Hay
Date
July 20, 2025, 11:12 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.184125] ==================================================================
[   18.184246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.184486] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.184786] 
[   18.184885] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.184974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.185002] Hardware name: linux,dummy-virt (DT)
[   18.185035] Call trace:
[   18.185259]  show_stack+0x20/0x38 (C)
[   18.185384]  dump_stack_lvl+0x8c/0xd0
[   18.185433]  print_report+0x118/0x5d0
[   18.185480]  kasan_report+0xdc/0x128
[   18.185535]  kasan_check_range+0x100/0x1a8
[   18.186110]  __kasan_check_read+0x20/0x30
[   18.186349]  kasan_atomics_helper+0xdd4/0x4858
[   18.186411]  kasan_atomics+0x198/0x2e0
[   18.186743]  kunit_try_run_case+0x170/0x3f0
[   18.186929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.186993]  kthread+0x328/0x630
[   18.187038]  ret_from_fork+0x10/0x20
[   18.187094] 
[   18.187115] Allocated by task 265:
[   18.187360]  kasan_save_stack+0x3c/0x68
[   18.187617]  kasan_save_track+0x20/0x40
[   18.187823]  kasan_save_alloc_info+0x40/0x58
[   18.188061]  __kasan_kmalloc+0xd4/0xd8
[   18.188215]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.188265]  kasan_atomics+0xb8/0x2e0
[   18.188320]  kunit_try_run_case+0x170/0x3f0
[   18.188363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.188425]  kthread+0x328/0x630
[   18.188461]  ret_from_fork+0x10/0x20
[   18.188508] 
[   18.188532] The buggy address belongs to the object at fff00000c78be300
[   18.188532]  which belongs to the cache kmalloc-64 of size 64
[   18.188594] The buggy address is located 0 bytes to the right of
[   18.188594]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.188660] 
[   18.188694] The buggy address belongs to the physical page:
[   18.188730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.188795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.188852] page_type: f5(slab)
[   18.188901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.188963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.189005] page dumped because: kasan: bad access detected
[   18.189049] 
[   18.189087] Memory state around the buggy address:
[   18.189121]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.189174]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.189228] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.189275]                                      ^
[   18.189310]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.189355]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.189401] ==================================================================
[   18.209514] ==================================================================
[   18.209747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.210029] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.210093] 
[   18.210126] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.210638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.210700] Hardware name: linux,dummy-virt (DT)
[   18.210736] Call trace:
[   18.210868]  show_stack+0x20/0x38 (C)
[   18.210934]  dump_stack_lvl+0x8c/0xd0
[   18.210989]  print_report+0x118/0x5d0
[   18.211039]  kasan_report+0xdc/0x128
[   18.211089]  __asan_report_store8_noabort+0x20/0x30
[   18.211779]  kasan_atomics_helper+0x3e5c/0x4858
[   18.211897]  kasan_atomics+0x198/0x2e0
[   18.211986]  kunit_try_run_case+0x170/0x3f0
[   18.212223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.212584]  kthread+0x328/0x630
[   18.212747]  ret_from_fork+0x10/0x20
[   18.213146] 
[   18.213313] Allocated by task 265:
[   18.213416]  kasan_save_stack+0x3c/0x68
[   18.213504]  kasan_save_track+0x20/0x40
[   18.213556]  kasan_save_alloc_info+0x40/0x58
[   18.213811]  __kasan_kmalloc+0xd4/0xd8
[   18.213992]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.214123]  kasan_atomics+0xb8/0x2e0
[   18.214213]  kunit_try_run_case+0x170/0x3f0
[   18.214410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.214648]  kthread+0x328/0x630
[   18.214728]  ret_from_fork+0x10/0x20
[   18.214887] 
[   18.214911] The buggy address belongs to the object at fff00000c78be300
[   18.214911]  which belongs to the cache kmalloc-64 of size 64
[   18.215112] The buggy address is located 0 bytes to the right of
[   18.215112]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.215348] 
[   18.215375] The buggy address belongs to the physical page:
[   18.215409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.215855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.216038] page_type: f5(slab)
[   18.216127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.216432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.216617] page dumped because: kasan: bad access detected
[   18.216836] 
[   18.217013] Memory state around the buggy address:
[   18.217065]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.217150]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.217337] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.217603]                                      ^
[   18.217809]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.218156]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.218567] ==================================================================
[   18.061419] ==================================================================
[   18.061507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   18.061560] Write of size 4 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.061614] 
[   18.061960] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.062184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.062226] Hardware name: linux,dummy-virt (DT)
[   18.062273] Call trace:
[   18.062301]  show_stack+0x20/0x38 (C)
[   18.062352]  dump_stack_lvl+0x8c/0xd0
[   18.062400]  print_report+0x118/0x5d0
[   18.062591]  kasan_report+0xdc/0x128
[   18.062801]  kasan_check_range+0x100/0x1a8
[   18.063032]  __kasan_check_write+0x20/0x30
[   18.063249]  kasan_atomics_helper+0x99c/0x4858
[   18.063454]  kasan_atomics+0x198/0x2e0
[   18.063575]  kunit_try_run_case+0x170/0x3f0
[   18.063964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.064059]  kthread+0x328/0x630
[   18.064192]  ret_from_fork+0x10/0x20
[   18.064309] 
[   18.064440] Allocated by task 265:
[   18.064511]  kasan_save_stack+0x3c/0x68
[   18.064690]  kasan_save_track+0x20/0x40
[   18.064769]  kasan_save_alloc_info+0x40/0x58
[   18.065129]  __kasan_kmalloc+0xd4/0xd8
[   18.065302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.065481]  kasan_atomics+0xb8/0x2e0
[   18.065572]  kunit_try_run_case+0x170/0x3f0
[   18.065916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.066263]  kthread+0x328/0x630
[   18.066361]  ret_from_fork+0x10/0x20
[   18.066700] 
[   18.066832] The buggy address belongs to the object at fff00000c78be300
[   18.066832]  which belongs to the cache kmalloc-64 of size 64
[   18.066957] The buggy address is located 0 bytes to the right of
[   18.066957]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.067089] 
[   18.067148] The buggy address belongs to the physical page:
[   18.067289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.067346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.067403] page_type: f5(slab)
[   18.067449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.067731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.067971] page dumped because: kasan: bad access detected
[   18.068139] 
[   18.068221] Memory state around the buggy address:
[   18.068343]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.068507]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.068856] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.068973]                                      ^
[   18.069044]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.069181]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.069270] ==================================================================
[   18.080449] ==================================================================
[   18.080524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   18.080579] Write of size 4 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.080926] 
[   18.080976] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.081065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.081094] Hardware name: linux,dummy-virt (DT)
[   18.081126] Call trace:
[   18.081151]  show_stack+0x20/0x38 (C)
[   18.081202]  dump_stack_lvl+0x8c/0xd0
[   18.081250]  print_report+0x118/0x5d0
[   18.081299]  kasan_report+0xdc/0x128
[   18.081363]  kasan_check_range+0x100/0x1a8
[   18.081415]  __kasan_check_write+0x20/0x30
[   18.081463]  kasan_atomics_helper+0xa6c/0x4858
[   18.081522]  kasan_atomics+0x198/0x2e0
[   18.081580]  kunit_try_run_case+0x170/0x3f0
[   18.081628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.081696]  kthread+0x328/0x630
[   18.081747]  ret_from_fork+0x10/0x20
[   18.081809] 
[   18.081832] Allocated by task 265:
[   18.081868]  kasan_save_stack+0x3c/0x68
[   18.081913]  kasan_save_track+0x20/0x40
[   18.081953]  kasan_save_alloc_info+0x40/0x58
[   18.082004]  __kasan_kmalloc+0xd4/0xd8
[   18.082045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.082087]  kasan_atomics+0xb8/0x2e0
[   18.082125]  kunit_try_run_case+0x170/0x3f0
[   18.082174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.082220]  kthread+0x328/0x630
[   18.082263]  ret_from_fork+0x10/0x20
[   18.082307] 
[   18.082329] The buggy address belongs to the object at fff00000c78be300
[   18.082329]  which belongs to the cache kmalloc-64 of size 64
[   18.082394] The buggy address is located 0 bytes to the right of
[   18.082394]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.082474] 
[   18.082499] The buggy address belongs to the physical page:
[   18.082542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.082596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.082647] page_type: f5(slab)
[   18.082696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.083162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.083221] page dumped because: kasan: bad access detected
[   18.083297] 
[   18.083321] Memory state around the buggy address:
[   18.083758]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.083828]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.083910] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.083990]                                      ^
[   18.084037]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.084272]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.084453] ==================================================================
[   18.403791] ==================================================================
[   18.403899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.404084] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.404146] 
[   18.404272] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.404394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.404492] Hardware name: linux,dummy-virt (DT)
[   18.404554] Call trace:
[   18.404581]  show_stack+0x20/0x38 (C)
[   18.404649]  dump_stack_lvl+0x8c/0xd0
[   18.405047]  print_report+0x118/0x5d0
[   18.405288]  kasan_report+0xdc/0x128
[   18.405352]  __asan_report_load8_noabort+0x20/0x30
[   18.405406]  kasan_atomics_helper+0x3df4/0x4858
[   18.405599]  kasan_atomics+0x198/0x2e0
[   18.405768]  kunit_try_run_case+0x170/0x3f0
[   18.405823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.405885]  kthread+0x328/0x630
[   18.405928]  ret_from_fork+0x10/0x20
[   18.405976] 
[   18.405997] Allocated by task 265:
[   18.406421]  kasan_save_stack+0x3c/0x68
[   18.406574]  kasan_save_track+0x20/0x40
[   18.406623]  kasan_save_alloc_info+0x40/0x58
[   18.406850]  __kasan_kmalloc+0xd4/0xd8
[   18.406894]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.406950]  kasan_atomics+0xb8/0x2e0
[   18.406989]  kunit_try_run_case+0x170/0x3f0
[   18.407286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.407344]  kthread+0x328/0x630
[   18.407517]  ret_from_fork+0x10/0x20
[   18.407705] 
[   18.407751] The buggy address belongs to the object at fff00000c78be300
[   18.407751]  which belongs to the cache kmalloc-64 of size 64
[   18.408115] The buggy address is located 0 bytes to the right of
[   18.408115]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.408259] 
[   18.408319] The buggy address belongs to the physical page:
[   18.408484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.408579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.408755] page_type: f5(slab)
[   18.408803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.408857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.408908] page dumped because: kasan: bad access detected
[   18.409100] 
[   18.409396] Memory state around the buggy address:
[   18.409784]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.410013]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.410097] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.410522]                                      ^
[   18.410828]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.411101]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.411188] ==================================================================
[   18.155994] ==================================================================
[   18.156048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.156102] Read of size 4 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.156736] 
[   18.157063] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.157404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.157550] Hardware name: linux,dummy-virt (DT)
[   18.157606] Call trace:
[   18.157632]  show_stack+0x20/0x38 (C)
[   18.157793]  dump_stack_lvl+0x8c/0xd0
[   18.157865]  print_report+0x118/0x5d0
[   18.158056]  kasan_report+0xdc/0x128
[   18.158119]  __asan_report_load4_noabort+0x20/0x30
[   18.158174]  kasan_atomics_helper+0x3dd8/0x4858
[   18.158355]  kasan_atomics+0x198/0x2e0
[   18.158417]  kunit_try_run_case+0x170/0x3f0
[   18.158466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.158823]  kthread+0x328/0x630
[   18.158977]  ret_from_fork+0x10/0x20
[   18.159034] 
[   18.159112] Allocated by task 265:
[   18.159223]  kasan_save_stack+0x3c/0x68
[   18.159446]  kasan_save_track+0x20/0x40
[   18.159755]  kasan_save_alloc_info+0x40/0x58
[   18.160018]  __kasan_kmalloc+0xd4/0xd8
[   18.160360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.160554]  kasan_atomics+0xb8/0x2e0
[   18.160696]  kunit_try_run_case+0x170/0x3f0
[   18.160965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.161196]  kthread+0x328/0x630
[   18.161312]  ret_from_fork+0x10/0x20
[   18.161392] 
[   18.161465] The buggy address belongs to the object at fff00000c78be300
[   18.161465]  which belongs to the cache kmalloc-64 of size 64
[   18.161650] The buggy address is located 0 bytes to the right of
[   18.161650]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.161907] 
[   18.161943] The buggy address belongs to the physical page:
[   18.162042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.162201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.162438] page_type: f5(slab)
[   18.162580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.162649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.162753] page dumped because: kasan: bad access detected
[   18.162942] 
[   18.162968] Memory state around the buggy address:
[   18.163198]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.163582]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.163733] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.163838]                                      ^
[   18.164036]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.164398]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.164487] ==================================================================
[   18.254566] ==================================================================
[   18.254650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.255174] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.255296] 
[   18.255420] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.255567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.255739] Hardware name: linux,dummy-virt (DT)
[   18.255986] Call trace:
[   18.256134]  show_stack+0x20/0x38 (C)
[   18.256210]  dump_stack_lvl+0x8c/0xd0
[   18.256718]  print_report+0x118/0x5d0
[   18.256790]  kasan_report+0xdc/0x128
[   18.256875]  kasan_check_range+0x100/0x1a8
[   18.257290]  __kasan_check_write+0x20/0x30
[   18.257414]  kasan_atomics_helper+0x1058/0x4858
[   18.257684]  kasan_atomics+0x198/0x2e0
[   18.257940]  kunit_try_run_case+0x170/0x3f0
[   18.258092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.258190]  kthread+0x328/0x630
[   18.258557]  ret_from_fork+0x10/0x20
[   18.258772] 
[   18.258808] Allocated by task 265:
[   18.258840]  kasan_save_stack+0x3c/0x68
[   18.259093]  kasan_save_track+0x20/0x40
[   18.259291]  kasan_save_alloc_info+0x40/0x58
[   18.259522]  __kasan_kmalloc+0xd4/0xd8
[   18.260242]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.260307]  kasan_atomics+0xb8/0x2e0
[   18.260366]  kunit_try_run_case+0x170/0x3f0
[   18.260540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.260634]  kthread+0x328/0x630
[   18.260848]  ret_from_fork+0x10/0x20
[   18.261216] 
[   18.261387] The buggy address belongs to the object at fff00000c78be300
[   18.261387]  which belongs to the cache kmalloc-64 of size 64
[   18.261687] The buggy address is located 0 bytes to the right of
[   18.261687]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.261905] 
[   18.261931] The buggy address belongs to the physical page:
[   18.262191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.262554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.262784] page_type: f5(slab)
[   18.262921] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.263153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.263419] page dumped because: kasan: bad access detected
[   18.263488] 
[   18.263532] Memory state around the buggy address:
[   18.263846]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.264200]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.264392] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.264609]                                      ^
[   18.264838]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.264975]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.265057] ==================================================================
[   18.311946] ==================================================================
[   18.312009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.312061] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.312427] 
[   18.312478] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.312807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.313029] Hardware name: linux,dummy-virt (DT)
[   18.313073] Call trace:
[   18.313127]  show_stack+0x20/0x38 (C)
[   18.313365]  dump_stack_lvl+0x8c/0xd0
[   18.313424]  print_report+0x118/0x5d0
[   18.313498]  kasan_report+0xdc/0x128
[   18.313546]  kasan_check_range+0x100/0x1a8
[   18.313954]  __kasan_check_write+0x20/0x30
[   18.314194]  kasan_atomics_helper+0x12d8/0x4858
[   18.314501]  kasan_atomics+0x198/0x2e0
[   18.314618]  kunit_try_run_case+0x170/0x3f0
[   18.314690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.314745]  kthread+0x328/0x630
[   18.314990]  ret_from_fork+0x10/0x20
[   18.315094] 
[   18.315191] Allocated by task 265:
[   18.315263]  kasan_save_stack+0x3c/0x68
[   18.315327]  kasan_save_track+0x20/0x40
[   18.315374]  kasan_save_alloc_info+0x40/0x58
[   18.315415]  __kasan_kmalloc+0xd4/0xd8
[   18.315704]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.316143]  kasan_atomics+0xb8/0x2e0
[   18.316242]  kunit_try_run_case+0x170/0x3f0
[   18.316366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.317067]  kthread+0x328/0x630
[   18.317137]  ret_from_fork+0x10/0x20
[   18.317211] 
[   18.317256] The buggy address belongs to the object at fff00000c78be300
[   18.317256]  which belongs to the cache kmalloc-64 of size 64
[   18.317481] The buggy address is located 0 bytes to the right of
[   18.317481]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.317571] 
[   18.317595] The buggy address belongs to the physical page:
[   18.317976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.318337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.318517] page_type: f5(slab)
[   18.318869] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.319216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.319348] page dumped because: kasan: bad access detected
[   18.319389] 
[   18.319411] Memory state around the buggy address:
[   18.319447]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.319494]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.319539] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.319632]                                      ^
[   18.319695]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.319750]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.319805] ==================================================================
[   18.266440] ==================================================================
[   18.266495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.266548] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.266601] 
[   18.266634] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.266733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.266762] Hardware name: linux,dummy-virt (DT)
[   18.266804] Call trace:
[   18.266830]  show_stack+0x20/0x38 (C)
[   18.266881]  dump_stack_lvl+0x8c/0xd0
[   18.266929]  print_report+0x118/0x5d0
[   18.266985]  kasan_report+0xdc/0x128
[   18.267708]  kasan_check_range+0x100/0x1a8
[   18.267799]  __kasan_check_write+0x20/0x30
[   18.267876]  kasan_atomics_helper+0x10c0/0x4858
[   18.268142]  kasan_atomics+0x198/0x2e0
[   18.268249]  kunit_try_run_case+0x170/0x3f0
[   18.268414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.268476]  kthread+0x328/0x630
[   18.268519]  ret_from_fork+0x10/0x20
[   18.268943] 
[   18.269127] Allocated by task 265:
[   18.269319]  kasan_save_stack+0x3c/0x68
[   18.269487]  kasan_save_track+0x20/0x40
[   18.269571]  kasan_save_alloc_info+0x40/0x58
[   18.269712]  __kasan_kmalloc+0xd4/0xd8
[   18.269753]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.270120]  kasan_atomics+0xb8/0x2e0
[   18.270887]  kunit_try_run_case+0x170/0x3f0
[   18.270944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.271025]  kthread+0x328/0x630
[   18.271080]  ret_from_fork+0x10/0x20
[   18.271159] 
[   18.271294] The buggy address belongs to the object at fff00000c78be300
[   18.271294]  which belongs to the cache kmalloc-64 of size 64
[   18.271700] The buggy address is located 0 bytes to the right of
[   18.271700]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.271805] 
[   18.272076] The buggy address belongs to the physical page:
[   18.272127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.272417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.272788] page_type: f5(slab)
[   18.273003] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.273088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.273396] page dumped because: kasan: bad access detected
[   18.273653] 
[   18.273843] Memory state around the buggy address:
[   18.274119]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.274492]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.274993] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.275156]                                      ^
[   18.275444]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.275798]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.275850] ==================================================================
[   18.350005] ==================================================================
[   18.350307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.350393] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.350620] 
[   18.350776] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.351027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.351079] Hardware name: linux,dummy-virt (DT)
[   18.351182] Call trace:
[   18.351397]  show_stack+0x20/0x38 (C)
[   18.351531]  dump_stack_lvl+0x8c/0xd0
[   18.351594]  print_report+0x118/0x5d0
[   18.351641]  kasan_report+0xdc/0x128
[   18.351821]  kasan_check_range+0x100/0x1a8
[   18.352055]  __kasan_check_write+0x20/0x30
[   18.352137]  kasan_atomics_helper+0x147c/0x4858
[   18.352493]  kasan_atomics+0x198/0x2e0
[   18.352738]  kunit_try_run_case+0x170/0x3f0
[   18.352922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.353030]  kthread+0x328/0x630
[   18.353092]  ret_from_fork+0x10/0x20
[   18.353141] 
[   18.353501] Allocated by task 265:
[   18.353774]  kasan_save_stack+0x3c/0x68
[   18.354161]  kasan_save_track+0x20/0x40
[   18.354268]  kasan_save_alloc_info+0x40/0x58
[   18.354332]  __kasan_kmalloc+0xd4/0xd8
[   18.354414]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.354464]  kasan_atomics+0xb8/0x2e0
[   18.354501]  kunit_try_run_case+0x170/0x3f0
[   18.354553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.354611]  kthread+0x328/0x630
[   18.354645]  ret_from_fork+0x10/0x20
[   18.354697] 
[   18.354731] The buggy address belongs to the object at fff00000c78be300
[   18.354731]  which belongs to the cache kmalloc-64 of size 64
[   18.354792] The buggy address is located 0 bytes to the right of
[   18.354792]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.354867] 
[   18.354898] The buggy address belongs to the physical page:
[   18.354933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.354986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.355035] page_type: f5(slab)
[   18.355315] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.355827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.355898] page dumped because: kasan: bad access detected
[   18.355933] 
[   18.355956] Memory state around the buggy address:
[   18.355991]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.356690]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.356933] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.357054]                                      ^
[   18.357428]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.357724]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.357945] ==================================================================
[   18.042038] ==================================================================
[   18.042092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   18.042144] Read of size 4 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.042196] 
[   18.042837] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.042968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.043040] Hardware name: linux,dummy-virt (DT)
[   18.043105] Call trace:
[   18.043170]  show_stack+0x20/0x38 (C)
[   18.043293]  dump_stack_lvl+0x8c/0xd0
[   18.043382]  print_report+0x118/0x5d0
[   18.043701]  kasan_report+0xdc/0x128
[   18.043880]  __asan_report_load4_noabort+0x20/0x30
[   18.044015]  kasan_atomics_helper+0x42d8/0x4858
[   18.044172]  kasan_atomics+0x198/0x2e0
[   18.044264]  kunit_try_run_case+0x170/0x3f0
[   18.044597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.044761]  kthread+0x328/0x630
[   18.044847]  ret_from_fork+0x10/0x20
[   18.045604]  kasan_save_track+0x20/0x40
[   18.045991]  kasan_save_alloc_info+0x40/0x58
[   18.046541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.047734] The buggy address is located 0 bytes to the right of
[   18.047734]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.048229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.048487] page dumped because: kasan: bad access detected
[   18.049370]                                      ^
[   18.053284] 
[   18.053996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.054040] Hardware name: linux,dummy-virt (DT)
[   18.054079] Call trace:
[   18.054105]  show_stack+0x20/0x38 (C)
[   18.054200]  dump_stack_lvl+0x8c/0xd0
[   18.054250]  print_report+0x118/0x5d0
[   18.054616]  kasan_report+0xdc/0x128
[   18.054741]  kasan_check_range+0x100/0x1a8
[   18.054793]  __kasan_check_write+0x20/0x30
[   18.054839]  kasan_atomics_helper+0x934/0x4858
[   18.055126]  kasan_atomics+0x198/0x2e0
[   18.055320]  kunit_try_run_case+0x170/0x3f0
[   18.055385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.055610]  kthread+0x328/0x630
[   18.055712]  ret_from_fork+0x10/0x20
[   18.055931] 
[   18.056006] Allocated by task 265:
[   18.056124]  kasan_save_stack+0x3c/0x68
[   18.056364]  kasan_save_track+0x20/0x40
[   18.056873]  kasan_save_alloc_info+0x40/0x58
[   18.057021]  __kasan_kmalloc+0xd4/0xd8
[   18.057066]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.057133]  kasan_atomics+0xb8/0x2e0
[   18.057174]  kunit_try_run_case+0x170/0x3f0
[   18.057226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.057279]  kthread+0x328/0x630
[   18.057324]  ret_from_fork+0x10/0x20
[   18.057362] 
[   18.057400] The buggy address belongs to the object at fff00000c78be300
[   18.057400]  which belongs to the cache kmalloc-64 of size 64
[   18.057471] The buggy address is located 0 bytes to the right of
[   18.057471]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.057547] 
[   18.057577] The buggy address belongs to the physical page:
[   18.057627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.057720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.057791] page_type: f5(slab)
[   18.057867] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.058419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.058684] page dumped because: kasan: bad access detected
[   18.058752] 
[   18.058791] Memory state around the buggy address:
[   18.059019]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.059203]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.059378] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.059563]                                      ^
[   18.059790]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.059841]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.060243] ==================================================================
[   18.330487] ==================================================================
[   18.330541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.330593] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.330695] 
[   18.330730] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.330830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.330868] Hardware name: linux,dummy-virt (DT)
[   18.330902] Call trace:
[   18.330926]  show_stack+0x20/0x38 (C)
[   18.330978]  dump_stack_lvl+0x8c/0xd0
[   18.331026]  print_report+0x118/0x5d0
[   18.331442]  kasan_report+0xdc/0x128
[   18.331748]  __asan_report_load8_noabort+0x20/0x30
[   18.331828]  kasan_atomics_helper+0x3f04/0x4858
[   18.331881]  kasan_atomics+0x198/0x2e0
[   18.331928]  kunit_try_run_case+0x170/0x3f0
[   18.332575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.332789]  kthread+0x328/0x630
[   18.332866]  ret_from_fork+0x10/0x20
[   18.333051] 
[   18.333156] Allocated by task 265:
[   18.333300]  kasan_save_stack+0x3c/0x68
[   18.333604]  kasan_save_track+0x20/0x40
[   18.333854]  kasan_save_alloc_info+0x40/0x58
[   18.334030]  __kasan_kmalloc+0xd4/0xd8
[   18.334101]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.334145]  kasan_atomics+0xb8/0x2e0
[   18.334428]  kunit_try_run_case+0x170/0x3f0
[   18.334547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.334955]  kthread+0x328/0x630
[   18.335344]  ret_from_fork+0x10/0x20
[   18.335395] 
[   18.335439] The buggy address belongs to the object at fff00000c78be300
[   18.335439]  which belongs to the cache kmalloc-64 of size 64
[   18.335510] The buggy address is located 0 bytes to the right of
[   18.335510]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.335578] 
[   18.335832] The buggy address belongs to the physical page:
[   18.336065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.336260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.336336] page_type: f5(slab)
[   18.336384] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.336446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.336502] page dumped because: kasan: bad access detected
[   18.336542] 
[   18.336563] Memory state around the buggy address:
[   18.336597]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.336643]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.337394] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.337448]                                      ^
[   18.337520]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.337577]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.337821] ==================================================================
[   18.385950] ==================================================================
[   18.386179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.386243] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.386295] 
[   18.386508] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.386713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.386748] Hardware name: linux,dummy-virt (DT)
[   18.386784] Call trace:
[   18.386983]  show_stack+0x20/0x38 (C)
[   18.387341]  dump_stack_lvl+0x8c/0xd0
[   18.387451]  print_report+0x118/0x5d0
[   18.387763]  kasan_report+0xdc/0x128
[   18.388030]  __asan_report_load8_noabort+0x20/0x30
[   18.388311]  kasan_atomics_helper+0x3db0/0x4858
[   18.388456]  kasan_atomics+0x198/0x2e0
[   18.388535]  kunit_try_run_case+0x170/0x3f0
[   18.388902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.389297]  kthread+0x328/0x630
[   18.389458]  ret_from_fork+0x10/0x20
[   18.389614] 
[   18.389738] Allocated by task 265:
[   18.389792]  kasan_save_stack+0x3c/0x68
[   18.389998]  kasan_save_track+0x20/0x40
[   18.390286]  kasan_save_alloc_info+0x40/0x58
[   18.390367]  __kasan_kmalloc+0xd4/0xd8
[   18.390629]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.390858]  kasan_atomics+0xb8/0x2e0
[   18.390986]  kunit_try_run_case+0x170/0x3f0
[   18.391181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.391252]  kthread+0x328/0x630
[   18.391285]  ret_from_fork+0x10/0x20
[   18.391328] 
[   18.391534] The buggy address belongs to the object at fff00000c78be300
[   18.391534]  which belongs to the cache kmalloc-64 of size 64
[   18.392168] The buggy address is located 0 bytes to the right of
[   18.392168]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.392257] 
[   18.392440] The buggy address belongs to the physical page:
[   18.392701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.392776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.393128] page_type: f5(slab)
[   18.393179] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.393685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.393853] page dumped because: kasan: bad access detected
[   18.393893] 
[   18.393915] Memory state around the buggy address:
[   18.394323]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.394719]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.394774] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.395165]                                      ^
[   18.395513]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.395568]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.395610] ==================================================================
[   18.200038] ==================================================================
[   18.200324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.200520] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.200574] 
[   18.200704] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.201010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.201055] Hardware name: linux,dummy-virt (DT)
[   18.201140] Call trace:
[   18.201168]  show_stack+0x20/0x38 (C)
[   18.201401]  dump_stack_lvl+0x8c/0xd0
[   18.201466]  print_report+0x118/0x5d0
[   18.201565]  kasan_report+0xdc/0x128
[   18.201706]  kasan_check_range+0x100/0x1a8
[   18.201761]  __kasan_check_write+0x20/0x30
[   18.202002]  kasan_atomics_helper+0xe44/0x4858
[   18.202170]  kasan_atomics+0x198/0x2e0
[   18.202547]  kunit_try_run_case+0x170/0x3f0
[   18.202636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.202703]  kthread+0x328/0x630
[   18.202746]  ret_from_fork+0x10/0x20
[   18.202912] 
[   18.202941] Allocated by task 265:
[   18.202974]  kasan_save_stack+0x3c/0x68
[   18.203404]  kasan_save_track+0x20/0x40
[   18.203660]  kasan_save_alloc_info+0x40/0x58
[   18.203763]  __kasan_kmalloc+0xd4/0xd8
[   18.204013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.204186]  kasan_atomics+0xb8/0x2e0
[   18.204393]  kunit_try_run_case+0x170/0x3f0
[   18.204514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.204729]  kthread+0x328/0x630
[   18.204809]  ret_from_fork+0x10/0x20
[   18.205056] 
[   18.205194] The buggy address belongs to the object at fff00000c78be300
[   18.205194]  which belongs to the cache kmalloc-64 of size 64
[   18.205448] The buggy address is located 0 bytes to the right of
[   18.205448]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.205979] 
[   18.206407] The buggy address belongs to the physical page:
[   18.206523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.206865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.207142] page_type: f5(slab)
[   18.207383] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.207459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.207643] page dumped because: kasan: bad access detected
[   18.207706] 
[   18.207727] Memory state around the buggy address:
[   18.207776]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.207825]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.207867] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.207917]                                      ^
[   18.207963]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.208008]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.208046] ==================================================================
[   18.087133] ==================================================================
[   18.087338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   18.087461] Write of size 4 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.087518] 
[   18.087549] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.087836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.087974] Hardware name: linux,dummy-virt (DT)
[   18.088146] Call trace:
[   18.088191]  show_stack+0x20/0x38 (C)
[   18.088573]  dump_stack_lvl+0x8c/0xd0
[   18.088721]  print_report+0x118/0x5d0
[   18.090157]  kunit_try_run_case+0x170/0x3f0
[   18.090887]  ret_from_fork+0x10/0x20
[   18.090984] 
[   18.091022] Allocated by task 265:
[   18.091181]  kasan_save_stack+0x3c/0x68
[   18.091433]  kasan_save_track+0x20/0x40
[   18.091531]  kasan_save_alloc_info+0x40/0x58
[   18.091651]  __kasan_kmalloc+0xd4/0xd8
[   18.091912]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.092053]  kasan_atomics+0xb8/0x2e0
[   18.092273]  kunit_try_run_case+0x170/0x3f0
[   18.092455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.092673]  kthread+0x328/0x630
[   18.092885]  ret_from_fork+0x10/0x20
[   18.092939] 
[   18.093135] The buggy address belongs to the object at fff00000c78be300
[   18.093135]  which belongs to the cache kmalloc-64 of size 64
[   18.093948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.094817] 
[   18.095553]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.100582]  kasan_save_stack+0x3c/0x68
[   18.102865] 
[   18.103741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.109721]  kthread+0x328/0x630
[   18.110534] 
[   18.113072]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.115775] ==================================================================
[   18.227692] ==================================================================
[   18.227745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.227797] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.227908] 
[   18.227943] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.228046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.228435] Hardware name: linux,dummy-virt (DT)
[   18.228710] Call trace:
[   18.228749]  show_stack+0x20/0x38 (C)
[   18.228924]  dump_stack_lvl+0x8c/0xd0
[   18.229070]  print_report+0x118/0x5d0
[   18.229432]  kasan_report+0xdc/0x128
[   18.229483]  kasan_check_range+0x100/0x1a8
[   18.229722]  __kasan_check_write+0x20/0x30
[   18.229930]  kasan_atomics_helper+0xf20/0x4858
[   18.230028]  kasan_atomics+0x198/0x2e0
[   18.230128]  kunit_try_run_case+0x170/0x3f0
[   18.230277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.230365]  kthread+0x328/0x630
[   18.230420]  ret_from_fork+0x10/0x20
[   18.230635] 
[   18.230983] Allocated by task 265:
[   18.231106]  kasan_save_stack+0x3c/0x68
[   18.231323]  kasan_save_track+0x20/0x40
[   18.231572]  kasan_save_alloc_info+0x40/0x58
[   18.231643]  __kasan_kmalloc+0xd4/0xd8
[   18.231900]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.232121]  kasan_atomics+0xb8/0x2e0
[   18.232203]  kunit_try_run_case+0x170/0x3f0
[   18.232274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.232756]  kthread+0x328/0x630
[   18.232924]  ret_from_fork+0x10/0x20
[   18.233022] 
[   18.233160] The buggy address belongs to the object at fff00000c78be300
[   18.233160]  which belongs to the cache kmalloc-64 of size 64
[   18.233232] The buggy address is located 0 bytes to the right of
[   18.233232]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.233641] 
[   18.233699] The buggy address belongs to the physical page:
[   18.233752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.233890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.233980] page_type: f5(slab)
[   18.234329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.234441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.234575] page dumped because: kasan: bad access detected
[   18.234735] 
[   18.234806] Memory state around the buggy address:
[   18.234981]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.235031]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.235085] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.235505]                                      ^
[   18.235600]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.235648]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.235701] ==================================================================
[   18.338820] ==================================================================
[   18.338876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.338927] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.338979] 
[   18.339675] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.339783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.339943] Hardware name: linux,dummy-virt (DT)
[   18.340014] Call trace:
[   18.340131]  show_stack+0x20/0x38 (C)
[   18.340195]  dump_stack_lvl+0x8c/0xd0
[   18.340415]  print_report+0x118/0x5d0
[   18.340705]  kasan_report+0xdc/0x128
[   18.340948]  kasan_check_range+0x100/0x1a8
[   18.341185]  __kasan_check_write+0x20/0x30
[   18.341356]  kasan_atomics_helper+0x1414/0x4858
[   18.341511]  kasan_atomics+0x198/0x2e0
[   18.341578]  kunit_try_run_case+0x170/0x3f0
[   18.342247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.342346]  kthread+0x328/0x630
[   18.342449]  ret_from_fork+0x10/0x20
[   18.342524] 
[   18.342546] Allocated by task 265:
[   18.342739]  kasan_save_stack+0x3c/0x68
[   18.342987]  kasan_save_track+0x20/0x40
[   18.343328]  kasan_save_alloc_info+0x40/0x58
[   18.343540]  __kasan_kmalloc+0xd4/0xd8
[   18.343657]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.343768]  kasan_atomics+0xb8/0x2e0
[   18.343819]  kunit_try_run_case+0x170/0x3f0
[   18.343858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.343912]  kthread+0x328/0x630
[   18.343946]  ret_from_fork+0x10/0x20
[   18.344113] 
[   18.344255] The buggy address belongs to the object at fff00000c78be300
[   18.344255]  which belongs to the cache kmalloc-64 of size 64
[   18.344628] The buggy address is located 0 bytes to the right of
[   18.344628]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.344839] 
[   18.344863] The buggy address belongs to the physical page:
[   18.345040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.345480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.345573] page_type: f5(slab)
[   18.346067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.346301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.346551] page dumped because: kasan: bad access detected
[   18.346594] 
[   18.346773] Memory state around the buggy address:
[   18.346924]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.347235]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.347441] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.347487]                                      ^
[   18.347526]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.347978]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.348221] ==================================================================
[   18.429675] ==================================================================
[   18.429728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.429876] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.430076] 
[   18.430114] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.430424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.430826] Hardware name: linux,dummy-virt (DT)
[   18.430935] Call trace:
[   18.430964]  show_stack+0x20/0x38 (C)
[   18.431057]  dump_stack_lvl+0x8c/0xd0
[   18.431189]  print_report+0x118/0x5d0
[   18.431287]  kasan_report+0xdc/0x128
[   18.431419]  kasan_check_range+0x100/0x1a8
[   18.431473]  __kasan_check_write+0x20/0x30
[   18.431526]  kasan_atomics_helper+0x175c/0x4858
[   18.431576]  kasan_atomics+0x198/0x2e0
[   18.432332]  kunit_try_run_case+0x170/0x3f0
[   18.432422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.432500]  kthread+0x328/0x630
[   18.432543]  ret_from_fork+0x10/0x20
[   18.432603] 
[   18.432625] Allocated by task 265:
[   18.432673]  kasan_save_stack+0x3c/0x68
[   18.432717]  kasan_save_track+0x20/0x40
[   18.432757]  kasan_save_alloc_info+0x40/0x58
[   18.432799]  __kasan_kmalloc+0xd4/0xd8
[   18.432839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.432890]  kasan_atomics+0xb8/0x2e0
[   18.432939]  kunit_try_run_case+0x170/0x3f0
[   18.432989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.433035]  kthread+0x328/0x630
[   18.433082]  ret_from_fork+0x10/0x20
[   18.433137] 
[   18.433168] The buggy address belongs to the object at fff00000c78be300
[   18.433168]  which belongs to the cache kmalloc-64 of size 64
[   18.433235] The buggy address is located 0 bytes to the right of
[   18.433235]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.433301] 
[   18.433332] The buggy address belongs to the physical page:
[   18.433372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.433441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.433501] page_type: f5(slab)
[   18.433556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.433610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.433653] page dumped because: kasan: bad access detected
[   18.433715] 
[   18.433736] Memory state around the buggy address:
[   18.433770]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.433815]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.433860] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.433917]                                      ^
[   18.433952]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.433998]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.434049] ==================================================================
[   18.165695] ==================================================================
[   18.165758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.165814] Write of size 4 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.165999] 
[   18.166044] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.166402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.166449] Hardware name: linux,dummy-virt (DT)
[   18.166628] Call trace:
[   18.166792]  show_stack+0x20/0x38 (C)
[   18.166877]  dump_stack_lvl+0x8c/0xd0
[   18.166928]  print_report+0x118/0x5d0
[   18.166977]  kasan_report+0xdc/0x128
[   18.167289]  kasan_check_range+0x100/0x1a8
[   18.167487]  __kasan_check_write+0x20/0x30
[   18.167612]  kasan_atomics_helper+0xd3c/0x4858
[   18.167799]  kasan_atomics+0x198/0x2e0
[   18.167847]  kunit_try_run_case+0x170/0x3f0
[   18.167903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.167958]  kthread+0x328/0x630
[   18.168397]  ret_from_fork+0x10/0x20
[   18.168572] 
[   18.168621] Allocated by task 265:
[   18.168756]  kasan_save_stack+0x3c/0x68
[   18.169061]  kasan_save_track+0x20/0x40
[   18.169175]  kasan_save_alloc_info+0x40/0x58
[   18.169296]  __kasan_kmalloc+0xd4/0xd8
[   18.169402]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.169793]  kasan_atomics+0xb8/0x2e0
[   18.170040]  kunit_try_run_case+0x170/0x3f0
[   18.170155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.170318]  kthread+0x328/0x630
[   18.170374]  ret_from_fork+0x10/0x20
[   18.170798] 
[   18.170845] The buggy address belongs to the object at fff00000c78be300
[   18.170845]  which belongs to the cache kmalloc-64 of size 64
[   18.171000] The buggy address is located 0 bytes to the right of
[   18.171000]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.171192] 
[   18.171256] The buggy address belongs to the physical page:
[   18.171290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.171351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.171400] page_type: f5(slab)
[   18.171793] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.171920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.172037] page dumped because: kasan: bad access detected
[   18.172075] 
[   18.172112] Memory state around the buggy address:
[   18.172146]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.172191]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.172251] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.172293]                                      ^
[   18.172334]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.172384]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.172442] ==================================================================
[   18.070394] ==================================================================
[   18.070570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   18.070632] Write of size 4 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.070699] 
[   18.070731] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.070814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.070843] Hardware name: linux,dummy-virt (DT)
[   18.070876] Call trace:
[   18.070900]  show_stack+0x20/0x38 (C)
[   18.070948]  dump_stack_lvl+0x8c/0xd0
[   18.071613]  kasan_report+0xdc/0x128
[   18.073024]  kunit_try_run_case+0x170/0x3f0
[   18.073127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.073207]  kthread+0x328/0x630
[   18.073278]  ret_from_fork+0x10/0x20
[   18.073558] 
[   18.073597] Allocated by task 265:
[   18.073659]  kasan_save_stack+0x3c/0x68
[   18.073852]  kasan_save_track+0x20/0x40
[   18.074075]  kasan_save_alloc_info+0x40/0x58
[   18.074257]  __kasan_kmalloc+0xd4/0xd8
[   18.074460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.074697]  kasan_atomics+0xb8/0x2e0
[   18.074857]  kunit_try_run_case+0x170/0x3f0
[   18.074920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.075006]  kthread+0x328/0x630
[   18.075091]  ret_from_fork+0x10/0x20
[   18.075294] 
[   18.075319] The buggy address belongs to the object at fff00000c78be300
[   18.075319]  which belongs to the cache kmalloc-64 of size 64
[   18.075741] The buggy address is located 0 bytes to the right of
[   18.075741]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.075872] 
[   18.076018] The buggy address belongs to the physical page:
[   18.076123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.076220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.076333] page_type: f5(slab)
[   18.076425] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.076544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.076896] page dumped because: kasan: bad access detected
[   18.077051] 
[   18.077112] Memory state around the buggy address:
[   18.077149]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.077507]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.077644] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.077904]                                      ^
[   18.078170]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.078344]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.078393] ==================================================================
[   18.366628] ==================================================================
[   18.366702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.366753] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.366896] 
[   18.366970] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.367371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.367412] Hardware name: linux,dummy-virt (DT)
[   18.367446] Call trace:
[   18.367471]  show_stack+0x20/0x38 (C)
[   18.367893]  dump_stack_lvl+0x8c/0xd0
[   18.368263]  print_report+0x118/0x5d0
[   18.368770]  kasan_report+0xdc/0x128
[   18.368990]  kasan_check_range+0x100/0x1a8
[   18.369113]  __kasan_check_write+0x20/0x30
[   18.369243]  kasan_atomics_helper+0x154c/0x4858
[   18.369295]  kasan_atomics+0x198/0x2e0
[   18.369509]  kunit_try_run_case+0x170/0x3f0
[   18.369980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.370173]  kthread+0x328/0x630
[   18.370223]  ret_from_fork+0x10/0x20
[   18.370311] 
[   18.370620] Allocated by task 265:
[   18.370987]  kasan_save_stack+0x3c/0x68
[   18.371161]  kasan_save_track+0x20/0x40
[   18.371262]  kasan_save_alloc_info+0x40/0x58
[   18.371425]  __kasan_kmalloc+0xd4/0xd8
[   18.371514]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.371911]  kasan_atomics+0xb8/0x2e0
[   18.372437]  kunit_try_run_case+0x170/0x3f0
[   18.372758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.372843]  kthread+0x328/0x630
[   18.372880]  ret_from_fork+0x10/0x20
[   18.372930] 
[   18.373165] The buggy address belongs to the object at fff00000c78be300
[   18.373165]  which belongs to the cache kmalloc-64 of size 64
[   18.373504] The buggy address is located 0 bytes to the right of
[   18.373504]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.373732] 
[   18.373758] The buggy address belongs to the physical page:
[   18.373822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.374023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.374211] page_type: f5(slab)
[   18.374475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.374640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.375329] page dumped because: kasan: bad access detected
[   18.375393] 
[   18.375506] Memory state around the buggy address:
[   18.375544]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.375591]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.375635] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.376194]                                      ^
[   18.376315]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.376532]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.376911] ==================================================================
[   18.321272] ==================================================================
[   18.321335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.321386] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.321599] 
[   18.321798] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.321929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.322006] Hardware name: linux,dummy-virt (DT)
[   18.322043] Call trace:
[   18.322069]  show_stack+0x20/0x38 (C)
[   18.322136]  dump_stack_lvl+0x8c/0xd0
[   18.322281]  print_report+0x118/0x5d0
[   18.322335]  kasan_report+0xdc/0x128
[   18.322531]  kasan_check_range+0x100/0x1a8
[   18.322790]  __kasan_check_write+0x20/0x30
[   18.322865]  kasan_atomics_helper+0x1384/0x4858
[   18.322917]  kasan_atomics+0x198/0x2e0
[   18.322963]  kunit_try_run_case+0x170/0x3f0
[   18.323287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.323500]  kthread+0x328/0x630
[   18.323683]  ret_from_fork+0x10/0x20
[   18.323929] 
[   18.324022] Allocated by task 265:
[   18.324106]  kasan_save_stack+0x3c/0x68
[   18.324384]  kasan_save_track+0x20/0x40
[   18.324617]  kasan_save_alloc_info+0x40/0x58
[   18.324774]  __kasan_kmalloc+0xd4/0xd8
[   18.324886]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.324940]  kasan_atomics+0xb8/0x2e0
[   18.324979]  kunit_try_run_case+0x170/0x3f0
[   18.325266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.325542]  kthread+0x328/0x630
[   18.325944]  ret_from_fork+0x10/0x20
[   18.326380] 
[   18.326411] The buggy address belongs to the object at fff00000c78be300
[   18.326411]  which belongs to the cache kmalloc-64 of size 64
[   18.326811] The buggy address is located 0 bytes to the right of
[   18.326811]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.326958] 
[   18.326983] The buggy address belongs to the physical page:
[   18.327025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.327435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.327659] page_type: f5(slab)
[   18.327768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.327922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.327971] page dumped because: kasan: bad access detected
[   18.328005] 
[   18.328027] Memory state around the buggy address:
[   18.328061]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.328615]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.328816] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.328911]                                      ^
[   18.328953]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.329135]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.329184] ==================================================================
[   18.434267] ==================================================================
[   18.434311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.434360] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.434412] 
[   18.434466] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.434549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.434579] Hardware name: linux,dummy-virt (DT)
[   18.434612] Call trace:
[   18.434634]  show_stack+0x20/0x38 (C)
[   18.435797]  dump_stack_lvl+0x8c/0xd0
[   18.435917]  print_report+0x118/0x5d0
[   18.435994]  kasan_report+0xdc/0x128
[   18.436076]  __asan_report_load8_noabort+0x20/0x30
[   18.436160]  kasan_atomics_helper+0x3e20/0x4858
[   18.436242]  kasan_atomics+0x198/0x2e0
[   18.436704]  kunit_try_run_case+0x170/0x3f0
[   18.436785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.436900]  kthread+0x328/0x630
[   18.436947]  ret_from_fork+0x10/0x20
[   18.437492] 
[   18.437534] Allocated by task 265:
[   18.437803]  kasan_save_stack+0x3c/0x68
[   18.437946]  kasan_save_track+0x20/0x40
[   18.438025]  kasan_save_alloc_info+0x40/0x58
[   18.438115]  __kasan_kmalloc+0xd4/0xd8
[   18.438177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.438583]  kasan_atomics+0xb8/0x2e0
[   18.438845]  kunit_try_run_case+0x170/0x3f0
[   18.438954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.439027]  kthread+0x328/0x630
[   18.439192]  ret_from_fork+0x10/0x20
[   18.439293] 
[   18.439402] The buggy address belongs to the object at fff00000c78be300
[   18.439402]  which belongs to the cache kmalloc-64 of size 64
[   18.439465] The buggy address is located 0 bytes to the right of
[   18.439465]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.439532] 
[   18.439561] The buggy address belongs to the physical page:
[   18.439744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.440735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.440823] page_type: f5(slab)
[   18.440874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.440945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.441034] page dumped because: kasan: bad access detected
[   18.441208] 
[   18.441236] Memory state around the buggy address:
[   18.441444]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.441758]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.441846] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.441914]                                      ^
[   18.442190]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.442271]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.442508] ==================================================================
[   18.237490] ==================================================================
[   18.237547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.237628] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.238028] 
[   18.238074] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.238225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.238302] Hardware name: linux,dummy-virt (DT)
[   18.238337] Call trace:
[   18.238364]  show_stack+0x20/0x38 (C)
[   18.238415]  dump_stack_lvl+0x8c/0xd0
[   18.238657]  print_report+0x118/0x5d0
[   18.238726]  kasan_report+0xdc/0x128
[   18.238911]  kasan_check_range+0x100/0x1a8
[   18.239028]  __kasan_check_write+0x20/0x30
[   18.239905]  kasan_atomics_helper+0xf88/0x4858
[   18.239989]  kasan_atomics+0x198/0x2e0
[   18.240045]  kunit_try_run_case+0x170/0x3f0
[   18.240112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.240168]  kthread+0x328/0x630
[   18.240211]  ret_from_fork+0x10/0x20
[   18.240261] 
[   18.240310] Allocated by task 265:
[   18.240363]  kasan_save_stack+0x3c/0x68
[   18.240414]  kasan_save_track+0x20/0x40
[   18.240474]  kasan_save_alloc_info+0x40/0x58
[   18.240526]  __kasan_kmalloc+0xd4/0xd8
[   18.240565]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.240622]  kasan_atomics+0xb8/0x2e0
[   18.240673]  kunit_try_run_case+0x170/0x3f0
[   18.240714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.240761]  kthread+0x328/0x630
[   18.240796]  ret_from_fork+0x10/0x20
[   18.240835] 
[   18.240856] The buggy address belongs to the object at fff00000c78be300
[   18.240856]  which belongs to the cache kmalloc-64 of size 64
[   18.240917] The buggy address is located 0 bytes to the right of
[   18.240917]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.240994] 
[   18.241030] The buggy address belongs to the physical page:
[   18.241081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.241151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.241202] page_type: f5(slab)
[   18.241260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.241315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.241361] page dumped because: kasan: bad access detected
[   18.241396] 
[   18.241418] Memory state around the buggy address:
[   18.241452]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.241498]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.241553] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.241596]                                      ^
[   18.241639]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.242140]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.242224] ==================================================================
[   18.412406] ==================================================================
[   18.412583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.412641] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.412890] 
[   18.412965] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.413064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.413092] Hardware name: linux,dummy-virt (DT)
[   18.413545] Call trace:
[   18.413622]  show_stack+0x20/0x38 (C)
[   18.413904]  dump_stack_lvl+0x8c/0xd0
[   18.414329]  print_report+0x118/0x5d0
[   18.414399]  kasan_report+0xdc/0x128
[   18.414564]  kasan_check_range+0x100/0x1a8
[   18.414626]  __kasan_check_write+0x20/0x30
[   18.414771]  kasan_atomics_helper+0x16d0/0x4858
[   18.414830]  kasan_atomics+0x198/0x2e0
[   18.414878]  kunit_try_run_case+0x170/0x3f0
[   18.414926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.414981]  kthread+0x328/0x630
[   18.415492]  ret_from_fork+0x10/0x20
[   18.415750] 
[   18.415810] Allocated by task 265:
[   18.415847]  kasan_save_stack+0x3c/0x68
[   18.416090]  kasan_save_track+0x20/0x40
[   18.416194]  kasan_save_alloc_info+0x40/0x58
[   18.416635]  __kasan_kmalloc+0xd4/0xd8
[   18.416725]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.416961]  kasan_atomics+0xb8/0x2e0
[   18.417048]  kunit_try_run_case+0x170/0x3f0
[   18.417185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.417234]  kthread+0x328/0x630
[   18.417638]  ret_from_fork+0x10/0x20
[   18.417879] 
[   18.417988] The buggy address belongs to the object at fff00000c78be300
[   18.417988]  which belongs to the cache kmalloc-64 of size 64
[   18.418162] The buggy address is located 0 bytes to the right of
[   18.418162]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.418332] 
[   18.418400] The buggy address belongs to the physical page:
[   18.418483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.418613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.418677] page_type: f5(slab)
[   18.418717] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.418769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.418813] page dumped because: kasan: bad access detected
[   18.418857] 
[   18.418888] Memory state around the buggy address:
[   18.418921]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.418968]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.419023] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.419062]                                      ^
[   18.419099]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.419145]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.419183] ==================================================================
[   18.220311] ==================================================================
[   18.220369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.220564] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.220632] 
[   18.220675] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.220760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.220823] Hardware name: linux,dummy-virt (DT)
[   18.220860] Call trace:
[   18.220883]  show_stack+0x20/0x38 (C)
[   18.220935]  dump_stack_lvl+0x8c/0xd0
[   18.220983]  print_report+0x118/0x5d0
[   18.221031]  kasan_report+0xdc/0x128
[   18.221077]  kasan_check_range+0x100/0x1a8
[   18.221129]  __kasan_check_write+0x20/0x30
[   18.221195]  kasan_atomics_helper+0xeb8/0x4858
[   18.221244]  kasan_atomics+0x198/0x2e0
[   18.221291]  kunit_try_run_case+0x170/0x3f0
[   18.221339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.221391]  kthread+0x328/0x630
[   18.221433]  ret_from_fork+0x10/0x20
[   18.221482] 
[   18.221503] Allocated by task 265:
[   18.221534]  kasan_save_stack+0x3c/0x68
[   18.221576]  kasan_save_track+0x20/0x40
[   18.221624]  kasan_save_alloc_info+0x40/0x58
[   18.221677]  __kasan_kmalloc+0xd4/0xd8
[   18.221740]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.222021]  kasan_atomics+0xb8/0x2e0
[   18.222335]  kunit_try_run_case+0x170/0x3f0
[   18.222414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.222922]  kthread+0x328/0x630
[   18.223157]  ret_from_fork+0x10/0x20
[   18.223578] 
[   18.223608] The buggy address belongs to the object at fff00000c78be300
[   18.223608]  which belongs to the cache kmalloc-64 of size 64
[   18.223689] The buggy address is located 0 bytes to the right of
[   18.223689]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.224090] 
[   18.224218] The buggy address belongs to the physical page:
[   18.224507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.224827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.224987] page_type: f5(slab)
[   18.225076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.225174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.225219] page dumped because: kasan: bad access detected
[   18.225293] 
[   18.225945] Memory state around the buggy address:
[   18.226078]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.226192]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.226435] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.226589]                                      ^
[   18.226710]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.226809]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.226954] ==================================================================
[   18.174244] ==================================================================
[   18.174650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.174734] Read of size 4 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.174787] 
[   18.175048] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.175147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.175200] Hardware name: linux,dummy-virt (DT)
[   18.175450] Call trace:
[   18.175660]  show_stack+0x20/0x38 (C)
[   18.175832]  dump_stack_lvl+0x8c/0xd0
[   18.175932]  print_report+0x118/0x5d0
[   18.176070]  kasan_report+0xdc/0x128
[   18.176148]  __asan_report_load4_noabort+0x20/0x30
[   18.176208]  kasan_atomics_helper+0x3e04/0x4858
[   18.176258]  kasan_atomics+0x198/0x2e0
[   18.176696]  kunit_try_run_case+0x170/0x3f0
[   18.176828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.176919]  kthread+0x328/0x630
[   18.177412]  ret_from_fork+0x10/0x20
[   18.177798] 
[   18.177829] Allocated by task 265:
[   18.177881]  kasan_save_stack+0x3c/0x68
[   18.178120]  kasan_save_track+0x20/0x40
[   18.178299]  kasan_save_alloc_info+0x40/0x58
[   18.178364]  __kasan_kmalloc+0xd4/0xd8
[   18.178404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.178446]  kasan_atomics+0xb8/0x2e0
[   18.178485]  kunit_try_run_case+0x170/0x3f0
[   18.178531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.178586]  kthread+0x328/0x630
[   18.178631]  ret_from_fork+0x10/0x20
[   18.178682] 
[   18.178718] The buggy address belongs to the object at fff00000c78be300
[   18.178718]  which belongs to the cache kmalloc-64 of size 64
[   18.178780] The buggy address is located 0 bytes to the right of
[   18.178780]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.178858] 
[   18.178881] The buggy address belongs to the physical page:
[   18.178915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.178970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.179584] page_type: f5(slab)
[   18.179708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.180348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.180450] page dumped because: kasan: bad access detected
[   18.180519] 
[   18.180661] Memory state around the buggy address:
[   18.180732]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.181126]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.181309] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.181364]                                      ^
[   18.181621]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.182003]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.182114] ==================================================================
[   18.377837] ==================================================================
[   18.378036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.378099] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.378151] 
[   18.378309] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.378401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.378429] Hardware name: linux,dummy-virt (DT)
[   18.378769] Call trace:
[   18.378863]  show_stack+0x20/0x38 (C)
[   18.379055]  dump_stack_lvl+0x8c/0xd0
[   18.379556]  print_report+0x118/0x5d0
[   18.379614]  kasan_report+0xdc/0x128
[   18.379870]  kasan_check_range+0x100/0x1a8
[   18.380234]  __kasan_check_write+0x20/0x30
[   18.380554]  kasan_atomics_helper+0x15b4/0x4858
[   18.380722]  kasan_atomics+0x198/0x2e0
[   18.380806]  kunit_try_run_case+0x170/0x3f0
[   18.380871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.381205]  kthread+0x328/0x630
[   18.381492]  ret_from_fork+0x10/0x20
[   18.381722] 
[   18.381751] Allocated by task 265:
[   18.381783]  kasan_save_stack+0x3c/0x68
[   18.381830]  kasan_save_track+0x20/0x40
[   18.381912]  kasan_save_alloc_info+0x40/0x58
[   18.381981]  __kasan_kmalloc+0xd4/0xd8
[   18.382030]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.382072]  kasan_atomics+0xb8/0x2e0
[   18.382109]  kunit_try_run_case+0x170/0x3f0
[   18.382151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.382205]  kthread+0x328/0x630
[   18.382239]  ret_from_fork+0x10/0x20
[   18.382290] 
[   18.382324] The buggy address belongs to the object at fff00000c78be300
[   18.382324]  which belongs to the cache kmalloc-64 of size 64
[   18.382385] The buggy address is located 0 bytes to the right of
[   18.382385]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.382459] 
[   18.382490] The buggy address belongs to the physical page:
[   18.382525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.382578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.382628] page_type: f5(slab)
[   18.382704] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.383143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.383536] page dumped because: kasan: bad access detected
[   18.383606] 
[   18.383681] Memory state around the buggy address:
[   18.383894]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.384012]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.384236] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.384636]                                      ^
[   18.384779]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.384833]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.385049] ==================================================================
[   18.396357] ==================================================================
[   18.396424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.396696] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.396763] 
[   18.396899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.396987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.397222] Hardware name: linux,dummy-virt (DT)
[   18.397296] Call trace:
[   18.397685]  show_stack+0x20/0x38 (C)
[   18.397755]  dump_stack_lvl+0x8c/0xd0
[   18.397877]  print_report+0x118/0x5d0
[   18.397949]  kasan_report+0xdc/0x128
[   18.397996]  kasan_check_range+0x100/0x1a8
[   18.398105]  __kasan_check_write+0x20/0x30
[   18.398150]  kasan_atomics_helper+0x1644/0x4858
[   18.398200]  kasan_atomics+0x198/0x2e0
[   18.398262]  kunit_try_run_case+0x170/0x3f0
[   18.398455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.398525]  kthread+0x328/0x630
[   18.398567]  ret_from_fork+0x10/0x20
[   18.398625] 
[   18.398951] Allocated by task 265:
[   18.399005]  kasan_save_stack+0x3c/0x68
[   18.399614]  kasan_save_track+0x20/0x40
[   18.399788]  kasan_save_alloc_info+0x40/0x58
[   18.400047]  __kasan_kmalloc+0xd4/0xd8
[   18.400149]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.400345]  kasan_atomics+0xb8/0x2e0
[   18.400580]  kunit_try_run_case+0x170/0x3f0
[   18.400656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.400730]  kthread+0x328/0x630
[   18.400764]  ret_from_fork+0x10/0x20
[   18.400801] 
[   18.400825] The buggy address belongs to the object at fff00000c78be300
[   18.400825]  which belongs to the cache kmalloc-64 of size 64
[   18.400887] The buggy address is located 0 bytes to the right of
[   18.400887]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.400953] 
[   18.401021] The buggy address belongs to the physical page:
[   18.401072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.401136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.401186] page_type: f5(slab)
[   18.401236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.401300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.401379] page dumped because: kasan: bad access detected
[   18.401423] 
[   18.401446] Memory state around the buggy address:
[   18.401480]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.401533]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.401592] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.401635]                                      ^
[   18.401700]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.401754]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.401806] ==================================================================
[   18.276905] ==================================================================
[   18.276965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.277018] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.277107] 
[   18.277142] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.277225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.277253] Hardware name: linux,dummy-virt (DT)
[   18.277304] Call trace:
[   18.277330]  show_stack+0x20/0x38 (C)
[   18.277380]  dump_stack_lvl+0x8c/0xd0
[   18.277428]  print_report+0x118/0x5d0
[   18.277475]  kasan_report+0xdc/0x128
[   18.277522]  kasan_check_range+0x100/0x1a8
[   18.277569]  __kasan_check_write+0x20/0x30
[   18.277615]  kasan_atomics_helper+0x1128/0x4858
[   18.277674]  kasan_atomics+0x198/0x2e0
[   18.277722]  kunit_try_run_case+0x170/0x3f0
[   18.277770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.277823]  kthread+0x328/0x630
[   18.277865]  ret_from_fork+0x10/0x20
[   18.277924] 
[   18.277951] Allocated by task 265:
[   18.277989]  kasan_save_stack+0x3c/0x68
[   18.278043]  kasan_save_track+0x20/0x40
[   18.278085]  kasan_save_alloc_info+0x40/0x58
[   18.278134]  __kasan_kmalloc+0xd4/0xd8
[   18.278183]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.278232]  kasan_atomics+0xb8/0x2e0
[   18.278279]  kunit_try_run_case+0x170/0x3f0
[   18.278319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.278366]  kthread+0x328/0x630
[   18.278401]  ret_from_fork+0x10/0x20
[   18.278439] 
[   18.278460] The buggy address belongs to the object at fff00000c78be300
[   18.278460]  which belongs to the cache kmalloc-64 of size 64
[   18.278519] The buggy address is located 0 bytes to the right of
[   18.278519]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.278590] 
[   18.278614] The buggy address belongs to the physical page:
[   18.278646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.279102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.279174] page_type: f5(slab)
[   18.279218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.279274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.279320] page dumped because: kasan: bad access detected
[   18.279355] 
[   18.280109] Memory state around the buggy address:
[   18.280155]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.280615]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.280989] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.281456]                                      ^
[   18.281751]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.281971]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.282030] ==================================================================
[   18.283842] ==================================================================
[   18.283903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.283955] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.284016] 
[   18.284047] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.284130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.284158] Hardware name: linux,dummy-virt (DT)
[   18.284488] Call trace:
[   18.284590]  show_stack+0x20/0x38 (C)
[   18.284816]  dump_stack_lvl+0x8c/0xd0
[   18.284871]  print_report+0x118/0x5d0
[   18.285208]  kasan_report+0xdc/0x128
[   18.285279]  kasan_check_range+0x100/0x1a8
[   18.285378]  __kasan_check_write+0x20/0x30
[   18.285432]  kasan_atomics_helper+0x1190/0x4858
[   18.285481]  kasan_atomics+0x198/0x2e0
[   18.285535]  kunit_try_run_case+0x170/0x3f0
[   18.285827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.285908]  kthread+0x328/0x630
[   18.285952]  ret_from_fork+0x10/0x20
[   18.286333] 
[   18.286375] Allocated by task 265:
[   18.286417]  kasan_save_stack+0x3c/0x68
[   18.286469]  kasan_save_track+0x20/0x40
[   18.286607]  kasan_save_alloc_info+0x40/0x58
[   18.286656]  __kasan_kmalloc+0xd4/0xd8
[   18.286860]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.287099]  kasan_atomics+0xb8/0x2e0
[   18.287176]  kunit_try_run_case+0x170/0x3f0
[   18.287390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.287527]  kthread+0x328/0x630
[   18.287756]  ret_from_fork+0x10/0x20
[   18.287854] 
[   18.288286] The buggy address belongs to the object at fff00000c78be300
[   18.288286]  which belongs to the cache kmalloc-64 of size 64
[   18.288536] The buggy address is located 0 bytes to the right of
[   18.288536]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.288740] 
[   18.288863] The buggy address belongs to the physical page:
[   18.289331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.289424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.289681] page_type: f5(slab)
[   18.289872] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.290073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.290301] page dumped because: kasan: bad access detected
[   18.290438] 
[   18.290495] Memory state around the buggy address:
[   18.290686]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.290748]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.291019] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.291215]                                      ^
[   18.291410]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.291587]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.291883] ==================================================================
[   18.293681] ==================================================================
[   18.293779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.293891] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.293946] 
[   18.293984] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.294102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.294151] Hardware name: linux,dummy-virt (DT)
[   18.294350] Call trace:
[   18.294645]  show_stack+0x20/0x38 (C)
[   18.294884]  dump_stack_lvl+0x8c/0xd0
[   18.294952]  print_report+0x118/0x5d0
[   18.295038]  kasan_report+0xdc/0x128
[   18.295119]  kasan_check_range+0x100/0x1a8
[   18.295286]  __kasan_check_write+0x20/0x30
[   18.295382]  kasan_atomics_helper+0x11f8/0x4858
[   18.295573]  kasan_atomics+0x198/0x2e0
[   18.295692]  kunit_try_run_case+0x170/0x3f0
[   18.295883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.296129]  kthread+0x328/0x630
[   18.296346]  ret_from_fork+0x10/0x20
[   18.296772] 
[   18.296805] Allocated by task 265:
[   18.296887]  kasan_save_stack+0x3c/0x68
[   18.297080]  kasan_save_track+0x20/0x40
[   18.297245]  kasan_save_alloc_info+0x40/0x58
[   18.297390]  __kasan_kmalloc+0xd4/0xd8
[   18.297558]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.297640]  kasan_atomics+0xb8/0x2e0
[   18.297709]  kunit_try_run_case+0x170/0x3f0
[   18.298202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.298418]  kthread+0x328/0x630
[   18.298867]  ret_from_fork+0x10/0x20
[   18.299231] 
[   18.299269] The buggy address belongs to the object at fff00000c78be300
[   18.299269]  which belongs to the cache kmalloc-64 of size 64
[   18.299361] The buggy address is located 0 bytes to the right of
[   18.299361]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.299456] 
[   18.299682] The buggy address belongs to the physical page:
[   18.300173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.300279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.300332] page_type: f5(slab)
[   18.300852] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.300931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.301345] page dumped because: kasan: bad access detected
[   18.301391] 
[   18.301571] Memory state around the buggy address:
[   18.301815]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.302044]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.302325] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.302474]                                      ^
[   18.302649]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.302717]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.302757] ==================================================================
[   18.304076] ==================================================================
[   18.304154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.304229] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.304530] 
[   18.304583] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.304683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.304811] Hardware name: linux,dummy-virt (DT)
[   18.304879] Call trace:
[   18.304907]  show_stack+0x20/0x38 (C)
[   18.305034]  dump_stack_lvl+0x8c/0xd0
[   18.305089]  print_report+0x118/0x5d0
[   18.305137]  kasan_report+0xdc/0x128
[   18.305432]  kasan_check_range+0x100/0x1a8
[   18.305704]  __kasan_check_write+0x20/0x30
[   18.305896]  kasan_atomics_helper+0x126c/0x4858
[   18.305984]  kasan_atomics+0x198/0x2e0
[   18.306105]  kunit_try_run_case+0x170/0x3f0
[   18.306202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.306288]  kthread+0x328/0x630
[   18.306332]  ret_from_fork+0x10/0x20
[   18.306576] 
[   18.306738] Allocated by task 265:
[   18.306994]  kasan_save_stack+0x3c/0x68
[   18.307252]  kasan_save_track+0x20/0x40
[   18.307354]  kasan_save_alloc_info+0x40/0x58
[   18.307497]  __kasan_kmalloc+0xd4/0xd8
[   18.307551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.307601]  kasan_atomics+0xb8/0x2e0
[   18.307801]  kunit_try_run_case+0x170/0x3f0
[   18.307994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.308109]  kthread+0x328/0x630
[   18.308365]  ret_from_fork+0x10/0x20
[   18.308618] 
[   18.308705] The buggy address belongs to the object at fff00000c78be300
[   18.308705]  which belongs to the cache kmalloc-64 of size 64
[   18.308898] The buggy address is located 0 bytes to the right of
[   18.308898]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.309017] 
[   18.309184] The buggy address belongs to the physical page:
[   18.309235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.309320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.309373] page_type: f5(slab)
[   18.309421] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.309474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.309519] page dumped because: kasan: bad access detected
[   18.309555] 
[   18.309585] Memory state around the buggy address:
[   18.309619]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.309677]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.309779] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.310061]                                      ^
[   18.310721]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.310776]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.310839] ==================================================================
[   18.358821] ==================================================================
[   18.359031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.359297] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.359481] 
[   18.359565] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.359656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.359696] Hardware name: linux,dummy-virt (DT)
[   18.360080] Call trace:
[   18.360493]  show_stack+0x20/0x38 (C)
[   18.360647]  dump_stack_lvl+0x8c/0xd0
[   18.360743]  print_report+0x118/0x5d0
[   18.360798]  kasan_report+0xdc/0x128
[   18.361030]  kasan_check_range+0x100/0x1a8
[   18.361523]  __kasan_check_write+0x20/0x30
[   18.361684]  kasan_atomics_helper+0x14e4/0x4858
[   18.361872]  kasan_atomics+0x198/0x2e0
[   18.361977]  kunit_try_run_case+0x170/0x3f0
[   18.362181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.362440]  kthread+0x328/0x630
[   18.362716]  ret_from_fork+0x10/0x20
[   18.363005] 
[   18.363153] Allocated by task 265:
[   18.363234]  kasan_save_stack+0x3c/0x68
[   18.363283]  kasan_save_track+0x20/0x40
[   18.363321]  kasan_save_alloc_info+0x40/0x58
[   18.363725]  __kasan_kmalloc+0xd4/0xd8
[   18.363791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.363906]  kasan_atomics+0xb8/0x2e0
[   18.363947]  kunit_try_run_case+0x170/0x3f0
[   18.364005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.364060]  kthread+0x328/0x630
[   18.364096]  ret_from_fork+0x10/0x20
[   18.364136] 
[   18.364160] The buggy address belongs to the object at fff00000c78be300
[   18.364160]  which belongs to the cache kmalloc-64 of size 64
[   18.364221] The buggy address is located 0 bytes to the right of
[   18.364221]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.364297] 
[   18.364335] The buggy address belongs to the physical page:
[   18.364381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.364450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.364512] page_type: f5(slab)
[   18.364553] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.364617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.364660] page dumped because: kasan: bad access detected
[   18.364705] 
[   18.364727] Memory state around the buggy address:
[   18.364776]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.364822]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.364876] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.364917]                                      ^
[   18.364962]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.365004]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.365050] ==================================================================
[   18.444104] ==================================================================
[   18.444215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.444382] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.444444] 
[   18.444583] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.444709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.444848] Hardware name: linux,dummy-virt (DT)
[   18.444891] Call trace:
[   18.445073]  show_stack+0x20/0x38 (C)
[   18.445183]  dump_stack_lvl+0x8c/0xd0
[   18.445235]  print_report+0x118/0x5d0
[   18.445311]  kasan_report+0xdc/0x128
[   18.445483]  kasan_check_range+0x100/0x1a8
[   18.445721]  __kasan_check_write+0x20/0x30
[   18.445810]  kasan_atomics_helper+0x17ec/0x4858
[   18.445863]  kasan_atomics+0x198/0x2e0
[   18.445983]  kunit_try_run_case+0x170/0x3f0
[   18.446037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.446120]  kthread+0x328/0x630
[   18.446311]  ret_from_fork+0x10/0x20
[   18.446556] 
[   18.446592] Allocated by task 265:
[   18.446748]  kasan_save_stack+0x3c/0x68
[   18.446809]  kasan_save_track+0x20/0x40
[   18.446928]  kasan_save_alloc_info+0x40/0x58
[   18.447209]  __kasan_kmalloc+0xd4/0xd8
[   18.447432]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.447603]  kasan_atomics+0xb8/0x2e0
[   18.447924]  kunit_try_run_case+0x170/0x3f0
[   18.448172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.448326]  kthread+0x328/0x630
[   18.448433]  ret_from_fork+0x10/0x20
[   18.448482] 
[   18.448739] The buggy address belongs to the object at fff00000c78be300
[   18.448739]  which belongs to the cache kmalloc-64 of size 64
[   18.448906] The buggy address is located 0 bytes to the right of
[   18.448906]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.449191] 
[   18.449421] The buggy address belongs to the physical page:
[   18.449526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.449703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.449769] page_type: f5(slab)
[   18.449828] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.449963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.450009] page dumped because: kasan: bad access detected
[   18.450050] 
[   18.450073] Memory state around the buggy address:
[   18.450242]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.450475]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.450529] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.450754]                                      ^
[   18.450801]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.451151]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.451548] ==================================================================
[   18.243523] ==================================================================
[   18.243576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.243649] Write of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.244030] 
[   18.244078] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.244680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.244730] Hardware name: linux,dummy-virt (DT)
[   18.244766] Call trace:
[   18.245043]  show_stack+0x20/0x38 (C)
[   18.245226]  dump_stack_lvl+0x8c/0xd0
[   18.245319]  print_report+0x118/0x5d0
[   18.245369]  kasan_report+0xdc/0x128
[   18.245575]  kasan_check_range+0x100/0x1a8
[   18.245916]  __kasan_check_write+0x20/0x30
[   18.246080]  kasan_atomics_helper+0xff0/0x4858
[   18.246251]  kasan_atomics+0x198/0x2e0
[   18.246432]  kunit_try_run_case+0x170/0x3f0
[   18.246508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.246930]  kthread+0x328/0x630
[   18.247262]  ret_from_fork+0x10/0x20
[   18.247543] 
[   18.247611] Allocated by task 265:
[   18.247716]  kasan_save_stack+0x3c/0x68
[   18.247795]  kasan_save_track+0x20/0x40
[   18.247841]  kasan_save_alloc_info+0x40/0x58
[   18.247882]  __kasan_kmalloc+0xd4/0xd8
[   18.247922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.247967]  kasan_atomics+0xb8/0x2e0
[   18.248006]  kunit_try_run_case+0x170/0x3f0
[   18.248826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.249185]  kthread+0x328/0x630
[   18.249322]  ret_from_fork+0x10/0x20
[   18.249412] 
[   18.249487] The buggy address belongs to the object at fff00000c78be300
[   18.249487]  which belongs to the cache kmalloc-64 of size 64
[   18.249552] The buggy address is located 0 bytes to the right of
[   18.249552]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.249866] 
[   18.250082] The buggy address belongs to the physical page:
[   18.250403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.250519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.250807] page_type: f5(slab)
[   18.251132] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.251406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.251640] page dumped because: kasan: bad access detected
[   18.251720] 
[   18.251867] Memory state around the buggy address:
[   18.252084]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.252381]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.252450] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.252625]                                      ^
[   18.252803]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.253132]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.253297] ==================================================================
[   18.190648] ==================================================================
[   18.190712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.191072] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.191157] 
[   18.191610] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.191818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.191987] Hardware name: linux,dummy-virt (DT)
[   18.192149] Call trace:
[   18.192246]  show_stack+0x20/0x38 (C)
[   18.192634]  dump_stack_lvl+0x8c/0xd0
[   18.192838]  print_report+0x118/0x5d0
[   18.192946]  kasan_report+0xdc/0x128
[   18.193189]  __asan_report_load8_noabort+0x20/0x30
[   18.193466]  kasan_atomics_helper+0x3f58/0x4858
[   18.193561]  kasan_atomics+0x198/0x2e0
[   18.193713]  kunit_try_run_case+0x170/0x3f0
[   18.193799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.193949]  kthread+0x328/0x630
[   18.194005]  ret_from_fork+0x10/0x20
[   18.194235] 
[   18.194504] Allocated by task 265:
[   18.194605]  kasan_save_stack+0x3c/0x68
[   18.194735]  kasan_save_track+0x20/0x40
[   18.194997]  kasan_save_alloc_info+0x40/0x58
[   18.195135]  __kasan_kmalloc+0xd4/0xd8
[   18.195440]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.195482]  kasan_atomics+0xb8/0x2e0
[   18.195678]  kunit_try_run_case+0x170/0x3f0
[   18.195837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.195942]  kthread+0x328/0x630
[   18.196059]  ret_from_fork+0x10/0x20
[   18.196137] 
[   18.196257] The buggy address belongs to the object at fff00000c78be300
[   18.196257]  which belongs to the cache kmalloc-64 of size 64
[   18.196354] The buggy address is located 0 bytes to the right of
[   18.196354]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.196447] 
[   18.196468] The buggy address belongs to the physical page:
[   18.196848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.196934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.197100] page_type: f5(slab)
[   18.197189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.197280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.197398] page dumped because: kasan: bad access detected
[   18.197462] 
[   18.197517] Memory state around the buggy address:
[   18.197803]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.197872]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.198070] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.198134]                                      ^
[   18.198345]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.198397]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.198571] ==================================================================
[   18.419679] ==================================================================
[   18.419732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.419783] Read of size 8 at addr fff00000c78be330 by task kunit_try_catch/265
[   18.420129] 
[   18.420173] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.420598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.420646] Hardware name: linux,dummy-virt (DT)
[   18.420975] Call trace:
[   18.421120]  show_stack+0x20/0x38 (C)
[   18.421313]  dump_stack_lvl+0x8c/0xd0
[   18.421508]  print_report+0x118/0x5d0
[   18.421643]  kasan_report+0xdc/0x128
[   18.421707]  __asan_report_load8_noabort+0x20/0x30
[   18.421759]  kasan_atomics_helper+0x3e10/0x4858
[   18.422084]  kasan_atomics+0x198/0x2e0
[   18.422153]  kunit_try_run_case+0x170/0x3f0
[   18.422463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.422545]  kthread+0x328/0x630
[   18.422589]  ret_from_fork+0x10/0x20
[   18.422848] 
[   18.422927] Allocated by task 265:
[   18.422963]  kasan_save_stack+0x3c/0x68
[   18.423096]  kasan_save_track+0x20/0x40
[   18.423139]  kasan_save_alloc_info+0x40/0x58
[   18.423180]  __kasan_kmalloc+0xd4/0xd8
[   18.423219]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.423775]  kasan_atomics+0xb8/0x2e0
[   18.423957]  kunit_try_run_case+0x170/0x3f0
[   18.424067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.424627]  kthread+0x328/0x630
[   18.424703]  ret_from_fork+0x10/0x20
[   18.424958] 
[   18.424985] The buggy address belongs to the object at fff00000c78be300
[   18.424985]  which belongs to the cache kmalloc-64 of size 64
[   18.425166] The buggy address is located 0 bytes to the right of
[   18.425166]  allocated 48-byte region [fff00000c78be300, fff00000c78be330)
[   18.425457] 
[   18.425676] The buggy address belongs to the physical page:
[   18.425719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078be
[   18.426148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.426514] page_type: f5(slab)
[   18.426562] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.427162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.427234] page dumped because: kasan: bad access detected
[   18.427432] 
[   18.427460] Memory state around the buggy address:
[   18.427498]  fff00000c78be200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.427546]  fff00000c78be280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.427600] >fff00000c78be300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.427895]                                      ^
[   18.428142]  fff00000c78be380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.428208]  fff00000c78be400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.428394] ==================================================================

[   14.910369] ==================================================================
[   14.910975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.911329] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   14.911641] 
[   14.911834] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.911879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.911891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.911924] Call Trace:
[   14.911939]  <TASK>
[   14.911953]  dump_stack_lvl+0x73/0xb0
[   14.911980]  print_report+0xd1/0x610
[   14.912002]  ? __virt_addr_valid+0x1db/0x2d0
[   14.912026]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.912047]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.912069]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.912090]  kasan_report+0x141/0x180
[   14.912113]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.912139]  __asan_report_store4_noabort+0x1b/0x30
[   14.912164]  kasan_atomics_helper+0x4b3a/0x5450
[   14.912186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.912208]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.912232]  ? trace_hardirqs_on+0x37/0xe0
[   14.912254]  ? kasan_atomics+0x152/0x310
[   14.912280]  kasan_atomics+0x1dc/0x310
[   14.912303]  ? __pfx_kasan_atomics+0x10/0x10
[   14.912326]  ? __pfx_kasan_atomics+0x10/0x10
[   14.912391]  kunit_try_run_case+0x1a5/0x480
[   14.912420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.912444]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.912467]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.912490]  ? __kthread_parkme+0x82/0x180
[   14.912511]  ? preempt_count_sub+0x50/0x80
[   14.912534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.912558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.912581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.912605]  kthread+0x337/0x6f0
[   14.912624]  ? trace_preempt_on+0x20/0xc0
[   14.912646]  ? __pfx_kthread+0x10/0x10
[   14.912666]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.912694]  ? calculate_sigpending+0x7b/0xa0
[   14.912718]  ? __pfx_kthread+0x10/0x10
[   14.912739]  ret_from_fork+0x116/0x1d0
[   14.912758]  ? __pfx_kthread+0x10/0x10
[   14.912778]  ret_from_fork_asm+0x1a/0x30
[   14.912810]  </TASK>
[   14.912820] 
[   14.923504] Allocated by task 283:
[   14.923682]  kasan_save_stack+0x45/0x70
[   14.923874]  kasan_save_track+0x18/0x40
[   14.924062]  kasan_save_alloc_info+0x3b/0x50
[   14.924258]  __kasan_kmalloc+0xb7/0xc0
[   14.924798]  __kmalloc_cache_noprof+0x189/0x420
[   14.925029]  kasan_atomics+0x95/0x310
[   14.925204]  kunit_try_run_case+0x1a5/0x480
[   14.925756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.926233]  kthread+0x337/0x6f0
[   14.926599]  ret_from_fork+0x116/0x1d0
[   14.926799]  ret_from_fork_asm+0x1a/0x30
[   14.926985] 
[   14.927084] The buggy address belongs to the object at ffff888102744f80
[   14.927084]  which belongs to the cache kmalloc-64 of size 64
[   14.928284] The buggy address is located 0 bytes to the right of
[   14.928284]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   14.929165] 
[   14.929261] The buggy address belongs to the physical page:
[   14.929564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   14.930653] flags: 0x200000000000000(node=0|zone=2)
[   14.931099] page_type: f5(slab)
[   14.931261] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.932075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.932668] page dumped because: kasan: bad access detected
[   14.933061] 
[   14.933331] Memory state around the buggy address:
[   14.933847]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.934181]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.934797] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.935325]                                      ^
[   14.935756]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.936070]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.936345] ==================================================================
[   15.509227] ==================================================================
[   15.509619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.510038] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.510297] 
[   15.510402] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.510444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.510456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.510477] Call Trace:
[   15.510489]  <TASK>
[   15.510503]  dump_stack_lvl+0x73/0xb0
[   15.510530]  print_report+0xd1/0x610
[   15.510551]  ? __virt_addr_valid+0x1db/0x2d0
[   15.510573]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.510595]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.510617]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.510638]  kasan_report+0x141/0x180
[   15.510660]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.510686]  __asan_report_load4_noabort+0x18/0x20
[   15.510711]  kasan_atomics_helper+0x49e8/0x5450
[   15.510734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.510756]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.510781]  ? trace_hardirqs_on+0x37/0xe0
[   15.510802]  ? kasan_atomics+0x152/0x310
[   15.510829]  kasan_atomics+0x1dc/0x310
[   15.510852]  ? __pfx_kasan_atomics+0x10/0x10
[   15.510875]  ? __pfx_kasan_atomics+0x10/0x10
[   15.510902]  kunit_try_run_case+0x1a5/0x480
[   15.510937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.510960]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.510982]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.511005]  ? __kthread_parkme+0x82/0x180
[   15.511025]  ? preempt_count_sub+0x50/0x80
[   15.511053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.511076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.511099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.511123]  kthread+0x337/0x6f0
[   15.511142]  ? trace_preempt_on+0x20/0xc0
[   15.511163]  ? __pfx_kthread+0x10/0x10
[   15.511184]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.511206]  ? calculate_sigpending+0x7b/0xa0
[   15.511229]  ? __pfx_kthread+0x10/0x10
[   15.511251]  ret_from_fork+0x116/0x1d0
[   15.511270]  ? __pfx_kthread+0x10/0x10
[   15.511291]  ret_from_fork_asm+0x1a/0x30
[   15.511322]  </TASK>
[   15.511332] 
[   15.518963] Allocated by task 283:
[   15.519144]  kasan_save_stack+0x45/0x70
[   15.519343]  kasan_save_track+0x18/0x40
[   15.519515]  kasan_save_alloc_info+0x3b/0x50
[   15.519692]  __kasan_kmalloc+0xb7/0xc0
[   15.519875]  __kmalloc_cache_noprof+0x189/0x420
[   15.520064]  kasan_atomics+0x95/0x310
[   15.520245]  kunit_try_run_case+0x1a5/0x480
[   15.520418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.520652]  kthread+0x337/0x6f0
[   15.520809]  ret_from_fork+0x116/0x1d0
[   15.520993]  ret_from_fork_asm+0x1a/0x30
[   15.521151] 
[   15.521221] The buggy address belongs to the object at ffff888102744f80
[   15.521221]  which belongs to the cache kmalloc-64 of size 64
[   15.521575] The buggy address is located 0 bytes to the right of
[   15.521575]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.521968] 
[   15.522125] The buggy address belongs to the physical page:
[   15.522378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.522724] flags: 0x200000000000000(node=0|zone=2)
[   15.522966] page_type: f5(slab)
[   15.523284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.523575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.524040] page dumped because: kasan: bad access detected
[   15.524265] 
[   15.524360] Memory state around the buggy address:
[   15.524522]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.524738]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.525080] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.525406]                                      ^
[   15.525633]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.525961]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.526334] ==================================================================
[   16.066829] ==================================================================
[   16.067179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.067711] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   16.068011] 
[   16.068130] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.068414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.068433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.068456] Call Trace:
[   16.068472]  <TASK>
[   16.068487]  dump_stack_lvl+0x73/0xb0
[   16.068517]  print_report+0xd1/0x610
[   16.068539]  ? __virt_addr_valid+0x1db/0x2d0
[   16.068562]  ? kasan_atomics_helper+0x2006/0x5450
[   16.068587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.068610]  ? kasan_atomics_helper+0x2006/0x5450
[   16.068634]  kasan_report+0x141/0x180
[   16.068657]  ? kasan_atomics_helper+0x2006/0x5450
[   16.068683]  kasan_check_range+0x10c/0x1c0
[   16.068708]  __kasan_check_write+0x18/0x20
[   16.068727]  kasan_atomics_helper+0x2006/0x5450
[   16.068750]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.068773]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.068797]  ? trace_hardirqs_on+0x37/0xe0
[   16.068819]  ? kasan_atomics+0x152/0x310
[   16.068846]  kasan_atomics+0x1dc/0x310
[   16.068869]  ? __pfx_kasan_atomics+0x10/0x10
[   16.068892]  ? __pfx_kasan_atomics+0x10/0x10
[   16.068944]  kunit_try_run_case+0x1a5/0x480
[   16.068967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.068991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.069015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.069038]  ? __kthread_parkme+0x82/0x180
[   16.069059]  ? preempt_count_sub+0x50/0x80
[   16.069082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.069106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.069128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.069152]  kthread+0x337/0x6f0
[   16.069172]  ? trace_preempt_on+0x20/0xc0
[   16.069193]  ? __pfx_kthread+0x10/0x10
[   16.069214]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.069236]  ? calculate_sigpending+0x7b/0xa0
[   16.069259]  ? __pfx_kthread+0x10/0x10
[   16.069280]  ret_from_fork+0x116/0x1d0
[   16.069298]  ? __pfx_kthread+0x10/0x10
[   16.069318]  ret_from_fork_asm+0x1a/0x30
[   16.069349]  </TASK>
[   16.069360] 
[   16.077354] Allocated by task 283:
[   16.077537]  kasan_save_stack+0x45/0x70
[   16.078346]  kasan_save_track+0x18/0x40
[   16.078561]  kasan_save_alloc_info+0x3b/0x50
[   16.079330]  __kasan_kmalloc+0xb7/0xc0
[   16.079517]  __kmalloc_cache_noprof+0x189/0x420
[   16.079788]  kasan_atomics+0x95/0x310
[   16.080016]  kunit_try_run_case+0x1a5/0x480
[   16.080458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.080808]  kthread+0x337/0x6f0
[   16.080960]  ret_from_fork+0x116/0x1d0
[   16.081182]  ret_from_fork_asm+0x1a/0x30
[   16.081550] 
[   16.081673] The buggy address belongs to the object at ffff888102744f80
[   16.081673]  which belongs to the cache kmalloc-64 of size 64
[   16.082324] The buggy address is located 0 bytes to the right of
[   16.082324]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.083205] 
[   16.083300] The buggy address belongs to the physical page:
[   16.083680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.084081] flags: 0x200000000000000(node=0|zone=2)
[   16.084426] page_type: f5(slab)
[   16.084693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.085071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.085526] page dumped because: kasan: bad access detected
[   16.085894] 
[   16.086010] Memory state around the buggy address:
[   16.086334]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.086634]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.087225] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.087611]                                      ^
[   16.087964]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.088252]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.088569] ==================================================================
[   14.889501] ==================================================================
[   14.890155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.890864] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   14.891118] 
[   14.891206] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.891250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.891263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.891285] Call Trace:
[   14.891300]  <TASK>
[   14.891315]  dump_stack_lvl+0x73/0xb0
[   14.891343]  print_report+0xd1/0x610
[   14.891375]  ? __virt_addr_valid+0x1db/0x2d0
[   14.891398]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.891419]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.891441]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.891462]  kasan_report+0x141/0x180
[   14.891485]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.891510]  kasan_check_range+0x10c/0x1c0
[   14.891535]  __kasan_check_write+0x18/0x20
[   14.891555]  kasan_atomics_helper+0x4a0/0x5450
[   14.891577]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.891599]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.891625]  ? trace_hardirqs_on+0x37/0xe0
[   14.891648]  ? kasan_atomics+0x152/0x310
[   14.891676]  kasan_atomics+0x1dc/0x310
[   14.891887]  ? __pfx_kasan_atomics+0x10/0x10
[   14.891925]  ? __pfx_kasan_atomics+0x10/0x10
[   14.891952]  kunit_try_run_case+0x1a5/0x480
[   14.891977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.891999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.892023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.892047]  ? __kthread_parkme+0x82/0x180
[   14.892067]  ? preempt_count_sub+0x50/0x80
[   14.892090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.892138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.892161]  kthread+0x337/0x6f0
[   14.892181]  ? trace_preempt_on+0x20/0xc0
[   14.892202]  ? __pfx_kthread+0x10/0x10
[   14.892223]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.892244]  ? calculate_sigpending+0x7b/0xa0
[   14.892268]  ? __pfx_kthread+0x10/0x10
[   14.892289]  ret_from_fork+0x116/0x1d0
[   14.892308]  ? __pfx_kthread+0x10/0x10
[   14.892329]  ret_from_fork_asm+0x1a/0x30
[   14.892411]  </TASK>
[   14.892424] 
[   14.902134] Allocated by task 283:
[   14.902302]  kasan_save_stack+0x45/0x70
[   14.902608]  kasan_save_track+0x18/0x40
[   14.902807]  kasan_save_alloc_info+0x3b/0x50
[   14.902972]  __kasan_kmalloc+0xb7/0xc0
[   14.903159]  __kmalloc_cache_noprof+0x189/0x420
[   14.903463]  kasan_atomics+0x95/0x310
[   14.903663]  kunit_try_run_case+0x1a5/0x480
[   14.903886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.904154]  kthread+0x337/0x6f0
[   14.904318]  ret_from_fork+0x116/0x1d0
[   14.904579]  ret_from_fork_asm+0x1a/0x30
[   14.904765] 
[   14.904854] The buggy address belongs to the object at ffff888102744f80
[   14.904854]  which belongs to the cache kmalloc-64 of size 64
[   14.905316] The buggy address is located 0 bytes to the right of
[   14.905316]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   14.905849] 
[   14.905958] The buggy address belongs to the physical page:
[   14.906133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   14.906450] flags: 0x200000000000000(node=0|zone=2)
[   14.906683] page_type: f5(slab)
[   14.906812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.907301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.907597] page dumped because: kasan: bad access detected
[   14.907822] 
[   14.907936] Memory state around the buggy address:
[   14.908151]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.908408]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.908734] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.909005]                                      ^
[   14.909236]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.909466]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.909681] ==================================================================
[   15.112048] ==================================================================
[   15.112673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.113234] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.113965] 
[   15.114103] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.114148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.114161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.114183] Call Trace:
[   15.114198]  <TASK>
[   15.114213]  dump_stack_lvl+0x73/0xb0
[   15.114241]  print_report+0xd1/0x610
[   15.114264]  ? __virt_addr_valid+0x1db/0x2d0
[   15.114285]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.114306]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.114329]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.114351]  kasan_report+0x141/0x180
[   15.114373]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.114399]  kasan_check_range+0x10c/0x1c0
[   15.114423]  __kasan_check_write+0x18/0x20
[   15.114442]  kasan_atomics_helper+0x8f9/0x5450
[   15.114464]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.114486]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.114511]  ? trace_hardirqs_on+0x37/0xe0
[   15.114532]  ? kasan_atomics+0x152/0x310
[   15.114559]  kasan_atomics+0x1dc/0x310
[   15.114583]  ? __pfx_kasan_atomics+0x10/0x10
[   15.114609]  ? __pfx_kasan_atomics+0x10/0x10
[   15.114637]  kunit_try_run_case+0x1a5/0x480
[   15.114661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.114708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.114731]  ? __kthread_parkme+0x82/0x180
[   15.114752]  ? preempt_count_sub+0x50/0x80
[   15.114775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.114822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.114849]  kthread+0x337/0x6f0
[   15.114870]  ? trace_preempt_on+0x20/0xc0
[   15.114893]  ? __pfx_kthread+0x10/0x10
[   15.114927]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.114948]  ? calculate_sigpending+0x7b/0xa0
[   15.114971]  ? __pfx_kthread+0x10/0x10
[   15.114994]  ret_from_fork+0x116/0x1d0
[   15.115013]  ? __pfx_kthread+0x10/0x10
[   15.115034]  ret_from_fork_asm+0x1a/0x30
[   15.115072]  </TASK>
[   15.115083] 
[   15.127246] Allocated by task 283:
[   15.127774]  kasan_save_stack+0x45/0x70
[   15.127994]  kasan_save_track+0x18/0x40
[   15.128385]  kasan_save_alloc_info+0x3b/0x50
[   15.128640]  __kasan_kmalloc+0xb7/0xc0
[   15.129086]  __kmalloc_cache_noprof+0x189/0x420
[   15.129316]  kasan_atomics+0x95/0x310
[   15.129675]  kunit_try_run_case+0x1a5/0x480
[   15.130082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.130330]  kthread+0x337/0x6f0
[   15.130780]  ret_from_fork+0x116/0x1d0
[   15.130997]  ret_from_fork_asm+0x1a/0x30
[   15.131193] 
[   15.131286] The buggy address belongs to the object at ffff888102744f80
[   15.131286]  which belongs to the cache kmalloc-64 of size 64
[   15.132353] The buggy address is located 0 bytes to the right of
[   15.132353]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.133315] 
[   15.133440] The buggy address belongs to the physical page:
[   15.133918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.134570] flags: 0x200000000000000(node=0|zone=2)
[   15.135028] page_type: f5(slab)
[   15.135208] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.135763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.136310] page dumped because: kasan: bad access detected
[   15.136686] 
[   15.136796] Memory state around the buggy address:
[   15.137214]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.137742]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.138201] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.138717]                                      ^
[   15.139184]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.139698]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.140153] ==================================================================
[   15.569993] ==================================================================
[   15.570644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.571075] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.571733] 
[   15.572016] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.572063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.572075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.572217] Call Trace:
[   15.572234]  <TASK>
[   15.572249]  dump_stack_lvl+0x73/0xb0
[   15.572280]  print_report+0xd1/0x610
[   15.572302]  ? __virt_addr_valid+0x1db/0x2d0
[   15.572325]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.572346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.572368]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.572391]  kasan_report+0x141/0x180
[   15.572413]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.572438]  kasan_check_range+0x10c/0x1c0
[   15.572462]  __kasan_check_read+0x15/0x20
[   15.572481]  kasan_atomics_helper+0x13b5/0x5450
[   15.572504]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.572525]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.572549]  ? trace_hardirqs_on+0x37/0xe0
[   15.572571]  ? kasan_atomics+0x152/0x310
[   15.572598]  kasan_atomics+0x1dc/0x310
[   15.572620]  ? __pfx_kasan_atomics+0x10/0x10
[   15.572644]  ? __pfx_kasan_atomics+0x10/0x10
[   15.572670]  kunit_try_run_case+0x1a5/0x480
[   15.572706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.572728]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.572752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.572775]  ? __kthread_parkme+0x82/0x180
[   15.572796]  ? preempt_count_sub+0x50/0x80
[   15.572819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.572843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.572865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.572889]  kthread+0x337/0x6f0
[   15.572920]  ? trace_preempt_on+0x20/0xc0
[   15.572943]  ? __pfx_kthread+0x10/0x10
[   15.572963]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.572985]  ? calculate_sigpending+0x7b/0xa0
[   15.573008]  ? __pfx_kthread+0x10/0x10
[   15.573029]  ret_from_fork+0x116/0x1d0
[   15.573048]  ? __pfx_kthread+0x10/0x10
[   15.573069]  ret_from_fork_asm+0x1a/0x30
[   15.573100]  </TASK>
[   15.573111] 
[   15.582522] Allocated by task 283:
[   15.582709]  kasan_save_stack+0x45/0x70
[   15.583261]  kasan_save_track+0x18/0x40
[   15.583459]  kasan_save_alloc_info+0x3b/0x50
[   15.583818]  __kasan_kmalloc+0xb7/0xc0
[   15.584021]  __kmalloc_cache_noprof+0x189/0x420
[   15.584315]  kasan_atomics+0x95/0x310
[   15.584609]  kunit_try_run_case+0x1a5/0x480
[   15.584804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.585128]  kthread+0x337/0x6f0
[   15.585293]  ret_from_fork+0x116/0x1d0
[   15.585466]  ret_from_fork_asm+0x1a/0x30
[   15.585650] 
[   15.585989] The buggy address belongs to the object at ffff888102744f80
[   15.585989]  which belongs to the cache kmalloc-64 of size 64
[   15.586495] The buggy address is located 0 bytes to the right of
[   15.586495]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.587334] 
[   15.587563] The buggy address belongs to the physical page:
[   15.587888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.588304] flags: 0x200000000000000(node=0|zone=2)
[   15.588491] page_type: f5(slab)
[   15.588664] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.589257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.589606] page dumped because: kasan: bad access detected
[   15.589812] 
[   15.589922] Memory state around the buggy address:
[   15.590238]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.590660]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.591063] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.591413]                                      ^
[   15.591629]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.592119]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.592494] ==================================================================
[   15.847398] ==================================================================
[   15.847768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.848159] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.848517] 
[   15.848616] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.848657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.848689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.848710] Call Trace:
[   15.848723]  <TASK>
[   15.848736]  dump_stack_lvl+0x73/0xb0
[   15.848763]  print_report+0xd1/0x610
[   15.848784]  ? __virt_addr_valid+0x1db/0x2d0
[   15.848807]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.848827]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.848850]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.848871]  kasan_report+0x141/0x180
[   15.848894]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.848928]  kasan_check_range+0x10c/0x1c0
[   15.848952]  __kasan_check_write+0x18/0x20
[   15.848970]  kasan_atomics_helper+0x1a7f/0x5450
[   15.848993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.849015]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.849039]  ? trace_hardirqs_on+0x37/0xe0
[   15.849060]  ? kasan_atomics+0x152/0x310
[   15.849086]  kasan_atomics+0x1dc/0x310
[   15.849108]  ? __pfx_kasan_atomics+0x10/0x10
[   15.849132]  ? __pfx_kasan_atomics+0x10/0x10
[   15.849158]  kunit_try_run_case+0x1a5/0x480
[   15.849182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.849205]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.849228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.849252]  ? __kthread_parkme+0x82/0x180
[   15.849271]  ? preempt_count_sub+0x50/0x80
[   15.849293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.849317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.849342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.849366]  kthread+0x337/0x6f0
[   15.849386]  ? trace_preempt_on+0x20/0xc0
[   15.849407]  ? __pfx_kthread+0x10/0x10
[   15.849428]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.849450]  ? calculate_sigpending+0x7b/0xa0
[   15.849473]  ? __pfx_kthread+0x10/0x10
[   15.849494]  ret_from_fork+0x116/0x1d0
[   15.849515]  ? __pfx_kthread+0x10/0x10
[   15.849535]  ret_from_fork_asm+0x1a/0x30
[   15.849567]  </TASK>
[   15.849577] 
[   15.856814] Allocated by task 283:
[   15.856954]  kasan_save_stack+0x45/0x70
[   15.857099]  kasan_save_track+0x18/0x40
[   15.857235]  kasan_save_alloc_info+0x3b/0x50
[   15.857383]  __kasan_kmalloc+0xb7/0xc0
[   15.857571]  __kmalloc_cache_noprof+0x189/0x420
[   15.857817]  kasan_atomics+0x95/0x310
[   15.858016]  kunit_try_run_case+0x1a5/0x480
[   15.858224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.858476]  kthread+0x337/0x6f0
[   15.858643]  ret_from_fork+0x116/0x1d0
[   15.858847]  ret_from_fork_asm+0x1a/0x30
[   15.859064] 
[   15.859159] The buggy address belongs to the object at ffff888102744f80
[   15.859159]  which belongs to the cache kmalloc-64 of size 64
[   15.859679] The buggy address is located 0 bytes to the right of
[   15.859679]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.860091] 
[   15.860165] The buggy address belongs to the physical page:
[   15.860349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.860725] flags: 0x200000000000000(node=0|zone=2)
[   15.860973] page_type: f5(slab)
[   15.861145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.861464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.861720] page dumped because: kasan: bad access detected
[   15.861892] 
[   15.861970] Memory state around the buggy address:
[   15.862128]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.862344]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.862654] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.862996]                                      ^
[   15.863229]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.863552]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.863890] ==================================================================
[   15.593665] ==================================================================
[   15.593995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.594440] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.594728] 
[   15.594853] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.594895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.594919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.594992] Call Trace:
[   15.595007]  <TASK>
[   15.595022]  dump_stack_lvl+0x73/0xb0
[   15.595058]  print_report+0xd1/0x610
[   15.595079]  ? __virt_addr_valid+0x1db/0x2d0
[   15.595102]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.595123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.595145]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.595167]  kasan_report+0x141/0x180
[   15.595188]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.595214]  __asan_report_load8_noabort+0x18/0x20
[   15.595238]  kasan_atomics_helper+0x4eae/0x5450
[   15.595260]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.595282]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.595306]  ? trace_hardirqs_on+0x37/0xe0
[   15.595328]  ? kasan_atomics+0x152/0x310
[   15.595355]  kasan_atomics+0x1dc/0x310
[   15.595377]  ? __pfx_kasan_atomics+0x10/0x10
[   15.595402]  ? __pfx_kasan_atomics+0x10/0x10
[   15.595429]  kunit_try_run_case+0x1a5/0x480
[   15.595453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.595476]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.595499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.595522]  ? __kthread_parkme+0x82/0x180
[   15.595542]  ? preempt_count_sub+0x50/0x80
[   15.595566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.595590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.595613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.595637]  kthread+0x337/0x6f0
[   15.595656]  ? trace_preempt_on+0x20/0xc0
[   15.595679]  ? __pfx_kthread+0x10/0x10
[   15.595711]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.595732]  ? calculate_sigpending+0x7b/0xa0
[   15.595756]  ? __pfx_kthread+0x10/0x10
[   15.595777]  ret_from_fork+0x116/0x1d0
[   15.595796]  ? __pfx_kthread+0x10/0x10
[   15.595816]  ret_from_fork_asm+0x1a/0x30
[   15.595847]  </TASK>
[   15.595857] 
[   15.603176] Allocated by task 283:
[   15.603334]  kasan_save_stack+0x45/0x70
[   15.603496]  kasan_save_track+0x18/0x40
[   15.603631]  kasan_save_alloc_info+0x3b/0x50
[   15.603780]  __kasan_kmalloc+0xb7/0xc0
[   15.603978]  __kmalloc_cache_noprof+0x189/0x420
[   15.604208]  kasan_atomics+0x95/0x310
[   15.604394]  kunit_try_run_case+0x1a5/0x480
[   15.604600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.604889]  kthread+0x337/0x6f0
[   15.605020]  ret_from_fork+0x116/0x1d0
[   15.605154]  ret_from_fork_asm+0x1a/0x30
[   15.605354] 
[   15.605447] The buggy address belongs to the object at ffff888102744f80
[   15.605447]  which belongs to the cache kmalloc-64 of size 64
[   15.606136] The buggy address is located 0 bytes to the right of
[   15.606136]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.606626] 
[   15.606745] The buggy address belongs to the physical page:
[   15.606977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.607267] flags: 0x200000000000000(node=0|zone=2)
[   15.607495] page_type: f5(slab)
[   15.607670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.607960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.608262] page dumped because: kasan: bad access detected
[   15.608476] 
[   15.608544] Memory state around the buggy address:
[   15.608700]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.608927]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.609144] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.609414]                                      ^
[   15.609634]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.610063]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.610277] ==================================================================
[   16.176444] ==================================================================
[   16.177002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.177476] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   16.177945] 
[   16.178055] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.178096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.178108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.178128] Call Trace:
[   16.178142]  <TASK>
[   16.178155]  dump_stack_lvl+0x73/0xb0
[   16.178183]  print_report+0xd1/0x610
[   16.178205]  ? __virt_addr_valid+0x1db/0x2d0
[   16.178250]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.178272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.178309]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.178345]  kasan_report+0x141/0x180
[   16.178380]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.178420]  __asan_report_load8_noabort+0x18/0x20
[   16.178458]  kasan_atomics_helper+0x4fa5/0x5450
[   16.178481]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.178516]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.178552]  ? trace_hardirqs_on+0x37/0xe0
[   16.178587]  ? kasan_atomics+0x152/0x310
[   16.178627]  kasan_atomics+0x1dc/0x310
[   16.178663]  ? __pfx_kasan_atomics+0x10/0x10
[   16.178697]  ? __pfx_kasan_atomics+0x10/0x10
[   16.178724]  kunit_try_run_case+0x1a5/0x480
[   16.178749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.178772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.178796]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.178820]  ? __kthread_parkme+0x82/0x180
[   16.178841]  ? preempt_count_sub+0x50/0x80
[   16.178864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.178889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.178923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.178947]  kthread+0x337/0x6f0
[   16.178967]  ? trace_preempt_on+0x20/0xc0
[   16.178989]  ? __pfx_kthread+0x10/0x10
[   16.179010]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.179031]  ? calculate_sigpending+0x7b/0xa0
[   16.179058]  ? __pfx_kthread+0x10/0x10
[   16.179080]  ret_from_fork+0x116/0x1d0
[   16.179099]  ? __pfx_kthread+0x10/0x10
[   16.179120]  ret_from_fork_asm+0x1a/0x30
[   16.179150]  </TASK>
[   16.179162] 
[   16.186827] Allocated by task 283:
[   16.187039]  kasan_save_stack+0x45/0x70
[   16.187206]  kasan_save_track+0x18/0x40
[   16.187343]  kasan_save_alloc_info+0x3b/0x50
[   16.187498]  __kasan_kmalloc+0xb7/0xc0
[   16.187685]  __kmalloc_cache_noprof+0x189/0x420
[   16.187929]  kasan_atomics+0x95/0x310
[   16.188132]  kunit_try_run_case+0x1a5/0x480
[   16.188340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.188592]  kthread+0x337/0x6f0
[   16.188861]  ret_from_fork+0x116/0x1d0
[   16.189060]  ret_from_fork_asm+0x1a/0x30
[   16.189256] 
[   16.189351] The buggy address belongs to the object at ffff888102744f80
[   16.189351]  which belongs to the cache kmalloc-64 of size 64
[   16.189878] The buggy address is located 0 bytes to the right of
[   16.189878]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.190724] 
[   16.190819] The buggy address belongs to the physical page:
[   16.191082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.191339] flags: 0x200000000000000(node=0|zone=2)
[   16.191503] page_type: f5(slab)
[   16.191623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.192338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.192679] page dumped because: kasan: bad access detected
[   16.192966] 
[   16.193061] Memory state around the buggy address:
[   16.193306]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.193605]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.193893] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.194220]                                      ^
[   16.194431]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.194744]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.195057] ==================================================================
[   15.282179] ==================================================================
[   15.282613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.283019] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.283291] 
[   15.283466] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.283510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.283523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.283544] Call Trace:
[   15.283560]  <TASK>
[   15.283577]  dump_stack_lvl+0x73/0xb0
[   15.283605]  print_report+0xd1/0x610
[   15.283627]  ? __virt_addr_valid+0x1db/0x2d0
[   15.283650]  ? kasan_atomics_helper+0xd47/0x5450
[   15.283671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.283693]  ? kasan_atomics_helper+0xd47/0x5450
[   15.283715]  kasan_report+0x141/0x180
[   15.283737]  ? kasan_atomics_helper+0xd47/0x5450
[   15.283763]  kasan_check_range+0x10c/0x1c0
[   15.283787]  __kasan_check_write+0x18/0x20
[   15.283806]  kasan_atomics_helper+0xd47/0x5450
[   15.283828]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.283850]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.283873]  ? trace_hardirqs_on+0x37/0xe0
[   15.283895]  ? kasan_atomics+0x152/0x310
[   15.283935]  kasan_atomics+0x1dc/0x310
[   15.283958]  ? __pfx_kasan_atomics+0x10/0x10
[   15.283981]  ? __pfx_kasan_atomics+0x10/0x10
[   15.284008]  kunit_try_run_case+0x1a5/0x480
[   15.284032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.284054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.284078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.284101]  ? __kthread_parkme+0x82/0x180
[   15.284123]  ? preempt_count_sub+0x50/0x80
[   15.284146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.284170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.284193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.284216]  kthread+0x337/0x6f0
[   15.284236]  ? trace_preempt_on+0x20/0xc0
[   15.284258]  ? __pfx_kthread+0x10/0x10
[   15.284279]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.284300]  ? calculate_sigpending+0x7b/0xa0
[   15.284323]  ? __pfx_kthread+0x10/0x10
[   15.284345]  ret_from_fork+0x116/0x1d0
[   15.284381]  ? __pfx_kthread+0x10/0x10
[   15.284402]  ret_from_fork_asm+0x1a/0x30
[   15.284432]  </TASK>
[   15.284442] 
[   15.292501] Allocated by task 283:
[   15.292694]  kasan_save_stack+0x45/0x70
[   15.292886]  kasan_save_track+0x18/0x40
[   15.293039]  kasan_save_alloc_info+0x3b/0x50
[   15.293189]  __kasan_kmalloc+0xb7/0xc0
[   15.293332]  __kmalloc_cache_noprof+0x189/0x420
[   15.293571]  kasan_atomics+0x95/0x310
[   15.293769]  kunit_try_run_case+0x1a5/0x480
[   15.293991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.294222]  kthread+0x337/0x6f0
[   15.294344]  ret_from_fork+0x116/0x1d0
[   15.294498]  ret_from_fork_asm+0x1a/0x30
[   15.294879] 
[   15.295002] The buggy address belongs to the object at ffff888102744f80
[   15.295002]  which belongs to the cache kmalloc-64 of size 64
[   15.295598] The buggy address is located 0 bytes to the right of
[   15.295598]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.296100] 
[   15.296202] The buggy address belongs to the physical page:
[   15.296453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.296693] flags: 0x200000000000000(node=0|zone=2)
[   15.296853] page_type: f5(slab)
[   15.296982] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.297210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.297736] page dumped because: kasan: bad access detected
[   15.297996] 
[   15.298089] Memory state around the buggy address:
[   15.298311]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.298625]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.299010] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.299229]                                      ^
[   15.299384]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.299615]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.301042] ==================================================================
[   14.968014] ==================================================================
[   14.968767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.969565] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   14.969843] 
[   14.969945] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.969993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.970006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.970027] Call Trace:
[   14.970044]  <TASK>
[   14.970060]  dump_stack_lvl+0x73/0xb0
[   14.970088]  print_report+0xd1/0x610
[   14.970111]  ? __virt_addr_valid+0x1db/0x2d0
[   14.970134]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.970155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.970178]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.970199]  kasan_report+0x141/0x180
[   14.970222]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.970249]  kasan_check_range+0x10c/0x1c0
[   14.970272]  __kasan_check_write+0x18/0x20
[   14.970292]  kasan_atomics_helper+0x5fe/0x5450
[   14.970314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.970337]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.970360]  ? trace_hardirqs_on+0x37/0xe0
[   14.970382]  ? kasan_atomics+0x152/0x310
[   14.970409]  kasan_atomics+0x1dc/0x310
[   14.970431]  ? __pfx_kasan_atomics+0x10/0x10
[   14.970456]  ? __pfx_kasan_atomics+0x10/0x10
[   14.970482]  kunit_try_run_case+0x1a5/0x480
[   14.970506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.970529]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.970553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.970575]  ? __kthread_parkme+0x82/0x180
[   14.970595]  ? preempt_count_sub+0x50/0x80
[   14.970619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.970643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.970666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.970689]  kthread+0x337/0x6f0
[   14.970708]  ? trace_preempt_on+0x20/0xc0
[   14.970731]  ? __pfx_kthread+0x10/0x10
[   14.970751]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.970773]  ? calculate_sigpending+0x7b/0xa0
[   14.970796]  ? __pfx_kthread+0x10/0x10
[   14.970817]  ret_from_fork+0x116/0x1d0
[   14.970836]  ? __pfx_kthread+0x10/0x10
[   14.970855]  ret_from_fork_asm+0x1a/0x30
[   14.970886]  </TASK>
[   14.970897] 
[   14.989173] Allocated by task 283:
[   14.989523]  kasan_save_stack+0x45/0x70
[   14.989852]  kasan_save_track+0x18/0x40
[   14.990068]  kasan_save_alloc_info+0x3b/0x50
[   14.990269]  __kasan_kmalloc+0xb7/0xc0
[   14.990703]  __kmalloc_cache_noprof+0x189/0x420
[   14.991151]  kasan_atomics+0x95/0x310
[   14.991629]  kunit_try_run_case+0x1a5/0x480
[   14.991923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.992165]  kthread+0x337/0x6f0
[   14.992316]  ret_from_fork+0x116/0x1d0
[   14.992779]  ret_from_fork_asm+0x1a/0x30
[   14.993111] 
[   14.993338] The buggy address belongs to the object at ffff888102744f80
[   14.993338]  which belongs to the cache kmalloc-64 of size 64
[   14.994069] The buggy address is located 0 bytes to the right of
[   14.994069]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   14.995196] 
[   14.995298] The buggy address belongs to the physical page:
[   14.995784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   14.996458] flags: 0x200000000000000(node=0|zone=2)
[   14.996932] page_type: f5(slab)
[   14.997376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.997939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.998231] page dumped because: kasan: bad access detected
[   14.998647] 
[   14.998901] Memory state around the buggy address:
[   14.999264]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.999872]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.000506] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.001160]                                      ^
[   15.001561]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.001981]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.002622] ==================================================================
[   15.731666] ==================================================================
[   15.731987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.732221] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.732668] 
[   15.732817] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.732862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.732875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.732897] Call Trace:
[   15.732918]  <TASK>
[   15.732933]  dump_stack_lvl+0x73/0xb0
[   15.732959]  print_report+0xd1/0x610
[   15.732981]  ? __virt_addr_valid+0x1db/0x2d0
[   15.733003]  ? kasan_atomics_helper+0x177f/0x5450
[   15.733026]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.733048]  ? kasan_atomics_helper+0x177f/0x5450
[   15.733071]  kasan_report+0x141/0x180
[   15.733094]  ? kasan_atomics_helper+0x177f/0x5450
[   15.733120]  kasan_check_range+0x10c/0x1c0
[   15.733145]  __kasan_check_write+0x18/0x20
[   15.733164]  kasan_atomics_helper+0x177f/0x5450
[   15.733186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.733209]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.733232]  ? trace_hardirqs_on+0x37/0xe0
[   15.733256]  ? kasan_atomics+0x152/0x310
[   15.733295]  kasan_atomics+0x1dc/0x310
[   15.733318]  ? __pfx_kasan_atomics+0x10/0x10
[   15.733341]  ? __pfx_kasan_atomics+0x10/0x10
[   15.733379]  kunit_try_run_case+0x1a5/0x480
[   15.733404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.733426]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.733449]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.733482]  ? __kthread_parkme+0x82/0x180
[   15.733502]  ? preempt_count_sub+0x50/0x80
[   15.733526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.733561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.733583]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.733607]  kthread+0x337/0x6f0
[   15.733636]  ? trace_preempt_on+0x20/0xc0
[   15.733658]  ? __pfx_kthread+0x10/0x10
[   15.733679]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.733722]  ? calculate_sigpending+0x7b/0xa0
[   15.733744]  ? __pfx_kthread+0x10/0x10
[   15.733766]  ret_from_fork+0x116/0x1d0
[   15.733785]  ? __pfx_kthread+0x10/0x10
[   15.733805]  ret_from_fork_asm+0x1a/0x30
[   15.733845]  </TASK>
[   15.733858] 
[   15.741300] Allocated by task 283:
[   15.741430]  kasan_save_stack+0x45/0x70
[   15.741573]  kasan_save_track+0x18/0x40
[   15.741722]  kasan_save_alloc_info+0x3b/0x50
[   15.741937]  __kasan_kmalloc+0xb7/0xc0
[   15.742119]  __kmalloc_cache_noprof+0x189/0x420
[   15.742400]  kasan_atomics+0x95/0x310
[   15.742590]  kunit_try_run_case+0x1a5/0x480
[   15.742944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.743203]  kthread+0x337/0x6f0
[   15.743378]  ret_from_fork+0x116/0x1d0
[   15.743565]  ret_from_fork_asm+0x1a/0x30
[   15.743847] 
[   15.743951] The buggy address belongs to the object at ffff888102744f80
[   15.743951]  which belongs to the cache kmalloc-64 of size 64
[   15.744411] The buggy address is located 0 bytes to the right of
[   15.744411]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.745016] 
[   15.745114] The buggy address belongs to the physical page:
[   15.745414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.745886] flags: 0x200000000000000(node=0|zone=2)
[   15.746142] page_type: f5(slab)
[   15.746419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.746786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.747131] page dumped because: kasan: bad access detected
[   15.747316] 
[   15.747386] Memory state around the buggy address:
[   15.747541]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.747804]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.748225] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.748791]                                      ^
[   15.749048]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.749365]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.749647] ==================================================================
[   15.455054] ==================================================================
[   15.455539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.456126] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.456460] 
[   15.456571] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.456615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.456627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.456649] Call Trace:
[   15.456665]  <TASK>
[   15.456680]  dump_stack_lvl+0x73/0xb0
[   15.456709]  print_report+0xd1/0x610
[   15.456732]  ? __virt_addr_valid+0x1db/0x2d0
[   15.456754]  ? kasan_atomics_helper+0x1148/0x5450
[   15.456775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.456797]  ? kasan_atomics_helper+0x1148/0x5450
[   15.456819]  kasan_report+0x141/0x180
[   15.456840]  ? kasan_atomics_helper+0x1148/0x5450
[   15.456867]  kasan_check_range+0x10c/0x1c0
[   15.456890]  __kasan_check_write+0x18/0x20
[   15.456920]  kasan_atomics_helper+0x1148/0x5450
[   15.456942]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.456964]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.456987]  ? trace_hardirqs_on+0x37/0xe0
[   15.457009]  ? kasan_atomics+0x152/0x310
[   15.457036]  kasan_atomics+0x1dc/0x310
[   15.457057]  ? __pfx_kasan_atomics+0x10/0x10
[   15.457081]  ? __pfx_kasan_atomics+0x10/0x10
[   15.457110]  kunit_try_run_case+0x1a5/0x480
[   15.457134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.457157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.457181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.457204]  ? __kthread_parkme+0x82/0x180
[   15.457224]  ? preempt_count_sub+0x50/0x80
[   15.457247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.457271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.457294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.457317]  kthread+0x337/0x6f0
[   15.457337]  ? trace_preempt_on+0x20/0xc0
[   15.457359]  ? __pfx_kthread+0x10/0x10
[   15.457379]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.457401]  ? calculate_sigpending+0x7b/0xa0
[   15.457424]  ? __pfx_kthread+0x10/0x10
[   15.457445]  ret_from_fork+0x116/0x1d0
[   15.457464]  ? __pfx_kthread+0x10/0x10
[   15.457485]  ret_from_fork_asm+0x1a/0x30
[   15.457515]  </TASK>
[   15.457526] 
[   15.464801] Allocated by task 283:
[   15.464984]  kasan_save_stack+0x45/0x70
[   15.465138]  kasan_save_track+0x18/0x40
[   15.465274]  kasan_save_alloc_info+0x3b/0x50
[   15.465423]  __kasan_kmalloc+0xb7/0xc0
[   15.465555]  __kmalloc_cache_noprof+0x189/0x420
[   15.465844]  kasan_atomics+0x95/0x310
[   15.466042]  kunit_try_run_case+0x1a5/0x480
[   15.466249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.466501]  kthread+0x337/0x6f0
[   15.466667]  ret_from_fork+0x116/0x1d0
[   15.466843]  ret_from_fork_asm+0x1a/0x30
[   15.466994] 
[   15.467069] The buggy address belongs to the object at ffff888102744f80
[   15.467069]  which belongs to the cache kmalloc-64 of size 64
[   15.467511] The buggy address is located 0 bytes to the right of
[   15.467511]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.468334] 
[   15.468406] The buggy address belongs to the physical page:
[   15.468576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.468812] flags: 0x200000000000000(node=0|zone=2)
[   15.468983] page_type: f5(slab)
[   15.469104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.469689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.470036] page dumped because: kasan: bad access detected
[   15.470291] 
[   15.470384] Memory state around the buggy address:
[   15.470607]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.470919]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.471144] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.471359]                                      ^
[   15.471512]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.472144]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.472460] ==================================================================
[   16.015642] ==================================================================
[   16.016212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.016690] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   16.017218] 
[   16.017438] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.017485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.017498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.017519] Call Trace:
[   16.017533]  <TASK>
[   16.017547]  dump_stack_lvl+0x73/0xb0
[   16.017578]  print_report+0xd1/0x610
[   16.017601]  ? __virt_addr_valid+0x1db/0x2d0
[   16.017626]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.017649]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.017792]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.017820]  kasan_report+0x141/0x180
[   16.017844]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.017871]  kasan_check_range+0x10c/0x1c0
[   16.017896]  __kasan_check_write+0x18/0x20
[   16.017928]  kasan_atomics_helper+0x1f43/0x5450
[   16.017950]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.017972]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.017997]  ? trace_hardirqs_on+0x37/0xe0
[   16.018019]  ? kasan_atomics+0x152/0x310
[   16.018046]  kasan_atomics+0x1dc/0x310
[   16.018068]  ? __pfx_kasan_atomics+0x10/0x10
[   16.018091]  ? __pfx_kasan_atomics+0x10/0x10
[   16.018117]  kunit_try_run_case+0x1a5/0x480
[   16.018141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.018164]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.018187]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.018211]  ? __kthread_parkme+0x82/0x180
[   16.018230]  ? preempt_count_sub+0x50/0x80
[   16.018254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.018277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.018300]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.018323]  kthread+0x337/0x6f0
[   16.018342]  ? trace_preempt_on+0x20/0xc0
[   16.018365]  ? __pfx_kthread+0x10/0x10
[   16.018385]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.018406]  ? calculate_sigpending+0x7b/0xa0
[   16.018429]  ? __pfx_kthread+0x10/0x10
[   16.018450]  ret_from_fork+0x116/0x1d0
[   16.018469]  ? __pfx_kthread+0x10/0x10
[   16.018489]  ret_from_fork_asm+0x1a/0x30
[   16.018520]  </TASK>
[   16.018530] 
[   16.029286] Allocated by task 283:
[   16.029458]  kasan_save_stack+0x45/0x70
[   16.029649]  kasan_save_track+0x18/0x40
[   16.030230]  kasan_save_alloc_info+0x3b/0x50
[   16.030517]  __kasan_kmalloc+0xb7/0xc0
[   16.030836]  __kmalloc_cache_noprof+0x189/0x420
[   16.031137]  kasan_atomics+0x95/0x310
[   16.031425]  kunit_try_run_case+0x1a5/0x480
[   16.031638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.032062]  kthread+0x337/0x6f0
[   16.032242]  ret_from_fork+0x116/0x1d0
[   16.032565]  ret_from_fork_asm+0x1a/0x30
[   16.032933] 
[   16.033022] The buggy address belongs to the object at ffff888102744f80
[   16.033022]  which belongs to the cache kmalloc-64 of size 64
[   16.033755] The buggy address is located 0 bytes to the right of
[   16.033755]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.034464] 
[   16.034547] The buggy address belongs to the physical page:
[   16.034895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.035476] flags: 0x200000000000000(node=0|zone=2)
[   16.035817] page_type: f5(slab)
[   16.036074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.036440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.036967] page dumped because: kasan: bad access detected
[   16.037305] 
[   16.037413] Memory state around the buggy address:
[   16.037861]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.038219]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.038619] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.039169]                                      ^
[   16.039423]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.039924]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.040228] ==================================================================
[   15.323623] ==================================================================
[   15.324100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.324356] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.324755] 
[   15.324879] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.324933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.324946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.324966] Call Trace:
[   15.324978]  <TASK>
[   15.324992]  dump_stack_lvl+0x73/0xb0
[   15.325019]  print_report+0xd1/0x610
[   15.325041]  ? __virt_addr_valid+0x1db/0x2d0
[   15.325063]  ? kasan_atomics_helper+0xe78/0x5450
[   15.325084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.325106]  ? kasan_atomics_helper+0xe78/0x5450
[   15.325127]  kasan_report+0x141/0x180
[   15.325149]  ? kasan_atomics_helper+0xe78/0x5450
[   15.325175]  kasan_check_range+0x10c/0x1c0
[   15.325198]  __kasan_check_write+0x18/0x20
[   15.325217]  kasan_atomics_helper+0xe78/0x5450
[   15.325240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.325262]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.325286]  ? trace_hardirqs_on+0x37/0xe0
[   15.325308]  ? kasan_atomics+0x152/0x310
[   15.325335]  kasan_atomics+0x1dc/0x310
[   15.325359]  ? __pfx_kasan_atomics+0x10/0x10
[   15.325382]  ? __pfx_kasan_atomics+0x10/0x10
[   15.325409]  kunit_try_run_case+0x1a5/0x480
[   15.325433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.325456]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.325480]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.325503]  ? __kthread_parkme+0x82/0x180
[   15.325523]  ? preempt_count_sub+0x50/0x80
[   15.325546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.325744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.325769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.325793]  kthread+0x337/0x6f0
[   15.325813]  ? trace_preempt_on+0x20/0xc0
[   15.325835]  ? __pfx_kthread+0x10/0x10
[   15.325856]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.325878]  ? calculate_sigpending+0x7b/0xa0
[   15.325902]  ? __pfx_kthread+0x10/0x10
[   15.325938]  ret_from_fork+0x116/0x1d0
[   15.325957]  ? __pfx_kthread+0x10/0x10
[   15.325978]  ret_from_fork_asm+0x1a/0x30
[   15.326009]  </TASK>
[   15.326019] 
[   15.337324] Allocated by task 283:
[   15.337500]  kasan_save_stack+0x45/0x70
[   15.337841]  kasan_save_track+0x18/0x40
[   15.338024]  kasan_save_alloc_info+0x3b/0x50
[   15.338237]  __kasan_kmalloc+0xb7/0xc0
[   15.338411]  __kmalloc_cache_noprof+0x189/0x420
[   15.338687]  kasan_atomics+0x95/0x310
[   15.338953]  kunit_try_run_case+0x1a5/0x480
[   15.339147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.339329]  kthread+0x337/0x6f0
[   15.339496]  ret_from_fork+0x116/0x1d0
[   15.339788]  ret_from_fork_asm+0x1a/0x30
[   15.339950] 
[   15.340049] The buggy address belongs to the object at ffff888102744f80
[   15.340049]  which belongs to the cache kmalloc-64 of size 64
[   15.340608] The buggy address is located 0 bytes to the right of
[   15.340608]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.341168] 
[   15.341241] The buggy address belongs to the physical page:
[   15.341451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.341863] flags: 0x200000000000000(node=0|zone=2)
[   15.342341] page_type: f5(slab)
[   15.342563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.342971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.343246] page dumped because: kasan: bad access detected
[   15.343420] 
[   15.343515] Memory state around the buggy address:
[   15.343809]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.344127]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.344488] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.344841]                                      ^
[   15.345058]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.345360]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.345604] ==================================================================
[   15.610656] ==================================================================
[   15.610889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.611221] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.612252] 
[   15.612373] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.612418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.612430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.612452] Call Trace:
[   15.612466]  <TASK>
[   15.612481]  dump_stack_lvl+0x73/0xb0
[   15.612510]  print_report+0xd1/0x610
[   15.612533]  ? __virt_addr_valid+0x1db/0x2d0
[   15.612555]  ? kasan_atomics_helper+0x1467/0x5450
[   15.612576]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.612598]  ? kasan_atomics_helper+0x1467/0x5450
[   15.612620]  kasan_report+0x141/0x180
[   15.612642]  ? kasan_atomics_helper+0x1467/0x5450
[   15.612668]  kasan_check_range+0x10c/0x1c0
[   15.613067]  __kasan_check_write+0x18/0x20
[   15.613089]  kasan_atomics_helper+0x1467/0x5450
[   15.613112]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.613135]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.613159]  ? trace_hardirqs_on+0x37/0xe0
[   15.613615]  ? kasan_atomics+0x152/0x310
[   15.613651]  kasan_atomics+0x1dc/0x310
[   15.613676]  ? __pfx_kasan_atomics+0x10/0x10
[   15.613700]  ? __pfx_kasan_atomics+0x10/0x10
[   15.613729]  kunit_try_run_case+0x1a5/0x480
[   15.613754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.613793]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.613820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.613846]  ? __kthread_parkme+0x82/0x180
[   15.613868]  ? preempt_count_sub+0x50/0x80
[   15.613891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.613927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.613950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.613974]  kthread+0x337/0x6f0
[   15.613994]  ? trace_preempt_on+0x20/0xc0
[   15.614016]  ? __pfx_kthread+0x10/0x10
[   15.614038]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.614060]  ? calculate_sigpending+0x7b/0xa0
[   15.614083]  ? __pfx_kthread+0x10/0x10
[   15.614105]  ret_from_fork+0x116/0x1d0
[   15.614124]  ? __pfx_kthread+0x10/0x10
[   15.614145]  ret_from_fork_asm+0x1a/0x30
[   15.614175]  </TASK>
[   15.614186] 
[   15.621471] Allocated by task 283:
[   15.621637]  kasan_save_stack+0x45/0x70
[   15.621849]  kasan_save_track+0x18/0x40
[   15.622059]  kasan_save_alloc_info+0x3b/0x50
[   15.622272]  __kasan_kmalloc+0xb7/0xc0
[   15.622461]  __kmalloc_cache_noprof+0x189/0x420
[   15.622699]  kasan_atomics+0x95/0x310
[   15.622891]  kunit_try_run_case+0x1a5/0x480
[   15.623115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.623327]  kthread+0x337/0x6f0
[   15.623481]  ret_from_fork+0x116/0x1d0
[   15.623641]  ret_from_fork_asm+0x1a/0x30
[   15.623902] 
[   15.623987] The buggy address belongs to the object at ffff888102744f80
[   15.623987]  which belongs to the cache kmalloc-64 of size 64
[   15.624444] The buggy address is located 0 bytes to the right of
[   15.624444]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.624965] 
[   15.625060] The buggy address belongs to the physical page:
[   15.625268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.625559] flags: 0x200000000000000(node=0|zone=2)
[   15.625819] page_type: f5(slab)
[   15.625996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.626297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.626603] page dumped because: kasan: bad access detected
[   15.626952] 
[   15.627027] Memory state around the buggy address:
[   15.627205]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.627422]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.627638] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.627959]                                      ^
[   15.628188]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.628496]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.628839] ==================================================================
[   15.303069] ==================================================================
[   15.303560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.304059] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.304792] 
[   15.305081] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.305135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.305149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.305171] Call Trace:
[   15.305186]  <TASK>
[   15.305202]  dump_stack_lvl+0x73/0xb0
[   15.305242]  print_report+0xd1/0x610
[   15.305266]  ? __virt_addr_valid+0x1db/0x2d0
[   15.305292]  ? kasan_atomics_helper+0xde0/0x5450
[   15.305314]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.305337]  ? kasan_atomics_helper+0xde0/0x5450
[   15.305446]  kasan_report+0x141/0x180
[   15.305471]  ? kasan_atomics_helper+0xde0/0x5450
[   15.305498]  kasan_check_range+0x10c/0x1c0
[   15.305521]  __kasan_check_write+0x18/0x20
[   15.305541]  kasan_atomics_helper+0xde0/0x5450
[   15.305564]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.305586]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.305611]  ? trace_hardirqs_on+0x37/0xe0
[   15.305633]  ? kasan_atomics+0x152/0x310
[   15.305660]  kasan_atomics+0x1dc/0x310
[   15.305682]  ? __pfx_kasan_atomics+0x10/0x10
[   15.305706]  ? __pfx_kasan_atomics+0x10/0x10
[   15.305732]  kunit_try_run_case+0x1a5/0x480
[   15.305757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.305780]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.305803]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.305826]  ? __kthread_parkme+0x82/0x180
[   15.305847]  ? preempt_count_sub+0x50/0x80
[   15.305870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.305895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.305931]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.305955]  kthread+0x337/0x6f0
[   15.305976]  ? trace_preempt_on+0x20/0xc0
[   15.305999]  ? __pfx_kthread+0x10/0x10
[   15.306020]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.306041]  ? calculate_sigpending+0x7b/0xa0
[   15.306065]  ? __pfx_kthread+0x10/0x10
[   15.306086]  ret_from_fork+0x116/0x1d0
[   15.306105]  ? __pfx_kthread+0x10/0x10
[   15.306126]  ret_from_fork_asm+0x1a/0x30
[   15.306157]  </TASK>
[   15.306168] 
[   15.315010] Allocated by task 283:
[   15.315202]  kasan_save_stack+0x45/0x70
[   15.315460]  kasan_save_track+0x18/0x40
[   15.315647]  kasan_save_alloc_info+0x3b/0x50
[   15.315827]  __kasan_kmalloc+0xb7/0xc0
[   15.316015]  __kmalloc_cache_noprof+0x189/0x420
[   15.316242]  kasan_atomics+0x95/0x310
[   15.316397]  kunit_try_run_case+0x1a5/0x480
[   15.316542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.316788]  kthread+0x337/0x6f0
[   15.316971]  ret_from_fork+0x116/0x1d0
[   15.317158]  ret_from_fork_asm+0x1a/0x30
[   15.317361] 
[   15.317453] The buggy address belongs to the object at ffff888102744f80
[   15.317453]  which belongs to the cache kmalloc-64 of size 64
[   15.318118] The buggy address is located 0 bytes to the right of
[   15.318118]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.318573] 
[   15.318646] The buggy address belongs to the physical page:
[   15.318819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.319079] flags: 0x200000000000000(node=0|zone=2)
[   15.319248] page_type: f5(slab)
[   15.319419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.319874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.320216] page dumped because: kasan: bad access detected
[   15.320466] 
[   15.320558] Memory state around the buggy address:
[   15.320777]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.321147]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.321361] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.321570]                                      ^
[   15.322139]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.322718]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.323069] ==================================================================
[   15.750436] ==================================================================
[   15.750807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.751130] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.751373] 
[   15.751483] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.751523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.751535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.751555] Call Trace:
[   15.751569]  <TASK>
[   15.751584]  dump_stack_lvl+0x73/0xb0
[   15.751611]  print_report+0xd1/0x610
[   15.751632]  ? __virt_addr_valid+0x1db/0x2d0
[   15.751655]  ? kasan_atomics_helper+0x1818/0x5450
[   15.751675]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.751745]  ? kasan_atomics_helper+0x1818/0x5450
[   15.751767]  kasan_report+0x141/0x180
[   15.751827]  ? kasan_atomics_helper+0x1818/0x5450
[   15.751866]  kasan_check_range+0x10c/0x1c0
[   15.751901]  __kasan_check_write+0x18/0x20
[   15.751930]  kasan_atomics_helper+0x1818/0x5450
[   15.751953]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.751976]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.751998]  ? trace_hardirqs_on+0x37/0xe0
[   15.752020]  ? kasan_atomics+0x152/0x310
[   15.752047]  kasan_atomics+0x1dc/0x310
[   15.752069]  ? __pfx_kasan_atomics+0x10/0x10
[   15.752092]  ? __pfx_kasan_atomics+0x10/0x10
[   15.752119]  kunit_try_run_case+0x1a5/0x480
[   15.752143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.752166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.752190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.752213]  ? __kthread_parkme+0x82/0x180
[   15.752233]  ? preempt_count_sub+0x50/0x80
[   15.752257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.752281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.752304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.752327]  kthread+0x337/0x6f0
[   15.752347]  ? trace_preempt_on+0x20/0xc0
[   15.752369]  ? __pfx_kthread+0x10/0x10
[   15.752389]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.752410]  ? calculate_sigpending+0x7b/0xa0
[   15.752434]  ? __pfx_kthread+0x10/0x10
[   15.752456]  ret_from_fork+0x116/0x1d0
[   15.752474]  ? __pfx_kthread+0x10/0x10
[   15.752495]  ret_from_fork_asm+0x1a/0x30
[   15.752525]  </TASK>
[   15.752536] 
[   15.763717] Allocated by task 283:
[   15.764076]  kasan_save_stack+0x45/0x70
[   15.764463]  kasan_save_track+0x18/0x40
[   15.764851]  kasan_save_alloc_info+0x3b/0x50
[   15.765259]  __kasan_kmalloc+0xb7/0xc0
[   15.765608]  __kmalloc_cache_noprof+0x189/0x420
[   15.765950]  kasan_atomics+0x95/0x310
[   15.766094]  kunit_try_run_case+0x1a5/0x480
[   15.766246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.766425]  kthread+0x337/0x6f0
[   15.766547]  ret_from_fork+0x116/0x1d0
[   15.766719]  ret_from_fork_asm+0x1a/0x30
[   15.767129] 
[   15.767307] The buggy address belongs to the object at ffff888102744f80
[   15.767307]  which belongs to the cache kmalloc-64 of size 64
[   15.768405] The buggy address is located 0 bytes to the right of
[   15.768405]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.769498] 
[   15.769660] The buggy address belongs to the physical page:
[   15.770182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.770881] flags: 0x200000000000000(node=0|zone=2)
[   15.771118] page_type: f5(slab)
[   15.771240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.771471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.771779] page dumped because: kasan: bad access detected
[   15.772247] 
[   15.772401] Memory state around the buggy address:
[   15.772826]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.773416]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.774043] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.774618]                                      ^
[   15.775055]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.775646]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.776070] ==================================================================
[   15.260051] ==================================================================
[   15.260570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.260938] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.261268] 
[   15.261382] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.261424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.261436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.261457] Call Trace:
[   15.261471]  <TASK>
[   15.261485]  dump_stack_lvl+0x73/0xb0
[   15.261513]  print_report+0xd1/0x610
[   15.261534]  ? __virt_addr_valid+0x1db/0x2d0
[   15.261557]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.261578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.261600]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.261621]  kasan_report+0x141/0x180
[   15.261643]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.261669]  __asan_report_load4_noabort+0x18/0x20
[   15.261693]  kasan_atomics_helper+0x4a84/0x5450
[   15.261715]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.261791]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.261816]  ? trace_hardirqs_on+0x37/0xe0
[   15.261838]  ? kasan_atomics+0x152/0x310
[   15.261865]  kasan_atomics+0x1dc/0x310
[   15.261888]  ? __pfx_kasan_atomics+0x10/0x10
[   15.261921]  ? __pfx_kasan_atomics+0x10/0x10
[   15.261949]  kunit_try_run_case+0x1a5/0x480
[   15.261973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.261996]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.262019]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.262042]  ? __kthread_parkme+0x82/0x180
[   15.262061]  ? preempt_count_sub+0x50/0x80
[   15.262084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.262108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.262132]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.262156]  kthread+0x337/0x6f0
[   15.262175]  ? trace_preempt_on+0x20/0xc0
[   15.262196]  ? __pfx_kthread+0x10/0x10
[   15.262216]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.262238]  ? calculate_sigpending+0x7b/0xa0
[   15.262262]  ? __pfx_kthread+0x10/0x10
[   15.262283]  ret_from_fork+0x116/0x1d0
[   15.262303]  ? __pfx_kthread+0x10/0x10
[   15.262411]  ret_from_fork_asm+0x1a/0x30
[   15.262446]  </TASK>
[   15.262457] 
[   15.273173] Allocated by task 283:
[   15.273318]  kasan_save_stack+0x45/0x70
[   15.273466]  kasan_save_track+0x18/0x40
[   15.273792]  kasan_save_alloc_info+0x3b/0x50
[   15.274019]  __kasan_kmalloc+0xb7/0xc0
[   15.274209]  __kmalloc_cache_noprof+0x189/0x420
[   15.274406]  kasan_atomics+0x95/0x310
[   15.274688]  kunit_try_run_case+0x1a5/0x480
[   15.274937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.275195]  kthread+0x337/0x6f0
[   15.275321]  ret_from_fork+0x116/0x1d0
[   15.275567]  ret_from_fork_asm+0x1a/0x30
[   15.275844] 
[   15.275930] The buggy address belongs to the object at ffff888102744f80
[   15.275930]  which belongs to the cache kmalloc-64 of size 64
[   15.276548] The buggy address is located 0 bytes to the right of
[   15.276548]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.277049] 
[   15.277123] The buggy address belongs to the physical page:
[   15.277357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.277819] flags: 0x200000000000000(node=0|zone=2)
[   15.278006] page_type: f5(slab)
[   15.278127] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.278625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.279054] page dumped because: kasan: bad access detected
[   15.279292] 
[   15.279374] Memory state around the buggy address:
[   15.279570]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.279875]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.280102] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.280864]                                      ^
[   15.281050]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.281330]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.281735] ==================================================================
[   15.906113] ==================================================================
[   15.906808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.907135] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.907360] 
[   15.907444] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.907487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.907500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.907520] Call Trace:
[   15.907536]  <TASK>
[   15.907551]  dump_stack_lvl+0x73/0xb0
[   15.907578]  print_report+0xd1/0x610
[   15.907600]  ? __virt_addr_valid+0x1db/0x2d0
[   15.907622]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.907643]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.907693]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.907715]  kasan_report+0x141/0x180
[   15.907738]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.907764]  __asan_report_load8_noabort+0x18/0x20
[   15.907787]  kasan_atomics_helper+0x4f30/0x5450
[   15.907810]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.907832]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.907857]  ? trace_hardirqs_on+0x37/0xe0
[   15.907879]  ? kasan_atomics+0x152/0x310
[   15.907914]  kasan_atomics+0x1dc/0x310
[   15.907936]  ? __pfx_kasan_atomics+0x10/0x10
[   15.907961]  ? __pfx_kasan_atomics+0x10/0x10
[   15.907987]  kunit_try_run_case+0x1a5/0x480
[   15.908011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.908034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.908058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.908081]  ? __kthread_parkme+0x82/0x180
[   15.908102]  ? preempt_count_sub+0x50/0x80
[   15.908125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.908149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.908172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.908195]  kthread+0x337/0x6f0
[   15.908215]  ? trace_preempt_on+0x20/0xc0
[   15.908237]  ? __pfx_kthread+0x10/0x10
[   15.908258]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.908279]  ? calculate_sigpending+0x7b/0xa0
[   15.908302]  ? __pfx_kthread+0x10/0x10
[   15.908323]  ret_from_fork+0x116/0x1d0
[   15.908342]  ? __pfx_kthread+0x10/0x10
[   15.908362]  ret_from_fork_asm+0x1a/0x30
[   15.908392]  </TASK>
[   15.908404] 
[   15.921218] Allocated by task 283:
[   15.921539]  kasan_save_stack+0x45/0x70
[   15.921919]  kasan_save_track+0x18/0x40
[   15.922239]  kasan_save_alloc_info+0x3b/0x50
[   15.922389]  __kasan_kmalloc+0xb7/0xc0
[   15.922522]  __kmalloc_cache_noprof+0x189/0x420
[   15.922709]  kasan_atomics+0x95/0x310
[   15.923059]  kunit_try_run_case+0x1a5/0x480
[   15.923421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.923932]  kthread+0x337/0x6f0
[   15.924234]  ret_from_fork+0x116/0x1d0
[   15.924563]  ret_from_fork_asm+0x1a/0x30
[   15.924959] 
[   15.925115] The buggy address belongs to the object at ffff888102744f80
[   15.925115]  which belongs to the cache kmalloc-64 of size 64
[   15.925882] The buggy address is located 0 bytes to the right of
[   15.925882]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.926967] 
[   15.927063] The buggy address belongs to the physical page:
[   15.927237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.927476] flags: 0x200000000000000(node=0|zone=2)
[   15.927637] page_type: f5(slab)
[   15.927984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.928737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.929209] page dumped because: kasan: bad access detected
[   15.929388] 
[   15.929459] Memory state around the buggy address:
[   15.929617]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.930204]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.930818] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.931427]                                      ^
[   15.931604]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.932169]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.932782] ==================================================================
[   15.527078] ==================================================================
[   15.527348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.527789] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.528055] 
[   15.528161] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.528204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.528216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.528238] Call Trace:
[   15.528251]  <TASK>
[   15.528266]  dump_stack_lvl+0x73/0xb0
[   15.528293]  print_report+0xd1/0x610
[   15.528315]  ? __virt_addr_valid+0x1db/0x2d0
[   15.528336]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.528357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.528379]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.528401]  kasan_report+0x141/0x180
[   15.528422]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.528449]  kasan_check_range+0x10c/0x1c0
[   15.528472]  __kasan_check_write+0x18/0x20
[   15.528492]  kasan_atomics_helper+0x12e6/0x5450
[   15.528514]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.528536]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.528559]  ? trace_hardirqs_on+0x37/0xe0
[   15.528580]  ? kasan_atomics+0x152/0x310
[   15.528608]  kasan_atomics+0x1dc/0x310
[   15.528630]  ? __pfx_kasan_atomics+0x10/0x10
[   15.528653]  ? __pfx_kasan_atomics+0x10/0x10
[   15.528679]  kunit_try_run_case+0x1a5/0x480
[   15.528705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.528727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.528750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.528774]  ? __kthread_parkme+0x82/0x180
[   15.528794]  ? preempt_count_sub+0x50/0x80
[   15.528817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.528841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.528864]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.528888]  kthread+0x337/0x6f0
[   15.528917]  ? trace_preempt_on+0x20/0xc0
[   15.528939]  ? __pfx_kthread+0x10/0x10
[   15.528959]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.528980]  ? calculate_sigpending+0x7b/0xa0
[   15.529003]  ? __pfx_kthread+0x10/0x10
[   15.529025]  ret_from_fork+0x116/0x1d0
[   15.529044]  ? __pfx_kthread+0x10/0x10
[   15.529064]  ret_from_fork_asm+0x1a/0x30
[   15.529095]  </TASK>
[   15.529106] 
[   15.536446] Allocated by task 283:
[   15.536619]  kasan_save_stack+0x45/0x70
[   15.536829]  kasan_save_track+0x18/0x40
[   15.537031]  kasan_save_alloc_info+0x3b/0x50
[   15.537219]  __kasan_kmalloc+0xb7/0xc0
[   15.537386]  __kmalloc_cache_noprof+0x189/0x420
[   15.537541]  kasan_atomics+0x95/0x310
[   15.537745]  kunit_try_run_case+0x1a5/0x480
[   15.537966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.538215]  kthread+0x337/0x6f0
[   15.538386]  ret_from_fork+0x116/0x1d0
[   15.538532]  ret_from_fork_asm+0x1a/0x30
[   15.538731] 
[   15.538827] The buggy address belongs to the object at ffff888102744f80
[   15.538827]  which belongs to the cache kmalloc-64 of size 64
[   15.539285] The buggy address is located 0 bytes to the right of
[   15.539285]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.539653] 
[   15.539726] The buggy address belongs to the physical page:
[   15.539897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.540147] flags: 0x200000000000000(node=0|zone=2)
[   15.540339] page_type: f5(slab)
[   15.540501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.540840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.541181] page dumped because: kasan: bad access detected
[   15.541430] 
[   15.541523] Memory state around the buggy address:
[   15.541744]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.542015]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.542232] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.542453]                                      ^
[   15.542611]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.543050]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.543367] ==================================================================
[   15.054639] ==================================================================
[   15.054992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.055234] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.055465] 
[   15.055552] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.055596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.055610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.055645] Call Trace:
[   15.055662]  <TASK>
[   15.055678]  dump_stack_lvl+0x73/0xb0
[   15.055720]  print_report+0xd1/0x610
[   15.055743]  ? __virt_addr_valid+0x1db/0x2d0
[   15.055765]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.055786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.055809]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.055830]  kasan_report+0x141/0x180
[   15.055852]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.055878]  kasan_check_range+0x10c/0x1c0
[   15.055902]  __kasan_check_write+0x18/0x20
[   15.055930]  kasan_atomics_helper+0x7c7/0x5450
[   15.055954]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.055976]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.056001]  ? trace_hardirqs_on+0x37/0xe0
[   15.056033]  ? kasan_atomics+0x152/0x310
[   15.056061]  kasan_atomics+0x1dc/0x310
[   15.056094]  ? __pfx_kasan_atomics+0x10/0x10
[   15.056117]  ? __pfx_kasan_atomics+0x10/0x10
[   15.056144]  kunit_try_run_case+0x1a5/0x480
[   15.056168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.056191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.056214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.056236]  ? __kthread_parkme+0x82/0x180
[   15.056257]  ? preempt_count_sub+0x50/0x80
[   15.056280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.056304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.056327]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.056350]  kthread+0x337/0x6f0
[   15.056370]  ? trace_preempt_on+0x20/0xc0
[   15.056392]  ? __pfx_kthread+0x10/0x10
[   15.056413]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.056442]  ? calculate_sigpending+0x7b/0xa0
[   15.056466]  ? __pfx_kthread+0x10/0x10
[   15.056487]  ret_from_fork+0x116/0x1d0
[   15.056516]  ? __pfx_kthread+0x10/0x10
[   15.056537]  ret_from_fork_asm+0x1a/0x30
[   15.056568]  </TASK>
[   15.056580] 
[   15.070186] Allocated by task 283:
[   15.070328]  kasan_save_stack+0x45/0x70
[   15.070496]  kasan_save_track+0x18/0x40
[   15.070883]  kasan_save_alloc_info+0x3b/0x50
[   15.071415]  __kasan_kmalloc+0xb7/0xc0
[   15.071760]  __kmalloc_cache_noprof+0x189/0x420
[   15.072424]  kasan_atomics+0x95/0x310
[   15.072833]  kunit_try_run_case+0x1a5/0x480
[   15.073229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.073747]  kthread+0x337/0x6f0
[   15.073901]  ret_from_fork+0x116/0x1d0
[   15.074213]  ret_from_fork_asm+0x1a/0x30
[   15.074643] 
[   15.074824] The buggy address belongs to the object at ffff888102744f80
[   15.074824]  which belongs to the cache kmalloc-64 of size 64
[   15.075808] The buggy address is located 0 bytes to the right of
[   15.075808]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.076994] 
[   15.077161] The buggy address belongs to the physical page:
[   15.077852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.078114] flags: 0x200000000000000(node=0|zone=2)
[   15.078279] page_type: f5(slab)
[   15.078496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.079492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.080403] page dumped because: kasan: bad access detected
[   15.081019] 
[   15.081279] Memory state around the buggy address:
[   15.081878]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.082465]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.083025] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.083256]                                      ^
[   15.083414]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.084307]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.085192] ==================================================================
[   15.428155] ==================================================================
[   15.428850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.429201] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.429485] 
[   15.429592] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.429635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.429648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.430026] Call Trace:
[   15.430046]  <TASK>
[   15.430062]  dump_stack_lvl+0x73/0xb0
[   15.430094]  print_report+0xd1/0x610
[   15.430117]  ? __virt_addr_valid+0x1db/0x2d0
[   15.430139]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.430342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.430373]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.430396]  kasan_report+0x141/0x180
[   15.430422]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.430450]  __asan_report_load4_noabort+0x18/0x20
[   15.430476]  kasan_atomics_helper+0x4a1c/0x5450
[   15.430499]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.430521]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.430546]  ? trace_hardirqs_on+0x37/0xe0
[   15.430568]  ? kasan_atomics+0x152/0x310
[   15.430596]  kasan_atomics+0x1dc/0x310
[   15.430619]  ? __pfx_kasan_atomics+0x10/0x10
[   15.430643]  ? __pfx_kasan_atomics+0x10/0x10
[   15.430696]  kunit_try_run_case+0x1a5/0x480
[   15.430722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.430744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.430767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.430790]  ? __kthread_parkme+0x82/0x180
[   15.430810]  ? preempt_count_sub+0x50/0x80
[   15.430833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.430857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.430880]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.430913]  kthread+0x337/0x6f0
[   15.430933]  ? trace_preempt_on+0x20/0xc0
[   15.430955]  ? __pfx_kthread+0x10/0x10
[   15.430976]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.430997]  ? calculate_sigpending+0x7b/0xa0
[   15.431020]  ? __pfx_kthread+0x10/0x10
[   15.431041]  ret_from_fork+0x116/0x1d0
[   15.431065]  ? __pfx_kthread+0x10/0x10
[   15.431085]  ret_from_fork_asm+0x1a/0x30
[   15.431116]  </TASK>
[   15.431128] 
[   15.442512] Allocated by task 283:
[   15.442835]  kasan_save_stack+0x45/0x70
[   15.443058]  kasan_save_track+0x18/0x40
[   15.443230]  kasan_save_alloc_info+0x3b/0x50
[   15.443418]  __kasan_kmalloc+0xb7/0xc0
[   15.443585]  __kmalloc_cache_noprof+0x189/0x420
[   15.444109]  kasan_atomics+0x95/0x310
[   15.444490]  kunit_try_run_case+0x1a5/0x480
[   15.444834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.445237]  kthread+0x337/0x6f0
[   15.445403]  ret_from_fork+0x116/0x1d0
[   15.445562]  ret_from_fork_asm+0x1a/0x30
[   15.445998] 
[   15.446245] The buggy address belongs to the object at ffff888102744f80
[   15.446245]  which belongs to the cache kmalloc-64 of size 64
[   15.447090] The buggy address is located 0 bytes to the right of
[   15.447090]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.447579] 
[   15.447959] The buggy address belongs to the physical page:
[   15.448255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.448885] flags: 0x200000000000000(node=0|zone=2)
[   15.449189] page_type: f5(slab)
[   15.449348] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.449645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.450314] page dumped because: kasan: bad access detected
[   15.450809] 
[   15.451068] Memory state around the buggy address:
[   15.451360]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.451828]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.452120] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.452412]                                      ^
[   15.452616]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.453221]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.453725] ==================================================================
[   15.713532] ==================================================================
[   15.713828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.714076] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.714352] 
[   15.714544] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.714589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.714601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.714622] Call Trace:
[   15.714637]  <TASK>
[   15.714652]  dump_stack_lvl+0x73/0xb0
[   15.714693]  print_report+0xd1/0x610
[   15.714717]  ? __virt_addr_valid+0x1db/0x2d0
[   15.714739]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.714772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.714795]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.714817]  kasan_report+0x141/0x180
[   15.714839]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.714866]  kasan_check_range+0x10c/0x1c0
[   15.714890]  __kasan_check_write+0x18/0x20
[   15.714919]  kasan_atomics_helper+0x16e7/0x5450
[   15.714943]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.714965]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.714990]  ? trace_hardirqs_on+0x37/0xe0
[   15.715012]  ? kasan_atomics+0x152/0x310
[   15.715039]  kasan_atomics+0x1dc/0x310
[   15.715068]  ? __pfx_kasan_atomics+0x10/0x10
[   15.715091]  ? __pfx_kasan_atomics+0x10/0x10
[   15.715117]  kunit_try_run_case+0x1a5/0x480
[   15.715141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.715164]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.715187]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.715210]  ? __kthread_parkme+0x82/0x180
[   15.715230]  ? preempt_count_sub+0x50/0x80
[   15.715253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.715277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.715300]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.715323]  kthread+0x337/0x6f0
[   15.715343]  ? trace_preempt_on+0x20/0xc0
[   15.715375]  ? __pfx_kthread+0x10/0x10
[   15.715395]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.715417]  ? calculate_sigpending+0x7b/0xa0
[   15.715459]  ? __pfx_kthread+0x10/0x10
[   15.715481]  ret_from_fork+0x116/0x1d0
[   15.715499]  ? __pfx_kthread+0x10/0x10
[   15.715530]  ret_from_fork_asm+0x1a/0x30
[   15.715561]  </TASK>
[   15.715572] 
[   15.723424] Allocated by task 283:
[   15.723566]  kasan_save_stack+0x45/0x70
[   15.723712]  kasan_save_track+0x18/0x40
[   15.723847]  kasan_save_alloc_info+0x3b/0x50
[   15.724005]  __kasan_kmalloc+0xb7/0xc0
[   15.724139]  __kmalloc_cache_noprof+0x189/0x420
[   15.724295]  kasan_atomics+0x95/0x310
[   15.724472]  kunit_try_run_case+0x1a5/0x480
[   15.724681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.724946]  kthread+0x337/0x6f0
[   15.725145]  ret_from_fork+0x116/0x1d0
[   15.725534]  ret_from_fork_asm+0x1a/0x30
[   15.725874] 
[   15.725990] The buggy address belongs to the object at ffff888102744f80
[   15.725990]  which belongs to the cache kmalloc-64 of size 64
[   15.726346] The buggy address is located 0 bytes to the right of
[   15.726346]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.726802] 
[   15.726898] The buggy address belongs to the physical page:
[   15.727179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.727542] flags: 0x200000000000000(node=0|zone=2)
[   15.727946] page_type: f5(slab)
[   15.728117] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.728442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.728670] page dumped because: kasan: bad access detected
[   15.728958] 
[   15.729055] Memory state around the buggy address:
[   15.729280]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.729579]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.729937] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.730227]                                      ^
[   15.730453]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.730808]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.731100] ==================================================================
[   16.089281] ==================================================================
[   16.090045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.090397] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   16.090920] 
[   16.091151] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.091197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.091210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.091366] Call Trace:
[   16.091382]  <TASK>
[   16.091397]  dump_stack_lvl+0x73/0xb0
[   16.091427]  print_report+0xd1/0x610
[   16.091449]  ? __virt_addr_valid+0x1db/0x2d0
[   16.091474]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.091495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.091517]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.091539]  kasan_report+0x141/0x180
[   16.091562]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.091589]  __asan_report_load8_noabort+0x18/0x20
[   16.091614]  kasan_atomics_helper+0x4f98/0x5450
[   16.091636]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.091658]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.091698]  ? trace_hardirqs_on+0x37/0xe0
[   16.091720]  ? kasan_atomics+0x152/0x310
[   16.091747]  kasan_atomics+0x1dc/0x310
[   16.091770]  ? __pfx_kasan_atomics+0x10/0x10
[   16.091793]  ? __pfx_kasan_atomics+0x10/0x10
[   16.091819]  kunit_try_run_case+0x1a5/0x480
[   16.091844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.091867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.091890]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.091926]  ? __kthread_parkme+0x82/0x180
[   16.091946]  ? preempt_count_sub+0x50/0x80
[   16.091970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.091994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.092017]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.092040]  kthread+0x337/0x6f0
[   16.092060]  ? trace_preempt_on+0x20/0xc0
[   16.092081]  ? __pfx_kthread+0x10/0x10
[   16.092101]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.092123]  ? calculate_sigpending+0x7b/0xa0
[   16.092146]  ? __pfx_kthread+0x10/0x10
[   16.092167]  ret_from_fork+0x116/0x1d0
[   16.092185]  ? __pfx_kthread+0x10/0x10
[   16.092206]  ret_from_fork_asm+0x1a/0x30
[   16.092237]  </TASK>
[   16.092246] 
[   16.102612] Allocated by task 283:
[   16.103020]  kasan_save_stack+0x45/0x70
[   16.103217]  kasan_save_track+0x18/0x40
[   16.103409]  kasan_save_alloc_info+0x3b/0x50
[   16.103612]  __kasan_kmalloc+0xb7/0xc0
[   16.104057]  __kmalloc_cache_noprof+0x189/0x420
[   16.104259]  kasan_atomics+0x95/0x310
[   16.104599]  kunit_try_run_case+0x1a5/0x480
[   16.104953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.105166]  kthread+0x337/0x6f0
[   16.105416]  ret_from_fork+0x116/0x1d0
[   16.105575]  ret_from_fork_asm+0x1a/0x30
[   16.106036] 
[   16.106113] The buggy address belongs to the object at ffff888102744f80
[   16.106113]  which belongs to the cache kmalloc-64 of size 64
[   16.106800] The buggy address is located 0 bytes to the right of
[   16.106800]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.107501] 
[   16.107606] The buggy address belongs to the physical page:
[   16.108092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.108454] flags: 0x200000000000000(node=0|zone=2)
[   16.108834] page_type: f5(slab)
[   16.109109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.109538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.109986] page dumped because: kasan: bad access detected
[   16.110267] 
[   16.110367] Memory state around the buggy address:
[   16.110767]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.111107]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.111430] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.111983]                                      ^
[   16.112205]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.112601]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.113066] ==================================================================
[   15.385840] ==================================================================
[   15.386556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.387043] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.387473] 
[   15.387588] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.387688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.387703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.387725] Call Trace:
[   15.387740]  <TASK>
[   15.387753]  dump_stack_lvl+0x73/0xb0
[   15.387782]  print_report+0xd1/0x610
[   15.387803]  ? __virt_addr_valid+0x1db/0x2d0
[   15.387825]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.387847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.387869]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.387891]  kasan_report+0x141/0x180
[   15.387925]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.387950]  __asan_report_load4_noabort+0x18/0x20
[   15.387997]  kasan_atomics_helper+0x4a36/0x5450
[   15.388020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.388042]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.388081]  ? trace_hardirqs_on+0x37/0xe0
[   15.388102]  ? kasan_atomics+0x152/0x310
[   15.388129]  kasan_atomics+0x1dc/0x310
[   15.388152]  ? __pfx_kasan_atomics+0x10/0x10
[   15.388175]  ? __pfx_kasan_atomics+0x10/0x10
[   15.388201]  kunit_try_run_case+0x1a5/0x480
[   15.388225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.388266]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.388290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.388313]  ? __kthread_parkme+0x82/0x180
[   15.388334]  ? preempt_count_sub+0x50/0x80
[   15.388403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.388429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.388453]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.388476]  kthread+0x337/0x6f0
[   15.388496]  ? trace_preempt_on+0x20/0xc0
[   15.388518]  ? __pfx_kthread+0x10/0x10
[   15.388539]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.388560]  ? calculate_sigpending+0x7b/0xa0
[   15.388606]  ? __pfx_kthread+0x10/0x10
[   15.388627]  ret_from_fork+0x116/0x1d0
[   15.388646]  ? __pfx_kthread+0x10/0x10
[   15.388667]  ret_from_fork_asm+0x1a/0x30
[   15.388708]  </TASK>
[   15.388719] 
[   15.397647] Allocated by task 283:
[   15.397819]  kasan_save_stack+0x45/0x70
[   15.398152]  kasan_save_track+0x18/0x40
[   15.398300]  kasan_save_alloc_info+0x3b/0x50
[   15.398740]  __kasan_kmalloc+0xb7/0xc0
[   15.398939]  __kmalloc_cache_noprof+0x189/0x420
[   15.399193]  kasan_atomics+0x95/0x310
[   15.399505]  kunit_try_run_case+0x1a5/0x480
[   15.399664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.399957]  kthread+0x337/0x6f0
[   15.400123]  ret_from_fork+0x116/0x1d0
[   15.400300]  ret_from_fork_asm+0x1a/0x30
[   15.400621] 
[   15.400771] The buggy address belongs to the object at ffff888102744f80
[   15.400771]  which belongs to the cache kmalloc-64 of size 64
[   15.401243] The buggy address is located 0 bytes to the right of
[   15.401243]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.401931] 
[   15.402048] The buggy address belongs to the physical page:
[   15.402292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.402779] flags: 0x200000000000000(node=0|zone=2)
[   15.403132] page_type: f5(slab)
[   15.403316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.403659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.403883] page dumped because: kasan: bad access detected
[   15.404143] 
[   15.404240] Memory state around the buggy address:
[   15.404605]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.405236]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.405451] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.405660]                                      ^
[   15.405814]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.406043]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.406518] ==================================================================
[   15.473189] ==================================================================
[   15.473564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.473900] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.474195] 
[   15.474297] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.474338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.474352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.474373] Call Trace:
[   15.474386]  <TASK>
[   15.474400]  dump_stack_lvl+0x73/0xb0
[   15.474428]  print_report+0xd1/0x610
[   15.474450]  ? __virt_addr_valid+0x1db/0x2d0
[   15.474471]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.474492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.474514]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.474536]  kasan_report+0x141/0x180
[   15.474558]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.474585]  __asan_report_load4_noabort+0x18/0x20
[   15.474609]  kasan_atomics_helper+0x4a02/0x5450
[   15.474632]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.474654]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.474677]  ? trace_hardirqs_on+0x37/0xe0
[   15.474706]  ? kasan_atomics+0x152/0x310
[   15.474733]  kasan_atomics+0x1dc/0x310
[   15.474756]  ? __pfx_kasan_atomics+0x10/0x10
[   15.474779]  ? __pfx_kasan_atomics+0x10/0x10
[   15.474805]  kunit_try_run_case+0x1a5/0x480
[   15.474829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.474851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.474875]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.474898]  ? __kthread_parkme+0x82/0x180
[   15.474930]  ? preempt_count_sub+0x50/0x80
[   15.474953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.474977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.475000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.475024]  kthread+0x337/0x6f0
[   15.475043]  ? trace_preempt_on+0x20/0xc0
[   15.475073]  ? __pfx_kthread+0x10/0x10
[   15.475094]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.475116]  ? calculate_sigpending+0x7b/0xa0
[   15.475139]  ? __pfx_kthread+0x10/0x10
[   15.475161]  ret_from_fork+0x116/0x1d0
[   15.475179]  ? __pfx_kthread+0x10/0x10
[   15.475199]  ret_from_fork_asm+0x1a/0x30
[   15.475230]  </TASK>
[   15.475240] 
[   15.482470] Allocated by task 283:
[   15.482654]  kasan_save_stack+0x45/0x70
[   15.482858]  kasan_save_track+0x18/0x40
[   15.483023]  kasan_save_alloc_info+0x3b/0x50
[   15.483220]  __kasan_kmalloc+0xb7/0xc0
[   15.483381]  __kmalloc_cache_noprof+0x189/0x420
[   15.483585]  kasan_atomics+0x95/0x310
[   15.483787]  kunit_try_run_case+0x1a5/0x480
[   15.483944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.484120]  kthread+0x337/0x6f0
[   15.484241]  ret_from_fork+0x116/0x1d0
[   15.484373]  ret_from_fork_asm+0x1a/0x30
[   15.484513] 
[   15.484583] The buggy address belongs to the object at ffff888102744f80
[   15.484583]  which belongs to the cache kmalloc-64 of size 64
[   15.485084] The buggy address is located 0 bytes to the right of
[   15.485084]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.485626] 
[   15.485777] The buggy address belongs to the physical page:
[   15.486037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.486387] flags: 0x200000000000000(node=0|zone=2)
[   15.486616] page_type: f5(slab)
[   15.486782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.487030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.487286] page dumped because: kasan: bad access detected
[   15.487541] 
[   15.487637] Memory state around the buggy address:
[   15.488107]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.488426]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.488782] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.489054]                                      ^
[   15.489275]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.489554]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.489854] ==================================================================
[   16.214890] ==================================================================
[   16.215237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.215773] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   16.216108] 
[   16.216196] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.216237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.216250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.216270] Call Trace:
[   16.216286]  <TASK>
[   16.216301]  dump_stack_lvl+0x73/0xb0
[   16.216330]  print_report+0xd1/0x610
[   16.216377]  ? __virt_addr_valid+0x1db/0x2d0
[   16.216401]  ? kasan_atomics_helper+0x5115/0x5450
[   16.216424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.216447]  ? kasan_atomics_helper+0x5115/0x5450
[   16.216487]  kasan_report+0x141/0x180
[   16.216510]  ? kasan_atomics_helper+0x5115/0x5450
[   16.216536]  __asan_report_load8_noabort+0x18/0x20
[   16.216579]  kasan_atomics_helper+0x5115/0x5450
[   16.216602]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.216642]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.216666]  ? trace_hardirqs_on+0x37/0xe0
[   16.216689]  ? kasan_atomics+0x152/0x310
[   16.216716]  kasan_atomics+0x1dc/0x310
[   16.216739]  ? __pfx_kasan_atomics+0x10/0x10
[   16.216763]  ? __pfx_kasan_atomics+0x10/0x10
[   16.216790]  kunit_try_run_case+0x1a5/0x480
[   16.216814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.216836]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.216859]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.216890]  ? __kthread_parkme+0x82/0x180
[   16.216922]  ? preempt_count_sub+0x50/0x80
[   16.216946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.216988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.217012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.217036]  kthread+0x337/0x6f0
[   16.217069]  ? trace_preempt_on+0x20/0xc0
[   16.217091]  ? __pfx_kthread+0x10/0x10
[   16.217112]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.217149]  ? calculate_sigpending+0x7b/0xa0
[   16.217186]  ? __pfx_kthread+0x10/0x10
[   16.217208]  ret_from_fork+0x116/0x1d0
[   16.217240]  ? __pfx_kthread+0x10/0x10
[   16.217274]  ret_from_fork_asm+0x1a/0x30
[   16.217318]  </TASK>
[   16.217341] 
[   16.225389] Allocated by task 283:
[   16.225518]  kasan_save_stack+0x45/0x70
[   16.225663]  kasan_save_track+0x18/0x40
[   16.225798]  kasan_save_alloc_info+0x3b/0x50
[   16.225958]  __kasan_kmalloc+0xb7/0xc0
[   16.226094]  __kmalloc_cache_noprof+0x189/0x420
[   16.226313]  kasan_atomics+0x95/0x310
[   16.226522]  kunit_try_run_case+0x1a5/0x480
[   16.226766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.227027]  kthread+0x337/0x6f0
[   16.227199]  ret_from_fork+0x116/0x1d0
[   16.227383]  ret_from_fork_asm+0x1a/0x30
[   16.227579] 
[   16.227669] The buggy address belongs to the object at ffff888102744f80
[   16.227669]  which belongs to the cache kmalloc-64 of size 64
[   16.228052] The buggy address is located 0 bytes to the right of
[   16.228052]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.228430] 
[   16.228522] The buggy address belongs to the physical page:
[   16.228884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.229268] flags: 0x200000000000000(node=0|zone=2)
[   16.229521] page_type: f5(slab)
[   16.229726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.230104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.230434] page dumped because: kasan: bad access detected
[   16.230643] 
[   16.230777] Memory state around the buggy address:
[   16.231019]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.231293]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.231605] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.231943]                                      ^
[   16.232178]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.232525]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.233068] ==================================================================
[   14.842570] ==================================================================
[   14.842798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.843038] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   14.843791] 
[   14.843931] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.843974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.843985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.844006] Call Trace:
[   14.844019]  <TASK>
[   14.844034]  dump_stack_lvl+0x73/0xb0
[   14.844061]  print_report+0xd1/0x610
[   14.844084]  ? __virt_addr_valid+0x1db/0x2d0
[   14.844105]  ? kasan_atomics_helper+0x3df/0x5450
[   14.844126]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.844148]  ? kasan_atomics_helper+0x3df/0x5450
[   14.844170]  kasan_report+0x141/0x180
[   14.844191]  ? kasan_atomics_helper+0x3df/0x5450
[   14.844218]  kasan_check_range+0x10c/0x1c0
[   14.844241]  __kasan_check_read+0x15/0x20
[   14.844260]  kasan_atomics_helper+0x3df/0x5450
[   14.844282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.844304]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.844327]  ? trace_hardirqs_on+0x37/0xe0
[   14.844407]  ? kasan_atomics+0x152/0x310
[   14.844436]  kasan_atomics+0x1dc/0x310
[   14.844459]  ? __pfx_kasan_atomics+0x10/0x10
[   14.844507]  ? __pfx_kasan_atomics+0x10/0x10
[   14.844536]  kunit_try_run_case+0x1a5/0x480
[   14.844573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844597]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.844620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.844660]  ? __kthread_parkme+0x82/0x180
[   14.844681]  ? preempt_count_sub+0x50/0x80
[   14.844705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.844752]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.844775]  kthread+0x337/0x6f0
[   14.844795]  ? trace_preempt_on+0x20/0xc0
[   14.844819]  ? __pfx_kthread+0x10/0x10
[   14.844840]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.844861]  ? calculate_sigpending+0x7b/0xa0
[   14.844884]  ? __pfx_kthread+0x10/0x10
[   14.844918]  ret_from_fork+0x116/0x1d0
[   14.844937]  ? __pfx_kthread+0x10/0x10
[   14.844957]  ret_from_fork_asm+0x1a/0x30
[   14.844988]  </TASK>
[   14.844999] 
[   14.853841] Allocated by task 283:
[   14.854062]  kasan_save_stack+0x45/0x70
[   14.854255]  kasan_save_track+0x18/0x40
[   14.854517]  kasan_save_alloc_info+0x3b/0x50
[   14.854781]  __kasan_kmalloc+0xb7/0xc0
[   14.854969]  __kmalloc_cache_noprof+0x189/0x420
[   14.855184]  kasan_atomics+0x95/0x310
[   14.855516]  kunit_try_run_case+0x1a5/0x480
[   14.855949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.856212]  kthread+0x337/0x6f0
[   14.856393]  ret_from_fork+0x116/0x1d0
[   14.856656]  ret_from_fork_asm+0x1a/0x30
[   14.856860] 
[   14.857036] The buggy address belongs to the object at ffff888102744f80
[   14.857036]  which belongs to the cache kmalloc-64 of size 64
[   14.857481] The buggy address is located 0 bytes to the right of
[   14.857481]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   14.857929] 
[   14.858005] The buggy address belongs to the physical page:
[   14.858420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   14.859312] flags: 0x200000000000000(node=0|zone=2)
[   14.860073] page_type: f5(slab)
[   14.860368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.860974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.861205] page dumped because: kasan: bad access detected
[   14.861376] 
[   14.861447] Memory state around the buggy address:
[   14.861727]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.861977]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.862267] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.862796]                                      ^
[   14.863014]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.863328]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.863860] ==================================================================
[   14.864287] ==================================================================
[   14.864672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.865004] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   14.865323] 
[   14.865546] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.865591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.865603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.865624] Call Trace:
[   14.865640]  <TASK>
[   14.865654]  dump_stack_lvl+0x73/0xb0
[   14.865682]  print_report+0xd1/0x610
[   14.865704]  ? __virt_addr_valid+0x1db/0x2d0
[   14.865748]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.865769]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.865791]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.865813]  kasan_report+0x141/0x180
[   14.865836]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.865863]  __asan_report_load4_noabort+0x18/0x20
[   14.865887]  kasan_atomics_helper+0x4b54/0x5450
[   14.865940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.865964]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.865987]  ? trace_hardirqs_on+0x37/0xe0
[   14.866009]  ? kasan_atomics+0x152/0x310
[   14.866035]  kasan_atomics+0x1dc/0x310
[   14.866058]  ? __pfx_kasan_atomics+0x10/0x10
[   14.866081]  ? __pfx_kasan_atomics+0x10/0x10
[   14.866125]  kunit_try_run_case+0x1a5/0x480
[   14.866150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.866172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.866195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.866219]  ? __kthread_parkme+0x82/0x180
[   14.866238]  ? preempt_count_sub+0x50/0x80
[   14.866261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.866285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.866326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.866350]  kthread+0x337/0x6f0
[   14.866370]  ? trace_preempt_on+0x20/0xc0
[   14.866391]  ? __pfx_kthread+0x10/0x10
[   14.866412]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.866433]  ? calculate_sigpending+0x7b/0xa0
[   14.866457]  ? __pfx_kthread+0x10/0x10
[   14.866478]  ret_from_fork+0x116/0x1d0
[   14.866497]  ? __pfx_kthread+0x10/0x10
[   14.866518]  ret_from_fork_asm+0x1a/0x30
[   14.866548]  </TASK>
[   14.866559] 
[   14.874854] Allocated by task 283:
[   14.875008]  kasan_save_stack+0x45/0x70
[   14.875163]  kasan_save_track+0x18/0x40
[   14.875529]  kasan_save_alloc_info+0x3b/0x50
[   14.875893]  __kasan_kmalloc+0xb7/0xc0
[   14.876091]  __kmalloc_cache_noprof+0x189/0x420
[   14.876313]  kasan_atomics+0x95/0x310
[   14.876629]  kunit_try_run_case+0x1a5/0x480
[   14.876947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.877122]  kthread+0x337/0x6f0
[   14.877239]  ret_from_fork+0x116/0x1d0
[   14.877367]  ret_from_fork_asm+0x1a/0x30
[   14.877504] 
[   14.877700] The buggy address belongs to the object at ffff888102744f80
[   14.877700]  which belongs to the cache kmalloc-64 of size 64
[   14.878779] The buggy address is located 0 bytes to the right of
[   14.878779]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   14.880222] 
[   14.880466] The buggy address belongs to the physical page:
[   14.881047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   14.882192] flags: 0x200000000000000(node=0|zone=2)
[   14.882591] page_type: f5(slab)
[   14.882758] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.883476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.884193] page dumped because: kasan: bad access detected
[   14.884475] 
[   14.884659] Memory state around the buggy address:
[   14.885134]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.885881]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.886451] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.887009]                                      ^
[   14.887181]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.887756]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.888412] ==================================================================
[   15.230954] ==================================================================
[   15.231791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.232179] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.232608] 
[   15.232835] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.232882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.232895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.232931] Call Trace:
[   15.232947]  <TASK>
[   15.232964]  dump_stack_lvl+0x73/0xb0
[   15.232995]  print_report+0xd1/0x610
[   15.233017]  ? __virt_addr_valid+0x1db/0x2d0
[   15.233039]  ? kasan_atomics_helper+0xc70/0x5450
[   15.233060]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.233082]  ? kasan_atomics_helper+0xc70/0x5450
[   15.233103]  kasan_report+0x141/0x180
[   15.233126]  ? kasan_atomics_helper+0xc70/0x5450
[   15.233152]  kasan_check_range+0x10c/0x1c0
[   15.233175]  __kasan_check_write+0x18/0x20
[   15.233194]  kasan_atomics_helper+0xc70/0x5450
[   15.233216]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.233238]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.233283]  ? trace_hardirqs_on+0x37/0xe0
[   15.233306]  ? kasan_atomics+0x152/0x310
[   15.233332]  kasan_atomics+0x1dc/0x310
[   15.233412]  ? __pfx_kasan_atomics+0x10/0x10
[   15.233437]  ? __pfx_kasan_atomics+0x10/0x10
[   15.233464]  kunit_try_run_case+0x1a5/0x480
[   15.233488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.233511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.233534]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.233557]  ? __kthread_parkme+0x82/0x180
[   15.233578]  ? preempt_count_sub+0x50/0x80
[   15.233602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.233626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.233648]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.233672]  kthread+0x337/0x6f0
[   15.233700]  ? trace_preempt_on+0x20/0xc0
[   15.233722]  ? __pfx_kthread+0x10/0x10
[   15.233742]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.233763]  ? calculate_sigpending+0x7b/0xa0
[   15.233786]  ? __pfx_kthread+0x10/0x10
[   15.233807]  ret_from_fork+0x116/0x1d0
[   15.233825]  ? __pfx_kthread+0x10/0x10
[   15.233847]  ret_from_fork_asm+0x1a/0x30
[   15.233877]  </TASK>
[   15.233888] 
[   15.248301] Allocated by task 283:
[   15.248776]  kasan_save_stack+0x45/0x70
[   15.249196]  kasan_save_track+0x18/0x40
[   15.249643]  kasan_save_alloc_info+0x3b/0x50
[   15.250082]  __kasan_kmalloc+0xb7/0xc0
[   15.250289]  __kmalloc_cache_noprof+0x189/0x420
[   15.250732]  kasan_atomics+0x95/0x310
[   15.251204]  kunit_try_run_case+0x1a5/0x480
[   15.251406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.251922]  kthread+0x337/0x6f0
[   15.252238]  ret_from_fork+0x116/0x1d0
[   15.252536]  ret_from_fork_asm+0x1a/0x30
[   15.253100] 
[   15.253273] The buggy address belongs to the object at ffff888102744f80
[   15.253273]  which belongs to the cache kmalloc-64 of size 64
[   15.254349] The buggy address is located 0 bytes to the right of
[   15.254349]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.255028] 
[   15.255112] The buggy address belongs to the physical page:
[   15.255288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.255555] flags: 0x200000000000000(node=0|zone=2)
[   15.256033] page_type: f5(slab)
[   15.256202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.256681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.257069] page dumped because: kasan: bad access detected
[   15.257258] 
[   15.257427] Memory state around the buggy address:
[   15.257664]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.257892]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.258442] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.258750]                                      ^
[   15.258993]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.259277]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.259693] ==================================================================
[   15.201246] ==================================================================
[   15.201995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.202339] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.202755] 
[   15.202867] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.202921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.202934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.202955] Call Trace:
[   15.202971]  <TASK>
[   15.202986]  dump_stack_lvl+0x73/0xb0
[   15.203014]  print_report+0xd1/0x610
[   15.203035]  ? __virt_addr_valid+0x1db/0x2d0
[   15.203060]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.203081]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.203103]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.203124]  kasan_report+0x141/0x180
[   15.203146]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.203172]  kasan_check_range+0x10c/0x1c0
[   15.203195]  __kasan_check_write+0x18/0x20
[   15.203214]  kasan_atomics_helper+0xb6a/0x5450
[   15.203236]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.203258]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.203281]  ? trace_hardirqs_on+0x37/0xe0
[   15.203302]  ? kasan_atomics+0x152/0x310
[   15.203328]  kasan_atomics+0x1dc/0x310
[   15.203350]  ? __pfx_kasan_atomics+0x10/0x10
[   15.203374]  ? __pfx_kasan_atomics+0x10/0x10
[   15.203577]  kunit_try_run_case+0x1a5/0x480
[   15.203607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203630]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.203654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.203678]  ? __kthread_parkme+0x82/0x180
[   15.203697]  ? preempt_count_sub+0x50/0x80
[   15.203720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.203744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.203767]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.203790]  kthread+0x337/0x6f0
[   15.203810]  ? trace_preempt_on+0x20/0xc0
[   15.203832]  ? __pfx_kthread+0x10/0x10
[   15.203853]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.203875]  ? calculate_sigpending+0x7b/0xa0
[   15.203899]  ? __pfx_kthread+0x10/0x10
[   15.203934]  ret_from_fork+0x116/0x1d0
[   15.203952]  ? __pfx_kthread+0x10/0x10
[   15.203973]  ret_from_fork_asm+0x1a/0x30
[   15.204003]  </TASK>
[   15.204014] 
[   15.212810] Allocated by task 283:
[   15.212978]  kasan_save_stack+0x45/0x70
[   15.213129]  kasan_save_track+0x18/0x40
[   15.213266]  kasan_save_alloc_info+0x3b/0x50
[   15.214353]  __kasan_kmalloc+0xb7/0xc0
[   15.215364]  __kmalloc_cache_noprof+0x189/0x420
[   15.215939]  kasan_atomics+0x95/0x310
[   15.216448]  kunit_try_run_case+0x1a5/0x480
[   15.217213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.217926]  kthread+0x337/0x6f0
[   15.218428]  ret_from_fork+0x116/0x1d0
[   15.218579]  ret_from_fork_asm+0x1a/0x30
[   15.219148] 
[   15.219255] The buggy address belongs to the object at ffff888102744f80
[   15.219255]  which belongs to the cache kmalloc-64 of size 64
[   15.220542] The buggy address is located 0 bytes to the right of
[   15.220542]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.221633] 
[   15.221730] The buggy address belongs to the physical page:
[   15.222275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.223081] flags: 0x200000000000000(node=0|zone=2)
[   15.223251] page_type: f5(slab)
[   15.223425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.224920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.225610] page dumped because: kasan: bad access detected
[   15.225971] 
[   15.226049] Memory state around the buggy address:
[   15.226205]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.226415]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.226625] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.227673]                                      ^
[   15.228160]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.229084]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.229817] ==================================================================
[   15.881516] ==================================================================
[   15.881900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.882252] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.882608] 
[   15.882744] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.882786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.882798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.882819] Call Trace:
[   15.882834]  <TASK>
[   15.882848]  dump_stack_lvl+0x73/0xb0
[   15.882876]  print_report+0xd1/0x610
[   15.882898]  ? __virt_addr_valid+0x1db/0x2d0
[   15.882930]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.882951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.882973]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.882996]  kasan_report+0x141/0x180
[   15.883017]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.883043]  kasan_check_range+0x10c/0x1c0
[   15.883071]  __kasan_check_write+0x18/0x20
[   15.883090]  kasan_atomics_helper+0x1c18/0x5450
[   15.883113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.883135]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.883158]  ? trace_hardirqs_on+0x37/0xe0
[   15.883179]  ? kasan_atomics+0x152/0x310
[   15.883206]  kasan_atomics+0x1dc/0x310
[   15.883228]  ? __pfx_kasan_atomics+0x10/0x10
[   15.883251]  ? __pfx_kasan_atomics+0x10/0x10
[   15.883277]  kunit_try_run_case+0x1a5/0x480
[   15.883301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.883324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.883347]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.883370]  ? __kthread_parkme+0x82/0x180
[   15.883390]  ? preempt_count_sub+0x50/0x80
[   15.883413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.883437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.883460]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.883483]  kthread+0x337/0x6f0
[   15.883502]  ? trace_preempt_on+0x20/0xc0
[   15.883524]  ? __pfx_kthread+0x10/0x10
[   15.883546]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.883566]  ? calculate_sigpending+0x7b/0xa0
[   15.883590]  ? __pfx_kthread+0x10/0x10
[   15.883612]  ret_from_fork+0x116/0x1d0
[   15.883631]  ? __pfx_kthread+0x10/0x10
[   15.883652]  ret_from_fork_asm+0x1a/0x30
[   15.883703]  </TASK>
[   15.883714] 
[   15.892800] Allocated by task 283:
[   15.893158]  kasan_save_stack+0x45/0x70
[   15.893510]  kasan_save_track+0x18/0x40
[   15.893873]  kasan_save_alloc_info+0x3b/0x50
[   15.894263]  __kasan_kmalloc+0xb7/0xc0
[   15.894592]  __kmalloc_cache_noprof+0x189/0x420
[   15.895014]  kasan_atomics+0x95/0x310
[   15.895345]  kunit_try_run_case+0x1a5/0x480
[   15.895612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.896079]  kthread+0x337/0x6f0
[   15.896371]  ret_from_fork+0x116/0x1d0
[   15.896535]  ret_from_fork_asm+0x1a/0x30
[   15.896712] 
[   15.896871] The buggy address belongs to the object at ffff888102744f80
[   15.896871]  which belongs to the cache kmalloc-64 of size 64
[   15.897890] The buggy address is located 0 bytes to the right of
[   15.897890]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.898516] 
[   15.898593] The buggy address belongs to the physical page:
[   15.898999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.899690] flags: 0x200000000000000(node=0|zone=2)
[   15.900112] page_type: f5(slab)
[   15.900399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.901071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.901534] page dumped because: kasan: bad access detected
[   15.901800] 
[   15.901977] Memory state around the buggy address:
[   15.902388]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.903020]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.903383] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.903598]                                      ^
[   15.903950]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.904549]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.905168] ==================================================================
[   16.113752] ==================================================================
[   16.114224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.114962] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   16.115334] 
[   16.115595] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.115644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.115677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.115699] Call Trace:
[   16.115727]  <TASK>
[   16.115742]  dump_stack_lvl+0x73/0xb0
[   16.115773]  print_report+0xd1/0x610
[   16.115981]  ? __virt_addr_valid+0x1db/0x2d0
[   16.116005]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.116027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.116049]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.116071]  kasan_report+0x141/0x180
[   16.116093]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.116120]  kasan_check_range+0x10c/0x1c0
[   16.116143]  __kasan_check_write+0x18/0x20
[   16.116162]  kasan_atomics_helper+0x20c8/0x5450
[   16.116185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.116207]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.116231]  ? trace_hardirqs_on+0x37/0xe0
[   16.116253]  ? kasan_atomics+0x152/0x310
[   16.116280]  kasan_atomics+0x1dc/0x310
[   16.116302]  ? __pfx_kasan_atomics+0x10/0x10
[   16.116326]  ? __pfx_kasan_atomics+0x10/0x10
[   16.116353]  kunit_try_run_case+0x1a5/0x480
[   16.116378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.116401]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.116425]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.116448]  ? __kthread_parkme+0x82/0x180
[   16.116468]  ? preempt_count_sub+0x50/0x80
[   16.116492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.116516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.116539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.116563]  kthread+0x337/0x6f0
[   16.116582]  ? trace_preempt_on+0x20/0xc0
[   16.116605]  ? __pfx_kthread+0x10/0x10
[   16.116625]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.116646]  ? calculate_sigpending+0x7b/0xa0
[   16.116669]  ? __pfx_kthread+0x10/0x10
[   16.116699]  ret_from_fork+0x116/0x1d0
[   16.116718]  ? __pfx_kthread+0x10/0x10
[   16.116739]  ret_from_fork_asm+0x1a/0x30
[   16.116769]  </TASK>
[   16.116781] 
[   16.127256] Allocated by task 283:
[   16.127451]  kasan_save_stack+0x45/0x70
[   16.127931]  kasan_save_track+0x18/0x40
[   16.128147]  kasan_save_alloc_info+0x3b/0x50
[   16.128464]  __kasan_kmalloc+0xb7/0xc0
[   16.128658]  __kmalloc_cache_noprof+0x189/0x420
[   16.129030]  kasan_atomics+0x95/0x310
[   16.129254]  kunit_try_run_case+0x1a5/0x480
[   16.129523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.129960]  kthread+0x337/0x6f0
[   16.130226]  ret_from_fork+0x116/0x1d0
[   16.130371]  ret_from_fork_asm+0x1a/0x30
[   16.130707] 
[   16.130811] The buggy address belongs to the object at ffff888102744f80
[   16.130811]  which belongs to the cache kmalloc-64 of size 64
[   16.131467] The buggy address is located 0 bytes to the right of
[   16.131467]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.132262] 
[   16.132367] The buggy address belongs to the physical page:
[   16.132838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.133201] flags: 0x200000000000000(node=0|zone=2)
[   16.133425] page_type: f5(slab)
[   16.133579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.134147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.134540] page dumped because: kasan: bad access detected
[   16.134888] 
[   16.135003] Memory state around the buggy address:
[   16.135374]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.135716]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.136203] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.136536]                                      ^
[   16.136893]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.137313]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.137698] ==================================================================
[   16.041033] ==================================================================
[   16.041674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.042149] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   16.042521] 
[   16.042893] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.042973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.042986] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.043023] Call Trace:
[   16.043057]  <TASK>
[   16.043073]  dump_stack_lvl+0x73/0xb0
[   16.043117]  print_report+0xd1/0x610
[   16.043140]  ? __virt_addr_valid+0x1db/0x2d0
[   16.043176]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.043432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.043455]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.043478]  kasan_report+0x141/0x180
[   16.043501]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.043528]  __asan_report_load8_noabort+0x18/0x20
[   16.043552]  kasan_atomics_helper+0x4f71/0x5450
[   16.043574]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.043596]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.043621]  ? trace_hardirqs_on+0x37/0xe0
[   16.043643]  ? kasan_atomics+0x152/0x310
[   16.043669]  kasan_atomics+0x1dc/0x310
[   16.043700]  ? __pfx_kasan_atomics+0x10/0x10
[   16.043724]  ? __pfx_kasan_atomics+0x10/0x10
[   16.043751]  kunit_try_run_case+0x1a5/0x480
[   16.043774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.043796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.043820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.043842]  ? __kthread_parkme+0x82/0x180
[   16.043862]  ? preempt_count_sub+0x50/0x80
[   16.043885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.043922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.043945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.043969]  kthread+0x337/0x6f0
[   16.043988]  ? trace_preempt_on+0x20/0xc0
[   16.044010]  ? __pfx_kthread+0x10/0x10
[   16.044031]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.044051]  ? calculate_sigpending+0x7b/0xa0
[   16.044074]  ? __pfx_kthread+0x10/0x10
[   16.044096]  ret_from_fork+0x116/0x1d0
[   16.044115]  ? __pfx_kthread+0x10/0x10
[   16.044136]  ret_from_fork_asm+0x1a/0x30
[   16.044166]  </TASK>
[   16.044177] 
[   16.054786] Allocated by task 283:
[   16.055003]  kasan_save_stack+0x45/0x70
[   16.055460]  kasan_save_track+0x18/0x40
[   16.055666]  kasan_save_alloc_info+0x3b/0x50
[   16.055986]  __kasan_kmalloc+0xb7/0xc0
[   16.056289]  __kmalloc_cache_noprof+0x189/0x420
[   16.056590]  kasan_atomics+0x95/0x310
[   16.056818]  kunit_try_run_case+0x1a5/0x480
[   16.057165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.057508]  kthread+0x337/0x6f0
[   16.057761]  ret_from_fork+0x116/0x1d0
[   16.057986]  ret_from_fork_asm+0x1a/0x30
[   16.058318] 
[   16.058448] The buggy address belongs to the object at ffff888102744f80
[   16.058448]  which belongs to the cache kmalloc-64 of size 64
[   16.059169] The buggy address is located 0 bytes to the right of
[   16.059169]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.059982] 
[   16.060203] The buggy address belongs to the physical page:
[   16.060443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.061047] flags: 0x200000000000000(node=0|zone=2)
[   16.061263] page_type: f5(slab)
[   16.061411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.061972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.062309] page dumped because: kasan: bad access detected
[   16.062689] 
[   16.062857] Memory state around the buggy address:
[   16.063253]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.063634]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.064099] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.064433]                                      ^
[   16.064756]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.065200]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.065522] ==================================================================
[   15.086048] ==================================================================
[   15.086637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.087344] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.087588] 
[   15.087676] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.087720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.087733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.087754] Call Trace:
[   15.087771]  <TASK>
[   15.087786]  dump_stack_lvl+0x73/0xb0
[   15.087815]  print_report+0xd1/0x610
[   15.087839]  ? __virt_addr_valid+0x1db/0x2d0
[   15.087864]  ? kasan_atomics_helper+0x860/0x5450
[   15.087885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.087918]  ? kasan_atomics_helper+0x860/0x5450
[   15.087941]  kasan_report+0x141/0x180
[   15.087963]  ? kasan_atomics_helper+0x860/0x5450
[   15.087990]  kasan_check_range+0x10c/0x1c0
[   15.088014]  __kasan_check_write+0x18/0x20
[   15.088033]  kasan_atomics_helper+0x860/0x5450
[   15.088055]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.088077]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.088101]  ? trace_hardirqs_on+0x37/0xe0
[   15.088124]  ? kasan_atomics+0x152/0x310
[   15.088151]  kasan_atomics+0x1dc/0x310
[   15.088173]  ? __pfx_kasan_atomics+0x10/0x10
[   15.088197]  ? __pfx_kasan_atomics+0x10/0x10
[   15.088224]  kunit_try_run_case+0x1a5/0x480
[   15.088249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.088271]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.088326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.088350]  ? __kthread_parkme+0x82/0x180
[   15.088371]  ? preempt_count_sub+0x50/0x80
[   15.088395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.088418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.088442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.088465]  kthread+0x337/0x6f0
[   15.088484]  ? trace_preempt_on+0x20/0xc0
[   15.088506]  ? __pfx_kthread+0x10/0x10
[   15.088537]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.088559]  ? calculate_sigpending+0x7b/0xa0
[   15.088583]  ? __pfx_kthread+0x10/0x10
[   15.088604]  ret_from_fork+0x116/0x1d0
[   15.088624]  ? __pfx_kthread+0x10/0x10
[   15.088644]  ret_from_fork_asm+0x1a/0x30
[   15.088674]  </TASK>
[   15.088685] 
[   15.099948] Allocated by task 283:
[   15.100252]  kasan_save_stack+0x45/0x70
[   15.100634]  kasan_save_track+0x18/0x40
[   15.100858]  kasan_save_alloc_info+0x3b/0x50
[   15.101293]  __kasan_kmalloc+0xb7/0xc0
[   15.101636]  __kmalloc_cache_noprof+0x189/0x420
[   15.101820]  kasan_atomics+0x95/0x310
[   15.102175]  kunit_try_run_case+0x1a5/0x480
[   15.102479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.102697]  kthread+0x337/0x6f0
[   15.103127]  ret_from_fork+0x116/0x1d0
[   15.103520]  ret_from_fork_asm+0x1a/0x30
[   15.103681] 
[   15.103804] The buggy address belongs to the object at ffff888102744f80
[   15.103804]  which belongs to the cache kmalloc-64 of size 64
[   15.104317] The buggy address is located 0 bytes to the right of
[   15.104317]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.105176] 
[   15.105261] The buggy address belongs to the physical page:
[   15.105749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.106193] flags: 0x200000000000000(node=0|zone=2)
[   15.106497] page_type: f5(slab)
[   15.106705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.107318] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.108012] page dumped because: kasan: bad access detected
[   15.108219] 
[   15.108318] Memory state around the buggy address:
[   15.108670]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.109228]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.109785] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.110285]                                      ^
[   15.110605]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.110942]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111276] ==================================================================
[   15.543841] ==================================================================
[   15.544191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.544876] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.545229] 
[   15.545348] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.545390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.545401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.545422] Call Trace:
[   15.545437]  <TASK>
[   15.545452]  dump_stack_lvl+0x73/0xb0
[   15.545481]  print_report+0xd1/0x610
[   15.545503]  ? __virt_addr_valid+0x1db/0x2d0
[   15.545526]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.545547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.545570]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.545593]  kasan_report+0x141/0x180
[   15.545615]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.545641]  __asan_report_load4_noabort+0x18/0x20
[   15.545665]  kasan_atomics_helper+0x49ce/0x5450
[   15.545699]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.545722]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.545745]  ? trace_hardirqs_on+0x37/0xe0
[   15.545767]  ? kasan_atomics+0x152/0x310
[   15.545794]  kasan_atomics+0x1dc/0x310
[   15.545816]  ? __pfx_kasan_atomics+0x10/0x10
[   15.545839]  ? __pfx_kasan_atomics+0x10/0x10
[   15.545865]  kunit_try_run_case+0x1a5/0x480
[   15.545889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.545922]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.545945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.545968]  ? __kthread_parkme+0x82/0x180
[   15.545988]  ? preempt_count_sub+0x50/0x80
[   15.546011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.546035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.546057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.546081]  kthread+0x337/0x6f0
[   15.546101]  ? trace_preempt_on+0x20/0xc0
[   15.546122]  ? __pfx_kthread+0x10/0x10
[   15.546143]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.546164]  ? calculate_sigpending+0x7b/0xa0
[   15.546188]  ? __pfx_kthread+0x10/0x10
[   15.546209]  ret_from_fork+0x116/0x1d0
[   15.546228]  ? __pfx_kthread+0x10/0x10
[   15.546250]  ret_from_fork_asm+0x1a/0x30
[   15.546280]  </TASK>
[   15.546291] 
[   15.558768] Allocated by task 283:
[   15.559117]  kasan_save_stack+0x45/0x70
[   15.559422]  kasan_save_track+0x18/0x40
[   15.559579]  kasan_save_alloc_info+0x3b/0x50
[   15.559934]  __kasan_kmalloc+0xb7/0xc0
[   15.560210]  __kmalloc_cache_noprof+0x189/0x420
[   15.560417]  kasan_atomics+0x95/0x310
[   15.560601]  kunit_try_run_case+0x1a5/0x480
[   15.561019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.561359]  kthread+0x337/0x6f0
[   15.561528]  ret_from_fork+0x116/0x1d0
[   15.561879]  ret_from_fork_asm+0x1a/0x30
[   15.562186] 
[   15.562265] The buggy address belongs to the object at ffff888102744f80
[   15.562265]  which belongs to the cache kmalloc-64 of size 64
[   15.563094] The buggy address is located 0 bytes to the right of
[   15.563094]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.563755] 
[   15.563840] The buggy address belongs to the physical page:
[   15.564234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.564662] flags: 0x200000000000000(node=0|zone=2)
[   15.565012] page_type: f5(slab)
[   15.565165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.565504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.566077] page dumped because: kasan: bad access detected
[   15.566274] 
[   15.566521] Memory state around the buggy address:
[   15.566863]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.567318]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.567701] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.568099]                                      ^
[   15.568425]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.568813]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.569184] ==================================================================
[   15.161102] ==================================================================
[   15.161803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.162099] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.162326] 
[   15.162408] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.162449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.162462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.162482] Call Trace:
[   15.162496]  <TASK>
[   15.162509]  dump_stack_lvl+0x73/0xb0
[   15.162536]  print_report+0xd1/0x610
[   15.162557]  ? __virt_addr_valid+0x1db/0x2d0
[   15.162581]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.162601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.162623]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.162645]  kasan_report+0x141/0x180
[   15.162666]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.162692]  kasan_check_range+0x10c/0x1c0
[   15.162715]  __kasan_check_write+0x18/0x20
[   15.162735]  kasan_atomics_helper+0xa2b/0x5450
[   15.162757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.162787]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.162811]  ? trace_hardirqs_on+0x37/0xe0
[   15.162833]  ? kasan_atomics+0x152/0x310
[   15.162859]  kasan_atomics+0x1dc/0x310
[   15.162882]  ? __pfx_kasan_atomics+0x10/0x10
[   15.162916]  ? __pfx_kasan_atomics+0x10/0x10
[   15.162943]  kunit_try_run_case+0x1a5/0x480
[   15.162967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.162989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.163012]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.163036]  ? __kthread_parkme+0x82/0x180
[   15.163062]  ? preempt_count_sub+0x50/0x80
[   15.163086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.163109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.163134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.163160]  kthread+0x337/0x6f0
[   15.163182]  ? trace_preempt_on+0x20/0xc0
[   15.163205]  ? __pfx_kthread+0x10/0x10
[   15.163225]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.163246]  ? calculate_sigpending+0x7b/0xa0
[   15.163270]  ? __pfx_kthread+0x10/0x10
[   15.163293]  ret_from_fork+0x116/0x1d0
[   15.163311]  ? __pfx_kthread+0x10/0x10
[   15.163331]  ret_from_fork_asm+0x1a/0x30
[   15.163373]  </TASK>
[   15.163384] 
[   15.171660] Allocated by task 283:
[   15.171789]  kasan_save_stack+0x45/0x70
[   15.172107]  kasan_save_track+0x18/0x40
[   15.172306]  kasan_save_alloc_info+0x3b/0x50
[   15.172517]  __kasan_kmalloc+0xb7/0xc0
[   15.172702]  __kmalloc_cache_noprof+0x189/0x420
[   15.172985]  kasan_atomics+0x95/0x310
[   15.173294]  kunit_try_run_case+0x1a5/0x480
[   15.173440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.173615]  kthread+0x337/0x6f0
[   15.173735]  ret_from_fork+0x116/0x1d0
[   15.173866]  ret_from_fork_asm+0x1a/0x30
[   15.174025] 
[   15.174095] The buggy address belongs to the object at ffff888102744f80
[   15.174095]  which belongs to the cache kmalloc-64 of size 64
[   15.175254] The buggy address is located 0 bytes to the right of
[   15.175254]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.175806] 
[   15.175936] The buggy address belongs to the physical page:
[   15.176215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.176853] flags: 0x200000000000000(node=0|zone=2)
[   15.177040] page_type: f5(slab)
[   15.177209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.177479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.177706] page dumped because: kasan: bad access detected
[   15.177878] 
[   15.177957] Memory state around the buggy address:
[   15.178113]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.178331]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.178547] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.178764]                                      ^
[   15.178948]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.179274]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.179588] ==================================================================
[   16.138815] ==================================================================
[   16.139158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.139766] Read of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   16.140220] 
[   16.140349] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.140410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.140423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.140444] Call Trace:
[   16.140461]  <TASK>
[   16.140476]  dump_stack_lvl+0x73/0xb0
[   16.140506]  print_report+0xd1/0x610
[   16.140528]  ? __virt_addr_valid+0x1db/0x2d0
[   16.140550]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.140571]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.140594]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.140616]  kasan_report+0x141/0x180
[   16.140637]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.140664]  __asan_report_load8_noabort+0x18/0x20
[   16.140688]  kasan_atomics_helper+0x4fb2/0x5450
[   16.140710]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.140732]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.140755]  ? trace_hardirqs_on+0x37/0xe0
[   16.140777]  ? kasan_atomics+0x152/0x310
[   16.140803]  kasan_atomics+0x1dc/0x310
[   16.140826]  ? __pfx_kasan_atomics+0x10/0x10
[   16.140849]  ? __pfx_kasan_atomics+0x10/0x10
[   16.140876]  kunit_try_run_case+0x1a5/0x480
[   16.140900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.140934]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.140957]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.140981]  ? __kthread_parkme+0x82/0x180
[   16.141001]  ? preempt_count_sub+0x50/0x80
[   16.141024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.141048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.141071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.141094]  kthread+0x337/0x6f0
[   16.141114]  ? trace_preempt_on+0x20/0xc0
[   16.141136]  ? __pfx_kthread+0x10/0x10
[   16.141156]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.141177]  ? calculate_sigpending+0x7b/0xa0
[   16.141201]  ? __pfx_kthread+0x10/0x10
[   16.141223]  ret_from_fork+0x116/0x1d0
[   16.141241]  ? __pfx_kthread+0x10/0x10
[   16.141261]  ret_from_fork_asm+0x1a/0x30
[   16.141292]  </TASK>
[   16.141303] 
[   16.149064] Allocated by task 283:
[   16.149245]  kasan_save_stack+0x45/0x70
[   16.149407]  kasan_save_track+0x18/0x40
[   16.149582]  kasan_save_alloc_info+0x3b/0x50
[   16.149875]  __kasan_kmalloc+0xb7/0xc0
[   16.150076]  __kmalloc_cache_noprof+0x189/0x420
[   16.150290]  kasan_atomics+0x95/0x310
[   16.150428]  kunit_try_run_case+0x1a5/0x480
[   16.150615]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.151012]  kthread+0x337/0x6f0
[   16.151191]  ret_from_fork+0x116/0x1d0
[   16.151355]  ret_from_fork_asm+0x1a/0x30
[   16.151572] 
[   16.151667] The buggy address belongs to the object at ffff888102744f80
[   16.151667]  which belongs to the cache kmalloc-64 of size 64
[   16.152152] The buggy address is located 0 bytes to the right of
[   16.152152]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.152724] 
[   16.152830] The buggy address belongs to the physical page:
[   16.153108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.153465] flags: 0x200000000000000(node=0|zone=2)
[   16.153696] page_type: f5(slab)
[   16.153863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.154209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.154545] page dumped because: kasan: bad access detected
[   16.154931] 
[   16.155003] Memory state around the buggy address:
[   16.155163]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.155460]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.155891] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.156193]                                      ^
[   16.156388]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.156693]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.157005] ==================================================================
[   15.803944] ==================================================================
[   15.804581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.805229] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.805859] 
[   15.806043] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.806088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.806100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.806121] Call Trace:
[   15.806137]  <TASK>
[   15.806152]  dump_stack_lvl+0x73/0xb0
[   15.806180]  print_report+0xd1/0x610
[   15.806201]  ? __virt_addr_valid+0x1db/0x2d0
[   15.806223]  ? kasan_atomics_helper+0x194a/0x5450
[   15.806244]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.806266]  ? kasan_atomics_helper+0x194a/0x5450
[   15.806287]  kasan_report+0x141/0x180
[   15.806309]  ? kasan_atomics_helper+0x194a/0x5450
[   15.806335]  kasan_check_range+0x10c/0x1c0
[   15.806359]  __kasan_check_write+0x18/0x20
[   15.806378]  kasan_atomics_helper+0x194a/0x5450
[   15.806400]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.806422]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.806446]  ? trace_hardirqs_on+0x37/0xe0
[   15.806467]  ? kasan_atomics+0x152/0x310
[   15.806494]  kasan_atomics+0x1dc/0x310
[   15.806516]  ? __pfx_kasan_atomics+0x10/0x10
[   15.806540]  ? __pfx_kasan_atomics+0x10/0x10
[   15.806567]  kunit_try_run_case+0x1a5/0x480
[   15.806592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.806615]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.806638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.806661]  ? __kthread_parkme+0x82/0x180
[   15.806704]  ? preempt_count_sub+0x50/0x80
[   15.806727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.806752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.806775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.806798]  kthread+0x337/0x6f0
[   15.806818]  ? trace_preempt_on+0x20/0xc0
[   15.806840]  ? __pfx_kthread+0x10/0x10
[   15.806861]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.806882]  ? calculate_sigpending+0x7b/0xa0
[   15.806914]  ? __pfx_kthread+0x10/0x10
[   15.806936]  ret_from_fork+0x116/0x1d0
[   15.806954]  ? __pfx_kthread+0x10/0x10
[   15.806975]  ret_from_fork_asm+0x1a/0x30
[   15.807006]  </TASK>
[   15.807016] 
[   15.819643] Allocated by task 283:
[   15.820000]  kasan_save_stack+0x45/0x70
[   15.820352]  kasan_save_track+0x18/0x40
[   15.820721]  kasan_save_alloc_info+0x3b/0x50
[   15.821080]  __kasan_kmalloc+0xb7/0xc0
[   15.821214]  __kmalloc_cache_noprof+0x189/0x420
[   15.821369]  kasan_atomics+0x95/0x310
[   15.821503]  kunit_try_run_case+0x1a5/0x480
[   15.821651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.822139]  kthread+0x337/0x6f0
[   15.822440]  ret_from_fork+0x116/0x1d0
[   15.822817]  ret_from_fork_asm+0x1a/0x30
[   15.823188] 
[   15.823345] The buggy address belongs to the object at ffff888102744f80
[   15.823345]  which belongs to the cache kmalloc-64 of size 64
[   15.824398] The buggy address is located 0 bytes to the right of
[   15.824398]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.825342] 
[   15.825416] The buggy address belongs to the physical page:
[   15.825591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.825839] flags: 0x200000000000000(node=0|zone=2)
[   15.826017] page_type: f5(slab)
[   15.826139] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.826486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.826788] page dumped because: kasan: bad access detected
[   15.826999] 
[   15.827097] Memory state around the buggy address:
[   15.827330]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.827652]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.827928] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.828201]                                      ^
[   15.828423]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.828723]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.829010] ==================================================================
[   15.776507] ==================================================================
[   15.777043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.777737] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.778356] 
[   15.778529] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.778573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.778585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.778606] Call Trace:
[   15.778621]  <TASK>
[   15.778636]  dump_stack_lvl+0x73/0xb0
[   15.778686]  print_report+0xd1/0x610
[   15.778709]  ? __virt_addr_valid+0x1db/0x2d0
[   15.778731]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.778752]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.778775]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.778796]  kasan_report+0x141/0x180
[   15.778818]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.778844]  kasan_check_range+0x10c/0x1c0
[   15.778868]  __kasan_check_write+0x18/0x20
[   15.778886]  kasan_atomics_helper+0x18b1/0x5450
[   15.778919]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.778940]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.778964]  ? trace_hardirqs_on+0x37/0xe0
[   15.778986]  ? kasan_atomics+0x152/0x310
[   15.779012]  kasan_atomics+0x1dc/0x310
[   15.779035]  ? __pfx_kasan_atomics+0x10/0x10
[   15.779062]  ? __pfx_kasan_atomics+0x10/0x10
[   15.779089]  kunit_try_run_case+0x1a5/0x480
[   15.779113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.779135]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.779159]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.779183]  ? __kthread_parkme+0x82/0x180
[   15.779203]  ? preempt_count_sub+0x50/0x80
[   15.779227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.779251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.779274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.779298]  kthread+0x337/0x6f0
[   15.779317]  ? trace_preempt_on+0x20/0xc0
[   15.779338]  ? __pfx_kthread+0x10/0x10
[   15.779359]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.779381]  ? calculate_sigpending+0x7b/0xa0
[   15.779404]  ? __pfx_kthread+0x10/0x10
[   15.779426]  ret_from_fork+0x116/0x1d0
[   15.779444]  ? __pfx_kthread+0x10/0x10
[   15.779465]  ret_from_fork_asm+0x1a/0x30
[   15.779496]  </TASK>
[   15.779507] 
[   15.791496] Allocated by task 283:
[   15.791834]  kasan_save_stack+0x45/0x70
[   15.792191]  kasan_save_track+0x18/0x40
[   15.792528]  kasan_save_alloc_info+0x3b/0x50
[   15.792936]  __kasan_kmalloc+0xb7/0xc0
[   15.793264]  __kmalloc_cache_noprof+0x189/0x420
[   15.793678]  kasan_atomics+0x95/0x310
[   15.794021]  kunit_try_run_case+0x1a5/0x480
[   15.794397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.794874]  kthread+0x337/0x6f0
[   15.795182]  ret_from_fork+0x116/0x1d0
[   15.795512]  ret_from_fork_asm+0x1a/0x30
[   15.795860] 
[   15.795945] The buggy address belongs to the object at ffff888102744f80
[   15.795945]  which belongs to the cache kmalloc-64 of size 64
[   15.796299] The buggy address is located 0 bytes to the right of
[   15.796299]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.796688] 
[   15.796848] The buggy address belongs to the physical page:
[   15.797326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.798019] flags: 0x200000000000000(node=0|zone=2)
[   15.798440] page_type: f5(slab)
[   15.798751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.799408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.800086] page dumped because: kasan: bad access detected
[   15.800567] 
[   15.800743] Memory state around the buggy address:
[   15.801162]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.801733]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.801961] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.802176]                                      ^
[   15.802330]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.802545]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.802968] ==================================================================
[   16.196062] ==================================================================
[   16.196590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.196983] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   16.197303] 
[   16.197430] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.197473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.197486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.197507] Call Trace:
[   16.197521]  <TASK>
[   16.197536]  dump_stack_lvl+0x73/0xb0
[   16.197563]  print_report+0xd1/0x610
[   16.197585]  ? __virt_addr_valid+0x1db/0x2d0
[   16.197607]  ? kasan_atomics_helper+0x224c/0x5450
[   16.197628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.197651]  ? kasan_atomics_helper+0x224c/0x5450
[   16.197700]  kasan_report+0x141/0x180
[   16.197722]  ? kasan_atomics_helper+0x224c/0x5450
[   16.197749]  kasan_check_range+0x10c/0x1c0
[   16.197790]  __kasan_check_write+0x18/0x20
[   16.197809]  kasan_atomics_helper+0x224c/0x5450
[   16.197832]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.197854]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.197878]  ? trace_hardirqs_on+0x37/0xe0
[   16.197900]  ? kasan_atomics+0x152/0x310
[   16.197940]  kasan_atomics+0x1dc/0x310
[   16.197981]  ? __pfx_kasan_atomics+0x10/0x10
[   16.198005]  ? __pfx_kasan_atomics+0x10/0x10
[   16.198032]  kunit_try_run_case+0x1a5/0x480
[   16.198055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.198078]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.198101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.198142]  ? __kthread_parkme+0x82/0x180
[   16.198162]  ? preempt_count_sub+0x50/0x80
[   16.198199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.198238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.198274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.198311]  kthread+0x337/0x6f0
[   16.198331]  ? trace_preempt_on+0x20/0xc0
[   16.198366]  ? __pfx_kthread+0x10/0x10
[   16.198400]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.198435]  ? calculate_sigpending+0x7b/0xa0
[   16.198472]  ? __pfx_kthread+0x10/0x10
[   16.198507]  ret_from_fork+0x116/0x1d0
[   16.198539]  ? __pfx_kthread+0x10/0x10
[   16.198574]  ret_from_fork_asm+0x1a/0x30
[   16.198617]  </TASK>
[   16.198640] 
[   16.206284] Allocated by task 283:
[   16.206470]  kasan_save_stack+0x45/0x70
[   16.206667]  kasan_save_track+0x18/0x40
[   16.206869]  kasan_save_alloc_info+0x3b/0x50
[   16.207096]  __kasan_kmalloc+0xb7/0xc0
[   16.207243]  __kmalloc_cache_noprof+0x189/0x420
[   16.207427]  kasan_atomics+0x95/0x310
[   16.207641]  kunit_try_run_case+0x1a5/0x480
[   16.207886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.208146]  kthread+0x337/0x6f0
[   16.208298]  ret_from_fork+0x116/0x1d0
[   16.208500]  ret_from_fork_asm+0x1a/0x30
[   16.208710] 
[   16.208807] The buggy address belongs to the object at ffff888102744f80
[   16.208807]  which belongs to the cache kmalloc-64 of size 64
[   16.209340] The buggy address is located 0 bytes to the right of
[   16.209340]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.209837] 
[   16.209919] The buggy address belongs to the physical page:
[   16.210407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.210848] flags: 0x200000000000000(node=0|zone=2)
[   16.211128] page_type: f5(slab)
[   16.211299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.211623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.211975] page dumped because: kasan: bad access detected
[   16.212157] 
[   16.212227] Memory state around the buggy address:
[   16.212457]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.212812]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.213145] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.213448]                                      ^
[   16.213632]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.214147]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.214468] ==================================================================
[   15.022356] ==================================================================
[   15.022598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.022826] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.023144] 
[   15.023253] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.023295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.023307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.023329] Call Trace:
[   15.023342]  <TASK>
[   15.023357]  dump_stack_lvl+0x73/0xb0
[   15.023384]  print_report+0xd1/0x610
[   15.023420]  ? __virt_addr_valid+0x1db/0x2d0
[   15.023442]  ? kasan_atomics_helper+0x72f/0x5450
[   15.023463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.023486]  ? kasan_atomics_helper+0x72f/0x5450
[   15.023508]  kasan_report+0x141/0x180
[   15.023531]  ? kasan_atomics_helper+0x72f/0x5450
[   15.023557]  kasan_check_range+0x10c/0x1c0
[   15.023581]  __kasan_check_write+0x18/0x20
[   15.023600]  kasan_atomics_helper+0x72f/0x5450
[   15.023623]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.023645]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.023668]  ? trace_hardirqs_on+0x37/0xe0
[   15.023698]  ? kasan_atomics+0x152/0x310
[   15.023725]  kasan_atomics+0x1dc/0x310
[   15.023747]  ? __pfx_kasan_atomics+0x10/0x10
[   15.023769]  ? __pfx_kasan_atomics+0x10/0x10
[   15.023797]  kunit_try_run_case+0x1a5/0x480
[   15.023820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.023867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.023890]  ? __kthread_parkme+0x82/0x180
[   15.023921]  ? preempt_count_sub+0x50/0x80
[   15.023943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.023990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.024014]  kthread+0x337/0x6f0
[   15.024033]  ? trace_preempt_on+0x20/0xc0
[   15.024055]  ? __pfx_kthread+0x10/0x10
[   15.024075]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.024097]  ? calculate_sigpending+0x7b/0xa0
[   15.024121]  ? __pfx_kthread+0x10/0x10
[   15.024142]  ret_from_fork+0x116/0x1d0
[   15.024161]  ? __pfx_kthread+0x10/0x10
[   15.024181]  ret_from_fork_asm+0x1a/0x30
[   15.024212]  </TASK>
[   15.024222] 
[   15.036154] Allocated by task 283:
[   15.036302]  kasan_save_stack+0x45/0x70
[   15.037165]  kasan_save_track+0x18/0x40
[   15.038023]  kasan_save_alloc_info+0x3b/0x50
[   15.038238]  __kasan_kmalloc+0xb7/0xc0
[   15.038735]  __kmalloc_cache_noprof+0x189/0x420
[   15.039356]  kasan_atomics+0x95/0x310
[   15.039794]  kunit_try_run_case+0x1a5/0x480
[   15.040581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.041213]  kthread+0x337/0x6f0
[   15.041680]  ret_from_fork+0x116/0x1d0
[   15.041829]  ret_from_fork_asm+0x1a/0x30
[   15.042401] 
[   15.042751] The buggy address belongs to the object at ffff888102744f80
[   15.042751]  which belongs to the cache kmalloc-64 of size 64
[   15.044074] The buggy address is located 0 bytes to the right of
[   15.044074]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.044726] 
[   15.045001] The buggy address belongs to the physical page:
[   15.045776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.046772] flags: 0x200000000000000(node=0|zone=2)
[   15.047512] page_type: f5(slab)
[   15.048124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.048373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.049193] page dumped because: kasan: bad access detected
[   15.049844] 
[   15.050052] Memory state around the buggy address:
[   15.050700]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.051264]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.051817] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.052216]                                      ^
[   15.052401]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.053157]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.053655] ==================================================================
[   15.953039] ==================================================================
[   15.953756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.954133] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.954476] 
[   15.954584] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.954627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.954639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.954660] Call Trace:
[   15.954697]  <TASK>
[   15.954712]  dump_stack_lvl+0x73/0xb0
[   15.954739]  print_report+0xd1/0x610
[   15.954762]  ? __virt_addr_valid+0x1db/0x2d0
[   15.954784]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.954805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.954826]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.954848]  kasan_report+0x141/0x180
[   15.954870]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.954896]  kasan_check_range+0x10c/0x1c0
[   15.954928]  __kasan_check_write+0x18/0x20
[   15.954948]  kasan_atomics_helper+0x1d7a/0x5450
[   15.954970]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.954992]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.955016]  ? trace_hardirqs_on+0x37/0xe0
[   15.955037]  ? kasan_atomics+0x152/0x310
[   15.955070]  kasan_atomics+0x1dc/0x310
[   15.955092]  ? __pfx_kasan_atomics+0x10/0x10
[   15.955115]  ? __pfx_kasan_atomics+0x10/0x10
[   15.955141]  kunit_try_run_case+0x1a5/0x480
[   15.955166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.955189]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.955211]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.955234]  ? __kthread_parkme+0x82/0x180
[   15.955254]  ? preempt_count_sub+0x50/0x80
[   15.955277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.955301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.955324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.955348]  kthread+0x337/0x6f0
[   15.955367]  ? trace_preempt_on+0x20/0xc0
[   15.955388]  ? __pfx_kthread+0x10/0x10
[   15.955409]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.955430]  ? calculate_sigpending+0x7b/0xa0
[   15.955453]  ? __pfx_kthread+0x10/0x10
[   15.955474]  ret_from_fork+0x116/0x1d0
[   15.955492]  ? __pfx_kthread+0x10/0x10
[   15.955512]  ret_from_fork_asm+0x1a/0x30
[   15.955543]  </TASK>
[   15.955553] 
[   15.962731] Allocated by task 283:
[   15.962915]  kasan_save_stack+0x45/0x70
[   15.963114]  kasan_save_track+0x18/0x40
[   15.963305]  kasan_save_alloc_info+0x3b/0x50
[   15.963513]  __kasan_kmalloc+0xb7/0xc0
[   15.963725]  __kmalloc_cache_noprof+0x189/0x420
[   15.963956]  kasan_atomics+0x95/0x310
[   15.964133]  kunit_try_run_case+0x1a5/0x480
[   15.964280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.964456]  kthread+0x337/0x6f0
[   15.964603]  ret_from_fork+0x116/0x1d0
[   15.964821]  ret_from_fork_asm+0x1a/0x30
[   15.965037] 
[   15.965134] The buggy address belongs to the object at ffff888102744f80
[   15.965134]  which belongs to the cache kmalloc-64 of size 64
[   15.965633] The buggy address is located 0 bytes to the right of
[   15.965633]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.966047] 
[   15.966120] The buggy address belongs to the physical page:
[   15.966293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.966535] flags: 0x200000000000000(node=0|zone=2)
[   15.966771] page_type: f5(slab)
[   15.966945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.967293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.967625] page dumped because: kasan: bad access detected
[   15.967900] 
[   15.968002] Memory state around the buggy address:
[   15.968223]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.968460]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.968694] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.968987]                                      ^
[   15.969211]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.969526]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.969869] ==================================================================
[   15.490634] ==================================================================
[   15.491357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.491655] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.491976] 
[   15.492072] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.492115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.492128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.492149] Call Trace:
[   15.492163]  <TASK>
[   15.492178]  dump_stack_lvl+0x73/0xb0
[   15.492205]  print_report+0xd1/0x610
[   15.492227]  ? __virt_addr_valid+0x1db/0x2d0
[   15.492250]  ? kasan_atomics_helper+0x1217/0x5450
[   15.492270]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.492292]  ? kasan_atomics_helper+0x1217/0x5450
[   15.492314]  kasan_report+0x141/0x180
[   15.492337]  ? kasan_atomics_helper+0x1217/0x5450
[   15.492364]  kasan_check_range+0x10c/0x1c0
[   15.492387]  __kasan_check_write+0x18/0x20
[   15.492406]  kasan_atomics_helper+0x1217/0x5450
[   15.492429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.492450]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.492475]  ? trace_hardirqs_on+0x37/0xe0
[   15.492498]  ? kasan_atomics+0x152/0x310
[   15.492524]  kasan_atomics+0x1dc/0x310
[   15.492548]  ? __pfx_kasan_atomics+0x10/0x10
[   15.492570]  ? __pfx_kasan_atomics+0x10/0x10
[   15.492597]  kunit_try_run_case+0x1a5/0x480
[   15.492621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.492644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.492668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.492702]  ? __kthread_parkme+0x82/0x180
[   15.492723]  ? preempt_count_sub+0x50/0x80
[   15.492746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.492771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.492794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.492817]  kthread+0x337/0x6f0
[   15.492837]  ? trace_preempt_on+0x20/0xc0
[   15.492858]  ? __pfx_kthread+0x10/0x10
[   15.492880]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.492900]  ? calculate_sigpending+0x7b/0xa0
[   15.492954]  ? __pfx_kthread+0x10/0x10
[   15.492976]  ret_from_fork+0x116/0x1d0
[   15.492995]  ? __pfx_kthread+0x10/0x10
[   15.493015]  ret_from_fork_asm+0x1a/0x30
[   15.493045]  </TASK>
[   15.493057] 
[   15.500634] Allocated by task 283:
[   15.500814]  kasan_save_stack+0x45/0x70
[   15.500975]  kasan_save_track+0x18/0x40
[   15.501169]  kasan_save_alloc_info+0x3b/0x50
[   15.501380]  __kasan_kmalloc+0xb7/0xc0
[   15.501550]  __kmalloc_cache_noprof+0x189/0x420
[   15.501765]  kasan_atomics+0x95/0x310
[   15.501900]  kunit_try_run_case+0x1a5/0x480
[   15.502058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.502236]  kthread+0x337/0x6f0
[   15.502357]  ret_from_fork+0x116/0x1d0
[   15.502488]  ret_from_fork_asm+0x1a/0x30
[   15.502630] 
[   15.502700] The buggy address belongs to the object at ffff888102744f80
[   15.502700]  which belongs to the cache kmalloc-64 of size 64
[   15.503135] The buggy address is located 0 bytes to the right of
[   15.503135]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.504155] 
[   15.504252] The buggy address belongs to the physical page:
[   15.504479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.504719] flags: 0x200000000000000(node=0|zone=2)
[   15.504882] page_type: f5(slab)
[   15.505010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.505241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.505467] page dumped because: kasan: bad access detected
[   15.505981] 
[   15.506076] Memory state around the buggy address:
[   15.506303]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.506625]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.507303] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.507628]                                      ^
[   15.508095]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.508423]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.508791] ==================================================================
[   15.650014] ==================================================================
[   15.650662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.651146] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.651672] 
[   15.651782] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.651825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.651837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.651981] Call Trace:
[   15.651996]  <TASK>
[   15.652013]  dump_stack_lvl+0x73/0xb0
[   15.652042]  print_report+0xd1/0x610
[   15.652065]  ? __virt_addr_valid+0x1db/0x2d0
[   15.652086]  ? kasan_atomics_helper+0x151d/0x5450
[   15.652108]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.652130]  ? kasan_atomics_helper+0x151d/0x5450
[   15.652152]  kasan_report+0x141/0x180
[   15.652174]  ? kasan_atomics_helper+0x151d/0x5450
[   15.652200]  kasan_check_range+0x10c/0x1c0
[   15.652224]  __kasan_check_write+0x18/0x20
[   15.652243]  kasan_atomics_helper+0x151d/0x5450
[   15.652266]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.652289]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.652313]  ? trace_hardirqs_on+0x37/0xe0
[   15.652335]  ? kasan_atomics+0x152/0x310
[   15.652362]  kasan_atomics+0x1dc/0x310
[   15.652384]  ? __pfx_kasan_atomics+0x10/0x10
[   15.652408]  ? __pfx_kasan_atomics+0x10/0x10
[   15.652435]  kunit_try_run_case+0x1a5/0x480
[   15.652459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.652481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.652505]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.652529]  ? __kthread_parkme+0x82/0x180
[   15.652548]  ? preempt_count_sub+0x50/0x80
[   15.652571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.652595]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.652618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.652641]  kthread+0x337/0x6f0
[   15.652661]  ? trace_preempt_on+0x20/0xc0
[   15.652849]  ? __pfx_kthread+0x10/0x10
[   15.652871]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.652892]  ? calculate_sigpending+0x7b/0xa0
[   15.652927]  ? __pfx_kthread+0x10/0x10
[   15.652948]  ret_from_fork+0x116/0x1d0
[   15.652967]  ? __pfx_kthread+0x10/0x10
[   15.652987]  ret_from_fork_asm+0x1a/0x30
[   15.653018]  </TASK>
[   15.653029] 
[   15.662669] Allocated by task 283:
[   15.662990]  kasan_save_stack+0x45/0x70
[   15.663340]  kasan_save_track+0x18/0x40
[   15.663524]  kasan_save_alloc_info+0x3b/0x50
[   15.663941]  __kasan_kmalloc+0xb7/0xc0
[   15.664128]  __kmalloc_cache_noprof+0x189/0x420
[   15.664406]  kasan_atomics+0x95/0x310
[   15.664567]  kunit_try_run_case+0x1a5/0x480
[   15.664794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.665253]  kthread+0x337/0x6f0
[   15.665572]  ret_from_fork+0x116/0x1d0
[   15.665758]  ret_from_fork_asm+0x1a/0x30
[   15.665980] 
[   15.666078] The buggy address belongs to the object at ffff888102744f80
[   15.666078]  which belongs to the cache kmalloc-64 of size 64
[   15.666564] The buggy address is located 0 bytes to the right of
[   15.666564]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.667412] 
[   15.667503] The buggy address belongs to the physical page:
[   15.667877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.668317] flags: 0x200000000000000(node=0|zone=2)
[   15.668498] page_type: f5(slab)
[   15.668793] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.669184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.669494] page dumped because: kasan: bad access detected
[   15.669722] 
[   15.669818] Memory state around the buggy address:
[   15.670020]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.670290]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.670603] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.670853]                                      ^
[   15.671106]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.671474]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.671770] ==================================================================
[   14.804810] ==================================================================
[   14.805057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.805445] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   14.805771] 
[   14.805880] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.805930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.805941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.805961] Call Trace:
[   14.805973]  <TASK>
[   14.805986]  dump_stack_lvl+0x73/0xb0
[   14.806011]  print_report+0xd1/0x610
[   14.806031]  ? __virt_addr_valid+0x1db/0x2d0
[   14.806052]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.806072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.806093]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.806114]  kasan_report+0x141/0x180
[   14.806136]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.806163]  __asan_report_load4_noabort+0x18/0x20
[   14.806186]  kasan_atomics_helper+0x4b88/0x5450
[   14.806207]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.806228]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.806251]  ? trace_hardirqs_on+0x37/0xe0
[   14.806271]  ? kasan_atomics+0x152/0x310
[   14.806297]  kasan_atomics+0x1dc/0x310
[   14.806318]  ? __pfx_kasan_atomics+0x10/0x10
[   14.806340]  ? __pfx_kasan_atomics+0x10/0x10
[   14.806365]  kunit_try_run_case+0x1a5/0x480
[   14.806389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.806511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.806535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.806576]  ? __kthread_parkme+0x82/0x180
[   14.806597]  ? preempt_count_sub+0x50/0x80
[   14.806621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.806644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.806667]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.806691]  kthread+0x337/0x6f0
[   14.806710]  ? trace_preempt_on+0x20/0xc0
[   14.806732]  ? __pfx_kthread+0x10/0x10
[   14.806753]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.806774]  ? calculate_sigpending+0x7b/0xa0
[   14.806797]  ? __pfx_kthread+0x10/0x10
[   14.806819]  ret_from_fork+0x116/0x1d0
[   14.806837]  ? __pfx_kthread+0x10/0x10
[   14.806857]  ret_from_fork_asm+0x1a/0x30
[   14.806888]  </TASK>
[   14.806899] 
[   14.815227] Allocated by task 283:
[   14.815415]  kasan_save_stack+0x45/0x70
[   14.815635]  kasan_save_track+0x18/0x40
[   14.816037]  kasan_save_alloc_info+0x3b/0x50
[   14.816207]  __kasan_kmalloc+0xb7/0xc0
[   14.816361]  __kmalloc_cache_noprof+0x189/0x420
[   14.816619]  kasan_atomics+0x95/0x310
[   14.817027]  kunit_try_run_case+0x1a5/0x480
[   14.817195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.817372]  kthread+0x337/0x6f0
[   14.817494]  ret_from_fork+0x116/0x1d0
[   14.817628]  ret_from_fork_asm+0x1a/0x30
[   14.817768] 
[   14.817842] The buggy address belongs to the object at ffff888102744f80
[   14.817842]  which belongs to the cache kmalloc-64 of size 64
[   14.818211] The buggy address is located 0 bytes to the right of
[   14.818211]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   14.818622] 
[   14.818722] The buggy address belongs to the physical page:
[   14.818986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   14.819342] flags: 0x200000000000000(node=0|zone=2)
[   14.819572] page_type: f5(slab)
[   14.819736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.820099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.820432] page dumped because: kasan: bad access detected
[   14.820846] 
[   14.820970] Memory state around the buggy address:
[   14.821143]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.821426]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.821867] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.822193]                                      ^
[   14.822459]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.822771]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.823067] ==================================================================
[   15.829791] ==================================================================
[   15.830135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.831006] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.831351] 
[   15.831460] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.831502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.831515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.831535] Call Trace:
[   15.831551]  <TASK>
[   15.831565]  dump_stack_lvl+0x73/0xb0
[   15.831594]  print_report+0xd1/0x610
[   15.831617]  ? __virt_addr_valid+0x1db/0x2d0
[   15.831638]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.831740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.831762]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.831784]  kasan_report+0x141/0x180
[   15.831806]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.831832]  kasan_check_range+0x10c/0x1c0
[   15.831856]  __kasan_check_write+0x18/0x20
[   15.831875]  kasan_atomics_helper+0x19e3/0x5450
[   15.831898]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.831931]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.831955]  ? trace_hardirqs_on+0x37/0xe0
[   15.831977]  ? kasan_atomics+0x152/0x310
[   15.832003]  kasan_atomics+0x1dc/0x310
[   15.832027]  ? __pfx_kasan_atomics+0x10/0x10
[   15.832050]  ? __pfx_kasan_atomics+0x10/0x10
[   15.832076]  kunit_try_run_case+0x1a5/0x480
[   15.832100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.832123]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.832146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.832169]  ? __kthread_parkme+0x82/0x180
[   15.832189]  ? preempt_count_sub+0x50/0x80
[   15.832212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.832236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.832259]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.832283]  kthread+0x337/0x6f0
[   15.832303]  ? trace_preempt_on+0x20/0xc0
[   15.832325]  ? __pfx_kthread+0x10/0x10
[   15.832346]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.832368]  ? calculate_sigpending+0x7b/0xa0
[   15.832390]  ? __pfx_kthread+0x10/0x10
[   15.832412]  ret_from_fork+0x116/0x1d0
[   15.832431]  ? __pfx_kthread+0x10/0x10
[   15.832452]  ret_from_fork_asm+0x1a/0x30
[   15.832483]  </TASK>
[   15.832494] 
[   15.839796] Allocated by task 283:
[   15.839986]  kasan_save_stack+0x45/0x70
[   15.840162]  kasan_save_track+0x18/0x40
[   15.840314]  kasan_save_alloc_info+0x3b/0x50
[   15.840529]  __kasan_kmalloc+0xb7/0xc0
[   15.840740]  __kmalloc_cache_noprof+0x189/0x420
[   15.840942]  kasan_atomics+0x95/0x310
[   15.841138]  kunit_try_run_case+0x1a5/0x480
[   15.841313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.841489]  kthread+0x337/0x6f0
[   15.841617]  ret_from_fork+0x116/0x1d0
[   15.841829]  ret_from_fork_asm+0x1a/0x30
[   15.842034] 
[   15.842129] The buggy address belongs to the object at ffff888102744f80
[   15.842129]  which belongs to the cache kmalloc-64 of size 64
[   15.842657] The buggy address is located 0 bytes to the right of
[   15.842657]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.843112] 
[   15.843206] The buggy address belongs to the physical page:
[   15.843455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.843719] flags: 0x200000000000000(node=0|zone=2)
[   15.843881] page_type: f5(slab)
[   15.844010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.844240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.844572] page dumped because: kasan: bad access detected
[   15.844850] 
[   15.844958] Memory state around the buggy address:
[   15.845180]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.845496]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.845795] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.846018]                                      ^
[   15.846171]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.846394]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.846737] ==================================================================
[   14.937893] ==================================================================
[   14.938313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.938997] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   14.939573] 
[   14.939801] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.939860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.940013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.940037] Call Trace:
[   14.940051]  <TASK>
[   14.940078]  dump_stack_lvl+0x73/0xb0
[   14.940112]  print_report+0xd1/0x610
[   14.940165]  ? __virt_addr_valid+0x1db/0x2d0
[   14.940188]  ? kasan_atomics_helper+0x565/0x5450
[   14.940210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.940233]  ? kasan_atomics_helper+0x565/0x5450
[   14.940255]  kasan_report+0x141/0x180
[   14.940277]  ? kasan_atomics_helper+0x565/0x5450
[   14.940304]  kasan_check_range+0x10c/0x1c0
[   14.940327]  __kasan_check_write+0x18/0x20
[   14.940347]  kasan_atomics_helper+0x565/0x5450
[   14.940370]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.940392]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.940416]  ? trace_hardirqs_on+0x37/0xe0
[   14.940439]  ? kasan_atomics+0x152/0x310
[   14.940466]  kasan_atomics+0x1dc/0x310
[   14.940489]  ? __pfx_kasan_atomics+0x10/0x10
[   14.940512]  ? __pfx_kasan_atomics+0x10/0x10
[   14.940538]  kunit_try_run_case+0x1a5/0x480
[   14.940561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.940585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.940608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.940631]  ? __kthread_parkme+0x82/0x180
[   14.940651]  ? preempt_count_sub+0x50/0x80
[   14.940674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.940699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.940722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.940745]  kthread+0x337/0x6f0
[   14.940764]  ? trace_preempt_on+0x20/0xc0
[   14.940786]  ? __pfx_kthread+0x10/0x10
[   14.940807]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.940828]  ? calculate_sigpending+0x7b/0xa0
[   14.940851]  ? __pfx_kthread+0x10/0x10
[   14.940873]  ret_from_fork+0x116/0x1d0
[   14.940891]  ? __pfx_kthread+0x10/0x10
[   14.940922]  ret_from_fork_asm+0x1a/0x30
[   14.940952]  </TASK>
[   14.940963] 
[   14.954308] Allocated by task 283:
[   14.954958]  kasan_save_stack+0x45/0x70
[   14.955259]  kasan_save_track+0x18/0x40
[   14.955656]  kasan_save_alloc_info+0x3b/0x50
[   14.955860]  __kasan_kmalloc+0xb7/0xc0
[   14.956042]  __kmalloc_cache_noprof+0x189/0x420
[   14.956231]  kasan_atomics+0x95/0x310
[   14.956754]  kunit_try_run_case+0x1a5/0x480
[   14.957063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.957483]  kthread+0x337/0x6f0
[   14.957915]  ret_from_fork+0x116/0x1d0
[   14.958177]  ret_from_fork_asm+0x1a/0x30
[   14.958598] 
[   14.958845] The buggy address belongs to the object at ffff888102744f80
[   14.958845]  which belongs to the cache kmalloc-64 of size 64
[   14.959354] The buggy address is located 0 bytes to the right of
[   14.959354]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   14.960313] 
[   14.960604] The buggy address belongs to the physical page:
[   14.961089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   14.961915] flags: 0x200000000000000(node=0|zone=2)
[   14.962325] page_type: f5(slab)
[   14.962636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.963154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.963401] page dumped because: kasan: bad access detected
[   14.963591] 
[   14.963666] Memory state around the buggy address:
[   14.963827]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.965014]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.965247] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.965948]                                      ^
[   14.966463]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.967028]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.967254] ==================================================================
[   15.970486] ==================================================================
[   15.970826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.971147] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.971477] 
[   15.971573] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.971615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.971627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.971649] Call Trace:
[   15.971681]  <TASK>
[   15.971695]  dump_stack_lvl+0x73/0xb0
[   15.971723]  print_report+0xd1/0x610
[   15.971745]  ? __virt_addr_valid+0x1db/0x2d0
[   15.971768]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.971790]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.971813]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.971835]  kasan_report+0x141/0x180
[   15.971857]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.971883]  kasan_check_range+0x10c/0x1c0
[   15.971915]  __kasan_check_write+0x18/0x20
[   15.971934]  kasan_atomics_helper+0x1e12/0x5450
[   15.971956]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.971979]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.972002]  ? trace_hardirqs_on+0x37/0xe0
[   15.972023]  ? kasan_atomics+0x152/0x310
[   15.972050]  kasan_atomics+0x1dc/0x310
[   15.972072]  ? __pfx_kasan_atomics+0x10/0x10
[   15.972096]  ? __pfx_kasan_atomics+0x10/0x10
[   15.972122]  kunit_try_run_case+0x1a5/0x480
[   15.972146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972168]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.972193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.972217]  ? __kthread_parkme+0x82/0x180
[   15.972237]  ? preempt_count_sub+0x50/0x80
[   15.972259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.972306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.972330]  kthread+0x337/0x6f0
[   15.972349]  ? trace_preempt_on+0x20/0xc0
[   15.972371]  ? __pfx_kthread+0x10/0x10
[   15.972391]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.972413]  ? calculate_sigpending+0x7b/0xa0
[   15.972435]  ? __pfx_kthread+0x10/0x10
[   15.972457]  ret_from_fork+0x116/0x1d0
[   15.972475]  ? __pfx_kthread+0x10/0x10
[   15.972495]  ret_from_fork_asm+0x1a/0x30
[   15.972526]  </TASK>
[   15.972537] 
[   15.979764] Allocated by task 283:
[   15.979953]  kasan_save_stack+0x45/0x70
[   15.980153]  kasan_save_track+0x18/0x40
[   15.980348]  kasan_save_alloc_info+0x3b/0x50
[   15.980541]  __kasan_kmalloc+0xb7/0xc0
[   15.980717]  __kmalloc_cache_noprof+0x189/0x420
[   15.980952]  kasan_atomics+0x95/0x310
[   15.981114]  kunit_try_run_case+0x1a5/0x480
[   15.981319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.981537]  kthread+0x337/0x6f0
[   15.981708]  ret_from_fork+0x116/0x1d0
[   15.981881]  ret_from_fork_asm+0x1a/0x30
[   15.982071] 
[   15.982169] The buggy address belongs to the object at ffff888102744f80
[   15.982169]  which belongs to the cache kmalloc-64 of size 64
[   15.982647] The buggy address is located 0 bytes to the right of
[   15.982647]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.983160] 
[   15.983232] The buggy address belongs to the physical page:
[   15.983404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.983643] flags: 0x200000000000000(node=0|zone=2)
[   15.983824] page_type: f5(slab)
[   15.985767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.986109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.986464] page dumped because: kasan: bad access detected
[   15.986846] 
[   15.987319] Memory state around the buggy address:
[   15.987521]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.987819]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.988283] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.988714]                                      ^
[   15.989028]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.989420]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.989828] ==================================================================
[   15.864473] ==================================================================
[   15.864855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.865161] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.865443] 
[   15.865535] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.865582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.865594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.865615] Call Trace:
[   15.865629]  <TASK>
[   15.865644]  dump_stack_lvl+0x73/0xb0
[   15.865693]  print_report+0xd1/0x610
[   15.865717]  ? __virt_addr_valid+0x1db/0x2d0
[   15.865739]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.865761]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.865783]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.865804]  kasan_report+0x141/0x180
[   15.865827]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.865854]  kasan_check_range+0x10c/0x1c0
[   15.865877]  __kasan_check_write+0x18/0x20
[   15.865896]  kasan_atomics_helper+0x1b22/0x5450
[   15.865927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.865948]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.865972]  ? trace_hardirqs_on+0x37/0xe0
[   15.865993]  ? kasan_atomics+0x152/0x310
[   15.866020]  kasan_atomics+0x1dc/0x310
[   15.866043]  ? __pfx_kasan_atomics+0x10/0x10
[   15.866065]  ? __pfx_kasan_atomics+0x10/0x10
[   15.866092]  kunit_try_run_case+0x1a5/0x480
[   15.866116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.866137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.866161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.866184]  ? __kthread_parkme+0x82/0x180
[   15.866205]  ? preempt_count_sub+0x50/0x80
[   15.866228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.866252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.866275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.866299]  kthread+0x337/0x6f0
[   15.866318]  ? trace_preempt_on+0x20/0xc0
[   15.866339]  ? __pfx_kthread+0x10/0x10
[   15.866361]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.866382]  ? calculate_sigpending+0x7b/0xa0
[   15.866405]  ? __pfx_kthread+0x10/0x10
[   15.866426]  ret_from_fork+0x116/0x1d0
[   15.866445]  ? __pfx_kthread+0x10/0x10
[   15.866466]  ret_from_fork_asm+0x1a/0x30
[   15.866496]  </TASK>
[   15.866506] 
[   15.873919] Allocated by task 283:
[   15.874097]  kasan_save_stack+0x45/0x70
[   15.874276]  kasan_save_track+0x18/0x40
[   15.874451]  kasan_save_alloc_info+0x3b/0x50
[   15.874635]  __kasan_kmalloc+0xb7/0xc0
[   15.874850]  __kmalloc_cache_noprof+0x189/0x420
[   15.875035]  kasan_atomics+0x95/0x310
[   15.875224]  kunit_try_run_case+0x1a5/0x480
[   15.875370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.875547]  kthread+0x337/0x6f0
[   15.875686]  ret_from_fork+0x116/0x1d0
[   15.875820]  ret_from_fork_asm+0x1a/0x30
[   15.875969] 
[   15.876041] The buggy address belongs to the object at ffff888102744f80
[   15.876041]  which belongs to the cache kmalloc-64 of size 64
[   15.876392] The buggy address is located 0 bytes to the right of
[   15.876392]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.876896] 
[   15.877012] The buggy address belongs to the physical page:
[   15.877260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.877609] flags: 0x200000000000000(node=0|zone=2)
[   15.877860] page_type: f5(slab)
[   15.878046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.878391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.878748] page dumped because: kasan: bad access detected
[   15.879009] 
[   15.879109] Memory state around the buggy address:
[   15.879332]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.879649]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.879961] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.880202]                                      ^
[   15.880358]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.880573]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.880814] ==================================================================
[   15.407881] ==================================================================
[   15.408547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.409197] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.409571] 
[   15.409711] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.409779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.409803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.409825] Call Trace:
[   15.409836]  <TASK>
[   15.409850]  dump_stack_lvl+0x73/0xb0
[   15.409878]  print_report+0xd1/0x610
[   15.409900]  ? __virt_addr_valid+0x1db/0x2d0
[   15.409933]  ? kasan_atomics_helper+0x1079/0x5450
[   15.409969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.409991]  ? kasan_atomics_helper+0x1079/0x5450
[   15.410014]  kasan_report+0x141/0x180
[   15.410036]  ? kasan_atomics_helper+0x1079/0x5450
[   15.410062]  kasan_check_range+0x10c/0x1c0
[   15.410086]  __kasan_check_write+0x18/0x20
[   15.410105]  kasan_atomics_helper+0x1079/0x5450
[   15.410127]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.410149]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.410174]  ? trace_hardirqs_on+0x37/0xe0
[   15.410195]  ? kasan_atomics+0x152/0x310
[   15.410221]  kasan_atomics+0x1dc/0x310
[   15.410244]  ? __pfx_kasan_atomics+0x10/0x10
[   15.410267]  ? __pfx_kasan_atomics+0x10/0x10
[   15.410293]  kunit_try_run_case+0x1a5/0x480
[   15.410317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.410340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.410364]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.410387]  ? __kthread_parkme+0x82/0x180
[   15.410407]  ? preempt_count_sub+0x50/0x80
[   15.410431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.410455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.410478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.410502]  kthread+0x337/0x6f0
[   15.410521]  ? trace_preempt_on+0x20/0xc0
[   15.410543]  ? __pfx_kthread+0x10/0x10
[   15.410564]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.410585]  ? calculate_sigpending+0x7b/0xa0
[   15.410608]  ? __pfx_kthread+0x10/0x10
[   15.410629]  ret_from_fork+0x116/0x1d0
[   15.410648]  ? __pfx_kthread+0x10/0x10
[   15.410668]  ret_from_fork_asm+0x1a/0x30
[   15.410709]  </TASK>
[   15.410720] 
[   15.418614] Allocated by task 283:
[   15.418918]  kasan_save_stack+0x45/0x70
[   15.419071]  kasan_save_track+0x18/0x40
[   15.419206]  kasan_save_alloc_info+0x3b/0x50
[   15.419356]  __kasan_kmalloc+0xb7/0xc0
[   15.419545]  __kmalloc_cache_noprof+0x189/0x420
[   15.419857]  kasan_atomics+0x95/0x310
[   15.420071]  kunit_try_run_case+0x1a5/0x480
[   15.420296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.420563]  kthread+0x337/0x6f0
[   15.420796]  ret_from_fork+0x116/0x1d0
[   15.420968]  ret_from_fork_asm+0x1a/0x30
[   15.421180] 
[   15.421290] The buggy address belongs to the object at ffff888102744f80
[   15.421290]  which belongs to the cache kmalloc-64 of size 64
[   15.421806] The buggy address is located 0 bytes to the right of
[   15.421806]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.422353] 
[   15.422445] The buggy address belongs to the physical page:
[   15.422687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.423062] flags: 0x200000000000000(node=0|zone=2)
[   15.423288] page_type: f5(slab)
[   15.423452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.423712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.423939] page dumped because: kasan: bad access detected
[   15.424104] 
[   15.424184] Memory state around the buggy address:
[   15.424375]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.424670]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.425999] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.426307]                                      ^
[   15.426464]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.426870]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.427256] ==================================================================
[   15.180548] ==================================================================
[   15.181038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.181668] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.182031] 
[   15.182145] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.182187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.182199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.182220] Call Trace:
[   15.182234]  <TASK>
[   15.182248]  dump_stack_lvl+0x73/0xb0
[   15.182276]  print_report+0xd1/0x610
[   15.182297]  ? __virt_addr_valid+0x1db/0x2d0
[   15.182319]  ? kasan_atomics_helper+0xac7/0x5450
[   15.182341]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.183305]  ? kasan_atomics_helper+0xac7/0x5450
[   15.183330]  kasan_report+0x141/0x180
[   15.183548]  ? kasan_atomics_helper+0xac7/0x5450
[   15.183580]  kasan_check_range+0x10c/0x1c0
[   15.183605]  __kasan_check_write+0x18/0x20
[   15.183625]  kasan_atomics_helper+0xac7/0x5450
[   15.183647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.183669]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.183706]  ? trace_hardirqs_on+0x37/0xe0
[   15.183728]  ? kasan_atomics+0x152/0x310
[   15.183754]  kasan_atomics+0x1dc/0x310
[   15.183777]  ? __pfx_kasan_atomics+0x10/0x10
[   15.183800]  ? __pfx_kasan_atomics+0x10/0x10
[   15.183827]  kunit_try_run_case+0x1a5/0x480
[   15.183851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.183873]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.183896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.183932]  ? __kthread_parkme+0x82/0x180
[   15.183952]  ? preempt_count_sub+0x50/0x80
[   15.183976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.183999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.184022]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.184045]  kthread+0x337/0x6f0
[   15.184065]  ? trace_preempt_on+0x20/0xc0
[   15.184087]  ? __pfx_kthread+0x10/0x10
[   15.184108]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.184129]  ? calculate_sigpending+0x7b/0xa0
[   15.184152]  ? __pfx_kthread+0x10/0x10
[   15.184173]  ret_from_fork+0x116/0x1d0
[   15.184194]  ? __pfx_kthread+0x10/0x10
[   15.184214]  ret_from_fork_asm+0x1a/0x30
[   15.184245]  </TASK>
[   15.184255] 
[   15.192806] Allocated by task 283:
[   15.193010]  kasan_save_stack+0x45/0x70
[   15.193188]  kasan_save_track+0x18/0x40
[   15.193443]  kasan_save_alloc_info+0x3b/0x50
[   15.193607]  __kasan_kmalloc+0xb7/0xc0
[   15.193891]  __kmalloc_cache_noprof+0x189/0x420
[   15.194125]  kasan_atomics+0x95/0x310
[   15.194280]  kunit_try_run_case+0x1a5/0x480
[   15.194658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.194920]  kthread+0x337/0x6f0
[   15.195045]  ret_from_fork+0x116/0x1d0
[   15.195182]  ret_from_fork_asm+0x1a/0x30
[   15.195322] 
[   15.195444] The buggy address belongs to the object at ffff888102744f80
[   15.195444]  which belongs to the cache kmalloc-64 of size 64
[   15.196024] The buggy address is located 0 bytes to the right of
[   15.196024]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.196824] 
[   15.196927] The buggy address belongs to the physical page:
[   15.197141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.197426] flags: 0x200000000000000(node=0|zone=2)
[   15.197708] page_type: f5(slab)
[   15.197879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.198199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.198496] page dumped because: kasan: bad access detected
[   15.198714] 
[   15.198790] Memory state around the buggy address:
[   15.198961]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.199187]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.199405] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.199619]                                      ^
[   15.199834]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.200407]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.200787] ==================================================================
[   15.140958] ==================================================================
[   15.141749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.142211] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.142718] 
[   15.143092] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.143245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.143261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.143286] Call Trace:
[   15.143303]  <TASK>
[   15.143320]  dump_stack_lvl+0x73/0xb0
[   15.143370]  print_report+0xd1/0x610
[   15.143395]  ? __virt_addr_valid+0x1db/0x2d0
[   15.143418]  ? kasan_atomics_helper+0x992/0x5450
[   15.143439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.143461]  ? kasan_atomics_helper+0x992/0x5450
[   15.143482]  kasan_report+0x141/0x180
[   15.143504]  ? kasan_atomics_helper+0x992/0x5450
[   15.143532]  kasan_check_range+0x10c/0x1c0
[   15.143555]  __kasan_check_write+0x18/0x20
[   15.143575]  kasan_atomics_helper+0x992/0x5450
[   15.143597]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.143619]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.143642]  ? trace_hardirqs_on+0x37/0xe0
[   15.143664]  ? kasan_atomics+0x152/0x310
[   15.143691]  kasan_atomics+0x1dc/0x310
[   15.143714]  ? __pfx_kasan_atomics+0x10/0x10
[   15.143737]  ? __pfx_kasan_atomics+0x10/0x10
[   15.143764]  kunit_try_run_case+0x1a5/0x480
[   15.143788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.143810]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.143834]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.143858]  ? __kthread_parkme+0x82/0x180
[   15.143878]  ? preempt_count_sub+0x50/0x80
[   15.143902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.143937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.143961]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.143985]  kthread+0x337/0x6f0
[   15.144005]  ? trace_preempt_on+0x20/0xc0
[   15.144026]  ? __pfx_kthread+0x10/0x10
[   15.144047]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.144068]  ? calculate_sigpending+0x7b/0xa0
[   15.144092]  ? __pfx_kthread+0x10/0x10
[   15.144113]  ret_from_fork+0x116/0x1d0
[   15.144132]  ? __pfx_kthread+0x10/0x10
[   15.144153]  ret_from_fork_asm+0x1a/0x30
[   15.144183]  </TASK>
[   15.144194] 
[   15.152440] Allocated by task 283:
[   15.152629]  kasan_save_stack+0x45/0x70
[   15.152875]  kasan_save_track+0x18/0x40
[   15.153024]  kasan_save_alloc_info+0x3b/0x50
[   15.153174]  __kasan_kmalloc+0xb7/0xc0
[   15.153307]  __kmalloc_cache_noprof+0x189/0x420
[   15.153463]  kasan_atomics+0x95/0x310
[   15.153597]  kunit_try_run_case+0x1a5/0x480
[   15.153882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.154424]  kthread+0x337/0x6f0
[   15.154641]  ret_from_fork+0x116/0x1d0
[   15.155026]  ret_from_fork_asm+0x1a/0x30
[   15.155230] 
[   15.155330] The buggy address belongs to the object at ffff888102744f80
[   15.155330]  which belongs to the cache kmalloc-64 of size 64
[   15.155924] The buggy address is located 0 bytes to the right of
[   15.155924]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.156492] 
[   15.156565] The buggy address belongs to the physical page:
[   15.156943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.157199] flags: 0x200000000000000(node=0|zone=2)
[   15.157536] page_type: f5(slab)
[   15.157718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.158023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.158304] page dumped because: kasan: bad access detected
[   15.158752] 
[   15.158856] Memory state around the buggy address:
[   15.159103]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.159393]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.159715] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.159950]                                      ^
[   15.160107]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.160323]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.160636] ==================================================================
[   15.690553] ==================================================================
[   15.691574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.691841] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.692171] 
[   15.692287] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.692331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.692345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.692367] Call Trace:
[   15.692382]  <TASK>
[   15.692397]  dump_stack_lvl+0x73/0xb0
[   15.692426]  print_report+0xd1/0x610
[   15.692449]  ? __virt_addr_valid+0x1db/0x2d0
[   15.692471]  ? kasan_atomics_helper+0x164f/0x5450
[   15.692541]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.692565]  ? kasan_atomics_helper+0x164f/0x5450
[   15.692587]  kasan_report+0x141/0x180
[   15.692623]  ? kasan_atomics_helper+0x164f/0x5450
[   15.692650]  kasan_check_range+0x10c/0x1c0
[   15.692674]  __kasan_check_write+0x18/0x20
[   15.692693]  kasan_atomics_helper+0x164f/0x5450
[   15.692716]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.692738]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.692761]  ? trace_hardirqs_on+0x37/0xe0
[   15.692783]  ? kasan_atomics+0x152/0x310
[   15.692810]  kasan_atomics+0x1dc/0x310
[   15.692832]  ? __pfx_kasan_atomics+0x10/0x10
[   15.692889]  ? __pfx_kasan_atomics+0x10/0x10
[   15.692976]  kunit_try_run_case+0x1a5/0x480
[   15.693001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.693036]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.693059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.693083]  ? __kthread_parkme+0x82/0x180
[   15.693103]  ? preempt_count_sub+0x50/0x80
[   15.693126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.693150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.693173]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.693197]  kthread+0x337/0x6f0
[   15.693217]  ? trace_preempt_on+0x20/0xc0
[   15.693238]  ? __pfx_kthread+0x10/0x10
[   15.693259]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.693281]  ? calculate_sigpending+0x7b/0xa0
[   15.693304]  ? __pfx_kthread+0x10/0x10
[   15.693325]  ret_from_fork+0x116/0x1d0
[   15.693344]  ? __pfx_kthread+0x10/0x10
[   15.693365]  ret_from_fork_asm+0x1a/0x30
[   15.693395]  </TASK>
[   15.693405] 
[   15.705071] Allocated by task 283:
[   15.705267]  kasan_save_stack+0x45/0x70
[   15.705416]  kasan_save_track+0x18/0x40
[   15.705554]  kasan_save_alloc_info+0x3b/0x50
[   15.705764]  __kasan_kmalloc+0xb7/0xc0
[   15.705974]  __kmalloc_cache_noprof+0x189/0x420
[   15.706339]  kasan_atomics+0x95/0x310
[   15.706530]  kunit_try_run_case+0x1a5/0x480
[   15.706763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.707002]  kthread+0x337/0x6f0
[   15.707142]  ret_from_fork+0x116/0x1d0
[   15.707277]  ret_from_fork_asm+0x1a/0x30
[   15.707476] 
[   15.707571] The buggy address belongs to the object at ffff888102744f80
[   15.707571]  which belongs to the cache kmalloc-64 of size 64
[   15.708218] The buggy address is located 0 bytes to the right of
[   15.708218]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.708690] 
[   15.708802] The buggy address belongs to the physical page:
[   15.709058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.709376] flags: 0x200000000000000(node=0|zone=2)
[   15.709540] page_type: f5(slab)
[   15.709667] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.709995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.710368] page dumped because: kasan: bad access detected
[   15.710600] 
[   15.710727] Memory state around the buggy address:
[   15.710913]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.711225]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.711454] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.711784]                                      ^
[   15.712062]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.712531]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.712841] ==================================================================
[   15.345986] ==================================================================
[   15.346322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.346945] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.347243] 
[   15.347342] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.347479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.347491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.347512] Call Trace:
[   15.347527]  <TASK>
[   15.347540]  dump_stack_lvl+0x73/0xb0
[   15.347568]  print_report+0xd1/0x610
[   15.347589]  ? __virt_addr_valid+0x1db/0x2d0
[   15.347612]  ? kasan_atomics_helper+0xf10/0x5450
[   15.347633]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.347656]  ? kasan_atomics_helper+0xf10/0x5450
[   15.347677]  kasan_report+0x141/0x180
[   15.347709]  ? kasan_atomics_helper+0xf10/0x5450
[   15.347735]  kasan_check_range+0x10c/0x1c0
[   15.347759]  __kasan_check_write+0x18/0x20
[   15.347778]  kasan_atomics_helper+0xf10/0x5450
[   15.347800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.347822]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.347845]  ? trace_hardirqs_on+0x37/0xe0
[   15.347868]  ? kasan_atomics+0x152/0x310
[   15.347895]  kasan_atomics+0x1dc/0x310
[   15.347928]  ? __pfx_kasan_atomics+0x10/0x10
[   15.347951]  ? __pfx_kasan_atomics+0x10/0x10
[   15.347978]  kunit_try_run_case+0x1a5/0x480
[   15.348002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.348025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.348048]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.348071]  ? __kthread_parkme+0x82/0x180
[   15.348091]  ? preempt_count_sub+0x50/0x80
[   15.348114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.348139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.348162]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.348186]  kthread+0x337/0x6f0
[   15.348206]  ? trace_preempt_on+0x20/0xc0
[   15.348228]  ? __pfx_kthread+0x10/0x10
[   15.348248]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.348269]  ? calculate_sigpending+0x7b/0xa0
[   15.348292]  ? __pfx_kthread+0x10/0x10
[   15.348314]  ret_from_fork+0x116/0x1d0
[   15.348333]  ? __pfx_kthread+0x10/0x10
[   15.348424]  ret_from_fork_asm+0x1a/0x30
[   15.348459]  </TASK>
[   15.348469] 
[   15.356591] Allocated by task 283:
[   15.356799]  kasan_save_stack+0x45/0x70
[   15.356993]  kasan_save_track+0x18/0x40
[   15.357166]  kasan_save_alloc_info+0x3b/0x50
[   15.357348]  __kasan_kmalloc+0xb7/0xc0
[   15.357519]  __kmalloc_cache_noprof+0x189/0x420
[   15.357674]  kasan_atomics+0x95/0x310
[   15.357807]  kunit_try_run_case+0x1a5/0x480
[   15.357983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.358239]  kthread+0x337/0x6f0
[   15.358404]  ret_from_fork+0x116/0x1d0
[   15.358588]  ret_from_fork_asm+0x1a/0x30
[   15.358787] 
[   15.359131] The buggy address belongs to the object at ffff888102744f80
[   15.359131]  which belongs to the cache kmalloc-64 of size 64
[   15.359750] The buggy address is located 0 bytes to the right of
[   15.359750]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.360245] 
[   15.360343] The buggy address belongs to the physical page:
[   15.360557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.360890] flags: 0x200000000000000(node=0|zone=2)
[   15.361098] page_type: f5(slab)
[   15.361218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.361449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.361675] page dumped because: kasan: bad access detected
[   15.361938] 
[   15.362033] Memory state around the buggy address:
[   15.362272]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.362598]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.363307] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.363735]                                      ^
[   15.363980]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.364199]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.364403] ==================================================================
[   15.629403] ==================================================================
[   15.629812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.630170] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.630503] 
[   15.630615] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.630658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.630670] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.630691] Call Trace:
[   15.630708]  <TASK>
[   15.630722]  dump_stack_lvl+0x73/0xb0
[   15.630749]  print_report+0xd1/0x610
[   15.630771]  ? __virt_addr_valid+0x1db/0x2d0
[   15.630794]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.630815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.630838]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.630861]  kasan_report+0x141/0x180
[   15.630883]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.630921]  __asan_report_store8_noabort+0x1b/0x30
[   15.630946]  kasan_atomics_helper+0x50d4/0x5450
[   15.630969]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.630991]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.631015]  ? trace_hardirqs_on+0x37/0xe0
[   15.631035]  ? kasan_atomics+0x152/0x310
[   15.631065]  kasan_atomics+0x1dc/0x310
[   15.631088]  ? __pfx_kasan_atomics+0x10/0x10
[   15.631111]  ? __pfx_kasan_atomics+0x10/0x10
[   15.631138]  kunit_try_run_case+0x1a5/0x480
[   15.631162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.631185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.631207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.631230]  ? __kthread_parkme+0x82/0x180
[   15.631251]  ? preempt_count_sub+0x50/0x80
[   15.631274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.631298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.631321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.631344]  kthread+0x337/0x6f0
[   15.631364]  ? trace_preempt_on+0x20/0xc0
[   15.631386]  ? __pfx_kthread+0x10/0x10
[   15.631406]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.631427]  ? calculate_sigpending+0x7b/0xa0
[   15.631450]  ? __pfx_kthread+0x10/0x10
[   15.631472]  ret_from_fork+0x116/0x1d0
[   15.631490]  ? __pfx_kthread+0x10/0x10
[   15.631511]  ret_from_fork_asm+0x1a/0x30
[   15.631541]  </TASK>
[   15.631552] 
[   15.638582] Allocated by task 283:
[   15.638725]  kasan_save_stack+0x45/0x70
[   15.638937]  kasan_save_track+0x18/0x40
[   15.639136]  kasan_save_alloc_info+0x3b/0x50
[   15.639384]  __kasan_kmalloc+0xb7/0xc0
[   15.639576]  __kmalloc_cache_noprof+0x189/0x420
[   15.639856]  kasan_atomics+0x95/0x310
[   15.640033]  kunit_try_run_case+0x1a5/0x480
[   15.640180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.640367]  kthread+0x337/0x6f0
[   15.640541]  ret_from_fork+0x116/0x1d0
[   15.640754]  ret_from_fork_asm+0x1a/0x30
[   15.641117] 
[   15.641216] The buggy address belongs to the object at ffff888102744f80
[   15.641216]  which belongs to the cache kmalloc-64 of size 64
[   15.642088] The buggy address is located 0 bytes to the right of
[   15.642088]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.642726] 
[   15.642840] The buggy address belongs to the physical page:
[   15.643091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.643340] flags: 0x200000000000000(node=0|zone=2)
[   15.643503] page_type: f5(slab)
[   15.643625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.645588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.646149] page dumped because: kasan: bad access detected
[   15.646479] 
[   15.646583] Memory state around the buggy address:
[   15.647009]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.647372]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.647792] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.648121]                                      ^
[   15.648315]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.648618]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.649254] ==================================================================
[   15.990955] ==================================================================
[   15.991290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.991935] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.992496] 
[   15.992617] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.992702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.992792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.992815] Call Trace:
[   15.992832]  <TASK>
[   15.992848]  dump_stack_lvl+0x73/0xb0
[   15.992879]  print_report+0xd1/0x610
[   15.992901]  ? __virt_addr_valid+0x1db/0x2d0
[   15.992935]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.992957]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.992980]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.993002]  kasan_report+0x141/0x180
[   15.993025]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.993055]  kasan_check_range+0x10c/0x1c0
[   15.993079]  __kasan_check_write+0x18/0x20
[   15.993099]  kasan_atomics_helper+0x1eaa/0x5450
[   15.993121]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.993143]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.993168]  ? trace_hardirqs_on+0x37/0xe0
[   15.993189]  ? kasan_atomics+0x152/0x310
[   15.993217]  kasan_atomics+0x1dc/0x310
[   15.993240]  ? __pfx_kasan_atomics+0x10/0x10
[   15.993263]  ? __pfx_kasan_atomics+0x10/0x10
[   15.993289]  kunit_try_run_case+0x1a5/0x480
[   15.993314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.993337]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.993362]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.993385]  ? __kthread_parkme+0x82/0x180
[   15.993405]  ? preempt_count_sub+0x50/0x80
[   15.993429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.993453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.993476]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.993499]  kthread+0x337/0x6f0
[   15.993519]  ? trace_preempt_on+0x20/0xc0
[   15.993540]  ? __pfx_kthread+0x10/0x10
[   15.993561]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.993582]  ? calculate_sigpending+0x7b/0xa0
[   15.993606]  ? __pfx_kthread+0x10/0x10
[   15.993627]  ret_from_fork+0x116/0x1d0
[   15.993645]  ? __pfx_kthread+0x10/0x10
[   15.993692]  ret_from_fork_asm+0x1a/0x30
[   15.993724]  </TASK>
[   15.993735] 
[   16.004255] Allocated by task 283:
[   16.004508]  kasan_save_stack+0x45/0x70
[   16.004973]  kasan_save_track+0x18/0x40
[   16.005182]  kasan_save_alloc_info+0x3b/0x50
[   16.005385]  __kasan_kmalloc+0xb7/0xc0
[   16.005576]  __kmalloc_cache_noprof+0x189/0x420
[   16.006067]  kasan_atomics+0x95/0x310
[   16.006362]  kunit_try_run_case+0x1a5/0x480
[   16.006605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.007024]  kthread+0x337/0x6f0
[   16.007220]  ret_from_fork+0x116/0x1d0
[   16.007515]  ret_from_fork_asm+0x1a/0x30
[   16.007767] 
[   16.007872] The buggy address belongs to the object at ffff888102744f80
[   16.007872]  which belongs to the cache kmalloc-64 of size 64
[   16.008685] The buggy address is located 0 bytes to the right of
[   16.008685]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.009313] 
[   16.009417] The buggy address belongs to the physical page:
[   16.009834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.010293] flags: 0x200000000000000(node=0|zone=2)
[   16.010530] page_type: f5(slab)
[   16.010864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.011310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.011747] page dumped because: kasan: bad access detected
[   16.011977] 
[   16.012079] Memory state around the buggy address:
[   16.012558]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.012881]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.013300] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.013639]                                      ^
[   16.014031]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.014340]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.014791] ==================================================================
[   14.757134] ==================================================================
[   14.758016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.758344] Read of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   14.759118] 
[   14.759421] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.759481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.759494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.759515] Call Trace:
[   14.759527]  <TASK>
[   14.759544]  dump_stack_lvl+0x73/0xb0
[   14.759574]  print_report+0xd1/0x610
[   14.759595]  ? __virt_addr_valid+0x1db/0x2d0
[   14.759618]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.759638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.759659]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.759766]  kasan_report+0x141/0x180
[   14.759790]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.759816]  __asan_report_load4_noabort+0x18/0x20
[   14.759839]  kasan_atomics_helper+0x4bbc/0x5450
[   14.759860]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.759882]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.759918]  ? trace_hardirqs_on+0x37/0xe0
[   14.759940]  ? kasan_atomics+0x152/0x310
[   14.759966]  kasan_atomics+0x1dc/0x310
[   14.759988]  ? __pfx_kasan_atomics+0x10/0x10
[   14.760012]  ? __pfx_kasan_atomics+0x10/0x10
[   14.760038]  kunit_try_run_case+0x1a5/0x480
[   14.760062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.760083]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.760105]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.760128]  ? __kthread_parkme+0x82/0x180
[   14.760147]  ? preempt_count_sub+0x50/0x80
[   14.760170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.760192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.760214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.760237]  kthread+0x337/0x6f0
[   14.760256]  ? trace_preempt_on+0x20/0xc0
[   14.760276]  ? __pfx_kthread+0x10/0x10
[   14.760296]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.760316]  ? calculate_sigpending+0x7b/0xa0
[   14.760339]  ? __pfx_kthread+0x10/0x10
[   14.760377]  ret_from_fork+0x116/0x1d0
[   14.760395]  ? __pfx_kthread+0x10/0x10
[   14.760415]  ret_from_fork_asm+0x1a/0x30
[   14.760445]  </TASK>
[   14.760455] 
[   14.773063] Allocated by task 283:
[   14.773246]  kasan_save_stack+0x45/0x70
[   14.773880]  kasan_save_track+0x18/0x40
[   14.774094]  kasan_save_alloc_info+0x3b/0x50
[   14.774441]  __kasan_kmalloc+0xb7/0xc0
[   14.774804]  __kmalloc_cache_noprof+0x189/0x420
[   14.775163]  kasan_atomics+0x95/0x310
[   14.775383]  kunit_try_run_case+0x1a5/0x480
[   14.775850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.776200]  kthread+0x337/0x6f0
[   14.776801]  ret_from_fork+0x116/0x1d0
[   14.777012]  ret_from_fork_asm+0x1a/0x30
[   14.777282] 
[   14.777363] The buggy address belongs to the object at ffff888102744f80
[   14.777363]  which belongs to the cache kmalloc-64 of size 64
[   14.778277] The buggy address is located 0 bytes to the right of
[   14.778277]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   14.779177] 
[   14.779466] The buggy address belongs to the physical page:
[   14.779714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   14.780082] flags: 0x200000000000000(node=0|zone=2)
[   14.780298] page_type: f5(slab)
[   14.780503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.781416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.781933] page dumped because: kasan: bad access detected
[   14.782291] 
[   14.782478] Memory state around the buggy address:
[   14.782903]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.783341]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.783833] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.784263]                                      ^
[   14.784874]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.785226]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.785639] ==================================================================
[   15.364727] ==================================================================
[   15.365006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.365373] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.365971] 
[   15.366085] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.366128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.366140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.366164] Call Trace:
[   15.366320]  <TASK>
[   15.366348]  dump_stack_lvl+0x73/0xb0
[   15.366378]  print_report+0xd1/0x610
[   15.366400]  ? __virt_addr_valid+0x1db/0x2d0
[   15.366421]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.366442]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.366465]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.366486]  kasan_report+0x141/0x180
[   15.366510]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.366538]  kasan_check_range+0x10c/0x1c0
[   15.366563]  __kasan_check_write+0x18/0x20
[   15.366583]  kasan_atomics_helper+0xfa9/0x5450
[   15.366606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.366629]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.366652]  ? trace_hardirqs_on+0x37/0xe0
[   15.366675]  ? kasan_atomics+0x152/0x310
[   15.366722]  kasan_atomics+0x1dc/0x310
[   15.366745]  ? __pfx_kasan_atomics+0x10/0x10
[   15.366769]  ? __pfx_kasan_atomics+0x10/0x10
[   15.366797]  kunit_try_run_case+0x1a5/0x480
[   15.366821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.366843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.366867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.366890]  ? __kthread_parkme+0x82/0x180
[   15.366921]  ? preempt_count_sub+0x50/0x80
[   15.366944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.366968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.366991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.367015]  kthread+0x337/0x6f0
[   15.367034]  ? trace_preempt_on+0x20/0xc0
[   15.367063]  ? __pfx_kthread+0x10/0x10
[   15.367084]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.367105]  ? calculate_sigpending+0x7b/0xa0
[   15.367128]  ? __pfx_kthread+0x10/0x10
[   15.367150]  ret_from_fork+0x116/0x1d0
[   15.367168]  ? __pfx_kthread+0x10/0x10
[   15.367189]  ret_from_fork_asm+0x1a/0x30
[   15.367220]  </TASK>
[   15.367230] 
[   15.376619] Allocated by task 283:
[   15.376799]  kasan_save_stack+0x45/0x70
[   15.377007]  kasan_save_track+0x18/0x40
[   15.377205]  kasan_save_alloc_info+0x3b/0x50
[   15.377384]  __kasan_kmalloc+0xb7/0xc0
[   15.377665]  __kmalloc_cache_noprof+0x189/0x420
[   15.377879]  kasan_atomics+0x95/0x310
[   15.378160]  kunit_try_run_case+0x1a5/0x480
[   15.378338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.378563]  kthread+0x337/0x6f0
[   15.378748]  ret_from_fork+0x116/0x1d0
[   15.378957]  ret_from_fork_asm+0x1a/0x30
[   15.379154] 
[   15.379251] The buggy address belongs to the object at ffff888102744f80
[   15.379251]  which belongs to the cache kmalloc-64 of size 64
[   15.379851] The buggy address is located 0 bytes to the right of
[   15.379851]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.380691] 
[   15.380802] The buggy address belongs to the physical page:
[   15.381183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.381585] flags: 0x200000000000000(node=0|zone=2)
[   15.381994] page_type: f5(slab)
[   15.382132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.382580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.382949] page dumped because: kasan: bad access detected
[   15.383223] 
[   15.383335] Memory state around the buggy address:
[   15.383575]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.383925]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.384247] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.384558]                                      ^
[   15.384780]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.385105]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.385415] ==================================================================
[   16.157712] ==================================================================
[   16.158069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.158474] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   16.158980] 
[   16.159079] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.159121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.159134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.159154] Call Trace:
[   16.159169]  <TASK>
[   16.159184]  dump_stack_lvl+0x73/0xb0
[   16.159212]  print_report+0xd1/0x610
[   16.159234]  ? __virt_addr_valid+0x1db/0x2d0
[   16.159256]  ? kasan_atomics_helper+0x218a/0x5450
[   16.159304]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.159327]  ? kasan_atomics_helper+0x218a/0x5450
[   16.159349]  kasan_report+0x141/0x180
[   16.159371]  ? kasan_atomics_helper+0x218a/0x5450
[   16.159414]  kasan_check_range+0x10c/0x1c0
[   16.159438]  __kasan_check_write+0x18/0x20
[   16.159458]  kasan_atomics_helper+0x218a/0x5450
[   16.159482]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.159504]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.159528]  ? trace_hardirqs_on+0x37/0xe0
[   16.159550]  ? kasan_atomics+0x152/0x310
[   16.159576]  kasan_atomics+0x1dc/0x310
[   16.159600]  ? __pfx_kasan_atomics+0x10/0x10
[   16.159623]  ? __pfx_kasan_atomics+0x10/0x10
[   16.159650]  kunit_try_run_case+0x1a5/0x480
[   16.159674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.159709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.159733]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.159757]  ? __kthread_parkme+0x82/0x180
[   16.159796]  ? preempt_count_sub+0x50/0x80
[   16.159821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.159845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.159868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.159892]  kthread+0x337/0x6f0
[   16.159923]  ? trace_preempt_on+0x20/0xc0
[   16.159945]  ? __pfx_kthread+0x10/0x10
[   16.159966]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.160006]  ? calculate_sigpending+0x7b/0xa0
[   16.160030]  ? __pfx_kthread+0x10/0x10
[   16.160052]  ret_from_fork+0x116/0x1d0
[   16.160071]  ? __pfx_kthread+0x10/0x10
[   16.160091]  ret_from_fork_asm+0x1a/0x30
[   16.160123]  </TASK>
[   16.160133] 
[   16.167863] Allocated by task 283:
[   16.168051]  kasan_save_stack+0x45/0x70
[   16.168249]  kasan_save_track+0x18/0x40
[   16.168520]  kasan_save_alloc_info+0x3b/0x50
[   16.168799]  __kasan_kmalloc+0xb7/0xc0
[   16.168971]  __kmalloc_cache_noprof+0x189/0x420
[   16.169121]  kasan_atomics+0x95/0x310
[   16.169251]  kunit_try_run_case+0x1a5/0x480
[   16.169458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.169720]  kthread+0x337/0x6f0
[   16.169924]  ret_from_fork+0x116/0x1d0
[   16.170142]  ret_from_fork_asm+0x1a/0x30
[   16.170351] 
[   16.170444] The buggy address belongs to the object at ffff888102744f80
[   16.170444]  which belongs to the cache kmalloc-64 of size 64
[   16.170895] The buggy address is located 0 bytes to the right of
[   16.170895]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   16.171399] 
[   16.171484] The buggy address belongs to the physical page:
[   16.171734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   16.172101] flags: 0x200000000000000(node=0|zone=2)
[   16.172370] page_type: f5(slab)
[   16.172556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.172939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.173271] page dumped because: kasan: bad access detected
[   16.173529] 
[   16.173723] Memory state around the buggy address:
[   16.173957]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.174273]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.174589] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.174899]                                      ^
[   16.175131]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.175405]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.175620] ==================================================================
[   15.933453] ==================================================================
[   15.934117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.934789] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.935373] 
[   15.935462] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.935505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.935517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.935539] Call Trace:
[   15.935552]  <TASK>
[   15.935567]  dump_stack_lvl+0x73/0xb0
[   15.935595]  print_report+0xd1/0x610
[   15.935616]  ? __virt_addr_valid+0x1db/0x2d0
[   15.935639]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.935659]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.935709]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.935731]  kasan_report+0x141/0x180
[   15.935753]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.935780]  kasan_check_range+0x10c/0x1c0
[   15.935804]  __kasan_check_write+0x18/0x20
[   15.935823]  kasan_atomics_helper+0x1ce1/0x5450
[   15.935845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.935867]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.935891]  ? trace_hardirqs_on+0x37/0xe0
[   15.935923]  ? kasan_atomics+0x152/0x310
[   15.935952]  kasan_atomics+0x1dc/0x310
[   15.935976]  ? __pfx_kasan_atomics+0x10/0x10
[   15.935998]  ? __pfx_kasan_atomics+0x10/0x10
[   15.936025]  kunit_try_run_case+0x1a5/0x480
[   15.936049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.936072]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.936095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.936118]  ? __kthread_parkme+0x82/0x180
[   15.936137]  ? preempt_count_sub+0x50/0x80
[   15.936161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.936184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.936207]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.936230]  kthread+0x337/0x6f0
[   15.936250]  ? trace_preempt_on+0x20/0xc0
[   15.936271]  ? __pfx_kthread+0x10/0x10
[   15.936291]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.936312]  ? calculate_sigpending+0x7b/0xa0
[   15.936336]  ? __pfx_kthread+0x10/0x10
[   15.936357]  ret_from_fork+0x116/0x1d0
[   15.936376]  ? __pfx_kthread+0x10/0x10
[   15.936396]  ret_from_fork_asm+0x1a/0x30
[   15.936427]  </TASK>
[   15.936437] 
[   15.945285] Allocated by task 283:
[   15.945463]  kasan_save_stack+0x45/0x70
[   15.945682]  kasan_save_track+0x18/0x40
[   15.945876]  kasan_save_alloc_info+0x3b/0x50
[   15.946048]  __kasan_kmalloc+0xb7/0xc0
[   15.946233]  __kmalloc_cache_noprof+0x189/0x420
[   15.946416]  kasan_atomics+0x95/0x310
[   15.946599]  kunit_try_run_case+0x1a5/0x480
[   15.946772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.947001]  kthread+0x337/0x6f0
[   15.947175]  ret_from_fork+0x116/0x1d0
[   15.947361]  ret_from_fork_asm+0x1a/0x30
[   15.947561] 
[   15.947655] The buggy address belongs to the object at ffff888102744f80
[   15.947655]  which belongs to the cache kmalloc-64 of size 64
[   15.948150] The buggy address is located 0 bytes to the right of
[   15.948150]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.948644] 
[   15.948755] The buggy address belongs to the physical page:
[   15.948986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.949300] flags: 0x200000000000000(node=0|zone=2)
[   15.949499] page_type: f5(slab)
[   15.949660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.949968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.950275] page dumped because: kasan: bad access detected
[   15.950516] 
[   15.950595] Memory state around the buggy address:
[   15.950789]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.951086]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.951394] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.951656]                                      ^
[   15.951829]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.952054]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.952266] ==================================================================
[   15.003211] ==================================================================
[   15.003530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.003994] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.004253] 
[   15.004364] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.004407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.004419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.004440] Call Trace:
[   15.004456]  <TASK>
[   15.004471]  dump_stack_lvl+0x73/0xb0
[   15.004499]  print_report+0xd1/0x610
[   15.004522]  ? __virt_addr_valid+0x1db/0x2d0
[   15.004544]  ? kasan_atomics_helper+0x697/0x5450
[   15.004565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.004587]  ? kasan_atomics_helper+0x697/0x5450
[   15.004609]  kasan_report+0x141/0x180
[   15.004631]  ? kasan_atomics_helper+0x697/0x5450
[   15.004657]  kasan_check_range+0x10c/0x1c0
[   15.004681]  __kasan_check_write+0x18/0x20
[   15.004700]  kasan_atomics_helper+0x697/0x5450
[   15.004723]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.004745]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.004769]  ? trace_hardirqs_on+0x37/0xe0
[   15.004791]  ? kasan_atomics+0x152/0x310
[   15.004817]  kasan_atomics+0x1dc/0x310
[   15.004840]  ? __pfx_kasan_atomics+0x10/0x10
[   15.004863]  ? __pfx_kasan_atomics+0x10/0x10
[   15.004889]  kunit_try_run_case+0x1a5/0x480
[   15.004929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.004952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.004974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.004998]  ? __kthread_parkme+0x82/0x180
[   15.005018]  ? preempt_count_sub+0x50/0x80
[   15.005042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.005066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.005088]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.005111]  kthread+0x337/0x6f0
[   15.005132]  ? trace_preempt_on+0x20/0xc0
[   15.005153]  ? __pfx_kthread+0x10/0x10
[   15.005173]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.005195]  ? calculate_sigpending+0x7b/0xa0
[   15.005218]  ? __pfx_kthread+0x10/0x10
[   15.005239]  ret_from_fork+0x116/0x1d0
[   15.005257]  ? __pfx_kthread+0x10/0x10
[   15.005278]  ret_from_fork_asm+0x1a/0x30
[   15.005308]  </TASK>
[   15.005319] 
[   15.013429] Allocated by task 283:
[   15.013561]  kasan_save_stack+0x45/0x70
[   15.013773]  kasan_save_track+0x18/0x40
[   15.013985]  kasan_save_alloc_info+0x3b/0x50
[   15.014197]  __kasan_kmalloc+0xb7/0xc0
[   15.014383]  __kmalloc_cache_noprof+0x189/0x420
[   15.014756]  kasan_atomics+0x95/0x310
[   15.014954]  kunit_try_run_case+0x1a5/0x480
[   15.015118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.015295]  kthread+0x337/0x6f0
[   15.015416]  ret_from_fork+0x116/0x1d0
[   15.015549]  ret_from_fork_asm+0x1a/0x30
[   15.015689] 
[   15.015788] The buggy address belongs to the object at ffff888102744f80
[   15.015788]  which belongs to the cache kmalloc-64 of size 64
[   15.016325] The buggy address is located 0 bytes to the right of
[   15.016325]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.017322] 
[   15.017425] The buggy address belongs to the physical page:
[   15.017717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.018006] flags: 0x200000000000000(node=0|zone=2)
[   15.018171] page_type: f5(slab)
[   15.018290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.018784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.019387] page dumped because: kasan: bad access detected
[   15.019568] 
[   15.019638] Memory state around the buggy address:
[   15.019795]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.020337]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.020670] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.021044]                                      ^
[   15.021239]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.021537]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.021858] ==================================================================
[   14.786154] ==================================================================
[   14.786626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.786987] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   14.787219] 
[   14.787487] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.787533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.787544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.787564] Call Trace:
[   14.787579]  <TASK>
[   14.787592]  dump_stack_lvl+0x73/0xb0
[   14.787619]  print_report+0xd1/0x610
[   14.787641]  ? __virt_addr_valid+0x1db/0x2d0
[   14.787661]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.787696]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.787717]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.787737]  kasan_report+0x141/0x180
[   14.787759]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.787784]  __asan_report_store4_noabort+0x1b/0x30
[   14.787807]  kasan_atomics_helper+0x4ba2/0x5450
[   14.787828]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.787849]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.787871]  ? trace_hardirqs_on+0x37/0xe0
[   14.787892]  ? kasan_atomics+0x152/0x310
[   14.787929]  kasan_atomics+0x1dc/0x310
[   14.787951]  ? __pfx_kasan_atomics+0x10/0x10
[   14.787973]  ? __pfx_kasan_atomics+0x10/0x10
[   14.787999]  kunit_try_run_case+0x1a5/0x480
[   14.788021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.788042]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.788064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.788086]  ? __kthread_parkme+0x82/0x180
[   14.788105]  ? preempt_count_sub+0x50/0x80
[   14.788127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.788150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.788172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.788195]  kthread+0x337/0x6f0
[   14.788213]  ? trace_preempt_on+0x20/0xc0
[   14.788234]  ? __pfx_kthread+0x10/0x10
[   14.788253]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.788274]  ? calculate_sigpending+0x7b/0xa0
[   14.788296]  ? __pfx_kthread+0x10/0x10
[   14.788315]  ret_from_fork+0x116/0x1d0
[   14.788333]  ? __pfx_kthread+0x10/0x10
[   14.788418]  ret_from_fork_asm+0x1a/0x30
[   14.788451]  </TASK>
[   14.788460] 
[   14.796088] Allocated by task 283:
[   14.796233]  kasan_save_stack+0x45/0x70
[   14.796435]  kasan_save_track+0x18/0x40
[   14.796615]  kasan_save_alloc_info+0x3b/0x50
[   14.796854]  __kasan_kmalloc+0xb7/0xc0
[   14.796998]  __kmalloc_cache_noprof+0x189/0x420
[   14.797153]  kasan_atomics+0x95/0x310
[   14.797286]  kunit_try_run_case+0x1a5/0x480
[   14.797430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.797663]  kthread+0x337/0x6f0
[   14.797829]  ret_from_fork+0x116/0x1d0
[   14.798025]  ret_from_fork_asm+0x1a/0x30
[   14.798221] 
[   14.798313] The buggy address belongs to the object at ffff888102744f80
[   14.798313]  which belongs to the cache kmalloc-64 of size 64
[   14.799132] The buggy address is located 0 bytes to the right of
[   14.799132]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   14.799708] 
[   14.799807] The buggy address belongs to the physical page:
[   14.800011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   14.800317] flags: 0x200000000000000(node=0|zone=2)
[   14.800607] page_type: f5(slab)
[   14.800880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.801208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.801606] page dumped because: kasan: bad access detected
[   14.801883] 
[   14.801996] Memory state around the buggy address:
[   14.802207]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.802461]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.802676] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.802888]                                      ^
[   14.803546]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.803988]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.804273] ==================================================================
[   15.672386] ==================================================================
[   15.672754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.673037] Write of size 8 at addr ffff888102744fb0 by task kunit_try_catch/283
[   15.673384] 
[   15.673489] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.673530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.673543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.673563] Call Trace:
[   15.673576]  <TASK>
[   15.673591]  dump_stack_lvl+0x73/0xb0
[   15.673620]  print_report+0xd1/0x610
[   15.673642]  ? __virt_addr_valid+0x1db/0x2d0
[   15.673664]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.673686]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.673708]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.673730]  kasan_report+0x141/0x180
[   15.673753]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.673780]  kasan_check_range+0x10c/0x1c0
[   15.673804]  __kasan_check_write+0x18/0x20
[   15.673823]  kasan_atomics_helper+0x15b6/0x5450
[   15.673845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.673867]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.673891]  ? trace_hardirqs_on+0x37/0xe0
[   15.673923]  ? kasan_atomics+0x152/0x310
[   15.673951]  kasan_atomics+0x1dc/0x310
[   15.673973]  ? __pfx_kasan_atomics+0x10/0x10
[   15.673997]  ? __pfx_kasan_atomics+0x10/0x10
[   15.674023]  kunit_try_run_case+0x1a5/0x480
[   15.674047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.674070]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.674094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.674117]  ? __kthread_parkme+0x82/0x180
[   15.674137]  ? preempt_count_sub+0x50/0x80
[   15.674161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.674185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.674208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.674232]  kthread+0x337/0x6f0
[   15.674252]  ? trace_preempt_on+0x20/0xc0
[   15.674274]  ? __pfx_kthread+0x10/0x10
[   15.674294]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.674316]  ? calculate_sigpending+0x7b/0xa0
[   15.674340]  ? __pfx_kthread+0x10/0x10
[   15.674361]  ret_from_fork+0x116/0x1d0
[   15.674380]  ? __pfx_kthread+0x10/0x10
[   15.674400]  ret_from_fork_asm+0x1a/0x30
[   15.674431]  </TASK>
[   15.674442] 
[   15.681755] Allocated by task 283:
[   15.681900]  kasan_save_stack+0x45/0x70
[   15.682081]  kasan_save_track+0x18/0x40
[   15.682224]  kasan_save_alloc_info+0x3b/0x50
[   15.682375]  __kasan_kmalloc+0xb7/0xc0
[   15.682527]  __kmalloc_cache_noprof+0x189/0x420
[   15.682744]  kasan_atomics+0x95/0x310
[   15.683079]  kunit_try_run_case+0x1a5/0x480
[   15.683287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.683539]  kthread+0x337/0x6f0
[   15.683712]  ret_from_fork+0x116/0x1d0
[   15.683847]  ret_from_fork_asm+0x1a/0x30
[   15.683997] 
[   15.684069] The buggy address belongs to the object at ffff888102744f80
[   15.684069]  which belongs to the cache kmalloc-64 of size 64
[   15.684478] The buggy address is located 0 bytes to the right of
[   15.684478]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   15.685019] 
[   15.685113] The buggy address belongs to the physical page:
[   15.685369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   15.685664] flags: 0x200000000000000(node=0|zone=2)
[   15.685898] page_type: f5(slab)
[   15.686078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.686382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.686608] page dumped because: kasan: bad access detected
[   15.686840] 
[   15.686942] Memory state around the buggy address:
[   15.687170]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.687498]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.687826] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.688131]                                      ^
[   15.688328]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.688621]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.689919] ==================================================================
[   14.823559] ==================================================================
[   14.823879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.824194] Write of size 4 at addr ffff888102744fb0 by task kunit_try_catch/283
[   14.824642] 
[   14.824797] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.824840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.824853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.824873] Call Trace:
[   14.824887]  <TASK>
[   14.824902]  dump_stack_lvl+0x73/0xb0
[   14.824944]  print_report+0xd1/0x610
[   14.824967]  ? __virt_addr_valid+0x1db/0x2d0
[   14.824988]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.825009]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.825032]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.825053]  kasan_report+0x141/0x180
[   14.825075]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.825103]  __asan_report_store4_noabort+0x1b/0x30
[   14.825127]  kasan_atomics_helper+0x4b6e/0x5450
[   14.825150]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.825173]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.825197]  ? trace_hardirqs_on+0x37/0xe0
[   14.825219]  ? kasan_atomics+0x152/0x310
[   14.825246]  kasan_atomics+0x1dc/0x310
[   14.825269]  ? __pfx_kasan_atomics+0x10/0x10
[   14.825292]  ? __pfx_kasan_atomics+0x10/0x10
[   14.825319]  kunit_try_run_case+0x1a5/0x480
[   14.825343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.825378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.825402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.825426]  ? __kthread_parkme+0x82/0x180
[   14.825446]  ? preempt_count_sub+0x50/0x80
[   14.825470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.825494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.825517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.825540]  kthread+0x337/0x6f0
[   14.825559]  ? trace_preempt_on+0x20/0xc0
[   14.825581]  ? __pfx_kthread+0x10/0x10
[   14.825602]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.825624]  ? calculate_sigpending+0x7b/0xa0
[   14.825647]  ? __pfx_kthread+0x10/0x10
[   14.825669]  ret_from_fork+0x116/0x1d0
[   14.825740]  ? __pfx_kthread+0x10/0x10
[   14.825764]  ret_from_fork_asm+0x1a/0x30
[   14.825795]  </TASK>
[   14.825806] 
[   14.833590] Allocated by task 283:
[   14.833755]  kasan_save_stack+0x45/0x70
[   14.833966]  kasan_save_track+0x18/0x40
[   14.834158]  kasan_save_alloc_info+0x3b/0x50
[   14.834369]  __kasan_kmalloc+0xb7/0xc0
[   14.834558]  __kmalloc_cache_noprof+0x189/0x420
[   14.835077]  kasan_atomics+0x95/0x310
[   14.835286]  kunit_try_run_case+0x1a5/0x480
[   14.835739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.836017]  kthread+0x337/0x6f0
[   14.836190]  ret_from_fork+0x116/0x1d0
[   14.836432]  ret_from_fork_asm+0x1a/0x30
[   14.836641] 
[   14.836783] The buggy address belongs to the object at ffff888102744f80
[   14.836783]  which belongs to the cache kmalloc-64 of size 64
[   14.837229] The buggy address is located 0 bytes to the right of
[   14.837229]  allocated 48-byte region [ffff888102744f80, ffff888102744fb0)
[   14.838048] 
[   14.838139] The buggy address belongs to the physical page:
[   14.838312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102744
[   14.838546] flags: 0x200000000000000(node=0|zone=2)
[   14.839118] page_type: f5(slab)
[   14.839289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.839673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.839931] page dumped because: kasan: bad access detected
[   14.840099] 
[   14.840167] Memory state around the buggy address:
[   14.840318]  ffff888102744e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.840529]  ffff888102744f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.840774] >ffff888102744f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.841094]                                      ^
[   14.841320]  ffff888102745000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.841646]  ffff888102745080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.842064] ==================================================================