Hay
Date
July 18, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.177452] ==================================================================
[   18.177663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.178024] Write of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.178179] 
[   18.178233] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.178325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.178550] Hardware name: linux,dummy-virt (DT)
[   18.178840] Call trace:
[   18.179130]  show_stack+0x20/0x38 (C)
[   18.179237]  dump_stack_lvl+0x8c/0xd0
[   18.179612]  print_report+0x118/0x5d0
[   18.179697]  kasan_report+0xdc/0x128
[   18.179747]  kasan_check_range+0x100/0x1a8
[   18.180099]  __kasan_check_write+0x20/0x30
[   18.180461]  kasan_atomics_helper+0xd3c/0x4858
[   18.180569]  kasan_atomics+0x198/0x2e0
[   18.180620]  kunit_try_run_case+0x170/0x3f0
[   18.180961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.181311]  kthread+0x328/0x630
[   18.181490]  ret_from_fork+0x10/0x20
[   18.181713] 
[   18.181751] Allocated by task 265:
[   18.182119]  kasan_save_stack+0x3c/0x68
[   18.182388]  kasan_save_track+0x20/0x40
[   18.182493]  kasan_save_alloc_info+0x40/0x58
[   18.182542]  __kasan_kmalloc+0xd4/0xd8
[   18.182958]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.183161]  kasan_atomics+0xb8/0x2e0
[   18.183383]  kunit_try_run_case+0x170/0x3f0
[   18.183432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.183481]  kthread+0x328/0x630
[   18.183882]  ret_from_fork+0x10/0x20
[   18.184307] 
[   18.184354] The buggy address belongs to the object at fff00000c784ef80
[   18.184354]  which belongs to the cache kmalloc-64 of size 64
[   18.184857] The buggy address is located 0 bytes to the right of
[   18.184857]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.185132] 
[   18.185240] The buggy address belongs to the physical page:
[   18.185278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.185344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.185450] page_type: f5(slab)
[   18.185537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.186075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.186161] page dumped because: kasan: bad access detected
[   18.186312] 
[   18.186391] Memory state around the buggy address:
[   18.186590]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.186736]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.186884] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.186980]                                      ^
[   18.187140]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.187190]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.187232] ==================================================================
[   18.239580] ==================================================================
[   18.239646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.239700] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.239753] 
[   18.239793] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.240092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.240135] Hardware name: linux,dummy-virt (DT)
[   18.240250] Call trace:
[   18.240290]  show_stack+0x20/0x38 (C)
[   18.240354]  dump_stack_lvl+0x8c/0xd0
[   18.240412]  print_report+0x118/0x5d0
[   18.240470]  kasan_report+0xdc/0x128
[   18.240819]  kasan_check_range+0x100/0x1a8
[   18.241012]  __kasan_check_write+0x20/0x30
[   18.241259]  kasan_atomics_helper+0xf20/0x4858
[   18.241519]  kasan_atomics+0x198/0x2e0
[   18.241669]  kunit_try_run_case+0x170/0x3f0
[   18.241853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.241910]  kthread+0x328/0x630
[   18.241956]  ret_from_fork+0x10/0x20
[   18.242005] 
[   18.242025] Allocated by task 265:
[   18.242295]  kasan_save_stack+0x3c/0x68
[   18.242665]  kasan_save_track+0x20/0x40
[   18.242807]  kasan_save_alloc_info+0x40/0x58
[   18.243135]  __kasan_kmalloc+0xd4/0xd8
[   18.243402]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.243619]  kasan_atomics+0xb8/0x2e0
[   18.243837]  kunit_try_run_case+0x170/0x3f0
[   18.243921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.244237]  kthread+0x328/0x630
[   18.244292]  ret_from_fork+0x10/0x20
[   18.244364] 
[   18.244387] The buggy address belongs to the object at fff00000c784ef80
[   18.244387]  which belongs to the cache kmalloc-64 of size 64
[   18.244468] The buggy address is located 0 bytes to the right of
[   18.244468]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.245081] 
[   18.245131] The buggy address belongs to the physical page:
[   18.245295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.245421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.245556] page_type: f5(slab)
[   18.245597] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.245658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.245879] page dumped because: kasan: bad access detected
[   18.246023] 
[   18.246283] Memory state around the buggy address:
[   18.246584]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.246655]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.246742] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.246988]                                      ^
[   18.247308]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.247485]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.247751] ==================================================================
[   18.301060] ==================================================================
[   18.301110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.301171] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.301224] 
[   18.301255] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.301861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.302429] Hardware name: linux,dummy-virt (DT)
[   18.302494] Call trace:
[   18.302538]  show_stack+0x20/0x38 (C)
[   18.302647]  dump_stack_lvl+0x8c/0xd0
[   18.302746]  print_report+0x118/0x5d0
[   18.302824]  kasan_report+0xdc/0x128
[   18.302966]  kasan_check_range+0x100/0x1a8
[   18.303193]  __kasan_check_write+0x20/0x30
[   18.303557]  kasan_atomics_helper+0x11f8/0x4858
[   18.303703]  kasan_atomics+0x198/0x2e0
[   18.303793]  kunit_try_run_case+0x170/0x3f0
[   18.303876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.304361]  kthread+0x328/0x630
[   18.304449]  ret_from_fork+0x10/0x20
[   18.304554] 
[   18.304888] Allocated by task 265:
[   18.305166]  kasan_save_stack+0x3c/0x68
[   18.305284]  kasan_save_track+0x20/0x40
[   18.305441]  kasan_save_alloc_info+0x40/0x58
[   18.305485]  __kasan_kmalloc+0xd4/0xd8
[   18.305536]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.305726]  kasan_atomics+0xb8/0x2e0
[   18.305847]  kunit_try_run_case+0x170/0x3f0
[   18.306002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.306222]  kthread+0x328/0x630
[   18.306662]  ret_from_fork+0x10/0x20
[   18.306747] 
[   18.306789] The buggy address belongs to the object at fff00000c784ef80
[   18.306789]  which belongs to the cache kmalloc-64 of size 64
[   18.307077] The buggy address is located 0 bytes to the right of
[   18.307077]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.307188] 
[   18.307304] The buggy address belongs to the physical page:
[   18.307351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.307648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.307811] page_type: f5(slab)
[   18.307868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.307944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.308144] page dumped because: kasan: bad access detected
[   18.308187] 
[   18.308518] Memory state around the buggy address:
[   18.308752]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.309094]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.309161] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.309677]                                      ^
[   18.309888]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.310096]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.310155] ==================================================================
[   18.374522] ==================================================================
[   18.374584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.374927] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.375117] 
[   18.375163] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.375520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.375581] Hardware name: linux,dummy-virt (DT)
[   18.375653] Call trace:
[   18.375680]  show_stack+0x20/0x38 (C)
[   18.375764]  dump_stack_lvl+0x8c/0xd0
[   18.375877]  print_report+0x118/0x5d0
[   18.375929]  kasan_report+0xdc/0x128
[   18.376126]  kasan_check_range+0x100/0x1a8
[   18.376223]  __kasan_check_write+0x20/0x30
[   18.376391]  kasan_atomics_helper+0x154c/0x4858
[   18.376457]  kasan_atomics+0x198/0x2e0
[   18.376503]  kunit_try_run_case+0x170/0x3f0
[   18.376719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.376889]  kthread+0x328/0x630
[   18.377004]  ret_from_fork+0x10/0x20
[   18.377067] 
[   18.377090] Allocated by task 265:
[   18.377120]  kasan_save_stack+0x3c/0x68
[   18.377164]  kasan_save_track+0x20/0x40
[   18.377211]  kasan_save_alloc_info+0x40/0x58
[   18.377254]  __kasan_kmalloc+0xd4/0xd8
[   18.377292]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.377785]  kasan_atomics+0xb8/0x2e0
[   18.377876]  kunit_try_run_case+0x170/0x3f0
[   18.377987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.378084]  kthread+0x328/0x630
[   18.378215]  ret_from_fork+0x10/0x20
[   18.378294] 
[   18.378350] The buggy address belongs to the object at fff00000c784ef80
[   18.378350]  which belongs to the cache kmalloc-64 of size 64
[   18.378563] The buggy address is located 0 bytes to the right of
[   18.378563]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.378665] 
[   18.378720] The buggy address belongs to the physical page:
[   18.378772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.379183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.379273] page_type: f5(slab)
[   18.379513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.379982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.380084] page dumped because: kasan: bad access detected
[   18.380219] 
[   18.380247] Memory state around the buggy address:
[   18.380285]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.380513]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.380880] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.380974]                                      ^
[   18.381099]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.381181]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.381223] ==================================================================
[   18.188221] ==================================================================
[   18.188275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.188342] Read of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.188408] 
[   18.188449] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.188532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.188569] Hardware name: linux,dummy-virt (DT)
[   18.188602] Call trace:
[   18.188626]  show_stack+0x20/0x38 (C)
[   18.188676]  dump_stack_lvl+0x8c/0xd0
[   18.188723]  print_report+0x118/0x5d0
[   18.188773]  kasan_report+0xdc/0x128
[   18.188820]  __asan_report_load4_noabort+0x20/0x30
[   18.188875]  kasan_atomics_helper+0x3e04/0x4858
[   18.188932]  kasan_atomics+0x198/0x2e0
[   18.188982]  kunit_try_run_case+0x170/0x3f0
[   18.189042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.189109]  kthread+0x328/0x630
[   18.189155]  ret_from_fork+0x10/0x20
[   18.189205] 
[   18.189227] Allocated by task 265:
[   18.189257]  kasan_save_stack+0x3c/0x68
[   18.189300]  kasan_save_track+0x20/0x40
[   18.189493]  kasan_save_alloc_info+0x40/0x58
[   18.190015]  __kasan_kmalloc+0xd4/0xd8
[   18.190351]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.190421]  kasan_atomics+0xb8/0x2e0
[   18.190483]  kunit_try_run_case+0x170/0x3f0
[   18.190549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.191008]  kthread+0x328/0x630
[   18.191276]  ret_from_fork+0x10/0x20
[   18.191342] 
[   18.191586] The buggy address belongs to the object at fff00000c784ef80
[   18.191586]  which belongs to the cache kmalloc-64 of size 64
[   18.191895] The buggy address is located 0 bytes to the right of
[   18.191895]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.192113] 
[   18.192139] The buggy address belongs to the physical page:
[   18.192194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.192421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.192718] page_type: f5(slab)
[   18.192854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.193028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.193074] page dumped because: kasan: bad access detected
[   18.193237] 
[   18.193412] Memory state around the buggy address:
[   18.193809]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.194026]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.194097] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.194417]                                      ^
[   18.194525]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.194684]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.194929] ==================================================================
[   18.063280] ==================================================================
[   18.063347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   18.063702] Read of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.063775] 
[   18.063935] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.064244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.064408] Hardware name: linux,dummy-virt (DT)
[   18.064600] Call trace:
[   18.064675]  show_stack+0x20/0x38 (C)
[   18.064771]  dump_stack_lvl+0x8c/0xd0
[   18.065224]  __asan_report_load4_noabort+0x20/0x30
[   18.066272]  __kasan_kmalloc+0xd4/0xd8
[   18.066311]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.066382]  kasan_atomics+0xb8/0x2e0
[   18.066708] The buggy address is located 0 bytes to the right of
[   18.066708]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.067130] page dumped because: kasan: bad access detected
[   18.067483]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.069933] Hardware name: linux,dummy-virt (DT)
[   18.070038] Call trace:
[   18.070074]  show_stack+0x20/0x38 (C)
[   18.070483]  dump_stack_lvl+0x8c/0xd0
[   18.070584]  print_report+0x118/0x5d0
[   18.070924]  kasan_report+0xdc/0x128
[   18.071103]  kasan_check_range+0x100/0x1a8
[   18.071255]  __kasan_check_write+0x20/0x30
[   18.071591]  kasan_atomics_helper+0x934/0x4858
[   18.071821]  kasan_atomics+0x198/0x2e0
[   18.071926]  kunit_try_run_case+0x170/0x3f0
[   18.072488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.072590]  kthread+0x328/0x630
[   18.072821]  ret_from_fork+0x10/0x20
[   18.073051] 
[   18.073078] Allocated by task 265:
[   18.073343]  kasan_save_stack+0x3c/0x68
[   18.073601]  kasan_save_track+0x20/0x40
[   18.073663]  kasan_save_alloc_info+0x40/0x58
[   18.073907]  __kasan_kmalloc+0xd4/0xd8
[   18.074310]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.074555]  kasan_atomics+0xb8/0x2e0
[   18.074646]  kunit_try_run_case+0x170/0x3f0
[   18.074878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.075120]  kthread+0x328/0x630
[   18.075181]  ret_from_fork+0x10/0x20
[   18.075400] 
[   18.075771] The buggy address belongs to the object at fff00000c784ef80
[   18.075771]  which belongs to the cache kmalloc-64 of size 64
[   18.075947] The buggy address is located 0 bytes to the right of
[   18.075947]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.076061] 
[   18.076227] The buggy address belongs to the physical page:
[   18.076490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.076731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.076869] page_type: f5(slab)
[   18.076959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.077014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.077360] page dumped because: kasan: bad access detected
[   18.077585] 
[   18.077628] Memory state around the buggy address:
[   18.077816]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.077998]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.078052] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.078094]                                      ^
[   18.078131]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.078360]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.078719] ==================================================================
[   18.399405] ==================================================================
[   18.399459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.399615] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.399687] 
[   18.399719] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.399803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.399841] Hardware name: linux,dummy-virt (DT)
[   18.399882] Call trace:
[   18.399909]  show_stack+0x20/0x38 (C)
[   18.399969]  dump_stack_lvl+0x8c/0xd0
[   18.400023]  print_report+0x118/0x5d0
[   18.400072]  kasan_report+0xdc/0x128
[   18.400129]  kasan_check_range+0x100/0x1a8
[   18.400182]  __kasan_check_write+0x20/0x30
[   18.400228]  kasan_atomics_helper+0x1644/0x4858
[   18.400287]  kasan_atomics+0x198/0x2e0
[   18.400348]  kunit_try_run_case+0x170/0x3f0
[   18.400397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.400467]  kthread+0x328/0x630
[   18.400510]  ret_from_fork+0x10/0x20
[   18.400560] 
[   18.400580] Allocated by task 265:
[   18.400617]  kasan_save_stack+0x3c/0x68
[   18.400660]  kasan_save_track+0x20/0x40
[   18.400702]  kasan_save_alloc_info+0x40/0x58
[   18.400744]  __kasan_kmalloc+0xd4/0xd8
[   18.400784]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.400830]  kasan_atomics+0xb8/0x2e0
[   18.400870]  kunit_try_run_case+0x170/0x3f0
[   18.400910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.400959]  kthread+0x328/0x630
[   18.400995]  ret_from_fork+0x10/0x20
[   18.401034] 
[   18.401055] The buggy address belongs to the object at fff00000c784ef80
[   18.401055]  which belongs to the cache kmalloc-64 of size 64
[   18.401116] The buggy address is located 0 bytes to the right of
[   18.401116]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.401191] 
[   18.401223] The buggy address belongs to the physical page:
[   18.401256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.401730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.402156] page_type: f5(slab)
[   18.402610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.402812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.403095] page dumped because: kasan: bad access detected
[   18.403325] 
[   18.403386] Memory state around the buggy address:
[   18.403708]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.403849]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.404149] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.404358]                                      ^
[   18.404630]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.404815]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.404910] ==================================================================
[   18.311524] ==================================================================
[   18.311608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.311662] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.311917] 
[   18.312075] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.312194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.312443] Hardware name: linux,dummy-virt (DT)
[   18.312705] Call trace:
[   18.312742]  show_stack+0x20/0x38 (C)
[   18.312962]  dump_stack_lvl+0x8c/0xd0
[   18.313060]  print_report+0x118/0x5d0
[   18.313137]  kasan_report+0xdc/0x128
[   18.313203]  kasan_check_range+0x100/0x1a8
[   18.313256]  __kasan_check_write+0x20/0x30
[   18.313647]  kasan_atomics_helper+0x126c/0x4858
[   18.313741]  kasan_atomics+0x198/0x2e0
[   18.313918]  kunit_try_run_case+0x170/0x3f0
[   18.314116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.314388]  kthread+0x328/0x630
[   18.314736]  ret_from_fork+0x10/0x20
[   18.315006] 
[   18.315068] Allocated by task 265:
[   18.315287]  kasan_save_stack+0x3c/0x68
[   18.315376]  kasan_save_track+0x20/0x40
[   18.315480]  kasan_save_alloc_info+0x40/0x58
[   18.315589]  __kasan_kmalloc+0xd4/0xd8
[   18.315667]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.315710]  kasan_atomics+0xb8/0x2e0
[   18.315931]  kunit_try_run_case+0x170/0x3f0
[   18.316093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.316189]  kthread+0x328/0x630
[   18.316632]  ret_from_fork+0x10/0x20
[   18.317061] 
[   18.317113] The buggy address belongs to the object at fff00000c784ef80
[   18.317113]  which belongs to the cache kmalloc-64 of size 64
[   18.317275] The buggy address is located 0 bytes to the right of
[   18.317275]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.317356] 
[   18.317942] The buggy address belongs to the physical page:
[   18.318300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.318379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.318431] page_type: f5(slab)
[   18.318473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.319130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.319385] page dumped because: kasan: bad access detected
[   18.319450] 
[   18.319509] Memory state around the buggy address:
[   18.319830]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.320090]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.320388] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.320665]                                      ^
[   18.320738]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.320962]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.321006] ==================================================================
[   18.196151] ==================================================================
[   18.196228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.196281] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.196644] 
[   18.196944] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.197040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.197223] Hardware name: linux,dummy-virt (DT)
[   18.197312] Call trace:
[   18.197435]  show_stack+0x20/0x38 (C)
[   18.197649]  dump_stack_lvl+0x8c/0xd0
[   18.197712]  print_report+0x118/0x5d0
[   18.198008]  kasan_report+0xdc/0x128
[   18.198322]  kasan_check_range+0x100/0x1a8
[   18.198495]  __kasan_check_read+0x20/0x30
[   18.198637]  kasan_atomics_helper+0xdd4/0x4858
[   18.198783]  kasan_atomics+0x198/0x2e0
[   18.198880]  kunit_try_run_case+0x170/0x3f0
[   18.198957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.199181]  kthread+0x328/0x630
[   18.199567]  ret_from_fork+0x10/0x20
[   18.199857] 
[   18.199945] Allocated by task 265:
[   18.200274]  kasan_save_stack+0x3c/0x68
[   18.200352]  kasan_save_track+0x20/0x40
[   18.200578]  kasan_save_alloc_info+0x40/0x58
[   18.200661]  __kasan_kmalloc+0xd4/0xd8
[   18.200789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.201144]  kasan_atomics+0xb8/0x2e0
[   18.201397]  kunit_try_run_case+0x170/0x3f0
[   18.201608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.201701]  kthread+0x328/0x630
[   18.201862]  ret_from_fork+0x10/0x20
[   18.201916] 
[   18.201942] The buggy address belongs to the object at fff00000c784ef80
[   18.201942]  which belongs to the cache kmalloc-64 of size 64
[   18.202005] The buggy address is located 0 bytes to the right of
[   18.202005]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.202217] 
[   18.202653] The buggy address belongs to the physical page:
[   18.202706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.202841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.202896] page_type: f5(slab)
[   18.203219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.203623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.203675] page dumped because: kasan: bad access detected
[   18.203758] 
[   18.203780] Memory state around the buggy address:
[   18.203832]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.203880]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.203926] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.203967]                                      ^
[   18.204003]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.204048]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.204089] ==================================================================
[   18.204861] ==================================================================
[   18.204980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.205248] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.205325] 
[   18.205393] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.205893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.206052] Hardware name: linux,dummy-virt (DT)
[   18.206134] Call trace:
[   18.206345]  show_stack+0x20/0x38 (C)
[   18.206480]  dump_stack_lvl+0x8c/0xd0
[   18.206715]  print_report+0x118/0x5d0
[   18.206856]  kasan_report+0xdc/0x128
[   18.207131]  __asan_report_load8_noabort+0x20/0x30
[   18.207224]  kasan_atomics_helper+0x3f58/0x4858
[   18.207372]  kasan_atomics+0x198/0x2e0
[   18.207429]  kunit_try_run_case+0x170/0x3f0
[   18.207672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.207880]  kthread+0x328/0x630
[   18.208216]  ret_from_fork+0x10/0x20
[   18.209002] 
[   18.209053] Allocated by task 265:
[   18.209124]  kasan_save_stack+0x3c/0x68
[   18.209207]  kasan_save_track+0x20/0x40
[   18.209270]  kasan_save_alloc_info+0x40/0x58
[   18.209324]  __kasan_kmalloc+0xd4/0xd8
[   18.209405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.209673]  kasan_atomics+0xb8/0x2e0
[   18.209725]  kunit_try_run_case+0x170/0x3f0
[   18.209987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.210078]  kthread+0x328/0x630
[   18.210258]  ret_from_fork+0x10/0x20
[   18.210609] 
[   18.210959] The buggy address belongs to the object at fff00000c784ef80
[   18.210959]  which belongs to the cache kmalloc-64 of size 64
[   18.211053] The buggy address is located 0 bytes to the right of
[   18.211053]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.211389] 
[   18.211484] The buggy address belongs to the physical page:
[   18.211521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.211729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.212154] page_type: f5(slab)
[   18.212373] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.212436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.212848] page dumped because: kasan: bad access detected
[   18.213120] 
[   18.213253] Memory state around the buggy address:
[   18.213396]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.213472]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.213689] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.213884]                                      ^
[   18.214027]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.214164]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.214260] ==================================================================
[   18.165140] ==================================================================
[   18.165197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.165247] Read of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.165298] 
[   18.166490] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.166629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.166693] Hardware name: linux,dummy-virt (DT)
[   18.166745] Call trace:
[   18.166800]  show_stack+0x20/0x38 (C)
[   18.166870]  dump_stack_lvl+0x8c/0xd0
[   18.166944]  print_report+0x118/0x5d0
[   18.167377]  kasan_report+0xdc/0x128
[   18.167514]  __asan_report_load4_noabort+0x20/0x30
[   18.167747]  kasan_atomics_helper+0x3dd8/0x4858
[   18.168620]  kasan_atomics+0x198/0x2e0
[   18.168773]  kunit_try_run_case+0x170/0x3f0
[   18.168993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.169093]  kthread+0x328/0x630
[   18.169723]  ret_from_fork+0x10/0x20
[   18.169788] 
[   18.169834] Allocated by task 265:
[   18.169893]  kasan_save_stack+0x3c/0x68
[   18.170104]  kasan_save_track+0x20/0x40
[   18.170493]  kasan_save_alloc_info+0x40/0x58
[   18.170567]  __kasan_kmalloc+0xd4/0xd8
[   18.170715]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.170796]  kasan_atomics+0xb8/0x2e0
[   18.170843]  kunit_try_run_case+0x170/0x3f0
[   18.171051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.171356]  kthread+0x328/0x630
[   18.171403]  ret_from_fork+0x10/0x20
[   18.171738] 
[   18.171802] The buggy address belongs to the object at fff00000c784ef80
[   18.171802]  which belongs to the cache kmalloc-64 of size 64
[   18.172097] The buggy address is located 0 bytes to the right of
[   18.172097]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.172648] 
[   18.172698] The buggy address belongs to the physical page:
[   18.172770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.173073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.173407] page_type: f5(slab)
[   18.173872] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.173944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.174105] page dumped because: kasan: bad access detected
[   18.174293] 
[   18.174396] Memory state around the buggy address:
[   18.174468]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.174900]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.175015] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.175277]                                      ^
[   18.175550]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.175685]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.175785] ==================================================================
[   18.450890] ==================================================================
[   18.450974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.451167] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.451269] 
[   18.451414] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.451616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.451650] Hardware name: linux,dummy-virt (DT)
[   18.451690] Call trace:
[   18.451714]  show_stack+0x20/0x38 (C)
[   18.451776]  dump_stack_lvl+0x8c/0xd0
[   18.451823]  print_report+0x118/0x5d0
[   18.451873]  kasan_report+0xdc/0x128
[   18.452169]  kasan_check_range+0x100/0x1a8
[   18.452245]  __kasan_check_write+0x20/0x30
[   18.452319]  kasan_atomics_helper+0x17ec/0x4858
[   18.452385]  kasan_atomics+0x198/0x2e0
[   18.452433]  kunit_try_run_case+0x170/0x3f0
[   18.452480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.452551]  kthread+0x328/0x630
[   18.452599]  ret_from_fork+0x10/0x20
[   18.452649] 
[   18.452680] Allocated by task 265:
[   18.452716]  kasan_save_stack+0x3c/0x68
[   18.452760]  kasan_save_track+0x20/0x40
[   18.452799]  kasan_save_alloc_info+0x40/0x58
[   18.452841]  __kasan_kmalloc+0xd4/0xd8
[   18.452879]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.452938]  kasan_atomics+0xb8/0x2e0
[   18.452982]  kunit_try_run_case+0x170/0x3f0
[   18.453023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.453069]  kthread+0x328/0x630
[   18.453104]  ret_from_fork+0x10/0x20
[   18.453149] 
[   18.453179] The buggy address belongs to the object at fff00000c784ef80
[   18.453179]  which belongs to the cache kmalloc-64 of size 64
[   18.453240] The buggy address is located 0 bytes to the right of
[   18.453240]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.453796] 
[   18.453836] The buggy address belongs to the physical page:
[   18.453888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.453944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.454216] page_type: f5(slab)
[   18.454650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.454993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.455063] page dumped because: kasan: bad access detected
[   18.455129] 
[   18.455195] Memory state around the buggy address:
[   18.455498]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.455894]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.456220] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.456431]                                      ^
[   18.456526]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.456611]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.456827] ==================================================================
[   18.322428] ==================================================================
[   18.322482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.322535] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.323190] 
[   18.323284] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.323641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.323690] Hardware name: linux,dummy-virt (DT)
[   18.323907] Call trace:
[   18.324089]  show_stack+0x20/0x38 (C)
[   18.324181]  dump_stack_lvl+0x8c/0xd0
[   18.324235]  print_report+0x118/0x5d0
[   18.324589]  kasan_report+0xdc/0x128
[   18.324662]  kasan_check_range+0x100/0x1a8
[   18.324722]  __kasan_check_write+0x20/0x30
[   18.324961]  kasan_atomics_helper+0x12d8/0x4858
[   18.325033]  kasan_atomics+0x198/0x2e0
[   18.325294]  kunit_try_run_case+0x170/0x3f0
[   18.325573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.325646]  kthread+0x328/0x630
[   18.325697]  ret_from_fork+0x10/0x20
[   18.325748] 
[   18.325963] Allocated by task 265:
[   18.326485]  kasan_save_stack+0x3c/0x68
[   18.326684]  kasan_save_track+0x20/0x40
[   18.326805]  kasan_save_alloc_info+0x40/0x58
[   18.326882]  __kasan_kmalloc+0xd4/0xd8
[   18.327009]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.327050]  kasan_atomics+0xb8/0x2e0
[   18.327247]  kunit_try_run_case+0x170/0x3f0
[   18.327447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.327648]  kthread+0x328/0x630
[   18.327699]  ret_from_fork+0x10/0x20
[   18.327740] 
[   18.327782] The buggy address belongs to the object at fff00000c784ef80
[   18.327782]  which belongs to the cache kmalloc-64 of size 64
[   18.327856] The buggy address is located 0 bytes to the right of
[   18.327856]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.327938] 
[   18.327982] The buggy address belongs to the physical page:
[   18.328016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.328071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.328122] page_type: f5(slab)
[   18.328168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.328231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.328284] page dumped because: kasan: bad access detected
[   18.328342] 
[   18.328404] Memory state around the buggy address:
[   18.328588]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.328639]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.329015] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.329763]                                      ^
[   18.329828]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.329877]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.329941] ==================================================================
[   18.260150] ==================================================================
[   18.260297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.260366] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.260494] 
[   18.260530] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.260702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.260736] Hardware name: linux,dummy-virt (DT)
[   18.260768] Call trace:
[   18.260794]  show_stack+0x20/0x38 (C)
[   18.261013]  dump_stack_lvl+0x8c/0xd0
[   18.261113]  print_report+0x118/0x5d0
[   18.261413]  kasan_report+0xdc/0x128
[   18.261663]  kasan_check_range+0x100/0x1a8
[   18.261785]  __kasan_check_write+0x20/0x30
[   18.261884]  kasan_atomics_helper+0xff0/0x4858
[   18.261964]  kasan_atomics+0x198/0x2e0
[   18.262013]  kunit_try_run_case+0x170/0x3f0
[   18.262062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.262116]  kthread+0x328/0x630
[   18.262483]  ret_from_fork+0x10/0x20
[   18.262621] 
[   18.262776] Allocated by task 265:
[   18.262971]  kasan_save_stack+0x3c/0x68
[   18.263137]  kasan_save_track+0x20/0x40
[   18.263260]  kasan_save_alloc_info+0x40/0x58
[   18.263395]  __kasan_kmalloc+0xd4/0xd8
[   18.263498]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.263544]  kasan_atomics+0xb8/0x2e0
[   18.263589]  kunit_try_run_case+0x170/0x3f0
[   18.263630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.263715]  kthread+0x328/0x630
[   18.263750]  ret_from_fork+0x10/0x20
[   18.263798] 
[   18.263822] The buggy address belongs to the object at fff00000c784ef80
[   18.263822]  which belongs to the cache kmalloc-64 of size 64
[   18.263892] The buggy address is located 0 bytes to the right of
[   18.263892]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.263966] 
[   18.263993] The buggy address belongs to the physical page:
[   18.264026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.264093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.264143] page_type: f5(slab)
[   18.264184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.264237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.264280] page dumped because: kasan: bad access detected
[   18.264323] 
[   18.264713] Memory state around the buggy address:
[   18.264897]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.265252]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.265369] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.265677]                                      ^
[   18.265728]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.266030]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.266292] ==================================================================
[   18.234494] ==================================================================
[   18.234775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.235044] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.235250] 
[   18.235305] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.235404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.235609] Hardware name: linux,dummy-virt (DT)
[   18.235672] Call trace:
[   18.235961]  show_stack+0x20/0x38 (C)
[   18.236066]  dump_stack_lvl+0x8c/0xd0
[   18.236288]  print_report+0x118/0x5d0
[   18.236440]  kasan_report+0xdc/0x128
[   18.236492]  kasan_check_range+0x100/0x1a8
[   18.236543]  __kasan_check_write+0x20/0x30
[   18.236651]  kasan_atomics_helper+0xeb8/0x4858
[   18.236705]  kasan_atomics+0x198/0x2e0
[   18.236755]  kunit_try_run_case+0x170/0x3f0
[   18.236814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.236870]  kthread+0x328/0x630
[   18.236914]  ret_from_fork+0x10/0x20
[   18.236971] 
[   18.236993] Allocated by task 265:
[   18.237023]  kasan_save_stack+0x3c/0x68
[   18.237072]  kasan_save_track+0x20/0x40
[   18.237113]  kasan_save_alloc_info+0x40/0x58
[   18.237155]  __kasan_kmalloc+0xd4/0xd8
[   18.237196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.237238]  kasan_atomics+0xb8/0x2e0
[   18.237277]  kunit_try_run_case+0x170/0x3f0
[   18.237318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.237374]  kthread+0x328/0x630
[   18.237418]  ret_from_fork+0x10/0x20
[   18.237457] 
[   18.237480] The buggy address belongs to the object at fff00000c784ef80
[   18.237480]  which belongs to the cache kmalloc-64 of size 64
[   18.237541] The buggy address is located 0 bytes to the right of
[   18.237541]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.237612] 
[   18.237645] The buggy address belongs to the physical page:
[   18.237679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.237741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.237792] page_type: f5(slab)
[   18.237832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.237883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.237926] page dumped because: kasan: bad access detected
[   18.237962] 
[   18.237982] Memory state around the buggy address:
[   18.238014]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.238059]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.238101] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.238151]                                      ^
[   18.238195]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.238239]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.238279] ==================================================================
[   18.416263] ==================================================================
[   18.416324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.416396] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.416667] 
[   18.416747] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.416838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.417083] Hardware name: linux,dummy-virt (DT)
[   18.417133] Call trace:
[   18.417166]  show_stack+0x20/0x38 (C)
[   18.417260]  dump_stack_lvl+0x8c/0xd0
[   18.417573]  print_report+0x118/0x5d0
[   18.417750]  kasan_report+0xdc/0x128
[   18.417862]  kasan_check_range+0x100/0x1a8
[   18.417915]  __kasan_check_write+0x20/0x30
[   18.417963]  kasan_atomics_helper+0x16d0/0x4858
[   18.418012]  kasan_atomics+0x198/0x2e0
[   18.418319]  kunit_try_run_case+0x170/0x3f0
[   18.418865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.418947]  kthread+0x328/0x630
[   18.419000]  ret_from_fork+0x10/0x20
[   18.419396] 
[   18.419449] Allocated by task 265:
[   18.419889]  kasan_save_stack+0x3c/0x68
[   18.420013]  kasan_save_track+0x20/0x40
[   18.420090]  kasan_save_alloc_info+0x40/0x58
[   18.420210]  __kasan_kmalloc+0xd4/0xd8
[   18.420252]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.420502]  kasan_atomics+0xb8/0x2e0
[   18.420578]  kunit_try_run_case+0x170/0x3f0
[   18.420621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.420837]  kthread+0x328/0x630
[   18.420890]  ret_from_fork+0x10/0x20
[   18.420941] 
[   18.420964] The buggy address belongs to the object at fff00000c784ef80
[   18.420964]  which belongs to the cache kmalloc-64 of size 64
[   18.421027] The buggy address is located 0 bytes to the right of
[   18.421027]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.421101] 
[   18.421133] The buggy address belongs to the physical page:
[   18.421182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.421244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.421303] page_type: f5(slab)
[   18.421825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.422107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.422188] page dumped because: kasan: bad access detected
[   18.422344] 
[   18.422483] Memory state around the buggy address:
[   18.422558]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.422607]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.423295] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.423505]                                      ^
[   18.423569]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.423813]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.423974] ==================================================================
[   18.224105] ==================================================================
[   18.224253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.224312] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.224519] 
[   18.224554] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.224696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.224730] Hardware name: linux,dummy-virt (DT)
[   18.225004] Call trace:
[   18.225140]  show_stack+0x20/0x38 (C)
[   18.225202]  dump_stack_lvl+0x8c/0xd0
[   18.225344]  print_report+0x118/0x5d0
[   18.225418]  kasan_report+0xdc/0x128
[   18.225537]  __asan_report_store8_noabort+0x20/0x30
[   18.225593]  kasan_atomics_helper+0x3e5c/0x4858
[   18.225645]  kasan_atomics+0x198/0x2e0
[   18.226053]  kunit_try_run_case+0x170/0x3f0
[   18.226380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.226563]  kthread+0x328/0x630
[   18.226671]  ret_from_fork+0x10/0x20
[   18.226873] 
[   18.226932] Allocated by task 265:
[   18.227351]  kasan_save_stack+0x3c/0x68
[   18.227577]  kasan_save_track+0x20/0x40
[   18.227771]  kasan_save_alloc_info+0x40/0x58
[   18.228046]  __kasan_kmalloc+0xd4/0xd8
[   18.228479]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.228645]  kasan_atomics+0xb8/0x2e0
[   18.228893]  kunit_try_run_case+0x170/0x3f0
[   18.228994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.229177]  kthread+0x328/0x630
[   18.229391]  ret_from_fork+0x10/0x20
[   18.229762] 
[   18.229794] The buggy address belongs to the object at fff00000c784ef80
[   18.229794]  which belongs to the cache kmalloc-64 of size 64
[   18.229858] The buggy address is located 0 bytes to the right of
[   18.229858]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.230103] 
[   18.230149] The buggy address belongs to the physical page:
[   18.230285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.230558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.230969] page_type: f5(slab)
[   18.231201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.231429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.231687] page dumped because: kasan: bad access detected
[   18.231729] 
[   18.231880] Memory state around the buggy address:
[   18.232007]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.232342]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.232474] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.232585]                                      ^
[   18.232642]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.232689]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.232740] ==================================================================
[   18.341720] ==================================================================
[   18.341771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.341963] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.342305] 
[   18.342718] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.343063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.343109] Hardware name: linux,dummy-virt (DT)
[   18.343204] Call trace:
[   18.343251]  show_stack+0x20/0x38 (C)
[   18.343364]  dump_stack_lvl+0x8c/0xd0
[   18.343509]  print_report+0x118/0x5d0
[   18.343563]  kasan_report+0xdc/0x128
[   18.343653]  __asan_report_load8_noabort+0x20/0x30
[   18.343710]  kasan_atomics_helper+0x3f04/0x4858
[   18.343941]  kasan_atomics+0x198/0x2e0
[   18.344319]  kunit_try_run_case+0x170/0x3f0
[   18.344406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.344463]  kthread+0x328/0x630
[   18.344507]  ret_from_fork+0x10/0x20
[   18.344557] 
[   18.344578] Allocated by task 265:
[   18.344609]  kasan_save_stack+0x3c/0x68
[   18.344796]  kasan_save_track+0x20/0x40
[   18.344862]  kasan_save_alloc_info+0x40/0x58
[   18.344914]  __kasan_kmalloc+0xd4/0xd8
[   18.344962]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.345002]  kasan_atomics+0xb8/0x2e0
[   18.345042]  kunit_try_run_case+0x170/0x3f0
[   18.345080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.345125]  kthread+0x328/0x630
[   18.345160]  ret_from_fork+0x10/0x20
[   18.345198] 
[   18.345235] The buggy address belongs to the object at fff00000c784ef80
[   18.345235]  which belongs to the cache kmalloc-64 of size 64
[   18.345297] The buggy address is located 0 bytes to the right of
[   18.345297]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.346261] 
[   18.346350] The buggy address belongs to the physical page:
[   18.346386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.346632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.346727] page_type: f5(slab)
[   18.346783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.347145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.347202] page dumped because: kasan: bad access detected
[   18.347237] 
[   18.347258] Memory state around the buggy address:
[   18.347665]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.348000]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.348245] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.348483]                                      ^
[   18.348685]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.348886]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.349058] ==================================================================
[   18.331468] ==================================================================
[   18.331657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.331732] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.331794] 
[   18.332169] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.332539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.332590] Hardware name: linux,dummy-virt (DT)
[   18.332653] Call trace:
[   18.332693]  show_stack+0x20/0x38 (C)
[   18.332774]  dump_stack_lvl+0x8c/0xd0
[   18.333018]  print_report+0x118/0x5d0
[   18.333105]  kasan_report+0xdc/0x128
[   18.333156]  kasan_check_range+0x100/0x1a8
[   18.333502]  __kasan_check_write+0x20/0x30
[   18.333921]  kasan_atomics_helper+0x1384/0x4858
[   18.334065]  kasan_atomics+0x198/0x2e0
[   18.334173]  kunit_try_run_case+0x170/0x3f0
[   18.334356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.334429]  kthread+0x328/0x630
[   18.334492]  ret_from_fork+0x10/0x20
[   18.334550] 
[   18.334768] Allocated by task 265:
[   18.335284]  kasan_save_stack+0x3c/0x68
[   18.335367]  kasan_save_track+0x20/0x40
[   18.335496]  kasan_save_alloc_info+0x40/0x58
[   18.335637]  __kasan_kmalloc+0xd4/0xd8
[   18.335735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.336263]  kasan_atomics+0xb8/0x2e0
[   18.336465]  kunit_try_run_case+0x170/0x3f0
[   18.336551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.336737]  kthread+0x328/0x630
[   18.337121]  ret_from_fork+0x10/0x20
[   18.337533] 
[   18.337567] The buggy address belongs to the object at fff00000c784ef80
[   18.337567]  which belongs to the cache kmalloc-64 of size 64
[   18.337771] The buggy address is located 0 bytes to the right of
[   18.337771]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.338155] 
[   18.338185] The buggy address belongs to the physical page:
[   18.338220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.338548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.338736] page_type: f5(slab)
[   18.338877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.339411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.339484] page dumped because: kasan: bad access detected
[   18.339680] 
[   18.339763] Memory state around the buggy address:
[   18.339855]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.339904]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.340375] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.340600]                                      ^
[   18.340735]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.340886]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.340952] ==================================================================
[   18.405763] ==================================================================
[   18.405934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.406161] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.406246] 
[   18.406346] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.406432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.406469] Hardware name: linux,dummy-virt (DT)
[   18.406674] Call trace:
[   18.406723]  show_stack+0x20/0x38 (C)
[   18.406809]  dump_stack_lvl+0x8c/0xd0
[   18.407182]  print_report+0x118/0x5d0
[   18.407488]  kasan_report+0xdc/0x128
[   18.407765]  __asan_report_load8_noabort+0x20/0x30
[   18.407839]  kasan_atomics_helper+0x3df4/0x4858
[   18.407893]  kasan_atomics+0x198/0x2e0
[   18.408271]  kunit_try_run_case+0x170/0x3f0
[   18.408367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.408579]  kthread+0x328/0x630
[   18.408643]  ret_from_fork+0x10/0x20
[   18.409056] 
[   18.409115] Allocated by task 265:
[   18.409150]  kasan_save_stack+0x3c/0x68
[   18.409402]  kasan_save_track+0x20/0x40
[   18.409551]  kasan_save_alloc_info+0x40/0x58
[   18.409791]  __kasan_kmalloc+0xd4/0xd8
[   18.409999]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.410190]  kasan_atomics+0xb8/0x2e0
[   18.410588]  kunit_try_run_case+0x170/0x3f0
[   18.410745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.410835]  kthread+0x328/0x630
[   18.410963]  ret_from_fork+0x10/0x20
[   18.411080] 
[   18.411132] The buggy address belongs to the object at fff00000c784ef80
[   18.411132]  which belongs to the cache kmalloc-64 of size 64
[   18.411552] The buggy address is located 0 bytes to the right of
[   18.411552]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.411958] 
[   18.412024] The buggy address belongs to the physical page:
[   18.412063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.412161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.412251] page_type: f5(slab)
[   18.412804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.413289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.413523] page dumped because: kasan: bad access detected
[   18.413710] 
[   18.413767] Memory state around the buggy address:
[   18.413818]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.413868]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.413914] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.414515]                                      ^
[   18.414760]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.414927]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.415001] ==================================================================
[   18.276277] ==================================================================
[   18.276715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.276803] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.276859] 
[   18.276890] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.277276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.277551] Hardware name: linux,dummy-virt (DT)
[   18.277714] Call trace:
[   18.277829]  show_stack+0x20/0x38 (C)
[   18.277927]  dump_stack_lvl+0x8c/0xd0
[   18.277986]  print_report+0x118/0x5d0
[   18.278036]  kasan_report+0xdc/0x128
[   18.278083]  kasan_check_range+0x100/0x1a8
[   18.278368]  __kasan_check_write+0x20/0x30
[   18.278655]  kasan_atomics_helper+0x10c0/0x4858
[   18.278925]  kasan_atomics+0x198/0x2e0
[   18.279109]  kunit_try_run_case+0x170/0x3f0
[   18.279204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.279262]  kthread+0x328/0x630
[   18.279613]  ret_from_fork+0x10/0x20
[   18.279835] 
[   18.279999] Allocated by task 265:
[   18.280291]  kasan_save_stack+0x3c/0x68
[   18.280394]  kasan_save_track+0x20/0x40
[   18.280537]  kasan_save_alloc_info+0x40/0x58
[   18.280723]  __kasan_kmalloc+0xd4/0xd8
[   18.280892]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.281743]  kasan_atomics+0xb8/0x2e0
[   18.281818]  kunit_try_run_case+0x170/0x3f0
[   18.281862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.281934]  kthread+0x328/0x630
[   18.281987]  ret_from_fork+0x10/0x20
[   18.282062] 
[   18.282257] The buggy address belongs to the object at fff00000c784ef80
[   18.282257]  which belongs to the cache kmalloc-64 of size 64
[   18.282395] The buggy address is located 0 bytes to the right of
[   18.282395]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.282991] 
[   18.283484] The buggy address belongs to the physical page:
[   18.283629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.283874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.284117] page_type: f5(slab)
[   18.284187] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.284496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.284942] page dumped because: kasan: bad access detected
[   18.284999] 
[   18.285188] Memory state around the buggy address:
[   18.285343]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.285506]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.285716] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.285928]                                      ^
[   18.286017]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.286084]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.286126] ==================================================================
[   18.382096] ==================================================================
[   18.382313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.382457] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.382670] 
[   18.382810] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.382920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.382956] Hardware name: linux,dummy-virt (DT)
[   18.382990] Call trace:
[   18.383014]  show_stack+0x20/0x38 (C)
[   18.383067]  dump_stack_lvl+0x8c/0xd0
[   18.383114]  print_report+0x118/0x5d0
[   18.383162]  kasan_report+0xdc/0x128
[   18.383208]  kasan_check_range+0x100/0x1a8
[   18.383500]  __kasan_check_write+0x20/0x30
[   18.383820]  kasan_atomics_helper+0x15b4/0x4858
[   18.383951]  kasan_atomics+0x198/0x2e0
[   18.384022]  kunit_try_run_case+0x170/0x3f0
[   18.384167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.384243]  kthread+0x328/0x630
[   18.384297]  ret_from_fork+0x10/0x20
[   18.384358] 
[   18.384509] Allocated by task 265:
[   18.384875]  kasan_save_stack+0x3c/0x68
[   18.384957]  kasan_save_track+0x20/0x40
[   18.385095]  kasan_save_alloc_info+0x40/0x58
[   18.385149]  __kasan_kmalloc+0xd4/0xd8
[   18.385341]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.385503]  kasan_atomics+0xb8/0x2e0
[   18.385546]  kunit_try_run_case+0x170/0x3f0
[   18.385586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.385805]  kthread+0x328/0x630
[   18.385966]  ret_from_fork+0x10/0x20
[   18.386540] 
[   18.386577] The buggy address belongs to the object at fff00000c784ef80
[   18.386577]  which belongs to the cache kmalloc-64 of size 64
[   18.386643] The buggy address is located 0 bytes to the right of
[   18.386643]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.386939] 
[   18.386977] The buggy address belongs to the physical page:
[   18.387012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.387066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.387118] page_type: f5(slab)
[   18.387160] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.387251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.387294] page dumped because: kasan: bad access detected
[   18.387672] 
[   18.387843] Memory state around the buggy address:
[   18.388575]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.388630]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.389268] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.389601]                                      ^
[   18.389838]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.389992]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.390055] ==================================================================
[   18.432390] ==================================================================
[   18.432467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.432521] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.432573] 
[   18.432603] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.433000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.433054] Hardware name: linux,dummy-virt (DT)
[   18.433088] Call trace:
[   18.433460]  show_stack+0x20/0x38 (C)
[   18.433531]  dump_stack_lvl+0x8c/0xd0
[   18.433760]  print_report+0x118/0x5d0
[   18.433878]  kasan_report+0xdc/0x128
[   18.434045]  kasan_check_range+0x100/0x1a8
[   18.434107]  __kasan_check_write+0x20/0x30
[   18.434297]  kasan_atomics_helper+0x175c/0x4858
[   18.434601]  kasan_atomics+0x198/0x2e0
[   18.434849]  kunit_try_run_case+0x170/0x3f0
[   18.435074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.435234]  kthread+0x328/0x630
[   18.435321]  ret_from_fork+0x10/0x20
[   18.435756] 
[   18.435970] Allocated by task 265:
[   18.436031]  kasan_save_stack+0x3c/0x68
[   18.436219]  kasan_save_track+0x20/0x40
[   18.436364]  kasan_save_alloc_info+0x40/0x58
[   18.436445]  __kasan_kmalloc+0xd4/0xd8
[   18.436578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.436632]  kasan_atomics+0xb8/0x2e0
[   18.436688]  kunit_try_run_case+0x170/0x3f0
[   18.436987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.437230]  kthread+0x328/0x630
[   18.437385]  ret_from_fork+0x10/0x20
[   18.437550] 
[   18.437703] The buggy address belongs to the object at fff00000c784ef80
[   18.437703]  which belongs to the cache kmalloc-64 of size 64
[   18.438087] The buggy address is located 0 bytes to the right of
[   18.438087]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.438178] 
[   18.438201] The buggy address belongs to the physical page:
[   18.438236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.438291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.438819] page_type: f5(slab)
[   18.439126] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.439214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.439266] page dumped because: kasan: bad access detected
[   18.439758] 
[   18.439900] Memory state around the buggy address:
[   18.440055]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.440116]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.440161] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.440381]                                      ^
[   18.440573]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.440777]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.440853] ==================================================================
[   18.079957] ==================================================================
[   18.080011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   18.080063] Write of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.080117] 
[   18.080449] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.080826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.080862] Hardware name: linux,dummy-virt (DT)
[   18.080896] Call trace:
[   18.081023]  show_stack+0x20/0x38 (C)
[   18.081107]  dump_stack_lvl+0x8c/0xd0
[   18.081159]  print_report+0x118/0x5d0
[   18.081251]  kasan_report+0xdc/0x128
[   18.081298]  kasan_check_range+0x100/0x1a8
[   18.081497]  __kasan_check_write+0x20/0x30
[   18.081653]  kasan_atomics_helper+0x99c/0x4858
[   18.081844]  kasan_atomics+0x198/0x2e0
[   18.082067]  kunit_try_run_case+0x170/0x3f0
[   18.082238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.082349]  kthread+0x328/0x630
[   18.082403]  ret_from_fork+0x10/0x20
[   18.082818] 
[   18.083011] Allocated by task 265:
[   18.083081]  kasan_save_stack+0x3c/0x68
[   18.083267]  kasan_save_track+0x20/0x40
[   18.083411]  kasan_save_alloc_info+0x40/0x58
[   18.083467]  __kasan_kmalloc+0xd4/0xd8
[   18.083764]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.084018]  kasan_atomics+0xb8/0x2e0
[   18.084302]  kunit_try_run_case+0x170/0x3f0
[   18.084726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.084884]  kthread+0x328/0x630
[   18.084980]  ret_from_fork+0x10/0x20
[   18.085041] 
[   18.085458] The buggy address belongs to the object at fff00000c784ef80
[   18.085458]  which belongs to the cache kmalloc-64 of size 64
[   18.085607] The buggy address is located 0 bytes to the right of
[   18.085607]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.085697] 
[   18.085720] The buggy address belongs to the physical page:
[   18.085761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.085933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.086001] page_type: f5(slab)
[   18.086208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.086825]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.088856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   18.089845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.089900]  kthread+0x328/0x630
[   18.089943]  ret_from_fork+0x10/0x20
[   18.089990] 
[   18.090012] Allocated by task 265:
[   18.090043]  kasan_save_stack+0x3c/0x68
[   18.090091]  kasan_save_track+0x20/0x40
[   18.090130]  kasan_save_alloc_info+0x40/0x58
[   18.090172]  __kasan_kmalloc+0xd4/0xd8
[   18.090210]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.090251]  kasan_atomics+0xb8/0x2e0
[   18.090300]  kunit_try_run_case+0x170/0x3f0
[   18.091837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.092285]  kthread+0x328/0x630
[   18.092792]  ret_from_fork+0x10/0x20
[   18.093031] 
[   18.093089] The buggy address belongs to the object at fff00000c784ef80
[   18.093089]  which belongs to the cache kmalloc-64 of size 64
[   18.093236] The buggy address is located 0 bytes to the right of
[   18.093236]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.093427] 
[   18.093504] The buggy address belongs to the physical page:
[   18.093593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.093739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.093799] page_type: f5(slab)
[   18.093840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.093897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.094166] page dumped because: kasan: bad access detected
[   18.094383] 
[   18.094478] Memory state around the buggy address:
[   18.094515]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.094906]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.095048] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.095243]                                      ^
[   18.095341]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.095552]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.095853] ==================================================================
[   18.358144] ==================================================================
[   18.358196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.358379] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.358442] 
[   18.358512] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.358921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.358975] Hardware name: linux,dummy-virt (DT)
[   18.359012] Call trace:
[   18.359036]  show_stack+0x20/0x38 (C)
[   18.359090]  dump_stack_lvl+0x8c/0xd0
[   18.359304]  print_report+0x118/0x5d0
[   18.359475]  kasan_report+0xdc/0x128
[   18.359586]  kasan_check_range+0x100/0x1a8
[   18.359659]  __kasan_check_write+0x20/0x30
[   18.359727]  kasan_atomics_helper+0x147c/0x4858
[   18.359779]  kasan_atomics+0x198/0x2e0
[   18.359884]  kunit_try_run_case+0x170/0x3f0
[   18.359935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.360139]  kthread+0x328/0x630
[   18.360206]  ret_from_fork+0x10/0x20
[   18.360365] 
[   18.360573] Allocated by task 265:
[   18.360796]  kasan_save_stack+0x3c/0x68
[   18.360917]  kasan_save_track+0x20/0x40
[   18.361007]  kasan_save_alloc_info+0x40/0x58
[   18.361053]  __kasan_kmalloc+0xd4/0xd8
[   18.361110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.361207]  kasan_atomics+0xb8/0x2e0
[   18.361244]  kunit_try_run_case+0x170/0x3f0
[   18.361462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.362039]  kthread+0x328/0x630
[   18.362092]  ret_from_fork+0x10/0x20
[   18.362132] 
[   18.362157] The buggy address belongs to the object at fff00000c784ef80
[   18.362157]  which belongs to the cache kmalloc-64 of size 64
[   18.362219] The buggy address is located 0 bytes to the right of
[   18.362219]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.362568] 
[   18.362595] The buggy address belongs to the physical page:
[   18.362630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.362705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.362757] page_type: f5(slab)
[   18.362813] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.362875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.362919] page dumped because: kasan: bad access detected
[   18.362954] 
[   18.362990] Memory state around the buggy address:
[   18.363026]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.363071]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.363116] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.363157]                                      ^
[   18.363200]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.363253]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.363292] ==================================================================
[   18.248938] ==================================================================
[   18.248992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.249044] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.249532] 
[   18.249611] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.250086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.250149] Hardware name: linux,dummy-virt (DT)
[   18.250323] Call trace:
[   18.250370]  show_stack+0x20/0x38 (C)
[   18.250802]  dump_stack_lvl+0x8c/0xd0
[   18.250992]  print_report+0x118/0x5d0
[   18.251154]  kasan_report+0xdc/0x128
[   18.251216]  kasan_check_range+0x100/0x1a8
[   18.251853]  __kasan_check_write+0x20/0x30
[   18.251988]  kasan_atomics_helper+0xf88/0x4858
[   18.252256]  kasan_atomics+0x198/0x2e0
[   18.252391]  kunit_try_run_case+0x170/0x3f0
[   18.252472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.252690]  kthread+0x328/0x630
[   18.252912]  ret_from_fork+0x10/0x20
[   18.253314] 
[   18.253838] Allocated by task 265:
[   18.253934]  kasan_save_stack+0x3c/0x68
[   18.253986]  kasan_save_track+0x20/0x40
[   18.254028]  kasan_save_alloc_info+0x40/0x58
[   18.254069]  __kasan_kmalloc+0xd4/0xd8
[   18.254144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.254212]  kasan_atomics+0xb8/0x2e0
[   18.254390]  kunit_try_run_case+0x170/0x3f0
[   18.254601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.254704]  kthread+0x328/0x630
[   18.254986]  ret_from_fork+0x10/0x20
[   18.255042] 
[   18.255422] The buggy address belongs to the object at fff00000c784ef80
[   18.255422]  which belongs to the cache kmalloc-64 of size 64
[   18.255639] The buggy address is located 0 bytes to the right of
[   18.255639]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.255743] 
[   18.255820] The buggy address belongs to the physical page:
[   18.255981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.256039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.256128] page_type: f5(slab)
[   18.256419] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.256893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.256955] page dumped because: kasan: bad access detected
[   18.257182] 
[   18.257363] Memory state around the buggy address:
[   18.257637]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.257957]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.258017] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.258056]                                      ^
[   18.258257]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.258462]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.258850] ==================================================================
[   18.267636] ==================================================================
[   18.267695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.267754] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.267806] 
[   18.267985] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.268321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.268366] Hardware name: linux,dummy-virt (DT)
[   18.268598] Call trace:
[   18.268753]  show_stack+0x20/0x38 (C)
[   18.268849]  dump_stack_lvl+0x8c/0xd0
[   18.268905]  print_report+0x118/0x5d0
[   18.268960]  kasan_report+0xdc/0x128
[   18.269008]  kasan_check_range+0x100/0x1a8
[   18.269287]  __kasan_check_write+0x20/0x30
[   18.269582]  kasan_atomics_helper+0x1058/0x4858
[   18.269841]  kasan_atomics+0x198/0x2e0
[   18.269980]  kunit_try_run_case+0x170/0x3f0
[   18.270074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.270147]  kthread+0x328/0x630
[   18.270368]  ret_from_fork+0x10/0x20
[   18.270616] 
[   18.270731] Allocated by task 265:
[   18.270774]  kasan_save_stack+0x3c/0x68
[   18.271017]  kasan_save_track+0x20/0x40
[   18.271082]  kasan_save_alloc_info+0x40/0x58
[   18.271338]  __kasan_kmalloc+0xd4/0xd8
[   18.271455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.271555]  kasan_atomics+0xb8/0x2e0
[   18.271689]  kunit_try_run_case+0x170/0x3f0
[   18.271785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.271833]  kthread+0x328/0x630
[   18.272032]  ret_from_fork+0x10/0x20
[   18.272172] 
[   18.272374] The buggy address belongs to the object at fff00000c784ef80
[   18.272374]  which belongs to the cache kmalloc-64 of size 64
[   18.272613] The buggy address is located 0 bytes to the right of
[   18.272613]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.272866] 
[   18.272982] The buggy address belongs to the physical page:
[   18.273311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.273636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.273883] page_type: f5(slab)
[   18.273940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.274382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.274565] page dumped because: kasan: bad access detected
[   18.274608] 
[   18.274631] Memory state around the buggy address:
[   18.274668]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.274716]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.274803] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.274864]                                      ^
[   18.274901]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.274952]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.274993] ==================================================================
[   18.424613] ==================================================================
[   18.424738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.424820] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.425045] 
[   18.425082] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.425281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.425410] Hardware name: linux,dummy-virt (DT)
[   18.425512] Call trace:
[   18.425591]  show_stack+0x20/0x38 (C)
[   18.425658]  dump_stack_lvl+0x8c/0xd0
[   18.425707]  print_report+0x118/0x5d0
[   18.425756]  kasan_report+0xdc/0x128
[   18.425803]  __asan_report_load8_noabort+0x20/0x30
[   18.426526]  kasan_atomics_helper+0x3e10/0x4858
[   18.426771]  kasan_atomics+0x198/0x2e0
[   18.426851]  kunit_try_run_case+0x170/0x3f0
[   18.426992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.427052]  kthread+0x328/0x630
[   18.427491]  ret_from_fork+0x10/0x20
[   18.427586] 
[   18.427810] Allocated by task 265:
[   18.428166]  kasan_save_stack+0x3c/0x68
[   18.428316]  kasan_save_track+0x20/0x40
[   18.428372]  kasan_save_alloc_info+0x40/0x58
[   18.428439]  __kasan_kmalloc+0xd4/0xd8
[   18.428519]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.428759]  kasan_atomics+0xb8/0x2e0
[   18.428870]  kunit_try_run_case+0x170/0x3f0
[   18.429299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.429698]  kthread+0x328/0x630
[   18.429753]  ret_from_fork+0x10/0x20
[   18.429792] 
[   18.429978] The buggy address belongs to the object at fff00000c784ef80
[   18.429978]  which belongs to the cache kmalloc-64 of size 64
[   18.430217] The buggy address is located 0 bytes to the right of
[   18.430217]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.430535] 
[   18.430562] The buggy address belongs to the physical page:
[   18.430598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.430686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.430744] page_type: f5(slab)
[   18.430797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.430857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.430911] page dumped because: kasan: bad access detected
[   18.430951] 
[   18.430973] Memory state around the buggy address:
[   18.431006]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.431064]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.431109] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.431149]                                      ^
[   18.431187]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.431232]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.431282] ==================================================================
[   18.363704] ==================================================================
[   18.363757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.363828] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.363881] 
[   18.363923] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.364241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.364305] Hardware name: linux,dummy-virt (DT)
[   18.364360] Call trace:
[   18.364385]  show_stack+0x20/0x38 (C)
[   18.365139]  dump_stack_lvl+0x8c/0xd0
[   18.365549]  print_report+0x118/0x5d0
[   18.365920]  kasan_report+0xdc/0x128
[   18.366019]  kasan_check_range+0x100/0x1a8
[   18.366200]  __kasan_check_write+0x20/0x30
[   18.366518]  kasan_atomics_helper+0x14e4/0x4858
[   18.366749]  kasan_atomics+0x198/0x2e0
[   18.367096]  kunit_try_run_case+0x170/0x3f0
[   18.367175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.367377]  kthread+0x328/0x630
[   18.367511]  ret_from_fork+0x10/0x20
[   18.367607] 
[   18.367630] Allocated by task 265:
[   18.367666]  kasan_save_stack+0x3c/0x68
[   18.367972]  kasan_save_track+0x20/0x40
[   18.368269]  kasan_save_alloc_info+0x40/0x58
[   18.368440]  __kasan_kmalloc+0xd4/0xd8
[   18.368634]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.368922]  kasan_atomics+0xb8/0x2e0
[   18.369456]  kunit_try_run_case+0x170/0x3f0
[   18.369541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.369617]  kthread+0x328/0x630
[   18.369770]  ret_from_fork+0x10/0x20
[   18.369853] 
[   18.369880] The buggy address belongs to the object at fff00000c784ef80
[   18.369880]  which belongs to the cache kmalloc-64 of size 64
[   18.369952] The buggy address is located 0 bytes to the right of
[   18.369952]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.370018] 
[   18.370656] The buggy address belongs to the physical page:
[   18.370754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.370939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.371239] page_type: f5(slab)
[   18.371450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.371654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.371823] page dumped because: kasan: bad access detected
[   18.372237] 
[   18.372480] Memory state around the buggy address:
[   18.372559]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.372609]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.372826] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.373040]                                      ^
[   18.373260]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.373347]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.373484] ==================================================================
[   18.295604] ==================================================================
[   18.296021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.296207] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.296423] 
[   18.296469] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.296557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.296998] Hardware name: linux,dummy-virt (DT)
[   18.297077] Call trace:
[   18.297128]  show_stack+0x20/0x38 (C)
[   18.297194]  dump_stack_lvl+0x8c/0xd0
[   18.297303]  print_report+0x118/0x5d0
[   18.297447]  kasan_report+0xdc/0x128
[   18.297614]  kasan_check_range+0x100/0x1a8
[   18.297678]  __kasan_check_write+0x20/0x30
[   18.297888]  kasan_atomics_helper+0x1190/0x4858
[   18.298055]  kasan_atomics+0x198/0x2e0
[   18.298355]  kunit_try_run_case+0x170/0x3f0
[   18.298609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.298766]  kthread+0x328/0x630
[   18.298819]  ret_from_fork+0x10/0x20
[   18.299093] 
[   18.299130] Allocated by task 265:
[   18.299291]  kasan_save_stack+0x3c/0x68
[   18.299457]  kasan_save_track+0x20/0x40
[   18.299500]  kasan_save_alloc_info+0x40/0x58
[   18.299560]  __kasan_kmalloc+0xd4/0xd8
[   18.299598]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.299656]  kasan_atomics+0xb8/0x2e0
[   18.299705]  kunit_try_run_case+0x170/0x3f0
[   18.299754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.299798]  kthread+0x328/0x630
[   18.299841]  ret_from_fork+0x10/0x20
[   18.299880] 
[   18.299902] The buggy address belongs to the object at fff00000c784ef80
[   18.299902]  which belongs to the cache kmalloc-64 of size 64
[   18.299974] The buggy address is located 0 bytes to the right of
[   18.299974]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.300049] 
[   18.300081] The buggy address belongs to the physical page:
[   18.300119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.300188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.300237] page_type: f5(slab)
[   18.300278] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.300352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.300398] page dumped because: kasan: bad access detected
[   18.300448] 
[   18.300477] Memory state around the buggy address:
[   18.300520]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.300574]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.300620] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.300662]                                      ^
[   18.300695]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.300740]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.300779] ==================================================================
[   18.286898] ==================================================================
[   18.287211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.287286] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.287373] 
[   18.287406] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.287489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.287739] Hardware name: linux,dummy-virt (DT)
[   18.287790] Call trace:
[   18.287823]  show_stack+0x20/0x38 (C)
[   18.287920]  dump_stack_lvl+0x8c/0xd0
[   18.287970]  print_report+0x118/0x5d0
[   18.288413]  kasan_report+0xdc/0x128
[   18.288490]  kasan_check_range+0x100/0x1a8
[   18.288541]  __kasan_check_write+0x20/0x30
[   18.288751]  kasan_atomics_helper+0x1128/0x4858
[   18.288951]  kasan_atomics+0x198/0x2e0
[   18.289017]  kunit_try_run_case+0x170/0x3f0
[   18.289069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.289131]  kthread+0x328/0x630
[   18.289174]  ret_from_fork+0x10/0x20
[   18.289224] 
[   18.289245] Allocated by task 265:
[   18.289451]  kasan_save_stack+0x3c/0x68
[   18.289757]  kasan_save_track+0x20/0x40
[   18.289844]  kasan_save_alloc_info+0x40/0x58
[   18.289991]  __kasan_kmalloc+0xd4/0xd8
[   18.290068]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.290229]  kasan_atomics+0xb8/0x2e0
[   18.290424]  kunit_try_run_case+0x170/0x3f0
[   18.290507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.290883]  kthread+0x328/0x630
[   18.291080]  ret_from_fork+0x10/0x20
[   18.291177] 
[   18.291277] The buggy address belongs to the object at fff00000c784ef80
[   18.291277]  which belongs to the cache kmalloc-64 of size 64
[   18.291465] The buggy address is located 0 bytes to the right of
[   18.291465]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.291540] 
[   18.291562] The buggy address belongs to the physical page:
[   18.291756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.291882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.292158] page_type: f5(slab)
[   18.292424] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.292690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.293124] page dumped because: kasan: bad access detected
[   18.293337] 
[   18.293379] Memory state around the buggy address:
[   18.293700]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.293805]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.293919] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.294131]                                      ^
[   18.294191]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.294263]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.294316] ==================================================================
[   18.350039] ==================================================================
[   18.350092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.350354] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.350445] 
[   18.350671] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.350761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.350906] Hardware name: linux,dummy-virt (DT)
[   18.350952] Call trace:
[   18.350979]  show_stack+0x20/0x38 (C)
[   18.351032]  dump_stack_lvl+0x8c/0xd0
[   18.351401]  print_report+0x118/0x5d0
[   18.351522]  kasan_report+0xdc/0x128
[   18.351577]  kasan_check_range+0x100/0x1a8
[   18.351629]  __kasan_check_write+0x20/0x30
[   18.351711]  kasan_atomics_helper+0x1414/0x4858
[   18.351765]  kasan_atomics+0x198/0x2e0
[   18.351813]  kunit_try_run_case+0x170/0x3f0
[   18.352150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.352223]  kthread+0x328/0x630
[   18.352408]  ret_from_fork+0x10/0x20
[   18.352602] 
[   18.352655] Allocated by task 265:
[   18.352690]  kasan_save_stack+0x3c/0x68
[   18.352735]  kasan_save_track+0x20/0x40
[   18.352811]  kasan_save_alloc_info+0x40/0x58
[   18.352857]  __kasan_kmalloc+0xd4/0xd8
[   18.352941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.353287]  kasan_atomics+0xb8/0x2e0
[   18.353560]  kunit_try_run_case+0x170/0x3f0
[   18.353641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.353704]  kthread+0x328/0x630
[   18.353742]  ret_from_fork+0x10/0x20
[   18.353781] 
[   18.354214] The buggy address belongs to the object at fff00000c784ef80
[   18.354214]  which belongs to the cache kmalloc-64 of size 64
[   18.354447] The buggy address is located 0 bytes to the right of
[   18.354447]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.354524] 
[   18.354795] The buggy address belongs to the physical page:
[   18.354992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.355364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.355443] page_type: f5(slab)
[   18.355637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.355855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.356074] page dumped because: kasan: bad access detected
[   18.356210] 
[   18.356394] Memory state around the buggy address:
[   18.356559]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.356644]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.356891] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.356954]                                      ^
[   18.357169]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.357222]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.357263] ==================================================================
[   18.390792] ==================================================================
[   18.390868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.390923] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.390976] 
[   18.391139] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.391274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.391501] Hardware name: linux,dummy-virt (DT)
[   18.391548] Call trace:
[   18.391573]  show_stack+0x20/0x38 (C)
[   18.391655]  dump_stack_lvl+0x8c/0xd0
[   18.391909]  print_report+0x118/0x5d0
[   18.392074]  kasan_report+0xdc/0x128
[   18.392252]  __asan_report_load8_noabort+0x20/0x30
[   18.392469]  kasan_atomics_helper+0x3db0/0x4858
[   18.392589]  kasan_atomics+0x198/0x2e0
[   18.392643]  kunit_try_run_case+0x170/0x3f0
[   18.392750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.392815]  kthread+0x328/0x630
[   18.393052]  ret_from_fork+0x10/0x20
[   18.393122] 
[   18.393290] Allocated by task 265:
[   18.393353]  kasan_save_stack+0x3c/0x68
[   18.393529]  kasan_save_track+0x20/0x40
[   18.393746]  kasan_save_alloc_info+0x40/0x58
[   18.393817]  __kasan_kmalloc+0xd4/0xd8
[   18.393979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.394067]  kasan_atomics+0xb8/0x2e0
[   18.394394]  kunit_try_run_case+0x170/0x3f0
[   18.394470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.394610]  kthread+0x328/0x630
[   18.394688]  ret_from_fork+0x10/0x20
[   18.395237] 
[   18.395287] The buggy address belongs to the object at fff00000c784ef80
[   18.395287]  which belongs to the cache kmalloc-64 of size 64
[   18.395499] The buggy address is located 0 bytes to the right of
[   18.395499]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.395582] 
[   18.395604] The buggy address belongs to the physical page:
[   18.395678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.395894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.396274] page_type: f5(slab)
[   18.396368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.396522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.396744] page dumped because: kasan: bad access detected
[   18.396938] 
[   18.396988] Memory state around the buggy address:
[   18.397201]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.397408]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.397765] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.397993]                                      ^
[   18.398066]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.398302]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.398389] ==================================================================
[   18.099684] ==================================================================
[   18.100107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   18.100179] Write of size 4 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.100241] 
[   18.100274] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.100372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.100629] Hardware name: linux,dummy-virt (DT)
[   18.101067] Call trace:
[   18.101127]  show_stack+0x20/0x38 (C)
[   18.101293]  dump_stack_lvl+0x8c/0xd0
[   18.101361]  print_report+0x118/0x5d0
[   18.101474]  kasan_report+0xdc/0x128
[   18.101564]  kasan_check_range+0x100/0x1a8
[   18.101623]  __kasan_check_write+0x20/0x30
[   18.101670]  kasan_atomics_helper+0xa6c/0x4858
[   18.102003]  kasan_atomics+0x198/0x2e0
[   18.102146]  kunit_try_run_case+0x170/0x3f0
[   18.102381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.102647]  kthread+0x328/0x630
[   18.102732]  ret_from_fork+0x10/0x20
[   18.102787] 
[   18.102808] Allocated by task 265:
[   18.102839]  kasan_save_stack+0x3c/0x68
[   18.102883]  kasan_save_track+0x20/0x40
[   18.103293]  kasan_save_alloc_info+0x40/0x58
[   18.103702]  __kasan_kmalloc+0xd4/0xd8
[   18.103914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.104024]  kasan_atomics+0xb8/0x2e0
[   18.104234]  kunit_try_run_case+0x170/0x3f0
[   18.104480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.104631]  kthread+0x328/0x630
[   18.104693]  ret_from_fork+0x10/0x20
[   18.105021] 
[   18.105179] The buggy address belongs to the object at fff00000c784ef80
[   18.105179]  which belongs to the cache kmalloc-64 of size 64
[   18.105713] The buggy address is located 0 bytes to the right of
[   18.105713]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.105895] 
[   18.105919] The buggy address belongs to the physical page:
[   18.106198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.106451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.106598] page_type: f5(slab)
[   18.106640] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.106962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.107027] page dumped because: kasan: bad access detected
[   18.107063] 
[   18.107083] Memory state around the buggy address:
[   18.107170]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.107244]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.107290] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.107341]                                      ^
[   18.107377]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.107422]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.109136] 
[   18.110277] Call trace:
[   18.112812]  kthread+0x328/0x630
[   18.113612]  kasan_save_track+0x20/0x40
[   18.113774]  kasan_save_alloc_info+0x40/0x58
[   18.113910]  __kasan_kmalloc+0xd4/0xd8
[   18.113971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.114402]  kasan_atomics+0xb8/0x2e0
[   18.114475]  kunit_try_run_case+0x170/0x3f0
[   18.114537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.114584]  kthread+0x328/0x630
[   18.114620]  ret_from_fork+0x10/0x20
[   18.114659] 
[   18.114692] The buggy address belongs to the object at fff00000c784ef80
[   18.114692]  which belongs to the cache kmalloc-64 of size 64
[   18.114752] The buggy address is located 0 bytes to the right of
[   18.114752]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.114821] 
[   18.114861] The buggy address belongs to the physical page:
[   18.114910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.114963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.115169] page dumped because: kasan: bad access detected
[   18.115639] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.118801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   18.120505]  kunit_try_run_case+0x170/0x3f0
[   18.121450]  kasan_save_alloc_info+0x40/0x58
[   18.121547]  __kasan_kmalloc+0xd4/0xd8
[   18.122415]  kthread+0x328/0x630
[   18.123225] 
[   18.123413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.124253] 
[   18.125590]                                      ^
[   18.128089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.128524]  print_report+0x118/0x5d0
[   18.129263]  __kasan_kmalloc+0xd4/0xd8
[   18.129302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.129849]  kunit_try_run_case+0x170/0x3f0
[   18.131260] 
[   18.131644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.132973]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.133719]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.136506] Hardware name: linux,dummy-virt (DT)
[   18.138051]  kunit_try_run_case+0x170/0x3f0
[   18.139706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.140017] 
[   18.140107] The buggy address is located 0 bytes to the right of
[   18.140107]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.140618]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.142241] 
[   18.144075]  kasan_atomics_helper+0xc08/0x4858
[   18.145592]  kasan_save_alloc_info+0x40/0x58
[   18.146100]  kasan_atomics+0xb8/0x2e0
[   18.146410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.147079] The buggy address is located 0 bytes to the right of
[   18.147079]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.148852]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.149097]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.151435] 
[   18.151826] Call trace:
[   18.152494]  kasan_atomics+0x198/0x2e0
[   18.154650]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.155496]  kthread+0x328/0x630
[   18.155745] 
[   18.155978] The buggy address is located 0 bytes to the right of
[   18.155978]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.158361] Memory state around the buggy address:
[   18.158714] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.160362] ==================================================================
[   18.442139] ==================================================================
[   18.442801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.442887] Read of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.443018] 
[   18.443075] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.443167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.443244] Hardware name: linux,dummy-virt (DT)
[   18.443289] Call trace:
[   18.443315]  show_stack+0x20/0x38 (C)
[   18.443379]  dump_stack_lvl+0x8c/0xd0
[   18.443615]  print_report+0x118/0x5d0
[   18.443699]  kasan_report+0xdc/0x128
[   18.443851]  __asan_report_load8_noabort+0x20/0x30
[   18.444288]  kasan_atomics_helper+0x3e20/0x4858
[   18.444375]  kasan_atomics+0x198/0x2e0
[   18.444428]  kunit_try_run_case+0x170/0x3f0
[   18.444660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.444916]  kthread+0x328/0x630
[   18.445007]  ret_from_fork+0x10/0x20
[   18.445059] 
[   18.445097] Allocated by task 265:
[   18.445128]  kasan_save_stack+0x3c/0x68
[   18.445381]  kasan_save_track+0x20/0x40
[   18.445526]  kasan_save_alloc_info+0x40/0x58
[   18.445614]  __kasan_kmalloc+0xd4/0xd8
[   18.445681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.445725]  kasan_atomics+0xb8/0x2e0
[   18.445762]  kunit_try_run_case+0x170/0x3f0
[   18.445803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.445858]  kthread+0x328/0x630
[   18.445909]  ret_from_fork+0x10/0x20
[   18.445947] 
[   18.445969] The buggy address belongs to the object at fff00000c784ef80
[   18.445969]  which belongs to the cache kmalloc-64 of size 64
[   18.446469] The buggy address is located 0 bytes to the right of
[   18.446469]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.447013] 
[   18.447427] The buggy address belongs to the physical page:
[   18.447500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.447597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.447663] page_type: f5(slab)
[   18.447705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.448164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.448239] page dumped because: kasan: bad access detected
[   18.448583] 
[   18.448802] Memory state around the buggy address:
[   18.448855]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.448906]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.449261] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.449711]                                      ^
[   18.449764]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.449813]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.449860] ==================================================================
[   18.215528] ==================================================================
[   18.215716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.215781] Write of size 8 at addr fff00000c784efb0 by task kunit_try_catch/265
[   18.216160] 
[   18.216202] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.216289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.216338] Hardware name: linux,dummy-virt (DT)
[   18.216373] Call trace:
[   18.216398]  show_stack+0x20/0x38 (C)
[   18.216451]  dump_stack_lvl+0x8c/0xd0
[   18.216498]  print_report+0x118/0x5d0
[   18.216559]  kasan_report+0xdc/0x128
[   18.216607]  kasan_check_range+0x100/0x1a8
[   18.216658]  __kasan_check_write+0x20/0x30
[   18.216703]  kasan_atomics_helper+0xe44/0x4858
[   18.216753]  kasan_atomics+0x198/0x2e0
[   18.216799]  kunit_try_run_case+0x170/0x3f0
[   18.216850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.216903]  kthread+0x328/0x630
[   18.216962]  ret_from_fork+0x10/0x20
[   18.217013] 
[   18.217043] Allocated by task 265:
[   18.217074]  kasan_save_stack+0x3c/0x68
[   18.217119]  kasan_save_track+0x20/0x40
[   18.217163]  kasan_save_alloc_info+0x40/0x58
[   18.217205]  __kasan_kmalloc+0xd4/0xd8
[   18.217244]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.217305]  kasan_atomics+0xb8/0x2e0
[   18.218307]  kunit_try_run_case+0x170/0x3f0
[   18.218401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.218473]  kthread+0x328/0x630
[   18.218526]  ret_from_fork+0x10/0x20
[   18.218605] 
[   18.218871] The buggy address belongs to the object at fff00000c784ef80
[   18.218871]  which belongs to the cache kmalloc-64 of size 64
[   18.219032] The buggy address is located 0 bytes to the right of
[   18.219032]  allocated 48-byte region [fff00000c784ef80, fff00000c784efb0)
[   18.219129] 
[   18.219582] The buggy address belongs to the physical page:
[   18.220082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10784e
[   18.220339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.220539] page_type: f5(slab)
[   18.220626] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.220916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.220994] page dumped because: kasan: bad access detected
[   18.221421] 
[   18.221479] Memory state around the buggy address:
[   18.221671]  fff00000c784ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.221735]  fff00000c784ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.221919] >fff00000c784ef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.222040]                                      ^
[   18.222399]  fff00000c784f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.222458]  fff00000c784f080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.222649] ==================================================================

[   14.687334] ==================================================================
[   14.687836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.688267] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.688502] 
[   14.688624] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.688668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.688680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.688700] Call Trace:
[   14.688790]  <TASK>
[   14.688818]  dump_stack_lvl+0x73/0xb0
[   14.688847]  print_report+0xd1/0x610
[   14.688869]  ? __virt_addr_valid+0x1db/0x2d0
[   14.688892]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.688914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.688938]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.688967]  kasan_report+0x141/0x180
[   14.688989]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.689015]  __asan_report_load4_noabort+0x18/0x20
[   14.689039]  kasan_atomics_helper+0x4b88/0x5450
[   14.689139]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.689177]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.689200]  ? trace_hardirqs_on+0x37/0xe0
[   14.689223]  ? kasan_atomics+0x152/0x310
[   14.689249]  kasan_atomics+0x1dc/0x310
[   14.689272]  ? __pfx_kasan_atomics+0x10/0x10
[   14.689294]  ? __pfx_kasan_atomics+0x10/0x10
[   14.689331]  kunit_try_run_case+0x1a5/0x480
[   14.689354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.689376]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.689401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.689424]  ? __kthread_parkme+0x82/0x180
[   14.689443]  ? preempt_count_sub+0x50/0x80
[   14.689467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.689501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.689524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.689581]  kthread+0x337/0x6f0
[   14.689601]  ? trace_preempt_on+0x20/0xc0
[   14.689622]  ? __pfx_kthread+0x10/0x10
[   14.689679]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.689700]  ? calculate_sigpending+0x7b/0xa0
[   14.689735]  ? __pfx_kthread+0x10/0x10
[   14.689755]  ret_from_fork+0x116/0x1d0
[   14.689774]  ? __pfx_kthread+0x10/0x10
[   14.689794]  ret_from_fork_asm+0x1a/0x30
[   14.689824]  </TASK>
[   14.689834] 
[   14.698998] Allocated by task 284:
[   14.699444]  kasan_save_stack+0x45/0x70
[   14.699785]  kasan_save_track+0x18/0x40
[   14.700005]  kasan_save_alloc_info+0x3b/0x50
[   14.700337]  __kasan_kmalloc+0xb7/0xc0
[   14.700475]  __kmalloc_cache_noprof+0x189/0x420
[   14.700732]  kasan_atomics+0x95/0x310
[   14.700982]  kunit_try_run_case+0x1a5/0x480
[   14.701197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.701411]  kthread+0x337/0x6f0
[   14.701535]  ret_from_fork+0x116/0x1d0
[   14.701838]  ret_from_fork_asm+0x1a/0x30
[   14.702103] 
[   14.702253] The buggy address belongs to the object at ffff888103a28200
[   14.702253]  which belongs to the cache kmalloc-64 of size 64
[   14.702771] The buggy address is located 0 bytes to the right of
[   14.702771]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.703528] 
[   14.703628] The buggy address belongs to the physical page:
[   14.703880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.704195] flags: 0x200000000000000(node=0|zone=2)
[   14.704708] page_type: f5(slab)
[   14.704933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.705350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.705800] page dumped because: kasan: bad access detected
[   14.706010] 
[   14.706132] Memory state around the buggy address:
[   14.706426]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.706829]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.707106] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.707605]                                      ^
[   14.707833]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.708232]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.708786] ==================================================================
[   14.859704] ==================================================================
[   14.860042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.860418] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.860907] 
[   14.861092] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.861139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.861152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.861174] Call Trace:
[   14.861191]  <TASK>
[   14.861219]  dump_stack_lvl+0x73/0xb0
[   14.861248]  print_report+0xd1/0x610
[   14.861272]  ? __virt_addr_valid+0x1db/0x2d0
[   14.861318]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.861349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.861373]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.861396]  kasan_report+0x141/0x180
[   14.861429]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.861457]  kasan_check_range+0x10c/0x1c0
[   14.861481]  __kasan_check_write+0x18/0x20
[   14.861514]  kasan_atomics_helper+0x5fe/0x5450
[   14.861537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.861560]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.861585]  ? trace_hardirqs_on+0x37/0xe0
[   14.861608]  ? kasan_atomics+0x152/0x310
[   14.861636]  kasan_atomics+0x1dc/0x310
[   14.861660]  ? __pfx_kasan_atomics+0x10/0x10
[   14.861684]  ? __pfx_kasan_atomics+0x10/0x10
[   14.861711]  kunit_try_run_case+0x1a5/0x480
[   14.861736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.861759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.861784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.861809]  ? __kthread_parkme+0x82/0x180
[   14.861829]  ? preempt_count_sub+0x50/0x80
[   14.861853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.861878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.861902]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.861927]  kthread+0x337/0x6f0
[   14.861946]  ? trace_preempt_on+0x20/0xc0
[   14.861970]  ? __pfx_kthread+0x10/0x10
[   14.861990]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.862012]  ? calculate_sigpending+0x7b/0xa0
[   14.862036]  ? __pfx_kthread+0x10/0x10
[   14.862058]  ret_from_fork+0x116/0x1d0
[   14.862078]  ? __pfx_kthread+0x10/0x10
[   14.862108]  ret_from_fork_asm+0x1a/0x30
[   14.862153]  </TASK>
[   14.862165] 
[   14.870879] Allocated by task 284:
[   14.871266]  kasan_save_stack+0x45/0x70
[   14.871567]  kasan_save_track+0x18/0x40
[   14.871765]  kasan_save_alloc_info+0x3b/0x50
[   14.871978]  __kasan_kmalloc+0xb7/0xc0
[   14.872355]  __kmalloc_cache_noprof+0x189/0x420
[   14.872521]  kasan_atomics+0x95/0x310
[   14.872657]  kunit_try_run_case+0x1a5/0x480
[   14.872834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.873158]  kthread+0x337/0x6f0
[   14.873357]  ret_from_fork+0x116/0x1d0
[   14.873625]  ret_from_fork_asm+0x1a/0x30
[   14.873820] 
[   14.873918] The buggy address belongs to the object at ffff888103a28200
[   14.873918]  which belongs to the cache kmalloc-64 of size 64
[   14.874457] The buggy address is located 0 bytes to the right of
[   14.874457]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.875008] 
[   14.875117] The buggy address belongs to the physical page:
[   14.875513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.875863] flags: 0x200000000000000(node=0|zone=2)
[   14.876233] page_type: f5(slab)
[   14.876425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.876804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.877144] page dumped because: kasan: bad access detected
[   14.877437] 
[   14.877592] Memory state around the buggy address:
[   14.877797]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.878224]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.878642] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.878865]                                      ^
[   14.879024]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.879322]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.879635] ==================================================================
[   14.880068] ==================================================================
[   14.880738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.880981] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.881411] 
[   14.881580] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.881624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.881636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.881657] Call Trace:
[   14.881673]  <TASK>
[   14.881688]  dump_stack_lvl+0x73/0xb0
[   14.881717]  print_report+0xd1/0x610
[   14.881738]  ? __virt_addr_valid+0x1db/0x2d0
[   14.881760]  ? kasan_atomics_helper+0x697/0x5450
[   14.881782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.881806]  ? kasan_atomics_helper+0x697/0x5450
[   14.881828]  kasan_report+0x141/0x180
[   14.881851]  ? kasan_atomics_helper+0x697/0x5450
[   14.881878]  kasan_check_range+0x10c/0x1c0
[   14.881902]  __kasan_check_write+0x18/0x20
[   14.881934]  kasan_atomics_helper+0x697/0x5450
[   14.881958]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.881980]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.882016]  ? trace_hardirqs_on+0x37/0xe0
[   14.882039]  ? kasan_atomics+0x152/0x310
[   14.882066]  kasan_atomics+0x1dc/0x310
[   14.882089]  ? __pfx_kasan_atomics+0x10/0x10
[   14.882113]  ? __pfx_kasan_atomics+0x10/0x10
[   14.882230]  kunit_try_run_case+0x1a5/0x480
[   14.882256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.882279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.882322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.882346]  ? __kthread_parkme+0x82/0x180
[   14.882376]  ? preempt_count_sub+0x50/0x80
[   14.882402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.882427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.882451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.882476]  kthread+0x337/0x6f0
[   14.882506]  ? trace_preempt_on+0x20/0xc0
[   14.882528]  ? __pfx_kthread+0x10/0x10
[   14.882549]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.882581]  ? calculate_sigpending+0x7b/0xa0
[   14.882605]  ? __pfx_kthread+0x10/0x10
[   14.882626]  ret_from_fork+0x116/0x1d0
[   14.882646]  ? __pfx_kthread+0x10/0x10
[   14.882667]  ret_from_fork_asm+0x1a/0x30
[   14.882698]  </TASK>
[   14.882707] 
[   14.891096] Allocated by task 284:
[   14.891376]  kasan_save_stack+0x45/0x70
[   14.891681]  kasan_save_track+0x18/0x40
[   14.891857]  kasan_save_alloc_info+0x3b/0x50
[   14.892117]  __kasan_kmalloc+0xb7/0xc0
[   14.892287]  __kmalloc_cache_noprof+0x189/0x420
[   14.892710]  kasan_atomics+0x95/0x310
[   14.892919]  kunit_try_run_case+0x1a5/0x480
[   14.893155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.893477]  kthread+0x337/0x6f0
[   14.893641]  ret_from_fork+0x116/0x1d0
[   14.893776]  ret_from_fork_asm+0x1a/0x30
[   14.893999] 
[   14.894170] The buggy address belongs to the object at ffff888103a28200
[   14.894170]  which belongs to the cache kmalloc-64 of size 64
[   14.894755] The buggy address is located 0 bytes to the right of
[   14.894755]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.895405] 
[   14.895528] The buggy address belongs to the physical page:
[   14.895737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.895983] flags: 0x200000000000000(node=0|zone=2)
[   14.896215] page_type: f5(slab)
[   14.896479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.897283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.897674] page dumped because: kasan: bad access detected
[   14.897952] 
[   14.898131] Memory state around the buggy address:
[   14.898375]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.898770]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.899063] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.899432]                                      ^
[   14.899707]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.899928]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.900248] ==================================================================
[   14.900824] ==================================================================
[   14.901339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.901675] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.901968] 
[   14.902190] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.902235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.902246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.902287] Call Trace:
[   14.902301]  <TASK>
[   14.902333]  dump_stack_lvl+0x73/0xb0
[   14.902361]  print_report+0xd1/0x610
[   14.902383]  ? __virt_addr_valid+0x1db/0x2d0
[   14.902406]  ? kasan_atomics_helper+0x72f/0x5450
[   14.902428]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.902452]  ? kasan_atomics_helper+0x72f/0x5450
[   14.902475]  kasan_report+0x141/0x180
[   14.902498]  ? kasan_atomics_helper+0x72f/0x5450
[   14.902525]  kasan_check_range+0x10c/0x1c0
[   14.902559]  __kasan_check_write+0x18/0x20
[   14.902579]  kasan_atomics_helper+0x72f/0x5450
[   14.902602]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.902635]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.902660]  ? trace_hardirqs_on+0x37/0xe0
[   14.902682]  ? kasan_atomics+0x152/0x310
[   14.902718]  kasan_atomics+0x1dc/0x310
[   14.902742]  ? __pfx_kasan_atomics+0x10/0x10
[   14.902766]  ? __pfx_kasan_atomics+0x10/0x10
[   14.902804]  kunit_try_run_case+0x1a5/0x480
[   14.902828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.902851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.902875]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.902898]  ? __kthread_parkme+0x82/0x180
[   14.902919]  ? preempt_count_sub+0x50/0x80
[   14.902943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.902967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.902991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.903095]  kthread+0x337/0x6f0
[   14.903117]  ? trace_preempt_on+0x20/0xc0
[   14.903141]  ? __pfx_kthread+0x10/0x10
[   14.903162]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.903184]  ? calculate_sigpending+0x7b/0xa0
[   14.903208]  ? __pfx_kthread+0x10/0x10
[   14.903230]  ret_from_fork+0x116/0x1d0
[   14.903249]  ? __pfx_kthread+0x10/0x10
[   14.903270]  ret_from_fork_asm+0x1a/0x30
[   14.903301]  </TASK>
[   14.903370] 
[   14.913330] Allocated by task 284:
[   14.914045]  kasan_save_stack+0x45/0x70
[   14.914253]  kasan_save_track+0x18/0x40
[   14.914709]  kasan_save_alloc_info+0x3b/0x50
[   14.914961]  __kasan_kmalloc+0xb7/0xc0
[   14.915220]  __kmalloc_cache_noprof+0x189/0x420
[   14.915461]  kasan_atomics+0x95/0x310
[   14.915691]  kunit_try_run_case+0x1a5/0x480
[   14.915934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.916333]  kthread+0x337/0x6f0
[   14.916602]  ret_from_fork+0x116/0x1d0
[   14.916786]  ret_from_fork_asm+0x1a/0x30
[   14.917108] 
[   14.917212] The buggy address belongs to the object at ffff888103a28200
[   14.917212]  which belongs to the cache kmalloc-64 of size 64
[   14.917830] The buggy address is located 0 bytes to the right of
[   14.917830]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.919046] 
[   14.919141] The buggy address belongs to the physical page:
[   14.919618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.919949] flags: 0x200000000000000(node=0|zone=2)
[   14.920344] page_type: f5(slab)
[   14.920634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.921031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.921454] page dumped because: kasan: bad access detected
[   14.921758] 
[   14.921845] Memory state around the buggy address:
[   14.922320]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.922693]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.922911] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.923464]                                      ^
[   14.923720]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.924113]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.924522] ==================================================================
[   15.208803] ==================================================================
[   15.209265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.209918] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.210428] 
[   15.210690] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.210739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.210766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.210788] Call Trace:
[   15.210804]  <TASK>
[   15.210820]  dump_stack_lvl+0x73/0xb0
[   15.210848]  print_report+0xd1/0x610
[   15.210871]  ? __virt_addr_valid+0x1db/0x2d0
[   15.210893]  ? kasan_atomics_helper+0xe78/0x5450
[   15.210916]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.210939]  ? kasan_atomics_helper+0xe78/0x5450
[   15.210962]  kasan_report+0x141/0x180
[   15.210984]  ? kasan_atomics_helper+0xe78/0x5450
[   15.211010]  kasan_check_range+0x10c/0x1c0
[   15.211034]  __kasan_check_write+0x18/0x20
[   15.211054]  kasan_atomics_helper+0xe78/0x5450
[   15.211077]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.211100]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.211124]  ? trace_hardirqs_on+0x37/0xe0
[   15.211147]  ? kasan_atomics+0x152/0x310
[   15.211174]  kasan_atomics+0x1dc/0x310
[   15.211197]  ? __pfx_kasan_atomics+0x10/0x10
[   15.211220]  ? __pfx_kasan_atomics+0x10/0x10
[   15.211247]  kunit_try_run_case+0x1a5/0x480
[   15.211271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.211295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.211331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.211356]  ? __kthread_parkme+0x82/0x180
[   15.211376]  ? preempt_count_sub+0x50/0x80
[   15.211401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.211425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.211450]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.211475]  kthread+0x337/0x6f0
[   15.211678]  ? trace_preempt_on+0x20/0xc0
[   15.211704]  ? __pfx_kthread+0x10/0x10
[   15.211726]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.211748]  ? calculate_sigpending+0x7b/0xa0
[   15.211775]  ? __pfx_kthread+0x10/0x10
[   15.211796]  ret_from_fork+0x116/0x1d0
[   15.211815]  ? __pfx_kthread+0x10/0x10
[   15.211836]  ret_from_fork_asm+0x1a/0x30
[   15.211867]  </TASK>
[   15.211878] 
[   15.221686] Allocated by task 284:
[   15.222062]  kasan_save_stack+0x45/0x70
[   15.222338]  kasan_save_track+0x18/0x40
[   15.222491]  kasan_save_alloc_info+0x3b/0x50
[   15.222923]  __kasan_kmalloc+0xb7/0xc0
[   15.223177]  __kmalloc_cache_noprof+0x189/0x420
[   15.223361]  kasan_atomics+0x95/0x310
[   15.223758]  kunit_try_run_case+0x1a5/0x480
[   15.223952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.224203]  kthread+0x337/0x6f0
[   15.224508]  ret_from_fork+0x116/0x1d0
[   15.224682]  ret_from_fork_asm+0x1a/0x30
[   15.224871] 
[   15.224950] The buggy address belongs to the object at ffff888103a28200
[   15.224950]  which belongs to the cache kmalloc-64 of size 64
[   15.225445] The buggy address is located 0 bytes to the right of
[   15.225445]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.226251] 
[   15.226440] The buggy address belongs to the physical page:
[   15.226692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.227129] flags: 0x200000000000000(node=0|zone=2)
[   15.227436] page_type: f5(slab)
[   15.227572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.228006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.228404] page dumped because: kasan: bad access detected
[   15.228644] 
[   15.228744] Memory state around the buggy address:
[   15.229152]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.229437]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.229855] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.230166]                                      ^
[   15.230389]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.230842]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.231221] ==================================================================
[   15.647927] ==================================================================
[   15.648298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.648675] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.649011] 
[   15.649120] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.649164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.649177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.649198] Call Trace:
[   15.649213]  <TASK>
[   15.649228]  dump_stack_lvl+0x73/0xb0
[   15.649256]  print_report+0xd1/0x610
[   15.649278]  ? __virt_addr_valid+0x1db/0x2d0
[   15.649301]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.649336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.649360]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.649383]  kasan_report+0x141/0x180
[   15.649406]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.649433]  kasan_check_range+0x10c/0x1c0
[   15.649458]  __kasan_check_write+0x18/0x20
[   15.649499]  kasan_atomics_helper+0x16e7/0x5450
[   15.649524]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.649547]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.649573]  ? trace_hardirqs_on+0x37/0xe0
[   15.649597]  ? kasan_atomics+0x152/0x310
[   15.649625]  kasan_atomics+0x1dc/0x310
[   15.649648]  ? __pfx_kasan_atomics+0x10/0x10
[   15.649673]  ? __pfx_kasan_atomics+0x10/0x10
[   15.649701]  kunit_try_run_case+0x1a5/0x480
[   15.649726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.649750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.649774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.649799]  ? __kthread_parkme+0x82/0x180
[   15.649820]  ? preempt_count_sub+0x50/0x80
[   15.649846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.649871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.649897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.649923]  kthread+0x337/0x6f0
[   15.649944]  ? trace_preempt_on+0x20/0xc0
[   15.649967]  ? __pfx_kthread+0x10/0x10
[   15.649988]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.650011]  ? calculate_sigpending+0x7b/0xa0
[   15.650035]  ? __pfx_kthread+0x10/0x10
[   15.650058]  ret_from_fork+0x116/0x1d0
[   15.650077]  ? __pfx_kthread+0x10/0x10
[   15.650098]  ret_from_fork_asm+0x1a/0x30
[   15.650129]  </TASK>
[   15.650140] 
[   15.657507] Allocated by task 284:
[   15.657687]  kasan_save_stack+0x45/0x70
[   15.657886]  kasan_save_track+0x18/0x40
[   15.658078]  kasan_save_alloc_info+0x3b/0x50
[   15.658294]  __kasan_kmalloc+0xb7/0xc0
[   15.658456]  __kmalloc_cache_noprof+0x189/0x420
[   15.658632]  kasan_atomics+0x95/0x310
[   15.658768]  kunit_try_run_case+0x1a5/0x480
[   15.658916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.659093]  kthread+0x337/0x6f0
[   15.659214]  ret_from_fork+0x116/0x1d0
[   15.659373]  ret_from_fork_asm+0x1a/0x30
[   15.659595] 
[   15.659690] The buggy address belongs to the object at ffff888103a28200
[   15.659690]  which belongs to the cache kmalloc-64 of size 64
[   15.660206] The buggy address is located 0 bytes to the right of
[   15.660206]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.660786] 
[   15.660881] The buggy address belongs to the physical page:
[   15.661136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.661517] flags: 0x200000000000000(node=0|zone=2)
[   15.661753] page_type: f5(slab)
[   15.661920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.662227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.662541] page dumped because: kasan: bad access detected
[   15.662752] 
[   15.662822] Memory state around the buggy address:
[   15.662978]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.663197]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.663471] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.663807]                                      ^
[   15.664032]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.664371]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.664717] ==================================================================
[   15.682407] ==================================================================
[   15.682783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.683144] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.683461] 
[   15.683583] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.683627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.683639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.683659] Call Trace:
[   15.683675]  <TASK>
[   15.683689]  dump_stack_lvl+0x73/0xb0
[   15.683717]  print_report+0xd1/0x610
[   15.683740]  ? __virt_addr_valid+0x1db/0x2d0
[   15.683762]  ? kasan_atomics_helper+0x1818/0x5450
[   15.683784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.683807]  ? kasan_atomics_helper+0x1818/0x5450
[   15.683830]  kasan_report+0x141/0x180
[   15.683853]  ? kasan_atomics_helper+0x1818/0x5450
[   15.683880]  kasan_check_range+0x10c/0x1c0
[   15.683904]  __kasan_check_write+0x18/0x20
[   15.683924]  kasan_atomics_helper+0x1818/0x5450
[   15.683947]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.683969]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.683994]  ? trace_hardirqs_on+0x37/0xe0
[   15.684016]  ? kasan_atomics+0x152/0x310
[   15.684043]  kasan_atomics+0x1dc/0x310
[   15.684066]  ? __pfx_kasan_atomics+0x10/0x10
[   15.684089]  ? __pfx_kasan_atomics+0x10/0x10
[   15.684117]  kunit_try_run_case+0x1a5/0x480
[   15.684142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.684165]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.684189]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.684214]  ? __kthread_parkme+0x82/0x180
[   15.684235]  ? preempt_count_sub+0x50/0x80
[   15.684259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.684284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.684309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.684343]  kthread+0x337/0x6f0
[   15.684363]  ? trace_preempt_on+0x20/0xc0
[   15.684386]  ? __pfx_kthread+0x10/0x10
[   15.684407]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.684429]  ? calculate_sigpending+0x7b/0xa0
[   15.684453]  ? __pfx_kthread+0x10/0x10
[   15.684475]  ret_from_fork+0x116/0x1d0
[   15.684514]  ? __pfx_kthread+0x10/0x10
[   15.684535]  ret_from_fork_asm+0x1a/0x30
[   15.684566]  </TASK>
[   15.684577] 
[   15.691778] Allocated by task 284:
[   15.691954]  kasan_save_stack+0x45/0x70
[   15.692100]  kasan_save_track+0x18/0x40
[   15.692237]  kasan_save_alloc_info+0x3b/0x50
[   15.692399]  __kasan_kmalloc+0xb7/0xc0
[   15.692553]  __kmalloc_cache_noprof+0x189/0x420
[   15.692713]  kasan_atomics+0x95/0x310
[   15.692847]  kunit_try_run_case+0x1a5/0x480
[   15.692999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.693177]  kthread+0x337/0x6f0
[   15.693328]  ret_from_fork+0x116/0x1d0
[   15.693535]  ret_from_fork_asm+0x1a/0x30
[   15.693730] 
[   15.693823] The buggy address belongs to the object at ffff888103a28200
[   15.693823]  which belongs to the cache kmalloc-64 of size 64
[   15.694348] The buggy address is located 0 bytes to the right of
[   15.694348]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.694913] 
[   15.695007] The buggy address belongs to the physical page:
[   15.695254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.695544] flags: 0x200000000000000(node=0|zone=2)
[   15.695720] page_type: f5(slab)
[   15.695841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.696075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.696391] page dumped because: kasan: bad access detected
[   15.696671] 
[   15.696766] Memory state around the buggy address:
[   15.696995]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.697329]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.697677] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.697994]                                      ^
[   15.698219]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698569]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698885] ==================================================================
[   16.092170] ==================================================================
[   16.092600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.093045] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   16.093386] 
[   16.093479] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.093574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.093589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.093621] Call Trace:
[   16.093637]  <TASK>
[   16.093653]  dump_stack_lvl+0x73/0xb0
[   16.093682]  print_report+0xd1/0x610
[   16.093705]  ? __virt_addr_valid+0x1db/0x2d0
[   16.093728]  ? kasan_atomics_helper+0x218a/0x5450
[   16.093750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.093774]  ? kasan_atomics_helper+0x218a/0x5450
[   16.093797]  kasan_report+0x141/0x180
[   16.093853]  ? kasan_atomics_helper+0x218a/0x5450
[   16.093880]  kasan_check_range+0x10c/0x1c0
[   16.093915]  __kasan_check_write+0x18/0x20
[   16.093936]  kasan_atomics_helper+0x218a/0x5450
[   16.093959]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.093982]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.094007]  ? trace_hardirqs_on+0x37/0xe0
[   16.094029]  ? kasan_atomics+0x152/0x310
[   16.094056]  kasan_atomics+0x1dc/0x310
[   16.094078]  ? __pfx_kasan_atomics+0x10/0x10
[   16.094103]  ? __pfx_kasan_atomics+0x10/0x10
[   16.094159]  kunit_try_run_case+0x1a5/0x480
[   16.094184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.094229]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.094253]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.094278]  ? __kthread_parkme+0x82/0x180
[   16.094300]  ? preempt_count_sub+0x50/0x80
[   16.094333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.094357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.094382]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.094407]  kthread+0x337/0x6f0
[   16.094455]  ? trace_preempt_on+0x20/0xc0
[   16.094478]  ? __pfx_kthread+0x10/0x10
[   16.094547]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.094569]  ? calculate_sigpending+0x7b/0xa0
[   16.094618]  ? __pfx_kthread+0x10/0x10
[   16.094640]  ret_from_fork+0x116/0x1d0
[   16.094660]  ? __pfx_kthread+0x10/0x10
[   16.094691]  ret_from_fork_asm+0x1a/0x30
[   16.094721]  </TASK>
[   16.094731] 
[   16.102903] Allocated by task 284:
[   16.103069]  kasan_save_stack+0x45/0x70
[   16.103304]  kasan_save_track+0x18/0x40
[   16.103518]  kasan_save_alloc_info+0x3b/0x50
[   16.103691]  __kasan_kmalloc+0xb7/0xc0
[   16.103827]  __kmalloc_cache_noprof+0x189/0x420
[   16.104100]  kasan_atomics+0x95/0x310
[   16.104361]  kunit_try_run_case+0x1a5/0x480
[   16.104664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.104877]  kthread+0x337/0x6f0
[   16.105013]  ret_from_fork+0x116/0x1d0
[   16.105204]  ret_from_fork_asm+0x1a/0x30
[   16.105458] 
[   16.105607] The buggy address belongs to the object at ffff888103a28200
[   16.105607]  which belongs to the cache kmalloc-64 of size 64
[   16.106070] The buggy address is located 0 bytes to the right of
[   16.106070]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   16.106769] 
[   16.106877] The buggy address belongs to the physical page:
[   16.107051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   16.107456] flags: 0x200000000000000(node=0|zone=2)
[   16.107641] page_type: f5(slab)
[   16.107798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.108152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.108510] page dumped because: kasan: bad access detected
[   16.108741] 
[   16.108836] Memory state around the buggy address:
[   16.109045]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.109273]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.109698] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.110094]                                      ^
[   16.110253]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.110576]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.110940] ==================================================================
[   16.156341] ==================================================================
[   16.156715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.157082] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   16.157437] 
[   16.157549] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.157594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.157606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.157627] Call Trace:
[   16.157641]  <TASK>
[   16.157655]  dump_stack_lvl+0x73/0xb0
[   16.157682]  print_report+0xd1/0x610
[   16.157703]  ? __virt_addr_valid+0x1db/0x2d0
[   16.157726]  ? kasan_atomics_helper+0x5115/0x5450
[   16.157749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.157772]  ? kasan_atomics_helper+0x5115/0x5450
[   16.157794]  kasan_report+0x141/0x180
[   16.157817]  ? kasan_atomics_helper+0x5115/0x5450
[   16.157844]  __asan_report_load8_noabort+0x18/0x20
[   16.157869]  kasan_atomics_helper+0x5115/0x5450
[   16.157892]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.157915]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.157939]  ? trace_hardirqs_on+0x37/0xe0
[   16.157961]  ? kasan_atomics+0x152/0x310
[   16.157988]  kasan_atomics+0x1dc/0x310
[   16.158011]  ? __pfx_kasan_atomics+0x10/0x10
[   16.158035]  ? __pfx_kasan_atomics+0x10/0x10
[   16.158062]  kunit_try_run_case+0x1a5/0x480
[   16.158086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.158109]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.158133]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.158158]  ? __kthread_parkme+0x82/0x180
[   16.158179]  ? preempt_count_sub+0x50/0x80
[   16.158204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.158228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.158253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.158278]  kthread+0x337/0x6f0
[   16.158299]  ? trace_preempt_on+0x20/0xc0
[   16.158377]  ? __pfx_kthread+0x10/0x10
[   16.158413]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.158471]  ? calculate_sigpending+0x7b/0xa0
[   16.158522]  ? __pfx_kthread+0x10/0x10
[   16.158545]  ret_from_fork+0x116/0x1d0
[   16.158565]  ? __pfx_kthread+0x10/0x10
[   16.158585]  ret_from_fork_asm+0x1a/0x30
[   16.158616]  </TASK>
[   16.158626] 
[   16.166824] Allocated by task 284:
[   16.166993]  kasan_save_stack+0x45/0x70
[   16.167201]  kasan_save_track+0x18/0x40
[   16.167389]  kasan_save_alloc_info+0x3b/0x50
[   16.167621]  __kasan_kmalloc+0xb7/0xc0
[   16.167776]  __kmalloc_cache_noprof+0x189/0x420
[   16.167975]  kasan_atomics+0x95/0x310
[   16.168170]  kunit_try_run_case+0x1a5/0x480
[   16.168363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.168650]  kthread+0x337/0x6f0
[   16.168776]  ret_from_fork+0x116/0x1d0
[   16.168964]  ret_from_fork_asm+0x1a/0x30
[   16.169248] 
[   16.169375] The buggy address belongs to the object at ffff888103a28200
[   16.169375]  which belongs to the cache kmalloc-64 of size 64
[   16.169877] The buggy address is located 0 bytes to the right of
[   16.169877]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   16.170421] 
[   16.170511] The buggy address belongs to the physical page:
[   16.170685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   16.171080] flags: 0x200000000000000(node=0|zone=2)
[   16.171310] page_type: f5(slab)
[   16.171501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.171841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.172076] page dumped because: kasan: bad access detected
[   16.172304] 
[   16.172442] Memory state around the buggy address:
[   16.172780]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.173093]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.173383] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.173754]                                      ^
[   16.174044]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.174273]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.174675] ==================================================================
[   15.520631] ==================================================================
[   15.520873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.521117] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.521708] 
[   15.522341] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.522394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.522408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.522429] Call Trace:
[   15.522452]  <TASK>
[   15.522467]  dump_stack_lvl+0x73/0xb0
[   15.522496]  print_report+0xd1/0x610
[   15.522519]  ? __virt_addr_valid+0x1db/0x2d0
[   15.522541]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.522564]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.522586]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.522623]  kasan_report+0x141/0x180
[   15.522646]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.522673]  __asan_report_load8_noabort+0x18/0x20
[   15.522698]  kasan_atomics_helper+0x4eae/0x5450
[   15.522721]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.522744]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.522768]  ? trace_hardirqs_on+0x37/0xe0
[   15.522791]  ? kasan_atomics+0x152/0x310
[   15.522817]  kasan_atomics+0x1dc/0x310
[   15.522841]  ? __pfx_kasan_atomics+0x10/0x10
[   15.522864]  ? __pfx_kasan_atomics+0x10/0x10
[   15.522890]  kunit_try_run_case+0x1a5/0x480
[   15.522914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.522937]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.522961]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.522986]  ? __kthread_parkme+0x82/0x180
[   15.523007]  ? preempt_count_sub+0x50/0x80
[   15.523032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.523056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.523080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.523106]  kthread+0x337/0x6f0
[   15.523125]  ? trace_preempt_on+0x20/0xc0
[   15.523148]  ? __pfx_kthread+0x10/0x10
[   15.523168]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.523191]  ? calculate_sigpending+0x7b/0xa0
[   15.523215]  ? __pfx_kthread+0x10/0x10
[   15.523237]  ret_from_fork+0x116/0x1d0
[   15.523256]  ? __pfx_kthread+0x10/0x10
[   15.523279]  ret_from_fork_asm+0x1a/0x30
[   15.523311]  </TASK>
[   15.523331] 
[   15.532327] Allocated by task 284:
[   15.532542]  kasan_save_stack+0x45/0x70
[   15.532765]  kasan_save_track+0x18/0x40
[   15.532962]  kasan_save_alloc_info+0x3b/0x50
[   15.533148]  __kasan_kmalloc+0xb7/0xc0
[   15.533337]  __kmalloc_cache_noprof+0x189/0x420
[   15.533590]  kasan_atomics+0x95/0x310
[   15.533770]  kunit_try_run_case+0x1a5/0x480
[   15.533950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.534202]  kthread+0x337/0x6f0
[   15.534373]  ret_from_fork+0x116/0x1d0
[   15.534580]  ret_from_fork_asm+0x1a/0x30
[   15.534780] 
[   15.534886] The buggy address belongs to the object at ffff888103a28200
[   15.534886]  which belongs to the cache kmalloc-64 of size 64
[   15.535450] The buggy address is located 0 bytes to the right of
[   15.535450]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.535978] 
[   15.536071] The buggy address belongs to the physical page:
[   15.536290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.536533] flags: 0x200000000000000(node=0|zone=2)
[   15.536691] page_type: f5(slab)
[   15.536868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.537229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.537666] page dumped because: kasan: bad access detected
[   15.537919] 
[   15.538024] Memory state around the buggy address:
[   15.538206]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.538553]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.538849] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.539120]                                      ^
[   15.539353]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.539677]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.539997] ==================================================================
[   15.591937] ==================================================================
[   15.592186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.592817] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.593438] 
[   15.593635] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.593679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.593691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.593713] Call Trace:
[   15.593730]  <TASK>
[   15.593746]  dump_stack_lvl+0x73/0xb0
[   15.593776]  print_report+0xd1/0x610
[   15.593798]  ? __virt_addr_valid+0x1db/0x2d0
[   15.593821]  ? kasan_atomics_helper+0x151d/0x5450
[   15.593843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.593867]  ? kasan_atomics_helper+0x151d/0x5450
[   15.593890]  kasan_report+0x141/0x180
[   15.593912]  ? kasan_atomics_helper+0x151d/0x5450
[   15.593939]  kasan_check_range+0x10c/0x1c0
[   15.593963]  __kasan_check_write+0x18/0x20
[   15.593983]  kasan_atomics_helper+0x151d/0x5450
[   15.594006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.594030]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.594055]  ? trace_hardirqs_on+0x37/0xe0
[   15.594078]  ? kasan_atomics+0x152/0x310
[   15.594105]  kasan_atomics+0x1dc/0x310
[   15.594128]  ? __pfx_kasan_atomics+0x10/0x10
[   15.594152]  ? __pfx_kasan_atomics+0x10/0x10
[   15.594179]  kunit_try_run_case+0x1a5/0x480
[   15.594205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.594228]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.594253]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.594278]  ? __kthread_parkme+0x82/0x180
[   15.594300]  ? preempt_count_sub+0x50/0x80
[   15.594335]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.594361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.594387]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.594412]  kthread+0x337/0x6f0
[   15.594432]  ? trace_preempt_on+0x20/0xc0
[   15.594455]  ? __pfx_kthread+0x10/0x10
[   15.594496]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.594520]  ? calculate_sigpending+0x7b/0xa0
[   15.594545]  ? __pfx_kthread+0x10/0x10
[   15.594566]  ret_from_fork+0x116/0x1d0
[   15.594586]  ? __pfx_kthread+0x10/0x10
[   15.594606]  ret_from_fork_asm+0x1a/0x30
[   15.594637]  </TASK>
[   15.594647] 
[   15.605307] Allocated by task 284:
[   15.605524]  kasan_save_stack+0x45/0x70
[   15.605724]  kasan_save_track+0x18/0x40
[   15.605898]  kasan_save_alloc_info+0x3b/0x50
[   15.606090]  __kasan_kmalloc+0xb7/0xc0
[   15.606278]  __kmalloc_cache_noprof+0x189/0x420
[   15.606516]  kasan_atomics+0x95/0x310
[   15.606681]  kunit_try_run_case+0x1a5/0x480
[   15.606875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.607085]  kthread+0x337/0x6f0
[   15.607247]  ret_from_fork+0x116/0x1d0
[   15.607432]  ret_from_fork_asm+0x1a/0x30
[   15.607634] 
[   15.607729] The buggy address belongs to the object at ffff888103a28200
[   15.607729]  which belongs to the cache kmalloc-64 of size 64
[   15.608189] The buggy address is located 0 bytes to the right of
[   15.608189]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.608613] 
[   15.608685] The buggy address belongs to the physical page:
[   15.608858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.609182] flags: 0x200000000000000(node=0|zone=2)
[   15.609422] page_type: f5(slab)
[   15.609613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.609949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.610275] page dumped because: kasan: bad access detected
[   15.610555] 
[   15.610625] Memory state around the buggy address:
[   15.610852]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.611074]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.611322] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.611667]                                      ^
[   15.611895]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.612216]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.612524] ==================================================================
[   15.754644] ==================================================================
[   15.755074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.755571] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.756238] 
[   15.756371] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.756548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.756563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.756583] Call Trace:
[   15.756600]  <TASK>
[   15.756615]  dump_stack_lvl+0x73/0xb0
[   15.756680]  print_report+0xd1/0x610
[   15.756702]  ? __virt_addr_valid+0x1db/0x2d0
[   15.756727]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.756751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.756777]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.756800]  kasan_report+0x141/0x180
[   15.756822]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.756849]  kasan_check_range+0x10c/0x1c0
[   15.756874]  __kasan_check_write+0x18/0x20
[   15.756895]  kasan_atomics_helper+0x1a7f/0x5450
[   15.756919]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.756942]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.756975]  ? trace_hardirqs_on+0x37/0xe0
[   15.756997]  ? kasan_atomics+0x152/0x310
[   15.757025]  kasan_atomics+0x1dc/0x310
[   15.757049]  ? __pfx_kasan_atomics+0x10/0x10
[   15.757073]  ? __pfx_kasan_atomics+0x10/0x10
[   15.757100]  kunit_try_run_case+0x1a5/0x480
[   15.757126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.757149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.757173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.757198]  ? __kthread_parkme+0x82/0x180
[   15.757220]  ? preempt_count_sub+0x50/0x80
[   15.757244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.757270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.757295]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.757332]  kthread+0x337/0x6f0
[   15.757352]  ? trace_preempt_on+0x20/0xc0
[   15.757376]  ? __pfx_kthread+0x10/0x10
[   15.757397]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.757419]  ? calculate_sigpending+0x7b/0xa0
[   15.757444]  ? __pfx_kthread+0x10/0x10
[   15.757466]  ret_from_fork+0x116/0x1d0
[   15.757512]  ? __pfx_kthread+0x10/0x10
[   15.757533]  ret_from_fork_asm+0x1a/0x30
[   15.757565]  </TASK>
[   15.757576] 
[   15.768907] Allocated by task 284:
[   15.769221]  kasan_save_stack+0x45/0x70
[   15.769741]  kasan_save_track+0x18/0x40
[   15.769890]  kasan_save_alloc_info+0x3b/0x50
[   15.770044]  __kasan_kmalloc+0xb7/0xc0
[   15.770180]  __kmalloc_cache_noprof+0x189/0x420
[   15.770352]  kasan_atomics+0x95/0x310
[   15.771014]  kunit_try_run_case+0x1a5/0x480
[   15.771429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.771698]  kthread+0x337/0x6f0
[   15.772172]  ret_from_fork+0x116/0x1d0
[   15.772663]  ret_from_fork_asm+0x1a/0x30
[   15.773212] 
[   15.773497] The buggy address belongs to the object at ffff888103a28200
[   15.773497]  which belongs to the cache kmalloc-64 of size 64
[   15.774089] The buggy address is located 0 bytes to the right of
[   15.774089]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.774474] 
[   15.774653] The buggy address belongs to the physical page:
[   15.775413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.776229] flags: 0x200000000000000(node=0|zone=2)
[   15.776792] page_type: f5(slab)
[   15.777194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.777972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.778352] page dumped because: kasan: bad access detected
[   15.778928] 
[   15.779091] Memory state around the buggy address:
[   15.779523]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.779853]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.780550] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.780784]                                      ^
[   15.780940]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781158]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781384] ==================================================================
[   15.350276] ==================================================================
[   15.350940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.351464] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.351934] 
[   15.352055] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.352103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.352115] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.352135] Call Trace:
[   15.352151]  <TASK>
[   15.352165]  dump_stack_lvl+0x73/0xb0
[   15.352195]  print_report+0xd1/0x610
[   15.352217]  ? __virt_addr_valid+0x1db/0x2d0
[   15.352240]  ? kasan_atomics_helper+0x1148/0x5450
[   15.352262]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.352286]  ? kasan_atomics_helper+0x1148/0x5450
[   15.352308]  kasan_report+0x141/0x180
[   15.352344]  ? kasan_atomics_helper+0x1148/0x5450
[   15.352372]  kasan_check_range+0x10c/0x1c0
[   15.352397]  __kasan_check_write+0x18/0x20
[   15.352417]  kasan_atomics_helper+0x1148/0x5450
[   15.352441]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.352464]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.352489]  ? trace_hardirqs_on+0x37/0xe0
[   15.352511]  ? kasan_atomics+0x152/0x310
[   15.352539]  kasan_atomics+0x1dc/0x310
[   15.352561]  ? __pfx_kasan_atomics+0x10/0x10
[   15.352585]  ? __pfx_kasan_atomics+0x10/0x10
[   15.352613]  kunit_try_run_case+0x1a5/0x480
[   15.352637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.352660]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.352685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.352709]  ? __kthread_parkme+0x82/0x180
[   15.352730]  ? preempt_count_sub+0x50/0x80
[   15.352755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.352779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.352806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.352831]  kthread+0x337/0x6f0
[   15.352851]  ? trace_preempt_on+0x20/0xc0
[   15.352874]  ? __pfx_kthread+0x10/0x10
[   15.352894]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.352916]  ? calculate_sigpending+0x7b/0xa0
[   15.352941]  ? __pfx_kthread+0x10/0x10
[   15.352970]  ret_from_fork+0x116/0x1d0
[   15.352989]  ? __pfx_kthread+0x10/0x10
[   15.353011]  ret_from_fork_asm+0x1a/0x30
[   15.353042]  </TASK>
[   15.353052] 
[   15.363656] Allocated by task 284:
[   15.363847]  kasan_save_stack+0x45/0x70
[   15.364167]  kasan_save_track+0x18/0x40
[   15.364351]  kasan_save_alloc_info+0x3b/0x50
[   15.364787]  __kasan_kmalloc+0xb7/0xc0
[   15.364982]  __kmalloc_cache_noprof+0x189/0x420
[   15.365169]  kasan_atomics+0x95/0x310
[   15.365502]  kunit_try_run_case+0x1a5/0x480
[   15.365824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.366169]  kthread+0x337/0x6f0
[   15.366494]  ret_from_fork+0x116/0x1d0
[   15.366677]  ret_from_fork_asm+0x1a/0x30
[   15.366881] 
[   15.366968] The buggy address belongs to the object at ffff888103a28200
[   15.366968]  which belongs to the cache kmalloc-64 of size 64
[   15.367480] The buggy address is located 0 bytes to the right of
[   15.367480]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.367975] 
[   15.368061] The buggy address belongs to the physical page:
[   15.368298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.369067] flags: 0x200000000000000(node=0|zone=2)
[   15.369414] page_type: f5(slab)
[   15.369629] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.370102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.370512] page dumped because: kasan: bad access detected
[   15.370858] 
[   15.370940] Memory state around the buggy address:
[   15.371306]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.371813]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.372183] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.372623]                                      ^
[   15.372861]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.373170]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.373731] ==================================================================
[   15.183662] ==================================================================
[   15.183978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.185259] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.185697] 
[   15.185805] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.185851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.185863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.185885] Call Trace:
[   15.185900]  <TASK>
[   15.185916]  dump_stack_lvl+0x73/0xb0
[   15.185946]  print_report+0xd1/0x610
[   15.185968]  ? __virt_addr_valid+0x1db/0x2d0
[   15.185991]  ? kasan_atomics_helper+0xde0/0x5450
[   15.186013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.186037]  ? kasan_atomics_helper+0xde0/0x5450
[   15.186059]  kasan_report+0x141/0x180
[   15.186081]  ? kasan_atomics_helper+0xde0/0x5450
[   15.186108]  kasan_check_range+0x10c/0x1c0
[   15.186132]  __kasan_check_write+0x18/0x20
[   15.186152]  kasan_atomics_helper+0xde0/0x5450
[   15.186175]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.186198]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.186223]  ? trace_hardirqs_on+0x37/0xe0
[   15.186245]  ? kasan_atomics+0x152/0x310
[   15.186272]  kasan_atomics+0x1dc/0x310
[   15.186295]  ? __pfx_kasan_atomics+0x10/0x10
[   15.186329]  ? __pfx_kasan_atomics+0x10/0x10
[   15.186357]  kunit_try_run_case+0x1a5/0x480
[   15.186382]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.186406]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.186431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.186480]  ? __kthread_parkme+0x82/0x180
[   15.186501]  ? preempt_count_sub+0x50/0x80
[   15.186539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.186577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.186619]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.186645]  kthread+0x337/0x6f0
[   15.186664]  ? trace_preempt_on+0x20/0xc0
[   15.186687]  ? __pfx_kthread+0x10/0x10
[   15.186708]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.186731]  ? calculate_sigpending+0x7b/0xa0
[   15.186756]  ? __pfx_kthread+0x10/0x10
[   15.186777]  ret_from_fork+0x116/0x1d0
[   15.186797]  ? __pfx_kthread+0x10/0x10
[   15.186817]  ret_from_fork_asm+0x1a/0x30
[   15.186849]  </TASK>
[   15.186859] 
[   15.197368] Allocated by task 284:
[   15.197848]  kasan_save_stack+0x45/0x70
[   15.198049]  kasan_save_track+0x18/0x40
[   15.198291]  kasan_save_alloc_info+0x3b/0x50
[   15.198662]  __kasan_kmalloc+0xb7/0xc0
[   15.198952]  __kmalloc_cache_noprof+0x189/0x420
[   15.199183]  kasan_atomics+0x95/0x310
[   15.199396]  kunit_try_run_case+0x1a5/0x480
[   15.199764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.200123]  kthread+0x337/0x6f0
[   15.200381]  ret_from_fork+0x116/0x1d0
[   15.200702]  ret_from_fork_asm+0x1a/0x30
[   15.200916] 
[   15.201145] The buggy address belongs to the object at ffff888103a28200
[   15.201145]  which belongs to the cache kmalloc-64 of size 64
[   15.201819] The buggy address is located 0 bytes to the right of
[   15.201819]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.202508] 
[   15.202616] The buggy address belongs to the physical page:
[   15.202894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.203332] flags: 0x200000000000000(node=0|zone=2)
[   15.203821] page_type: f5(slab)
[   15.203989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.204386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.204883] page dumped because: kasan: bad access detected
[   15.205168] 
[   15.205384] Memory state around the buggy address:
[   15.205745]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.206050]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.206491] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.206868]                                      ^
[   15.207201]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.207640]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.208048] ==================================================================
[   16.138255] ==================================================================
[   16.138656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.138990] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   16.139335] 
[   16.139424] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.139468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.139481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.139531] Call Trace:
[   16.139548]  <TASK>
[   16.139564]  dump_stack_lvl+0x73/0xb0
[   16.139592]  print_report+0xd1/0x610
[   16.139626]  ? __virt_addr_valid+0x1db/0x2d0
[   16.139648]  ? kasan_atomics_helper+0x224c/0x5450
[   16.139671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.139703]  ? kasan_atomics_helper+0x224c/0x5450
[   16.139725]  kasan_report+0x141/0x180
[   16.139747]  ? kasan_atomics_helper+0x224c/0x5450
[   16.139785]  kasan_check_range+0x10c/0x1c0
[   16.139809]  __kasan_check_write+0x18/0x20
[   16.139829]  kasan_atomics_helper+0x224c/0x5450
[   16.139852]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.139875]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.139899]  ? trace_hardirqs_on+0x37/0xe0
[   16.139931]  ? kasan_atomics+0x152/0x310
[   16.139957]  kasan_atomics+0x1dc/0x310
[   16.139980]  ? __pfx_kasan_atomics+0x10/0x10
[   16.140015]  ? __pfx_kasan_atomics+0x10/0x10
[   16.140042]  kunit_try_run_case+0x1a5/0x480
[   16.140067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.140089]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.140123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.140149]  ? __kthread_parkme+0x82/0x180
[   16.140179]  ? preempt_count_sub+0x50/0x80
[   16.140203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.140228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.140253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.140278]  kthread+0x337/0x6f0
[   16.140297]  ? trace_preempt_on+0x20/0xc0
[   16.140328]  ? __pfx_kthread+0x10/0x10
[   16.140349]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.140371]  ? calculate_sigpending+0x7b/0xa0
[   16.140404]  ? __pfx_kthread+0x10/0x10
[   16.140426]  ret_from_fork+0x116/0x1d0
[   16.140445]  ? __pfx_kthread+0x10/0x10
[   16.140475]  ret_from_fork_asm+0x1a/0x30
[   16.140523]  </TASK>
[   16.140533] 
[   16.147921] Allocated by task 284:
[   16.148102]  kasan_save_stack+0x45/0x70
[   16.148292]  kasan_save_track+0x18/0x40
[   16.148499]  kasan_save_alloc_info+0x3b/0x50
[   16.148711]  __kasan_kmalloc+0xb7/0xc0
[   16.148898]  __kmalloc_cache_noprof+0x189/0x420
[   16.149135]  kasan_atomics+0x95/0x310
[   16.149406]  kunit_try_run_case+0x1a5/0x480
[   16.149666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.149888]  kthread+0x337/0x6f0
[   16.150012]  ret_from_fork+0x116/0x1d0
[   16.150144]  ret_from_fork_asm+0x1a/0x30
[   16.150284] 
[   16.150365] The buggy address belongs to the object at ffff888103a28200
[   16.150365]  which belongs to the cache kmalloc-64 of size 64
[   16.150784] The buggy address is located 0 bytes to the right of
[   16.150784]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   16.151415] 
[   16.151538] The buggy address belongs to the physical page:
[   16.151794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   16.152158] flags: 0x200000000000000(node=0|zone=2)
[   16.152360] page_type: f5(slab)
[   16.152504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.152892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.153264] page dumped because: kasan: bad access detected
[   16.153550] 
[   16.153622] Memory state around the buggy address:
[   16.153780]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.153999]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.154217] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.154535]                                      ^
[   16.154762]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.155083]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.155407] ==================================================================
[   15.302573] ==================================================================
[   15.302828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.303594] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.304056] 
[   15.304338] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.304389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.304401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.304422] Call Trace:
[   15.304439]  <TASK>
[   15.304453]  dump_stack_lvl+0x73/0xb0
[   15.304483]  print_report+0xd1/0x610
[   15.304519]  ? __virt_addr_valid+0x1db/0x2d0
[   15.304540]  ? kasan_atomics_helper+0x1079/0x5450
[   15.304562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.304586]  ? kasan_atomics_helper+0x1079/0x5450
[   15.304608]  kasan_report+0x141/0x180
[   15.304630]  ? kasan_atomics_helper+0x1079/0x5450
[   15.304658]  kasan_check_range+0x10c/0x1c0
[   15.304682]  __kasan_check_write+0x18/0x20
[   15.304701]  kasan_atomics_helper+0x1079/0x5450
[   15.304725]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.304748]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.304772]  ? trace_hardirqs_on+0x37/0xe0
[   15.304794]  ? kasan_atomics+0x152/0x310
[   15.304821]  kasan_atomics+0x1dc/0x310
[   15.304844]  ? __pfx_kasan_atomics+0x10/0x10
[   15.304869]  ? __pfx_kasan_atomics+0x10/0x10
[   15.304897]  kunit_try_run_case+0x1a5/0x480
[   15.304921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.304944]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.304974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.304999]  ? __kthread_parkme+0x82/0x180
[   15.305019]  ? preempt_count_sub+0x50/0x80
[   15.305044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.305069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.305093]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.305118]  kthread+0x337/0x6f0
[   15.305138]  ? trace_preempt_on+0x20/0xc0
[   15.305161]  ? __pfx_kthread+0x10/0x10
[   15.305182]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.305204]  ? calculate_sigpending+0x7b/0xa0
[   15.305229]  ? __pfx_kthread+0x10/0x10
[   15.305251]  ret_from_fork+0x116/0x1d0
[   15.305270]  ? __pfx_kthread+0x10/0x10
[   15.305290]  ret_from_fork_asm+0x1a/0x30
[   15.305332]  </TASK>
[   15.305343] 
[   15.315436] Allocated by task 284:
[   15.315609]  kasan_save_stack+0x45/0x70
[   15.316245]  kasan_save_track+0x18/0x40
[   15.316494]  kasan_save_alloc_info+0x3b/0x50
[   15.316782]  __kasan_kmalloc+0xb7/0xc0
[   15.317063]  __kmalloc_cache_noprof+0x189/0x420
[   15.317392]  kasan_atomics+0x95/0x310
[   15.317598]  kunit_try_run_case+0x1a5/0x480
[   15.317886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.318101]  kthread+0x337/0x6f0
[   15.318274]  ret_from_fork+0x116/0x1d0
[   15.318471]  ret_from_fork_asm+0x1a/0x30
[   15.318881] 
[   15.318986] The buggy address belongs to the object at ffff888103a28200
[   15.318986]  which belongs to the cache kmalloc-64 of size 64
[   15.319600] The buggy address is located 0 bytes to the right of
[   15.319600]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.320183] 
[   15.320273] The buggy address belongs to the physical page:
[   15.320761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.321092] flags: 0x200000000000000(node=0|zone=2)
[   15.321420] page_type: f5(slab)
[   15.321646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.322109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.322577] page dumped because: kasan: bad access detected
[   15.322922] 
[   15.323022] Memory state around the buggy address:
[   15.323381]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.323816]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.324216] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.324693]                                      ^
[   15.324992]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.325382]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.325827] ==================================================================
[   14.925759] ==================================================================
[   14.926329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.926882] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.927331] 
[   14.927481] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.927537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.927549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.927570] Call Trace:
[   14.927612]  <TASK>
[   14.927628]  dump_stack_lvl+0x73/0xb0
[   14.927658]  print_report+0xd1/0x610
[   14.927692]  ? __virt_addr_valid+0x1db/0x2d0
[   14.927714]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.927737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.927761]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.927802]  kasan_report+0x141/0x180
[   14.927834]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.927861]  kasan_check_range+0x10c/0x1c0
[   14.927895]  __kasan_check_write+0x18/0x20
[   14.927916]  kasan_atomics_helper+0x7c7/0x5450
[   14.927939]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.927988]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.928013]  ? trace_hardirqs_on+0x37/0xe0
[   14.928076]  ? kasan_atomics+0x152/0x310
[   14.928104]  kasan_atomics+0x1dc/0x310
[   14.928128]  ? __pfx_kasan_atomics+0x10/0x10
[   14.928270]  ? __pfx_kasan_atomics+0x10/0x10
[   14.928298]  kunit_try_run_case+0x1a5/0x480
[   14.928336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.928360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.928385]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.928410]  ? __kthread_parkme+0x82/0x180
[   14.928431]  ? preempt_count_sub+0x50/0x80
[   14.928456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.928481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.928543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.928569]  kthread+0x337/0x6f0
[   14.928588]  ? trace_preempt_on+0x20/0xc0
[   14.928622]  ? __pfx_kthread+0x10/0x10
[   14.928644]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.928681]  ? calculate_sigpending+0x7b/0xa0
[   14.928706]  ? __pfx_kthread+0x10/0x10
[   14.928737]  ret_from_fork+0x116/0x1d0
[   14.928757]  ? __pfx_kthread+0x10/0x10
[   14.928778]  ret_from_fork_asm+0x1a/0x30
[   14.928819]  </TASK>
[   14.928830] 
[   14.938785] Allocated by task 284:
[   14.938960]  kasan_save_stack+0x45/0x70
[   14.939408]  kasan_save_track+0x18/0x40
[   14.939729]  kasan_save_alloc_info+0x3b/0x50
[   14.939951]  __kasan_kmalloc+0xb7/0xc0
[   14.940232]  __kmalloc_cache_noprof+0x189/0x420
[   14.940675]  kasan_atomics+0x95/0x310
[   14.940887]  kunit_try_run_case+0x1a5/0x480
[   14.941137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.941621]  kthread+0x337/0x6f0
[   14.941828]  ret_from_fork+0x116/0x1d0
[   14.942028]  ret_from_fork_asm+0x1a/0x30
[   14.942534] 
[   14.942659] The buggy address belongs to the object at ffff888103a28200
[   14.942659]  which belongs to the cache kmalloc-64 of size 64
[   14.943197] The buggy address is located 0 bytes to the right of
[   14.943197]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.943740] 
[   14.943826] The buggy address belongs to the physical page:
[   14.944001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.944571] flags: 0x200000000000000(node=0|zone=2)
[   14.944797] page_type: f5(slab)
[   14.945012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.945482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.945879] page dumped because: kasan: bad access detected
[   14.946153] 
[   14.946385] Memory state around the buggy address:
[   14.946639]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.946977]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.947473] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.947824]                                      ^
[   14.948062]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.948477]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.948844] ==================================================================
[   16.073810] ==================================================================
[   16.074165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.074607] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   16.074892] 
[   16.075003] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.075078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.075090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.075132] Call Trace:
[   16.075147]  <TASK>
[   16.075160]  dump_stack_lvl+0x73/0xb0
[   16.075187]  print_report+0xd1/0x610
[   16.075210]  ? __virt_addr_valid+0x1db/0x2d0
[   16.075232]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.075254]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.075278]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.075300]  kasan_report+0x141/0x180
[   16.075331]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.075358]  __asan_report_load8_noabort+0x18/0x20
[   16.075383]  kasan_atomics_helper+0x4fb2/0x5450
[   16.075406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.075458]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.075532]  ? trace_hardirqs_on+0x37/0xe0
[   16.075556]  ? kasan_atomics+0x152/0x310
[   16.075583]  kasan_atomics+0x1dc/0x310
[   16.075618]  ? __pfx_kasan_atomics+0x10/0x10
[   16.075642]  ? __pfx_kasan_atomics+0x10/0x10
[   16.075669]  kunit_try_run_case+0x1a5/0x480
[   16.075694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.075746]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.075771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.075796]  ? __kthread_parkme+0x82/0x180
[   16.075827]  ? preempt_count_sub+0x50/0x80
[   16.075852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.075876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.075901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.075925]  kthread+0x337/0x6f0
[   16.075973]  ? trace_preempt_on+0x20/0xc0
[   16.075995]  ? __pfx_kthread+0x10/0x10
[   16.076016]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.076049]  ? calculate_sigpending+0x7b/0xa0
[   16.076074]  ? __pfx_kthread+0x10/0x10
[   16.076095]  ret_from_fork+0x116/0x1d0
[   16.076114]  ? __pfx_kthread+0x10/0x10
[   16.076134]  ret_from_fork_asm+0x1a/0x30
[   16.076164]  </TASK>
[   16.076175] 
[   16.083861] Allocated by task 284:
[   16.084037]  kasan_save_stack+0x45/0x70
[   16.084233]  kasan_save_track+0x18/0x40
[   16.084433]  kasan_save_alloc_info+0x3b/0x50
[   16.084645]  __kasan_kmalloc+0xb7/0xc0
[   16.084818]  __kmalloc_cache_noprof+0x189/0x420
[   16.085047]  kasan_atomics+0x95/0x310
[   16.085222]  kunit_try_run_case+0x1a5/0x480
[   16.085415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.085656]  kthread+0x337/0x6f0
[   16.085821]  ret_from_fork+0x116/0x1d0
[   16.085988]  ret_from_fork_asm+0x1a/0x30
[   16.086162] 
[   16.086259] The buggy address belongs to the object at ffff888103a28200
[   16.086259]  which belongs to the cache kmalloc-64 of size 64
[   16.086776] The buggy address is located 0 bytes to the right of
[   16.086776]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   16.087207] 
[   16.087303] The buggy address belongs to the physical page:
[   16.087628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   16.087950] flags: 0x200000000000000(node=0|zone=2)
[   16.088112] page_type: f5(slab)
[   16.088278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.088664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.089001] page dumped because: kasan: bad access detected
[   16.089300] 
[   16.089411] Memory state around the buggy address:
[   16.089665]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.089887]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.090103] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.090426]                                      ^
[   16.090720]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.091047]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.091455] ==================================================================
[   15.398337] ==================================================================
[   15.399339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.399837] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.400222] 
[   15.400573] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.400623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.400637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.400659] Call Trace:
[   15.400674]  <TASK>
[   15.400688]  dump_stack_lvl+0x73/0xb0
[   15.400717]  print_report+0xd1/0x610
[   15.400739]  ? __virt_addr_valid+0x1db/0x2d0
[   15.400763]  ? kasan_atomics_helper+0x1217/0x5450
[   15.400785]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.400809]  ? kasan_atomics_helper+0x1217/0x5450
[   15.400831]  kasan_report+0x141/0x180
[   15.400853]  ? kasan_atomics_helper+0x1217/0x5450
[   15.400880]  kasan_check_range+0x10c/0x1c0
[   15.400904]  __kasan_check_write+0x18/0x20
[   15.400925]  kasan_atomics_helper+0x1217/0x5450
[   15.400948]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.400978]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.401002]  ? trace_hardirqs_on+0x37/0xe0
[   15.401024]  ? kasan_atomics+0x152/0x310
[   15.401052]  kasan_atomics+0x1dc/0x310
[   15.401075]  ? __pfx_kasan_atomics+0x10/0x10
[   15.401098]  ? __pfx_kasan_atomics+0x10/0x10
[   15.401125]  kunit_try_run_case+0x1a5/0x480
[   15.401149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.401172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.401196]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.401221]  ? __kthread_parkme+0x82/0x180
[   15.401242]  ? preempt_count_sub+0x50/0x80
[   15.401266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.401291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.401325]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.401351]  kthread+0x337/0x6f0
[   15.401372]  ? trace_preempt_on+0x20/0xc0
[   15.401394]  ? __pfx_kthread+0x10/0x10
[   15.401415]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.401436]  ? calculate_sigpending+0x7b/0xa0
[   15.401461]  ? __pfx_kthread+0x10/0x10
[   15.401482]  ret_from_fork+0x116/0x1d0
[   15.401511]  ? __pfx_kthread+0x10/0x10
[   15.401531]  ret_from_fork_asm+0x1a/0x30
[   15.401562]  </TASK>
[   15.401573] 
[   15.411932] Allocated by task 284:
[   15.412245]  kasan_save_stack+0x45/0x70
[   15.412482]  kasan_save_track+0x18/0x40
[   15.412817]  kasan_save_alloc_info+0x3b/0x50
[   15.412993]  __kasan_kmalloc+0xb7/0xc0
[   15.413332]  __kmalloc_cache_noprof+0x189/0x420
[   15.413669]  kasan_atomics+0x95/0x310
[   15.413850]  kunit_try_run_case+0x1a5/0x480
[   15.414057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.414300]  kthread+0x337/0x6f0
[   15.414476]  ret_from_fork+0x116/0x1d0
[   15.414949]  ret_from_fork_asm+0x1a/0x30
[   15.415125] 
[   15.415385] The buggy address belongs to the object at ffff888103a28200
[   15.415385]  which belongs to the cache kmalloc-64 of size 64
[   15.416136] The buggy address is located 0 bytes to the right of
[   15.416136]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.416941] 
[   15.417035] The buggy address belongs to the physical page:
[   15.417429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.417970] flags: 0x200000000000000(node=0|zone=2)
[   15.418295] page_type: f5(slab)
[   15.418474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.418803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.419123] page dumped because: kasan: bad access detected
[   15.419380] 
[   15.419466] Memory state around the buggy address:
[   15.419982]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.420365]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.420821] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.421175]                                      ^
[   15.421379]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.421839]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.422218] ==================================================================
[   15.422889] ==================================================================
[   15.423711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.424108] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.424630] 
[   15.424834] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.424883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.424897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.424918] Call Trace:
[   15.424935]  <TASK>
[   15.424950]  dump_stack_lvl+0x73/0xb0
[   15.425083]  print_report+0xd1/0x610
[   15.425108]  ? __virt_addr_valid+0x1db/0x2d0
[   15.425132]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.425154]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.425177]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.425200]  kasan_report+0x141/0x180
[   15.425222]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.425249]  __asan_report_load4_noabort+0x18/0x20
[   15.425274]  kasan_atomics_helper+0x49e8/0x5450
[   15.425297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.425334]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.425359]  ? trace_hardirqs_on+0x37/0xe0
[   15.425381]  ? kasan_atomics+0x152/0x310
[   15.425408]  kasan_atomics+0x1dc/0x310
[   15.425431]  ? __pfx_kasan_atomics+0x10/0x10
[   15.425455]  ? __pfx_kasan_atomics+0x10/0x10
[   15.425483]  kunit_try_run_case+0x1a5/0x480
[   15.425517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.425540]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.425564]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.425589]  ? __kthread_parkme+0x82/0x180
[   15.425612]  ? preempt_count_sub+0x50/0x80
[   15.425637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.425661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.425686]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.425711]  kthread+0x337/0x6f0
[   15.425731]  ? trace_preempt_on+0x20/0xc0
[   15.425753]  ? __pfx_kthread+0x10/0x10
[   15.425774]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.425797]  ? calculate_sigpending+0x7b/0xa0
[   15.425821]  ? __pfx_kthread+0x10/0x10
[   15.425842]  ret_from_fork+0x116/0x1d0
[   15.425861]  ? __pfx_kthread+0x10/0x10
[   15.425883]  ret_from_fork_asm+0x1a/0x30
[   15.425914]  </TASK>
[   15.425925] 
[   15.436051] Allocated by task 284:
[   15.436353]  kasan_save_stack+0x45/0x70
[   15.436657]  kasan_save_track+0x18/0x40
[   15.436938]  kasan_save_alloc_info+0x3b/0x50
[   15.437252]  __kasan_kmalloc+0xb7/0xc0
[   15.437458]  __kmalloc_cache_noprof+0x189/0x420
[   15.437790]  kasan_atomics+0x95/0x310
[   15.438049]  kunit_try_run_case+0x1a5/0x480
[   15.438215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.438617]  kthread+0x337/0x6f0
[   15.438876]  ret_from_fork+0x116/0x1d0
[   15.439127]  ret_from_fork_asm+0x1a/0x30
[   15.439289] 
[   15.439425] The buggy address belongs to the object at ffff888103a28200
[   15.439425]  which belongs to the cache kmalloc-64 of size 64
[   15.440212] The buggy address is located 0 bytes to the right of
[   15.440212]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.441000] 
[   15.441093] The buggy address belongs to the physical page:
[   15.441326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.441951] flags: 0x200000000000000(node=0|zone=2)
[   15.442188] page_type: f5(slab)
[   15.442445] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.442873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.443264] page dumped because: kasan: bad access detected
[   15.443645] 
[   15.443749] Memory state around the buggy address:
[   15.444078]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.444391]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.444851] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.445253]                                      ^
[   15.445511]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.445872]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.446252] ==================================================================
[   15.278131] ==================================================================
[   15.278862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.279201] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.279702] 
[   15.279959] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.280008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.280022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.280043] Call Trace:
[   15.280060]  <TASK>
[   15.280075]  dump_stack_lvl+0x73/0xb0
[   15.280105]  print_report+0xd1/0x610
[   15.280129]  ? __virt_addr_valid+0x1db/0x2d0
[   15.280152]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.280174]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.280198]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.280220]  kasan_report+0x141/0x180
[   15.280242]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.280270]  __asan_report_load4_noabort+0x18/0x20
[   15.280295]  kasan_atomics_helper+0x4a36/0x5450
[   15.280332]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.280356]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.280380]  ? trace_hardirqs_on+0x37/0xe0
[   15.280403]  ? kasan_atomics+0x152/0x310
[   15.280430]  kasan_atomics+0x1dc/0x310
[   15.280453]  ? __pfx_kasan_atomics+0x10/0x10
[   15.280477]  ? __pfx_kasan_atomics+0x10/0x10
[   15.280646]  kunit_try_run_case+0x1a5/0x480
[   15.280672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.280696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.280722]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.280746]  ? __kthread_parkme+0x82/0x180
[   15.280767]  ? preempt_count_sub+0x50/0x80
[   15.280791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.280816]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.280841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.280866]  kthread+0x337/0x6f0
[   15.280887]  ? trace_preempt_on+0x20/0xc0
[   15.280909]  ? __pfx_kthread+0x10/0x10
[   15.280931]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.280953]  ? calculate_sigpending+0x7b/0xa0
[   15.280987]  ? __pfx_kthread+0x10/0x10
[   15.281009]  ret_from_fork+0x116/0x1d0
[   15.281029]  ? __pfx_kthread+0x10/0x10
[   15.281051]  ret_from_fork_asm+0x1a/0x30
[   15.281082]  </TASK>
[   15.281093] 
[   15.291246] Allocated by task 284:
[   15.291693]  kasan_save_stack+0x45/0x70
[   15.291979]  kasan_save_track+0x18/0x40
[   15.292291]  kasan_save_alloc_info+0x3b/0x50
[   15.292571]  __kasan_kmalloc+0xb7/0xc0
[   15.292731]  __kmalloc_cache_noprof+0x189/0x420
[   15.293086]  kasan_atomics+0x95/0x310
[   15.293280]  kunit_try_run_case+0x1a5/0x480
[   15.293686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.293935]  kthread+0x337/0x6f0
[   15.294200]  ret_from_fork+0x116/0x1d0
[   15.294365]  ret_from_fork_asm+0x1a/0x30
[   15.294835] 
[   15.294915] The buggy address belongs to the object at ffff888103a28200
[   15.294915]  which belongs to the cache kmalloc-64 of size 64
[   15.295490] The buggy address is located 0 bytes to the right of
[   15.295490]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.296254] 
[   15.296347] The buggy address belongs to the physical page:
[   15.296893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.297352] flags: 0x200000000000000(node=0|zone=2)
[   15.297718] page_type: f5(slab)
[   15.298036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.298391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.298841] page dumped because: kasan: bad access detected
[   15.299163] 
[   15.299255] Memory state around the buggy address:
[   15.299567]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.299886]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.300194] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.300774]                                      ^
[   15.301000]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.301392]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.301843] ==================================================================
[   16.111585] ==================================================================
[   16.111927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.112357] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   16.113008] 
[   16.113096] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.113139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.113153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.113173] Call Trace:
[   16.113188]  <TASK>
[   16.113202]  dump_stack_lvl+0x73/0xb0
[   16.113229]  print_report+0xd1/0x610
[   16.113252]  ? __virt_addr_valid+0x1db/0x2d0
[   16.113274]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.113296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.113331]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.113354]  kasan_report+0x141/0x180
[   16.113376]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.113403]  __asan_report_load8_noabort+0x18/0x20
[   16.113428]  kasan_atomics_helper+0x4fa5/0x5450
[   16.113452]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.113474]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.113525]  ? trace_hardirqs_on+0x37/0xe0
[   16.113548]  ? kasan_atomics+0x152/0x310
[   16.113576]  kasan_atomics+0x1dc/0x310
[   16.113632]  ? __pfx_kasan_atomics+0x10/0x10
[   16.113657]  ? __pfx_kasan_atomics+0x10/0x10
[   16.113707]  kunit_try_run_case+0x1a5/0x480
[   16.113731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.113754]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.113780]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.113804]  ? __kthread_parkme+0x82/0x180
[   16.113825]  ? preempt_count_sub+0x50/0x80
[   16.113849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.113874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.113899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.113923]  kthread+0x337/0x6f0
[   16.113943]  ? trace_preempt_on+0x20/0xc0
[   16.113966]  ? __pfx_kthread+0x10/0x10
[   16.113987]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.114009]  ? calculate_sigpending+0x7b/0xa0
[   16.114033]  ? __pfx_kthread+0x10/0x10
[   16.114055]  ret_from_fork+0x116/0x1d0
[   16.114074]  ? __pfx_kthread+0x10/0x10
[   16.114094]  ret_from_fork_asm+0x1a/0x30
[   16.114125]  </TASK>
[   16.114134] 
[   16.127951] Allocated by task 284:
[   16.128092]  kasan_save_stack+0x45/0x70
[   16.128241]  kasan_save_track+0x18/0x40
[   16.128468]  kasan_save_alloc_info+0x3b/0x50
[   16.128882]  __kasan_kmalloc+0xb7/0xc0
[   16.129233]  __kmalloc_cache_noprof+0x189/0x420
[   16.129693]  kasan_atomics+0x95/0x310
[   16.130031]  kunit_try_run_case+0x1a5/0x480
[   16.130440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.130945]  kthread+0x337/0x6f0
[   16.131260]  ret_from_fork+0x116/0x1d0
[   16.131646]  ret_from_fork_asm+0x1a/0x30
[   16.131908] 
[   16.132083] The buggy address belongs to the object at ffff888103a28200
[   16.132083]  which belongs to the cache kmalloc-64 of size 64
[   16.132768] The buggy address is located 0 bytes to the right of
[   16.132768]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   16.133800] 
[   16.133875] The buggy address belongs to the physical page:
[   16.134049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   16.134291] flags: 0x200000000000000(node=0|zone=2)
[   16.134515] page_type: f5(slab)
[   16.134693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.135007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.135294] page dumped because: kasan: bad access detected
[   16.135595] 
[   16.135683] Memory state around the buggy address:
[   16.135868]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.136175]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.136506] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.136784]                                      ^
[   16.136993]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.137224]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.137575] ==================================================================
[   15.138755] ==================================================================
[   15.139103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.139446] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.139792] 
[   15.139899] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.139943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.139955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.139977] Call Trace:
[   15.139990]  <TASK>
[   15.140004]  dump_stack_lvl+0x73/0xb0
[   15.140052]  print_report+0xd1/0x610
[   15.140075]  ? __virt_addr_valid+0x1db/0x2d0
[   15.140098]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.140120]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.140162]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.140185]  kasan_report+0x141/0x180
[   15.140207]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.140235]  __asan_report_load4_noabort+0x18/0x20
[   15.140260]  kasan_atomics_helper+0x4a84/0x5450
[   15.140284]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.140307]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.140362]  ? trace_hardirqs_on+0x37/0xe0
[   15.140398]  ? kasan_atomics+0x152/0x310
[   15.140438]  kasan_atomics+0x1dc/0x310
[   15.140461]  ? __pfx_kasan_atomics+0x10/0x10
[   15.140485]  ? __pfx_kasan_atomics+0x10/0x10
[   15.140522]  kunit_try_run_case+0x1a5/0x480
[   15.140547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.140569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.140594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.140618]  ? __kthread_parkme+0x82/0x180
[   15.140639]  ? preempt_count_sub+0x50/0x80
[   15.140663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.140687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.140711]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.140736]  kthread+0x337/0x6f0
[   15.140756]  ? trace_preempt_on+0x20/0xc0
[   15.140778]  ? __pfx_kthread+0x10/0x10
[   15.140816]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.140838]  ? calculate_sigpending+0x7b/0xa0
[   15.140862]  ? __pfx_kthread+0x10/0x10
[   15.140883]  ret_from_fork+0x116/0x1d0
[   15.140903]  ? __pfx_kthread+0x10/0x10
[   15.140923]  ret_from_fork_asm+0x1a/0x30
[   15.140955]  </TASK>
[   15.140973] 
[   15.148729] Allocated by task 284:
[   15.148857]  kasan_save_stack+0x45/0x70
[   15.149073]  kasan_save_track+0x18/0x40
[   15.149260]  kasan_save_alloc_info+0x3b/0x50
[   15.149480]  __kasan_kmalloc+0xb7/0xc0
[   15.149692]  __kmalloc_cache_noprof+0x189/0x420
[   15.149914]  kasan_atomics+0x95/0x310
[   15.150095]  kunit_try_run_case+0x1a5/0x480
[   15.150286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.150531]  kthread+0x337/0x6f0
[   15.150690]  ret_from_fork+0x116/0x1d0
[   15.150902]  ret_from_fork_asm+0x1a/0x30
[   15.151114] 
[   15.151198] The buggy address belongs to the object at ffff888103a28200
[   15.151198]  which belongs to the cache kmalloc-64 of size 64
[   15.151698] The buggy address is located 0 bytes to the right of
[   15.151698]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.152168] 
[   15.152279] The buggy address belongs to the physical page:
[   15.153001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.153762] flags: 0x200000000000000(node=0|zone=2)
[   15.154176] page_type: f5(slab)
[   15.154472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.155182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.155799] page dumped because: kasan: bad access detected
[   15.156225] 
[   15.156423] Memory state around the buggy address:
[   15.156617]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.156831]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.157061] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.157267]                                      ^
[   15.157459]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.157765]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.158066] ==================================================================
[   15.008545] ==================================================================
[   15.008868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.009344] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.010015] 
[   15.010160] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.010206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.010220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.010242] Call Trace:
[   15.010259]  <TASK>
[   15.010274]  dump_stack_lvl+0x73/0xb0
[   15.010304]  print_report+0xd1/0x610
[   15.010340]  ? __virt_addr_valid+0x1db/0x2d0
[   15.010363]  ? kasan_atomics_helper+0x992/0x5450
[   15.010385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.010409]  ? kasan_atomics_helper+0x992/0x5450
[   15.010433]  kasan_report+0x141/0x180
[   15.010456]  ? kasan_atomics_helper+0x992/0x5450
[   15.010483]  kasan_check_range+0x10c/0x1c0
[   15.010506]  __kasan_check_write+0x18/0x20
[   15.010526]  kasan_atomics_helper+0x992/0x5450
[   15.010548]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.010571]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.010596]  ? trace_hardirqs_on+0x37/0xe0
[   15.010619]  ? kasan_atomics+0x152/0x310
[   15.010646]  kasan_atomics+0x1dc/0x310
[   15.010670]  ? __pfx_kasan_atomics+0x10/0x10
[   15.010694]  ? __pfx_kasan_atomics+0x10/0x10
[   15.010825]  kunit_try_run_case+0x1a5/0x480
[   15.010853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.010877]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.010902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.010926]  ? __kthread_parkme+0x82/0x180
[   15.010947]  ? preempt_count_sub+0x50/0x80
[   15.010972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.010997]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.011255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.011285]  kthread+0x337/0x6f0
[   15.011318]  ? trace_preempt_on+0x20/0xc0
[   15.011341]  ? __pfx_kthread+0x10/0x10
[   15.011363]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.011385]  ? calculate_sigpending+0x7b/0xa0
[   15.011410]  ? __pfx_kthread+0x10/0x10
[   15.011431]  ret_from_fork+0x116/0x1d0
[   15.011451]  ? __pfx_kthread+0x10/0x10
[   15.011472]  ret_from_fork_asm+0x1a/0x30
[   15.011503]  </TASK>
[   15.011514] 
[   15.023157] Allocated by task 284:
[   15.023810]  kasan_save_stack+0x45/0x70
[   15.023972]  kasan_save_track+0x18/0x40
[   15.024422]  kasan_save_alloc_info+0x3b/0x50
[   15.024827]  __kasan_kmalloc+0xb7/0xc0
[   15.025164]  __kmalloc_cache_noprof+0x189/0x420
[   15.025364]  kasan_atomics+0x95/0x310
[   15.025878]  kunit_try_run_case+0x1a5/0x480
[   15.026144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.026655]  kthread+0x337/0x6f0
[   15.026821]  ret_from_fork+0x116/0x1d0
[   15.027457]  ret_from_fork_asm+0x1a/0x30
[   15.027788] 
[   15.027893] The buggy address belongs to the object at ffff888103a28200
[   15.027893]  which belongs to the cache kmalloc-64 of size 64
[   15.028532] The buggy address is located 0 bytes to the right of
[   15.028532]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.029637] 
[   15.029746] The buggy address belongs to the physical page:
[   15.030251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.030603] flags: 0x200000000000000(node=0|zone=2)
[   15.030947] page_type: f5(slab)
[   15.031085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.031434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.032204] page dumped because: kasan: bad access detected
[   15.032622] 
[   15.032711] Memory state around the buggy address:
[   15.032915]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.033630]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.034123] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.034390]                                      ^
[   15.034817]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.035290]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.035992] ==================================================================
[   14.976705] ==================================================================
[   14.977690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.978105] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.979324] 
[   14.979443] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.979489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.979502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.979523] Call Trace:
[   14.979538]  <TASK>
[   14.979553]  dump_stack_lvl+0x73/0xb0
[   14.979706]  print_report+0xd1/0x610
[   14.979729]  ? __virt_addr_valid+0x1db/0x2d0
[   14.979753]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.979775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.979798]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.979821]  kasan_report+0x141/0x180
[   14.979843]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.979870]  kasan_check_range+0x10c/0x1c0
[   14.979894]  __kasan_check_write+0x18/0x20
[   14.979914]  kasan_atomics_helper+0x8f9/0x5450
[   14.979938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.979961]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.979986]  ? trace_hardirqs_on+0x37/0xe0
[   14.980009]  ? kasan_atomics+0x152/0x310
[   14.980036]  kasan_atomics+0x1dc/0x310
[   14.980059]  ? __pfx_kasan_atomics+0x10/0x10
[   14.980084]  ? __pfx_kasan_atomics+0x10/0x10
[   14.980111]  kunit_try_run_case+0x1a5/0x480
[   14.980135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.980158]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.980183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.980207]  ? __kthread_parkme+0x82/0x180
[   14.980228]  ? preempt_count_sub+0x50/0x80
[   14.980252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.980277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.980302]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.980337]  kthread+0x337/0x6f0
[   14.980357]  ? trace_preempt_on+0x20/0xc0
[   14.980379]  ? __pfx_kthread+0x10/0x10
[   14.980400]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.980422]  ? calculate_sigpending+0x7b/0xa0
[   14.980446]  ? __pfx_kthread+0x10/0x10
[   14.980469]  ret_from_fork+0x116/0x1d0
[   14.980544]  ? __pfx_kthread+0x10/0x10
[   14.980567]  ret_from_fork_asm+0x1a/0x30
[   14.980599]  </TASK>
[   14.980610] 
[   14.994447] Allocated by task 284:
[   14.994797]  kasan_save_stack+0x45/0x70
[   14.995195]  kasan_save_track+0x18/0x40
[   14.995523]  kasan_save_alloc_info+0x3b/0x50
[   14.995787]  __kasan_kmalloc+0xb7/0xc0
[   14.996175]  __kmalloc_cache_noprof+0x189/0x420
[   14.996436]  kasan_atomics+0x95/0x310
[   14.996898]  kunit_try_run_case+0x1a5/0x480
[   14.997413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.997878]  kthread+0x337/0x6f0
[   14.998203]  ret_from_fork+0x116/0x1d0
[   14.998659]  ret_from_fork_asm+0x1a/0x30
[   14.998871] 
[   14.998967] The buggy address belongs to the object at ffff888103a28200
[   14.998967]  which belongs to the cache kmalloc-64 of size 64
[   14.999950] The buggy address is located 0 bytes to the right of
[   14.999950]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.000847] 
[   15.000955] The buggy address belongs to the physical page:
[   15.001678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.002241] flags: 0x200000000000000(node=0|zone=2)
[   15.002610] page_type: f5(slab)
[   15.002797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.003350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.003865] page dumped because: kasan: bad access detected
[   15.004366] 
[   15.004595] Memory state around the buggy address:
[   15.004812]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.005663]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.006238] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.006672]                                      ^
[   15.006939]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.007348]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.007796] ==================================================================
[   15.036649] ==================================================================
[   15.036962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.037594] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.038151] 
[   15.038267] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.038324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.038337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.038359] Call Trace:
[   15.038375]  <TASK>
[   15.038391]  dump_stack_lvl+0x73/0xb0
[   15.038421]  print_report+0xd1/0x610
[   15.038549]  ? __virt_addr_valid+0x1db/0x2d0
[   15.038573]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.038595]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.038619]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.038641]  kasan_report+0x141/0x180
[   15.038664]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.038690]  kasan_check_range+0x10c/0x1c0
[   15.038714]  __kasan_check_write+0x18/0x20
[   15.038734]  kasan_atomics_helper+0xa2b/0x5450
[   15.038758]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.038781]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.038805]  ? trace_hardirqs_on+0x37/0xe0
[   15.038828]  ? kasan_atomics+0x152/0x310
[   15.038855]  kasan_atomics+0x1dc/0x310
[   15.038878]  ? __pfx_kasan_atomics+0x10/0x10
[   15.038902]  ? __pfx_kasan_atomics+0x10/0x10
[   15.038929]  kunit_try_run_case+0x1a5/0x480
[   15.038953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.038976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.039001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.039227]  ? __kthread_parkme+0x82/0x180
[   15.039249]  ? preempt_count_sub+0x50/0x80
[   15.039274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.039299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.039340]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.039366]  kthread+0x337/0x6f0
[   15.039386]  ? trace_preempt_on+0x20/0xc0
[   15.039409]  ? __pfx_kthread+0x10/0x10
[   15.039430]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.039452]  ? calculate_sigpending+0x7b/0xa0
[   15.039477]  ? __pfx_kthread+0x10/0x10
[   15.039499]  ret_from_fork+0x116/0x1d0
[   15.039518]  ? __pfx_kthread+0x10/0x10
[   15.039539]  ret_from_fork_asm+0x1a/0x30
[   15.039570]  </TASK>
[   15.039581] 
[   15.052040] Allocated by task 284:
[   15.052514]  kasan_save_stack+0x45/0x70
[   15.052810]  kasan_save_track+0x18/0x40
[   15.053188]  kasan_save_alloc_info+0x3b/0x50
[   15.053514]  __kasan_kmalloc+0xb7/0xc0
[   15.053694]  __kmalloc_cache_noprof+0x189/0x420
[   15.054121]  kasan_atomics+0x95/0x310
[   15.054417]  kunit_try_run_case+0x1a5/0x480
[   15.054667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.054915]  kthread+0x337/0x6f0
[   15.055451]  ret_from_fork+0x116/0x1d0
[   15.055657]  ret_from_fork_asm+0x1a/0x30
[   15.055803] 
[   15.056120] The buggy address belongs to the object at ffff888103a28200
[   15.056120]  which belongs to the cache kmalloc-64 of size 64
[   15.056888] The buggy address is located 0 bytes to the right of
[   15.056888]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.057701] 
[   15.057804] The buggy address belongs to the physical page:
[   15.058130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.058703] flags: 0x200000000000000(node=0|zone=2)
[   15.058945] page_type: f5(slab)
[   15.059252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.059922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.060435] page dumped because: kasan: bad access detected
[   15.060828] 
[   15.061005] Memory state around the buggy address:
[   15.061200]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.061816]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.062441] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.062729]                                      ^
[   15.063279]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.063748]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.064111] ==================================================================
[   15.630955] ==================================================================
[   15.631307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.631592] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.631821] 
[   15.631926] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.631971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.631983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.632004] Call Trace:
[   15.632020]  <TASK>
[   15.632036]  dump_stack_lvl+0x73/0xb0
[   15.632063]  print_report+0xd1/0x610
[   15.632085]  ? __virt_addr_valid+0x1db/0x2d0
[   15.632108]  ? kasan_atomics_helper+0x164f/0x5450
[   15.632131]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.632155]  ? kasan_atomics_helper+0x164f/0x5450
[   15.632178]  kasan_report+0x141/0x180
[   15.632201]  ? kasan_atomics_helper+0x164f/0x5450
[   15.632228]  kasan_check_range+0x10c/0x1c0
[   15.632253]  __kasan_check_write+0x18/0x20
[   15.632274]  kasan_atomics_helper+0x164f/0x5450
[   15.632297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.632331]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.632357]  ? trace_hardirqs_on+0x37/0xe0
[   15.632381]  ? kasan_atomics+0x152/0x310
[   15.632409]  kasan_atomics+0x1dc/0x310
[   15.632433]  ? __pfx_kasan_atomics+0x10/0x10
[   15.632458]  ? __pfx_kasan_atomics+0x10/0x10
[   15.632504]  kunit_try_run_case+0x1a5/0x480
[   15.632530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.632553]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.632578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.632603]  ? __kthread_parkme+0x82/0x180
[   15.632624]  ? preempt_count_sub+0x50/0x80
[   15.632649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.632674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.632699]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.632724]  kthread+0x337/0x6f0
[   15.632746]  ? trace_preempt_on+0x20/0xc0
[   15.632769]  ? __pfx_kthread+0x10/0x10
[   15.632791]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.632814]  ? calculate_sigpending+0x7b/0xa0
[   15.632838]  ? __pfx_kthread+0x10/0x10
[   15.632861]  ret_from_fork+0x116/0x1d0
[   15.632881]  ? __pfx_kthread+0x10/0x10
[   15.632902]  ret_from_fork_asm+0x1a/0x30
[   15.632934]  </TASK>
[   15.632945] 
[   15.640412] Allocated by task 284:
[   15.640585]  kasan_save_stack+0x45/0x70
[   15.640788]  kasan_save_track+0x18/0x40
[   15.640947]  kasan_save_alloc_info+0x3b/0x50
[   15.641156]  __kasan_kmalloc+0xb7/0xc0
[   15.641311]  __kmalloc_cache_noprof+0x189/0x420
[   15.641565]  kasan_atomics+0x95/0x310
[   15.641741]  kunit_try_run_case+0x1a5/0x480
[   15.641889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.642067]  kthread+0x337/0x6f0
[   15.642189]  ret_from_fork+0x116/0x1d0
[   15.642333]  ret_from_fork_asm+0x1a/0x30
[   15.642561] 
[   15.642655] The buggy address belongs to the object at ffff888103a28200
[   15.642655]  which belongs to the cache kmalloc-64 of size 64
[   15.643178] The buggy address is located 0 bytes to the right of
[   15.643178]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.643747] 
[   15.643819] The buggy address belongs to the physical page:
[   15.643995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.644308] flags: 0x200000000000000(node=0|zone=2)
[   15.644576] page_type: f5(slab)
[   15.644757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.645113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.645447] page dumped because: kasan: bad access detected
[   15.645695] 
[   15.645789] Memory state around the buggy address:
[   15.645961]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.646251]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.646578] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.646831]                                      ^
[   15.646988]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.647206]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.647435] ==================================================================
[   15.064855] ==================================================================
[   15.065104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.065872] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.066569] 
[   15.066669] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.066724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.066738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.066759] Call Trace:
[   15.066773]  <TASK>
[   15.066788]  dump_stack_lvl+0x73/0xb0
[   15.066823]  print_report+0xd1/0x610
[   15.066845]  ? __virt_addr_valid+0x1db/0x2d0
[   15.066869]  ? kasan_atomics_helper+0xac7/0x5450
[   15.066890]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.066914]  ? kasan_atomics_helper+0xac7/0x5450
[   15.066936]  kasan_report+0x141/0x180
[   15.066958]  ? kasan_atomics_helper+0xac7/0x5450
[   15.066985]  kasan_check_range+0x10c/0x1c0
[   15.067009]  __kasan_check_write+0x18/0x20
[   15.067346]  kasan_atomics_helper+0xac7/0x5450
[   15.067372]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.067395]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.067420]  ? trace_hardirqs_on+0x37/0xe0
[   15.067443]  ? kasan_atomics+0x152/0x310
[   15.067469]  kasan_atomics+0x1dc/0x310
[   15.067493]  ? __pfx_kasan_atomics+0x10/0x10
[   15.067516]  ? __pfx_kasan_atomics+0x10/0x10
[   15.067543]  kunit_try_run_case+0x1a5/0x480
[   15.067567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.067591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.067615]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.067639]  ? __kthread_parkme+0x82/0x180
[   15.067659]  ? preempt_count_sub+0x50/0x80
[   15.067683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.067708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.067733]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.067760]  kthread+0x337/0x6f0
[   15.067781]  ? trace_preempt_on+0x20/0xc0
[   15.067804]  ? __pfx_kthread+0x10/0x10
[   15.067826]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.067847]  ? calculate_sigpending+0x7b/0xa0
[   15.067873]  ? __pfx_kthread+0x10/0x10
[   15.067894]  ret_from_fork+0x116/0x1d0
[   15.067913]  ? __pfx_kthread+0x10/0x10
[   15.067934]  ret_from_fork_asm+0x1a/0x30
[   15.067965]  </TASK>
[   15.067976] 
[   15.080378] Allocated by task 284:
[   15.080801]  kasan_save_stack+0x45/0x70
[   15.081230]  kasan_save_track+0x18/0x40
[   15.081433]  kasan_save_alloc_info+0x3b/0x50
[   15.081744]  __kasan_kmalloc+0xb7/0xc0
[   15.081931]  __kmalloc_cache_noprof+0x189/0x420
[   15.082385]  kasan_atomics+0x95/0x310
[   15.082739]  kunit_try_run_case+0x1a5/0x480
[   15.083132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.083513]  kthread+0x337/0x6f0
[   15.083647]  ret_from_fork+0x116/0x1d0
[   15.083995]  ret_from_fork_asm+0x1a/0x30
[   15.084399] 
[   15.084477] The buggy address belongs to the object at ffff888103a28200
[   15.084477]  which belongs to the cache kmalloc-64 of size 64
[   15.085031] The buggy address is located 0 bytes to the right of
[   15.085031]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.086041] 
[   15.086172] The buggy address belongs to the physical page:
[   15.086439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.086987] flags: 0x200000000000000(node=0|zone=2)
[   15.087423] page_type: f5(slab)
[   15.087627] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.087918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.088431] page dumped because: kasan: bad access detected
[   15.088641] 
[   15.088849] Memory state around the buggy address:
[   15.089263]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.089702]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.090122] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.090397]                                      ^
[   15.090780]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.091189]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.091500] ==================================================================
[   16.034681] ==================================================================
[   16.035246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.035645] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   16.035994] 
[   16.036082] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.036127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.036141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.036162] Call Trace:
[   16.036176]  <TASK>
[   16.036191]  dump_stack_lvl+0x73/0xb0
[   16.036218]  print_report+0xd1/0x610
[   16.036241]  ? __virt_addr_valid+0x1db/0x2d0
[   16.036264]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.036335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.036359]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.036382]  kasan_report+0x141/0x180
[   16.036432]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.036459]  __asan_report_load8_noabort+0x18/0x20
[   16.036513]  kasan_atomics_helper+0x4f98/0x5450
[   16.036537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.036560]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.036584]  ? trace_hardirqs_on+0x37/0xe0
[   16.036607]  ? kasan_atomics+0x152/0x310
[   16.036635]  kasan_atomics+0x1dc/0x310
[   16.036658]  ? __pfx_kasan_atomics+0x10/0x10
[   16.036710]  ? __pfx_kasan_atomics+0x10/0x10
[   16.036738]  kunit_try_run_case+0x1a5/0x480
[   16.036773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.036822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.036846]  ? __kthread_parkme+0x82/0x180
[   16.036866]  ? preempt_count_sub+0x50/0x80
[   16.036891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.036915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.036940]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.037007]  kthread+0x337/0x6f0
[   16.037064]  ? trace_preempt_on+0x20/0xc0
[   16.037087]  ? __pfx_kthread+0x10/0x10
[   16.037107]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.037141]  ? calculate_sigpending+0x7b/0xa0
[   16.037166]  ? __pfx_kthread+0x10/0x10
[   16.037187]  ret_from_fork+0x116/0x1d0
[   16.037207]  ? __pfx_kthread+0x10/0x10
[   16.037229]  ret_from_fork_asm+0x1a/0x30
[   16.037263]  </TASK>
[   16.037274] 
[   16.044880] Allocated by task 284:
[   16.045117]  kasan_save_stack+0x45/0x70
[   16.045377]  kasan_save_track+0x18/0x40
[   16.045667]  kasan_save_alloc_info+0x3b/0x50
[   16.045871]  __kasan_kmalloc+0xb7/0xc0
[   16.046005]  __kmalloc_cache_noprof+0x189/0x420
[   16.046197]  kasan_atomics+0x95/0x310
[   16.046395]  kunit_try_run_case+0x1a5/0x480
[   16.046717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.047091]  kthread+0x337/0x6f0
[   16.047262]  ret_from_fork+0x116/0x1d0
[   16.047500]  ret_from_fork_asm+0x1a/0x30
[   16.047644] 
[   16.047741] The buggy address belongs to the object at ffff888103a28200
[   16.047741]  which belongs to the cache kmalloc-64 of size 64
[   16.048301] The buggy address is located 0 bytes to the right of
[   16.048301]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   16.048876] 
[   16.049026] The buggy address belongs to the physical page:
[   16.049260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   16.049758] flags: 0x200000000000000(node=0|zone=2)
[   16.049968] page_type: f5(slab)
[   16.050182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.050588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.050846] page dumped because: kasan: bad access detected
[   16.051096] 
[   16.051234] Memory state around the buggy address:
[   16.051450]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.051728]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.052080] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.052507]                                      ^
[   16.052720]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.052980]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.053354] ==================================================================
[   15.158616] ==================================================================
[   15.159695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.160596] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.160903] 
[   15.161001] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.161044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.161058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.161079] Call Trace:
[   15.161095]  <TASK>
[   15.161109]  dump_stack_lvl+0x73/0xb0
[   15.161137]  print_report+0xd1/0x610
[   15.161158]  ? __virt_addr_valid+0x1db/0x2d0
[   15.161182]  ? kasan_atomics_helper+0xd47/0x5450
[   15.161205]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.161228]  ? kasan_atomics_helper+0xd47/0x5450
[   15.161251]  kasan_report+0x141/0x180
[   15.161274]  ? kasan_atomics_helper+0xd47/0x5450
[   15.161301]  kasan_check_range+0x10c/0x1c0
[   15.161341]  __kasan_check_write+0x18/0x20
[   15.161361]  kasan_atomics_helper+0xd47/0x5450
[   15.161385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.161408]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.161433]  ? trace_hardirqs_on+0x37/0xe0
[   15.161455]  ? kasan_atomics+0x152/0x310
[   15.161482]  kasan_atomics+0x1dc/0x310
[   15.161505]  ? __pfx_kasan_atomics+0x10/0x10
[   15.161530]  ? __pfx_kasan_atomics+0x10/0x10
[   15.161557]  kunit_try_run_case+0x1a5/0x480
[   15.161581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.161605]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.161630]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.161654]  ? __kthread_parkme+0x82/0x180
[   15.161699]  ? preempt_count_sub+0x50/0x80
[   15.161724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.161748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.161773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.161798]  kthread+0x337/0x6f0
[   15.161819]  ? trace_preempt_on+0x20/0xc0
[   15.161841]  ? __pfx_kthread+0x10/0x10
[   15.161863]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.161885]  ? calculate_sigpending+0x7b/0xa0
[   15.161908]  ? __pfx_kthread+0x10/0x10
[   15.161930]  ret_from_fork+0x116/0x1d0
[   15.161949]  ? __pfx_kthread+0x10/0x10
[   15.161969]  ret_from_fork_asm+0x1a/0x30
[   15.162000]  </TASK>
[   15.162010] 
[   15.170924] Allocated by task 284:
[   15.171111]  kasan_save_stack+0x45/0x70
[   15.171290]  kasan_save_track+0x18/0x40
[   15.171473]  kasan_save_alloc_info+0x3b/0x50
[   15.172081]  __kasan_kmalloc+0xb7/0xc0
[   15.172221]  __kmalloc_cache_noprof+0x189/0x420
[   15.172413]  kasan_atomics+0x95/0x310
[   15.173018]  kunit_try_run_case+0x1a5/0x480
[   15.173299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.173735]  kthread+0x337/0x6f0
[   15.174041]  ret_from_fork+0x116/0x1d0
[   15.174221]  ret_from_fork_asm+0x1a/0x30
[   15.174414] 
[   15.174757] The buggy address belongs to the object at ffff888103a28200
[   15.174757]  which belongs to the cache kmalloc-64 of size 64
[   15.175211] The buggy address is located 0 bytes to the right of
[   15.175211]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.176357] 
[   15.176624] The buggy address belongs to the physical page:
[   15.176932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.177582] flags: 0x200000000000000(node=0|zone=2)
[   15.177968] page_type: f5(slab)
[   15.178275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.178883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.179307] page dumped because: kasan: bad access detected
[   15.179866] 
[   15.180121] Memory state around the buggy address:
[   15.180350]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.180925]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.181413] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.182040]                                      ^
[   15.182341]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.182851]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.183148] ==================================================================
[   15.326325] ==================================================================
[   15.326694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.327494] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.327928] 
[   15.328350] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.328402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.328415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.328436] Call Trace:
[   15.328452]  <TASK>
[   15.328467]  dump_stack_lvl+0x73/0xb0
[   15.328510]  print_report+0xd1/0x610
[   15.328533]  ? __virt_addr_valid+0x1db/0x2d0
[   15.328556]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.328578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.328601]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.328624]  kasan_report+0x141/0x180
[   15.328648]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.328675]  __asan_report_load4_noabort+0x18/0x20
[   15.328699]  kasan_atomics_helper+0x4a1c/0x5450
[   15.328723]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.328747]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.328772]  ? trace_hardirqs_on+0x37/0xe0
[   15.328795]  ? kasan_atomics+0x152/0x310
[   15.328822]  kasan_atomics+0x1dc/0x310
[   15.328844]  ? __pfx_kasan_atomics+0x10/0x10
[   15.328869]  ? __pfx_kasan_atomics+0x10/0x10
[   15.328896]  kunit_try_run_case+0x1a5/0x480
[   15.328920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.328944]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.328976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.329001]  ? __kthread_parkme+0x82/0x180
[   15.329022]  ? preempt_count_sub+0x50/0x80
[   15.329047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.329071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.329096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.329122]  kthread+0x337/0x6f0
[   15.329141]  ? trace_preempt_on+0x20/0xc0
[   15.329165]  ? __pfx_kthread+0x10/0x10
[   15.329186]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.329208]  ? calculate_sigpending+0x7b/0xa0
[   15.329232]  ? __pfx_kthread+0x10/0x10
[   15.329254]  ret_from_fork+0x116/0x1d0
[   15.329273]  ? __pfx_kthread+0x10/0x10
[   15.329294]  ret_from_fork_asm+0x1a/0x30
[   15.329337]  </TASK>
[   15.329347] 
[   15.339408] Allocated by task 284:
[   15.339624]  kasan_save_stack+0x45/0x70
[   15.339966]  kasan_save_track+0x18/0x40
[   15.340238]  kasan_save_alloc_info+0x3b/0x50
[   15.340523]  __kasan_kmalloc+0xb7/0xc0
[   15.340773]  __kmalloc_cache_noprof+0x189/0x420
[   15.341101]  kasan_atomics+0x95/0x310
[   15.341376]  kunit_try_run_case+0x1a5/0x480
[   15.341663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.342000]  kthread+0x337/0x6f0
[   15.342157]  ret_from_fork+0x116/0x1d0
[   15.342439]  ret_from_fork_asm+0x1a/0x30
[   15.342621] 
[   15.342723] The buggy address belongs to the object at ffff888103a28200
[   15.342723]  which belongs to the cache kmalloc-64 of size 64
[   15.343296] The buggy address is located 0 bytes to the right of
[   15.343296]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.344060] 
[   15.344342] The buggy address belongs to the physical page:
[   15.344577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.345081] flags: 0x200000000000000(node=0|zone=2)
[   15.345304] page_type: f5(slab)
[   15.345469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.345792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.346125] page dumped because: kasan: bad access detected
[   15.346651] 
[   15.346747] Memory state around the buggy address:
[   15.346902]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.347388]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.347832] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.348195]                                      ^
[   15.348442]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.348993]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.349358] ==================================================================
[   15.613120] ==================================================================
[   15.613446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.613770] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.614017] 
[   15.614103] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.614149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.614161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.614183] Call Trace:
[   15.614197]  <TASK>
[   15.614212]  dump_stack_lvl+0x73/0xb0
[   15.614240]  print_report+0xd1/0x610
[   15.614263]  ? __virt_addr_valid+0x1db/0x2d0
[   15.614285]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.614307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.614342]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.614365]  kasan_report+0x141/0x180
[   15.614387]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.614414]  kasan_check_range+0x10c/0x1c0
[   15.614438]  __kasan_check_write+0x18/0x20
[   15.614458]  kasan_atomics_helper+0x15b6/0x5450
[   15.614502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.614527]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.614552]  ? trace_hardirqs_on+0x37/0xe0
[   15.614575]  ? kasan_atomics+0x152/0x310
[   15.614602]  kasan_atomics+0x1dc/0x310
[   15.614625]  ? __pfx_kasan_atomics+0x10/0x10
[   15.614649]  ? __pfx_kasan_atomics+0x10/0x10
[   15.614676]  kunit_try_run_case+0x1a5/0x480
[   15.614702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.614727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.614752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.614778]  ? __kthread_parkme+0x82/0x180
[   15.614799]  ? preempt_count_sub+0x50/0x80
[   15.614824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.614849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.614875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.614901]  kthread+0x337/0x6f0
[   15.614921]  ? trace_preempt_on+0x20/0xc0
[   15.614945]  ? __pfx_kthread+0x10/0x10
[   15.614968]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.614990]  ? calculate_sigpending+0x7b/0xa0
[   15.615016]  ? __pfx_kthread+0x10/0x10
[   15.615038]  ret_from_fork+0x116/0x1d0
[   15.615060]  ? __pfx_kthread+0x10/0x10
[   15.615081]  ret_from_fork_asm+0x1a/0x30
[   15.615113]  </TASK>
[   15.615123] 
[   15.622553] Allocated by task 284:
[   15.622697]  kasan_save_stack+0x45/0x70
[   15.622843]  kasan_save_track+0x18/0x40
[   15.622981]  kasan_save_alloc_info+0x3b/0x50
[   15.623150]  __kasan_kmalloc+0xb7/0xc0
[   15.623348]  __kmalloc_cache_noprof+0x189/0x420
[   15.623596]  kasan_atomics+0x95/0x310
[   15.623786]  kunit_try_run_case+0x1a5/0x480
[   15.623992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.624242]  kthread+0x337/0x6f0
[   15.624423]  ret_from_fork+0x116/0x1d0
[   15.624637]  ret_from_fork_asm+0x1a/0x30
[   15.624833] 
[   15.624928] The buggy address belongs to the object at ffff888103a28200
[   15.624928]  which belongs to the cache kmalloc-64 of size 64
[   15.625361] The buggy address is located 0 bytes to the right of
[   15.625361]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.625823] 
[   15.625922] The buggy address belongs to the physical page:
[   15.626175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.626565] flags: 0x200000000000000(node=0|zone=2)
[   15.626807] page_type: f5(slab)
[   15.626973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.627343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.627681] page dumped because: kasan: bad access detected
[   15.627912] 
[   15.628009] Memory state around the buggy address:
[   15.628197]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.628425]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.628775] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.629097]                                      ^
[   15.629258]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.629590]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.629902] ==================================================================
[   15.716878] ==================================================================
[   15.717228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.717890] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.718152] 
[   15.718264] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.718307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.718332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.718353] Call Trace:
[   15.718369]  <TASK>
[   15.718384]  dump_stack_lvl+0x73/0xb0
[   15.718413]  print_report+0xd1/0x610
[   15.718435]  ? __virt_addr_valid+0x1db/0x2d0
[   15.718458]  ? kasan_atomics_helper+0x194a/0x5450
[   15.718501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.718526]  ? kasan_atomics_helper+0x194a/0x5450
[   15.718549]  kasan_report+0x141/0x180
[   15.718572]  ? kasan_atomics_helper+0x194a/0x5450
[   15.718598]  kasan_check_range+0x10c/0x1c0
[   15.718623]  __kasan_check_write+0x18/0x20
[   15.718643]  kasan_atomics_helper+0x194a/0x5450
[   15.718666]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.718689]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.718714]  ? trace_hardirqs_on+0x37/0xe0
[   15.718737]  ? kasan_atomics+0x152/0x310
[   15.718763]  kasan_atomics+0x1dc/0x310
[   15.718787]  ? __pfx_kasan_atomics+0x10/0x10
[   15.718810]  ? __pfx_kasan_atomics+0x10/0x10
[   15.718837]  kunit_try_run_case+0x1a5/0x480
[   15.718861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.718885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.718909]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.718933]  ? __kthread_parkme+0x82/0x180
[   15.718954]  ? preempt_count_sub+0x50/0x80
[   15.718978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.719002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.719027]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.719052]  kthread+0x337/0x6f0
[   15.719072]  ? trace_preempt_on+0x20/0xc0
[   15.719095]  ? __pfx_kthread+0x10/0x10
[   15.719116]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.719139]  ? calculate_sigpending+0x7b/0xa0
[   15.719163]  ? __pfx_kthread+0x10/0x10
[   15.719185]  ret_from_fork+0x116/0x1d0
[   15.719204]  ? __pfx_kthread+0x10/0x10
[   15.719225]  ret_from_fork_asm+0x1a/0x30
[   15.719255]  </TASK>
[   15.719267] 
[   15.726289] Allocated by task 284:
[   15.726472]  kasan_save_stack+0x45/0x70
[   15.726689]  kasan_save_track+0x18/0x40
[   15.726882]  kasan_save_alloc_info+0x3b/0x50
[   15.727092]  __kasan_kmalloc+0xb7/0xc0
[   15.727277]  __kmalloc_cache_noprof+0x189/0x420
[   15.727575]  kasan_atomics+0x95/0x310
[   15.727714]  kunit_try_run_case+0x1a5/0x480
[   15.727863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.728113]  kthread+0x337/0x6f0
[   15.728279]  ret_from_fork+0x116/0x1d0
[   15.728499]  ret_from_fork_asm+0x1a/0x30
[   15.728700] 
[   15.728799] The buggy address belongs to the object at ffff888103a28200
[   15.728799]  which belongs to the cache kmalloc-64 of size 64
[   15.729266] The buggy address is located 0 bytes to the right of
[   15.729266]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.729794] 
[   15.729895] The buggy address belongs to the physical page:
[   15.730112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.730412] flags: 0x200000000000000(node=0|zone=2)
[   15.730665] page_type: f5(slab)
[   15.730810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.731121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.731437] page dumped because: kasan: bad access detected
[   15.731678] 
[   15.731770] Memory state around the buggy address:
[   15.731961]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.732265]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.732576] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.732848]                                      ^
[   15.733044]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.733337]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.733649] ==================================================================
[   15.868620] ==================================================================
[   15.869669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.870303] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.870910] 
[   15.871008] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.871054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.871067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.871089] Call Trace:
[   15.871106]  <TASK>
[   15.871122]  dump_stack_lvl+0x73/0xb0
[   15.871152]  print_report+0xd1/0x610
[   15.871175]  ? __virt_addr_valid+0x1db/0x2d0
[   15.871198]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.871220]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.871243]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.871265]  kasan_report+0x141/0x180
[   15.871287]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.871314]  kasan_check_range+0x10c/0x1c0
[   15.871353]  __kasan_check_write+0x18/0x20
[   15.871373]  kasan_atomics_helper+0x1ce1/0x5450
[   15.871396]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.871531]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.871566]  ? trace_hardirqs_on+0x37/0xe0
[   15.871682]  ? kasan_atomics+0x152/0x310
[   15.871715]  kasan_atomics+0x1dc/0x310
[   15.871739]  ? __pfx_kasan_atomics+0x10/0x10
[   15.871764]  ? __pfx_kasan_atomics+0x10/0x10
[   15.871791]  kunit_try_run_case+0x1a5/0x480
[   15.871816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.871839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.871865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.871890]  ? __kthread_parkme+0x82/0x180
[   15.871911]  ? preempt_count_sub+0x50/0x80
[   15.871935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.871960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.871984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.872010]  kthread+0x337/0x6f0
[   15.872030]  ? trace_preempt_on+0x20/0xc0
[   15.872052]  ? __pfx_kthread+0x10/0x10
[   15.872073]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.872095]  ? calculate_sigpending+0x7b/0xa0
[   15.872120]  ? __pfx_kthread+0x10/0x10
[   15.872141]  ret_from_fork+0x116/0x1d0
[   15.872161]  ? __pfx_kthread+0x10/0x10
[   15.872181]  ret_from_fork_asm+0x1a/0x30
[   15.872213]  </TASK>
[   15.872224] 
[   15.883177] Allocated by task 284:
[   15.883621]  kasan_save_stack+0x45/0x70
[   15.883866]  kasan_save_track+0x18/0x40
[   15.884060]  kasan_save_alloc_info+0x3b/0x50
[   15.884265]  __kasan_kmalloc+0xb7/0xc0
[   15.884450]  __kmalloc_cache_noprof+0x189/0x420
[   15.884976]  kasan_atomics+0x95/0x310
[   15.885155]  kunit_try_run_case+0x1a5/0x480
[   15.885642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.885996]  kthread+0x337/0x6f0
[   15.886178]  ret_from_fork+0x116/0x1d0
[   15.886383]  ret_from_fork_asm+0x1a/0x30
[   15.886599] 
[   15.886706] The buggy address belongs to the object at ffff888103a28200
[   15.886706]  which belongs to the cache kmalloc-64 of size 64
[   15.887282] The buggy address is located 0 bytes to the right of
[   15.887282]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.888222] 
[   15.888332] The buggy address belongs to the physical page:
[   15.888825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.889294] flags: 0x200000000000000(node=0|zone=2)
[   15.889723] page_type: f5(slab)
[   15.890007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.890357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.890821] page dumped because: kasan: bad access detected
[   15.891230] 
[   15.891343] Memory state around the buggy address:
[   15.891852]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.892275]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.892735] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.893025]                                      ^
[   15.893242]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.893841]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.894135] ==================================================================
[   14.783548] ==================================================================
[   14.783953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.784418] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.785160] 
[   14.785449] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.785498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.785511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.785532] Call Trace:
[   14.785548]  <TASK>
[   14.785564]  dump_stack_lvl+0x73/0xb0
[   14.785594]  print_report+0xd1/0x610
[   14.785616]  ? __virt_addr_valid+0x1db/0x2d0
[   14.785638]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.785660]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.785683]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.785756]  kasan_report+0x141/0x180
[   14.785780]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.785821]  kasan_check_range+0x10c/0x1c0
[   14.785845]  __kasan_check_write+0x18/0x20
[   14.785865]  kasan_atomics_helper+0x4a0/0x5450
[   14.785889]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.785912]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.785936]  ? trace_hardirqs_on+0x37/0xe0
[   14.785959]  ? kasan_atomics+0x152/0x310
[   14.785987]  kasan_atomics+0x1dc/0x310
[   14.786010]  ? __pfx_kasan_atomics+0x10/0x10
[   14.786082]  ? __pfx_kasan_atomics+0x10/0x10
[   14.786109]  kunit_try_run_case+0x1a5/0x480
[   14.786134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.786157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.786184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.786207]  ? __kthread_parkme+0x82/0x180
[   14.786229]  ? preempt_count_sub+0x50/0x80
[   14.786254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.786278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.786314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.786338]  kthread+0x337/0x6f0
[   14.786359]  ? trace_preempt_on+0x20/0xc0
[   14.786381]  ? __pfx_kthread+0x10/0x10
[   14.786402]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.786425]  ? calculate_sigpending+0x7b/0xa0
[   14.786449]  ? __pfx_kthread+0x10/0x10
[   14.786471]  ret_from_fork+0x116/0x1d0
[   14.786502]  ? __pfx_kthread+0x10/0x10
[   14.786522]  ret_from_fork_asm+0x1a/0x30
[   14.786553]  </TASK>
[   14.786564] 
[   14.796286] Allocated by task 284:
[   14.796562]  kasan_save_stack+0x45/0x70
[   14.796913]  kasan_save_track+0x18/0x40
[   14.797119]  kasan_save_alloc_info+0x3b/0x50
[   14.797352]  __kasan_kmalloc+0xb7/0xc0
[   14.797650]  __kmalloc_cache_noprof+0x189/0x420
[   14.797878]  kasan_atomics+0x95/0x310
[   14.798233]  kunit_try_run_case+0x1a5/0x480
[   14.798429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.798608]  kthread+0x337/0x6f0
[   14.798731]  ret_from_fork+0x116/0x1d0
[   14.798924]  ret_from_fork_asm+0x1a/0x30
[   14.799271] 
[   14.799583] The buggy address belongs to the object at ffff888103a28200
[   14.799583]  which belongs to the cache kmalloc-64 of size 64
[   14.800281] The buggy address is located 0 bytes to the right of
[   14.800281]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.801179] 
[   14.801288] The buggy address belongs to the physical page:
[   14.801636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.801932] flags: 0x200000000000000(node=0|zone=2)
[   14.802364] page_type: f5(slab)
[   14.802615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.802957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.803657] page dumped because: kasan: bad access detected
[   14.803956] 
[   14.804233] Memory state around the buggy address:
[   14.804462]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.804948]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.805421] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.805812]                                      ^
[   14.805982]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.806506]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.807002] ==================================================================
[   14.733594] ==================================================================
[   14.733942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.734282] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.735141] 
[   14.735251] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.735297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.735319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.735342] Call Trace:
[   14.735394]  <TASK>
[   14.735409]  dump_stack_lvl+0x73/0xb0
[   14.735440]  print_report+0xd1/0x610
[   14.735493]  ? __virt_addr_valid+0x1db/0x2d0
[   14.735517]  ? kasan_atomics_helper+0x3df/0x5450
[   14.735539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.735563]  ? kasan_atomics_helper+0x3df/0x5450
[   14.735585]  kasan_report+0x141/0x180
[   14.735608]  ? kasan_atomics_helper+0x3df/0x5450
[   14.735634]  kasan_check_range+0x10c/0x1c0
[   14.735658]  __kasan_check_read+0x15/0x20
[   14.735677]  kasan_atomics_helper+0x3df/0x5450
[   14.735701]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.735723]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.735749]  ? trace_hardirqs_on+0x37/0xe0
[   14.735772]  ? kasan_atomics+0x152/0x310
[   14.735798]  kasan_atomics+0x1dc/0x310
[   14.735821]  ? __pfx_kasan_atomics+0x10/0x10
[   14.735845]  ? __pfx_kasan_atomics+0x10/0x10
[   14.735871]  kunit_try_run_case+0x1a5/0x480
[   14.735896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.735919]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.735942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.735967]  ? __kthread_parkme+0x82/0x180
[   14.735989]  ? preempt_count_sub+0x50/0x80
[   14.736199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.736226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.736252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.736277]  kthread+0x337/0x6f0
[   14.736297]  ? trace_preempt_on+0x20/0xc0
[   14.736336]  ? __pfx_kthread+0x10/0x10
[   14.736357]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.736380]  ? calculate_sigpending+0x7b/0xa0
[   14.736404]  ? __pfx_kthread+0x10/0x10
[   14.736426]  ret_from_fork+0x116/0x1d0
[   14.736445]  ? __pfx_kthread+0x10/0x10
[   14.736487]  ret_from_fork_asm+0x1a/0x30
[   14.736519]  </TASK>
[   14.736529] 
[   14.746759] Allocated by task 284:
[   14.746974]  kasan_save_stack+0x45/0x70
[   14.747326]  kasan_save_track+0x18/0x40
[   14.747618]  kasan_save_alloc_info+0x3b/0x50
[   14.747790]  __kasan_kmalloc+0xb7/0xc0
[   14.748294]  __kmalloc_cache_noprof+0x189/0x420
[   14.748529]  kasan_atomics+0x95/0x310
[   14.748836]  kunit_try_run_case+0x1a5/0x480
[   14.749169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.749430]  kthread+0x337/0x6f0
[   14.749661]  ret_from_fork+0x116/0x1d0
[   14.749849]  ret_from_fork_asm+0x1a/0x30
[   14.750219] 
[   14.750323] The buggy address belongs to the object at ffff888103a28200
[   14.750323]  which belongs to the cache kmalloc-64 of size 64
[   14.750821] The buggy address is located 0 bytes to the right of
[   14.750821]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.751282] 
[   14.751532] The buggy address belongs to the physical page:
[   14.751729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.752348] flags: 0x200000000000000(node=0|zone=2)
[   14.752618] page_type: f5(slab)
[   14.752784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.753292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.753717] page dumped because: kasan: bad access detected
[   14.753946] 
[   14.754146] Memory state around the buggy address:
[   14.754382]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.754804]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.755201] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.755552]                                      ^
[   14.755780]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.756423]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.756786] ==================================================================
[   16.054680] ==================================================================
[   16.054947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.055398] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   16.055804] 
[   16.055903] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.055948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.055960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.056014] Call Trace:
[   16.056031]  <TASK>
[   16.056046]  dump_stack_lvl+0x73/0xb0
[   16.056099]  print_report+0xd1/0x610
[   16.056120]  ? __virt_addr_valid+0x1db/0x2d0
[   16.056142]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.056164]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.056189]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.056212]  kasan_report+0x141/0x180
[   16.056234]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.056261]  kasan_check_range+0x10c/0x1c0
[   16.056313]  __kasan_check_write+0x18/0x20
[   16.056350]  kasan_atomics_helper+0x20c8/0x5450
[   16.056401]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.056424]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.056448]  ? trace_hardirqs_on+0x37/0xe0
[   16.056501]  ? kasan_atomics+0x152/0x310
[   16.056530]  kasan_atomics+0x1dc/0x310
[   16.056553]  ? __pfx_kasan_atomics+0x10/0x10
[   16.056577]  ? __pfx_kasan_atomics+0x10/0x10
[   16.056604]  kunit_try_run_case+0x1a5/0x480
[   16.056628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.056652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.056676]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.056700]  ? __kthread_parkme+0x82/0x180
[   16.056720]  ? preempt_count_sub+0x50/0x80
[   16.056745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.056769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.056794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.056819]  kthread+0x337/0x6f0
[   16.056838]  ? trace_preempt_on+0x20/0xc0
[   16.056861]  ? __pfx_kthread+0x10/0x10
[   16.056881]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.056903]  ? calculate_sigpending+0x7b/0xa0
[   16.056927]  ? __pfx_kthread+0x10/0x10
[   16.056948]  ret_from_fork+0x116/0x1d0
[   16.056966]  ? __pfx_kthread+0x10/0x10
[   16.056992]  ret_from_fork_asm+0x1a/0x30
[   16.057022]  </TASK>
[   16.057032] 
[   16.064994] Allocated by task 284:
[   16.065127]  kasan_save_stack+0x45/0x70
[   16.065342]  kasan_save_track+0x18/0x40
[   16.065602]  kasan_save_alloc_info+0x3b/0x50
[   16.065875]  __kasan_kmalloc+0xb7/0xc0
[   16.066098]  __kmalloc_cache_noprof+0x189/0x420
[   16.066333]  kasan_atomics+0x95/0x310
[   16.066555]  kunit_try_run_case+0x1a5/0x480
[   16.066705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.066956]  kthread+0x337/0x6f0
[   16.067175]  ret_from_fork+0x116/0x1d0
[   16.067422]  ret_from_fork_asm+0x1a/0x30
[   16.067749] 
[   16.067844] The buggy address belongs to the object at ffff888103a28200
[   16.067844]  which belongs to the cache kmalloc-64 of size 64
[   16.068302] The buggy address is located 0 bytes to the right of
[   16.068302]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   16.068930] 
[   16.069029] The buggy address belongs to the physical page:
[   16.069201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   16.069564] flags: 0x200000000000000(node=0|zone=2)
[   16.069798] page_type: f5(slab)
[   16.069965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.070301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.070711] page dumped because: kasan: bad access detected
[   16.070887] 
[   16.070955] Memory state around the buggy address:
[   16.071178]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.071564]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.071960] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.072215]                                      ^
[   16.072401]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.072791]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.073231] ==================================================================
[   15.374362] ==================================================================
[   15.375047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.375566] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.375955] 
[   15.376302] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.376365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.376378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.376399] Call Trace:
[   15.376415]  <TASK>
[   15.376431]  dump_stack_lvl+0x73/0xb0
[   15.376460]  print_report+0xd1/0x610
[   15.376482]  ? __virt_addr_valid+0x1db/0x2d0
[   15.376516]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.376537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.376561]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.376584]  kasan_report+0x141/0x180
[   15.376606]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.376632]  __asan_report_load4_noabort+0x18/0x20
[   15.376657]  kasan_atomics_helper+0x4a02/0x5450
[   15.376681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.376703]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.376728]  ? trace_hardirqs_on+0x37/0xe0
[   15.376750]  ? kasan_atomics+0x152/0x310
[   15.376777]  kasan_atomics+0x1dc/0x310
[   15.376799]  ? __pfx_kasan_atomics+0x10/0x10
[   15.376823]  ? __pfx_kasan_atomics+0x10/0x10
[   15.376851]  kunit_try_run_case+0x1a5/0x480
[   15.376874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.376897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.376923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.376947]  ? __kthread_parkme+0x82/0x180
[   15.376978]  ? preempt_count_sub+0x50/0x80
[   15.377003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.377027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.377052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.377077]  kthread+0x337/0x6f0
[   15.377096]  ? trace_preempt_on+0x20/0xc0
[   15.377119]  ? __pfx_kthread+0x10/0x10
[   15.377140]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.377162]  ? calculate_sigpending+0x7b/0xa0
[   15.377187]  ? __pfx_kthread+0x10/0x10
[   15.377209]  ret_from_fork+0x116/0x1d0
[   15.377228]  ? __pfx_kthread+0x10/0x10
[   15.377248]  ret_from_fork_asm+0x1a/0x30
[   15.377279]  </TASK>
[   15.377289] 
[   15.387435] Allocated by task 284:
[   15.387814]  kasan_save_stack+0x45/0x70
[   15.388124]  kasan_save_track+0x18/0x40
[   15.388328]  kasan_save_alloc_info+0x3b/0x50
[   15.388636]  __kasan_kmalloc+0xb7/0xc0
[   15.388815]  __kmalloc_cache_noprof+0x189/0x420
[   15.389035]  kasan_atomics+0x95/0x310
[   15.389215]  kunit_try_run_case+0x1a5/0x480
[   15.389415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.389928]  kthread+0x337/0x6f0
[   15.390094]  ret_from_fork+0x116/0x1d0
[   15.390236]  ret_from_fork_asm+0x1a/0x30
[   15.390657] 
[   15.390821] The buggy address belongs to the object at ffff888103a28200
[   15.390821]  which belongs to the cache kmalloc-64 of size 64
[   15.391466] The buggy address is located 0 bytes to the right of
[   15.391466]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.391991] 
[   15.392083] The buggy address belongs to the physical page:
[   15.392337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.392931] flags: 0x200000000000000(node=0|zone=2)
[   15.393278] page_type: f5(slab)
[   15.393474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.393916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.394299] page dumped because: kasan: bad access detected
[   15.394720] 
[   15.394821] Memory state around the buggy address:
[   15.395179]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.395654]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.396064] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.396472]                                      ^
[   15.396728]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.397028]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.397358] ==================================================================
[   15.699422] ==================================================================
[   15.699732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.699968] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.700210] 
[   15.700297] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.700350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.700362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.700383] Call Trace:
[   15.700397]  <TASK>
[   15.700410]  dump_stack_lvl+0x73/0xb0
[   15.700438]  print_report+0xd1/0x610
[   15.700460]  ? __virt_addr_valid+0x1db/0x2d0
[   15.700503]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.700526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.700549]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.700572]  kasan_report+0x141/0x180
[   15.700595]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.700622]  kasan_check_range+0x10c/0x1c0
[   15.700646]  __kasan_check_write+0x18/0x20
[   15.700666]  kasan_atomics_helper+0x18b1/0x5450
[   15.700690]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.700713]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.700737]  ? trace_hardirqs_on+0x37/0xe0
[   15.700759]  ? kasan_atomics+0x152/0x310
[   15.700786]  kasan_atomics+0x1dc/0x310
[   15.700809]  ? __pfx_kasan_atomics+0x10/0x10
[   15.700832]  ? __pfx_kasan_atomics+0x10/0x10
[   15.700859]  kunit_try_run_case+0x1a5/0x480
[   15.700883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.700907]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.700932]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.700956]  ? __kthread_parkme+0x82/0x180
[   15.700982]  ? preempt_count_sub+0x50/0x80
[   15.701006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.701030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.701055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.701080]  kthread+0x337/0x6f0
[   15.701101]  ? trace_preempt_on+0x20/0xc0
[   15.701123]  ? __pfx_kthread+0x10/0x10
[   15.701145]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.701167]  ? calculate_sigpending+0x7b/0xa0
[   15.701191]  ? __pfx_kthread+0x10/0x10
[   15.701213]  ret_from_fork+0x116/0x1d0
[   15.701233]  ? __pfx_kthread+0x10/0x10
[   15.701254]  ret_from_fork_asm+0x1a/0x30
[   15.701285]  </TASK>
[   15.701296] 
[   15.708874] Allocated by task 284:
[   15.709051]  kasan_save_stack+0x45/0x70
[   15.709254]  kasan_save_track+0x18/0x40
[   15.709403]  kasan_save_alloc_info+0x3b/0x50
[   15.709579]  __kasan_kmalloc+0xb7/0xc0
[   15.709714]  __kmalloc_cache_noprof+0x189/0x420
[   15.709871]  kasan_atomics+0x95/0x310
[   15.710004]  kunit_try_run_case+0x1a5/0x480
[   15.710212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.710495]  kthread+0x337/0x6f0
[   15.710662]  ret_from_fork+0x116/0x1d0
[   15.710847]  ret_from_fork_asm+0x1a/0x30
[   15.711040] 
[   15.711133] The buggy address belongs to the object at ffff888103a28200
[   15.711133]  which belongs to the cache kmalloc-64 of size 64
[   15.711690] The buggy address is located 0 bytes to the right of
[   15.711690]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.712170] 
[   15.712244] The buggy address belongs to the physical page:
[   15.712426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.712815] flags: 0x200000000000000(node=0|zone=2)
[   15.713062] page_type: f5(slab)
[   15.713229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.713609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.713903] page dumped because: kasan: bad access detected
[   15.714142] 
[   15.714223] Memory state around the buggy address:
[   15.714435]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.714753]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.715033] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.715304]                                      ^
[   15.715544]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.715812]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.716097] ==================================================================
[   14.949612] ==================================================================
[   14.950115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.950520] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.950877] 
[   14.950988] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.951033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.951045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.951152] Call Trace:
[   14.951183]  <TASK>
[   14.951199]  dump_stack_lvl+0x73/0xb0
[   14.951231]  print_report+0xd1/0x610
[   14.951284]  ? __virt_addr_valid+0x1db/0x2d0
[   14.951326]  ? kasan_atomics_helper+0x860/0x5450
[   14.951349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.951374]  ? kasan_atomics_helper+0x860/0x5450
[   14.951397]  kasan_report+0x141/0x180
[   14.951447]  ? kasan_atomics_helper+0x860/0x5450
[   14.951475]  kasan_check_range+0x10c/0x1c0
[   14.951511]  __kasan_check_write+0x18/0x20
[   14.951545]  kasan_atomics_helper+0x860/0x5450
[   14.951568]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.951609]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.951642]  ? trace_hardirqs_on+0x37/0xe0
[   14.951666]  ? kasan_atomics+0x152/0x310
[   14.951704]  kasan_atomics+0x1dc/0x310
[   14.951727]  ? __pfx_kasan_atomics+0x10/0x10
[   14.951752]  ? __pfx_kasan_atomics+0x10/0x10
[   14.951779]  kunit_try_run_case+0x1a5/0x480
[   14.951830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.951853]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.951879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.951914]  ? __kthread_parkme+0x82/0x180
[   14.951935]  ? preempt_count_sub+0x50/0x80
[   14.951976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.952010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.952035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.952071]  kthread+0x337/0x6f0
[   14.952091]  ? trace_preempt_on+0x20/0xc0
[   14.952113]  ? __pfx_kthread+0x10/0x10
[   14.952134]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.952275]  ? calculate_sigpending+0x7b/0xa0
[   14.952301]  ? __pfx_kthread+0x10/0x10
[   14.952333]  ret_from_fork+0x116/0x1d0
[   14.952356]  ? __pfx_kthread+0x10/0x10
[   14.952377]  ret_from_fork_asm+0x1a/0x30
[   14.952430]  </TASK>
[   14.952449] 
[   14.962680] Allocated by task 284:
[   14.962887]  kasan_save_stack+0x45/0x70
[   14.963127]  kasan_save_track+0x18/0x40
[   14.963422]  kasan_save_alloc_info+0x3b/0x50
[   14.963703]  __kasan_kmalloc+0xb7/0xc0
[   14.963895]  __kmalloc_cache_noprof+0x189/0x420
[   14.964104]  kasan_atomics+0x95/0x310
[   14.964421]  kunit_try_run_case+0x1a5/0x480
[   14.964589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.965006]  kthread+0x337/0x6f0
[   14.965739]  ret_from_fork+0x116/0x1d0
[   14.966866]  ret_from_fork_asm+0x1a/0x30
[   14.967323] 
[   14.967409] The buggy address belongs to the object at ffff888103a28200
[   14.967409]  which belongs to the cache kmalloc-64 of size 64
[   14.968457] The buggy address is located 0 bytes to the right of
[   14.968457]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.969002] 
[   14.969089] The buggy address belongs to the physical page:
[   14.969356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.970285] flags: 0x200000000000000(node=0|zone=2)
[   14.970661] page_type: f5(slab)
[   14.970943] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.971519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.971968] page dumped because: kasan: bad access detected
[   14.972373] 
[   14.972480] Memory state around the buggy address:
[   14.972905]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.973564]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.974006] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.974429]                                      ^
[   14.974869]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.975506]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.975947] ==================================================================
[   16.015451] ==================================================================
[   16.015948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.016340] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   16.016733] 
[   16.016861] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.016908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.016950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.016977] Call Trace:
[   16.016993]  <TASK>
[   16.017019]  dump_stack_lvl+0x73/0xb0
[   16.017048]  print_report+0xd1/0x610
[   16.017070]  ? __virt_addr_valid+0x1db/0x2d0
[   16.017093]  ? kasan_atomics_helper+0x2006/0x5450
[   16.017115]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.017139]  ? kasan_atomics_helper+0x2006/0x5450
[   16.017191]  kasan_report+0x141/0x180
[   16.017214]  ? kasan_atomics_helper+0x2006/0x5450
[   16.017263]  kasan_check_range+0x10c/0x1c0
[   16.017313]  __kasan_check_write+0x18/0x20
[   16.017342]  kasan_atomics_helper+0x2006/0x5450
[   16.017366]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.017399]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.017424]  ? trace_hardirqs_on+0x37/0xe0
[   16.017446]  ? kasan_atomics+0x152/0x310
[   16.017473]  kasan_atomics+0x1dc/0x310
[   16.017516]  ? __pfx_kasan_atomics+0x10/0x10
[   16.017539]  ? __pfx_kasan_atomics+0x10/0x10
[   16.017596]  kunit_try_run_case+0x1a5/0x480
[   16.017621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.017654]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.017680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.017705]  ? __kthread_parkme+0x82/0x180
[   16.017726]  ? preempt_count_sub+0x50/0x80
[   16.017750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.017774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.017798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.017823]  kthread+0x337/0x6f0
[   16.017842]  ? trace_preempt_on+0x20/0xc0
[   16.017864]  ? __pfx_kthread+0x10/0x10
[   16.017885]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.017907]  ? calculate_sigpending+0x7b/0xa0
[   16.017932]  ? __pfx_kthread+0x10/0x10
[   16.017953]  ret_from_fork+0x116/0x1d0
[   16.017971]  ? __pfx_kthread+0x10/0x10
[   16.017992]  ret_from_fork_asm+0x1a/0x30
[   16.018022]  </TASK>
[   16.018033] 
[   16.025930] Allocated by task 284:
[   16.026060]  kasan_save_stack+0x45/0x70
[   16.026213]  kasan_save_track+0x18/0x40
[   16.026416]  kasan_save_alloc_info+0x3b/0x50
[   16.026732]  __kasan_kmalloc+0xb7/0xc0
[   16.026938]  __kmalloc_cache_noprof+0x189/0x420
[   16.027166]  kasan_atomics+0x95/0x310
[   16.027337]  kunit_try_run_case+0x1a5/0x480
[   16.027544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.027784]  kthread+0x337/0x6f0
[   16.027932]  ret_from_fork+0x116/0x1d0
[   16.028104]  ret_from_fork_asm+0x1a/0x30
[   16.028292] 
[   16.028467] The buggy address belongs to the object at ffff888103a28200
[   16.028467]  which belongs to the cache kmalloc-64 of size 64
[   16.028939] The buggy address is located 0 bytes to the right of
[   16.028939]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   16.029402] 
[   16.029570] The buggy address belongs to the physical page:
[   16.029833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   16.030287] flags: 0x200000000000000(node=0|zone=2)
[   16.030605] page_type: f5(slab)
[   16.030745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.031072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.031312] page dumped because: kasan: bad access detected
[   16.031641] 
[   16.031736] Memory state around the buggy address:
[   16.031966]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.032413]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.032806] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.033145]                                      ^
[   16.033377]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.033623]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.033940] ==================================================================
[   15.734452] ==================================================================
[   15.734775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.735040] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.735267] 
[   15.735364] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.735407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.735418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.735440] Call Trace:
[   15.735454]  <TASK>
[   15.735469]  dump_stack_lvl+0x73/0xb0
[   15.735518]  print_report+0xd1/0x610
[   15.735540]  ? __virt_addr_valid+0x1db/0x2d0
[   15.735563]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.735585]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.735609]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.735632]  kasan_report+0x141/0x180
[   15.735654]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.735681]  kasan_check_range+0x10c/0x1c0
[   15.735706]  __kasan_check_write+0x18/0x20
[   15.735725]  kasan_atomics_helper+0x19e3/0x5450
[   15.735749]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.735772]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.735796]  ? trace_hardirqs_on+0x37/0xe0
[   15.735818]  ? kasan_atomics+0x152/0x310
[   15.735846]  kasan_atomics+0x1dc/0x310
[   15.735869]  ? __pfx_kasan_atomics+0x10/0x10
[   15.735893]  ? __pfx_kasan_atomics+0x10/0x10
[   15.735921]  kunit_try_run_case+0x1a5/0x480
[   15.735944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.735968]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.735992]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.736016]  ? __kthread_parkme+0x82/0x180
[   15.736036]  ? preempt_count_sub+0x50/0x80
[   15.736061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.736086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.736110]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.736135]  kthread+0x337/0x6f0
[   15.736156]  ? trace_preempt_on+0x20/0xc0
[   15.736178]  ? __pfx_kthread+0x10/0x10
[   15.736199]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.736222]  ? calculate_sigpending+0x7b/0xa0
[   15.736246]  ? __pfx_kthread+0x10/0x10
[   15.736268]  ret_from_fork+0x116/0x1d0
[   15.736287]  ? __pfx_kthread+0x10/0x10
[   15.736308]  ret_from_fork_asm+0x1a/0x30
[   15.736348]  </TASK>
[   15.736358] 
[   15.743694] Allocated by task 284:
[   15.743826]  kasan_save_stack+0x45/0x70
[   15.744022]  kasan_save_track+0x18/0x40
[   15.744215]  kasan_save_alloc_info+0x3b/0x50
[   15.744443]  __kasan_kmalloc+0xb7/0xc0
[   15.744653]  __kmalloc_cache_noprof+0x189/0x420
[   15.744879]  kasan_atomics+0x95/0x310
[   15.745075]  kunit_try_run_case+0x1a5/0x480
[   15.745284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.745571]  kthread+0x337/0x6f0
[   15.745747]  ret_from_fork+0x116/0x1d0
[   15.745938]  ret_from_fork_asm+0x1a/0x30
[   15.746139] 
[   15.746231] The buggy address belongs to the object at ffff888103a28200
[   15.746231]  which belongs to the cache kmalloc-64 of size 64
[   15.746621] The buggy address is located 0 bytes to the right of
[   15.746621]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.746994] 
[   15.747065] The buggy address belongs to the physical page:
[   15.747240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.747609] flags: 0x200000000000000(node=0|zone=2)
[   15.747843] page_type: f5(slab)
[   15.748009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.748367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.748706] page dumped because: kasan: bad access detected
[   15.748954] 
[   15.749053] Memory state around the buggy address:
[   15.749273]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.751554]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.751869] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.752087]                                      ^
[   15.752244]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.752544]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.752854] ==================================================================
[   14.757286] ==================================================================
[   14.757735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.758155] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.758501] 
[   14.758703] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.758748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.758761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.758781] Call Trace:
[   14.758796]  <TASK>
[   14.758811]  dump_stack_lvl+0x73/0xb0
[   14.758840]  print_report+0xd1/0x610
[   14.758928]  ? __virt_addr_valid+0x1db/0x2d0
[   14.758969]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.758991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.759091]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.759115]  kasan_report+0x141/0x180
[   14.759138]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.759234]  __asan_report_load4_noabort+0x18/0x20
[   14.759279]  kasan_atomics_helper+0x4b54/0x5450
[   14.759314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.759337]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.759363]  ? trace_hardirqs_on+0x37/0xe0
[   14.759384]  ? kasan_atomics+0x152/0x310
[   14.759412]  kasan_atomics+0x1dc/0x310
[   14.759435]  ? __pfx_kasan_atomics+0x10/0x10
[   14.759458]  ? __pfx_kasan_atomics+0x10/0x10
[   14.759485]  kunit_try_run_case+0x1a5/0x480
[   14.759510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.759551]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.759576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.759600]  ? __kthread_parkme+0x82/0x180
[   14.759620]  ? preempt_count_sub+0x50/0x80
[   14.759645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.759669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.759694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.759719]  kthread+0x337/0x6f0
[   14.759738]  ? trace_preempt_on+0x20/0xc0
[   14.759760]  ? __pfx_kthread+0x10/0x10
[   14.759782]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.759804]  ? calculate_sigpending+0x7b/0xa0
[   14.759828]  ? __pfx_kthread+0x10/0x10
[   14.759850]  ret_from_fork+0x116/0x1d0
[   14.759869]  ? __pfx_kthread+0x10/0x10
[   14.759890]  ret_from_fork_asm+0x1a/0x30
[   14.759921]  </TASK>
[   14.759932] 
[   14.770984] Allocated by task 284:
[   14.771220]  kasan_save_stack+0x45/0x70
[   14.771445]  kasan_save_track+0x18/0x40
[   14.771826]  kasan_save_alloc_info+0x3b/0x50
[   14.772473]  __kasan_kmalloc+0xb7/0xc0
[   14.772924]  __kmalloc_cache_noprof+0x189/0x420
[   14.773358]  kasan_atomics+0x95/0x310
[   14.773600]  kunit_try_run_case+0x1a5/0x480
[   14.773947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.774337]  kthread+0x337/0x6f0
[   14.774693]  ret_from_fork+0x116/0x1d0
[   14.775065]  ret_from_fork_asm+0x1a/0x30
[   14.775259] 
[   14.775443] The buggy address belongs to the object at ffff888103a28200
[   14.775443]  which belongs to the cache kmalloc-64 of size 64
[   14.775920] The buggy address is located 0 bytes to the right of
[   14.775920]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.776679] 
[   14.776865] The buggy address belongs to the physical page:
[   14.777826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.778253] flags: 0x200000000000000(node=0|zone=2)
[   14.778611] page_type: f5(slab)
[   14.778748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.779237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.779708] page dumped because: kasan: bad access detected
[   14.779981] 
[   14.780189] Memory state around the buggy address:
[   14.780367]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.780893]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.781174] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.781754]                                      ^
[   14.782093]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.782390]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.782850] ==================================================================
[   15.565436] ==================================================================
[   15.566192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.566871] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.567563] 
[   15.567735] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.567801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.567813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.567834] Call Trace:
[   15.567849]  <TASK>
[   15.567864]  dump_stack_lvl+0x73/0xb0
[   15.567893]  print_report+0xd1/0x610
[   15.567915]  ? __virt_addr_valid+0x1db/0x2d0
[   15.567939]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.567961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.567985]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.568008]  kasan_report+0x141/0x180
[   15.568030]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.568057]  __asan_report_store8_noabort+0x1b/0x30
[   15.568083]  kasan_atomics_helper+0x50d4/0x5450
[   15.568107]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.568129]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.568154]  ? trace_hardirqs_on+0x37/0xe0
[   15.568177]  ? kasan_atomics+0x152/0x310
[   15.568205]  kasan_atomics+0x1dc/0x310
[   15.568227]  ? __pfx_kasan_atomics+0x10/0x10
[   15.568251]  ? __pfx_kasan_atomics+0x10/0x10
[   15.568278]  kunit_try_run_case+0x1a5/0x480
[   15.568303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.568338]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.568362]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.568387]  ? __kthread_parkme+0x82/0x180
[   15.568407]  ? preempt_count_sub+0x50/0x80
[   15.568431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.568456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.568487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.568512]  kthread+0x337/0x6f0
[   15.568532]  ? trace_preempt_on+0x20/0xc0
[   15.568555]  ? __pfx_kthread+0x10/0x10
[   15.568576]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.568598]  ? calculate_sigpending+0x7b/0xa0
[   15.568622]  ? __pfx_kthread+0x10/0x10
[   15.568644]  ret_from_fork+0x116/0x1d0
[   15.568663]  ? __pfx_kthread+0x10/0x10
[   15.568685]  ret_from_fork_asm+0x1a/0x30
[   15.568716]  </TASK>
[   15.568727] 
[   15.579510] Allocated by task 284:
[   15.579816]  kasan_save_stack+0x45/0x70
[   15.580160]  kasan_save_track+0x18/0x40
[   15.580530]  kasan_save_alloc_info+0x3b/0x50
[   15.580914]  __kasan_kmalloc+0xb7/0xc0
[   15.581255]  __kmalloc_cache_noprof+0x189/0x420
[   15.581678]  kasan_atomics+0x95/0x310
[   15.582022]  kunit_try_run_case+0x1a5/0x480
[   15.582417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.582904]  kthread+0x337/0x6f0
[   15.583213]  ret_from_fork+0x116/0x1d0
[   15.583584]  ret_from_fork_asm+0x1a/0x30
[   15.583932] 
[   15.584087] The buggy address belongs to the object at ffff888103a28200
[   15.584087]  which belongs to the cache kmalloc-64 of size 64
[   15.584772] The buggy address is located 0 bytes to the right of
[   15.584772]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.585146] 
[   15.585217] The buggy address belongs to the physical page:
[   15.585556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.586203] flags: 0x200000000000000(node=0|zone=2)
[   15.586670] page_type: f5(slab)
[   15.586956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.587626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.588261] page dumped because: kasan: bad access detected
[   15.588751] 
[   15.588907] Memory state around the buggy address:
[   15.589273]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.589576]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.590178] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.590804]                                      ^
[   15.590964]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.591182]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.591472] ==================================================================
[   15.967182] ==================================================================
[   15.968669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.969680] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.970896] 
[   15.971092] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.971139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.971152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.971173] Call Trace:
[   15.971190]  <TASK>
[   15.971205]  dump_stack_lvl+0x73/0xb0
[   15.971235]  print_report+0xd1/0x610
[   15.971257]  ? __virt_addr_valid+0x1db/0x2d0
[   15.971280]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.971302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.971339]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.971362]  kasan_report+0x141/0x180
[   15.971386]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.971414]  kasan_check_range+0x10c/0x1c0
[   15.971440]  __kasan_check_write+0x18/0x20
[   15.971460]  kasan_atomics_helper+0x1f43/0x5450
[   15.971646]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.971682]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.971747]  ? trace_hardirqs_on+0x37/0xe0
[   15.971773]  ? kasan_atomics+0x152/0x310
[   15.971801]  kasan_atomics+0x1dc/0x310
[   15.971824]  ? __pfx_kasan_atomics+0x10/0x10
[   15.971848]  ? __pfx_kasan_atomics+0x10/0x10
[   15.971875]  kunit_try_run_case+0x1a5/0x480
[   15.971899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.971922]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.971947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.971971]  ? __kthread_parkme+0x82/0x180
[   15.971991]  ? preempt_count_sub+0x50/0x80
[   15.972015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.972065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.972090]  kthread+0x337/0x6f0
[   15.972109]  ? trace_preempt_on+0x20/0xc0
[   15.972132]  ? __pfx_kthread+0x10/0x10
[   15.972153]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.972175]  ? calculate_sigpending+0x7b/0xa0
[   15.972200]  ? __pfx_kthread+0x10/0x10
[   15.972221]  ret_from_fork+0x116/0x1d0
[   15.972240]  ? __pfx_kthread+0x10/0x10
[   15.972260]  ret_from_fork_asm+0x1a/0x30
[   15.972291]  </TASK>
[   15.972301] 
[   15.987239] Allocated by task 284:
[   15.987534]  kasan_save_stack+0x45/0x70
[   15.987954]  kasan_save_track+0x18/0x40
[   15.988352]  kasan_save_alloc_info+0x3b/0x50
[   15.988792]  __kasan_kmalloc+0xb7/0xc0
[   15.989178]  __kmalloc_cache_noprof+0x189/0x420
[   15.989630]  kasan_atomics+0x95/0x310
[   15.989824]  kunit_try_run_case+0x1a5/0x480
[   15.989973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.990153]  kthread+0x337/0x6f0
[   15.990274]  ret_from_fork+0x116/0x1d0
[   15.990425]  ret_from_fork_asm+0x1a/0x30
[   15.990638] 
[   15.990715] The buggy address belongs to the object at ffff888103a28200
[   15.990715]  which belongs to the cache kmalloc-64 of size 64
[   15.991223] The buggy address is located 0 bytes to the right of
[   15.991223]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.991735] 
[   15.991810] The buggy address belongs to the physical page:
[   15.992063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.992464] flags: 0x200000000000000(node=0|zone=2)
[   15.992723] page_type: f5(slab)
[   15.992862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.993275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.993642] page dumped because: kasan: bad access detected
[   15.993846] 
[   15.993917] Memory state around the buggy address:
[   15.994100]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.994447]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.994806] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.995131]                                      ^
[   15.995340]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.995691]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.995940] ==================================================================
[   15.254654] ==================================================================
[   15.254986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.255675] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.255931] 
[   15.256227] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.256274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.256286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.256307] Call Trace:
[   15.256337]  <TASK>
[   15.256352]  dump_stack_lvl+0x73/0xb0
[   15.256382]  print_report+0xd1/0x610
[   15.256407]  ? __virt_addr_valid+0x1db/0x2d0
[   15.256432]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.256455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.256479]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.256578]  kasan_report+0x141/0x180
[   15.256602]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.256629]  kasan_check_range+0x10c/0x1c0
[   15.256653]  __kasan_check_write+0x18/0x20
[   15.256674]  kasan_atomics_helper+0xfa9/0x5450
[   15.256698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.256721]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.256746]  ? trace_hardirqs_on+0x37/0xe0
[   15.256768]  ? kasan_atomics+0x152/0x310
[   15.256796]  kasan_atomics+0x1dc/0x310
[   15.256819]  ? __pfx_kasan_atomics+0x10/0x10
[   15.256843]  ? __pfx_kasan_atomics+0x10/0x10
[   15.256870]  kunit_try_run_case+0x1a5/0x480
[   15.256895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.256918]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.256942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.256974]  ? __kthread_parkme+0x82/0x180
[   15.256995]  ? preempt_count_sub+0x50/0x80
[   15.257019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.257044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.257068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.257094]  kthread+0x337/0x6f0
[   15.257114]  ? trace_preempt_on+0x20/0xc0
[   15.257135]  ? __pfx_kthread+0x10/0x10
[   15.257157]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.257179]  ? calculate_sigpending+0x7b/0xa0
[   15.257203]  ? __pfx_kthread+0x10/0x10
[   15.257225]  ret_from_fork+0x116/0x1d0
[   15.257244]  ? __pfx_kthread+0x10/0x10
[   15.257265]  ret_from_fork_asm+0x1a/0x30
[   15.257296]  </TASK>
[   15.257307] 
[   15.267196] Allocated by task 284:
[   15.267566]  kasan_save_stack+0x45/0x70
[   15.267877]  kasan_save_track+0x18/0x40
[   15.268116]  kasan_save_alloc_info+0x3b/0x50
[   15.268290]  __kasan_kmalloc+0xb7/0xc0
[   15.268618]  __kmalloc_cache_noprof+0x189/0x420
[   15.268861]  kasan_atomics+0x95/0x310
[   15.269046]  kunit_try_run_case+0x1a5/0x480
[   15.269242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.269481]  kthread+0x337/0x6f0
[   15.269868]  ret_from_fork+0x116/0x1d0
[   15.270116]  ret_from_fork_asm+0x1a/0x30
[   15.270280] 
[   15.270393] The buggy address belongs to the object at ffff888103a28200
[   15.270393]  which belongs to the cache kmalloc-64 of size 64
[   15.271085] The buggy address is located 0 bytes to the right of
[   15.271085]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.271949] 
[   15.272106] The buggy address belongs to the physical page:
[   15.272348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.272883] flags: 0x200000000000000(node=0|zone=2)
[   15.273112] page_type: f5(slab)
[   15.273260] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.273766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.274128] page dumped because: kasan: bad access detected
[   15.274344] 
[   15.274574] Memory state around the buggy address:
[   15.274862]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.275135]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.275552] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.275929]                                      ^
[   15.276141]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.276449]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.277174] ==================================================================
[   15.231825] ==================================================================
[   15.232167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.232787] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.233108] 
[   15.233219] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.233262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.233274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.233295] Call Trace:
[   15.233320]  <TASK>
[   15.233335]  dump_stack_lvl+0x73/0xb0
[   15.233363]  print_report+0xd1/0x610
[   15.233385]  ? __virt_addr_valid+0x1db/0x2d0
[   15.233408]  ? kasan_atomics_helper+0xf10/0x5450
[   15.233429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.233453]  ? kasan_atomics_helper+0xf10/0x5450
[   15.233476]  kasan_report+0x141/0x180
[   15.233801]  ? kasan_atomics_helper+0xf10/0x5450
[   15.233830]  kasan_check_range+0x10c/0x1c0
[   15.233855]  __kasan_check_write+0x18/0x20
[   15.233875]  kasan_atomics_helper+0xf10/0x5450
[   15.233899]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.233922]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.233946]  ? trace_hardirqs_on+0x37/0xe0
[   15.233970]  ? kasan_atomics+0x152/0x310
[   15.233997]  kasan_atomics+0x1dc/0x310
[   15.234021]  ? __pfx_kasan_atomics+0x10/0x10
[   15.234045]  ? __pfx_kasan_atomics+0x10/0x10
[   15.234072]  kunit_try_run_case+0x1a5/0x480
[   15.234097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.234120]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.234144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.234169]  ? __kthread_parkme+0x82/0x180
[   15.234189]  ? preempt_count_sub+0x50/0x80
[   15.234214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.234239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.234263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.234289]  kthread+0x337/0x6f0
[   15.234320]  ? trace_preempt_on+0x20/0xc0
[   15.234343]  ? __pfx_kthread+0x10/0x10
[   15.234364]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.234387]  ? calculate_sigpending+0x7b/0xa0
[   15.234411]  ? __pfx_kthread+0x10/0x10
[   15.234433]  ret_from_fork+0x116/0x1d0
[   15.234452]  ? __pfx_kthread+0x10/0x10
[   15.234473]  ret_from_fork_asm+0x1a/0x30
[   15.234515]  </TASK>
[   15.234526] 
[   15.244398] Allocated by task 284:
[   15.244787]  kasan_save_stack+0x45/0x70
[   15.245056]  kasan_save_track+0x18/0x40
[   15.245219]  kasan_save_alloc_info+0x3b/0x50
[   15.245450]  __kasan_kmalloc+0xb7/0xc0
[   15.245662]  __kmalloc_cache_noprof+0x189/0x420
[   15.246121]  kasan_atomics+0x95/0x310
[   15.246304]  kunit_try_run_case+0x1a5/0x480
[   15.246667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.246968]  kthread+0x337/0x6f0
[   15.247105]  ret_from_fork+0x116/0x1d0
[   15.247298]  ret_from_fork_asm+0x1a/0x30
[   15.247632] 
[   15.247778] The buggy address belongs to the object at ffff888103a28200
[   15.247778]  which belongs to the cache kmalloc-64 of size 64
[   15.248356] The buggy address is located 0 bytes to the right of
[   15.248356]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.248981] 
[   15.249196] The buggy address belongs to the physical page:
[   15.249408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.249945] flags: 0x200000000000000(node=0|zone=2)
[   15.250128] page_type: f5(slab)
[   15.250385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.250879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.251250] page dumped because: kasan: bad access detected
[   15.251578] 
[   15.251691] Memory state around the buggy address:
[   15.251859]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.252172]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.252727] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.253021]                                      ^
[   15.253236]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.253652]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.254016] ==================================================================
[   14.709354] ==================================================================
[   14.709765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.710283] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.710582] 
[   14.710723] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.710768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.710790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.710812] Call Trace:
[   14.710828]  <TASK>
[   14.710843]  dump_stack_lvl+0x73/0xb0
[   14.710871]  print_report+0xd1/0x610
[   14.710893]  ? __virt_addr_valid+0x1db/0x2d0
[   14.710915]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.710937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.710961]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.710984]  kasan_report+0x141/0x180
[   14.711111]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.711142]  __asan_report_store4_noabort+0x1b/0x30
[   14.711169]  kasan_atomics_helper+0x4b6e/0x5450
[   14.711202]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.711225]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.711250]  ? trace_hardirqs_on+0x37/0xe0
[   14.711273]  ? kasan_atomics+0x152/0x310
[   14.711339]  kasan_atomics+0x1dc/0x310
[   14.711363]  ? __pfx_kasan_atomics+0x10/0x10
[   14.711399]  ? __pfx_kasan_atomics+0x10/0x10
[   14.711426]  kunit_try_run_case+0x1a5/0x480
[   14.711451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.711475]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.711499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.711524]  ? __kthread_parkme+0x82/0x180
[   14.711545]  ? preempt_count_sub+0x50/0x80
[   14.711570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.711624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.711649]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.711686]  kthread+0x337/0x6f0
[   14.711707]  ? trace_preempt_on+0x20/0xc0
[   14.711730]  ? __pfx_kthread+0x10/0x10
[   14.711751]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.711774]  ? calculate_sigpending+0x7b/0xa0
[   14.711827]  ? __pfx_kthread+0x10/0x10
[   14.711848]  ret_from_fork+0x116/0x1d0
[   14.711867]  ? __pfx_kthread+0x10/0x10
[   14.711899]  ret_from_fork_asm+0x1a/0x30
[   14.711930]  </TASK>
[   14.711941] 
[   14.722488] Allocated by task 284:
[   14.722621]  kasan_save_stack+0x45/0x70
[   14.722828]  kasan_save_track+0x18/0x40
[   14.723059]  kasan_save_alloc_info+0x3b/0x50
[   14.723397]  __kasan_kmalloc+0xb7/0xc0
[   14.723676]  __kmalloc_cache_noprof+0x189/0x420
[   14.723918]  kasan_atomics+0x95/0x310
[   14.724071]  kunit_try_run_case+0x1a5/0x480
[   14.724451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.724789]  kthread+0x337/0x6f0
[   14.725025]  ret_from_fork+0x116/0x1d0
[   14.725180]  ret_from_fork_asm+0x1a/0x30
[   14.725449] 
[   14.725526] The buggy address belongs to the object at ffff888103a28200
[   14.725526]  which belongs to the cache kmalloc-64 of size 64
[   14.726208] The buggy address is located 0 bytes to the right of
[   14.726208]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.726998] 
[   14.727112] The buggy address belongs to the physical page:
[   14.727377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.727804] flags: 0x200000000000000(node=0|zone=2)
[   14.728090] page_type: f5(slab)
[   14.729912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.730182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.730441] page dumped because: kasan: bad access detected
[   14.730617] 
[   14.730688] Memory state around the buggy address:
[   14.730847]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.731069]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.731287] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.731513]                                      ^
[   14.731678]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.732643]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.733004] ==================================================================
[   15.946146] ==================================================================
[   15.946838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.947560] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.948168] 
[   15.948349] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.948394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.948407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.948428] Call Trace:
[   15.948445]  <TASK>
[   15.948460]  dump_stack_lvl+0x73/0xb0
[   15.948510]  print_report+0xd1/0x610
[   15.948533]  ? __virt_addr_valid+0x1db/0x2d0
[   15.948556]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.948578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.948602]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.948624]  kasan_report+0x141/0x180
[   15.948647]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.948674]  kasan_check_range+0x10c/0x1c0
[   15.948698]  __kasan_check_write+0x18/0x20
[   15.948719]  kasan_atomics_helper+0x1eaa/0x5450
[   15.948744]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.948767]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.948791]  ? trace_hardirqs_on+0x37/0xe0
[   15.948812]  ? kasan_atomics+0x152/0x310
[   15.948839]  kasan_atomics+0x1dc/0x310
[   15.948862]  ? __pfx_kasan_atomics+0x10/0x10
[   15.948885]  ? __pfx_kasan_atomics+0x10/0x10
[   15.948913]  kunit_try_run_case+0x1a5/0x480
[   15.948937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.948960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.948993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.949017]  ? __kthread_parkme+0x82/0x180
[   15.949038]  ? preempt_count_sub+0x50/0x80
[   15.949062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.949086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.949111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.949139]  kthread+0x337/0x6f0
[   15.949159]  ? trace_preempt_on+0x20/0xc0
[   15.949182]  ? __pfx_kthread+0x10/0x10
[   15.949203]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.949226]  ? calculate_sigpending+0x7b/0xa0
[   15.949251]  ? __pfx_kthread+0x10/0x10
[   15.949272]  ret_from_fork+0x116/0x1d0
[   15.949292]  ? __pfx_kthread+0x10/0x10
[   15.949313]  ret_from_fork_asm+0x1a/0x30
[   15.949353]  </TASK>
[   15.949364] 
[   15.959005] Allocated by task 284:
[   15.959203]  kasan_save_stack+0x45/0x70
[   15.959403]  kasan_save_track+0x18/0x40
[   15.959708]  kasan_save_alloc_info+0x3b/0x50
[   15.959886]  __kasan_kmalloc+0xb7/0xc0
[   15.960078]  __kmalloc_cache_noprof+0x189/0x420
[   15.960258]  kasan_atomics+0x95/0x310
[   15.960403]  kunit_try_run_case+0x1a5/0x480
[   15.960756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.961008]  kthread+0x337/0x6f0
[   15.961158]  ret_from_fork+0x116/0x1d0
[   15.961291]  ret_from_fork_asm+0x1a/0x30
[   15.961440] 
[   15.961512] The buggy address belongs to the object at ffff888103a28200
[   15.961512]  which belongs to the cache kmalloc-64 of size 64
[   15.961938] The buggy address is located 0 bytes to the right of
[   15.961938]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.962497] 
[   15.962594] The buggy address belongs to the physical page:
[   15.962842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.963166] flags: 0x200000000000000(node=0|zone=2)
[   15.963339] page_type: f5(slab)
[   15.963460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.964211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.964512] page dumped because: kasan: bad access detected
[   15.964730] 
[   15.964825] Memory state around the buggy address:
[   15.965026]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.965331]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.965671] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.965924]                                      ^
[   15.966142]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.966430]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.966753] ==================================================================
[   15.894805] ==================================================================
[   15.895218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.895904] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.896231] 
[   15.896347] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.896392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.896405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.896427] Call Trace:
[   15.896442]  <TASK>
[   15.896456]  dump_stack_lvl+0x73/0xb0
[   15.896486]  print_report+0xd1/0x610
[   15.896805]  ? __virt_addr_valid+0x1db/0x2d0
[   15.896833]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.896855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.896879]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.896902]  kasan_report+0x141/0x180
[   15.896925]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.896951]  kasan_check_range+0x10c/0x1c0
[   15.896983]  __kasan_check_write+0x18/0x20
[   15.897002]  kasan_atomics_helper+0x1d7a/0x5450
[   15.897026]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.897049]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.897073]  ? trace_hardirqs_on+0x37/0xe0
[   15.897096]  ? kasan_atomics+0x152/0x310
[   15.897123]  kasan_atomics+0x1dc/0x310
[   15.897146]  ? __pfx_kasan_atomics+0x10/0x10
[   15.897170]  ? __pfx_kasan_atomics+0x10/0x10
[   15.897198]  kunit_try_run_case+0x1a5/0x480
[   15.897222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.897245]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.897270]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.897297]  ? __kthread_parkme+0x82/0x180
[   15.897330]  ? preempt_count_sub+0x50/0x80
[   15.897356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.897380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.897405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.897431]  kthread+0x337/0x6f0
[   15.897451]  ? trace_preempt_on+0x20/0xc0
[   15.897473]  ? __pfx_kthread+0x10/0x10
[   15.897494]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.897518]  ? calculate_sigpending+0x7b/0xa0
[   15.897542]  ? __pfx_kthread+0x10/0x10
[   15.897564]  ret_from_fork+0x116/0x1d0
[   15.897583]  ? __pfx_kthread+0x10/0x10
[   15.897604]  ret_from_fork_asm+0x1a/0x30
[   15.897634]  </TASK>
[   15.897645] 
[   15.908783] Allocated by task 284:
[   15.909156]  kasan_save_stack+0x45/0x70
[   15.909482]  kasan_save_track+0x18/0x40
[   15.909683]  kasan_save_alloc_info+0x3b/0x50
[   15.909886]  __kasan_kmalloc+0xb7/0xc0
[   15.910084]  __kmalloc_cache_noprof+0x189/0x420
[   15.910296]  kasan_atomics+0x95/0x310
[   15.910491]  kunit_try_run_case+0x1a5/0x480
[   15.911041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.911376]  kthread+0x337/0x6f0
[   15.911520]  ret_from_fork+0x116/0x1d0
[   15.911794]  ret_from_fork_asm+0x1a/0x30
[   15.912216] 
[   15.912331] The buggy address belongs to the object at ffff888103a28200
[   15.912331]  which belongs to the cache kmalloc-64 of size 64
[   15.912874] The buggy address is located 0 bytes to the right of
[   15.912874]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.913866] 
[   15.913950] The buggy address belongs to the physical page:
[   15.914423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.914889] flags: 0x200000000000000(node=0|zone=2)
[   15.915207] page_type: f5(slab)
[   15.915349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.915739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.916059] page dumped because: kasan: bad access detected
[   15.916302] 
[   15.916730] Memory state around the buggy address:
[   15.916934]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.917452]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.917993] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.918412]                                      ^
[   15.918779]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.919182]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.919530] ==================================================================
[   15.781977] ==================================================================
[   15.782660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.782925] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.783145] 
[   15.783232] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.783278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.783291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.783312] Call Trace:
[   15.783341]  <TASK>
[   15.783356]  dump_stack_lvl+0x73/0xb0
[   15.783385]  print_report+0xd1/0x610
[   15.783409]  ? __virt_addr_valid+0x1db/0x2d0
[   15.783432]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.783454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.783478]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.783500]  kasan_report+0x141/0x180
[   15.783523]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.783561]  kasan_check_range+0x10c/0x1c0
[   15.783585]  __kasan_check_write+0x18/0x20
[   15.783606]  kasan_atomics_helper+0x1b22/0x5450
[   15.783629]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.783652]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.783677]  ? trace_hardirqs_on+0x37/0xe0
[   15.783700]  ? kasan_atomics+0x152/0x310
[   15.783727]  kasan_atomics+0x1dc/0x310
[   15.783751]  ? __pfx_kasan_atomics+0x10/0x10
[   15.783774]  ? __pfx_kasan_atomics+0x10/0x10
[   15.783802]  kunit_try_run_case+0x1a5/0x480
[   15.783826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.783850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.783875]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.783899]  ? __kthread_parkme+0x82/0x180
[   15.783919]  ? preempt_count_sub+0x50/0x80
[   15.783944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.783969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.783993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.784018]  kthread+0x337/0x6f0
[   15.784039]  ? trace_preempt_on+0x20/0xc0
[   15.784061]  ? __pfx_kthread+0x10/0x10
[   15.784082]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.784104]  ? calculate_sigpending+0x7b/0xa0
[   15.784130]  ? __pfx_kthread+0x10/0x10
[   15.784151]  ret_from_fork+0x116/0x1d0
[   15.784171]  ? __pfx_kthread+0x10/0x10
[   15.784193]  ret_from_fork_asm+0x1a/0x30
[   15.784223]  </TASK>
[   15.784235] 
[   15.793655] Allocated by task 284:
[   15.793852]  kasan_save_stack+0x45/0x70
[   15.794048]  kasan_save_track+0x18/0x40
[   15.794235]  kasan_save_alloc_info+0x3b/0x50
[   15.794451]  __kasan_kmalloc+0xb7/0xc0
[   15.794706]  __kmalloc_cache_noprof+0x189/0x420
[   15.794860]  kasan_atomics+0x95/0x310
[   15.794996]  kunit_try_run_case+0x1a5/0x480
[   15.795205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.795473]  kthread+0x337/0x6f0
[   15.795637]  ret_from_fork+0x116/0x1d0
[   15.795799]  ret_from_fork_asm+0x1a/0x30
[   15.795980] 
[   15.796067] The buggy address belongs to the object at ffff888103a28200
[   15.796067]  which belongs to the cache kmalloc-64 of size 64
[   15.796576] The buggy address is located 0 bytes to the right of
[   15.796576]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.797050] 
[   15.797144] The buggy address belongs to the physical page:
[   15.797362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.797712] flags: 0x200000000000000(node=0|zone=2)
[   15.797924] page_type: f5(slab)
[   15.798088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.798386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.798668] page dumped because: kasan: bad access detected
[   15.798872] 
[   15.798960] Memory state around the buggy address:
[   15.799176]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.799451]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.799857] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.800065]                                      ^
[   15.800217]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.800712]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.802094] ==================================================================
[   15.470905] ==================================================================
[   15.471548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.471969] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.472294] 
[   15.472399] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.472444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.472457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.472478] Call Trace:
[   15.472495]  <TASK>
[   15.472511]  dump_stack_lvl+0x73/0xb0
[   15.472539]  print_report+0xd1/0x610
[   15.472562]  ? __virt_addr_valid+0x1db/0x2d0
[   15.472585]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.472606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.472632]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.472654]  kasan_report+0x141/0x180
[   15.472677]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.472705]  __asan_report_load4_noabort+0x18/0x20
[   15.472730]  kasan_atomics_helper+0x49ce/0x5450
[   15.472754]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.472777]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.472802]  ? trace_hardirqs_on+0x37/0xe0
[   15.472826]  ? kasan_atomics+0x152/0x310
[   15.472852]  kasan_atomics+0x1dc/0x310
[   15.472876]  ? __pfx_kasan_atomics+0x10/0x10
[   15.472900]  ? __pfx_kasan_atomics+0x10/0x10
[   15.472927]  kunit_try_run_case+0x1a5/0x480
[   15.472952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.472980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.473004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.473029]  ? __kthread_parkme+0x82/0x180
[   15.473050]  ? preempt_count_sub+0x50/0x80
[   15.473073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.473098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.473123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.473148]  kthread+0x337/0x6f0
[   15.473168]  ? trace_preempt_on+0x20/0xc0
[   15.473190]  ? __pfx_kthread+0x10/0x10
[   15.473212]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.473234]  ? calculate_sigpending+0x7b/0xa0
[   15.473258]  ? __pfx_kthread+0x10/0x10
[   15.473280]  ret_from_fork+0x116/0x1d0
[   15.473300]  ? __pfx_kthread+0x10/0x10
[   15.473617]  ret_from_fork_asm+0x1a/0x30
[   15.473654]  </TASK>
[   15.473665] 
[   15.483940] Allocated by task 284:
[   15.484258]  kasan_save_stack+0x45/0x70
[   15.484582]  kasan_save_track+0x18/0x40
[   15.484857]  kasan_save_alloc_info+0x3b/0x50
[   15.485164]  __kasan_kmalloc+0xb7/0xc0
[   15.485361]  __kmalloc_cache_noprof+0x189/0x420
[   15.485736]  kasan_atomics+0x95/0x310
[   15.485935]  kunit_try_run_case+0x1a5/0x480
[   15.486265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.486632]  kthread+0x337/0x6f0
[   15.486888]  ret_from_fork+0x116/0x1d0
[   15.487041]  ret_from_fork_asm+0x1a/0x30
[   15.487267] 
[   15.487377] The buggy address belongs to the object at ffff888103a28200
[   15.487377]  which belongs to the cache kmalloc-64 of size 64
[   15.488145] The buggy address is located 0 bytes to the right of
[   15.488145]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.488778] 
[   15.488940] The buggy address belongs to the physical page:
[   15.489194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.489721] flags: 0x200000000000000(node=0|zone=2)
[   15.490014] page_type: f5(slab)
[   15.490153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.490511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.491034] page dumped because: kasan: bad access detected
[   15.491357] 
[   15.491458] Memory state around the buggy address:
[   15.491852]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.492234]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.492663] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.492956]                                      ^
[   15.493184]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.493494]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.494040] ==================================================================
[   15.494912] ==================================================================
[   15.495932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.496336] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.496764] 
[   15.497162] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.497212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.497225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.497246] Call Trace:
[   15.497261]  <TASK>
[   15.497275]  dump_stack_lvl+0x73/0xb0
[   15.497304]  print_report+0xd1/0x610
[   15.497341]  ? __virt_addr_valid+0x1db/0x2d0
[   15.497364]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.497386]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.497410]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.497432]  kasan_report+0x141/0x180
[   15.497455]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.497482]  kasan_check_range+0x10c/0x1c0
[   15.497596]  __kasan_check_read+0x15/0x20
[   15.497620]  kasan_atomics_helper+0x13b5/0x5450
[   15.497643]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.497666]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.497691]  ? trace_hardirqs_on+0x37/0xe0
[   15.497713]  ? kasan_atomics+0x152/0x310
[   15.497741]  kasan_atomics+0x1dc/0x310
[   15.497764]  ? __pfx_kasan_atomics+0x10/0x10
[   15.497787]  ? __pfx_kasan_atomics+0x10/0x10
[   15.497815]  kunit_try_run_case+0x1a5/0x480
[   15.497839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.497863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.497887]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.497911]  ? __kthread_parkme+0x82/0x180
[   15.497931]  ? preempt_count_sub+0x50/0x80
[   15.497956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.497980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.498004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.498029]  kthread+0x337/0x6f0
[   15.498048]  ? trace_preempt_on+0x20/0xc0
[   15.498070]  ? __pfx_kthread+0x10/0x10
[   15.498091]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.498113]  ? calculate_sigpending+0x7b/0xa0
[   15.498137]  ? __pfx_kthread+0x10/0x10
[   15.498158]  ret_from_fork+0x116/0x1d0
[   15.498177]  ? __pfx_kthread+0x10/0x10
[   15.498198]  ret_from_fork_asm+0x1a/0x30
[   15.498228]  </TASK>
[   15.498238] 
[   15.509094] Allocated by task 284:
[   15.509262]  kasan_save_stack+0x45/0x70
[   15.509483]  kasan_save_track+0x18/0x40
[   15.509905]  kasan_save_alloc_info+0x3b/0x50
[   15.510192]  __kasan_kmalloc+0xb7/0xc0
[   15.510385]  __kmalloc_cache_noprof+0x189/0x420
[   15.510792]  kasan_atomics+0x95/0x310
[   15.511065]  kunit_try_run_case+0x1a5/0x480
[   15.511352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.511669]  kthread+0x337/0x6f0
[   15.511920]  ret_from_fork+0x116/0x1d0
[   15.512096]  ret_from_fork_asm+0x1a/0x30
[   15.512292] 
[   15.512398] The buggy address belongs to the object at ffff888103a28200
[   15.512398]  which belongs to the cache kmalloc-64 of size 64
[   15.513172] The buggy address is located 0 bytes to the right of
[   15.513172]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.513945] 
[   15.514035] The buggy address belongs to the physical page:
[   15.514399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.514859] flags: 0x200000000000000(node=0|zone=2)
[   15.515205] page_type: f5(slab)
[   15.515395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.515933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.516346] page dumped because: kasan: bad access detected
[   15.516726] 
[   15.516828] Memory state around the buggy address:
[   15.517136]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.517440]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.517949] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.518539]                                      ^
[   15.518727]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.519046]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.519365] ==================================================================
[   15.803451] ==================================================================
[   15.804716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.805610] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.806104] 
[   15.806196] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.806241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.806254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.806275] Call Trace:
[   15.806291]  <TASK>
[   15.806307]  dump_stack_lvl+0x73/0xb0
[   15.806351]  print_report+0xd1/0x610
[   15.806373]  ? __virt_addr_valid+0x1db/0x2d0
[   15.806395]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.806418]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.806442]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.806464]  kasan_report+0x141/0x180
[   15.806493]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.806520]  kasan_check_range+0x10c/0x1c0
[   15.806544]  __kasan_check_write+0x18/0x20
[   15.806565]  kasan_atomics_helper+0x1c18/0x5450
[   15.806588]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.806611]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.806636]  ? trace_hardirqs_on+0x37/0xe0
[   15.806658]  ? kasan_atomics+0x152/0x310
[   15.806686]  kasan_atomics+0x1dc/0x310
[   15.806709]  ? __pfx_kasan_atomics+0x10/0x10
[   15.806733]  ? __pfx_kasan_atomics+0x10/0x10
[   15.806760]  kunit_try_run_case+0x1a5/0x480
[   15.806784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.806807]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.806832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.806856]  ? __kthread_parkme+0x82/0x180
[   15.806876]  ? preempt_count_sub+0x50/0x80
[   15.806901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.806925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.806949]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.806974]  kthread+0x337/0x6f0
[   15.806993]  ? trace_preempt_on+0x20/0xc0
[   15.807016]  ? __pfx_kthread+0x10/0x10
[   15.807037]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.807059]  ? calculate_sigpending+0x7b/0xa0
[   15.807083]  ? __pfx_kthread+0x10/0x10
[   15.807105]  ret_from_fork+0x116/0x1d0
[   15.807123]  ? __pfx_kthread+0x10/0x10
[   15.807144]  ret_from_fork_asm+0x1a/0x30
[   15.807174]  </TASK>
[   15.807184] 
[   15.823851] Allocated by task 284:
[   15.824204]  kasan_save_stack+0x45/0x70
[   15.824613]  kasan_save_track+0x18/0x40
[   15.824984]  kasan_save_alloc_info+0x3b/0x50
[   15.825394]  __kasan_kmalloc+0xb7/0xc0
[   15.825793]  __kmalloc_cache_noprof+0x189/0x420
[   15.826079]  kasan_atomics+0x95/0x310
[   15.826218]  kunit_try_run_case+0x1a5/0x480
[   15.826377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.826688]  kthread+0x337/0x6f0
[   15.827014]  ret_from_fork+0x116/0x1d0
[   15.827384]  ret_from_fork_asm+0x1a/0x30
[   15.827766] 
[   15.827945] The buggy address belongs to the object at ffff888103a28200
[   15.827945]  which belongs to the cache kmalloc-64 of size 64
[   15.829142] The buggy address is located 0 bytes to the right of
[   15.829142]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.829775] 
[   15.829855] The buggy address belongs to the physical page:
[   15.830028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.830268] flags: 0x200000000000000(node=0|zone=2)
[   15.830441] page_type: f5(slab)
[   15.830812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.831749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.832497] page dumped because: kasan: bad access detected
[   15.833066] 
[   15.833230] Memory state around the buggy address:
[   15.833838]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.834574]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.835292] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.835999]                                      ^
[   15.836331]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.836576]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.837332] ==================================================================
[   15.920385] ==================================================================
[   15.921137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.921602] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.921853] 
[   15.922178] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.922357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.922373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.922395] Call Trace:
[   15.922409]  <TASK>
[   15.922424]  dump_stack_lvl+0x73/0xb0
[   15.922455]  print_report+0xd1/0x610
[   15.922478]  ? __virt_addr_valid+0x1db/0x2d0
[   15.922511]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.922533]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.922557]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.922580]  kasan_report+0x141/0x180
[   15.922604]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.922632]  kasan_check_range+0x10c/0x1c0
[   15.922660]  __kasan_check_write+0x18/0x20
[   15.922681]  kasan_atomics_helper+0x1e12/0x5450
[   15.922704]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.922727]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.922751]  ? trace_hardirqs_on+0x37/0xe0
[   15.922775]  ? kasan_atomics+0x152/0x310
[   15.922802]  kasan_atomics+0x1dc/0x310
[   15.922825]  ? __pfx_kasan_atomics+0x10/0x10
[   15.922849]  ? __pfx_kasan_atomics+0x10/0x10
[   15.922876]  kunit_try_run_case+0x1a5/0x480
[   15.922902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.922926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.922951]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.922975]  ? __kthread_parkme+0x82/0x180
[   15.922996]  ? preempt_count_sub+0x50/0x80
[   15.923021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.923046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.923071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.923096]  kthread+0x337/0x6f0
[   15.923115]  ? trace_preempt_on+0x20/0xc0
[   15.923138]  ? __pfx_kthread+0x10/0x10
[   15.923159]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.923181]  ? calculate_sigpending+0x7b/0xa0
[   15.923205]  ? __pfx_kthread+0x10/0x10
[   15.923227]  ret_from_fork+0x116/0x1d0
[   15.923246]  ? __pfx_kthread+0x10/0x10
[   15.923267]  ret_from_fork_asm+0x1a/0x30
[   15.923297]  </TASK>
[   15.923308] 
[   15.934444] Allocated by task 284:
[   15.934602]  kasan_save_stack+0x45/0x70
[   15.935066]  kasan_save_track+0x18/0x40
[   15.935380]  kasan_save_alloc_info+0x3b/0x50
[   15.935781]  __kasan_kmalloc+0xb7/0xc0
[   15.936113]  __kmalloc_cache_noprof+0x189/0x420
[   15.936453]  kasan_atomics+0x95/0x310
[   15.936620]  kunit_try_run_case+0x1a5/0x480
[   15.936771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.936951]  kthread+0x337/0x6f0
[   15.937086]  ret_from_fork+0x116/0x1d0
[   15.937221]  ret_from_fork_asm+0x1a/0x30
[   15.937421] 
[   15.937556] The buggy address belongs to the object at ffff888103a28200
[   15.937556]  which belongs to the cache kmalloc-64 of size 64
[   15.938170] The buggy address is located 0 bytes to the right of
[   15.938170]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.939074] 
[   15.939234] The buggy address belongs to the physical page:
[   15.939761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.940211] flags: 0x200000000000000(node=0|zone=2)
[   15.940388] page_type: f5(slab)
[   15.940559] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.941247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.941921] page dumped because: kasan: bad access detected
[   15.942408] 
[   15.942551] Memory state around the buggy address:
[   15.942709]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.942930]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.943148] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.943447]                                      ^
[   15.943878]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.944508]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.945117] ==================================================================
[   15.447224] ==================================================================
[   15.447789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.448246] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.448493] 
[   15.448774] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.448824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.448957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.448988] Call Trace:
[   15.449004]  <TASK>
[   15.449018]  dump_stack_lvl+0x73/0xb0
[   15.449048]  print_report+0xd1/0x610
[   15.449070]  ? __virt_addr_valid+0x1db/0x2d0
[   15.449093]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.449114]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.449138]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.449162]  kasan_report+0x141/0x180
[   15.449185]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.449211]  kasan_check_range+0x10c/0x1c0
[   15.449236]  __kasan_check_write+0x18/0x20
[   15.449255]  kasan_atomics_helper+0x12e6/0x5450
[   15.449279]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.449301]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.449337]  ? trace_hardirqs_on+0x37/0xe0
[   15.449360]  ? kasan_atomics+0x152/0x310
[   15.449388]  kasan_atomics+0x1dc/0x310
[   15.449411]  ? __pfx_kasan_atomics+0x10/0x10
[   15.449434]  ? __pfx_kasan_atomics+0x10/0x10
[   15.449461]  kunit_try_run_case+0x1a5/0x480
[   15.449486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.449510]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.449536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.449561]  ? __kthread_parkme+0x82/0x180
[   15.449581]  ? preempt_count_sub+0x50/0x80
[   15.449606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.449629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.449654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.449679]  kthread+0x337/0x6f0
[   15.449698]  ? trace_preempt_on+0x20/0xc0
[   15.449721]  ? __pfx_kthread+0x10/0x10
[   15.449743]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.449765]  ? calculate_sigpending+0x7b/0xa0
[   15.449790]  ? __pfx_kthread+0x10/0x10
[   15.449812]  ret_from_fork+0x116/0x1d0
[   15.449832]  ? __pfx_kthread+0x10/0x10
[   15.449853]  ret_from_fork_asm+0x1a/0x30
[   15.449884]  </TASK>
[   15.449895] 
[   15.460192] Allocated by task 284:
[   15.460375]  kasan_save_stack+0x45/0x70
[   15.460628]  kasan_save_track+0x18/0x40
[   15.461084]  kasan_save_alloc_info+0x3b/0x50
[   15.461408]  __kasan_kmalloc+0xb7/0xc0
[   15.461592]  __kmalloc_cache_noprof+0x189/0x420
[   15.461890]  kasan_atomics+0x95/0x310
[   15.462126]  kunit_try_run_case+0x1a5/0x480
[   15.462324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.462710]  kthread+0x337/0x6f0
[   15.462880]  ret_from_fork+0x116/0x1d0
[   15.463201]  ret_from_fork_asm+0x1a/0x30
[   15.463514] 
[   15.463613] The buggy address belongs to the object at ffff888103a28200
[   15.463613]  which belongs to the cache kmalloc-64 of size 64
[   15.464221] The buggy address is located 0 bytes to the right of
[   15.464221]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.464945] 
[   15.465058] The buggy address belongs to the physical page:
[   15.465450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.465879] flags: 0x200000000000000(node=0|zone=2)
[   15.466194] page_type: f5(slab)
[   15.466334] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.466904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.467302] page dumped because: kasan: bad access detected
[   15.467624] 
[   15.467726] Memory state around the buggy address:
[   15.468016]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.468329]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.468624] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.468901]                                      ^
[   15.469103]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.469794]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.470148] ==================================================================
[   15.540478] ==================================================================
[   15.540836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.541627] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.541952] 
[   15.542062] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.542105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.542118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.542163] Call Trace:
[   15.542179]  <TASK>
[   15.542194]  dump_stack_lvl+0x73/0xb0
[   15.542223]  print_report+0xd1/0x610
[   15.542244]  ? __virt_addr_valid+0x1db/0x2d0
[   15.542267]  ? kasan_atomics_helper+0x1467/0x5450
[   15.542291]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.542325]  ? kasan_atomics_helper+0x1467/0x5450
[   15.542347]  kasan_report+0x141/0x180
[   15.542370]  ? kasan_atomics_helper+0x1467/0x5450
[   15.542397]  kasan_check_range+0x10c/0x1c0
[   15.542421]  __kasan_check_write+0x18/0x20
[   15.542441]  kasan_atomics_helper+0x1467/0x5450
[   15.542465]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.542488]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.542526]  ? trace_hardirqs_on+0x37/0xe0
[   15.542549]  ? kasan_atomics+0x152/0x310
[   15.542593]  kasan_atomics+0x1dc/0x310
[   15.542618]  ? __pfx_kasan_atomics+0x10/0x10
[   15.542656]  ? __pfx_kasan_atomics+0x10/0x10
[   15.542683]  kunit_try_run_case+0x1a5/0x480
[   15.542721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.542757]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.542795]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.542819]  ? __kthread_parkme+0x82/0x180
[   15.542853]  ? preempt_count_sub+0x50/0x80
[   15.542878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.542903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.542927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.542952]  kthread+0x337/0x6f0
[   15.542972]  ? trace_preempt_on+0x20/0xc0
[   15.542994]  ? __pfx_kthread+0x10/0x10
[   15.543015]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.543037]  ? calculate_sigpending+0x7b/0xa0
[   15.543062]  ? __pfx_kthread+0x10/0x10
[   15.543084]  ret_from_fork+0x116/0x1d0
[   15.543103]  ? __pfx_kthread+0x10/0x10
[   15.543123]  ret_from_fork_asm+0x1a/0x30
[   15.543154]  </TASK>
[   15.543165] 
[   15.551079] Allocated by task 284:
[   15.551207]  kasan_save_stack+0x45/0x70
[   15.552250]  kasan_save_track+0x18/0x40
[   15.552891]  kasan_save_alloc_info+0x3b/0x50
[   15.553467]  __kasan_kmalloc+0xb7/0xc0
[   15.554005]  __kmalloc_cache_noprof+0x189/0x420
[   15.554621]  kasan_atomics+0x95/0x310
[   15.555243]  kunit_try_run_case+0x1a5/0x480
[   15.555626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.556033]  kthread+0x337/0x6f0
[   15.556167]  ret_from_fork+0x116/0x1d0
[   15.556306]  ret_from_fork_asm+0x1a/0x30
[   15.556749] 
[   15.556927] The buggy address belongs to the object at ffff888103a28200
[   15.556927]  which belongs to the cache kmalloc-64 of size 64
[   15.557994] The buggy address is located 0 bytes to the right of
[   15.557994]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.558630] 
[   15.558810] The buggy address belongs to the physical page:
[   15.559293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.559733] flags: 0x200000000000000(node=0|zone=2)
[   15.559904] page_type: f5(slab)
[   15.560028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.560262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.560559] page dumped because: kasan: bad access detected
[   15.561109] 
[   15.561277] Memory state around the buggy address:
[   15.561734]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.562359]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.562996] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.563634]                                      ^
[   15.564063]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.564706]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.565013] ==================================================================
[   15.119214] ==================================================================
[   15.119969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.120338] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.121011] 
[   15.121141] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.121189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.121215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.121236] Call Trace:
[   15.121253]  <TASK>
[   15.121269]  dump_stack_lvl+0x73/0xb0
[   15.121299]  print_report+0xd1/0x610
[   15.121529]  ? __virt_addr_valid+0x1db/0x2d0
[   15.121578]  ? kasan_atomics_helper+0xc70/0x5450
[   15.121601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.121625]  ? kasan_atomics_helper+0xc70/0x5450
[   15.121647]  kasan_report+0x141/0x180
[   15.121670]  ? kasan_atomics_helper+0xc70/0x5450
[   15.121697]  kasan_check_range+0x10c/0x1c0
[   15.121722]  __kasan_check_write+0x18/0x20
[   15.121742]  kasan_atomics_helper+0xc70/0x5450
[   15.121766]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.121789]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.121814]  ? trace_hardirqs_on+0x37/0xe0
[   15.121836]  ? kasan_atomics+0x152/0x310
[   15.121863]  kasan_atomics+0x1dc/0x310
[   15.121886]  ? __pfx_kasan_atomics+0x10/0x10
[   15.121910]  ? __pfx_kasan_atomics+0x10/0x10
[   15.121938]  kunit_try_run_case+0x1a5/0x480
[   15.121962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.121985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.122011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.122035]  ? __kthread_parkme+0x82/0x180
[   15.122055]  ? preempt_count_sub+0x50/0x80
[   15.122080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.122104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.122129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.122154]  kthread+0x337/0x6f0
[   15.122174]  ? trace_preempt_on+0x20/0xc0
[   15.122196]  ? __pfx_kthread+0x10/0x10
[   15.122216]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.122239]  ? calculate_sigpending+0x7b/0xa0
[   15.122263]  ? __pfx_kthread+0x10/0x10
[   15.122285]  ret_from_fork+0x116/0x1d0
[   15.122305]  ? __pfx_kthread+0x10/0x10
[   15.122336]  ret_from_fork_asm+0x1a/0x30
[   15.122367]  </TASK>
[   15.122377] 
[   15.130322] Allocated by task 284:
[   15.130510]  kasan_save_stack+0x45/0x70
[   15.130732]  kasan_save_track+0x18/0x40
[   15.130923]  kasan_save_alloc_info+0x3b/0x50
[   15.131150]  __kasan_kmalloc+0xb7/0xc0
[   15.131336]  __kmalloc_cache_noprof+0x189/0x420
[   15.131530]  kasan_atomics+0x95/0x310
[   15.131715]  kunit_try_run_case+0x1a5/0x480
[   15.131930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.132178]  kthread+0x337/0x6f0
[   15.132365]  ret_from_fork+0x116/0x1d0
[   15.132515]  ret_from_fork_asm+0x1a/0x30
[   15.132706] 
[   15.132793] The buggy address belongs to the object at ffff888103a28200
[   15.132793]  which belongs to the cache kmalloc-64 of size 64
[   15.133330] The buggy address is located 0 bytes to the right of
[   15.133330]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.133897] 
[   15.133992] The buggy address belongs to the physical page:
[   15.134247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.134601] flags: 0x200000000000000(node=0|zone=2)
[   15.134832] page_type: f5(slab)
[   15.134976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.135207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.135438] page dumped because: kasan: bad access detected
[   15.136002] 
[   15.136098] Memory state around the buggy address:
[   15.136357]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.136727]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.137043] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.137365]                                      ^
[   15.137601]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.137908]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.138200] ==================================================================
[   14.641439] ==================================================================
[   14.642330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.642665] Read of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.643516] 
[   14.643650] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.643697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.643710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.643732] Call Trace:
[   14.643743]  <TASK>
[   14.643759]  dump_stack_lvl+0x73/0xb0
[   14.643790]  print_report+0xd1/0x610
[   14.643812]  ? __virt_addr_valid+0x1db/0x2d0
[   14.643835]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.643857]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.643879]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.643900]  kasan_report+0x141/0x180
[   14.643921]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.643947]  __asan_report_load4_noabort+0x18/0x20
[   14.643971]  kasan_atomics_helper+0x4bbc/0x5450
[   14.643992]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.644014]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.644039]  ? trace_hardirqs_on+0x37/0xe0
[   14.644060]  ? kasan_atomics+0x152/0x310
[   14.644086]  kasan_atomics+0x1dc/0x310
[   14.644108]  ? __pfx_kasan_atomics+0x10/0x10
[   14.644132]  ? __pfx_kasan_atomics+0x10/0x10
[   14.644157]  kunit_try_run_case+0x1a5/0x480
[   14.644182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.644204]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.644228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.644251]  ? __kthread_parkme+0x82/0x180
[   14.644272]  ? preempt_count_sub+0x50/0x80
[   14.644297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.644332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.644356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.644379]  kthread+0x337/0x6f0
[   14.644399]  ? trace_preempt_on+0x20/0xc0
[   14.644420]  ? __pfx_kthread+0x10/0x10
[   14.644440]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.644461]  ? calculate_sigpending+0x7b/0xa0
[   14.644485]  ? __pfx_kthread+0x10/0x10
[   14.644505]  ret_from_fork+0x116/0x1d0
[   14.644525]  ? __pfx_kthread+0x10/0x10
[   14.644545]  ret_from_fork_asm+0x1a/0x30
[   14.644575]  </TASK>
[   14.644585] 
[   14.654680] Allocated by task 284:
[   14.654817]  kasan_save_stack+0x45/0x70
[   14.655159]  kasan_save_track+0x18/0x40
[   14.655446]  kasan_save_alloc_info+0x3b/0x50
[   14.655941]  __kasan_kmalloc+0xb7/0xc0
[   14.656215]  __kmalloc_cache_noprof+0x189/0x420
[   14.656435]  kasan_atomics+0x95/0x310
[   14.656681]  kunit_try_run_case+0x1a5/0x480
[   14.656880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.657297]  kthread+0x337/0x6f0
[   14.657427]  ret_from_fork+0x116/0x1d0
[   14.657665]  ret_from_fork_asm+0x1a/0x30
[   14.657983] 
[   14.658099] The buggy address belongs to the object at ffff888103a28200
[   14.658099]  which belongs to the cache kmalloc-64 of size 64
[   14.658960] The buggy address is located 0 bytes to the right of
[   14.658960]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.659622] 
[   14.659808] The buggy address belongs to the physical page:
[   14.660120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.660450] flags: 0x200000000000000(node=0|zone=2)
[   14.660821] page_type: f5(slab)
[   14.660981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.661361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.661874] page dumped because: kasan: bad access detected
[   14.662176] 
[   14.662331] Memory state around the buggy address:
[   14.662875]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.663221]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.663616] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.663971]                                      ^
[   14.664408]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.664797]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.665173] ==================================================================
[   15.665197] ==================================================================
[   15.665643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.665952] Write of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.666265] 
[   15.666381] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.666426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.666439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.666458] Call Trace:
[   15.666472]  <TASK>
[   15.666506]  dump_stack_lvl+0x73/0xb0
[   15.666534]  print_report+0xd1/0x610
[   15.666556]  ? __virt_addr_valid+0x1db/0x2d0
[   15.666579]  ? kasan_atomics_helper+0x177f/0x5450
[   15.666600]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.666624]  ? kasan_atomics_helper+0x177f/0x5450
[   15.666647]  kasan_report+0x141/0x180
[   15.666669]  ? kasan_atomics_helper+0x177f/0x5450
[   15.666696]  kasan_check_range+0x10c/0x1c0
[   15.666720]  __kasan_check_write+0x18/0x20
[   15.666741]  kasan_atomics_helper+0x177f/0x5450
[   15.666764]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.666787]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.666812]  ? trace_hardirqs_on+0x37/0xe0
[   15.666834]  ? kasan_atomics+0x152/0x310
[   15.666860]  kasan_atomics+0x1dc/0x310
[   15.666884]  ? __pfx_kasan_atomics+0x10/0x10
[   15.666909]  ? __pfx_kasan_atomics+0x10/0x10
[   15.666936]  kunit_try_run_case+0x1a5/0x480
[   15.666961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.666984]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.667009]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.667033]  ? __kthread_parkme+0x82/0x180
[   15.667054]  ? preempt_count_sub+0x50/0x80
[   15.667079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.667103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.667129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.667154]  kthread+0x337/0x6f0
[   15.667174]  ? trace_preempt_on+0x20/0xc0
[   15.667197]  ? __pfx_kthread+0x10/0x10
[   15.667218]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.667240]  ? calculate_sigpending+0x7b/0xa0
[   15.667264]  ? __pfx_kthread+0x10/0x10
[   15.667286]  ret_from_fork+0x116/0x1d0
[   15.667306]  ? __pfx_kthread+0x10/0x10
[   15.667336]  ret_from_fork_asm+0x1a/0x30
[   15.667367]  </TASK>
[   15.667378] 
[   15.674724] Allocated by task 284:
[   15.674891]  kasan_save_stack+0x45/0x70
[   15.675096]  kasan_save_track+0x18/0x40
[   15.675258]  kasan_save_alloc_info+0x3b/0x50
[   15.675506]  __kasan_kmalloc+0xb7/0xc0
[   15.675660]  __kmalloc_cache_noprof+0x189/0x420
[   15.675878]  kasan_atomics+0x95/0x310
[   15.676054]  kunit_try_run_case+0x1a5/0x480
[   15.676205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.676472]  kthread+0x337/0x6f0
[   15.676649]  ret_from_fork+0x116/0x1d0
[   15.676836]  ret_from_fork_asm+0x1a/0x30
[   15.677004] 
[   15.677099] The buggy address belongs to the object at ffff888103a28200
[   15.677099]  which belongs to the cache kmalloc-64 of size 64
[   15.677524] The buggy address is located 0 bytes to the right of
[   15.677524]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.677893] 
[   15.677965] The buggy address belongs to the physical page:
[   15.678139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.678423] flags: 0x200000000000000(node=0|zone=2)
[   15.678685] page_type: f5(slab)
[   15.678848] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.679186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.679554] page dumped because: kasan: bad access detected
[   15.679800] 
[   15.679890] Memory state around the buggy address:
[   15.680116]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.680400]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.680644] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.680861]                                      ^
[   15.681088]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.681420]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.681767] ==================================================================
[   14.830970] ==================================================================
[   14.831407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.831810] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.832406] 
[   14.832633] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.832679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.832692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.832713] Call Trace:
[   14.832729]  <TASK>
[   14.832762]  dump_stack_lvl+0x73/0xb0
[   14.832794]  print_report+0xd1/0x610
[   14.832816]  ? __virt_addr_valid+0x1db/0x2d0
[   14.832839]  ? kasan_atomics_helper+0x565/0x5450
[   14.832861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.832885]  ? kasan_atomics_helper+0x565/0x5450
[   14.832908]  kasan_report+0x141/0x180
[   14.832931]  ? kasan_atomics_helper+0x565/0x5450
[   14.832965]  kasan_check_range+0x10c/0x1c0
[   14.832990]  __kasan_check_write+0x18/0x20
[   14.833010]  kasan_atomics_helper+0x565/0x5450
[   14.833035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.833058]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.833084]  ? trace_hardirqs_on+0x37/0xe0
[   14.833106]  ? kasan_atomics+0x152/0x310
[   14.833133]  kasan_atomics+0x1dc/0x310
[   14.833156]  ? __pfx_kasan_atomics+0x10/0x10
[   14.833180]  ? __pfx_kasan_atomics+0x10/0x10
[   14.833207]  kunit_try_run_case+0x1a5/0x480
[   14.833232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.833255]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.833279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.833303]  ? __kthread_parkme+0x82/0x180
[   14.833497]  ? preempt_count_sub+0x50/0x80
[   14.833534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.833560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.833586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.833620]  kthread+0x337/0x6f0
[   14.833639]  ? trace_preempt_on+0x20/0xc0
[   14.833662]  ? __pfx_kthread+0x10/0x10
[   14.833684]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.833705]  ? calculate_sigpending+0x7b/0xa0
[   14.833730]  ? __pfx_kthread+0x10/0x10
[   14.833751]  ret_from_fork+0x116/0x1d0
[   14.833770]  ? __pfx_kthread+0x10/0x10
[   14.833791]  ret_from_fork_asm+0x1a/0x30
[   14.833822]  </TASK>
[   14.833833] 
[   14.844386] Allocated by task 284:
[   14.844887]  kasan_save_stack+0x45/0x70
[   14.845405]  kasan_save_track+0x18/0x40
[   14.845715]  kasan_save_alloc_info+0x3b/0x50
[   14.845913]  __kasan_kmalloc+0xb7/0xc0
[   14.846807]  __kmalloc_cache_noprof+0x189/0x420
[   14.847266]  kasan_atomics+0x95/0x310
[   14.847639]  kunit_try_run_case+0x1a5/0x480
[   14.847840]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.848483]  kthread+0x337/0x6f0
[   14.848739]  ret_from_fork+0x116/0x1d0
[   14.849234]  ret_from_fork_asm+0x1a/0x30
[   14.849452] 
[   14.849766] The buggy address belongs to the object at ffff888103a28200
[   14.849766]  which belongs to the cache kmalloc-64 of size 64
[   14.851249] The buggy address is located 0 bytes to the right of
[   14.851249]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.852337] 
[   14.852518] The buggy address belongs to the physical page:
[   14.852755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.853416] flags: 0x200000000000000(node=0|zone=2)
[   14.853815] page_type: f5(slab)
[   14.853976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.854926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.855383] page dumped because: kasan: bad access detected
[   14.855775] 
[   14.855863] Memory state around the buggy address:
[   14.856379]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.856875]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.857645] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.858351]                                      ^
[   14.858736]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.859031]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.859295] ==================================================================
[   14.807484] ==================================================================
[   14.807825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.808459] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.808888] 
[   14.809020] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.809064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.809077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.809098] Call Trace:
[   14.809113]  <TASK>
[   14.809128]  dump_stack_lvl+0x73/0xb0
[   14.809156]  print_report+0xd1/0x610
[   14.809178]  ? __virt_addr_valid+0x1db/0x2d0
[   14.809201]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.809223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.809248]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.809272]  kasan_report+0x141/0x180
[   14.809295]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.809332]  __asan_report_store4_noabort+0x1b/0x30
[   14.809358]  kasan_atomics_helper+0x4b3a/0x5450
[   14.809381]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.809403]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.809428]  ? trace_hardirqs_on+0x37/0xe0
[   14.809450]  ? kasan_atomics+0x152/0x310
[   14.809478]  kasan_atomics+0x1dc/0x310
[   14.809600]  ? __pfx_kasan_atomics+0x10/0x10
[   14.809625]  ? __pfx_kasan_atomics+0x10/0x10
[   14.809665]  kunit_try_run_case+0x1a5/0x480
[   14.809689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.809713]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.809737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.809761]  ? __kthread_parkme+0x82/0x180
[   14.809781]  ? preempt_count_sub+0x50/0x80
[   14.809805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.809830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.809855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.809879]  kthread+0x337/0x6f0
[   14.809899]  ? trace_preempt_on+0x20/0xc0
[   14.809921]  ? __pfx_kthread+0x10/0x10
[   14.809941]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.809963]  ? calculate_sigpending+0x7b/0xa0
[   14.809987]  ? __pfx_kthread+0x10/0x10
[   14.810009]  ret_from_fork+0x116/0x1d0
[   14.810073]  ? __pfx_kthread+0x10/0x10
[   14.810095]  ret_from_fork_asm+0x1a/0x30
[   14.810125]  </TASK>
[   14.810136] 
[   14.820417] Allocated by task 284:
[   14.820746]  kasan_save_stack+0x45/0x70
[   14.820981]  kasan_save_track+0x18/0x40
[   14.821178]  kasan_save_alloc_info+0x3b/0x50
[   14.821611]  __kasan_kmalloc+0xb7/0xc0
[   14.821873]  __kmalloc_cache_noprof+0x189/0x420
[   14.822095]  kasan_atomics+0x95/0x310
[   14.822295]  kunit_try_run_case+0x1a5/0x480
[   14.822636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.822893]  kthread+0x337/0x6f0
[   14.823142]  ret_from_fork+0x116/0x1d0
[   14.823332]  ret_from_fork_asm+0x1a/0x30
[   14.823478] 
[   14.823702] The buggy address belongs to the object at ffff888103a28200
[   14.823702]  which belongs to the cache kmalloc-64 of size 64
[   14.824214] The buggy address is located 0 bytes to the right of
[   14.824214]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.825226] 
[   14.825383] The buggy address belongs to the physical page:
[   14.825814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.826342] flags: 0x200000000000000(node=0|zone=2)
[   14.826591] page_type: f5(slab)
[   14.826750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.827158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.827541] page dumped because: kasan: bad access detected
[   14.827827] 
[   14.827919] Memory state around the buggy address:
[   14.828287]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.828609]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.828980] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.829286]                                      ^
[   14.829700]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.830008]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.830456] ==================================================================
[   15.092266] ==================================================================
[   15.092697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.093386] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.094045] 
[   15.094164] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.094210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.094223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.094244] Call Trace:
[   15.094262]  <TASK>
[   15.094276]  dump_stack_lvl+0x73/0xb0
[   15.094319]  print_report+0xd1/0x610
[   15.094342]  ? __virt_addr_valid+0x1db/0x2d0
[   15.094365]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.094387]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.094410]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.094432]  kasan_report+0x141/0x180
[   15.094456]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.094482]  kasan_check_range+0x10c/0x1c0
[   15.094507]  __kasan_check_write+0x18/0x20
[   15.094526]  kasan_atomics_helper+0xb6a/0x5450
[   15.094549]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.094572]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.094598]  ? trace_hardirqs_on+0x37/0xe0
[   15.094620]  ? kasan_atomics+0x152/0x310
[   15.094647]  kasan_atomics+0x1dc/0x310
[   15.094670]  ? __pfx_kasan_atomics+0x10/0x10
[   15.094693]  ? __pfx_kasan_atomics+0x10/0x10
[   15.094720]  kunit_try_run_case+0x1a5/0x480
[   15.094745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.094768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.094793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.094816]  ? __kthread_parkme+0x82/0x180
[   15.094837]  ? preempt_count_sub+0x50/0x80
[   15.094861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.094885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.094910]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.094935]  kthread+0x337/0x6f0
[   15.094955]  ? trace_preempt_on+0x20/0xc0
[   15.094976]  ? __pfx_kthread+0x10/0x10
[   15.094997]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.095228]  ? calculate_sigpending+0x7b/0xa0
[   15.095339]  ? __pfx_kthread+0x10/0x10
[   15.095365]  ret_from_fork+0x116/0x1d0
[   15.095385]  ? __pfx_kthread+0x10/0x10
[   15.095407]  ret_from_fork_asm+0x1a/0x30
[   15.095438]  </TASK>
[   15.095449] 
[   15.106920] Allocated by task 284:
[   15.107188]  kasan_save_stack+0x45/0x70
[   15.107679]  kasan_save_track+0x18/0x40
[   15.107883]  kasan_save_alloc_info+0x3b/0x50
[   15.108244]  __kasan_kmalloc+0xb7/0xc0
[   15.108404]  __kmalloc_cache_noprof+0x189/0x420
[   15.108682]  kasan_atomics+0x95/0x310
[   15.108976]  kunit_try_run_case+0x1a5/0x480
[   15.109476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.109764]  kthread+0x337/0x6f0
[   15.110053]  ret_from_fork+0x116/0x1d0
[   15.110323]  ret_from_fork_asm+0x1a/0x30
[   15.110591] 
[   15.110713] The buggy address belongs to the object at ffff888103a28200
[   15.110713]  which belongs to the cache kmalloc-64 of size 64
[   15.111608] The buggy address is located 0 bytes to the right of
[   15.111608]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.112273] 
[   15.112393] The buggy address belongs to the physical page:
[   15.112651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.113288] flags: 0x200000000000000(node=0|zone=2)
[   15.113682] page_type: f5(slab)
[   15.113850] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.114151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.114807] page dumped because: kasan: bad access detected
[   15.115106] 
[   15.115424] Memory state around the buggy address:
[   15.115828]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.116365]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.116644] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.117076]                                      ^
[   15.117428]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.117960]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.118493] ==================================================================
[   14.665891] ==================================================================
[   14.666387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.666878] Write of size 4 at addr ffff888103a28230 by task kunit_try_catch/284
[   14.667227] 
[   14.667463] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.667524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.667537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.667557] Call Trace:
[   14.667568]  <TASK>
[   14.667582]  dump_stack_lvl+0x73/0xb0
[   14.667611]  print_report+0xd1/0x610
[   14.667632]  ? __virt_addr_valid+0x1db/0x2d0
[   14.667654]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.667675]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.667698]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.667720]  kasan_report+0x141/0x180
[   14.667741]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.667769]  __asan_report_store4_noabort+0x1b/0x30
[   14.667794]  kasan_atomics_helper+0x4ba2/0x5450
[   14.667816]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.667879]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.667904]  ? trace_hardirqs_on+0x37/0xe0
[   14.667925]  ? kasan_atomics+0x152/0x310
[   14.667962]  kasan_atomics+0x1dc/0x310
[   14.667984]  ? __pfx_kasan_atomics+0x10/0x10
[   14.668006]  ? __pfx_kasan_atomics+0x10/0x10
[   14.668082]  kunit_try_run_case+0x1a5/0x480
[   14.668108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.668131]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.668156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.668179]  ? __kthread_parkme+0x82/0x180
[   14.668200]  ? preempt_count_sub+0x50/0x80
[   14.668257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.668280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.668320]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.668344]  kthread+0x337/0x6f0
[   14.668364]  ? trace_preempt_on+0x20/0xc0
[   14.668385]  ? __pfx_kthread+0x10/0x10
[   14.668405]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.668426]  ? calculate_sigpending+0x7b/0xa0
[   14.668450]  ? __pfx_kthread+0x10/0x10
[   14.668470]  ret_from_fork+0x116/0x1d0
[   14.668489]  ? __pfx_kthread+0x10/0x10
[   14.668509]  ret_from_fork_asm+0x1a/0x30
[   14.668538]  </TASK>
[   14.668548] 
[   14.677991] Allocated by task 284:
[   14.678327]  kasan_save_stack+0x45/0x70
[   14.678525]  kasan_save_track+0x18/0x40
[   14.678661]  kasan_save_alloc_info+0x3b/0x50
[   14.678810]  __kasan_kmalloc+0xb7/0xc0
[   14.678943]  __kmalloc_cache_noprof+0x189/0x420
[   14.679435]  kasan_atomics+0x95/0x310
[   14.679744]  kunit_try_run_case+0x1a5/0x480
[   14.679971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.680189]  kthread+0x337/0x6f0
[   14.680317]  ret_from_fork+0x116/0x1d0
[   14.680557]  ret_from_fork_asm+0x1a/0x30
[   14.680802] 
[   14.681012] The buggy address belongs to the object at ffff888103a28200
[   14.681012]  which belongs to the cache kmalloc-64 of size 64
[   14.681758] The buggy address is located 0 bytes to the right of
[   14.681758]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   14.682452] 
[   14.682572] The buggy address belongs to the physical page:
[   14.682869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   14.683112] flags: 0x200000000000000(node=0|zone=2)
[   14.683278] page_type: f5(slab)
[   14.683408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.683959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.684337] page dumped because: kasan: bad access detected
[   14.684593] 
[   14.684685] Memory state around the buggy address:
[   14.684840]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.685174]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.685472] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.685757]                                      ^
[   14.685937]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.686231]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.686782] ==================================================================
[   15.838258] ==================================================================
[   15.838927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.839901] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.840338] 
[   15.840436] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.840483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.840496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.840520] Call Trace:
[   15.840536]  <TASK>
[   15.840552]  dump_stack_lvl+0x73/0xb0
[   15.840581]  print_report+0xd1/0x610
[   15.840603]  ? __virt_addr_valid+0x1db/0x2d0
[   15.840628]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.840652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.840676]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.840699]  kasan_report+0x141/0x180
[   15.840721]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.840749]  __asan_report_load8_noabort+0x18/0x20
[   15.840775]  kasan_atomics_helper+0x4f30/0x5450
[   15.840800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.840822]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.840849]  ? trace_hardirqs_on+0x37/0xe0
[   15.840872]  ? kasan_atomics+0x152/0x310
[   15.840899]  kasan_atomics+0x1dc/0x310
[   15.840923]  ? __pfx_kasan_atomics+0x10/0x10
[   15.840947]  ? __pfx_kasan_atomics+0x10/0x10
[   15.840980]  kunit_try_run_case+0x1a5/0x480
[   15.841005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.841028]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.841052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.841076]  ? __kthread_parkme+0x82/0x180
[   15.841098]  ? preempt_count_sub+0x50/0x80
[   15.841122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.841147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.841173]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.841197]  kthread+0x337/0x6f0
[   15.841217]  ? trace_preempt_on+0x20/0xc0
[   15.841239]  ? __pfx_kthread+0x10/0x10
[   15.841259]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.841281]  ? calculate_sigpending+0x7b/0xa0
[   15.841306]  ? __pfx_kthread+0x10/0x10
[   15.841338]  ret_from_fork+0x116/0x1d0
[   15.841357]  ? __pfx_kthread+0x10/0x10
[   15.841377]  ret_from_fork_asm+0x1a/0x30
[   15.841408]  </TASK>
[   15.841419] 
[   15.855196] Allocated by task 284:
[   15.855686]  kasan_save_stack+0x45/0x70
[   15.855899]  kasan_save_track+0x18/0x40
[   15.856083]  kasan_save_alloc_info+0x3b/0x50
[   15.856285]  __kasan_kmalloc+0xb7/0xc0
[   15.856481]  __kmalloc_cache_noprof+0x189/0x420
[   15.857027]  kasan_atomics+0x95/0x310
[   15.857340]  kunit_try_run_case+0x1a5/0x480
[   15.857737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.858089]  kthread+0x337/0x6f0
[   15.858270]  ret_from_fork+0x116/0x1d0
[   15.858455]  ret_from_fork_asm+0x1a/0x30
[   15.858886] 
[   15.858979] The buggy address belongs to the object at ffff888103a28200
[   15.858979]  which belongs to the cache kmalloc-64 of size 64
[   15.859499] The buggy address is located 0 bytes to the right of
[   15.859499]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   15.860359] 
[   15.860465] The buggy address belongs to the physical page:
[   15.860896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   15.861384] flags: 0x200000000000000(node=0|zone=2)
[   15.861803] page_type: f5(slab)
[   15.861980] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.862550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.863331] page dumped because: kasan: bad access detected
[   15.863918] 
[   15.864085] Memory state around the buggy address:
[   15.864583]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.864916]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.865145] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.865377]                                      ^
[   15.865931]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.866714]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.867464] ==================================================================
[   15.996658] ==================================================================
[   15.997029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.997358] Read of size 8 at addr ffff888103a28230 by task kunit_try_catch/284
[   15.997730] 
[   15.997841] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.997884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.997896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.997950] Call Trace:
[   15.997966]  <TASK>
[   15.997980]  dump_stack_lvl+0x73/0xb0
[   15.998033]  print_report+0xd1/0x610
[   15.998056]  ? __virt_addr_valid+0x1db/0x2d0
[   15.998089]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.998111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.998135]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.998157]  kasan_report+0x141/0x180
[   15.998181]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.998208]  __asan_report_load8_noabort+0x18/0x20
[   15.998263]  kasan_atomics_helper+0x4f71/0x5450
[   15.998298]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.998340]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.998365]  ? trace_hardirqs_on+0x37/0xe0
[   15.998387]  ? kasan_atomics+0x152/0x310
[   15.998414]  kasan_atomics+0x1dc/0x310
[   15.998437]  ? __pfx_kasan_atomics+0x10/0x10
[   15.998461]  ? __pfx_kasan_atomics+0x10/0x10
[   15.998509]  kunit_try_run_case+0x1a5/0x480
[   15.998533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.998556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.998580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.998604]  ? __kthread_parkme+0x82/0x180
[   15.998624]  ? preempt_count_sub+0x50/0x80
[   15.998650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.998674]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.998699]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.998724]  kthread+0x337/0x6f0
[   15.998744]  ? trace_preempt_on+0x20/0xc0
[   15.998766]  ? __pfx_kthread+0x10/0x10
[   15.998786]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.998808]  ? calculate_sigpending+0x7b/0xa0
[   15.998832]  ? __pfx_kthread+0x10/0x10
[   15.998854]  ret_from_fork+0x116/0x1d0
[   15.998873]  ? __pfx_kthread+0x10/0x10
[   15.998894]  ret_from_fork_asm+0x1a/0x30
[   15.998925]  </TASK>
[   15.998935] 
[   16.006600] Allocated by task 284:
[   16.006733]  kasan_save_stack+0x45/0x70
[   16.006902]  kasan_save_track+0x18/0x40
[   16.007143]  kasan_save_alloc_info+0x3b/0x50
[   16.007397]  __kasan_kmalloc+0xb7/0xc0
[   16.007639]  __kmalloc_cache_noprof+0x189/0x420
[   16.007866]  kasan_atomics+0x95/0x310
[   16.008117]  kunit_try_run_case+0x1a5/0x480
[   16.008355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.008582]  kthread+0x337/0x6f0
[   16.008728]  ret_from_fork+0x116/0x1d0
[   16.009012]  ret_from_fork_asm+0x1a/0x30
[   16.009280] 
[   16.009405] The buggy address belongs to the object at ffff888103a28200
[   16.009405]  which belongs to the cache kmalloc-64 of size 64
[   16.009958] The buggy address is located 0 bytes to the right of
[   16.009958]  allocated 48-byte region [ffff888103a28200, ffff888103a28230)
[   16.010504] 
[   16.010648] The buggy address belongs to the physical page:
[   16.010860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a28
[   16.011103] flags: 0x200000000000000(node=0|zone=2)
[   16.011383] page_type: f5(slab)
[   16.011575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.011923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.012218] page dumped because: kasan: bad access detected
[   16.012401] 
[   16.012547] Memory state around the buggy address:
[   16.012787]  ffff888103a28100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.013206]  ffff888103a28180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.013543] >ffff888103a28200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.013775]                                      ^
[   16.014003]  ffff888103a28280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.014409]  ffff888103a28300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.014867] ==================================================================