addr_valid+0x1db/0x2d0
[   15.427356]  ? kasan_atomics_helper+0x218a/0x5450
[   15.427378]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.427402]  ? kasan_atomics_helper+0x218a/0x5450
[   15.427425]  kasan_report+0x141/0x180
[   15.427448]  ? kasan_atomics_helper+0x218a/0x5450
[   15.427476]  kasan_check_range+0x10c/0x1c0
[   15.427501]  __kasan_check_write+0x18/0x20
[   15.427521]  kasan_atomics_helper+0x218a/0x5450
[   15.427547]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.427571]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.427596]  ? kasan_save_alloc_info+0x3b/0x50
[   15.427621]  ? kasan_atomics+0x152/0x310
[   15.427649]  kasan_atomics+0x1dc/0x310
[   15.427673]  ? __pfx_kasan_atomics+0x10/0x10
[   15.427699]  ? __pfx_read_tsc+0x10/0x10
[   15.427721]  ? ktime_get_ts64+0x86/0x230
[   15.427746]  kunit_try_run_case+0x1a5/0x480
[   15.427772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.427794]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.427819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.427844]  ? __kthread_parkme+0x82/0x180
[   15.427865]  ? preempt_count_sub+0x50/0x80
[   15.427890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.427914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.427938]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.427986]  kthread+0x337/0x6f0
[   15.428007]  ? trace_preempt_on+0x20/0xc0
[   15.428031]  ? __pfx_kthread+0x10/0x10
[   15.428053]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.428088]  ? calculate_sigpending+0x7b/0xa0
[   15.428112]  ? __pfx_kthread+0x10/0x10
[   15.428136]  ret_from_fork+0x116/0x1d0
[   15.428156]  ? __pfx_kthread+0x10/0x10
[   15.428179]  ret_from_fork_asm+0x1a/0x30
[   15.428211]  </TASK>
[   15.428223] 
[   15.435747] Allocated by task 282:
[   15.435905]  kasan_save_stack+0x45/0x70
[   15.436092]  kasan_save_track+0x18/0x40
[   15.436291]  kasan_save_alloc_info+0x3b/0x50
[   15.436500]  __kasan_kmalloc+0xb7/0xc0
[   15.436683]  __kmalloc_cache_noprof+0x189/0x420
[   15.436869]  kasan_atomics+0x95/0x310
[   15.437023]  kunit_try_run_case+0x1a5/0x480
[   15.437361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.437539]  kthread+0x337/0x6f0
[   15.437662]  ret_from_fork+0x116/0x1d0
[   15.437796]  ret_from_fork_asm+0x1a/0x30
[   15.437980] 
[   15.438075] The buggy address belongs to the object at ffff888103a18380
[   15.438075]  which belongs to the cache kmalloc-64 of size 64
[   15.438612] The buggy address is located 0 bytes to the right of
[   15.438612]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.439202] 
[   15.439280] The buggy address belongs to the physical page:
[   15.439457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.439702] flags: 0x200000000000000(node=0|zone=2)
[   15.439909] page_type: f5(slab)
[   15.440096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.440444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.440791] page dumped because: kasan: bad access detected
[   15.441079] 
[   15.441157] Memory state around the buggy address:
[   15.441313]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.441538]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.441859] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.442182]                                      ^
[   15.442631]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.442857]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.443157] ==================================================================
[   14.795749] ==================================================================
[   14.796109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.796798] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.797232] 
[   14.797457] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.797508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.797619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.797645] Call Trace:
[   14.797666]  <TASK>
[   14.797684]  dump_stack_lvl+0x73/0xb0
[   14.797716]  print_report+0xd1/0x650
[   14.797741]  ? __virt_addr_valid+0x1db/0x2d0
[   14.797774]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.797798]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.797820]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.797844]  kasan_report+0x141/0x180
[   14.797870]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.797897]  kasan_check_range+0x10c/0x1c0
[   14.797923]  __kasan_check_write+0x18/0x20
[   14.797953]  kasan_atomics_helper+0x12e6/0x5450
[   14.797980]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.798004]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.798030]  ? kasan_save_alloc_info+0x3b/0x50
[   14.798054]  ? kasan_atomics+0x152/0x310
[   14.798111]  kasan_atomics+0x1dc/0x310
[   14.798136]  ? __pfx_kasan_atomics+0x10/0x10
[   14.798161]  ? __pfx_read_tsc+0x10/0x10
[   14.798184]  ? ktime_get_ts64+0x86/0x230
[   14.798209]  kunit_try_run_case+0x1a5/0x480
[   14.798235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.798260]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.798284]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.798309]  ? __kthread_parkme+0x82/0x180
[   14.798331]  ? preempt_count_sub+0x50/0x80
[   14.798355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.798380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.798404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.798429]  kthread+0x337/0x6f0
[   14.798449]  ? trace_preempt_on+0x20/0xc0
[   14.798474]  ? __pfx_kthread+0x10/0x10
[   14.798496]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.798519]  ? calculate_sigpending+0x7b/0xa0
[   14.798544]  ? __pfx_kthread+0x10/0x10
[   14.798567]  ret_from_fork+0x116/0x1d0
[   14.798587]  ? __pfx_kthread+0x10/0x10
[   14.798608]  ret_from_fork_asm+0x1a/0x30
[   14.798640]  </TASK>
[   14.798654] 
[   14.809916] Allocated by task 282:
[   14.810345]  kasan_save_stack+0x45/0x70
[   14.810575]  kasan_save_track+0x18/0x40
[   14.810871]  kasan_save_alloc_info+0x3b/0x50
[   14.811217]  __kasan_kmalloc+0xb7/0xc0
[   14.811409]  __kmalloc_cache_noprof+0x189/0x420
[   14.811615]  kasan_atomics+0x95/0x310
[   14.811792]  kunit_try_run_case+0x1a5/0x480
[   14.812001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.812548]  kthread+0x337/0x6f0
[   14.812928]  ret_from_fork+0x116/0x1d0
[   14.813208]  ret_from_fork_asm+0x1a/0x30
[   14.813503] 
[   14.813721] The buggy address belongs to the object at ffff888103a18380
[   14.813721]  which belongs to the cache kmalloc-64 of size 64
[   14.814985] The buggy address is located 0 bytes to the right of
[   14.814985]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.815732] 
[   14.815968] The buggy address belongs to the physical page:
[   14.816371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.816707] flags: 0x200000000000000(node=0|zone=2)
[   14.816925] page_type: f5(slab)
[   14.817067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.817418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.817689] page dumped because: kasan: bad access detected
[   14.817954] 
[   14.818047] Memory state around the buggy address:
[   14.818286]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.818540]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.818865] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.819230]                                      ^
[   14.819393]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.819719]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.820001] ==================================================================
[   14.178016] ==================================================================
[   14.178398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.178926] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.179486] 
[   14.179748] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.179848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.179932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.179974] Call Trace:
[   14.179992]  <TASK>
[   14.180007]  dump_stack_lvl+0x73/0xb0
[   14.180038]  print_report+0xd1/0x650
[   14.180062]  ? __virt_addr_valid+0x1db/0x2d0
[   14.180086]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.180110]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.180134]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.180158]  kasan_report+0x141/0x180
[   14.180181]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.180211]  __asan_report_store4_noabort+0x1b/0x30
[   14.180235]  kasan_atomics_helper+0x4b3a/0x5450
[   14.180261]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.180284]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.180310]  ? kasan_save_alloc_info+0x3b/0x50
[   14.180334]  ? kasan_atomics+0x152/0x310
[   14.180362]  kasan_atomics+0x1dc/0x310
[   14.180387]  ? __pfx_kasan_atomics+0x10/0x10
[   14.180413]  ? __pfx_read_tsc+0x10/0x10
[   14.180435]  ? ktime_get_ts64+0x86/0x230
[   14.180523]  kunit_try_run_case+0x1a5/0x480
[   14.180555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.180579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.180605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.180629]  ? __kthread_parkme+0x82/0x180
[   14.180650]  ? preempt_count_sub+0x50/0x80
[   14.180675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.180700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.180725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.180750]  kthread+0x337/0x6f0
[   14.180771]  ? trace_preempt_on+0x20/0xc0
[   14.180796]  ? __pfx_kthread+0x10/0x10
[   14.180818]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.180840]  ? calculate_sigpending+0x7b/0xa0
[   14.180865]  ? __pfx_kthread+0x10/0x10
[   14.180888]  ret_from_fork+0x116/0x1d0
[   14.180908]  ? __pfx_kthread+0x10/0x10
[   14.180930]  ret_from_fork_asm+0x1a/0x30
[   14.180975]  </TASK>
[   14.180988] 
[   14.190974] Allocated by task 282:
[   14.191367]  kasan_save_stack+0x45/0x70
[   14.191724]  kasan_save_track+0x18/0x40
[   14.191975]  kasan_save_alloc_info+0x3b/0x50
[   14.192214]  __kasan_kmalloc+0xb7/0xc0
[   14.192347]  __kmalloc_cache_noprof+0x189/0x420
[   14.192500]  kasan_atomics+0x95/0x310
[   14.192959]  kunit_try_run_case+0x1a5/0x480
[   14.193264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.193733]  kthread+0x337/0x6f0
[   14.193928]  ret_from_fork+0x116/0x1d0
[   14.194225]  ret_from_fork_asm+0x1a/0x30
[   14.194415] 
[   14.194697] The buggy address belongs to the object at ffff888103a18380
[   14.194697]  which belongs to the cache kmalloc-64 of size 64
[   14.195200] The buggy address is located 0 bytes to the right of
[   14.195200]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.195874] 
[   14.195964] The buggy address belongs to the physical page:
[   14.196248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.196823] flags: 0x200000000000000(node=0|zone=2)
[   14.197103] page_type: f5(slab)
[   14.197297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.197694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.198075] page dumped because: kasan: bad access detected
[   14.198340] 
[   14.198457] Memory state around the buggy address:
[   14.198895]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.199251]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.199748] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.200062]                                      ^
[   14.200305]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.200630]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.201061] ==================================================================
[   15.303711] ==================================================================
[   15.304007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.304389] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.304803] 
[   15.304919] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.304983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.304998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.305022] Call Trace:
[   15.305039]  <TASK>
[   15.305056]  dump_stack_lvl+0x73/0xb0
[   15.305094]  print_report+0xd1/0x650
[   15.305118]  ? __virt_addr_valid+0x1db/0x2d0
[   15.305142]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.305165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.305189]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.305213]  kasan_report+0x141/0x180
[   15.305236]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.305264]  __asan_report_load8_noabort+0x18/0x20
[   15.305289]  kasan_atomics_helper+0x4f71/0x5450
[   15.305313]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.305338]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.305363]  ? kasan_save_alloc_info+0x3b/0x50
[   15.305388]  ? kasan_atomics+0x152/0x310
[   15.305416]  kasan_atomics+0x1dc/0x310
[   15.305441]  ? __pfx_kasan_atomics+0x10/0x10
[   15.305466]  ? __pfx_read_tsc+0x10/0x10
[   15.305489]  ? ktime_get_ts64+0x86/0x230
[   15.305515]  kunit_try_run_case+0x1a5/0x480
[   15.305541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.305564]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.305589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.305614]  ? __kthread_parkme+0x82/0x180
[   15.305636]  ? preempt_count_sub+0x50/0x80
[   15.305660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.305685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.305709]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.305734]  kthread+0x337/0x6f0
[   15.305768]  ? trace_preempt_on+0x20/0xc0
[   15.305793]  ? __pfx_kthread+0x10/0x10
[   15.305815]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.305838]  ? calculate_sigpending+0x7b/0xa0
[   15.305864]  ? __pfx_kthread+0x10/0x10
[   15.305888]  ret_from_fork+0x116/0x1d0
[   15.305909]  ? __pfx_kthread+0x10/0x10
[   15.305932]  ret_from_fork_asm+0x1a/0x30
[   15.305972]  </TASK>
[   15.305985] 
[   15.314414] Allocated by task 282:
[   15.314581]  kasan_save_stack+0x45/0x70
[   15.314737]  kasan_save_track+0x18/0x40
[   15.314932]  kasan_save_alloc_info+0x3b/0x50
[   15.315199]  __kasan_kmalloc+0xb7/0xc0
[   15.315383]  __kmalloc_cache_noprof+0x189/0x420
[   15.315587]  kasan_atomics+0x95/0x310
[   15.315774]  kunit_try_run_case+0x1a5/0x480
[   15.315961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.316235]  kthread+0x337/0x6f0
[   15.316407]  ret_from_fork+0x116/0x1d0
[   15.316564]  ret_from_fork_asm+0x1a/0x30
[   15.316705] 
[   15.316779] The buggy address belongs to the object at ffff888103a18380
[   15.316779]  which belongs to the cache kmalloc-64 of size 64
[   15.317369] The buggy address is located 0 bytes to the right of
[   15.317369]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.317774] 
[   15.317850] The buggy address belongs to the physical page:
[   15.318032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.318278] flags: 0x200000000000000(node=0|zone=2)
[   15.318512] page_type: f5(slab)
[   15.318683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.319085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.319396] page dumped because: kasan: bad access detected
[   15.319622] 
[   15.319695] Memory state around the buggy address:
[   15.319851]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.320090]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.320416] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.320740]                                      ^
[   15.320979]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.321358]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.321652] ==================================================================
[   15.378117] ==================================================================
[   15.378380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.378618] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.380743] 
[   15.380848] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.380896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.380912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.380934] Call Trace:
[   15.380969]  <TASK>
[   15.381104]  dump_stack_lvl+0x73/0xb0
[   15.381356]  print_report+0xd1/0x650
[   15.381385]  ? __virt_addr_valid+0x1db/0x2d0
[   15.381410]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.381433]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.381457]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.381481]  kasan_report+0x141/0x180
[   15.381505]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.381534]  kasan_check_range+0x10c/0x1c0
[   15.381559]  __kasan_check_write+0x18/0x20
[   15.381580]  kasan_atomics_helper+0x20c8/0x5450
[   15.381605]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.381628]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.381654]  ? kasan_save_alloc_info+0x3b/0x50
[   15.381678]  ? kasan_atomics+0x152/0x310
[   15.381707]  kasan_atomics+0x1dc/0x310
[   15.381730]  ? __pfx_kasan_atomics+0x10/0x10
[   15.381756]  ? __pfx_read_tsc+0x10/0x10
[   15.381777]  ? ktime_get_ts64+0x86/0x230
[   15.381803]  kunit_try_run_case+0x1a5/0x480
[   15.381828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.381851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.381874]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.381899]  ? __kthread_parkme+0x82/0x180
[   15.381920]  ? preempt_count_sub+0x50/0x80
[   15.381970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.381995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.382019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.382302]  kthread+0x337/0x6f0
[   15.382328]  ? trace_preempt_on+0x20/0xc0
[   15.382354]  ? __pfx_kthread+0x10/0x10
[   15.382377]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.382400]  ? calculate_sigpending+0x7b/0xa0
[   15.382425]  ? __pfx_kthread+0x10/0x10
[   15.382447]  ret_from_fork+0x116/0x1d0
[   15.382480]  ? __pfx_kthread+0x10/0x10
[   15.382502]  ret_from_fork_asm+0x1a/0x30
[   15.382534]  </TASK>
[   15.382547] 
[   15.392962] Allocated by task 282:
[   15.393291]  kasan_save_stack+0x45/0x70
[   15.393660]  kasan_save_track+0x18/0x40
[   15.394202]  kasan_save_alloc_info+0x3b/0x50
[   15.394677]  __kasan_kmalloc+0xb7/0xc0
[   15.395081]  __kmalloc_cache_noprof+0x189/0x420
[   15.395528]  kasan_atomics+0x95/0x310
[   15.395886]  kunit_try_run_case+0x1a5/0x480
[   15.396352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.396926]  kthread+0x337/0x6f0
[   15.397248]  ret_from_fork+0x116/0x1d0
[   15.397622]  ret_from_fork_asm+0x1a/0x30
[   15.397999] 
[   15.398200] The buggy address belongs to the object at ffff888103a18380
[   15.398200]  which belongs to the cache kmalloc-64 of size 64
[   15.399296] The buggy address is located 0 bytes to the right of
[   15.399296]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.400599] 
[   15.400776] The buggy address belongs to the physical page:
[   15.401319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.401765] flags: 0x200000000000000(node=0|zone=2)
[   15.401936] page_type: f5(slab)
[   15.402074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.402310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.402542] page dumped because: kasan: bad access detected
[   15.402716] 
[   15.402789] Memory state around the buggy address:
[   15.402954]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.403239]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.403458] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.404024]                                      ^
[   15.404392]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.404610]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.405251] ==================================================================
[   14.397423] ==================================================================
[   14.398160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.398992] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.399704] 
[   14.399886] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.399932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.399958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.399982] Call Trace:
[   14.400002]  <TASK>
[   14.400020]  dump_stack_lvl+0x73/0xb0
[   14.400049]  print_report+0xd1/0x650
[   14.400081]  ? __virt_addr_valid+0x1db/0x2d0
[   14.400104]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.400127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.400150]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.400173]  kasan_report+0x141/0x180
[   14.400196]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.400224]  kasan_check_range+0x10c/0x1c0
[   14.400249]  __kasan_check_write+0x18/0x20
[   14.400270]  kasan_atomics_helper+0xa2b/0x5450
[   14.400294]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.400318]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.400342]  ? kasan_save_alloc_info+0x3b/0x50
[   14.400366]  ? kasan_atomics+0x152/0x310
[   14.400394]  kasan_atomics+0x1dc/0x310
[   14.400419]  ? __pfx_kasan_atomics+0x10/0x10
[   14.400445]  ? __pfx_read_tsc+0x10/0x10
[   14.400485]  ? ktime_get_ts64+0x86/0x230
[   14.400512]  kunit_try_run_case+0x1a5/0x480
[   14.400537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.400560]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.400586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.400610]  ? __kthread_parkme+0x82/0x180
[   14.400632]  ? preempt_count_sub+0x50/0x80
[   14.400657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.400682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.400707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.400731]  kthread+0x337/0x6f0
[   14.400752]  ? trace_preempt_on+0x20/0xc0
[   14.400777]  ? __pfx_kthread+0x10/0x10
[   14.400799]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.400821]  ? calculate_sigpending+0x7b/0xa0
[   14.400846]  ? __pfx_kthread+0x10/0x10
[   14.400870]  ret_from_fork+0x116/0x1d0
[   14.400890]  ? __pfx_kthread+0x10/0x10
[   14.400911]  ret_from_fork_asm+0x1a/0x30
[   14.400953]  </TASK>
[   14.400966] 
[   14.413421] Allocated by task 282:
[   14.413613]  kasan_save_stack+0x45/0x70
[   14.413824]  kasan_save_track+0x18/0x40
[   14.414036]  kasan_save_alloc_info+0x3b/0x50
[   14.414238]  __kasan_kmalloc+0xb7/0xc0
[   14.414405]  __kmalloc_cache_noprof+0x189/0x420
[   14.414696]  kasan_atomics+0x95/0x310
[   14.415021]  kunit_try_run_case+0x1a5/0x480
[   14.415210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.415386]  kthread+0x337/0x6f0
[   14.415509]  ret_from_fork+0x116/0x1d0
[   14.416045]  ret_from_fork_asm+0x1a/0x30
[   14.416248] 
[   14.416326] The buggy address belongs to the object at ffff888103a18380
[   14.416326]  which belongs to the cache kmalloc-64 of size 64
[   14.417059] The buggy address is located 0 bytes to the right of
[   14.417059]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.417687] 
[   14.417794] The buggy address belongs to the physical page:
[   14.418008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.418522] flags: 0x200000000000000(node=0|zone=2)
[   14.418788] page_type: f5(slab)
[   14.418976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.419352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.419851] page dumped because: kasan: bad access detected
[   14.420101] 
[   14.420177] Memory state around the buggy address:
[   14.420478]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.420697]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.421084] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.421417]                                      ^
[   14.421776]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.422008]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.422272] ==================================================================
[   14.531834] ==================================================================
[   14.532173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.532408] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.532721] 
[   14.532832] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.532875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.532902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.532925] Call Trace:
[   14.532954]  <TASK>
[   14.532973]  dump_stack_lvl+0x73/0xb0
[   14.533002]  print_report+0xd1/0x650
[   14.533026]  ? __virt_addr_valid+0x1db/0x2d0
[   14.533050]  ? kasan_atomics_helper+0xde0/0x5450
[   14.533072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.533099]  ? kasan_atomics_helper+0xde0/0x5450
[   14.533122]  kasan_report+0x141/0x180
[   14.533154]  ? kasan_atomics_helper+0xde0/0x5450
[   14.533182]  kasan_check_range+0x10c/0x1c0
[   14.533208]  __kasan_check_write+0x18/0x20
[   14.533230]  kasan_atomics_helper+0xde0/0x5450
[   14.533254]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.533278]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.533304]  ? kasan_save_alloc_info+0x3b/0x50
[   14.533329]  ? kasan_atomics+0x152/0x310
[   14.533357]  kasan_atomics+0x1dc/0x310
[   14.533383]  ? __pfx_kasan_atomics+0x10/0x10
[   14.533409]  ? __pfx_read_tsc+0x10/0x10
[   14.533431]  ? ktime_get_ts64+0x86/0x230
[   14.533457]  kunit_try_run_case+0x1a5/0x480
[   14.533494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.533518]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.533543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.533568]  ? __kthread_parkme+0x82/0x180
[   14.533591]  ? preempt_count_sub+0x50/0x80
[   14.533616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.533641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.533666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.533690]  kthread+0x337/0x6f0
[   14.533712]  ? trace_preempt_on+0x20/0xc0
[   14.533737]  ? __pfx_kthread+0x10/0x10
[   14.533759]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.533782]  ? calculate_sigpending+0x7b/0xa0
[   14.533807]  ? __pfx_kthread+0x10/0x10
[   14.533830]  ret_from_fork+0x116/0x1d0
[   14.533850]  ? __pfx_kthread+0x10/0x10
[   14.533872]  ret_from_fork_asm+0x1a/0x30
[   14.533904]  </TASK>
[   14.533918] 
[   14.543408] Allocated by task 282:
[   14.543656]  kasan_save_stack+0x45/0x70
[   14.543848]  kasan_save_track+0x18/0x40
[   14.544064]  kasan_save_alloc_info+0x3b/0x50
[   14.544281]  __kasan_kmalloc+0xb7/0xc0
[   14.544470]  __kmalloc_cache_noprof+0x189/0x420
[   14.544718]  kasan_atomics+0x95/0x310
[   14.544879]  kunit_try_run_case+0x1a5/0x480
[   14.545074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.545350]  kthread+0x337/0x6f0
[   14.545561]  ret_from_fork+0x116/0x1d0
[   14.545700]  ret_from_fork_asm+0x1a/0x30
[   14.545845] 
[   14.545957] The buggy address belongs to the object at ffff888103a18380
[   14.545957]  which belongs to the cache kmalloc-64 of size 64
[   14.546772] The buggy address is located 0 bytes to the right of
[   14.546772]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.547371] 
[   14.547485] The buggy address belongs to the physical page:
[   14.547696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.548013] flags: 0x200000000000000(node=0|zone=2)
[   14.548379] page_type: f5(slab)
[   14.548585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.548918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.549280] page dumped because: kasan: bad access detected
[   14.549533] 
[   14.549628] Memory state around the buggy address:
[   14.549796]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.550016]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.550678] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.551003]                                      ^
[   14.551244]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.551641]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.552002] ==================================================================
[   14.035201] ==================================================================
[   14.035534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.035875] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.036279] 
[   14.036366] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.036480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.036495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.036515] Call Trace:
[   14.036541]  <TASK>
[   14.036558]  dump_stack_lvl+0x73/0xb0
[   14.036586]  print_report+0xd1/0x650
[   14.036620]  ? __virt_addr_valid+0x1db/0x2d0
[   14.036642]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.036663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.036685]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.036715]  kasan_report+0x141/0x180
[   14.036738]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.036764]  __asan_report_store4_noabort+0x1b/0x30
[   14.036794]  kasan_atomics_helper+0x4ba2/0x5450
[   14.036817]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.036839]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.036863]  ? kasan_save_alloc_info+0x3b/0x50
[   14.036885]  ? kasan_atomics+0x152/0x310
[   14.036912]  kasan_atomics+0x1dc/0x310
[   14.036945]  ? __pfx_kasan_atomics+0x10/0x10
[   14.036969]  ? __pfx_read_tsc+0x10/0x10
[   14.036990]  ? ktime_get_ts64+0x86/0x230
[   14.037013]  kunit_try_run_case+0x1a5/0x480
[   14.037036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.037058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.037082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.037113]  ? __kthread_parkme+0x82/0x180
[   14.037134]  ? preempt_count_sub+0x50/0x80
[   14.037159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.037193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.037216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.037241]  kthread+0x337/0x6f0
[   14.037270]  ? trace_preempt_on+0x20/0xc0
[   14.037293]  ? __pfx_kthread+0x10/0x10
[   14.037314]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.037335]  ? calculate_sigpending+0x7b/0xa0
[   14.037369]  ? __pfx_kthread+0x10/0x10
[   14.037392]  ret_from_fork+0x116/0x1d0
[   14.037410]  ? __pfx_kthread+0x10/0x10
[   14.037440]  ret_from_fork_asm+0x1a/0x30
[   14.037523]  </TASK>
[   14.037538] 
[   14.048159] Allocated by task 282:
[   14.048459]  kasan_save_stack+0x45/0x70
[   14.048841]  kasan_save_track+0x18/0x40
[   14.049013]  kasan_save_alloc_info+0x3b/0x50
[   14.049260]  __kasan_kmalloc+0xb7/0xc0
[   14.049875]  __kmalloc_cache_noprof+0x189/0x420
[   14.050081]  kasan_atomics+0x95/0x310
[   14.050333]  kunit_try_run_case+0x1a5/0x480
[   14.050717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.050969]  kthread+0x337/0x6f0
[   14.051309]  ret_from_fork+0x116/0x1d0
[   14.051474]  ret_from_fork_asm+0x1a/0x30
[   14.051820] 
[   14.051925] The buggy address belongs to the object at ffff888103a18380
[   14.051925]  which belongs to the cache kmalloc-64 of size 64
[   14.052627] The buggy address is located 0 bytes to the right of
[   14.052627]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.053357] 
[   14.053469] The buggy address belongs to the physical page:
[   14.053922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.054430] flags: 0x200000000000000(node=0|zone=2)
[   14.054837] page_type: f5(slab)
[   14.055107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.055588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.056032] page dumped because: kasan: bad access detected
[   14.056316] 
[   14.056397] Memory state around the buggy address:
[   14.056855]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.057178]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.057648] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.057982]                                      ^
[   14.058397]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.058880]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.059190] ==================================================================
[   15.444298] ==================================================================
[   15.444834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.445243] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.445480] 
[   15.445621] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.445664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.445678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.445699] Call Trace:
[   15.445716]  <TASK>
[   15.445733]  dump_stack_lvl+0x73/0xb0
[   15.445760]  print_report+0xd1/0x650
[   15.445784]  ? __virt_addr_valid+0x1db/0x2d0
[   15.445806]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.445829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.445854]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.445877]  kasan_report+0x141/0x180
[   15.445902]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.445929]  __asan_report_load8_noabort+0x18/0x20
[   15.445968]  kasan_atomics_helper+0x4fa5/0x5450
[   15.445993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.446016]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.446041]  ? kasan_save_alloc_info+0x3b/0x50
[   15.446076]  ? kasan_atomics+0x152/0x310
[   15.446104]  kasan_atomics+0x1dc/0x310
[   15.446128]  ? __pfx_kasan_atomics+0x10/0x10
[   15.446154]  ? __pfx_read_tsc+0x10/0x10
[   15.446176]  ? ktime_get_ts64+0x86/0x230
[   15.446201]  kunit_try_run_case+0x1a5/0x480
[   15.446227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.446250]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.446274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.446299]  ? __kthread_parkme+0x82/0x180
[   15.446319]  ? preempt_count_sub+0x50/0x80
[   15.446344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.446368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.446392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.446417]  kthread+0x337/0x6f0
[   15.446437]  ? trace_preempt_on+0x20/0xc0
[   15.446461]  ? __pfx_kthread+0x10/0x10
[   15.446483]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.446506]  ? calculate_sigpending+0x7b/0xa0
[   15.446529]  ? __pfx_kthread+0x10/0x10
[   15.446553]  ret_from_fork+0x116/0x1d0
[   15.446573]  ? __pfx_kthread+0x10/0x10
[   15.446595]  ret_from_fork_asm+0x1a/0x30
[   15.446627]  </TASK>
[   15.446640] 
[   15.454441] Allocated by task 282:
[   15.454605]  kasan_save_stack+0x45/0x70
[   15.454790]  kasan_save_track+0x18/0x40
[   15.454967]  kasan_save_alloc_info+0x3b/0x50
[   15.455271]  __kasan_kmalloc+0xb7/0xc0
[   15.455449]  __kmalloc_cache_noprof+0x189/0x420
[   15.455627]  kasan_atomics+0x95/0x310
[   15.455800]  kunit_try_run_case+0x1a5/0x480
[   15.456022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.456244]  kthread+0x337/0x6f0
[   15.456415]  ret_from_fork+0x116/0x1d0
[   15.456604]  ret_from_fork_asm+0x1a/0x30
[   15.456797] 
[   15.456886] The buggy address belongs to the object at ffff888103a18380
[   15.456886]  which belongs to the cache kmalloc-64 of size 64
[   15.457247] The buggy address is located 0 bytes to the right of
[   15.457247]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.457876] 
[   15.457984] The buggy address belongs to the physical page:
[   15.458485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.458739] flags: 0x200000000000000(node=0|zone=2)
[   15.458905] page_type: f5(slab)
[   15.459090] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.459439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.459784] page dumped because: kasan: bad access detected
[   15.460002] 
[   15.460076] Memory state around the buggy address:
[   15.460247]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.460570]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.460895] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.461160]                                      ^
[   15.461319]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.461622]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.461954] ==================================================================
[   14.952080] ==================================================================
[   14.952427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.952773] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.953219] 
[   14.953319] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.953362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.953376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.953398] Call Trace:
[   14.953414]  <TASK>
[   14.953448]  dump_stack_lvl+0x73/0xb0
[   14.953476]  print_report+0xd1/0x650
[   14.953500]  ? __virt_addr_valid+0x1db/0x2d0
[   14.953523]  ? kasan_atomics_helper+0x164f/0x5450
[   14.953548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.953571]  ? kasan_atomics_helper+0x164f/0x5450
[   14.953596]  kasan_report+0x141/0x180
[   14.953620]  ? kasan_atomics_helper+0x164f/0x5450
[   14.953648]  kasan_check_range+0x10c/0x1c0
[   14.953674]  __kasan_check_write+0x18/0x20
[   14.953695]  kasan_atomics_helper+0x164f/0x5450
[   14.953720]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.953744]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.953769]  ? kasan_save_alloc_info+0x3b/0x50
[   14.953794]  ? kasan_atomics+0x152/0x310
[   14.953822]  kasan_atomics+0x1dc/0x310
[   14.953847]  ? __pfx_kasan_atomics+0x10/0x10
[   14.953873]  ? __pfx_read_tsc+0x10/0x10
[   14.953895]  ? ktime_get_ts64+0x86/0x230
[   14.953920]  kunit_try_run_case+0x1a5/0x480
[   14.953956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.953979]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.954004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.954029]  ? __kthread_parkme+0x82/0x180
[   14.954052]  ? preempt_count_sub+0x50/0x80
[   14.954085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.954110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.954135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.954160]  kthread+0x337/0x6f0
[   14.954181]  ? trace_preempt_on+0x20/0xc0
[   14.954206]  ? __pfx_kthread+0x10/0x10
[   14.954228]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.954251]  ? calculate_sigpending+0x7b/0xa0
[   14.954276]  ? __pfx_kthread+0x10/0x10
[   14.954298]  ret_from_fork+0x116/0x1d0
[   14.954317]  ? __pfx_kthread+0x10/0x10
[   14.954339]  ret_from_fork_asm+0x1a/0x30
[   14.954371]  </TASK>
[   14.954384] 
[   14.967061] Allocated by task 282:
[   14.967751]  kasan_save_stack+0x45/0x70
[   14.968328]  kasan_save_track+0x18/0x40
[   14.968812]  kasan_save_alloc_info+0x3b/0x50
[   14.969424]  __kasan_kmalloc+0xb7/0xc0
[   14.969900]  __kmalloc_cache_noprof+0x189/0x420
[   14.970379]  kasan_atomics+0x95/0x310
[   14.970531]  kunit_try_run_case+0x1a5/0x480
[   14.970689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.970868]  kthread+0x337/0x6f0
[   14.971007]  ret_from_fork+0x116/0x1d0
[   14.971152]  ret_from_fork_asm+0x1a/0x30
[   14.971316] 
[   14.971423] The buggy address belongs to the object at ffff888103a18380
[   14.971423]  which belongs to the cache kmalloc-64 of size 64
[   14.971964] The buggy address is located 0 bytes to the right of
[   14.971964]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.972424] 
[   14.972529] The buggy address belongs to the physical page:
[   14.972793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.973220] flags: 0x200000000000000(node=0|zone=2)
[   14.973391] page_type: f5(slab)
[   14.973564] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.973905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.974172] page dumped because: kasan: bad access detected
[   14.974474] 
[   14.974573] Memory state around the buggy address:
[   14.974806]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.975059]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.975346] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.975663]                                      ^
[   14.975886]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.976116]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.976589] ==================================================================
[   15.322137] ==================================================================
[   15.322489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.322783] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.323288] 
[   15.323381] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.323425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.323439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.323462] Call Trace:
[   15.323480]  <TASK>
[   15.323496]  dump_stack_lvl+0x73/0xb0
[   15.323523]  print_report+0xd1/0x650
[   15.323547]  ? __virt_addr_valid+0x1db/0x2d0
[   15.323570]  ? kasan_atomics_helper+0x2006/0x5450
[   15.323593]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.323616]  ? kasan_atomics_helper+0x2006/0x5450
[   15.323642]  kasan_report+0x141/0x180
[   15.323674]  ? kasan_atomics_helper+0x2006/0x5450
[   15.323702]  kasan_check_range+0x10c/0x1c0
[   15.323727]  __kasan_check_write+0x18/0x20
[   15.323750]  kasan_atomics_helper+0x2006/0x5450
[   15.323775]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.323799]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.323825]  ? kasan_save_alloc_info+0x3b/0x50
[   15.323849]  ? kasan_atomics+0x152/0x310
[   15.323877]  kasan_atomics+0x1dc/0x310
[   15.323901]  ? __pfx_kasan_atomics+0x10/0x10
[   15.323927]  ? __pfx_read_tsc+0x10/0x10
[   15.323959]  ? ktime_get_ts64+0x86/0x230
[   15.323986]  kunit_try_run_case+0x1a5/0x480
[   15.324011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.324034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.324059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.324093]  ? __kthread_parkme+0x82/0x180
[   15.324113]  ? preempt_count_sub+0x50/0x80
[   15.324139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.324165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.324189]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.324214]  kthread+0x337/0x6f0
[   15.324235]  ? trace_preempt_on+0x20/0xc0
[   15.324260]  ? __pfx_kthread+0x10/0x10
[   15.324281]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.324304]  ? calculate_sigpending+0x7b/0xa0
[   15.324329]  ? __pfx_kthread+0x10/0x10
[   15.324351]  ret_from_fork+0x116/0x1d0
[   15.324371]  ? __pfx_kthread+0x10/0x10
[   15.324394]  ret_from_fork_asm+0x1a/0x30
[   15.324426]  </TASK>
[   15.324438] 
[   15.336297] Allocated by task 282:
[   15.336859]  kasan_save_stack+0x45/0x70
[   15.337375]  kasan_save_track+0x18/0x40
[   15.338004]  kasan_save_alloc_info+0x3b/0x50
[   15.338585]  __kasan_kmalloc+0xb7/0xc0
[   15.338889]  __kmalloc_cache_noprof+0x189/0x420
[   15.339550]  kasan_atomics+0x95/0x310
[   15.339700]  kunit_try_run_case+0x1a5/0x480
[   15.339851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.340042]  kthread+0x337/0x6f0
[   15.340786]  ret_from_fork+0x116/0x1d0
[   15.341241]  ret_from_fork_asm+0x1a/0x30
[   15.341750] 
[   15.342083] The buggy address belongs to the object at ffff888103a18380
[   15.342083]  which belongs to the cache kmalloc-64 of size 64
[   15.343472] The buggy address is located 0 bytes to the right of
[   15.343472]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.343859] 
[   15.343938] The buggy address belongs to the physical page:
[   15.344534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.345510] flags: 0x200000000000000(node=0|zone=2)
[   15.346180] page_type: f5(slab)
[   15.346650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.347529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.348211] page dumped because: kasan: bad access detected
[   15.348395] 
[   15.348471] Memory state around the buggy address:
[   15.348631]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.348851]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.349392] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.350287]                                      ^
[   15.350930]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.351928]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.352514] ==================================================================
[   14.915793] ==================================================================
[   14.916251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.916671] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.917055] 
[   14.917177] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.917222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.917237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.917260] Call Trace:
[   14.917276]  <TASK>
[   14.917293]  dump_stack_lvl+0x73/0xb0
[   14.917322]  print_report+0xd1/0x650
[   14.917346]  ? __virt_addr_valid+0x1db/0x2d0
[   14.917369]  ? kasan_atomics_helper+0x151d/0x5450
[   14.917392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.917416]  ? kasan_atomics_helper+0x151d/0x5450
[   14.917440]  kasan_report+0x141/0x180
[   14.917464]  ? kasan_atomics_helper+0x151d/0x5450
[   14.917491]  kasan_check_range+0x10c/0x1c0
[   14.917516]  __kasan_check_write+0x18/0x20
[   14.917537]  kasan_atomics_helper+0x151d/0x5450
[   14.917560]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.917584]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.917610]  ? kasan_save_alloc_info+0x3b/0x50
[   14.917634]  ? kasan_atomics+0x152/0x310
[   14.917663]  kasan_atomics+0x1dc/0x310
[   14.917689]  ? __pfx_kasan_atomics+0x10/0x10
[   14.917715]  ? __pfx_read_tsc+0x10/0x10
[   14.917738]  ? ktime_get_ts64+0x86/0x230
[   14.917763]  kunit_try_run_case+0x1a5/0x480
[   14.917788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.917811]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.917835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.917861]  ? __kthread_parkme+0x82/0x180
[   14.917882]  ? preempt_count_sub+0x50/0x80
[   14.917906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.917932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.917969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.917994]  kthread+0x337/0x6f0
[   14.918014]  ? trace_preempt_on+0x20/0xc0
[   14.918039]  ? __pfx_kthread+0x10/0x10
[   14.918061]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.918083]  ? calculate_sigpending+0x7b/0xa0
[   14.918108]  ? __pfx_kthread+0x10/0x10
[   14.918131]  ret_from_fork+0x116/0x1d0
[   14.918151]  ? __pfx_kthread+0x10/0x10
[   14.918173]  ret_from_fork_asm+0x1a/0x30
[   14.918204]  </TASK>
[   14.918218] 
[   14.925411] Allocated by task 282:
[   14.925612]  kasan_save_stack+0x45/0x70
[   14.925814]  kasan_save_track+0x18/0x40
[   14.926019]  kasan_save_alloc_info+0x3b/0x50
[   14.926437]  __kasan_kmalloc+0xb7/0xc0
[   14.926628]  __kmalloc_cache_noprof+0x189/0x420
[   14.926853]  kasan_atomics+0x95/0x310
[   14.927060]  kunit_try_run_case+0x1a5/0x480
[   14.927276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.927488]  kthread+0x337/0x6f0
[   14.927612]  ret_from_fork+0x116/0x1d0
[   14.927749]  ret_from_fork_asm+0x1a/0x30
[   14.927897] 
[   14.927983] The buggy address belongs to the object at ffff888103a18380
[   14.927983]  which belongs to the cache kmalloc-64 of size 64
[   14.928449] The buggy address is located 0 bytes to the right of
[   14.928449]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.929026] 
[   14.929125] The buggy address belongs to the physical page:
[   14.929348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.929620] flags: 0x200000000000000(node=0|zone=2)
[   14.929786] page_type: f5(slab)
[   14.929911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.930531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.930878] page dumped because: kasan: bad access detected
[   14.931241] 
[   14.931343] Memory state around the buggy address:
[   14.931576]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.931849]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.932185] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.932404]                                      ^
[   14.932561]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.932779]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.933030] ==================================================================
[   15.201185] ==================================================================
[   15.201610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.202289] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.202517] 
[   15.202603] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.202646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.202659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.202682] Call Trace:
[   15.202698]  <TASK>
[   15.202715]  dump_stack_lvl+0x73/0xb0
[   15.202742]  print_report+0xd1/0x650
[   15.202766]  ? __virt_addr_valid+0x1db/0x2d0
[   15.202790]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.202813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.202836]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.202860]  kasan_report+0x141/0x180
[   15.202884]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.202911]  kasan_check_range+0x10c/0x1c0
[   15.202937]  __kasan_check_write+0x18/0x20
[   15.202970]  kasan_atomics_helper+0x1ce1/0x5450
[   15.202996]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.203019]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.203044]  ? kasan_save_alloc_info+0x3b/0x50
[   15.203068]  ? kasan_atomics+0x152/0x310
[   15.203098]  kasan_atomics+0x1dc/0x310
[   15.203132]  ? __pfx_kasan_atomics+0x10/0x10
[   15.203159]  ? __pfx_read_tsc+0x10/0x10
[   15.203181]  ? ktime_get_ts64+0x86/0x230
[   15.203207]  kunit_try_run_case+0x1a5/0x480
[   15.203233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.203280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.203305]  ? __kthread_parkme+0x82/0x180
[   15.203327]  ? preempt_count_sub+0x50/0x80
[   15.203352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.203401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.203426]  kthread+0x337/0x6f0
[   15.203458]  ? trace_preempt_on+0x20/0xc0
[   15.203484]  ? __pfx_kthread+0x10/0x10
[   15.203506]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.203528]  ? calculate_sigpending+0x7b/0xa0
[   15.203554]  ? __pfx_kthread+0x10/0x10
[   15.203577]  ret_from_fork+0x116/0x1d0
[   15.203597]  ? __pfx_kthread+0x10/0x10
[   15.203620]  ret_from_fork_asm+0x1a/0x30
[   15.203651]  </TASK>
[   15.203665] 
[   15.215868] Allocated by task 282:
[   15.216057]  kasan_save_stack+0x45/0x70
[   15.216255]  kasan_save_track+0x18/0x40
[   15.216437]  kasan_save_alloc_info+0x3b/0x50
[   15.216644]  __kasan_kmalloc+0xb7/0xc0
[   15.216834]  __kmalloc_cache_noprof+0x189/0x420
[   15.217058]  kasan_atomics+0x95/0x310
[   15.217730]  kunit_try_run_case+0x1a5/0x480
[   15.218209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.218524]  kthread+0x337/0x6f0
[   15.218809]  ret_from_fork+0x116/0x1d0
[   15.219242]  ret_from_fork_asm+0x1a/0x30
[   15.219515] 
[   15.219734] The buggy address belongs to the object at ffff888103a18380
[   15.219734]  which belongs to the cache kmalloc-64 of size 64
[   15.220653] The buggy address is located 0 bytes to the right of
[   15.220653]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.221470] 
[   15.221569] The buggy address belongs to the physical page:
[   15.221814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.222377] flags: 0x200000000000000(node=0|zone=2)
[   15.222829] page_type: f5(slab)
[   15.223086] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.223536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.223862] page dumped because: kasan: bad access detected
[   15.224366] 
[   15.224463] Memory state around the buggy address:
[   15.224856]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.225390]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.225873] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.226529]                                      ^
[   15.226820]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.227490]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.227806] ==================================================================
[   14.013774] ==================================================================
[   14.014503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.015038] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.015383] 
[   14.015675] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.015725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.015749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.015772] Call Trace:
[   14.015786]  <TASK>
[   14.015802]  dump_stack_lvl+0x73/0xb0
[   14.015844]  print_report+0xd1/0x650
[   14.015866]  ? __virt_addr_valid+0x1db/0x2d0
[   14.015891]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.015923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.015954]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.015976]  kasan_report+0x141/0x180
[   14.015998]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.016024]  __asan_report_load4_noabort+0x18/0x20
[   14.016048]  kasan_atomics_helper+0x4bbc/0x5450
[   14.016081]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.016103]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.016128]  ? kasan_save_alloc_info+0x3b/0x50
[   14.016151]  ? kasan_atomics+0x152/0x310
[   14.016179]  kasan_atomics+0x1dc/0x310
[   14.016201]  ? __pfx_kasan_atomics+0x10/0x10
[   14.016225]  ? __pfx_read_tsc+0x10/0x10
[   14.016246]  ? ktime_get_ts64+0x86/0x230
[   14.016272]  kunit_try_run_case+0x1a5/0x480
[   14.016297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.016318]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.016342]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.016365]  ? __kthread_parkme+0x82/0x180
[   14.016385]  ? preempt_count_sub+0x50/0x80
[   14.016409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.016433]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.016457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.016527]  kthread+0x337/0x6f0
[   14.016549]  ? trace_preempt_on+0x20/0xc0
[   14.016573]  ? __pfx_kthread+0x10/0x10
[   14.016595]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.016616]  ? calculate_sigpending+0x7b/0xa0
[   14.016641]  ? __pfx_kthread+0x10/0x10
[   14.016663]  ret_from_fork+0x116/0x1d0
[   14.016682]  ? __pfx_kthread+0x10/0x10
[   14.016702]  ret_from_fork_asm+0x1a/0x30
[   14.016734]  </TASK>
[   14.016746] 
[   14.025701] Allocated by task 282:
[   14.025884]  kasan_save_stack+0x45/0x70
[   14.026138]  kasan_save_track+0x18/0x40
[   14.026314]  kasan_save_alloc_info+0x3b/0x50
[   14.026596]  __kasan_kmalloc+0xb7/0xc0
[   14.026736]  __kmalloc_cache_noprof+0x189/0x420
[   14.026895]  kasan_atomics+0x95/0x310
[   14.027061]  kunit_try_run_case+0x1a5/0x480
[   14.027297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.027553]  kthread+0x337/0x6f0
[   14.027722]  ret_from_fork+0x116/0x1d0
[   14.027984]  ret_from_fork_asm+0x1a/0x30
[   14.028185] 
[   14.028260] The buggy address belongs to the object at ffff888103a18380
[   14.028260]  which belongs to the cache kmalloc-64 of size 64
[   14.028855] The buggy address is located 0 bytes to the right of
[   14.028855]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.029571] 
[   14.029671] The buggy address belongs to the physical page:
[   14.029850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.030317] flags: 0x200000000000000(node=0|zone=2)
[   14.030564] page_type: f5(slab)
[   14.030738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.031220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.031622] page dumped because: kasan: bad access detected
[   14.031842] 
[   14.031971] Memory state around the buggy address:
[   14.032300]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.032804]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.033118] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.033435]                                      ^
[   14.033823]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.034185]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.034537] ==================================================================
[   14.059969] ==================================================================
[   14.060219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.061061] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.061430] 
[   14.061593] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.061638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.061652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.061672] Call Trace:
[   14.061690]  <TASK>
[   14.061706]  dump_stack_lvl+0x73/0xb0
[   14.061734]  print_report+0xd1/0x650
[   14.061756]  ? __virt_addr_valid+0x1db/0x2d0
[   14.061872]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.061900]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.061992]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.062018]  kasan_report+0x141/0x180
[   14.062041]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.062078]  __asan_report_load4_noabort+0x18/0x20
[   14.062102]  kasan_atomics_helper+0x4b88/0x5450
[   14.062124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.062147]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.062171]  ? kasan_save_alloc_info+0x3b/0x50
[   14.062194]  ? kasan_atomics+0x152/0x310
[   14.062222]  kasan_atomics+0x1dc/0x310
[   14.062244]  ? __pfx_kasan_atomics+0x10/0x10
[   14.062268]  ? __pfx_read_tsc+0x10/0x10
[   14.062289]  ? ktime_get_ts64+0x86/0x230
[   14.062314]  kunit_try_run_case+0x1a5/0x480
[   14.062338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.062359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.062384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.062408]  ? __kthread_parkme+0x82/0x180
[   14.062428]  ? preempt_count_sub+0x50/0x80
[   14.062451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.062484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.062507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.062530]  kthread+0x337/0x6f0
[   14.062550]  ? trace_preempt_on+0x20/0xc0
[   14.062573]  ? __pfx_kthread+0x10/0x10
[   14.062595]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.062616]  ? calculate_sigpending+0x7b/0xa0
[   14.062640]  ? __pfx_kthread+0x10/0x10
[   14.062661]  ret_from_fork+0x116/0x1d0
[   14.062679]  ? __pfx_kthread+0x10/0x10
[   14.062700]  ret_from_fork_asm+0x1a/0x30
[   14.062731]  </TASK>
[   14.062743] 
[   14.071849] Allocated by task 282:
[   14.072031]  kasan_save_stack+0x45/0x70
[   14.072300]  kasan_save_track+0x18/0x40
[   14.072682]  kasan_save_alloc_info+0x3b/0x50
[   14.072863]  __kasan_kmalloc+0xb7/0xc0
[   14.073008]  __kmalloc_cache_noprof+0x189/0x420
[   14.073261]  kasan_atomics+0x95/0x310
[   14.073725]  kunit_try_run_case+0x1a5/0x480
[   14.073926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.074199]  kthread+0x337/0x6f0
[   14.074324]  ret_from_fork+0x116/0x1d0
[   14.074702]  ret_from_fork_asm+0x1a/0x30
[   14.074924] 
[   14.075038] The buggy address belongs to the object at ffff888103a18380
[   14.075038]  which belongs to the cache kmalloc-64 of size 64
[   14.075448] The buggy address is located 0 bytes to the right of
[   14.075448]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.076024] 
[   14.076275] The buggy address belongs to the physical page:
[   14.076464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.076818] flags: 0x200000000000000(node=0|zone=2)
[   14.077062] page_type: f5(slab)
[   14.077245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.077647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.077967] page dumped because: kasan: bad access detected
[   14.078190] 
[   14.078289] Memory state around the buggy address:
[   14.078493]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.078713]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.078978] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.079684]                                      ^
[   14.079852]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.081372]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.082244] ==================================================================
[   14.552607] ==================================================================
[   14.553021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.553419] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.553741] 
[   14.553851] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.553910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.553924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.553958] Call Trace:
[   14.553984]  <TASK>
[   14.554001]  dump_stack_lvl+0x73/0xb0
[   14.554030]  print_report+0xd1/0x650
[   14.554054]  ? __virt_addr_valid+0x1db/0x2d0
[   14.554077]  ? kasan_atomics_helper+0xe78/0x5450
[   14.554100]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.554124]  ? kasan_atomics_helper+0xe78/0x5450
[   14.554157]  kasan_report+0x141/0x180
[   14.554180]  ? kasan_atomics_helper+0xe78/0x5450
[   14.554208]  kasan_check_range+0x10c/0x1c0
[   14.554233]  __kasan_check_write+0x18/0x20
[   14.554254]  kasan_atomics_helper+0xe78/0x5450
[   14.554278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.554302]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.554327]  ? kasan_save_alloc_info+0x3b/0x50
[   14.554352]  ? kasan_atomics+0x152/0x310
[   14.554380]  kasan_atomics+0x1dc/0x310
[   14.554404]  ? __pfx_kasan_atomics+0x10/0x10
[   14.554430]  ? __pfx_read_tsc+0x10/0x10
[   14.554453]  ? ktime_get_ts64+0x86/0x230
[   14.554478]  kunit_try_run_case+0x1a5/0x480
[   14.554503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.554526]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.554551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.554576]  ? __kthread_parkme+0x82/0x180
[   14.554597]  ? preempt_count_sub+0x50/0x80
[   14.554622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.554647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.554671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.554695]  kthread+0x337/0x6f0
[   14.554718]  ? trace_preempt_on+0x20/0xc0
[   14.554743]  ? __pfx_kthread+0x10/0x10
[   14.554765]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.554788]  ? calculate_sigpending+0x7b/0xa0
[   14.554813]  ? __pfx_kthread+0x10/0x10
[   14.554835]  ret_from_fork+0x116/0x1d0
[   14.554855]  ? __pfx_kthread+0x10/0x10
[   14.554877]  ret_from_fork_asm+0x1a/0x30
[   14.554908]  </TASK>
[   14.554920] 
[   14.564256] Allocated by task 282:
[   14.564537]  kasan_save_stack+0x45/0x70
[   14.564732]  kasan_save_track+0x18/0x40
[   14.564922]  kasan_save_alloc_info+0x3b/0x50
[   14.565235]  __kasan_kmalloc+0xb7/0xc0
[   14.565423]  __kmalloc_cache_noprof+0x189/0x420
[   14.565902]  kasan_atomics+0x95/0x310
[   14.566081]  kunit_try_run_case+0x1a5/0x480
[   14.566316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.566486]  kthread+0x337/0x6f0
[   14.566608]  ret_from_fork+0x116/0x1d0
[   14.566752]  ret_from_fork_asm+0x1a/0x30
[   14.566889] 
[   14.566979] The buggy address belongs to the object at ffff888103a18380
[   14.566979]  which belongs to the cache kmalloc-64 of size 64
[   14.567563] The buggy address is located 0 bytes to the right of
[   14.567563]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.568514] 
[   14.568611] The buggy address belongs to the physical page:
[   14.569376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.570676] flags: 0x200000000000000(node=0|zone=2)
[   14.570861] page_type: f5(slab)
[   14.571005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.571859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.572620] page dumped because: kasan: bad access detected
[   14.573157] 
[   14.573279] Memory state around the buggy address:
[   14.573683]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.574242]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.574790] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.575021]                                      ^
[   14.575657]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.576335]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.576989] ==================================================================
[   14.820565] ==================================================================
[   14.820890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.821226] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.821543] 
[   14.821632] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.821676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.821689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.821713] Call Trace:
[   14.821732]  <TASK>
[   14.821750]  dump_stack_lvl+0x73/0xb0
[   14.821778]  print_report+0xd1/0x650
[   14.821802]  ? __virt_addr_valid+0x1db/0x2d0
[   14.821825]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.821848]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.821872]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.821895]  kasan_report+0x141/0x180
[   14.821919]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.821958]  __asan_report_load4_noabort+0x18/0x20
[   14.821984]  kasan_atomics_helper+0x49ce/0x5450
[   14.822008]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.822031]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.822057]  ? kasan_save_alloc_info+0x3b/0x50
[   14.822092]  ? kasan_atomics+0x152/0x310
[   14.822120]  kasan_atomics+0x1dc/0x310
[   14.822144]  ? __pfx_kasan_atomics+0x10/0x10
[   14.822170]  ? __pfx_read_tsc+0x10/0x10
[   14.822192]  ? ktime_get_ts64+0x86/0x230
[   14.822216]  kunit_try_run_case+0x1a5/0x480
[   14.822242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.822266]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.822291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.822315]  ? __kthread_parkme+0x82/0x180
[   14.822337]  ? preempt_count_sub+0x50/0x80
[   14.822362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.822387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.822411]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.822436]  kthread+0x337/0x6f0
[   14.822457]  ? trace_preempt_on+0x20/0xc0
[   14.822481]  ? __pfx_kthread+0x10/0x10
[   14.822503]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.822526]  ? calculate_sigpending+0x7b/0xa0
[   14.822551]  ? __pfx_kthread+0x10/0x10
[   14.822575]  ret_from_fork+0x116/0x1d0
[   14.822595]  ? __pfx_kthread+0x10/0x10
[   14.822618]  ret_from_fork_asm+0x1a/0x30
[   14.822649]  </TASK>
[   14.822663] 
[   14.830103] Allocated by task 282:
[   14.830289]  kasan_save_stack+0x45/0x70
[   14.830482]  kasan_save_track+0x18/0x40
[   14.830627]  kasan_save_alloc_info+0x3b/0x50
[   14.830840]  __kasan_kmalloc+0xb7/0xc0
[   14.831048]  __kmalloc_cache_noprof+0x189/0x420
[   14.831281]  kasan_atomics+0x95/0x310
[   14.831450]  kunit_try_run_case+0x1a5/0x480
[   14.831642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.831858]  kthread+0x337/0x6f0
[   14.832046]  ret_from_fork+0x116/0x1d0
[   14.832232]  ret_from_fork_asm+0x1a/0x30
[   14.832417] 
[   14.832490] The buggy address belongs to the object at ffff888103a18380
[   14.832490]  which belongs to the cache kmalloc-64 of size 64
[   14.832867] The buggy address is located 0 bytes to the right of
[   14.832867]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.833433] 
[   14.833528] The buggy address belongs to the physical page:
[   14.833704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.833957] flags: 0x200000000000000(node=0|zone=2)
[   14.834353] page_type: f5(slab)
[   14.834522] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.834869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.835233] page dumped because: kasan: bad access detected
[   14.835471] 
[   14.835569] Memory state around the buggy address:
[   14.835754]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.836054]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.836367] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.836593]                                      ^
[   14.836751]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.836987]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.837453] ==================================================================
[   14.856297] ==================================================================
[   14.858807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.859132] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.859505] 
[   14.859595] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.859640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.859654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.859675] Call Trace:
[   14.859694]  <TASK>
[   14.859711]  dump_stack_lvl+0x73/0xb0
[   14.859740]  print_report+0xd1/0x650
[   14.859764]  ? __virt_addr_valid+0x1db/0x2d0
[   14.859788]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.859811]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.859835]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.859859]  kasan_report+0x141/0x180
[   14.859883]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.859969]  __asan_report_load8_noabort+0x18/0x20
[   14.859998]  kasan_atomics_helper+0x4eae/0x5450
[   14.860023]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.860047]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.860083]  ? kasan_save_alloc_info+0x3b/0x50
[   14.860111]  ? kasan_atomics+0x152/0x310
[   14.860141]  kasan_atomics+0x1dc/0x310
[   14.860166]  ? __pfx_kasan_atomics+0x10/0x10
[   14.860193]  ? __pfx_read_tsc+0x10/0x10
[   14.860217]  ? ktime_get_ts64+0x86/0x230
[   14.860245]  kunit_try_run_case+0x1a5/0x480
[   14.860272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.860295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.860320]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.860344]  ? __kthread_parkme+0x82/0x180
[   14.860366]  ? preempt_count_sub+0x50/0x80
[   14.860391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.860415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.860441]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.860465]  kthread+0x337/0x6f0
[   14.860487]  ? trace_preempt_on+0x20/0xc0
[   14.860512]  ? __pfx_kthread+0x10/0x10
[   14.860535]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.860558]  ? calculate_sigpending+0x7b/0xa0
[   14.860583]  ? __pfx_kthread+0x10/0x10
[   14.860606]  ret_from_fork+0x116/0x1d0
[   14.860627]  ? __pfx_kthread+0x10/0x10
[   14.860649]  ret_from_fork_asm+0x1a/0x30
[   14.860681]  </TASK>
[   14.860695] 
[   14.871067] Allocated by task 282:
[   14.871211]  kasan_save_stack+0x45/0x70
[   14.871357]  kasan_save_track+0x18/0x40
[   14.871492]  kasan_save_alloc_info+0x3b/0x50
[   14.871637]  __kasan_kmalloc+0xb7/0xc0
[   14.871832]  __kmalloc_cache_noprof+0x189/0x420
[   14.872065]  kasan_atomics+0x95/0x310
[   14.872255]  kunit_try_run_case+0x1a5/0x480
[   14.872459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.872710]  kthread+0x337/0x6f0
[   14.872830]  ret_from_fork+0x116/0x1d0
[   14.872985]  ret_from_fork_asm+0x1a/0x30
[   14.873327] 
[   14.873426] The buggy address belongs to the object at ffff888103a18380
[   14.873426]  which belongs to the cache kmalloc-64 of size 64
[   14.873819] The buggy address is located 0 bytes to the right of
[   14.873819]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.874455] 
[   14.874562] The buggy address belongs to the physical page:
[   14.874788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.875133] flags: 0x200000000000000(node=0|zone=2)
[   14.875364] page_type: f5(slab)
[   14.875517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.875824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.876914] page dumped because: kasan: bad access detected
[   14.877160] 
[   14.877268] Memory state around the buggy address:
[   14.877465]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.877703]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.878003] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.878329]                                      ^
[   14.878549]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.878842]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.879167] ==================================================================
[   14.879703] ==================================================================
[   14.880037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.880501] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.880731] 
[   14.880846] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.880893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.880907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.880931] Call Trace:
[   14.880959]  <TASK>
[   14.880978]  dump_stack_lvl+0x73/0xb0
[   14.881009]  print_report+0xd1/0x650
[   14.881033]  ? __virt_addr_valid+0x1db/0x2d0
[   14.881057]  ? kasan_atomics_helper+0x1467/0x5450
[   14.881079]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.881104]  ? kasan_atomics_helper+0x1467/0x5450
[   14.881128]  kasan_report+0x141/0x180
[   14.881152]  ? kasan_atomics_helper+0x1467/0x5450
[   14.881180]  kasan_check_range+0x10c/0x1c0
[   14.881208]  __kasan_check_write+0x18/0x20
[   14.881230]  kasan_atomics_helper+0x1467/0x5450
[   14.881255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.881280]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.881305]  ? kasan_save_alloc_info+0x3b/0x50
[   14.881329]  ? kasan_atomics+0x152/0x310
[   14.881357]  kasan_atomics+0x1dc/0x310
[   14.881381]  ? __pfx_kasan_atomics+0x10/0x10
[   14.881407]  ? __pfx_read_tsc+0x10/0x10
[   14.881429]  ? ktime_get_ts64+0x86/0x230
[   14.881455]  kunit_try_run_case+0x1a5/0x480
[   14.881480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.881504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.881544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.881568]  ? __kthread_parkme+0x82/0x180
[   14.881591]  ? preempt_count_sub+0x50/0x80
[   14.881616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.881641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.881666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.881690]  kthread+0x337/0x6f0
[   14.881712]  ? trace_preempt_on+0x20/0xc0
[   14.881736]  ? __pfx_kthread+0x10/0x10
[   14.881758]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.881781]  ? calculate_sigpending+0x7b/0xa0
[   14.881806]  ? __pfx_kthread+0x10/0x10
[   14.881829]  ret_from_fork+0x116/0x1d0
[   14.881848]  ? __pfx_kthread+0x10/0x10
[   14.881870]  ret_from_fork_asm+0x1a/0x30
[   14.881902]  </TASK>
[   14.881915] 
[   14.889632] Allocated by task 282:
[   14.889823]  kasan_save_stack+0x45/0x70
[   14.890017]  kasan_save_track+0x18/0x40
[   14.890262]  kasan_save_alloc_info+0x3b/0x50
[   14.890476]  __kasan_kmalloc+0xb7/0xc0
[   14.890633]  __kmalloc_cache_noprof+0x189/0x420
[   14.890859]  kasan_atomics+0x95/0x310
[   14.891024]  kunit_try_run_case+0x1a5/0x480
[   14.891319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.891522]  kthread+0x337/0x6f0
[   14.891696]  ret_from_fork+0x116/0x1d0
[   14.891866]  ret_from_fork_asm+0x1a/0x30
[   14.892060] 
[   14.892168] The buggy address belongs to the object at ffff888103a18380
[   14.892168]  which belongs to the cache kmalloc-64 of size 64
[   14.892604] The buggy address is located 0 bytes to the right of
[   14.892604]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.893057] 
[   14.893133] The buggy address belongs to the physical page:
[   14.893307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.893550] flags: 0x200000000000000(node=0|zone=2)
[   14.893716] page_type: f5(slab)
[   14.893884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.894237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.894733] page dumped because: kasan: bad access detected
[   14.894910] 
[   14.894993] Memory state around the buggy address:
[   14.895157]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.895379]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.895597] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.895972]                                      ^
[   14.896374]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.896710]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.897051] ==================================================================
[   14.611757] ==================================================================
[   14.612098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.612449] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.612795] 
[   14.612914] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.613193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.613209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.613262] Call Trace:
[   14.613282]  <TASK>
[   14.613316]  dump_stack_lvl+0x73/0xb0
[   14.613358]  print_report+0xd1/0x650
[   14.613382]  ? __virt_addr_valid+0x1db/0x2d0
[   14.613417]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.613439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.613463]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.613486]  kasan_report+0x141/0x180
[   14.613563]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.613595]  kasan_check_range+0x10c/0x1c0
[   14.613654]  __kasan_check_write+0x18/0x20
[   14.613675]  kasan_atomics_helper+0xfa9/0x5450
[   14.613728]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.613752]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.613779]  ? kasan_save_alloc_info+0x3b/0x50
[   14.613803]  ? kasan_atomics+0x152/0x310
[   14.613831]  kasan_atomics+0x1dc/0x310
[   14.613856]  ? __pfx_kasan_atomics+0x10/0x10
[   14.613881]  ? __pfx_read_tsc+0x10/0x10
[   14.613904]  ? ktime_get_ts64+0x86/0x230
[   14.613930]  kunit_try_run_case+0x1a5/0x480
[   14.613965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.613989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.614013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.614038]  ? __kthread_parkme+0x82/0x180
[   14.614060]  ? preempt_count_sub+0x50/0x80
[   14.614099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.614124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.614149]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.614173]  kthread+0x337/0x6f0
[   14.614195]  ? trace_preempt_on+0x20/0xc0
[   14.614220]  ? __pfx_kthread+0x10/0x10
[   14.614245]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.614268]  ? calculate_sigpending+0x7b/0xa0
[   14.614293]  ? __pfx_kthread+0x10/0x10
[   14.614316]  ret_from_fork+0x116/0x1d0
[   14.614336]  ? __pfx_kthread+0x10/0x10
[   14.614359]  ret_from_fork_asm+0x1a/0x30
[   14.614391]  </TASK>
[   14.614404] 
[   14.624363] Allocated by task 282:
[   14.624615]  kasan_save_stack+0x45/0x70
[   14.625063]  kasan_save_track+0x18/0x40
[   14.625318]  kasan_save_alloc_info+0x3b/0x50
[   14.625586]  __kasan_kmalloc+0xb7/0xc0
[   14.625816]  __kmalloc_cache_noprof+0x189/0x420
[   14.626061]  kasan_atomics+0x95/0x310
[   14.626264]  kunit_try_run_case+0x1a5/0x480
[   14.626603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.626865]  kthread+0x337/0x6f0
[   14.627100]  ret_from_fork+0x116/0x1d0
[   14.627286]  ret_from_fork_asm+0x1a/0x30
[   14.627571] 
[   14.627793] The buggy address belongs to the object at ffff888103a18380
[   14.627793]  which belongs to the cache kmalloc-64 of size 64
[   14.628376] The buggy address is located 0 bytes to the right of
[   14.628376]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.629587] 
[   14.629705] The buggy address belongs to the physical page:
[   14.629887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.630479] flags: 0x200000000000000(node=0|zone=2)
[   14.630667] page_type: f5(slab)
[   14.630842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.631323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.631655] page dumped because: kasan: bad access detected
[   14.632106] 
[   14.632288] Memory state around the buggy address:
[   14.632723]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.633077]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.633521] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.634064]                                      ^
[   14.634342]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634804]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.635176] ==================================================================
[   15.165450] ==================================================================
[   15.165863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.166133] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.166636] 
[   15.166770] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.166814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.166827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.166850] Call Trace:
[   15.166867]  <TASK>
[   15.166883]  dump_stack_lvl+0x73/0xb0
[   15.166911]  print_report+0xd1/0x650
[   15.166934]  ? __virt_addr_valid+0x1db/0x2d0
[   15.166969]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.166993]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.167019]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.167043]  kasan_report+0x141/0x180
[   15.167068]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.167108]  kasan_check_range+0x10c/0x1c0
[   15.167139]  __kasan_check_write+0x18/0x20
[   15.167160]  kasan_atomics_helper+0x1c18/0x5450
[   15.167185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.167208]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.167234]  ? kasan_save_alloc_info+0x3b/0x50
[   15.167258]  ? kasan_atomics+0x152/0x310
[   15.167287]  kasan_atomics+0x1dc/0x310
[   15.167311]  ? __pfx_kasan_atomics+0x10/0x10
[   15.167338]  ? __pfx_read_tsc+0x10/0x10
[   15.167361]  ? ktime_get_ts64+0x86/0x230
[   15.167385]  kunit_try_run_case+0x1a5/0x480
[   15.167411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.167434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.167461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.167486]  ? __kthread_parkme+0x82/0x180
[   15.167507]  ? preempt_count_sub+0x50/0x80
[   15.167532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.167558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.167583]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.167607]  kthread+0x337/0x6f0
[   15.167629]  ? trace_preempt_on+0x20/0xc0
[   15.167654]  ? __pfx_kthread+0x10/0x10
[   15.167676]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.167699]  ? calculate_sigpending+0x7b/0xa0
[   15.167724]  ? __pfx_kthread+0x10/0x10
[   15.167746]  ret_from_fork+0x116/0x1d0
[   15.167766]  ? __pfx_kthread+0x10/0x10
[   15.167788]  ret_from_fork_asm+0x1a/0x30
[   15.167820]  </TASK>
[   15.167834] 
[   15.175306] Allocated by task 282:
[   15.175495]  kasan_save_stack+0x45/0x70
[   15.175702]  kasan_save_track+0x18/0x40
[   15.175892]  kasan_save_alloc_info+0x3b/0x50
[   15.176160]  __kasan_kmalloc+0xb7/0xc0
[   15.176332]  __kmalloc_cache_noprof+0x189/0x420
[   15.176525]  kasan_atomics+0x95/0x310
[   15.176715]  kunit_try_run_case+0x1a5/0x480
[   15.176913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.177176]  kthread+0x337/0x6f0
[   15.177305]  ret_from_fork+0x116/0x1d0
[   15.177439]  ret_from_fork_asm+0x1a/0x30
[   15.177579] 
[   15.177653] The buggy address belongs to the object at ffff888103a18380
[   15.177653]  which belongs to the cache kmalloc-64 of size 64
[   15.178014] The buggy address is located 0 bytes to the right of
[   15.178014]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.178731] 
[   15.178830] The buggy address belongs to the physical page:
[   15.179079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.179327] flags: 0x200000000000000(node=0|zone=2)
[   15.179494] page_type: f5(slab)
[   15.179623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.179885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.180455] page dumped because: kasan: bad access detected
[   15.180714] 
[   15.180816] Memory state around the buggy address:
[   15.181056]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.181392]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.181726] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.182056]                                      ^
[   15.182261]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182523]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182767] ==================================================================
[   14.333568] ==================================================================
[   14.334323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.334742] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.335032] 
[   14.335198] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.335263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.335291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.335330] Call Trace:
[   14.335359]  <TASK>
[   14.335390]  dump_stack_lvl+0x73/0xb0
[   14.335433]  print_report+0xd1/0x650
[   14.335483]  ? __virt_addr_valid+0x1db/0x2d0
[   14.335520]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.335556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.335595]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.335629]  kasan_report+0x141/0x180
[   14.335654]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.335736]  kasan_check_range+0x10c/0x1c0
[   14.335768]  __kasan_check_write+0x18/0x20
[   14.335790]  kasan_atomics_helper+0x8f9/0x5450
[   14.335814]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.335839]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.335864]  ? kasan_save_alloc_info+0x3b/0x50
[   14.335889]  ? kasan_atomics+0x152/0x310
[   14.335918]  kasan_atomics+0x1dc/0x310
[   14.335953]  ? __pfx_kasan_atomics+0x10/0x10
[   14.335979]  ? __pfx_read_tsc+0x10/0x10
[   14.336001]  ? ktime_get_ts64+0x86/0x230
[   14.336027]  kunit_try_run_case+0x1a5/0x480
[   14.336053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.336077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.336103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.336127]  ? __kthread_parkme+0x82/0x180
[   14.336149]  ? preempt_count_sub+0x50/0x80
[   14.336175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.336200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.336224]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.336250]  kthread+0x337/0x6f0
[   14.336271]  ? trace_preempt_on+0x20/0xc0
[   14.336296]  ? __pfx_kthread+0x10/0x10
[   14.336318]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.336340]  ? calculate_sigpending+0x7b/0xa0
[   14.336365]  ? __pfx_kthread+0x10/0x10
[   14.336388]  ret_from_fork+0x116/0x1d0
[   14.336408]  ? __pfx_kthread+0x10/0x10
[   14.336430]  ret_from_fork_asm+0x1a/0x30
[   14.336603]  </TASK>
[   14.336624] 
[   14.353212] Allocated by task 282:
[   14.353404]  kasan_save_stack+0x45/0x70
[   14.353897]  kasan_save_track+0x18/0x40
[   14.354086]  kasan_save_alloc_info+0x3b/0x50
[   14.354364]  __kasan_kmalloc+0xb7/0xc0
[   14.354750]  __kmalloc_cache_noprof+0x189/0x420
[   14.354987]  kasan_atomics+0x95/0x310
[   14.355237]  kunit_try_run_case+0x1a5/0x480
[   14.355634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.356042]  kthread+0x337/0x6f0
[   14.356334]  ret_from_fork+0x116/0x1d0
[   14.356485]  ret_from_fork_asm+0x1a/0x30
[   14.356723] 
[   14.356906] The buggy address belongs to the object at ffff888103a18380
[   14.356906]  which belongs to the cache kmalloc-64 of size 64
[   14.357837] The buggy address is located 0 bytes to the right of
[   14.357837]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.358429] 
[   14.358645] The buggy address belongs to the physical page:
[   14.358927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.359350] flags: 0x200000000000000(node=0|zone=2)
[   14.359693] page_type: f5(slab)
[   14.359892] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.360258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.360646] page dumped because: kasan: bad access detected
[   14.360987] 
[   14.361188] Memory state around the buggy address:
[   14.361439]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.361985]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.362401] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.362829]                                      ^
[   14.363148]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.363438]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.363806] ==================================================================
[   14.442587] ==================================================================
[   14.442887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.443248] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.443479] 
[   14.443566] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.443607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.443621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.443642] Call Trace:
[   14.443661]  <TASK>
[   14.443678]  dump_stack_lvl+0x73/0xb0
[   14.443705]  print_report+0xd1/0x650
[   14.443727]  ? __virt_addr_valid+0x1db/0x2d0
[   14.443796]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.443821]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.443846]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.443869]  kasan_report+0x141/0x180
[   14.443894]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.443921]  kasan_check_range+0x10c/0x1c0
[   14.443960]  __kasan_check_write+0x18/0x20
[   14.443981]  kasan_atomics_helper+0xb6a/0x5450
[   14.444005]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.444029]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.444054]  ? kasan_save_alloc_info+0x3b/0x50
[   14.444078]  ? kasan_atomics+0x152/0x310
[   14.444106]  kasan_atomics+0x1dc/0x310
[   14.444130]  ? __pfx_kasan_atomics+0x10/0x10
[   14.444156]  ? __pfx_read_tsc+0x10/0x10
[   14.444177]  ? ktime_get_ts64+0x86/0x230
[   14.444202]  kunit_try_run_case+0x1a5/0x480
[   14.444227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.444251]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.444274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.444299]  ? __kthread_parkme+0x82/0x180
[   14.444321]  ? preempt_count_sub+0x50/0x80
[   14.444344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.444369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.444393]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.444417]  kthread+0x337/0x6f0
[   14.444438]  ? trace_preempt_on+0x20/0xc0
[   14.444620]  ? __pfx_kthread+0x10/0x10
[   14.444652]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.444676]  ? calculate_sigpending+0x7b/0xa0
[   14.444701]  ? __pfx_kthread+0x10/0x10
[   14.444724]  ret_from_fork+0x116/0x1d0
[   14.444745]  ? __pfx_kthread+0x10/0x10
[   14.444767]  ret_from_fork_asm+0x1a/0x30
[   14.444799]  </TASK>
[   14.444813] 
[   14.453657] Allocated by task 282:
[   14.453792]  kasan_save_stack+0x45/0x70
[   14.453949]  kasan_save_track+0x18/0x40
[   14.454086]  kasan_save_alloc_info+0x3b/0x50
[   14.454237]  __kasan_kmalloc+0xb7/0xc0
[   14.454372]  __kmalloc_cache_noprof+0x189/0x420
[   14.454539]  kasan_atomics+0x95/0x310
[   14.454730]  kunit_try_run_case+0x1a5/0x480
[   14.455202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.455508]  kthread+0x337/0x6f0
[   14.455689]  ret_from_fork+0x116/0x1d0
[   14.455879]  ret_from_fork_asm+0x1a/0x30
[   14.456058] 
[   14.456167] The buggy address belongs to the object at ffff888103a18380
[   14.456167]  which belongs to the cache kmalloc-64 of size 64
[   14.456923] The buggy address is located 0 bytes to the right of
[   14.456923]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.457373] 
[   14.457451] The buggy address belongs to the physical page:
[   14.457734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.458195] flags: 0x200000000000000(node=0|zone=2)
[   14.458423] page_type: f5(slab)
[   14.458639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.458927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.459371] page dumped because: kasan: bad access detected
[   14.459729] 
[   14.459832] Memory state around the buggy address:
[   14.460041]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.460325]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.460788] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.461094]                                      ^
[   14.461322]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.461679]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.461907] ==================================================================
[   15.028891] ==================================================================
[   15.030121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.030760] Write of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.031444] 
[   15.031618] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.031662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.031676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.031699] Call Trace:
[   15.031717]  <TASK>
[   15.031734]  dump_stack_lvl+0x73/0xb0
[   15.031762]  print_report+0xd1/0x650
[   15.031785]  ? __virt_addr_valid+0x1db/0x2d0
[   15.031809]  ? kasan_atomics_helper+0x1818/0x5450
[   15.031833]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.031857]  ? kasan_atomics_helper+0x1818/0x5450
[   15.031880]  kasan_report+0x141/0x180
[   15.031904]  ? kasan_atomics_helper+0x1818/0x5450
[   15.031931]  kasan_check_range+0x10c/0x1c0
[   15.031969]  __kasan_check_write+0x18/0x20
[   15.031990]  kasan_atomics_helper+0x1818/0x5450
[   15.032014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.032038]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.032063]  ? kasan_save_alloc_info+0x3b/0x50
[   15.032088]  ? kasan_atomics+0x152/0x310
[   15.032117]  kasan_atomics+0x1dc/0x310
[   15.032140]  ? __pfx_kasan_atomics+0x10/0x10
[   15.032167]  ? __pfx_read_tsc+0x10/0x10
[   15.032190]  ? ktime_get_ts64+0x86/0x230
[   15.032215]  kunit_try_run_case+0x1a5/0x480
[   15.032241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.032264]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.032289]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.032313]  ? __kthread_parkme+0x82/0x180
[   15.032335]  ? preempt_count_sub+0x50/0x80
[   15.032360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.032385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.032409]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.032434]  kthread+0x337/0x6f0
[   15.032455]  ? trace_preempt_on+0x20/0xc0
[   15.032479]  ? __pfx_kthread+0x10/0x10
[   15.032502]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.032525]  ? calculate_sigpending+0x7b/0xa0
[   15.032550]  ? __pfx_kthread+0x10/0x10
[   15.032573]  ret_from_fork+0x116/0x1d0
[   15.032593]  ? __pfx_kthread+0x10/0x10
[   15.032615]  ret_from_fork_asm+0x1a/0x30
[   15.032647]  </TASK>
[   15.032661] 
[   15.042856] Allocated by task 282:
[   15.043062]  kasan_save_stack+0x45/0x70
[   15.043265]  kasan_save_track+0x18/0x40
[   15.043451]  kasan_save_alloc_info+0x3b/0x50
[   15.043653]  __kasan_kmalloc+0xb7/0xc0
[   15.043831]  __kmalloc_cache_noprof+0x189/0x420
[   15.044052]  kasan_atomics+0x95/0x310
[   15.044622]  kunit_try_run_case+0x1a5/0x480
[   15.044780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.044972]  kthread+0x337/0x6f0
[   15.045098]  ret_from_fork+0x116/0x1d0
[   15.045235]  ret_from_fork_asm+0x1a/0x30
[   15.045378] 
[   15.045452] The buggy address belongs to the object at ffff888103a18380
[   15.045452]  which belongs to the cache kmalloc-64 of size 64
[   15.045805] The buggy address is located 0 bytes to the right of
[   15.045805]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.046969] 
[   15.047124] The buggy address belongs to the physical page:
[   15.047578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.048279] flags: 0x200000000000000(node=0|zone=2)
[   15.048732] page_type: f5(slab)
[   15.049042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.049385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.049700] page dumped because: kasan: bad access detected
[   15.049937] 
[   15.050024] Memory state around the buggy address:
[   15.050187]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.050654]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.050898] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.051393]                                      ^
[   15.051622]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.051928]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.052201] ==================================================================
[   15.405843] ==================================================================
[   15.406192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.406918] Read of size 8 at addr ffff888103a183b0 by task kunit_try_catch/282
[   15.407332] 
[   15.407438] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.407483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.407496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.407520] Call Trace:
[   15.407539]  <TASK>
[   15.407558]  dump_stack_lvl+0x73/0xb0
[   15.407587]  print_report+0xd1/0x650
[   15.407611]  ? __virt_addr_valid+0x1db/0x2d0
[   15.407638]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.407661]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.407686]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.407709]  kasan_report+0x141/0x180
[   15.407733]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.407761]  __asan_report_load8_noabort+0x18/0x20
[   15.407786]  kasan_atomics_helper+0x4fb2/0x5450
[   15.407811]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.407834]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.407858]  ? kasan_save_alloc_info+0x3b/0x50
[   15.407883]  ? kasan_atomics+0x152/0x310
[   15.407911]  kasan_atomics+0x1dc/0x310
[   15.407936]  ? __pfx_kasan_atomics+0x10/0x10
[   15.407974]  ? __pfx_read_tsc+0x10/0x10
[   15.407997]  ? ktime_get_ts64+0x86/0x230
[   15.408022]  kunit_try_run_case+0x1a5/0x480
[   15.408047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.408082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.408107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.408131]  ? __kthread_parkme+0x82/0x180
[   15.408153]  ? preempt_count_sub+0x50/0x80
[   15.408177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.408203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.408227]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.408251]  kthread+0x337/0x6f0
[   15.408272]  ? trace_preempt_on+0x20/0xc0
[   15.408296]  ? __pfx_kthread+0x10/0x10
[   15.408317]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.408341]  ? calculate_sigpending+0x7b/0xa0
[   15.408366]  ? __pfx_kthread+0x10/0x10
[   15.408388]  ret_from_fork+0x116/0x1d0
[   15.408408]  ? __pfx_kthread+0x10/0x10
[   15.408431]  ret_from_fork_asm+0x1a/0x30
[   15.408463]  </TASK>
[   15.408475] 
[   15.416079] Allocated by task 282:
[   15.416278]  kasan_save_stack+0x45/0x70
[   15.416456]  kasan_save_track+0x18/0x40
[   15.416649]  kasan_save_alloc_info+0x3b/0x50
[   15.416830]  __kasan_kmalloc+0xb7/0xc0
[   15.417029]  __kmalloc_cache_noprof+0x189/0x420
[   15.417223]  kasan_atomics+0x95/0x310
[   15.417379]  kunit_try_run_case+0x1a5/0x480
[   15.417592]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.417828]  kthread+0x337/0x6f0
[   15.418009]  ret_from_fork+0x116/0x1d0
[   15.418199]  ret_from_fork_asm+0x1a/0x30
[   15.418341] 
[   15.418415] The buggy address belongs to the object at ffff888103a18380
[   15.418415]  which belongs to the cache kmalloc-64 of size 64
[   15.418931] The buggy address is located 0 bytes to the right of
[   15.418931]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   15.419315] 
[   15.419390] The buggy address belongs to the physical page:
[   15.419568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   15.420053] flags: 0x200000000000000(node=0|zone=2)
[   15.420300] page_type: f5(slab)
[   15.420519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.420752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.420991] page dumped because: kasan: bad access detected
[   15.421163] 
[   15.421236] Memory state around the buggy address:
[   15.421471]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.421800]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.422225] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.422550]                                      ^
[   15.422780]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.423117]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.423461] ==================================================================
[   14.130151] ==================================================================
[   14.130597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.131229] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.131635] 
[   14.131800] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.131860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.131874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.131898] Call Trace:
[   14.131916]  <TASK>
[   14.131934]  dump_stack_lvl+0x73/0xb0
[   14.131975]  print_report+0xd1/0x650
[   14.131999]  ? __virt_addr_valid+0x1db/0x2d0
[   14.132023]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.132091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.132115]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.132177]  kasan_report+0x141/0x180
[   14.132202]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.132242]  __asan_report_load4_noabort+0x18/0x20
[   14.132268]  kasan_atomics_helper+0x4b54/0x5450
[   14.132291]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.132315]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.132340]  ? kasan_save_alloc_info+0x3b/0x50
[   14.132364]  ? kasan_atomics+0x152/0x310
[   14.132393]  kasan_atomics+0x1dc/0x310
[   14.132418]  ? __pfx_kasan_atomics+0x10/0x10
[   14.132443]  ? __pfx_read_tsc+0x10/0x10
[   14.132481]  ? ktime_get_ts64+0x86/0x230
[   14.132506]  kunit_try_run_case+0x1a5/0x480
[   14.132532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.132711]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.132738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.132794]  ? __kthread_parkme+0x82/0x180
[   14.132816]  ? preempt_count_sub+0x50/0x80
[   14.132854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.132879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.132904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.132944]  kthread+0x337/0x6f0
[   14.132965]  ? trace_preempt_on+0x20/0xc0
[   14.132990]  ? __pfx_kthread+0x10/0x10
[   14.133011]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.133034]  ? calculate_sigpending+0x7b/0xa0
[   14.133060]  ? __pfx_kthread+0x10/0x10
[   14.133094]  ret_from_fork+0x116/0x1d0
[   14.133115]  ? __pfx_kthread+0x10/0x10
[   14.133138]  ret_from_fork_asm+0x1a/0x30
[   14.133184]  </TASK>
[   14.133199] 
[   14.142313] Allocated by task 282:
[   14.142831]  kasan_save_stack+0x45/0x70
[   14.143102]  kasan_save_track+0x18/0x40
[   14.143254]  kasan_save_alloc_info+0x3b/0x50
[   14.143535]  __kasan_kmalloc+0xb7/0xc0
[   14.143674]  __kmalloc_cache_noprof+0x189/0x420
[   14.143832]  kasan_atomics+0x95/0x310
[   14.144246]  kunit_try_run_case+0x1a5/0x480
[   14.144522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.144762]  kthread+0x337/0x6f0
[   14.144997]  ret_from_fork+0x116/0x1d0
[   14.145321]  ret_from_fork_asm+0x1a/0x30
[   14.145601] 
[   14.145685] The buggy address belongs to the object at ffff888103a18380
[   14.145685]  which belongs to the cache kmalloc-64 of size 64
[   14.146261] The buggy address is located 0 bytes to the right of
[   14.146261]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.147103] 
[   14.147209] The buggy address belongs to the physical page:
[   14.147592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.147922] flags: 0x200000000000000(node=0|zone=2)
[   14.148278] page_type: f5(slab)
[   14.148586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.148893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.149346] page dumped because: kasan: bad access detected
[   14.149736] 
[   14.149834] Memory state around the buggy address:
[   14.150064]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.150366]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.150830] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.151192]                                      ^
[   14.151623]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.151908]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.152352] ==================================================================
[   14.736196] ==================================================================
[   14.736787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.737041] Read of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.737745] 
[   14.737838] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.737882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.737896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.737919] Call Trace:
[   14.737933]  <TASK>
[   14.737959]  dump_stack_lvl+0x73/0xb0
[   14.737987]  print_report+0xd1/0x650
[   14.738010]  ? __virt_addr_valid+0x1db/0x2d0
[   14.738034]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.738056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.738090]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.738113]  kasan_report+0x141/0x180
[   14.738137]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.738165]  __asan_report_load4_noabort+0x18/0x20
[   14.738191]  kasan_atomics_helper+0x4a02/0x5450
[   14.738215]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.738239]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.738265]  ? kasan_save_alloc_info+0x3b/0x50
[   14.738290]  ? kasan_atomics+0x152/0x310
[   14.738317]  kasan_atomics+0x1dc/0x310
[   14.738342]  ? __pfx_kasan_atomics+0x10/0x10
[   14.738368]  ? __pfx_read_tsc+0x10/0x10
[   14.738391]  ? ktime_get_ts64+0x86/0x230
[   14.738416]  kunit_try_run_case+0x1a5/0x480
[   14.738442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.738465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.738490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.738515]  ? __kthread_parkme+0x82/0x180
[   14.738535]  ? preempt_count_sub+0x50/0x80
[   14.738560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.738585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.738610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.738635]  kthread+0x337/0x6f0
[   14.738656]  ? trace_preempt_on+0x20/0xc0
[   14.738681]  ? __pfx_kthread+0x10/0x10
[   14.738703]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.738726]  ? calculate_sigpending+0x7b/0xa0
[   14.738751]  ? __pfx_kthread+0x10/0x10
[   14.738774]  ret_from_fork+0x116/0x1d0
[   14.738794]  ? __pfx_kthread+0x10/0x10
[   14.738816]  ret_from_fork_asm+0x1a/0x30
[   14.738848]  </TASK>
[   14.738861] 
[   14.746326] Allocated by task 282:
[   14.746515]  kasan_save_stack+0x45/0x70
[   14.746802]  kasan_save_track+0x18/0x40
[   14.746966]  kasan_save_alloc_info+0x3b/0x50
[   14.747123]  __kasan_kmalloc+0xb7/0xc0
[   14.747258]  __kmalloc_cache_noprof+0x189/0x420
[   14.747415]  kasan_atomics+0x95/0x310
[   14.747550]  kunit_try_run_case+0x1a5/0x480
[   14.747743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.748015]  kthread+0x337/0x6f0
[   14.748336]  ret_from_fork+0x116/0x1d0
[   14.748532]  ret_from_fork_asm+0x1a/0x30
[   14.748737] 
[   14.748838] The buggy address belongs to the object at ffff888103a18380
[   14.748838]  which belongs to the cache kmalloc-64 of size 64
[   14.749636] The buggy address is located 0 bytes to the right of
[   14.749636]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.750082] 
[   14.750184] The buggy address belongs to the physical page:
[   14.750448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.750766] flags: 0x200000000000000(node=0|zone=2)
[   14.750993] page_type: f5(slab)
[   14.751196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.751509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.751806] page dumped because: kasan: bad access detected
[   14.752046] 
[   14.752145] Memory state around the buggy address:
[   14.752355]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.752577]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.752795] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.753022]                                      ^
[   14.753181]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.753505]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.753834] ==================================================================
[   14.504061] ==================================================================
[   14.504378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.505332] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.506165] 
[   14.506301] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.506349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.506365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.506387] Call Trace:
[   14.506402]  <TASK>
[   14.506419]  dump_stack_lvl+0x73/0xb0
[   14.506449]  print_report+0xd1/0x650
[   14.506632]  ? __virt_addr_valid+0x1db/0x2d0
[   14.506661]  ? kasan_atomics_helper+0xd47/0x5450
[   14.506684]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.506709]  ? kasan_atomics_helper+0xd47/0x5450
[   14.506732]  kasan_report+0x141/0x180
[   14.506756]  ? kasan_atomics_helper+0xd47/0x5450
[   14.506783]  kasan_check_range+0x10c/0x1c0
[   14.506809]  __kasan_check_write+0x18/0x20
[   14.506831]  kasan_atomics_helper+0xd47/0x5450
[   14.506856]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.506879]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.506905]  ? kasan_save_alloc_info+0x3b/0x50
[   14.506930]  ? kasan_atomics+0x152/0x310
[   14.506971]  kasan_atomics+0x1dc/0x310
[   14.506996]  ? __pfx_kasan_atomics+0x10/0x10
[   14.507022]  ? __pfx_read_tsc+0x10/0x10
[   14.507044]  ? ktime_get_ts64+0x86/0x230
[   14.507100]  kunit_try_run_case+0x1a5/0x480
[   14.507153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.507331]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.507363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.507390]  ? __kthread_parkme+0x82/0x180
[   14.507412]  ? preempt_count_sub+0x50/0x80
[   14.507437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.507470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.507496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.507520]  kthread+0x337/0x6f0
[   14.507542]  ? trace_preempt_on+0x20/0xc0
[   14.507566]  ? __pfx_kthread+0x10/0x10
[   14.507587]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.507610]  ? calculate_sigpending+0x7b/0xa0
[   14.507634]  ? __pfx_kthread+0x10/0x10
[   14.507658]  ret_from_fork+0x116/0x1d0
[   14.507677]  ? __pfx_kthread+0x10/0x10
[   14.507698]  ret_from_fork_asm+0x1a/0x30
[   14.507730]  </TASK>
[   14.507743] 
[   14.522659] Allocated by task 282:
[   14.523013]  kasan_save_stack+0x45/0x70
[   14.523506]  kasan_save_track+0x18/0x40
[   14.523885]  kasan_save_alloc_info+0x3b/0x50
[   14.524093]  __kasan_kmalloc+0xb7/0xc0
[   14.524226]  __kmalloc_cache_noprof+0x189/0x420
[   14.524380]  kasan_atomics+0x95/0x310
[   14.524513]  kunit_try_run_case+0x1a5/0x480
[   14.524661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.524965]  kthread+0x337/0x6f0
[   14.525127]  ret_from_fork+0x116/0x1d0
[   14.525291]  ret_from_fork_asm+0x1a/0x30
[   14.525468] 
[   14.525561] The buggy address belongs to the object at ffff888103a18380
[   14.525561]  which belongs to the cache kmalloc-64 of size 64
[   14.525950] The buggy address is located 0 bytes to the right of
[   14.525950]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.526692] 
[   14.526768] The buggy address belongs to the physical page:
[   14.526946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.527638] flags: 0x200000000000000(node=0|zone=2)
[   14.527837] page_type: f5(slab)
[   14.528015] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.528289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.528552] page dumped because: kasan: bad access detected
[   14.528809] 
[   14.528905] Memory state around the buggy address:
[   14.529261]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.529556]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.529869] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.530304]                                      ^
[   14.530588]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.531006]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.531350] ==================================================================
[   14.754403] ==================================================================
[   14.755156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.755395] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.755616] 
[   14.755702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.755745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.755759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.755781] Call Trace:
[   14.755796]  <TASK>
[   14.755811]  dump_stack_lvl+0x73/0xb0
[   14.755841]  print_report+0xd1/0x650
[   14.755864]  ? __virt_addr_valid+0x1db/0x2d0
[   14.755888]  ? kasan_atomics_helper+0x1217/0x5450
[   14.755911]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.755934]  ? kasan_atomics_helper+0x1217/0x5450
[   14.755968]  kasan_report+0x141/0x180
[   14.756009]  ? kasan_atomics_helper+0x1217/0x5450
[   14.756038]  kasan_check_range+0x10c/0x1c0
[   14.756063]  __kasan_check_write+0x18/0x20
[   14.756094]  kasan_atomics_helper+0x1217/0x5450
[   14.756119]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.756142]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.756169]  ? kasan_save_alloc_info+0x3b/0x50
[   14.756193]  ? kasan_atomics+0x152/0x310
[   14.756221]  kasan_atomics+0x1dc/0x310
[   14.756245]  ? __pfx_kasan_atomics+0x10/0x10
[   14.756271]  ? __pfx_read_tsc+0x10/0x10
[   14.756293]  ? ktime_get_ts64+0x86/0x230
[   14.756320]  kunit_try_run_case+0x1a5/0x480
[   14.756344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.756367]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.756392]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.756417]  ? __kthread_parkme+0x82/0x180
[   14.756438]  ? preempt_count_sub+0x50/0x80
[   14.756463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.756489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.756514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.756539]  kthread+0x337/0x6f0
[   14.756559]  ? trace_preempt_on+0x20/0xc0
[   14.756584]  ? __pfx_kthread+0x10/0x10
[   14.756607]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.756630]  ? calculate_sigpending+0x7b/0xa0
[   14.756655]  ? __pfx_kthread+0x10/0x10
[   14.756677]  ret_from_fork+0x116/0x1d0
[   14.756697]  ? __pfx_kthread+0x10/0x10
[   14.756719]  ret_from_fork_asm+0x1a/0x30
[   14.756751]  </TASK>
[   14.756764] 
[   14.764590] Allocated by task 282:
[   14.764781]  kasan_save_stack+0x45/0x70
[   14.764947]  kasan_save_track+0x18/0x40
[   14.765173]  kasan_save_alloc_info+0x3b/0x50
[   14.765388]  __kasan_kmalloc+0xb7/0xc0
[   14.765537]  __kmalloc_cache_noprof+0x189/0x420
[   14.765752]  kasan_atomics+0x95/0x310
[   14.765932]  kunit_try_run_case+0x1a5/0x480
[   14.766157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.766397]  kthread+0x337/0x6f0
[   14.766545]  ret_from_fork+0x116/0x1d0
[   14.766694]  ret_from_fork_asm+0x1a/0x30
[   14.766834] 
[   14.766908] The buggy address belongs to the object at ffff888103a18380
[   14.766908]  which belongs to the cache kmalloc-64 of size 64
[   14.767277] The buggy address is located 0 bytes to the right of
[   14.767277]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.767643] 
[   14.767718] The buggy address belongs to the physical page:
[   14.767925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.768723] flags: 0x200000000000000(node=0|zone=2)
[   14.768973] page_type: f5(slab)
[   14.769224] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.769572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.769816] page dumped because: kasan: bad access detected
[   14.770009] 
[   14.770084] Memory state around the buggy address:
[   14.770242]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.770462]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.770682] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.771058]                                      ^
[   14.771294]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.771630]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.771962] ==================================================================
[   14.364447] ==================================================================
[   14.364797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.365119] Write of size 4 at addr ffff888103a183b0 by task kunit_try_catch/282
[   14.365457] 
[   14.365821] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.365871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.365886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.365909] Call Trace:
[   14.365928]  <TASK>
[   14.365958]  dump_stack_lvl+0x73/0xb0
[   14.365988]  print_report+0xd1/0x650
[   14.366050]  ? __virt_addr_valid+0x1db/0x2d0
[   14.366077]  ? kasan_atomics_helper+0x992/0x5450
[   14.366130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.366154]  ? kasan_atomics_helper+0x992/0x5450
[   14.366177]  kasan_report+0x141/0x180
[   14.366200]  ? kasan_atomics_helper+0x992/0x5450
[   14.366227]  kasan_check_range+0x10c/0x1c0
[   14.366253]  __kasan_check_write+0x18/0x20
[   14.366273]  kasan_atomics_helper+0x992/0x5450
[   14.366297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.366321]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.366377]  ? kasan_save_alloc_info+0x3b/0x50
[   14.366404]  ? kasan_atomics+0x152/0x310
[   14.366433]  kasan_atomics+0x1dc/0x310
[   14.366456]  ? __pfx_kasan_atomics+0x10/0x10
[   14.366493]  ? __pfx_read_tsc+0x10/0x10
[   14.366514]  ? ktime_get_ts64+0x86/0x230
[   14.366625]  kunit_try_run_case+0x1a5/0x480
[   14.366652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.366677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.366702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.366727]  ? __kthread_parkme+0x82/0x180
[   14.366749]  ? preempt_count_sub+0x50/0x80
[   14.366774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.366799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.366824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.366849]  kthread+0x337/0x6f0
[   14.366870]  ? trace_preempt_on+0x20/0xc0
[   14.366896]  ? __pfx_kthread+0x10/0x10
[   14.366918]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.366952]  ? calculate_sigpending+0x7b/0xa0
[   14.366978]  ? __pfx_kthread+0x10/0x10
[   14.367000]  ret_from_fork+0x116/0x1d0
[   14.367021]  ? __pfx_kthread+0x10/0x10
[   14.367043]  ret_from_fork_asm+0x1a/0x30
[   14.367089]  </TASK>
[   14.367104] 
[   14.382354] Allocated by task 282:
[   14.382558]  kasan_save_stack+0x45/0x70
[   14.382968]  kasan_save_track+0x18/0x40
[   14.383380]  kasan_save_alloc_info+0x3b/0x50
[   14.383914]  __kasan_kmalloc+0xb7/0xc0
[   14.384403]  __kmalloc_cache_noprof+0x189/0x420
[   14.384958]  kasan_atomics+0x95/0x310
[   14.385257]  kunit_try_run_case+0x1a5/0x480
[   14.385636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.386236]  kthread+0x337/0x6f0
[   14.386396]  ret_from_fork+0x116/0x1d0
[   14.386848]  ret_from_fork_asm+0x1a/0x30
[   14.387090] 
[   14.387291] The buggy address belongs to the object at ffff888103a18380
[   14.387291]  which belongs to the cache kmalloc-64 of size 64
[   14.388000] The buggy address is located 0 bytes to the right of
[   14.388000]  allocated 48-byte region [ffff888103a18380, ffff888103a183b0)
[   14.389233] 
[   14.389426] The buggy address belongs to the physical page:
[   14.390020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a18
[   14.390776] flags: 0x200000000000000(node=0|zone=2)
[   14.391282] page_type: f5(slab)
[   14.391598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.392053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.392280] page dumped because: kasan: bad access detected
[   14.392450] 
[   14.392677] Memory state around the buggy address:
[   14.393141]  ffff888103a18280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.393796]  ffff888103a18300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.394682] >ffff888103a18380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.395483]                                      ^
[   14.396063]  ffff888103a18400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.396817]  ffff888103a18480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.397044] ==================================================================