Hay
Date
July 11, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.497669] ==================================================================
[   19.497835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.499306] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.499381] 
[   19.499416] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.499977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.500006] Hardware name: linux,dummy-virt (DT)
[   19.500060] Call trace:
[   19.500086]  show_stack+0x20/0x38 (C)
[   19.500237]  dump_stack_lvl+0x8c/0xd0
[   19.500670]  print_report+0x118/0x608
[   19.501271]  kasan_report+0xdc/0x128
[   19.501891]  kasan_check_range+0x100/0x1a8
[   19.502793]  __kasan_check_write+0x20/0x30
[   19.502970]  kasan_atomics_helper+0x11f8/0x4858
[   19.503020]  kasan_atomics+0x198/0x2e0
[   19.503616]  kunit_try_run_case+0x170/0x3f0
[   19.505329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.505416]  kthread+0x328/0x630
[   19.505460]  ret_from_fork+0x10/0x20
[   19.505511] 
[   19.505531] Allocated by task 266:
[   19.505560]  kasan_save_stack+0x3c/0x68
[   19.505612]  kasan_save_track+0x20/0x40
[   19.505651]  kasan_save_alloc_info+0x40/0x58
[   19.505693]  __kasan_kmalloc+0xd4/0xd8
[   19.505731]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.505772]  kasan_atomics+0xb8/0x2e0
[   19.505809]  kunit_try_run_case+0x170/0x3f0
[   19.505862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.507490]  kthread+0x328/0x630
[   19.507530]  ret_from_fork+0x10/0x20
[   19.507567] 
[   19.507591] The buggy address belongs to the object at fff00000c5906f00
[   19.507591]  which belongs to the cache kmalloc-64 of size 64
[   19.507652] The buggy address is located 0 bytes to the right of
[   19.507652]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.507725] 
[   19.507748] The buggy address belongs to the physical page:
[   19.507781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.507835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.507906] page_type: f5(slab)
[   19.507947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.508006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.509364] page dumped because: kasan: bad access detected
[   19.509398] 
[   19.510151] Memory state around the buggy address:
[   19.510654]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.510719]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.510764] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.510807]                                      ^
[   19.510857]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.510901]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.510941] ==================================================================
[   19.524560] ==================================================================
[   19.524613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.524668] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.524719] 
[   19.524752] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.529472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.529905] Hardware name: linux,dummy-virt (DT)
[   19.530431] Call trace:
[   19.530529]  show_stack+0x20/0x38 (C)
[   19.530940]  dump_stack_lvl+0x8c/0xd0
[   19.531804]  print_report+0x118/0x608
[   19.532111]  kasan_report+0xdc/0x128
[   19.534129]  kasan_check_range+0x100/0x1a8
[   19.534345]  __kasan_check_write+0x20/0x30
[   19.534445]  kasan_atomics_helper+0x1384/0x4858
[   19.535002]  kasan_atomics+0x198/0x2e0
[   19.535070]  kunit_try_run_case+0x170/0x3f0
[   19.535711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.535778]  kthread+0x328/0x630
[   19.535823]  ret_from_fork+0x10/0x20
[   19.535889] 
[   19.535910] Allocated by task 266:
[   19.535939]  kasan_save_stack+0x3c/0x68
[   19.539099]  kasan_save_track+0x20/0x40
[   19.539193]  kasan_save_alloc_info+0x40/0x58
[   19.539239]  __kasan_kmalloc+0xd4/0xd8
[   19.539276]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.540143]  kasan_atomics+0xb8/0x2e0
[   19.540195]  kunit_try_run_case+0x170/0x3f0
[   19.541232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.541342]  kthread+0x328/0x630
[   19.542404]  ret_from_fork+0x10/0x20
[   19.543984] 
[   19.544152] The buggy address belongs to the object at fff00000c5906f00
[   19.544152]  which belongs to the cache kmalloc-64 of size 64
[   19.544475] The buggy address is located 0 bytes to the right of
[   19.544475]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.544634] 
[   19.544741] The buggy address belongs to the physical page:
[   19.544933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.545170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.545221] page_type: f5(slab)
[   19.545261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.545661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.546654] page dumped because: kasan: bad access detected
[   19.546707] 
[   19.546744] Memory state around the buggy address:
[   19.548433]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.548487]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.548533] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.548694]                                      ^
[   19.548753]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.548899]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.549892] ==================================================================
[   19.397991] ==================================================================
[   19.398313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.398395] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.398463] 
[   19.398497] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.398589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.398626] Hardware name: linux,dummy-virt (DT)
[   19.398659] Call trace:
[   19.398690]  show_stack+0x20/0x38 (C)
[   19.398802]  dump_stack_lvl+0x8c/0xd0
[   19.398899]  print_report+0x118/0x608
[   19.398997]  kasan_report+0xdc/0x128
[   19.399333]  kasan_check_range+0x100/0x1a8
[   19.399422]  __kasan_check_read+0x20/0x30
[   19.399572]  kasan_atomics_helper+0xdd4/0x4858
[   19.401263]  kasan_atomics+0x198/0x2e0
[   19.401346]  kunit_try_run_case+0x170/0x3f0
[   19.401429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.401545]  kthread+0x328/0x630
[   19.401623]  ret_from_fork+0x10/0x20
[   19.401717] 
[   19.401829] Allocated by task 266:
[   19.401911]  kasan_save_stack+0x3c/0x68
[   19.401984]  kasan_save_track+0x20/0x40
[   19.402137]  kasan_save_alloc_info+0x40/0x58
[   19.402203]  __kasan_kmalloc+0xd4/0xd8
[   19.402261]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.402301]  kasan_atomics+0xb8/0x2e0
[   19.402339]  kunit_try_run_case+0x170/0x3f0
[   19.402385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.402464]  kthread+0x328/0x630
[   19.402531]  ret_from_fork+0x10/0x20
[   19.402568] 
[   19.402597] The buggy address belongs to the object at fff00000c5906f00
[   19.402597]  which belongs to the cache kmalloc-64 of size 64
[   19.402680] The buggy address is located 0 bytes to the right of
[   19.402680]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.402777] 
[   19.402801] The buggy address belongs to the physical page:
[   19.402833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.402896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.402973] page_type: f5(slab)
[   19.403207] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.403271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.403339] page dumped because: kasan: bad access detected
[   19.403373] 
[   19.403393] Memory state around the buggy address:
[   19.403681]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.403787]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.404637] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.404690]                                      ^
[   19.404812]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.405228]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.405449] ==================================================================
[   19.597884] ==================================================================
[   19.597931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.597985] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.598035] 
[   19.598066] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.598276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.598324] Hardware name: linux,dummy-virt (DT)
[   19.598501] Call trace:
[   19.598525]  show_stack+0x20/0x38 (C)
[   19.598575]  dump_stack_lvl+0x8c/0xd0
[   19.598623]  print_report+0x118/0x608
[   19.598670]  kasan_report+0xdc/0x128
[   19.598744]  __asan_report_load8_noabort+0x20/0x30
[   19.598798]  kasan_atomics_helper+0x3df4/0x4858
[   19.598857]  kasan_atomics+0x198/0x2e0
[   19.598904]  kunit_try_run_case+0x170/0x3f0
[   19.599167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.599548]  kthread+0x328/0x630
[   19.599595]  ret_from_fork+0x10/0x20
[   19.599644] 
[   19.599664] Allocated by task 266:
[   19.599693]  kasan_save_stack+0x3c/0x68
[   19.599735]  kasan_save_track+0x20/0x40
[   19.599784]  kasan_save_alloc_info+0x40/0x58
[   19.599944]  __kasan_kmalloc+0xd4/0xd8
[   19.599994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.600058]  kasan_atomics+0xb8/0x2e0
[   19.600097]  kunit_try_run_case+0x170/0x3f0
[   19.600136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.600181]  kthread+0x328/0x630
[   19.600214]  ret_from_fork+0x10/0x20
[   19.600251] 
[   19.600271] The buggy address belongs to the object at fff00000c5906f00
[   19.600271]  which belongs to the cache kmalloc-64 of size 64
[   19.600347] The buggy address is located 0 bytes to the right of
[   19.600347]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.600421] 
[   19.600443] The buggy address belongs to the physical page:
[   19.600475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.600629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.600701] page_type: f5(slab)
[   19.601158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.601315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.601382] page dumped because: kasan: bad access detected
[   19.601485] 
[   19.601517] Memory state around the buggy address:
[   19.601550]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.601595]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.601640] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.601681]                                      ^
[   19.601716]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.601757]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.601797] ==================================================================
[   19.551973] ==================================================================
[   19.552043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.552283] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.553448] 
[   19.553553] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.553647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.553677] Hardware name: linux,dummy-virt (DT)
[   19.553712] Call trace:
[   19.553887]  show_stack+0x20/0x38 (C)
[   19.553943]  dump_stack_lvl+0x8c/0xd0
[   19.553994]  print_report+0x118/0x608
[   19.554043]  kasan_report+0xdc/0x128
[   19.554089]  __asan_report_load8_noabort+0x20/0x30
[   19.554683]  kasan_atomics_helper+0x3f04/0x4858
[   19.554757]  kasan_atomics+0x198/0x2e0
[   19.555102]  kunit_try_run_case+0x170/0x3f0
[   19.555362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.555448]  kthread+0x328/0x630
[   19.555492]  ret_from_fork+0x10/0x20
[   19.555549] 
[   19.555569] Allocated by task 266:
[   19.555599]  kasan_save_stack+0x3c/0x68
[   19.555811]  kasan_save_track+0x20/0x40
[   19.555861]  kasan_save_alloc_info+0x40/0x58
[   19.555904]  __kasan_kmalloc+0xd4/0xd8
[   19.555940]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.555981]  kasan_atomics+0xb8/0x2e0
[   19.556028]  kunit_try_run_case+0x170/0x3f0
[   19.556185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.556230]  kthread+0x328/0x630
[   19.556265]  ret_from_fork+0x10/0x20
[   19.556302] 
[   19.556324] The buggy address belongs to the object at fff00000c5906f00
[   19.556324]  which belongs to the cache kmalloc-64 of size 64
[   19.556384] The buggy address is located 0 bytes to the right of
[   19.556384]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.556450] 
[   19.556472] The buggy address belongs to the physical page:
[   19.556507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.556562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.556612] page_type: f5(slab)
[   19.556651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.556704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.556748] page dumped because: kasan: bad access detected
[   19.556780] 
[   19.556801] Memory state around the buggy address:
[   19.556834]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.556890]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.556934] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.556976]                                      ^
[   19.557010]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.557054]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.557095] ==================================================================
[   19.391706] ==================================================================
[   19.391829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.391902] Read of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.391979] 
[   19.392010] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.392121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.392149] Hardware name: linux,dummy-virt (DT)
[   19.392183] Call trace:
[   19.392205]  show_stack+0x20/0x38 (C)
[   19.392256]  dump_stack_lvl+0x8c/0xd0
[   19.392303]  print_report+0x118/0x608
[   19.392496]  kasan_report+0xdc/0x128
[   19.392556]  __asan_report_load4_noabort+0x20/0x30
[   19.392621]  kasan_atomics_helper+0x3e04/0x4858
[   19.392670]  kasan_atomics+0x198/0x2e0
[   19.392723]  kunit_try_run_case+0x170/0x3f0
[   19.392812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.392914]  kthread+0x328/0x630
[   19.393289]  ret_from_fork+0x10/0x20
[   19.393656] 
[   19.393737] Allocated by task 266:
[   19.393807]  kasan_save_stack+0x3c/0x68
[   19.393958]  kasan_save_track+0x20/0x40
[   19.394011]  kasan_save_alloc_info+0x40/0x58
[   19.394052]  __kasan_kmalloc+0xd4/0xd8
[   19.394127]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.394450]  kasan_atomics+0xb8/0x2e0
[   19.394516]  kunit_try_run_case+0x170/0x3f0
[   19.394615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.394684]  kthread+0x328/0x630
[   19.395399]  ret_from_fork+0x10/0x20
[   19.395712] 
[   19.395779] The buggy address belongs to the object at fff00000c5906f00
[   19.395779]  which belongs to the cache kmalloc-64 of size 64
[   19.396463] The buggy address is located 0 bytes to the right of
[   19.396463]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.396538] 
[   19.396562] The buggy address belongs to the physical page:
[   19.396595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.396650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.396700] page_type: f5(slab)
[   19.396740] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.396794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.396835] page dumped because: kasan: bad access detected
[   19.396879] 
[   19.396899] Memory state around the buggy address:
[   19.396931]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.396977]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.397024] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.397179]                                      ^
[   19.397302]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.397357]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.397438] ==================================================================
[   19.316253] ==================================================================
[   19.316453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.316515] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.316582] 
[   19.316635] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.316946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.316988] Hardware name: linux,dummy-virt (DT)
[   19.317052] Call trace:
[   19.317078]  show_stack+0x20/0x38 (C)
[   19.317165]  dump_stack_lvl+0x8c/0xd0
[   19.317263]  print_report+0x118/0x608
[   19.317312]  kasan_report+0xdc/0x128
[   19.317463]  kasan_check_range+0x100/0x1a8
[   19.317517]  __kasan_check_write+0x20/0x30
[   19.317717]  kasan_atomics_helper+0xa6c/0x4858
[   19.317779]  kasan_atomics+0x198/0x2e0
[   19.317826]  kunit_try_run_case+0x170/0x3f0
[   19.317887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.317942]  kthread+0x328/0x630
[   19.317986]  ret_from_fork+0x10/0x20
[   19.318035] 
[   19.318055] Allocated by task 266:
[   19.318094]  kasan_save_stack+0x3c/0x68
[   19.318139]  kasan_save_track+0x20/0x40
[   19.318179]  kasan_save_alloc_info+0x40/0x58
[   19.318221]  __kasan_kmalloc+0xd4/0xd8
[   19.318260]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.318299]  kasan_atomics+0xb8/0x2e0
[   19.318335]  kunit_try_run_case+0x170/0x3f0
[   19.318384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.318429]  kthread+0x328/0x630
[   19.318463]  ret_from_fork+0x10/0x20
[   19.318502] 
[   19.318522] The buggy address belongs to the object at fff00000c5906f00
[   19.318522]  which belongs to the cache kmalloc-64 of size 64
[   19.318595] The buggy address is located 0 bytes to the right of
[   19.318595]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.318660] 
[   19.319043] The buggy address belongs to the physical page:
[   19.319081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.319136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.319186] page_type: f5(slab)
[   19.319225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.319314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.319459] page dumped because: kasan: bad access detected
[   19.319561] 
[   19.319594] Memory state around the buggy address:
[   19.319634]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.319678]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.320030] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.320174]                                      ^
[   19.320253]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.320338]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.321332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.322184]  kthread+0x328/0x630
[   19.322450]  __kasan_kmalloc+0xd4/0xd8
[   19.322498]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.322540]  kasan_atomics+0xb8/0x2e0
[   19.322577]  kunit_try_run_case+0x170/0x3f0
[   19.322623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.322671]  kthread+0x328/0x630
[   19.322714]  ret_from_fork+0x10/0x20
[   19.323288] 
[   19.323378] The buggy address belongs to the object at fff00000c5906f00
[   19.323378]  which belongs to the cache kmalloc-64 of size 64
[   19.323451] The buggy address is located 0 bytes to the right of
[   19.323451]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.323515] 
[   19.323537] The buggy address belongs to the physical page:
[   19.323567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.323621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.323669] page_type: f5(slab)
[   19.323708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.323759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.328382]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.328495]  kasan_atomics+0xb8/0x2e0
[   19.331894]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.331934] ==================================================================
[   19.196144] ==================================================================
[   19.196194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   19.196393] Read of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.196581] 
[   19.196639] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.196742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.196789] Hardware name: linux,dummy-virt (DT)
[   19.196824] Call trace:
[   19.196877]  show_stack+0x20/0x38 (C)
[   19.196957]  dump_stack_lvl+0x8c/0xd0
[   19.197024]  print_report+0x118/0x608
[   19.197089]  kasan_report+0xdc/0x128
[   19.197138]  __asan_report_load4_noabort+0x20/0x30
[   19.197192]  kasan_atomics_helper+0x40fc/0x4858
[   19.197366]  kasan_atomics+0x198/0x2e0
[   19.197442]  kunit_try_run_case+0x170/0x3f0
[   19.197629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.197736]  kthread+0x328/0x630
[   19.197810]  ret_from_fork+0x10/0x20
[   19.197890] 
[   19.197930] Allocated by task 266:
[   19.197978]  kasan_save_stack+0x3c/0x68
[   19.198023]  kasan_save_track+0x20/0x40
[   19.198077]  kasan_save_alloc_info+0x40/0x58
[   19.198157]  __kasan_kmalloc+0xd4/0xd8
[   19.198213]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.198258]  kasan_atomics+0xb8/0x2e0
[   19.198295]  kunit_try_run_case+0x170/0x3f0
[   19.198333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.198378]  kthread+0x328/0x630
[   19.198583]  ret_from_fork+0x10/0x20
[   19.198644] 
[   19.198823] The buggy address belongs to the object at fff00000c5906f00
[   19.198823]  which belongs to the cache kmalloc-64 of size 64
[   19.198988] The buggy address is located 0 bytes to the right of
[   19.198988]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.199091] 
[   19.199160] The buggy address belongs to the physical page:
[   19.199221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.199343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.199459] page_type: f5(slab)
[   19.199579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.199632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.199675] page dumped because: kasan: bad access detected
[   19.199707] 
[   19.199779] Memory state around the buggy address:
[   19.199813]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.199866]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.199911] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.200077]                                      ^
[   19.200199]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.200326]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.200412] ==================================================================
[   19.221499] ==================================================================
[   19.224027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   19.228130] The buggy address is located 0 bytes to the right of
[   19.228130]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.229682] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.230646] ==================================================================
[   19.590568] ==================================================================
[   19.590616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.590665] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.590745] 
[   19.590778] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.590892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.590922] Hardware name: linux,dummy-virt (DT)
[   19.590956] Call trace:
[   19.590978]  show_stack+0x20/0x38 (C)
[   19.591030]  dump_stack_lvl+0x8c/0xd0
[   19.591118]  print_report+0x118/0x608
[   19.591167]  kasan_report+0xdc/0x128
[   19.591258]  __asan_report_load8_noabort+0x20/0x30
[   19.591313]  kasan_atomics_helper+0x3db0/0x4858
[   19.591366]  kasan_atomics+0x198/0x2e0
[   19.591433]  kunit_try_run_case+0x170/0x3f0
[   19.591695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.591832]  kthread+0x328/0x630
[   19.591913]  ret_from_fork+0x10/0x20
[   19.592016] 
[   19.592042] Allocated by task 266:
[   19.592071]  kasan_save_stack+0x3c/0x68
[   19.592263]  kasan_save_track+0x20/0x40
[   19.592355]  kasan_save_alloc_info+0x40/0x58
[   19.592535]  __kasan_kmalloc+0xd4/0xd8
[   19.592593]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.592672]  kasan_atomics+0xb8/0x2e0
[   19.592757]  kunit_try_run_case+0x170/0x3f0
[   19.592873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.592917]  kthread+0x328/0x630
[   19.592951]  ret_from_fork+0x10/0x20
[   19.592987] 
[   19.593009] The buggy address belongs to the object at fff00000c5906f00
[   19.593009]  which belongs to the cache kmalloc-64 of size 64
[   19.593067] The buggy address is located 0 bytes to the right of
[   19.593067]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.593134] 
[   19.593156] The buggy address belongs to the physical page:
[   19.593187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.593241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.593291] page_type: f5(slab)
[   19.593330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.593382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.593425] page dumped because: kasan: bad access detected
[   19.593458] 
[   19.593489] Memory state around the buggy address:
[   19.593606]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.593652]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.593696] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.593737]                                      ^
[   19.593771]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.593814]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.593863] ==================================================================
[   19.617646] ==================================================================
[   19.617692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.617741] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.617812] 
[   19.617881] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.617965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.617993] Hardware name: linux,dummy-virt (DT)
[   19.618025] Call trace:
[   19.618047]  show_stack+0x20/0x38 (C)
[   19.618094]  dump_stack_lvl+0x8c/0xd0
[   19.618141]  print_report+0x118/0x608
[   19.618201]  kasan_report+0xdc/0x128
[   19.618249]  kasan_check_range+0x100/0x1a8
[   19.618299]  __kasan_check_write+0x20/0x30
[   19.618344]  kasan_atomics_helper+0x17ec/0x4858
[   19.618394]  kasan_atomics+0x198/0x2e0
[   19.618439]  kunit_try_run_case+0x170/0x3f0
[   19.618487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.618651]  kthread+0x328/0x630
[   19.618735]  ret_from_fork+0x10/0x20
[   19.618882] 
[   19.618902] Allocated by task 266:
[   19.619024]  kasan_save_stack+0x3c/0x68
[   19.619151]  kasan_save_track+0x20/0x40
[   19.619193]  kasan_save_alloc_info+0x40/0x58
[   19.619260]  __kasan_kmalloc+0xd4/0xd8
[   19.619299]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.619345]  kasan_atomics+0xb8/0x2e0
[   19.619383]  kunit_try_run_case+0x170/0x3f0
[   19.619422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.619466]  kthread+0x328/0x630
[   19.619501]  ret_from_fork+0x10/0x20
[   19.619538] 
[   19.619559] The buggy address belongs to the object at fff00000c5906f00
[   19.619559]  which belongs to the cache kmalloc-64 of size 64
[   19.619616] The buggy address is located 0 bytes to the right of
[   19.619616]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.619681] 
[   19.619704] The buggy address belongs to the physical page:
[   19.619735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.619829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.620042] page_type: f5(slab)
[   19.620465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.620533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.620621] page dumped because: kasan: bad access detected
[   19.620679] 
[   19.620699] Memory state around the buggy address:
[   19.620780]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.620825]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.620879] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.620925]                                      ^
[   19.620959]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.621004]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.621042] ==================================================================
[   19.201354] ==================================================================
[   19.201406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   19.201528] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.206295] Memory state around the buggy address:
[   19.207026] ==================================================================
[   19.453499] ==================================================================
[   19.453926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.454010] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.454142] 
[   19.454191] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.454279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.454542] Hardware name: linux,dummy-virt (DT)
[   19.454592] Call trace:
[   19.454624]  show_stack+0x20/0x38 (C)
[   19.454755]  dump_stack_lvl+0x8c/0xd0
[   19.454976]  print_report+0x118/0x608
[   19.455030]  kasan_report+0xdc/0x128
[   19.455085]  kasan_check_range+0x100/0x1a8
[   19.455137]  __kasan_check_write+0x20/0x30
[   19.455182]  kasan_atomics_helper+0xff0/0x4858
[   19.455232]  kasan_atomics+0x198/0x2e0
[   19.455278]  kunit_try_run_case+0x170/0x3f0
[   19.455340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.455395]  kthread+0x328/0x630
[   19.455437]  ret_from_fork+0x10/0x20
[   19.455487] 
[   19.455507] Allocated by task 266:
[   19.455537]  kasan_save_stack+0x3c/0x68
[   19.455581]  kasan_save_track+0x20/0x40
[   19.455619]  kasan_save_alloc_info+0x40/0x58
[   19.455666]  __kasan_kmalloc+0xd4/0xd8
[   19.455706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.455745]  kasan_atomics+0xb8/0x2e0
[   19.455782]  kunit_try_run_case+0x170/0x3f0
[   19.455822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.455876]  kthread+0x328/0x630
[   19.455911]  ret_from_fork+0x10/0x20
[   19.455948] 
[   19.455971] The buggy address belongs to the object at fff00000c5906f00
[   19.455971]  which belongs to the cache kmalloc-64 of size 64
[   19.456030] The buggy address is located 0 bytes to the right of
[   19.456030]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.456094] 
[   19.456116] The buggy address belongs to the physical page:
[   19.456149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.456204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.456262] page_type: f5(slab)
[   19.456300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.456353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.456396] page dumped because: kasan: bad access detected
[   19.456429] 
[   19.456448] Memory state around the buggy address:
[   19.456481]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.456527]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.456650] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.456691]                                      ^
[   19.456727]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.456768]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.456831] ==================================================================
[   19.584182] ==================================================================
[   19.584233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.584286] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.584338] 
[   19.584369] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.584451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.584480] Hardware name: linux,dummy-virt (DT)
[   19.584521] Call trace:
[   19.584646]  show_stack+0x20/0x38 (C)
[   19.584702]  dump_stack_lvl+0x8c/0xd0
[   19.584881]  print_report+0x118/0x608
[   19.585134]  kasan_report+0xdc/0x128
[   19.585383]  kasan_check_range+0x100/0x1a8
[   19.585561]  __kasan_check_write+0x20/0x30
[   19.585664]  kasan_atomics_helper+0x15b4/0x4858
[   19.586121]  kasan_atomics+0x198/0x2e0
[   19.586214]  kunit_try_run_case+0x170/0x3f0
[   19.586482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.586620]  kthread+0x328/0x630
[   19.586665]  ret_from_fork+0x10/0x20
[   19.587054] 
[   19.587148] Allocated by task 266:
[   19.587226]  kasan_save_stack+0x3c/0x68
[   19.587321]  kasan_save_track+0x20/0x40
[   19.587551]  kasan_save_alloc_info+0x40/0x58
[   19.588430]  __kasan_kmalloc+0xd4/0xd8
[   19.588513]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.588904]  kasan_atomics+0xb8/0x2e0
[   19.589059]  kunit_try_run_case+0x170/0x3f0
[   19.589180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.589227]  kthread+0x328/0x630
[   19.589322]  ret_from_fork+0x10/0x20
[   19.589379] 
[   19.589402] The buggy address belongs to the object at fff00000c5906f00
[   19.589402]  which belongs to the cache kmalloc-64 of size 64
[   19.589462] The buggy address is located 0 bytes to the right of
[   19.589462]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.589527] 
[   19.589548] The buggy address belongs to the physical page:
[   19.589581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.589633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.589683] page_type: f5(slab)
[   19.589722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.589836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.589890] page dumped because: kasan: bad access detected
[   19.589924] 
[   19.589945] Memory state around the buggy address:
[   19.589989]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.590034]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.590080] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.590121]                                      ^
[   19.590153]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.590203]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.590350] ==================================================================
[   19.407738] ==================================================================
[   19.407942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.408124] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.408179] 
[   19.408235] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.408329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.408357] Hardware name: linux,dummy-virt (DT)
[   19.408391] Call trace:
[   19.408414]  show_stack+0x20/0x38 (C)
[   19.408472]  dump_stack_lvl+0x8c/0xd0
[   19.408521]  print_report+0x118/0x608
[   19.408570]  kasan_report+0xdc/0x128
[   19.408616]  __asan_report_load8_noabort+0x20/0x30
[   19.408669]  kasan_atomics_helper+0x3f58/0x4858
[   19.408717]  kasan_atomics+0x198/0x2e0
[   19.408765]  kunit_try_run_case+0x170/0x3f0
[   19.408823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.408892]  kthread+0x328/0x630
[   19.408935]  ret_from_fork+0x10/0x20
[   19.408983] 
[   19.409004] Allocated by task 266:
[   19.409034]  kasan_save_stack+0x3c/0x68
[   19.409096]  kasan_save_track+0x20/0x40
[   19.409137]  kasan_save_alloc_info+0x40/0x58
[   19.409178]  __kasan_kmalloc+0xd4/0xd8
[   19.409223]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.409264]  kasan_atomics+0xb8/0x2e0
[   19.409301]  kunit_try_run_case+0x170/0x3f0
[   19.409340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.409385]  kthread+0x328/0x630
[   19.409419]  ret_from_fork+0x10/0x20
[   19.409455] 
[   19.409478] The buggy address belongs to the object at fff00000c5906f00
[   19.409478]  which belongs to the cache kmalloc-64 of size 64
[   19.409536] The buggy address is located 0 bytes to the right of
[   19.409536]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.409602] 
[   19.409633] The buggy address belongs to the physical page:
[   19.409666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.409721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.409775] page_type: f5(slab)
[   19.409823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.409893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.410181] page dumped because: kasan: bad access detected
[   19.410230] 
[   19.410953] Memory state around the buggy address:
[   19.411123]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.411171]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.411217] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.411257]                                      ^
[   19.411292]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.411346]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.411387] ==================================================================
[   19.344776] ==================================================================
[   19.344862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   19.344955] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.345036] 
[   19.345081] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.345172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.345226] Hardware name: linux,dummy-virt (DT)
[   19.345259] Call trace:
[   19.345300]  show_stack+0x20/0x38 (C)
[   19.345350]  dump_stack_lvl+0x8c/0xd0
[   19.345400]  print_report+0x118/0x608
[   19.345449]  kasan_report+0xdc/0x128
[   19.345495]  kasan_check_range+0x100/0x1a8
[   19.345544]  __kasan_check_write+0x20/0x30
[   19.345593]  kasan_atomics_helper+0xc08/0x4858
[   19.346003]  kasan_atomics+0x198/0x2e0
[   19.346400]  kunit_try_run_case+0x170/0x3f0
[   19.346673] 
[   19.346820]  kasan_save_stack+0x3c/0x68
[   19.347798]  kunit_try_run_case+0x170/0x3f0
[   19.347876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.348384]  kthread+0x328/0x630
[   19.348577]  ret_from_fork+0x10/0x20
[   19.348672] 
[   19.348694] The buggy address belongs to the object at fff00000c5906f00
[   19.348694]  which belongs to the cache kmalloc-64 of size 64
[   19.349626] The buggy address belongs to the physical page:
[   19.350048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.351377] page dumped because: kasan: bad access detected
[   19.351648]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.352336]                                      ^
[   19.357828]  kthread+0x328/0x630
[   19.357974]  ret_from_fork+0x10/0x20
[   19.358017] 
[   19.358038] The buggy address belongs to the object at fff00000c5906f00
[   19.358038]  which belongs to the cache kmalloc-64 of size 64
[   19.358110] The buggy address is located 0 bytes to the right of
[   19.358110]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.358485] 
[   19.358658] The buggy address belongs to the physical page:
[   19.358890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.359217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.359496] page_type: f5(slab)
[   19.359649] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.359731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.360070] page dumped because: kasan: bad access detected
[   19.360192] 
[   19.360475] Memory state around the buggy address:
[   19.360715]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.360859]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.360905] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.360944]                                      ^
[   19.360979]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.361024]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.361983] ==================================================================
[   19.576275] ==================================================================
[   19.576323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.576370] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.576420] 
[   19.576457] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.576759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.576787] Hardware name: linux,dummy-virt (DT)
[   19.576820] Call trace:
[   19.576854]  show_stack+0x20/0x38 (C)
[   19.576903]  dump_stack_lvl+0x8c/0xd0
[   19.576953]  print_report+0x118/0x608
[   19.577000]  kasan_report+0xdc/0x128
[   19.577046]  kasan_check_range+0x100/0x1a8
[   19.577096]  __kasan_check_write+0x20/0x30
[   19.577141]  kasan_atomics_helper+0x154c/0x4858
[   19.577191]  kasan_atomics+0x198/0x2e0
[   19.577242]  kunit_try_run_case+0x170/0x3f0
[   19.577288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.577341]  kthread+0x328/0x630
[   19.577392]  ret_from_fork+0x10/0x20
[   19.578935] 
[   19.579595] Allocated by task 266:
[   19.579763]  kasan_save_stack+0x3c/0x68
[   19.579993]  kasan_save_track+0x20/0x40
[   19.580037]  kasan_save_alloc_info+0x40/0x58
[   19.580166]  __kasan_kmalloc+0xd4/0xd8
[   19.580323]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.580517]  kasan_atomics+0xb8/0x2e0
[   19.580562]  kunit_try_run_case+0x170/0x3f0
[   19.580600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.580646]  kthread+0x328/0x630
[   19.580907]  ret_from_fork+0x10/0x20
[   19.581081] 
[   19.581106] The buggy address belongs to the object at fff00000c5906f00
[   19.581106]  which belongs to the cache kmalloc-64 of size 64
[   19.581245] The buggy address is located 0 bytes to the right of
[   19.581245]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.581735] 
[   19.581889] The buggy address belongs to the physical page:
[   19.582024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.582080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.582227] page_type: f5(slab)
[   19.582267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.582320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.582416] page dumped because: kasan: bad access detected
[   19.582570] 
[   19.582591] Memory state around the buggy address:
[   19.582624]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.582788]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.582834] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.582884]                                      ^
[   19.582917]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.583110]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.583341] ==================================================================
[   19.594080] ==================================================================
[   19.594135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.594182] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.594232] 
[   19.594264] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.594428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.594489] Hardware name: linux,dummy-virt (DT)
[   19.594546] Call trace:
[   19.594920]  show_stack+0x20/0x38 (C)
[   19.594975]  dump_stack_lvl+0x8c/0xd0
[   19.595024]  print_report+0x118/0x608
[   19.595070]  kasan_report+0xdc/0x128
[   19.595141]  kasan_check_range+0x100/0x1a8
[   19.595368]  __kasan_check_write+0x20/0x30
[   19.595513]  kasan_atomics_helper+0x1644/0x4858
[   19.595563]  kasan_atomics+0x198/0x2e0
[   19.595612]  kunit_try_run_case+0x170/0x3f0
[   19.595682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.595737]  kthread+0x328/0x630
[   19.595779]  ret_from_fork+0x10/0x20
[   19.595828] 
[   19.595858] Allocated by task 266:
[   19.595886]  kasan_save_stack+0x3c/0x68
[   19.595928]  kasan_save_track+0x20/0x40
[   19.595966]  kasan_save_alloc_info+0x40/0x58
[   19.596008]  __kasan_kmalloc+0xd4/0xd8
[   19.596071]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.596279]  kasan_atomics+0xb8/0x2e0
[   19.596458]  kunit_try_run_case+0x170/0x3f0
[   19.596499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.596591]  kthread+0x328/0x630
[   19.596627]  ret_from_fork+0x10/0x20
[   19.596663] 
[   19.596737] The buggy address belongs to the object at fff00000c5906f00
[   19.596737]  which belongs to the cache kmalloc-64 of size 64
[   19.596869] The buggy address is located 0 bytes to the right of
[   19.596869]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.596935] 
[   19.596958] The buggy address belongs to the physical page:
[   19.596990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.597042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.597092] page_type: f5(slab)
[   19.597133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.597186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.597229] page dumped because: kasan: bad access detected
[   19.597264] 
[   19.597285] Memory state around the buggy address:
[   19.597318]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.597363]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.597448] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.597490]                                      ^
[   19.597524]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.597624]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.597664] ==================================================================
[   19.421597] ==================================================================
[   19.421651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.421704] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.421755] 
[   19.421789] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.421896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.422137] Hardware name: linux,dummy-virt (DT)
[   19.422276] Call trace:
[   19.422306]  show_stack+0x20/0x38 (C)
[   19.422360]  dump_stack_lvl+0x8c/0xd0
[   19.422418]  print_report+0x118/0x608
[   19.422466]  kasan_report+0xdc/0x128
[   19.422515]  __asan_report_store8_noabort+0x20/0x30
[   19.422568]  kasan_atomics_helper+0x3e5c/0x4858
[   19.422621]  kasan_atomics+0x198/0x2e0
[   19.422669]  kunit_try_run_case+0x170/0x3f0
[   19.422725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.422781]  kthread+0x328/0x630
[   19.423219]  ret_from_fork+0x10/0x20
[   19.423518] 
[   19.423541] Allocated by task 266:
[   19.423736]  kasan_save_stack+0x3c/0x68
[   19.423917]  kasan_save_track+0x20/0x40
[   19.424372]  kasan_save_alloc_info+0x40/0x58
[   19.424650]  __kasan_kmalloc+0xd4/0xd8
[   19.424763]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.424860]  kasan_atomics+0xb8/0x2e0
[   19.424974]  kunit_try_run_case+0x170/0x3f0
[   19.425015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.425061]  kthread+0x328/0x630
[   19.425094]  ret_from_fork+0x10/0x20
[   19.425133] 
[   19.425165] The buggy address belongs to the object at fff00000c5906f00
[   19.425165]  which belongs to the cache kmalloc-64 of size 64
[   19.425225] The buggy address is located 0 bytes to the right of
[   19.425225]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.425290] 
[   19.425330] The buggy address belongs to the physical page:
[   19.425382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.425445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.425507] page_type: f5(slab)
[   19.425547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.425599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.425652] page dumped because: kasan: bad access detected
[   19.425707] 
[   19.425726] Memory state around the buggy address:
[   19.425760]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.425803]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.426074] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.426228]                                      ^
[   19.426268]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.426355]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.426420] ==================================================================
[   19.609383] ==================================================================
[   19.609431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.609479] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.609531] 
[   19.609563] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.609647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.609676] Hardware name: linux,dummy-virt (DT)
[   19.609716] Call trace:
[   19.609836]  show_stack+0x20/0x38 (C)
[   19.610090]  dump_stack_lvl+0x8c/0xd0
[   19.610346]  print_report+0x118/0x608
[   19.610522]  kasan_report+0xdc/0x128
[   19.610598]  kasan_check_range+0x100/0x1a8
[   19.610654]  __kasan_check_write+0x20/0x30
[   19.610786]  kasan_atomics_helper+0x175c/0x4858
[   19.610835]  kasan_atomics+0x198/0x2e0
[   19.610891]  kunit_try_run_case+0x170/0x3f0
[   19.610940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.610993]  kthread+0x328/0x630
[   19.611036]  ret_from_fork+0x10/0x20
[   19.611085] 
[   19.611105] Allocated by task 266:
[   19.611133]  kasan_save_stack+0x3c/0x68
[   19.611175]  kasan_save_track+0x20/0x40
[   19.611213]  kasan_save_alloc_info+0x40/0x58
[   19.611255]  __kasan_kmalloc+0xd4/0xd8
[   19.611292]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.611341]  kasan_atomics+0xb8/0x2e0
[   19.611377]  kunit_try_run_case+0x170/0x3f0
[   19.611416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.611462]  kthread+0x328/0x630
[   19.611512]  ret_from_fork+0x10/0x20
[   19.611548] 
[   19.611622] The buggy address belongs to the object at fff00000c5906f00
[   19.611622]  which belongs to the cache kmalloc-64 of size 64
[   19.611715] The buggy address is located 0 bytes to the right of
[   19.611715]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.611782] 
[   19.611807] The buggy address belongs to the physical page:
[   19.611848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.611901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.611950] page_type: f5(slab)
[   19.612029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.612229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.612340] page dumped because: kasan: bad access detected
[   19.612387] 
[   19.612406] Memory state around the buggy address:
[   19.612451]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.612498]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.612552] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.612592]                                      ^
[   19.612627]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.612718]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.612761] ==================================================================
[   19.369478] ==================================================================
[   19.369541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.369815] Read of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.370173] 
[   19.370452] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.370584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.370612] Hardware name: linux,dummy-virt (DT)
[   19.370648] Call trace:
[   19.370670]  show_stack+0x20/0x38 (C)
[   19.370725]  dump_stack_lvl+0x8c/0xd0
[   19.370773]  print_report+0x118/0x608
[   19.370821]  kasan_report+0xdc/0x128
[   19.372282]  __asan_report_load4_noabort+0x20/0x30
[   19.372816]  kasan_atomics_helper+0x3dd8/0x4858
[   19.373238]  kasan_atomics+0x198/0x2e0
[   19.373652]  kunit_try_run_case+0x170/0x3f0
[   19.373738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.374197]  kthread+0x328/0x630
[   19.374268]  ret_from_fork+0x10/0x20
[   19.374904] 
[   19.374969] Allocated by task 266:
[   19.375003]  kasan_save_stack+0x3c/0x68
[   19.375650]  kasan_save_track+0x20/0x40
[   19.376194]  kasan_save_alloc_info+0x40/0x58
[   19.376250]  __kasan_kmalloc+0xd4/0xd8
[   19.376805]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.376876]  kasan_atomics+0xb8/0x2e0
[   19.377566]  kunit_try_run_case+0x170/0x3f0
[   19.377949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.378259]  kthread+0x328/0x630
[   19.378590]  ret_from_fork+0x10/0x20
[   19.379537] 
[   19.379567] The buggy address belongs to the object at fff00000c5906f00
[   19.379567]  which belongs to the cache kmalloc-64 of size 64
[   19.379633] The buggy address is located 0 bytes to the right of
[   19.379633]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.379699] 
[   19.379720] The buggy address belongs to the physical page:
[   19.379755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.380870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.381363] page_type: f5(slab)
[   19.381683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.381740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.381782] page dumped because: kasan: bad access detected
[   19.383250] 
[   19.383445] Memory state around the buggy address:
[   19.383483]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.383927]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.384266] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.384943]                                      ^
[   19.384995]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.385043]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.385085] ==================================================================
[   19.565476] ==================================================================
[   19.565529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.565581] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.565632] 
[   19.565873] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.566141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.566171] Hardware name: linux,dummy-virt (DT)
[   19.566206] Call trace:
[   19.566230]  show_stack+0x20/0x38 (C)
[   19.566282]  dump_stack_lvl+0x8c/0xd0
[   19.566328]  print_report+0x118/0x608
[   19.566377]  kasan_report+0xdc/0x128
[   19.566424]  kasan_check_range+0x100/0x1a8
[   19.566475]  __kasan_check_write+0x20/0x30
[   19.566520]  kasan_atomics_helper+0x147c/0x4858
[   19.566570]  kasan_atomics+0x198/0x2e0
[   19.566616]  kunit_try_run_case+0x170/0x3f0
[   19.566664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.566727]  kthread+0x328/0x630
[   19.566771]  ret_from_fork+0x10/0x20
[   19.566819] 
[   19.566847] Allocated by task 266:
[   19.566877]  kasan_save_stack+0x3c/0x68
[   19.566917]  kasan_save_track+0x20/0x40
[   19.566958]  kasan_save_alloc_info+0x40/0x58
[   19.567487]  __kasan_kmalloc+0xd4/0xd8
[   19.567573]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.567613]  kasan_atomics+0xb8/0x2e0
[   19.567663]  kunit_try_run_case+0x170/0x3f0
[   19.567761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.567827]  kthread+0x328/0x630
[   19.567875]  ret_from_fork+0x10/0x20
[   19.567915] 
[   19.567938] The buggy address belongs to the object at fff00000c5906f00
[   19.567938]  which belongs to the cache kmalloc-64 of size 64
[   19.568108] The buggy address is located 0 bytes to the right of
[   19.568108]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.568256] 
[   19.568332] The buggy address belongs to the physical page:
[   19.568410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.568751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.568809] page_type: f5(slab)
[   19.569026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.569092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.569175] page dumped because: kasan: bad access detected
[   19.569262] 
[   19.569307] Memory state around the buggy address:
[   19.569373]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.569418]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.569675] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.569721]                                      ^
[   19.569754]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.569798]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.569837] ==================================================================
[   19.612941] ==================================================================
[   19.612989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.613038] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.613089] 
[   19.613119] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.613199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.613228] Hardware name: linux,dummy-virt (DT)
[   19.613347] Call trace:
[   19.613485]  show_stack+0x20/0x38 (C)
[   19.613535]  dump_stack_lvl+0x8c/0xd0
[   19.613590]  print_report+0x118/0x608
[   19.613902]  kasan_report+0xdc/0x128
[   19.614108]  __asan_report_load8_noabort+0x20/0x30
[   19.614278]  kasan_atomics_helper+0x3e20/0x4858
[   19.614428]  kasan_atomics+0x198/0x2e0
[   19.614482]  kunit_try_run_case+0x170/0x3f0
[   19.614531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.614586]  kthread+0x328/0x630
[   19.614630]  ret_from_fork+0x10/0x20
[   19.614678] 
[   19.614754] Allocated by task 266:
[   19.614827]  kasan_save_stack+0x3c/0x68
[   19.614928]  kasan_save_track+0x20/0x40
[   19.615416]  kasan_save_alloc_info+0x40/0x58
[   19.615554]  __kasan_kmalloc+0xd4/0xd8
[   19.615612]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.615795]  kasan_atomics+0xb8/0x2e0
[   19.615833]  kunit_try_run_case+0x170/0x3f0
[   19.615882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.615965]  kthread+0x328/0x630
[   19.616141]  ret_from_fork+0x10/0x20
[   19.616244] 
[   19.616264] The buggy address belongs to the object at fff00000c5906f00
[   19.616264]  which belongs to the cache kmalloc-64 of size 64
[   19.616442] The buggy address is located 0 bytes to the right of
[   19.616442]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.616508] 
[   19.616556] The buggy address belongs to the physical page:
[   19.616717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.616874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.616925] page_type: f5(slab)
[   19.616964] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.617014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.617064] page dumped because: kasan: bad access detected
[   19.617098] 
[   19.617117] Memory state around the buggy address:
[   19.617150]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.617196]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.617240] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.617281]                                      ^
[   19.617315]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.617362]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.617401] ==================================================================
[   19.293606] ==================================================================
[   19.293659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.293749] Read of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.293857] 
[   19.293892] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.293974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.294003] Hardware name: linux,dummy-virt (DT)
[   19.294177] Call trace:
[   19.294715]  kasan_atomics_helper+0x42d8/0x4858
[   19.296603]  kasan_atomics+0xb8/0x2e0
[   19.297860] 
[   19.298087] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.298559]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.300254]  dump_stack_lvl+0x8c/0xd0
[   19.300303]  print_report+0x118/0x608
[   19.300351]  kasan_report+0xdc/0x128
[   19.300399]  kasan_check_range+0x100/0x1a8
[   19.300447]  __kasan_check_write+0x20/0x30
[   19.300626]  kasan_atomics_helper+0x934/0x4858
[   19.300684]  kasan_atomics+0x198/0x2e0
[   19.300825]  kunit_try_run_case+0x170/0x3f0
[   19.300898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.301061]  kthread+0x328/0x630
[   19.301105]  ret_from_fork+0x10/0x20
[   19.301153] 
[   19.301173] Allocated by task 266:
[   19.301203]  kasan_save_stack+0x3c/0x68
[   19.301273]  kasan_save_track+0x20/0x40
[   19.301401]  kasan_save_alloc_info+0x40/0x58
[   19.301539]  __kasan_kmalloc+0xd4/0xd8
[   19.301578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.301688]  kasan_atomics+0xb8/0x2e0
[   19.301744]  kunit_try_run_case+0x170/0x3f0
[   19.301783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.301832]  kthread+0x328/0x630
[   19.301876]  ret_from_fork+0x10/0x20
[   19.301912] 
[   19.301933] The buggy address belongs to the object at fff00000c5906f00
[   19.301933]  which belongs to the cache kmalloc-64 of size 64
[   19.302290] The buggy address is located 0 bytes to the right of
[   19.302290]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.302371] 
[   19.302403] The buggy address belongs to the physical page:
[   19.302437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.302654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.302707] page_type: f5(slab)
[   19.302748] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.302922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.303033] page dumped because: kasan: bad access detected
[   19.303093] 
[   19.303113] Memory state around the buggy address:
[   19.303148]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.303350]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.303397] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.303637]                                      ^
[   19.303729]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.303864]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.304049] ==================================================================
[   19.466132] ==================================================================
[   19.466188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.466339] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.466414] 
[   19.466460] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.467101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.467143] Hardware name: linux,dummy-virt (DT)
[   19.467176] Call trace:
[   19.467208]  show_stack+0x20/0x38 (C)
[   19.467424]  dump_stack_lvl+0x8c/0xd0
[   19.468972]  print_report+0x118/0x608
[   19.469036]  kasan_report+0xdc/0x128
[   19.469086]  kasan_check_range+0x100/0x1a8
[   19.469135]  __kasan_check_write+0x20/0x30
[   19.469184]  kasan_atomics_helper+0x10c0/0x4858
[   19.469236]  kasan_atomics+0x198/0x2e0
[   19.469282]  kunit_try_run_case+0x170/0x3f0
[   19.469332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.469386]  kthread+0x328/0x630
[   19.469429]  ret_from_fork+0x10/0x20
[   19.469479] 
[   19.469499] Allocated by task 266:
[   19.469529]  kasan_save_stack+0x3c/0x68
[   19.469573]  kasan_save_track+0x20/0x40
[   19.469610]  kasan_save_alloc_info+0x40/0x58
[   19.469652]  __kasan_kmalloc+0xd4/0xd8
[   19.469689]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.469731]  kasan_atomics+0xb8/0x2e0
[   19.469768]  kunit_try_run_case+0x170/0x3f0
[   19.469806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.469861]  kthread+0x328/0x630
[   19.469958]  ret_from_fork+0x10/0x20
[   19.469996] 
[   19.470076] The buggy address belongs to the object at fff00000c5906f00
[   19.470076]  which belongs to the cache kmalloc-64 of size 64
[   19.470433] The buggy address is located 0 bytes to the right of
[   19.470433]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.470503] 
[   19.470553] The buggy address belongs to the physical page:
[   19.470667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.470792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.470892] page_type: f5(slab)
[   19.470980] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.471188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.471272] page dumped because: kasan: bad access detected
[   19.471418] 
[   19.471512] Memory state around the buggy address:
[   19.471581]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.471667]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.471753] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.471858]                                      ^
[   19.471892]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.471963]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.472003] ==================================================================
[   19.488929] ==================================================================
[   19.489026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.489252] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.489326] 
[   19.489489] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.489585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.489614] Hardware name: linux,dummy-virt (DT)
[   19.489647] Call trace:
[   19.489670]  show_stack+0x20/0x38 (C)
[   19.489720]  dump_stack_lvl+0x8c/0xd0
[   19.489775]  print_report+0x118/0x608
[   19.490240]  kasan_report+0xdc/0x128
[   19.490494]  kasan_check_range+0x100/0x1a8
[   19.490557]  __kasan_check_write+0x20/0x30
[   19.490609]  kasan_atomics_helper+0x1190/0x4858
[   19.490662]  kasan_atomics+0x198/0x2e0
[   19.491289]  kunit_try_run_case+0x170/0x3f0
[   19.491628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.492149]  kthread+0x328/0x630
[   19.492194]  ret_from_fork+0x10/0x20
[   19.492242] 
[   19.492263] Allocated by task 266:
[   19.492414]  kasan_save_stack+0x3c/0x68
[   19.492465]  kasan_save_track+0x20/0x40
[   19.492505]  kasan_save_alloc_info+0x40/0x58
[   19.492597]  __kasan_kmalloc+0xd4/0xd8
[   19.492726]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.492767]  kasan_atomics+0xb8/0x2e0
[   19.493808]  kunit_try_run_case+0x170/0x3f0
[   19.493897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.493944]  kthread+0x328/0x630
[   19.493977]  ret_from_fork+0x10/0x20
[   19.494253] 
[   19.494299] The buggy address belongs to the object at fff00000c5906f00
[   19.494299]  which belongs to the cache kmalloc-64 of size 64
[   19.494360] The buggy address is located 0 bytes to the right of
[   19.494360]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.494426] 
[   19.494454] The buggy address belongs to the physical page:
[   19.494487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.494729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.494785] page_type: f5(slab)
[   19.494999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.495204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.495249] page dumped because: kasan: bad access detected
[   19.495627] 
[   19.495652] Memory state around the buggy address:
[   19.495686]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.495733]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.495778] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.496164]                                      ^
[   19.496331]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.496441]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.496482] ==================================================================
[   19.511434] ==================================================================
[   19.511495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.511548] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.511599] 
[   19.511633] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.511717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.511746] Hardware name: linux,dummy-virt (DT)
[   19.511779] Call trace:
[   19.511803]  show_stack+0x20/0x38 (C)
[   19.511866]  dump_stack_lvl+0x8c/0xd0
[   19.511915]  print_report+0x118/0x608
[   19.511961]  kasan_report+0xdc/0x128
[   19.512008]  kasan_check_range+0x100/0x1a8
[   19.512057]  __kasan_check_write+0x20/0x30
[   19.512103]  kasan_atomics_helper+0x126c/0x4858
[   19.512151]  kasan_atomics+0x198/0x2e0
[   19.512198]  kunit_try_run_case+0x170/0x3f0
[   19.512250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.512304]  kthread+0x328/0x630
[   19.512346]  ret_from_fork+0x10/0x20
[   19.512394] 
[   19.512414] Allocated by task 266:
[   19.512443]  kasan_save_stack+0x3c/0x68
[   19.512484]  kasan_save_track+0x20/0x40
[   19.512522]  kasan_save_alloc_info+0x40/0x58
[   19.512564]  __kasan_kmalloc+0xd4/0xd8
[   19.512600]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.512641]  kasan_atomics+0xb8/0x2e0
[   19.512677]  kunit_try_run_case+0x170/0x3f0
[   19.512718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.512761]  kthread+0x328/0x630
[   19.512795]  ret_from_fork+0x10/0x20
[   19.512835] 
[   19.513806] The buggy address belongs to the object at fff00000c5906f00
[   19.513806]  which belongs to the cache kmalloc-64 of size 64
[   19.514081] The buggy address is located 0 bytes to the right of
[   19.514081]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.514150] 
[   19.514172] The buggy address belongs to the physical page:
[   19.514206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.514260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.514313] page_type: f5(slab)
[   19.514353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.514406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.514449] page dumped because: kasan: bad access detected
[   19.514487] 
[   19.514508] Memory state around the buggy address:
[   19.514541]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.514586]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.514687] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.516268]                                      ^
[   19.516324]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.516369]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.516410] ==================================================================
[   19.473160] ==================================================================
[   19.473222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.473274] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.473571] 
[   19.473699] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.473802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.473860] Hardware name: linux,dummy-virt (DT)
[   19.473896] Call trace:
[   19.473942]  show_stack+0x20/0x38 (C)
[   19.473996]  dump_stack_lvl+0x8c/0xd0
[   19.474054]  print_report+0x118/0x608
[   19.474112]  kasan_report+0xdc/0x128
[   19.474158]  kasan_check_range+0x100/0x1a8
[   19.474208]  __kasan_check_write+0x20/0x30
[   19.474265]  kasan_atomics_helper+0x1128/0x4858
[   19.474313]  kasan_atomics+0x198/0x2e0
[   19.474360]  kunit_try_run_case+0x170/0x3f0
[   19.474409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.474461]  kthread+0x328/0x630
[   19.474504]  ret_from_fork+0x10/0x20
[   19.474551] 
[   19.474815] Allocated by task 266:
[   19.475152]  kasan_save_stack+0x3c/0x68
[   19.475212]  kasan_save_track+0x20/0x40
[   19.475646]  kasan_save_alloc_info+0x40/0x58
[   19.476107]  __kasan_kmalloc+0xd4/0xd8
[   19.476179]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.476221]  kasan_atomics+0xb8/0x2e0
[   19.476477]  kunit_try_run_case+0x170/0x3f0
[   19.476562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.477216]  kthread+0x328/0x630
[   19.477266]  ret_from_fork+0x10/0x20
[   19.477920] 
[   19.477948] The buggy address belongs to the object at fff00000c5906f00
[   19.477948]  which belongs to the cache kmalloc-64 of size 64
[   19.478465] The buggy address is located 0 bytes to the right of
[   19.478465]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.480082] 
[   19.480108] The buggy address belongs to the physical page:
[   19.480141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.480621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.480996] page_type: f5(slab)
[   19.481917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.482157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.482413] page dumped because: kasan: bad access detected
[   19.482449] 
[   19.483043] Memory state around the buggy address:
[   19.483085]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.484033]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.484353] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.484712]                                      ^
[   19.486519]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.486570]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.486610] ==================================================================
[   19.444832] ==================================================================
[   19.444904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.445028] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.445304] 
[   19.445352] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.445680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.445758] Hardware name: linux,dummy-virt (DT)
[   19.445803] Call trace:
[   19.445985]  show_stack+0x20/0x38 (C)
[   19.446213]  dump_stack_lvl+0x8c/0xd0
[   19.446543]  print_report+0x118/0x608
[   19.446705]  kasan_report+0xdc/0x128
[   19.446936]  kasan_check_range+0x100/0x1a8
[   19.447023]  __kasan_check_write+0x20/0x30
[   19.447106]  kasan_atomics_helper+0xf88/0x4858
[   19.447288]  kasan_atomics+0x198/0x2e0
[   19.447369]  kunit_try_run_case+0x170/0x3f0
[   19.447440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.447728]  kthread+0x328/0x630
[   19.447782]  ret_from_fork+0x10/0x20
[   19.447851] 
[   19.447935] Allocated by task 266:
[   19.448180]  kasan_save_stack+0x3c/0x68
[   19.448242]  kasan_save_track+0x20/0x40
[   19.448358]  kasan_save_alloc_info+0x40/0x58
[   19.448433]  __kasan_kmalloc+0xd4/0xd8
[   19.448650]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.448728]  kasan_atomics+0xb8/0x2e0
[   19.449180]  kunit_try_run_case+0x170/0x3f0
[   19.449390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.449509]  kthread+0x328/0x630
[   19.449653]  ret_from_fork+0x10/0x20
[   19.449716] 
[   19.449765] The buggy address belongs to the object at fff00000c5906f00
[   19.449765]  which belongs to the cache kmalloc-64 of size 64
[   19.450048] The buggy address is located 0 bytes to the right of
[   19.450048]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.450146] 
[   19.450175] The buggy address belongs to the physical page:
[   19.450208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.450405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.450876] page_type: f5(slab)
[   19.450953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.451296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.451448] page dumped because: kasan: bad access detected
[   19.451505] 
[   19.451553] Memory state around the buggy address:
[   19.451650]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.451710]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.451772] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.452005]                                      ^
[   19.452130]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.452197]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.452299] ==================================================================
[   19.304676] ==================================================================
[   19.305017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.305177] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.305286] 
[   19.305365] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.305451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.305579] Hardware name: linux,dummy-virt (DT)
[   19.305669] Call trace:
[   19.305695]  show_stack+0x20/0x38 (C)
[   19.305749]  dump_stack_lvl+0x8c/0xd0
[   19.305796]  print_report+0x118/0x608
[   19.306055]  kasan_report+0xdc/0x128
[   19.306259]  kasan_check_range+0x100/0x1a8
[   19.306333]  __kasan_check_write+0x20/0x30
[   19.306442]  kasan_atomics_helper+0x99c/0x4858
[   19.306493]  kasan_atomics+0x198/0x2e0
[   19.306560]  kunit_try_run_case+0x170/0x3f0
[   19.306822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.307119]  kthread+0x328/0x630
[   19.307171]  ret_from_fork+0x10/0x20
[   19.307382] 
[   19.307851] Allocated by task 266:
[   19.307894]  kasan_save_stack+0x3c/0x68
[   19.308139]  kasan_save_track+0x20/0x40
[   19.308308]  kasan_save_alloc_info+0x40/0x58
[   19.308402]  __kasan_kmalloc+0xd4/0xd8
[   19.308635]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.308718]  kasan_atomics+0xb8/0x2e0
[   19.308757]  kunit_try_run_case+0x170/0x3f0
[   19.308966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.309141]  kthread+0x328/0x630
[   19.309180]  ret_from_fork+0x10/0x20
[   19.309392] 
[   19.309519] The buggy address belongs to the object at fff00000c5906f00
[   19.309519]  which belongs to the cache kmalloc-64 of size 64
[   19.309614] The buggy address is located 0 bytes to the right of
[   19.309614]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.309697] 
[   19.309737] The buggy address belongs to the physical page:
[   19.309787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.309850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.309956] page_type: f5(slab)
[   19.310046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.310154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.310288] page dumped because: kasan: bad access detected
[   19.310323] 
[   19.310344] Memory state around the buggy address:
[   19.310377]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.310422]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.310508] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.310693]                                      ^
[   19.310818]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.310893]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.311001] ==================================================================
[   19.602080] ==================================================================
[   19.602130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.602185] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.602236] 
[   19.602267] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.602349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.602390] Hardware name: linux,dummy-virt (DT)
[   19.602423] Call trace:
[   19.602446]  show_stack+0x20/0x38 (C)
[   19.602495]  dump_stack_lvl+0x8c/0xd0
[   19.602543]  print_report+0x118/0x608
[   19.602590]  kasan_report+0xdc/0x128
[   19.602636]  kasan_check_range+0x100/0x1a8
[   19.602686]  __kasan_check_write+0x20/0x30
[   19.602756]  kasan_atomics_helper+0x16d0/0x4858
[   19.602897]  kasan_atomics+0x198/0x2e0
[   19.603023]  kunit_try_run_case+0x170/0x3f0
[   19.603100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.603155]  kthread+0x328/0x630
[   19.603198]  ret_from_fork+0x10/0x20
[   19.603245] 
[   19.603265] Allocated by task 266:
[   19.603294]  kasan_save_stack+0x3c/0x68
[   19.603339]  kasan_save_track+0x20/0x40
[   19.603377]  kasan_save_alloc_info+0x40/0x58
[   19.603428]  __kasan_kmalloc+0xd4/0xd8
[   19.603551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.603599]  kasan_atomics+0xb8/0x2e0
[   19.603637]  kunit_try_run_case+0x170/0x3f0
[   19.603849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.603895]  kthread+0x328/0x630
[   19.603977]  ret_from_fork+0x10/0x20
[   19.604015] 
[   19.604042] The buggy address belongs to the object at fff00000c5906f00
[   19.604042]  which belongs to the cache kmalloc-64 of size 64
[   19.604101] The buggy address is located 0 bytes to the right of
[   19.604101]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.604183] 
[   19.604205] The buggy address belongs to the physical page:
[   19.604237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.604289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.604338] page_type: f5(slab)
[   19.604375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.604426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.604469] page dumped because: kasan: bad access detected
[   19.604502] 
[   19.604522] Memory state around the buggy address:
[   19.604567]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.604613]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.604664] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.604705]                                      ^
[   19.604739]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.604781]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.604867] ==================================================================
[   19.387114] ==================================================================
[   19.387175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.387233] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.387286] 
[   19.387331] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.387416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.387445] Hardware name: linux,dummy-virt (DT)
[   19.387477] Call trace:
[   19.387503]  show_stack+0x20/0x38 (C)
[   19.387552]  dump_stack_lvl+0x8c/0xd0
[   19.387602]  print_report+0x118/0x608
[   19.387649]  kasan_report+0xdc/0x128
[   19.387696]  kasan_check_range+0x100/0x1a8
[   19.387744]  __kasan_check_write+0x20/0x30
[   19.387791]  kasan_atomics_helper+0xd3c/0x4858
[   19.387855]  kasan_atomics+0x198/0x2e0
[   19.387931]  kunit_try_run_case+0x170/0x3f0
[   19.388061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.388146]  kthread+0x328/0x630
[   19.388193]  ret_from_fork+0x10/0x20
[   19.388243] 
[   19.388264] Allocated by task 266:
[   19.388295]  kasan_save_stack+0x3c/0x68
[   19.388347]  kasan_save_track+0x20/0x40
[   19.388388]  kasan_save_alloc_info+0x40/0x58
[   19.388442]  __kasan_kmalloc+0xd4/0xd8
[   19.388483]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.388525]  kasan_atomics+0xb8/0x2e0
[   19.388562]  kunit_try_run_case+0x170/0x3f0
[   19.388602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.388647]  kthread+0x328/0x630
[   19.388681]  ret_from_fork+0x10/0x20
[   19.388719] 
[   19.388741] The buggy address belongs to the object at fff00000c5906f00
[   19.388741]  which belongs to the cache kmalloc-64 of size 64
[   19.388800] The buggy address is located 0 bytes to the right of
[   19.388800]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.388876] 
[   19.389269] The buggy address belongs to the physical page:
[   19.389306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.389389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.389442] page_type: f5(slab)
[   19.389483] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.389532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.389574] page dumped because: kasan: bad access detected
[   19.389612] 
[   19.389633] Memory state around the buggy address:
[   19.389666]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.389726]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.389772] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.389812]                                      ^
[   19.390676]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.390821]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.390897] ==================================================================
[   19.363556] ==================================================================
[   19.364697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   19.364807] Write of size 4 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.364932] 
[   19.364984] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.365069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.365098] Hardware name: linux,dummy-virt (DT)
[   19.365130] Call trace:
[   19.365175]  show_stack+0x20/0x38 (C)
[   19.365265]  dump_stack_lvl+0x8c/0xd0
[   19.365323]  print_report+0x118/0x608
[   19.365517]  kasan_report+0xdc/0x128
[   19.365673]  kasan_check_range+0x100/0x1a8
[   19.365724]  __kasan_check_write+0x20/0x30
[   19.365790]  kasan_atomics_helper+0xca0/0x4858
[   19.365861]  kasan_atomics+0x198/0x2e0
[   19.365910]  kunit_try_run_case+0x170/0x3f0
[   19.365967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.366260]  kasan_save_stack+0x3c/0x68
[   19.366605]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.366648]  kasan_atomics+0xb8/0x2e0
[   19.366686]  kunit_try_run_case+0x170/0x3f0
[   19.368066]  ret_from_fork+0x10/0x20
[   19.368121] 
[   19.368143] The buggy address belongs to the object at fff00000c5906f00
[   19.368143]  which belongs to the cache kmalloc-64 of size 64
[   19.368205] The buggy address is located 0 bytes to the right of
[   19.368205]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.368272] 
[   19.368300] The buggy address belongs to the physical page:
[   19.368332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.368392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.368443] page_type: f5(slab)
[   19.368481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.368533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.368575] page dumped because: kasan: bad access detected
[   19.368608] 
[   19.368628] Memory state around the buggy address:
[   19.368659]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.368704]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.368748] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.368788]                                      ^
[   19.368822]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.368927]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.368968] ==================================================================
[   19.457609] ==================================================================
[   19.457673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.457725] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.457776] 
[   19.457806] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.457902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.457933] Hardware name: linux,dummy-virt (DT)
[   19.458484] Call trace:
[   19.458575]  show_stack+0x20/0x38 (C)
[   19.458668]  dump_stack_lvl+0x8c/0xd0
[   19.459077]  print_report+0x118/0x608
[   19.459277]  kasan_report+0xdc/0x128
[   19.459416]  kasan_check_range+0x100/0x1a8
[   19.459537]  __kasan_check_write+0x20/0x30
[   19.459716]  kasan_atomics_helper+0x1058/0x4858
[   19.459856]  kasan_atomics+0x198/0x2e0
[   19.459908]  kunit_try_run_case+0x170/0x3f0
[   19.459955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.460039]  kthread+0x328/0x630
[   19.460218]  ret_from_fork+0x10/0x20
[   19.460353] 
[   19.460445] Allocated by task 266:
[   19.460817]  kasan_save_stack+0x3c/0x68
[   19.460872]  kasan_save_track+0x20/0x40
[   19.460942]  kasan_save_alloc_info+0x40/0x58
[   19.460986]  __kasan_kmalloc+0xd4/0xd8
[   19.461024]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.461787]  kasan_atomics+0xb8/0x2e0
[   19.462181]  kunit_try_run_case+0x170/0x3f0
[   19.462286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.462829]  kthread+0x328/0x630
[   19.462910]  ret_from_fork+0x10/0x20
[   19.462985] 
[   19.463035] The buggy address belongs to the object at fff00000c5906f00
[   19.463035]  which belongs to the cache kmalloc-64 of size 64
[   19.463111] The buggy address is located 0 bytes to the right of
[   19.463111]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.463197] 
[   19.463221] The buggy address belongs to the physical page:
[   19.463254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.463543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.463693] page_type: f5(slab)
[   19.463756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.464023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.464102] page dumped because: kasan: bad access detected
[   19.464195] 
[   19.464245] Memory state around the buggy address:
[   19.464315]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.464417]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.464500] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.464545]                                      ^
[   19.464580]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.464624]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.464917] ==================================================================
[   19.516625] ==================================================================
[   19.516681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.516730] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.516780] 
[   19.516813] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.516912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.516939] Hardware name: linux,dummy-virt (DT)
[   19.516972] Call trace:
[   19.517240]  show_stack+0x20/0x38 (C)
[   19.517300]  dump_stack_lvl+0x8c/0xd0
[   19.517350]  print_report+0x118/0x608
[   19.517507]  kasan_report+0xdc/0x128
[   19.517566]  kasan_check_range+0x100/0x1a8
[   19.517614]  __kasan_check_write+0x20/0x30
[   19.517668]  kasan_atomics_helper+0x12d8/0x4858
[   19.517717]  kasan_atomics+0x198/0x2e0
[   19.517763]  kunit_try_run_case+0x170/0x3f0
[   19.517813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.517878]  kthread+0x328/0x630
[   19.517926]  ret_from_fork+0x10/0x20
[   19.517987] 
[   19.518008] Allocated by task 266:
[   19.518037]  kasan_save_stack+0x3c/0x68
[   19.518201]  kasan_save_track+0x20/0x40
[   19.518337]  kasan_save_alloc_info+0x40/0x58
[   19.518398]  __kasan_kmalloc+0xd4/0xd8
[   19.518436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.518476]  kasan_atomics+0xb8/0x2e0
[   19.518512]  kunit_try_run_case+0x170/0x3f0
[   19.518553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.518596]  kthread+0x328/0x630
[   19.518632]  ret_from_fork+0x10/0x20
[   19.518669] 
[   19.518716] The buggy address belongs to the object at fff00000c5906f00
[   19.518716]  which belongs to the cache kmalloc-64 of size 64
[   19.518809] The buggy address is located 0 bytes to the right of
[   19.518809]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.518916] 
[   19.518972] The buggy address belongs to the physical page:
[   19.519013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.520551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.520899] page_type: f5(slab)
[   19.520949] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.521262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.521384] page dumped because: kasan: bad access detected
[   19.521448] 
[   19.521476] Memory state around the buggy address:
[   19.521663]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.521881]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.521926] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.521968]                                      ^
[   19.522004]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.522047]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.522134] ==================================================================
[   19.570547] ==================================================================
[   19.570788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.571257] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.571395] 
[   19.571491] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.571573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.571603] Hardware name: linux,dummy-virt (DT)
[   19.571637] Call trace:
[   19.571668]  show_stack+0x20/0x38 (C)
[   19.571720]  dump_stack_lvl+0x8c/0xd0
[   19.571791]  print_report+0x118/0x608
[   19.571850]  kasan_report+0xdc/0x128
[   19.571922]  kasan_check_range+0x100/0x1a8
[   19.571972]  __kasan_check_write+0x20/0x30
[   19.572438]  kasan_atomics_helper+0x14e4/0x4858
[   19.572616]  kasan_atomics+0x198/0x2e0
[   19.572663]  kunit_try_run_case+0x170/0x3f0
[   19.572710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.573501]  kthread+0x328/0x630
[   19.573551]  ret_from_fork+0x10/0x20
[   19.573598] 
[   19.573672] Allocated by task 266:
[   19.574625]  kasan_save_stack+0x3c/0x68
[   19.574674]  kasan_save_track+0x20/0x40
[   19.574713]  kasan_save_alloc_info+0x40/0x58
[   19.574812]  __kasan_kmalloc+0xd4/0xd8
[   19.574861]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.574900]  kasan_atomics+0xb8/0x2e0
[   19.574938]  kunit_try_run_case+0x170/0x3f0
[   19.574976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.575028]  kthread+0x328/0x630
[   19.575082]  ret_from_fork+0x10/0x20
[   19.575132] 
[   19.575154] The buggy address belongs to the object at fff00000c5906f00
[   19.575154]  which belongs to the cache kmalloc-64 of size 64
[   19.575214] The buggy address is located 0 bytes to the right of
[   19.575214]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.575278] 
[   19.575327] The buggy address belongs to the physical page:
[   19.575367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.575419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.575468] page_type: f5(slab)
[   19.575507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.575560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.575602] page dumped because: kasan: bad access detected
[   19.575639] 
[   19.575660] Memory state around the buggy address:
[   19.575692]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.575737]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.575782] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.575822]                                      ^
[   19.575863]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.575907]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.575945] ==================================================================
[   19.605137] ==================================================================
[   19.605183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.605229] Read of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.605279] 
[   19.605309] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.605389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.605418] Hardware name: linux,dummy-virt (DT)
[   19.605450] Call trace:
[   19.605472]  show_stack+0x20/0x38 (C)
[   19.605553]  dump_stack_lvl+0x8c/0xd0
[   19.605749]  print_report+0x118/0x608
[   19.605799]  kasan_report+0xdc/0x128
[   19.605857]  __asan_report_load8_noabort+0x20/0x30
[   19.605919]  kasan_atomics_helper+0x3e10/0x4858
[   19.605968]  kasan_atomics+0x198/0x2e0
[   19.606016]  kunit_try_run_case+0x170/0x3f0
[   19.606065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.606118]  kthread+0x328/0x630
[   19.606168]  ret_from_fork+0x10/0x20
[   19.606217] 
[   19.606249] Allocated by task 266:
[   19.606289]  kasan_save_stack+0x3c/0x68
[   19.606330]  kasan_save_track+0x20/0x40
[   19.606368]  kasan_save_alloc_info+0x40/0x58
[   19.606735]  __kasan_kmalloc+0xd4/0xd8
[   19.606889]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.606954]  kasan_atomics+0xb8/0x2e0
[   19.607075]  kunit_try_run_case+0x170/0x3f0
[   19.607482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.607550]  kthread+0x328/0x630
[   19.607639]  ret_from_fork+0x10/0x20
[   19.607685] 
[   19.607732] The buggy address belongs to the object at fff00000c5906f00
[   19.607732]  which belongs to the cache kmalloc-64 of size 64
[   19.607855] The buggy address is located 0 bytes to the right of
[   19.607855]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.607930] 
[   19.608026] The buggy address belongs to the physical page:
[   19.608150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.608204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.608254] page_type: f5(slab)
[   19.608291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.608344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.608387] page dumped because: kasan: bad access detected
[   19.608421] 
[   19.608440] Memory state around the buggy address:
[   19.608471]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.608516]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.608567] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.608608]                                      ^
[   19.608679]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.608852]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.608891] ==================================================================
[   19.412474] ==================================================================
[   19.412544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.412598] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.412649] 
[   19.412680] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.414808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.414853] Hardware name: linux,dummy-virt (DT)
[   19.414888] Call trace:
[   19.414912]  show_stack+0x20/0x38 (C)
[   19.414968]  dump_stack_lvl+0x8c/0xd0
[   19.415015]  print_report+0x118/0x608
[   19.415064]  kasan_report+0xdc/0x128
[   19.415109]  kasan_check_range+0x100/0x1a8
[   19.415159]  __kasan_check_write+0x20/0x30
[   19.415205]  kasan_atomics_helper+0xe44/0x4858
[   19.415255]  kasan_atomics+0x198/0x2e0
[   19.415300]  kunit_try_run_case+0x170/0x3f0
[   19.415356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.415409]  kthread+0x328/0x630
[   19.415455]  ret_from_fork+0x10/0x20
[   19.415502] 
[   19.415523] Allocated by task 266:
[   19.415551]  kasan_save_stack+0x3c/0x68
[   19.415594]  kasan_save_track+0x20/0x40
[   19.415634]  kasan_save_alloc_info+0x40/0x58
[   19.415677]  __kasan_kmalloc+0xd4/0xd8
[   19.415716]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.415756]  kasan_atomics+0xb8/0x2e0
[   19.415794]  kunit_try_run_case+0x170/0x3f0
[   19.415834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.415898]  kthread+0x328/0x630
[   19.415931]  ret_from_fork+0x10/0x20
[   19.416223] 
[   19.416540] The buggy address belongs to the object at fff00000c5906f00
[   19.416540]  which belongs to the cache kmalloc-64 of size 64
[   19.417871] The buggy address is located 0 bytes to the right of
[   19.417871]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.417943] 
[   19.417965] The buggy address belongs to the physical page:
[   19.418576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.418683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.419026] page_type: f5(slab)
[   19.419168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.419274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.419327] page dumped because: kasan: bad access detected
[   19.419572] 
[   19.419597] Memory state around the buggy address:
[   19.419635]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.419679]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.420009] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.420096]                                      ^
[   19.420199]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.420451]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.420520] ==================================================================
[   19.557320] ==================================================================
[   19.557367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.557414] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.557465] 
[   19.557497] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.557579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.557606] Hardware name: linux,dummy-virt (DT)
[   19.557639] Call trace:
[   19.558030]  show_stack+0x20/0x38 (C)
[   19.558218]  dump_stack_lvl+0x8c/0xd0
[   19.558379]  print_report+0x118/0x608
[   19.558427]  kasan_report+0xdc/0x128
[   19.558475]  kasan_check_range+0x100/0x1a8
[   19.558523]  __kasan_check_write+0x20/0x30
[   19.558569]  kasan_atomics_helper+0x1414/0x4858
[   19.558627]  kasan_atomics+0x198/0x2e0
[   19.558675]  kunit_try_run_case+0x170/0x3f0
[   19.559005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.559242]  kthread+0x328/0x630
[   19.559354]  ret_from_fork+0x10/0x20
[   19.559424] 
[   19.559540] Allocated by task 266:
[   19.559569]  kasan_save_stack+0x3c/0x68
[   19.559632]  kasan_save_track+0x20/0x40
[   19.559804]  kasan_save_alloc_info+0x40/0x58
[   19.559885]  __kasan_kmalloc+0xd4/0xd8
[   19.559923]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.560041]  kasan_atomics+0xb8/0x2e0
[   19.560078]  kunit_try_run_case+0x170/0x3f0
[   19.560119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.560368]  kthread+0x328/0x630
[   19.560412]  ret_from_fork+0x10/0x20
[   19.561093] 
[   19.561148] The buggy address belongs to the object at fff00000c5906f00
[   19.561148]  which belongs to the cache kmalloc-64 of size 64
[   19.561221] The buggy address is located 0 bytes to the right of
[   19.561221]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.561356] 
[   19.561379] The buggy address belongs to the physical page:
[   19.561413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.561807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.561880] page_type: f5(slab)
[   19.561946] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.562206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.562532] page dumped because: kasan: bad access detected
[   19.562616] 
[   19.562638] Memory state around the buggy address:
[   19.562673]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.563652]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.563701] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.564201]                                      ^
[   19.564242]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.564288]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.564375] ==================================================================
[   19.437687] ==================================================================
[   19.437745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.437797] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.437863] 
[   19.437907] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.438013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.438042] Hardware name: linux,dummy-virt (DT)
[   19.438084] Call trace:
[   19.438109]  show_stack+0x20/0x38 (C)
[   19.438157]  dump_stack_lvl+0x8c/0xd0
[   19.438207]  print_report+0x118/0x608
[   19.438262]  kasan_report+0xdc/0x128
[   19.438308]  kasan_check_range+0x100/0x1a8
[   19.438358]  __kasan_check_write+0x20/0x30
[   19.438408]  kasan_atomics_helper+0xf20/0x4858
[   19.438458]  kasan_atomics+0x198/0x2e0
[   19.438504]  kunit_try_run_case+0x170/0x3f0
[   19.438553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.438625]  kthread+0x328/0x630
[   19.438669]  ret_from_fork+0x10/0x20
[   19.438733] 
[   19.438782] Allocated by task 266:
[   19.438811]  kasan_save_stack+0x3c/0x68
[   19.439109]  kasan_save_track+0x20/0x40
[   19.440237]  kasan_save_alloc_info+0x40/0x58
[   19.440303]  __kasan_kmalloc+0xd4/0xd8
[   19.440464]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.440658]  kasan_atomics+0xb8/0x2e0
[   19.440729]  kunit_try_run_case+0x170/0x3f0
[   19.440903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.440995]  kthread+0x328/0x630
[   19.441062]  ret_from_fork+0x10/0x20
[   19.441216] 
[   19.441295] The buggy address belongs to the object at fff00000c5906f00
[   19.441295]  which belongs to the cache kmalloc-64 of size 64
[   19.441394] The buggy address is located 0 bytes to the right of
[   19.441394]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.441565] 
[   19.441618] The buggy address belongs to the physical page:
[   19.441651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.441900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.441962] page_type: f5(slab)
[   19.442004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.442062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.442104] page dumped because: kasan: bad access detected
[   19.442139] 
[   19.442159] Memory state around the buggy address:
[   19.442193]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.442240]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.442283] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.442323]                                      ^
[   19.442356]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.442401]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.442440] ==================================================================
[   19.427323] ==================================================================
[   19.427405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.427476] Write of size 8 at addr fff00000c5906f30 by task kunit_try_catch/266
[   19.427546] 
[   19.427668] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.427895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.428005] Hardware name: linux,dummy-virt (DT)
[   19.428087] Call trace:
[   19.428201]  show_stack+0x20/0x38 (C)
[   19.428257]  dump_stack_lvl+0x8c/0xd0
[   19.428331]  print_report+0x118/0x608
[   19.428380]  kasan_report+0xdc/0x128
[   19.428453]  kasan_check_range+0x100/0x1a8
[   19.428808]  __kasan_check_write+0x20/0x30
[   19.430041]  kasan_atomics_helper+0xeb8/0x4858
[   19.430402]  kasan_atomics+0x198/0x2e0
[   19.431613]  kunit_try_run_case+0x170/0x3f0
[   19.431814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.431916]  kthread+0x328/0x630
[   19.432110]  ret_from_fork+0x10/0x20
[   19.432190] 
[   19.432212] Allocated by task 266:
[   19.432461]  kasan_save_stack+0x3c/0x68
[   19.432516]  kasan_save_track+0x20/0x40
[   19.432562]  kasan_save_alloc_info+0x40/0x58
[   19.432791]  __kasan_kmalloc+0xd4/0xd8
[   19.432913]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.433154]  kasan_atomics+0xb8/0x2e0
[   19.433287]  kunit_try_run_case+0x170/0x3f0
[   19.433474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.433551]  kthread+0x328/0x630
[   19.433825]  ret_from_fork+0x10/0x20
[   19.433922] 
[   19.434190] The buggy address belongs to the object at fff00000c5906f00
[   19.434190]  which belongs to the cache kmalloc-64 of size 64
[   19.434276] The buggy address is located 0 bytes to the right of
[   19.434276]  allocated 48-byte region [fff00000c5906f00, fff00000c5906f30)
[   19.434583] 
[   19.434656] The buggy address belongs to the physical page:
[   19.434728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.434919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.434998] page_type: f5(slab)
[   19.435079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.435141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.435187] page dumped because: kasan: bad access detected
[   19.435452] 
[   19.435476] Memory state around the buggy address:
[   19.435554]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.435623]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.435687] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.435906]                                      ^
[   19.436059]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.436137]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.436271] ==================================================================
[   19.183648] ==================================================================
[   19.183702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   19.183934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.184677]  kasan_save_stack+0x3c/0x68
[   19.184718]  kasan_save_track+0x20/0x40
[   19.184806]  __kasan_kmalloc+0xd4/0xd8
[   19.184894]  kasan_atomics+0xb8/0x2e0
[   19.189229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.190811] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.192011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.192949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.193017]  kthread+0x328/0x630
[   19.193062]  ret_from_fork+0x10/0x20
[   19.193129] 
[   19.193223]  kasan_save_stack+0x3c/0x68
[   19.193526]  kasan_atomics+0xb8/0x2e0
[   19.194273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906
[   19.194326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.194414] page_type: f5(slab)
[   19.194465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.194518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.194576] page dumped because: kasan: bad access detected
[   19.194629] 
[   19.194649] Memory state around the buggy address:
[   19.194682]  fff00000c5906e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.194815]  fff00000c5906e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.195192] >fff00000c5906f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.195395]                                      ^
[   19.195548]  fff00000c5906f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.195655]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.195777] ==================================================================

[   16.180098] ==================================================================
[   16.180451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.180824] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.181265] 
[   16.181387] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.181431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.181444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.181464] Call Trace:
[   16.181480]  <TASK>
[   16.181497]  dump_stack_lvl+0x73/0xb0
[   16.181529]  print_report+0xd1/0x650
[   16.181552]  ? __virt_addr_valid+0x1db/0x2d0
[   16.181576]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.181599]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.181623]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.181646]  kasan_report+0x141/0x180
[   16.181670]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.181698]  kasan_check_range+0x10c/0x1c0
[   16.181724]  __kasan_check_write+0x18/0x20
[   16.181766]  kasan_atomics_helper+0x20c8/0x5450
[   16.181791]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.181815]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.181841]  ? kasan_atomics+0x152/0x310
[   16.181869]  kasan_atomics+0x1dc/0x310
[   16.181893]  ? __pfx_kasan_atomics+0x10/0x10
[   16.181928]  ? __pfx_read_tsc+0x10/0x10
[   16.181950]  ? ktime_get_ts64+0x86/0x230
[   16.181975]  kunit_try_run_case+0x1a5/0x480
[   16.182000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.182025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.182051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.182077]  ? __kthread_parkme+0x82/0x180
[   16.182098]  ? preempt_count_sub+0x50/0x80
[   16.182123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.182150]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.182175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.182201]  kthread+0x337/0x6f0
[   16.182221]  ? trace_preempt_on+0x20/0xc0
[   16.182245]  ? __pfx_kthread+0x10/0x10
[   16.182266]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.182289]  ? calculate_sigpending+0x7b/0xa0
[   16.182314]  ? __pfx_kthread+0x10/0x10
[   16.182337]  ret_from_fork+0x116/0x1d0
[   16.182356]  ? __pfx_kthread+0x10/0x10
[   16.182378]  ret_from_fork_asm+0x1a/0x30
[   16.182411]  </TASK>
[   16.182422] 
[   16.189852] Allocated by task 282:
[   16.190026]  kasan_save_stack+0x45/0x70
[   16.190192]  kasan_save_track+0x18/0x40
[   16.190392]  kasan_save_alloc_info+0x3b/0x50
[   16.190588]  __kasan_kmalloc+0xb7/0xc0
[   16.190759]  __kmalloc_cache_noprof+0x189/0x420
[   16.190998]  kasan_atomics+0x95/0x310
[   16.191164]  kunit_try_run_case+0x1a5/0x480
[   16.191329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.191505]  kthread+0x337/0x6f0
[   16.191626]  ret_from_fork+0x116/0x1d0
[   16.191784]  ret_from_fork_asm+0x1a/0x30
[   16.191933] 
[   16.192003] The buggy address belongs to the object at ffff888102a1a680
[   16.192003]  which belongs to the cache kmalloc-64 of size 64
[   16.192371] The buggy address is located 0 bytes to the right of
[   16.192371]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.192944] 
[   16.193041] The buggy address belongs to the physical page:
[   16.193294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.193648] flags: 0x200000000000000(node=0|zone=2)
[   16.193894] page_type: f5(slab)
[   16.194022] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.194254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.194482] page dumped because: kasan: bad access detected
[   16.194659] 
[   16.194727] Memory state around the buggy address:
[   16.194965]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.195293]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.195626] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.195983]                                      ^
[   16.196214]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.196542]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.196888] ==================================================================
[   15.699838] ==================================================================
[   15.700570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.701272] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.701934] 
[   15.702153] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.702195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.702207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.702229] Call Trace:
[   15.702244]  <TASK>
[   15.702261]  dump_stack_lvl+0x73/0xb0
[   15.702291]  print_report+0xd1/0x650
[   15.702313]  ? __virt_addr_valid+0x1db/0x2d0
[   15.702337]  ? kasan_atomics_helper+0x1467/0x5450
[   15.702359]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.702385]  ? kasan_atomics_helper+0x1467/0x5450
[   15.702408]  kasan_report+0x141/0x180
[   15.702431]  ? kasan_atomics_helper+0x1467/0x5450
[   15.702459]  kasan_check_range+0x10c/0x1c0
[   15.702483]  __kasan_check_write+0x18/0x20
[   15.702508]  kasan_atomics_helper+0x1467/0x5450
[   15.702532]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.702556]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.702582]  ? kasan_atomics+0x152/0x310
[   15.702610]  kasan_atomics+0x1dc/0x310
[   15.702633]  ? __pfx_kasan_atomics+0x10/0x10
[   15.702659]  ? __pfx_read_tsc+0x10/0x10
[   15.702680]  ? ktime_get_ts64+0x86/0x230
[   15.702705]  kunit_try_run_case+0x1a5/0x480
[   15.702731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.702765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.702790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.702816]  ? __kthread_parkme+0x82/0x180
[   15.702838]  ? preempt_count_sub+0x50/0x80
[   15.702863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.702889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.702915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.702954]  kthread+0x337/0x6f0
[   15.702973]  ? trace_preempt_on+0x20/0xc0
[   15.702998]  ? __pfx_kthread+0x10/0x10
[   15.703019]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.703042]  ? calculate_sigpending+0x7b/0xa0
[   15.703066]  ? __pfx_kthread+0x10/0x10
[   15.703089]  ret_from_fork+0x116/0x1d0
[   15.703109]  ? __pfx_kthread+0x10/0x10
[   15.703131]  ret_from_fork_asm+0x1a/0x30
[   15.703164]  </TASK>
[   15.703175] 
[   15.710567] Allocated by task 282:
[   15.710696]  kasan_save_stack+0x45/0x70
[   15.710906]  kasan_save_track+0x18/0x40
[   15.711109]  kasan_save_alloc_info+0x3b/0x50
[   15.711425]  __kasan_kmalloc+0xb7/0xc0
[   15.711611]  __kmalloc_cache_noprof+0x189/0x420
[   15.711893]  kasan_atomics+0x95/0x310
[   15.712041]  kunit_try_run_case+0x1a5/0x480
[   15.712190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.712447]  kthread+0x337/0x6f0
[   15.712616]  ret_from_fork+0x116/0x1d0
[   15.712825]  ret_from_fork_asm+0x1a/0x30
[   15.713033] 
[   15.713108] The buggy address belongs to the object at ffff888102a1a680
[   15.713108]  which belongs to the cache kmalloc-64 of size 64
[   15.713575] The buggy address is located 0 bytes to the right of
[   15.713575]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.714099] 
[   15.714186] The buggy address belongs to the physical page:
[   15.714408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.714721] flags: 0x200000000000000(node=0|zone=2)
[   15.714912] page_type: f5(slab)
[   15.715083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.715385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.715610] page dumped because: kasan: bad access detected
[   15.715780] 
[   15.715849] Memory state around the buggy address:
[   15.716011]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.716268]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.716873] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.717204]                                      ^
[   15.717428]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.717743]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.718066] ==================================================================
[   15.882286] ==================================================================
[   15.882634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.882999] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.883250] 
[   15.883357] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.883399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.883426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.883447] Call Trace:
[   15.883462]  <TASK>
[   15.883479]  dump_stack_lvl+0x73/0xb0
[   15.883507]  print_report+0xd1/0x650
[   15.883529]  ? __virt_addr_valid+0x1db/0x2d0
[   15.883552]  ? kasan_atomics_helper+0x194a/0x5450
[   15.883575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.883599]  ? kasan_atomics_helper+0x194a/0x5450
[   15.883623]  kasan_report+0x141/0x180
[   15.883646]  ? kasan_atomics_helper+0x194a/0x5450
[   15.883674]  kasan_check_range+0x10c/0x1c0
[   15.883699]  __kasan_check_write+0x18/0x20
[   15.883719]  kasan_atomics_helper+0x194a/0x5450
[   15.883742]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.883778]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.883804]  ? kasan_atomics+0x152/0x310
[   15.883831]  kasan_atomics+0x1dc/0x310
[   15.883855]  ? __pfx_kasan_atomics+0x10/0x10
[   15.883880]  ? __pfx_read_tsc+0x10/0x10
[   15.883902]  ? ktime_get_ts64+0x86/0x230
[   15.883936]  kunit_try_run_case+0x1a5/0x480
[   15.883962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.883985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.884010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.884035]  ? __kthread_parkme+0x82/0x180
[   15.884056]  ? preempt_count_sub+0x50/0x80
[   15.884081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.884106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.884131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.884157]  kthread+0x337/0x6f0
[   15.884177]  ? trace_preempt_on+0x20/0xc0
[   15.884201]  ? __pfx_kthread+0x10/0x10
[   15.884222]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.884245]  ? calculate_sigpending+0x7b/0xa0
[   15.884270]  ? __pfx_kthread+0x10/0x10
[   15.884293]  ret_from_fork+0x116/0x1d0
[   15.884312]  ? __pfx_kthread+0x10/0x10
[   15.884333]  ret_from_fork_asm+0x1a/0x30
[   15.884366]  </TASK>
[   15.884377] 
[   15.892991] Allocated by task 282:
[   15.893192]  kasan_save_stack+0x45/0x70
[   15.893395]  kasan_save_track+0x18/0x40
[   15.893583]  kasan_save_alloc_info+0x3b/0x50
[   15.893848]  __kasan_kmalloc+0xb7/0xc0
[   15.894025]  __kmalloc_cache_noprof+0x189/0x420
[   15.894218]  kasan_atomics+0x95/0x310
[   15.894429]  kunit_try_run_case+0x1a5/0x480
[   15.894645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.894899]  kthread+0x337/0x6f0
[   15.895074]  ret_from_fork+0x116/0x1d0
[   15.895262]  ret_from_fork_asm+0x1a/0x30
[   15.895473] 
[   15.895542] The buggy address belongs to the object at ffff888102a1a680
[   15.895542]  which belongs to the cache kmalloc-64 of size 64
[   15.896143] The buggy address is located 0 bytes to the right of
[   15.896143]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.896497] 
[   15.896912] The buggy address belongs to the physical page:
[   15.897189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.897525] flags: 0x200000000000000(node=0|zone=2)
[   15.897743] page_type: f5(slab)
[   15.898655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.901682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.901973] page dumped because: kasan: bad access detected
[   15.902145] 
[   15.902281] Memory state around the buggy address:
[   15.902461]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.902681]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.903183] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.903901]                                      ^
[   15.904672]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.905023]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.905342] ==================================================================
[   15.948338] ==================================================================
[   15.949748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.950284] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.950999] 
[   15.951171] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.951217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.951230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.951252] Call Trace:
[   15.951267]  <TASK>
[   15.951283]  dump_stack_lvl+0x73/0xb0
[   15.951345]  print_report+0xd1/0x650
[   15.951368]  ? __virt_addr_valid+0x1db/0x2d0
[   15.951393]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.951427]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.951452]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.951475]  kasan_report+0x141/0x180
[   15.951499]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.951527]  kasan_check_range+0x10c/0x1c0
[   15.951552]  __kasan_check_write+0x18/0x20
[   15.951572]  kasan_atomics_helper+0x1b22/0x5450
[   15.951596]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.951621]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.951648]  ? kasan_atomics+0x152/0x310
[   15.951675]  kasan_atomics+0x1dc/0x310
[   15.951699]  ? __pfx_kasan_atomics+0x10/0x10
[   15.951724]  ? __pfx_read_tsc+0x10/0x10
[   15.951745]  ? ktime_get_ts64+0x86/0x230
[   15.951780]  kunit_try_run_case+0x1a5/0x480
[   15.951806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.951830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.951856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.951883]  ? __kthread_parkme+0x82/0x180
[   15.951906]  ? preempt_count_sub+0x50/0x80
[   15.951945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.951970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.951995]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.952022]  kthread+0x337/0x6f0
[   15.952041]  ? trace_preempt_on+0x20/0xc0
[   15.952066]  ? __pfx_kthread+0x10/0x10
[   15.952090]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.952112]  ? calculate_sigpending+0x7b/0xa0
[   15.952137]  ? __pfx_kthread+0x10/0x10
[   15.952160]  ret_from_fork+0x116/0x1d0
[   15.952179]  ? __pfx_kthread+0x10/0x10
[   15.952201]  ret_from_fork_asm+0x1a/0x30
[   15.952235]  </TASK>
[   15.952246] 
[   15.961128] Allocated by task 282:
[   15.961322]  kasan_save_stack+0x45/0x70
[   15.961530]  kasan_save_track+0x18/0x40
[   15.961720]  kasan_save_alloc_info+0x3b/0x50
[   15.961968]  __kasan_kmalloc+0xb7/0xc0
[   15.962194]  __kmalloc_cache_noprof+0x189/0x420
[   15.962349]  kasan_atomics+0x95/0x310
[   15.962481]  kunit_try_run_case+0x1a5/0x480
[   15.962687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.963076]  kthread+0x337/0x6f0
[   15.963330]  ret_from_fork+0x116/0x1d0
[   15.963570]  ret_from_fork_asm+0x1a/0x30
[   15.963883] 
[   15.963966] The buggy address belongs to the object at ffff888102a1a680
[   15.963966]  which belongs to the cache kmalloc-64 of size 64
[   15.964489] The buggy address is located 0 bytes to the right of
[   15.964489]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.965019] 
[   15.965116] The buggy address belongs to the physical page:
[   15.965370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.965741] flags: 0x200000000000000(node=0|zone=2)
[   15.965999] page_type: f5(slab)
[   15.966166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.966487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.966913] page dumped because: kasan: bad access detected
[   15.967182] 
[   15.967304] Memory state around the buggy address:
[   15.967532]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.967869]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.968254] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.968584]                                      ^
[   15.968799]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.969116]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.969547] ==================================================================
[   16.125467] ==================================================================
[   16.125808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.126177] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.126485] 
[   16.126590] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.126634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.126647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.126669] Call Trace:
[   16.126686]  <TASK>
[   16.126702]  dump_stack_lvl+0x73/0xb0
[   16.126733]  print_report+0xd1/0x650
[   16.126768]  ? __virt_addr_valid+0x1db/0x2d0
[   16.126793]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.126816]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.126841]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.126865]  kasan_report+0x141/0x180
[   16.126888]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.126917]  __asan_report_load8_noabort+0x18/0x20
[   16.126955]  kasan_atomics_helper+0x4f71/0x5450
[   16.126980]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.127007]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.127033]  ? kasan_atomics+0x152/0x310
[   16.127062]  kasan_atomics+0x1dc/0x310
[   16.127086]  ? __pfx_kasan_atomics+0x10/0x10
[   16.127112]  ? __pfx_read_tsc+0x10/0x10
[   16.127136]  ? ktime_get_ts64+0x86/0x230
[   16.127161]  kunit_try_run_case+0x1a5/0x480
[   16.127187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.127212]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.127238]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.127264]  ? __kthread_parkme+0x82/0x180
[   16.127286]  ? preempt_count_sub+0x50/0x80
[   16.127311]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.127337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.127363]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.127391]  kthread+0x337/0x6f0
[   16.127411]  ? trace_preempt_on+0x20/0xc0
[   16.127437]  ? __pfx_kthread+0x10/0x10
[   16.127459]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.127482]  ? calculate_sigpending+0x7b/0xa0
[   16.127507]  ? __pfx_kthread+0x10/0x10
[   16.127530]  ret_from_fork+0x116/0x1d0
[   16.127550]  ? __pfx_kthread+0x10/0x10
[   16.127572]  ret_from_fork_asm+0x1a/0x30
[   16.127608]  </TASK>
[   16.127619] 
[   16.134750] Allocated by task 282:
[   16.134965]  kasan_save_stack+0x45/0x70
[   16.135159]  kasan_save_track+0x18/0x40
[   16.135351]  kasan_save_alloc_info+0x3b/0x50
[   16.135560]  __kasan_kmalloc+0xb7/0xc0
[   16.135746]  __kmalloc_cache_noprof+0x189/0x420
[   16.135916]  kasan_atomics+0x95/0x310
[   16.136091]  kunit_try_run_case+0x1a5/0x480
[   16.136239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.136417]  kthread+0x337/0x6f0
[   16.136538]  ret_from_fork+0x116/0x1d0
[   16.136680]  ret_from_fork_asm+0x1a/0x30
[   16.136901] 
[   16.137005] The buggy address belongs to the object at ffff888102a1a680
[   16.137005]  which belongs to the cache kmalloc-64 of size 64
[   16.137461] The buggy address is located 0 bytes to the right of
[   16.137461]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.138000] 
[   16.138075] The buggy address belongs to the physical page:
[   16.138301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.138624] flags: 0x200000000000000(node=0|zone=2)
[   16.138868] page_type: f5(slab)
[   16.139025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.139341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.139612] page dumped because: kasan: bad access detected
[   16.139882] 
[   16.139983] Memory state around the buggy address:
[   16.140185]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.140460]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.140790] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.141052]                                      ^
[   16.141275]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.141514]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.141726] ==================================================================
[   15.194609] ==================================================================
[   15.195217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.195479] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.195850] 
[   15.195949] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.195992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.196005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.196026] Call Trace:
[   15.196040]  <TASK>
[   15.196055]  dump_stack_lvl+0x73/0xb0
[   15.196086]  print_report+0xd1/0x650
[   15.196109]  ? __virt_addr_valid+0x1db/0x2d0
[   15.196132]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.196206]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.196231]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.196254]  kasan_report+0x141/0x180
[   15.196421]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.196451]  kasan_check_range+0x10c/0x1c0
[   15.196476]  __kasan_check_write+0x18/0x20
[   15.196497]  kasan_atomics_helper+0xa2b/0x5450
[   15.196521]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.196546]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.196572]  ? kasan_atomics+0x152/0x310
[   15.196613]  kasan_atomics+0x1dc/0x310
[   15.196637]  ? __pfx_kasan_atomics+0x10/0x10
[   15.196675]  ? __pfx_read_tsc+0x10/0x10
[   15.196696]  ? ktime_get_ts64+0x86/0x230
[   15.196721]  kunit_try_run_case+0x1a5/0x480
[   15.196747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.196791]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.196817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.196853]  ? __kthread_parkme+0x82/0x180
[   15.196875]  ? preempt_count_sub+0x50/0x80
[   15.196902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.196941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.196969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.196995]  kthread+0x337/0x6f0
[   15.197073]  ? trace_preempt_on+0x20/0xc0
[   15.197102]  ? __pfx_kthread+0x10/0x10
[   15.197124]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.197147]  ? calculate_sigpending+0x7b/0xa0
[   15.197182]  ? __pfx_kthread+0x10/0x10
[   15.197205]  ret_from_fork+0x116/0x1d0
[   15.197225]  ? __pfx_kthread+0x10/0x10
[   15.197258]  ret_from_fork_asm+0x1a/0x30
[   15.197291]  </TASK>
[   15.197302] 
[   15.205973] Allocated by task 282:
[   15.206115]  kasan_save_stack+0x45/0x70
[   15.206261]  kasan_save_track+0x18/0x40
[   15.206395]  kasan_save_alloc_info+0x3b/0x50
[   15.206802]  __kasan_kmalloc+0xb7/0xc0
[   15.207064]  __kmalloc_cache_noprof+0x189/0x420
[   15.207312]  kasan_atomics+0x95/0x310
[   15.207541]  kunit_try_run_case+0x1a5/0x480
[   15.207802]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.208171]  kthread+0x337/0x6f0
[   15.208438]  ret_from_fork+0x116/0x1d0
[   15.208610]  ret_from_fork_asm+0x1a/0x30
[   15.208857] 
[   15.209000] The buggy address belongs to the object at ffff888102a1a680
[   15.209000]  which belongs to the cache kmalloc-64 of size 64
[   15.209610] The buggy address is located 0 bytes to the right of
[   15.209610]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.210258] 
[   15.210451] The buggy address belongs to the physical page:
[   15.210728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.211098] flags: 0x200000000000000(node=0|zone=2)
[   15.211396] page_type: f5(slab)
[   15.211569] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.211828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.212322] page dumped because: kasan: bad access detected
[   15.212502] 
[   15.212573] Memory state around the buggy address:
[   15.212727]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.212994]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.213329] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.214024]                                      ^
[   15.214337]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214630]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.215081] ==================================================================
[   15.215554] ==================================================================
[   15.215912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.216343] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.216885] 
[   15.216989] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.217032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.217044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.217064] Call Trace:
[   15.217081]  <TASK>
[   15.217097]  dump_stack_lvl+0x73/0xb0
[   15.217125]  print_report+0xd1/0x650
[   15.217148]  ? __virt_addr_valid+0x1db/0x2d0
[   15.217171]  ? kasan_atomics_helper+0xac7/0x5450
[   15.217193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.217259]  ? kasan_atomics_helper+0xac7/0x5450
[   15.217282]  kasan_report+0x141/0x180
[   15.217317]  ? kasan_atomics_helper+0xac7/0x5450
[   15.217344]  kasan_check_range+0x10c/0x1c0
[   15.217369]  __kasan_check_write+0x18/0x20
[   15.217390]  kasan_atomics_helper+0xac7/0x5450
[   15.217414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.217439]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.217465]  ? kasan_atomics+0x152/0x310
[   15.217492]  kasan_atomics+0x1dc/0x310
[   15.217516]  ? __pfx_kasan_atomics+0x10/0x10
[   15.217542]  ? __pfx_read_tsc+0x10/0x10
[   15.217678]  ? ktime_get_ts64+0x86/0x230
[   15.217708]  kunit_try_run_case+0x1a5/0x480
[   15.217828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.217858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.217884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.217909]  ? __kthread_parkme+0x82/0x180
[   15.217942]  ? preempt_count_sub+0x50/0x80
[   15.217967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.217992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.218019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.218045]  kthread+0x337/0x6f0
[   15.218125]  ? trace_preempt_on+0x20/0xc0
[   15.218153]  ? __pfx_kthread+0x10/0x10
[   15.218175]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.218199]  ? calculate_sigpending+0x7b/0xa0
[   15.218224]  ? __pfx_kthread+0x10/0x10
[   15.218247]  ret_from_fork+0x116/0x1d0
[   15.218267]  ? __pfx_kthread+0x10/0x10
[   15.218288]  ret_from_fork_asm+0x1a/0x30
[   15.218322]  </TASK>
[   15.218333] 
[   15.232780] Allocated by task 282:
[   15.233168]  kasan_save_stack+0x45/0x70
[   15.233767]  kasan_save_track+0x18/0x40
[   15.234266]  kasan_save_alloc_info+0x3b/0x50
[   15.234706]  __kasan_kmalloc+0xb7/0xc0
[   15.235169]  __kmalloc_cache_noprof+0x189/0x420
[   15.235626]  kasan_atomics+0x95/0x310
[   15.236108]  kunit_try_run_case+0x1a5/0x480
[   15.236281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.236459]  kthread+0x337/0x6f0
[   15.236580]  ret_from_fork+0x116/0x1d0
[   15.236713]  ret_from_fork_asm+0x1a/0x30
[   15.236951] 
[   15.237025] The buggy address belongs to the object at ffff888102a1a680
[   15.237025]  which belongs to the cache kmalloc-64 of size 64
[   15.237568] The buggy address is located 0 bytes to the right of
[   15.237568]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.238257] 
[   15.238379] The buggy address belongs to the physical page:
[   15.238814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.239338] flags: 0x200000000000000(node=0|zone=2)
[   15.239594] page_type: f5(slab)
[   15.239744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.240209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.240540] page dumped because: kasan: bad access detected
[   15.240848] 
[   15.240979] Memory state around the buggy address:
[   15.241271]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.241543]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.241965] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.242344]                                      ^
[   15.242556]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.243138]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.243427] ==================================================================
[   15.498352] ==================================================================
[   15.498595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.498882] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.499228] 
[   15.499377] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.499448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.499474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.499507] Call Trace:
[   15.499521]  <TASK>
[   15.499549]  dump_stack_lvl+0x73/0xb0
[   15.499592]  print_report+0xd1/0x650
[   15.499628]  ? __virt_addr_valid+0x1db/0x2d0
[   15.499651]  ? kasan_atomics_helper+0x1148/0x5450
[   15.499672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.499695]  ? kasan_atomics_helper+0x1148/0x5450
[   15.499716]  kasan_report+0x141/0x180
[   15.499738]  ? kasan_atomics_helper+0x1148/0x5450
[   15.499780]  kasan_check_range+0x10c/0x1c0
[   15.499805]  __kasan_check_write+0x18/0x20
[   15.499825]  kasan_atomics_helper+0x1148/0x5450
[   15.499849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.499873]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.499900]  ? kasan_atomics+0x152/0x310
[   15.499939]  kasan_atomics+0x1dc/0x310
[   15.499963]  ? __pfx_kasan_atomics+0x10/0x10
[   15.499988]  ? __pfx_read_tsc+0x10/0x10
[   15.500010]  ? ktime_get_ts64+0x86/0x230
[   15.500056]  kunit_try_run_case+0x1a5/0x480
[   15.500082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.500106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.500132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.500157]  ? __kthread_parkme+0x82/0x180
[   15.500178]  ? preempt_count_sub+0x50/0x80
[   15.500204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.500229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.500254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.500280]  kthread+0x337/0x6f0
[   15.500300]  ? trace_preempt_on+0x20/0xc0
[   15.500324]  ? __pfx_kthread+0x10/0x10
[   15.500346]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.500369]  ? calculate_sigpending+0x7b/0xa0
[   15.500394]  ? __pfx_kthread+0x10/0x10
[   15.500417]  ret_from_fork+0x116/0x1d0
[   15.500436]  ? __pfx_kthread+0x10/0x10
[   15.500457]  ret_from_fork_asm+0x1a/0x30
[   15.500490]  </TASK>
[   15.500502] 
[   15.508717] Allocated by task 282:
[   15.508910]  kasan_save_stack+0x45/0x70
[   15.509064]  kasan_save_track+0x18/0x40
[   15.509276]  kasan_save_alloc_info+0x3b/0x50
[   15.509504]  __kasan_kmalloc+0xb7/0xc0
[   15.509715]  __kmalloc_cache_noprof+0x189/0x420
[   15.509883]  kasan_atomics+0x95/0x310
[   15.510107]  kunit_try_run_case+0x1a5/0x480
[   15.510335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.510543]  kthread+0x337/0x6f0
[   15.510727]  ret_from_fork+0x116/0x1d0
[   15.510936]  ret_from_fork_asm+0x1a/0x30
[   15.511125] 
[   15.511206] The buggy address belongs to the object at ffff888102a1a680
[   15.511206]  which belongs to the cache kmalloc-64 of size 64
[   15.511678] The buggy address is located 0 bytes to the right of
[   15.511678]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.512198] 
[   15.512315] The buggy address belongs to the physical page:
[   15.512579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.513000] flags: 0x200000000000000(node=0|zone=2)
[   15.513237] page_type: f5(slab)
[   15.513353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.513692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.514040] page dumped because: kasan: bad access detected
[   15.514208] 
[   15.514276] Memory state around the buggy address:
[   15.514425]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.514636]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.515012] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.515320]                                      ^
[   15.515536]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.515842]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.516341] ==================================================================
[   15.923939] ==================================================================
[   15.924275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.924596] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.924882] 
[   15.924977] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.925019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.925033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.925053] Call Trace:
[   15.925069]  <TASK>
[   15.925084]  dump_stack_lvl+0x73/0xb0
[   15.925114]  print_report+0xd1/0x650
[   15.925137]  ? __virt_addr_valid+0x1db/0x2d0
[   15.925161]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.925183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.925208]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.925231]  kasan_report+0x141/0x180
[   15.925254]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.925282]  kasan_check_range+0x10c/0x1c0
[   15.925308]  __kasan_check_write+0x18/0x20
[   15.925329]  kasan_atomics_helper+0x1a7f/0x5450
[   15.925353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.925377]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.925402]  ? kasan_atomics+0x152/0x310
[   15.925430]  kasan_atomics+0x1dc/0x310
[   15.925453]  ? __pfx_kasan_atomics+0x10/0x10
[   15.925480]  ? __pfx_read_tsc+0x10/0x10
[   15.925502]  ? ktime_get_ts64+0x86/0x230
[   15.925527]  kunit_try_run_case+0x1a5/0x480
[   15.925553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.925577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.925603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.925630]  ? __kthread_parkme+0x82/0x180
[   15.925651]  ? preempt_count_sub+0x50/0x80
[   15.925676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.925702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.925728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.925777]  kthread+0x337/0x6f0
[   15.925796]  ? trace_preempt_on+0x20/0xc0
[   15.925820]  ? __pfx_kthread+0x10/0x10
[   15.925842]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.925864]  ? calculate_sigpending+0x7b/0xa0
[   15.925889]  ? __pfx_kthread+0x10/0x10
[   15.925913]  ret_from_fork+0x116/0x1d0
[   15.925941]  ? __pfx_kthread+0x10/0x10
[   15.925962]  ret_from_fork_asm+0x1a/0x30
[   15.925995]  </TASK>
[   15.926006] 
[   15.934975] Allocated by task 282:
[   15.935137]  kasan_save_stack+0x45/0x70
[   15.935290]  kasan_save_track+0x18/0x40
[   15.935566]  kasan_save_alloc_info+0x3b/0x50
[   15.935716]  __kasan_kmalloc+0xb7/0xc0
[   15.935874]  __kmalloc_cache_noprof+0x189/0x420
[   15.936414]  kasan_atomics+0x95/0x310
[   15.936790]  kunit_try_run_case+0x1a5/0x480
[   15.937311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.937852]  kthread+0x337/0x6f0
[   15.938114]  ret_from_fork+0x116/0x1d0
[   15.938487]  ret_from_fork_asm+0x1a/0x30
[   15.938655] 
[   15.938728] The buggy address belongs to the object at ffff888102a1a680
[   15.938728]  which belongs to the cache kmalloc-64 of size 64
[   15.939831] The buggy address is located 0 bytes to the right of
[   15.939831]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.940345] 
[   15.940420] The buggy address belongs to the physical page:
[   15.940593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.941071] flags: 0x200000000000000(node=0|zone=2)
[   15.941551] page_type: f5(slab)
[   15.941869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.942723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.943428] page dumped because: kasan: bad access detected
[   15.944005] 
[   15.944166] Memory state around the buggy address:
[   15.944609]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.945171]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.945474] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.945687]                                      ^
[   15.945880]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.946558]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.947200] ==================================================================
[   15.430371] ==================================================================
[   15.430690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.431293] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.431866] 
[   15.432117] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.432165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.432178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.432199] Call Trace:
[   15.432215]  <TASK>
[   15.432233]  dump_stack_lvl+0x73/0xb0
[   15.432263]  print_report+0xd1/0x650
[   15.432287]  ? __virt_addr_valid+0x1db/0x2d0
[   15.432312]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.432334]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.432359]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.432382]  kasan_report+0x141/0x180
[   15.432405]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.432434]  __asan_report_load4_noabort+0x18/0x20
[   15.432459]  kasan_atomics_helper+0x4a36/0x5450
[   15.432483]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.432507]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.432533]  ? kasan_atomics+0x152/0x310
[   15.432561]  kasan_atomics+0x1dc/0x310
[   15.432585]  ? __pfx_kasan_atomics+0x10/0x10
[   15.432611]  ? __pfx_read_tsc+0x10/0x10
[   15.432632]  ? ktime_get_ts64+0x86/0x230
[   15.432657]  kunit_try_run_case+0x1a5/0x480
[   15.432682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.432706]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.432730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.432878]  ? __kthread_parkme+0x82/0x180
[   15.432902]  ? preempt_count_sub+0x50/0x80
[   15.432948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.432974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.433000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.433026]  kthread+0x337/0x6f0
[   15.433046]  ? trace_preempt_on+0x20/0xc0
[   15.433070]  ? __pfx_kthread+0x10/0x10
[   15.433092]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.433115]  ? calculate_sigpending+0x7b/0xa0
[   15.433141]  ? __pfx_kthread+0x10/0x10
[   15.433163]  ret_from_fork+0x116/0x1d0
[   15.433183]  ? __pfx_kthread+0x10/0x10
[   15.433204]  ret_from_fork_asm+0x1a/0x30
[   15.433237]  </TASK>
[   15.433249] 
[   15.442829] Allocated by task 282:
[   15.443052]  kasan_save_stack+0x45/0x70
[   15.443292]  kasan_save_track+0x18/0x40
[   15.443431]  kasan_save_alloc_info+0x3b/0x50
[   15.443579]  __kasan_kmalloc+0xb7/0xc0
[   15.443708]  __kmalloc_cache_noprof+0x189/0x420
[   15.444202]  kasan_atomics+0x95/0x310
[   15.444626]  kunit_try_run_case+0x1a5/0x480
[   15.445093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.445585]  kthread+0x337/0x6f0
[   15.445938]  ret_from_fork+0x116/0x1d0
[   15.446312]  ret_from_fork_asm+0x1a/0x30
[   15.446586] 
[   15.446795] The buggy address belongs to the object at ffff888102a1a680
[   15.446795]  which belongs to the cache kmalloc-64 of size 64
[   15.447284] The buggy address is located 0 bytes to the right of
[   15.447284]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.447660] 
[   15.447756] The buggy address belongs to the physical page:
[   15.448351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.449068] flags: 0x200000000000000(node=0|zone=2)
[   15.449529] page_type: f5(slab)
[   15.449874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.450547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.451245] page dumped because: kasan: bad access detected
[   15.451461] 
[   15.451677] Memory state around the buggy address:
[   15.452153]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.452545]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.453012] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.453228]                                      ^
[   15.453381]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.453597]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.454085] ==================================================================
[   16.103675] ==================================================================
[   16.104232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.104673] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.105443] 
[   16.105553] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.105599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.105612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.105634] Call Trace:
[   16.105650]  <TASK>
[   16.105667]  dump_stack_lvl+0x73/0xb0
[   16.105701]  print_report+0xd1/0x650
[   16.105725]  ? __virt_addr_valid+0x1db/0x2d0
[   16.105751]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.105992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.106017]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.106041]  kasan_report+0x141/0x180
[   16.106064]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.106093]  kasan_check_range+0x10c/0x1c0
[   16.106118]  __kasan_check_write+0x18/0x20
[   16.106139]  kasan_atomics_helper+0x1f43/0x5450
[   16.106164]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.106188]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.106214]  ? kasan_atomics+0x152/0x310
[   16.106245]  kasan_atomics+0x1dc/0x310
[   16.106268]  ? __pfx_kasan_atomics+0x10/0x10
[   16.106295]  ? __pfx_read_tsc+0x10/0x10
[   16.106317]  ? ktime_get_ts64+0x86/0x230
[   16.106343]  kunit_try_run_case+0x1a5/0x480
[   16.106371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.106396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.106421]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.106447]  ? __kthread_parkme+0x82/0x180
[   16.106469]  ? preempt_count_sub+0x50/0x80
[   16.106496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.106531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.106557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.106583]  kthread+0x337/0x6f0
[   16.106604]  ? trace_preempt_on+0x20/0xc0
[   16.106628]  ? __pfx_kthread+0x10/0x10
[   16.106651]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.106673]  ? calculate_sigpending+0x7b/0xa0
[   16.106698]  ? __pfx_kthread+0x10/0x10
[   16.106721]  ret_from_fork+0x116/0x1d0
[   16.106740]  ? __pfx_kthread+0x10/0x10
[   16.106824]  ret_from_fork_asm+0x1a/0x30
[   16.106858]  </TASK>
[   16.106869] 
[   16.117153] Allocated by task 282:
[   16.117347]  kasan_save_stack+0x45/0x70
[   16.117518]  kasan_save_track+0x18/0x40
[   16.117707]  kasan_save_alloc_info+0x3b/0x50
[   16.117859]  __kasan_kmalloc+0xb7/0xc0
[   16.118008]  __kmalloc_cache_noprof+0x189/0x420
[   16.118232]  kasan_atomics+0x95/0x310
[   16.118439]  kunit_try_run_case+0x1a5/0x480
[   16.118747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.119057]  kthread+0x337/0x6f0
[   16.119187]  ret_from_fork+0x116/0x1d0
[   16.119320]  ret_from_fork_asm+0x1a/0x30
[   16.119460] 
[   16.119549] The buggy address belongs to the object at ffff888102a1a680
[   16.119549]  which belongs to the cache kmalloc-64 of size 64
[   16.120415] The buggy address is located 0 bytes to the right of
[   16.120415]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.120929] 
[   16.121009] The buggy address belongs to the physical page:
[   16.121221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.121541] flags: 0x200000000000000(node=0|zone=2)
[   16.121784] page_type: f5(slab)
[   16.121980] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.122241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.122519] page dumped because: kasan: bad access detected
[   16.122764] 
[   16.122844] Memory state around the buggy address:
[   16.123136]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.123366]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.123675] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.124123]                                      ^
[   16.124316]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.124566]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.124966] ==================================================================
[   15.618225] ==================================================================
[   15.618526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.618856] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.619207] 
[   15.619316] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.619358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.619370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.619391] Call Trace:
[   15.619407]  <TASK>
[   15.619423]  dump_stack_lvl+0x73/0xb0
[   15.619452]  print_report+0xd1/0x650
[   15.619475]  ? __virt_addr_valid+0x1db/0x2d0
[   15.619498]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.619521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.619545]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.619568]  kasan_report+0x141/0x180
[   15.619592]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.619643]  __asan_report_load4_noabort+0x18/0x20
[   15.619670]  kasan_atomics_helper+0x49ce/0x5450
[   15.619695]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.619735]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.619771]  ? kasan_atomics+0x152/0x310
[   15.619800]  kasan_atomics+0x1dc/0x310
[   15.619823]  ? __pfx_kasan_atomics+0x10/0x10
[   15.619850]  ? __pfx_read_tsc+0x10/0x10
[   15.619871]  ? ktime_get_ts64+0x86/0x230
[   15.619897]  kunit_try_run_case+0x1a5/0x480
[   15.619933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.619976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.620001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.620026]  ? __kthread_parkme+0x82/0x180
[   15.620048]  ? preempt_count_sub+0x50/0x80
[   15.620073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.620098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.620125]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.620151]  kthread+0x337/0x6f0
[   15.620170]  ? trace_preempt_on+0x20/0xc0
[   15.620211]  ? __pfx_kthread+0x10/0x10
[   15.620233]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.620255]  ? calculate_sigpending+0x7b/0xa0
[   15.620280]  ? __pfx_kthread+0x10/0x10
[   15.620303]  ret_from_fork+0x116/0x1d0
[   15.620322]  ? __pfx_kthread+0x10/0x10
[   15.620343]  ret_from_fork_asm+0x1a/0x30
[   15.620392]  </TASK>
[   15.620403] 
[   15.628002] Allocated by task 282:
[   15.628200]  kasan_save_stack+0x45/0x70
[   15.628423]  kasan_save_track+0x18/0x40
[   15.628637]  kasan_save_alloc_info+0x3b/0x50
[   15.628886]  __kasan_kmalloc+0xb7/0xc0
[   15.629104]  __kmalloc_cache_noprof+0x189/0x420
[   15.629258]  kasan_atomics+0x95/0x310
[   15.629442]  kunit_try_run_case+0x1a5/0x480
[   15.629645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.630049]  kthread+0x337/0x6f0
[   15.630261]  ret_from_fork+0x116/0x1d0
[   15.630780]  ret_from_fork_asm+0x1a/0x30
[   15.630968] 
[   15.631096] The buggy address belongs to the object at ffff888102a1a680
[   15.631096]  which belongs to the cache kmalloc-64 of size 64
[   15.631565] The buggy address is located 0 bytes to the right of
[   15.631565]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.632207] 
[   15.632364] The buggy address belongs to the physical page:
[   15.633078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.634327] flags: 0x200000000000000(node=0|zone=2)
[   15.634725] page_type: f5(slab)
[   15.634854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.635198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.635685] page dumped because: kasan: bad access detected
[   15.636156] 
[   15.636271] Memory state around the buggy address:
[   15.636425]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.636636]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.636844] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.637069]                                      ^
[   15.637224]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.637434]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.637679] ==================================================================
[   16.214202] ==================================================================
[   16.214782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.215219] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.215505] 
[   16.215590] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.215632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.215644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.215664] Call Trace:
[   16.215679]  <TASK>
[   16.215695]  dump_stack_lvl+0x73/0xb0
[   16.215722]  print_report+0xd1/0x650
[   16.215767]  ? __virt_addr_valid+0x1db/0x2d0
[   16.215791]  ? kasan_atomics_helper+0x218a/0x5450
[   16.215813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.215837]  ? kasan_atomics_helper+0x218a/0x5450
[   16.215861]  kasan_report+0x141/0x180
[   16.215883]  ? kasan_atomics_helper+0x218a/0x5450
[   16.215912]  kasan_check_range+0x10c/0x1c0
[   16.215946]  __kasan_check_write+0x18/0x20
[   16.215966]  kasan_atomics_helper+0x218a/0x5450
[   16.215991]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.216015]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.216041]  ? kasan_atomics+0x152/0x310
[   16.216069]  kasan_atomics+0x1dc/0x310
[   16.216093]  ? __pfx_kasan_atomics+0x10/0x10
[   16.216118]  ? __pfx_read_tsc+0x10/0x10
[   16.216139]  ? ktime_get_ts64+0x86/0x230
[   16.216164]  kunit_try_run_case+0x1a5/0x480
[   16.216189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.216213]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.216238]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.216263]  ? __kthread_parkme+0x82/0x180
[   16.216284]  ? preempt_count_sub+0x50/0x80
[   16.216309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.216336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.216362]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.216389]  kthread+0x337/0x6f0
[   16.216408]  ? trace_preempt_on+0x20/0xc0
[   16.216432]  ? __pfx_kthread+0x10/0x10
[   16.216454]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.216477]  ? calculate_sigpending+0x7b/0xa0
[   16.216502]  ? __pfx_kthread+0x10/0x10
[   16.216524]  ret_from_fork+0x116/0x1d0
[   16.216543]  ? __pfx_kthread+0x10/0x10
[   16.216565]  ret_from_fork_asm+0x1a/0x30
[   16.216598]  </TASK>
[   16.216609] 
[   16.224019] Allocated by task 282:
[   16.224144]  kasan_save_stack+0x45/0x70
[   16.224286]  kasan_save_track+0x18/0x40
[   16.224465]  kasan_save_alloc_info+0x3b/0x50
[   16.224682]  __kasan_kmalloc+0xb7/0xc0
[   16.224897]  __kmalloc_cache_noprof+0x189/0x420
[   16.225137]  kasan_atomics+0x95/0x310
[   16.225326]  kunit_try_run_case+0x1a5/0x480
[   16.225536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.225812]  kthread+0x337/0x6f0
[   16.225951]  ret_from_fork+0x116/0x1d0
[   16.226085]  ret_from_fork_asm+0x1a/0x30
[   16.226290] 
[   16.226387] The buggy address belongs to the object at ffff888102a1a680
[   16.226387]  which belongs to the cache kmalloc-64 of size 64
[   16.226897] The buggy address is located 0 bytes to the right of
[   16.226897]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.227389] 
[   16.227463] The buggy address belongs to the physical page:
[   16.227704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.228042] flags: 0x200000000000000(node=0|zone=2)
[   16.228243] page_type: f5(slab)
[   16.228361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.228592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.228843] page dumped because: kasan: bad access detected
[   16.230234] 
[   16.230776] Memory state around the buggy address:
[   16.231416]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.232460]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.233362] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.234492]                                      ^
[   16.234912]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.235639]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.236542] ==================================================================
[   15.592895] ==================================================================
[   15.593548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.594138] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.594522] 
[   15.594630] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.594673] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.594686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.594708] Call Trace:
[   15.594726]  <TASK>
[   15.594742]  dump_stack_lvl+0x73/0xb0
[   15.594773]  print_report+0xd1/0x650
[   15.594797]  ? __virt_addr_valid+0x1db/0x2d0
[   15.594821]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.594845]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.594870]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.594895]  kasan_report+0x141/0x180
[   15.594930]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.594960]  kasan_check_range+0x10c/0x1c0
[   15.594984]  __kasan_check_write+0x18/0x20
[   15.595004]  kasan_atomics_helper+0x12e6/0x5450
[   15.595028]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.595051]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.595078]  ? kasan_atomics+0x152/0x310
[   15.595404]  kasan_atomics+0x1dc/0x310
[   15.595432]  ? __pfx_kasan_atomics+0x10/0x10
[   15.595460]  ? __pfx_read_tsc+0x10/0x10
[   15.595481]  ? ktime_get_ts64+0x86/0x230
[   15.595506]  kunit_try_run_case+0x1a5/0x480
[   15.595532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.595555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.595581]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.595606]  ? __kthread_parkme+0x82/0x180
[   15.595628]  ? preempt_count_sub+0x50/0x80
[   15.595653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.595680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.595706]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.595733]  kthread+0x337/0x6f0
[   15.595762]  ? trace_preempt_on+0x20/0xc0
[   15.595787]  ? __pfx_kthread+0x10/0x10
[   15.595808]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.595830]  ? calculate_sigpending+0x7b/0xa0
[   15.595856]  ? __pfx_kthread+0x10/0x10
[   15.595878]  ret_from_fork+0x116/0x1d0
[   15.595898]  ? __pfx_kthread+0x10/0x10
[   15.595934]  ret_from_fork_asm+0x1a/0x30
[   15.595967]  </TASK>
[   15.595977] 
[   15.607396] Allocated by task 282:
[   15.607658]  kasan_save_stack+0x45/0x70
[   15.608002]  kasan_save_track+0x18/0x40
[   15.608283]  kasan_save_alloc_info+0x3b/0x50
[   15.608571]  __kasan_kmalloc+0xb7/0xc0
[   15.608887]  __kmalloc_cache_noprof+0x189/0x420
[   15.609226]  kasan_atomics+0x95/0x310
[   15.609441]  kunit_try_run_case+0x1a5/0x480
[   15.609641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.609943]  kthread+0x337/0x6f0
[   15.610380]  ret_from_fork+0x116/0x1d0
[   15.610641]  ret_from_fork_asm+0x1a/0x30
[   15.610937] 
[   15.611035] The buggy address belongs to the object at ffff888102a1a680
[   15.611035]  which belongs to the cache kmalloc-64 of size 64
[   15.611884] The buggy address is located 0 bytes to the right of
[   15.611884]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.612573] 
[   15.612775] The buggy address belongs to the physical page:
[   15.613245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.613679] flags: 0x200000000000000(node=0|zone=2)
[   15.614000] page_type: f5(slab)
[   15.614198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.614525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.615108] page dumped because: kasan: bad access detected
[   15.615353] 
[   15.615433] Memory state around the buggy address:
[   15.615749]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.616108]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.616406] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.616684]                                      ^
[   15.616962]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.617248]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.617560] ==================================================================
[   14.972136] ==================================================================
[   14.972396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.972735] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   14.973021] 
[   14.973102] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.973142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.973154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.973175] Call Trace:
[   14.973188]  <TASK>
[   14.973202]  dump_stack_lvl+0x73/0xb0
[   14.973229]  print_report+0xd1/0x650
[   14.973252]  ? __virt_addr_valid+0x1db/0x2d0
[   14.973274]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.973296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.973319]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.973341]  kasan_report+0x141/0x180
[   14.973363]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.973391]  __asan_report_store4_noabort+0x1b/0x30
[   14.973416]  kasan_atomics_helper+0x4b3a/0x5450
[   14.973440]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.973462]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.973486]  ? kasan_atomics+0x152/0x310
[   14.973513]  kasan_atomics+0x1dc/0x310
[   14.973535]  ? __pfx_kasan_atomics+0x10/0x10
[   14.973560]  ? __pfx_read_tsc+0x10/0x10
[   14.973581]  ? ktime_get_ts64+0x86/0x230
[   14.973605]  kunit_try_run_case+0x1a5/0x480
[   14.973775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.973806]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.973832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.973857]  ? __kthread_parkme+0x82/0x180
[   14.973878]  ? preempt_count_sub+0x50/0x80
[   14.973903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.973944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.973971]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.973997]  kthread+0x337/0x6f0
[   14.974063]  ? trace_preempt_on+0x20/0xc0
[   14.974090]  ? __pfx_kthread+0x10/0x10
[   14.974112]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.974135]  ? calculate_sigpending+0x7b/0xa0
[   14.974159]  ? __pfx_kthread+0x10/0x10
[   14.974182]  ret_from_fork+0x116/0x1d0
[   14.974202]  ? __pfx_kthread+0x10/0x10
[   14.974223]  ret_from_fork_asm+0x1a/0x30
[   14.974256]  </TASK>
[   14.974267] 
[   14.981735] Allocated by task 282:
[   14.982060]  kasan_save_stack+0x45/0x70
[   14.982209]  kasan_save_track+0x18/0x40
[   14.982348]  kasan_save_alloc_info+0x3b/0x50
[   14.982506]  __kasan_kmalloc+0xb7/0xc0
[   14.982755]  __kmalloc_cache_noprof+0x189/0x420
[   14.983054]  kasan_atomics+0x95/0x310
[   14.983249]  kunit_try_run_case+0x1a5/0x480
[   14.983633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.983808]  kthread+0x337/0x6f0
[   14.983937]  ret_from_fork+0x116/0x1d0
[   14.984070]  ret_from_fork_asm+0x1a/0x30
[   14.984393] 
[   14.984495] The buggy address belongs to the object at ffff888102a1a680
[   14.984495]  which belongs to the cache kmalloc-64 of size 64
[   14.985264] The buggy address is located 0 bytes to the right of
[   14.985264]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   14.986023] 
[   14.986194] The buggy address belongs to the physical page:
[   14.986425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   14.986756] flags: 0x200000000000000(node=0|zone=2)
[   14.987060] page_type: f5(slab)
[   14.987228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.987528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.987819] page dumped because: kasan: bad access detected
[   14.988076] 
[   14.988225] Memory state around the buggy address:
[   14.988421]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.988718]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.989080] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.989533]                                      ^
[   14.989697]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.990018]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.990406] ==================================================================
[   15.516755] ==================================================================
[   15.517123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.517583] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.517871] 
[   15.517965] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.518008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.518020] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.518041] Call Trace:
[   15.518056]  <TASK>
[   15.518072]  dump_stack_lvl+0x73/0xb0
[   15.518100]  print_report+0xd1/0x650
[   15.518122]  ? __virt_addr_valid+0x1db/0x2d0
[   15.518146]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.518168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.518193]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.518216]  kasan_report+0x141/0x180
[   15.518238]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.518267]  __asan_report_load4_noabort+0x18/0x20
[   15.518292]  kasan_atomics_helper+0x4a02/0x5450
[   15.518317]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.518340]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.518366]  ? kasan_atomics+0x152/0x310
[   15.518394]  kasan_atomics+0x1dc/0x310
[   15.518417]  ? __pfx_kasan_atomics+0x10/0x10
[   15.518443]  ? __pfx_read_tsc+0x10/0x10
[   15.518464]  ? ktime_get_ts64+0x86/0x230
[   15.518489]  kunit_try_run_case+0x1a5/0x480
[   15.518519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.518543]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.518568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.518593]  ? __kthread_parkme+0x82/0x180
[   15.518614]  ? preempt_count_sub+0x50/0x80
[   15.518641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.518666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.518691]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.518718]  kthread+0x337/0x6f0
[   15.518737]  ? trace_preempt_on+0x20/0xc0
[   15.518771]  ? __pfx_kthread+0x10/0x10
[   15.518816]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.518839]  ? calculate_sigpending+0x7b/0xa0
[   15.518865]  ? __pfx_kthread+0x10/0x10
[   15.518907]  ret_from_fork+0x116/0x1d0
[   15.518936]  ? __pfx_kthread+0x10/0x10
[   15.518958]  ret_from_fork_asm+0x1a/0x30
[   15.518992]  </TASK>
[   15.519002] 
[   15.527431] Allocated by task 282:
[   15.527556]  kasan_save_stack+0x45/0x70
[   15.527694]  kasan_save_track+0x18/0x40
[   15.527877]  kasan_save_alloc_info+0x3b/0x50
[   15.528319]  __kasan_kmalloc+0xb7/0xc0
[   15.528538]  __kmalloc_cache_noprof+0x189/0x420
[   15.528801]  kasan_atomics+0x95/0x310
[   15.529000]  kunit_try_run_case+0x1a5/0x480
[   15.529204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.529458]  kthread+0x337/0x6f0
[   15.529670]  ret_from_fork+0x116/0x1d0
[   15.529907]  ret_from_fork_asm+0x1a/0x30
[   15.530053] 
[   15.530150] The buggy address belongs to the object at ffff888102a1a680
[   15.530150]  which belongs to the cache kmalloc-64 of size 64
[   15.530668] The buggy address is located 0 bytes to the right of
[   15.530668]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.531232] 
[   15.531353] The buggy address belongs to the physical page:
[   15.531523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.531763] flags: 0x200000000000000(node=0|zone=2)
[   15.531998] page_type: f5(slab)
[   15.532162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.532502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.532743] page dumped because: kasan: bad access detected
[   15.533034] 
[   15.533131] Memory state around the buggy address:
[   15.533344]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.533610]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.533820] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.534034]                                      ^
[   15.534454]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.534791]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.535158] ==================================================================
[   15.455067] ==================================================================
[   15.455819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.456529] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.457424] 
[   15.457641] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.457694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.457707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.457728] Call Trace:
[   15.457745]  <TASK>
[   15.457761]  dump_stack_lvl+0x73/0xb0
[   15.457790]  print_report+0xd1/0x650
[   15.457833]  ? __virt_addr_valid+0x1db/0x2d0
[   15.457856]  ? kasan_atomics_helper+0x1079/0x5450
[   15.457879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.457904]  ? kasan_atomics_helper+0x1079/0x5450
[   15.457940]  kasan_report+0x141/0x180
[   15.457963]  ? kasan_atomics_helper+0x1079/0x5450
[   15.457992]  kasan_check_range+0x10c/0x1c0
[   15.458018]  __kasan_check_write+0x18/0x20
[   15.458038]  kasan_atomics_helper+0x1079/0x5450
[   15.458062]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.458086]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.458112]  ? kasan_atomics+0x152/0x310
[   15.458140]  kasan_atomics+0x1dc/0x310
[   15.458163]  ? __pfx_kasan_atomics+0x10/0x10
[   15.458188]  ? __pfx_read_tsc+0x10/0x10
[   15.458210]  ? ktime_get_ts64+0x86/0x230
[   15.458234]  kunit_try_run_case+0x1a5/0x480
[   15.458260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.458283]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.458309]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.458334]  ? __kthread_parkme+0x82/0x180
[   15.458355]  ? preempt_count_sub+0x50/0x80
[   15.458380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.458405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.458431]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.458457]  kthread+0x337/0x6f0
[   15.458476]  ? trace_preempt_on+0x20/0xc0
[   15.458504]  ? __pfx_kthread+0x10/0x10
[   15.458527]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.458549]  ? calculate_sigpending+0x7b/0xa0
[   15.458574]  ? __pfx_kthread+0x10/0x10
[   15.458596]  ret_from_fork+0x116/0x1d0
[   15.458616]  ? __pfx_kthread+0x10/0x10
[   15.458637]  ret_from_fork_asm+0x1a/0x30
[   15.458670]  </TASK>
[   15.458681] 
[   15.469465] Allocated by task 282:
[   15.469803]  kasan_save_stack+0x45/0x70
[   15.470271]  kasan_save_track+0x18/0x40
[   15.470635]  kasan_save_alloc_info+0x3b/0x50
[   15.471138]  __kasan_kmalloc+0xb7/0xc0
[   15.471570]  __kmalloc_cache_noprof+0x189/0x420
[   15.472031]  kasan_atomics+0x95/0x310
[   15.472384]  kunit_try_run_case+0x1a5/0x480
[   15.472784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.473274]  kthread+0x337/0x6f0
[   15.473456]  ret_from_fork+0x116/0x1d0
[   15.473851]  ret_from_fork_asm+0x1a/0x30
[   15.474072] 
[   15.474144] The buggy address belongs to the object at ffff888102a1a680
[   15.474144]  which belongs to the cache kmalloc-64 of size 64
[   15.474495] The buggy address is located 0 bytes to the right of
[   15.474495]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.474968] 
[   15.475087] The buggy address belongs to the physical page:
[   15.475340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.475692] flags: 0x200000000000000(node=0|zone=2)
[   15.475983] page_type: f5(slab)
[   15.476111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.476420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.476756] page dumped because: kasan: bad access detected
[   15.477068] 
[   15.477158] Memory state around the buggy address:
[   15.477399]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.477728]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.477965] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.478467]                                      ^
[   15.478714]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.479054]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.479357] ==================================================================
[   16.006791] ==================================================================
[   16.007107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.007591] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.008135] 
[   16.008334] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.008377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.008390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.008411] Call Trace:
[   16.008426]  <TASK>
[   16.008442]  dump_stack_lvl+0x73/0xb0
[   16.008472]  print_report+0xd1/0x650
[   16.008496]  ? __virt_addr_valid+0x1db/0x2d0
[   16.008519]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.008542]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.008567]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.008590]  kasan_report+0x141/0x180
[   16.008614]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.008642]  kasan_check_range+0x10c/0x1c0
[   16.008667]  __kasan_check_write+0x18/0x20
[   16.008689]  kasan_atomics_helper+0x1ce1/0x5450
[   16.008726]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.008761]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.008799]  ? kasan_atomics+0x152/0x310
[   16.008827]  kasan_atomics+0x1dc/0x310
[   16.008851]  ? __pfx_kasan_atomics+0x10/0x10
[   16.008877]  ? __pfx_read_tsc+0x10/0x10
[   16.008899]  ? ktime_get_ts64+0x86/0x230
[   16.008935]  kunit_try_run_case+0x1a5/0x480
[   16.008961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.008985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.009011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.009036]  ? __kthread_parkme+0x82/0x180
[   16.009057]  ? preempt_count_sub+0x50/0x80
[   16.009083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.009108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.009134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.009161]  kthread+0x337/0x6f0
[   16.009180]  ? trace_preempt_on+0x20/0xc0
[   16.009204]  ? __pfx_kthread+0x10/0x10
[   16.009226]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.009249]  ? calculate_sigpending+0x7b/0xa0
[   16.009274]  ? __pfx_kthread+0x10/0x10
[   16.009296]  ret_from_fork+0x116/0x1d0
[   16.009316]  ? __pfx_kthread+0x10/0x10
[   16.009337]  ret_from_fork_asm+0x1a/0x30
[   16.009379]  </TASK>
[   16.009390] 
[   16.017214] Allocated by task 282:
[   16.017721]  kasan_save_stack+0x45/0x70
[   16.018208]  kasan_save_track+0x18/0x40
[   16.018573]  kasan_save_alloc_info+0x3b/0x50
[   16.019044]  __kasan_kmalloc+0xb7/0xc0
[   16.019394]  __kmalloc_cache_noprof+0x189/0x420
[   16.019828]  kasan_atomics+0x95/0x310
[   16.020187]  kunit_try_run_case+0x1a5/0x480
[   16.020589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.021321]  kthread+0x337/0x6f0
[   16.021693]  ret_from_fork+0x116/0x1d0
[   16.022003]  ret_from_fork_asm+0x1a/0x30
[   16.022145] 
[   16.022215] The buggy address belongs to the object at ffff888102a1a680
[   16.022215]  which belongs to the cache kmalloc-64 of size 64
[   16.022566] The buggy address is located 0 bytes to the right of
[   16.022566]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.022957] 
[   16.023029] The buggy address belongs to the physical page:
[   16.023504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.024135] flags: 0x200000000000000(node=0|zone=2)
[   16.024300] page_type: f5(slab)
[   16.024419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.024647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.025131] page dumped because: kasan: bad access detected
[   16.025610] 
[   16.025765] Memory state around the buggy address:
[   16.026275]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.026985]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.027603] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.028477]                                      ^
[   16.028916]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.029633]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.030164] ==================================================================
[   15.402726] ==================================================================
[   15.403562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.404503] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.405321] 
[   15.405490] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.405546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.405559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.405580] Call Trace:
[   15.405593]  <TASK>
[   15.405608]  dump_stack_lvl+0x73/0xb0
[   15.405636]  print_report+0xd1/0x650
[   15.405660]  ? __virt_addr_valid+0x1db/0x2d0
[   15.405685]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.405707]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.405732]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.405783]  kasan_report+0x141/0x180
[   15.405806]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.405845]  kasan_check_range+0x10c/0x1c0
[   15.405870]  __kasan_check_write+0x18/0x20
[   15.405891]  kasan_atomics_helper+0xfa9/0x5450
[   15.405916]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.405949]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.405975]  ? kasan_atomics+0x152/0x310
[   15.406004]  kasan_atomics+0x1dc/0x310
[   15.406027]  ? __pfx_kasan_atomics+0x10/0x10
[   15.406053]  ? __pfx_read_tsc+0x10/0x10
[   15.406075]  ? ktime_get_ts64+0x86/0x230
[   15.406100]  kunit_try_run_case+0x1a5/0x480
[   15.406125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.406149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.406175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.406200]  ? __kthread_parkme+0x82/0x180
[   15.406221]  ? preempt_count_sub+0x50/0x80
[   15.406245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.406271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.406296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.406323]  kthread+0x337/0x6f0
[   15.406342]  ? trace_preempt_on+0x20/0xc0
[   15.406367]  ? __pfx_kthread+0x10/0x10
[   15.406388]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.406411]  ? calculate_sigpending+0x7b/0xa0
[   15.406436]  ? __pfx_kthread+0x10/0x10
[   15.406459]  ret_from_fork+0x116/0x1d0
[   15.406478]  ? __pfx_kthread+0x10/0x10
[   15.406499]  ret_from_fork_asm+0x1a/0x30
[   15.406535]  </TASK>
[   15.406546] 
[   15.419023] Allocated by task 282:
[   15.419427]  kasan_save_stack+0x45/0x70
[   15.419840]  kasan_save_track+0x18/0x40
[   15.420033]  kasan_save_alloc_info+0x3b/0x50
[   15.420498]  __kasan_kmalloc+0xb7/0xc0
[   15.420784]  __kmalloc_cache_noprof+0x189/0x420
[   15.421105]  kasan_atomics+0x95/0x310
[   15.421243]  kunit_try_run_case+0x1a5/0x480
[   15.421390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.421564]  kthread+0x337/0x6f0
[   15.421685]  ret_from_fork+0x116/0x1d0
[   15.421851]  ret_from_fork_asm+0x1a/0x30
[   15.422002] 
[   15.422178] The buggy address belongs to the object at ffff888102a1a680
[   15.422178]  which belongs to the cache kmalloc-64 of size 64
[   15.422732] The buggy address is located 0 bytes to the right of
[   15.422732]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.423523] 
[   15.423655] The buggy address belongs to the physical page:
[   15.423855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.424409] flags: 0x200000000000000(node=0|zone=2)
[   15.424671] page_type: f5(slab)
[   15.424941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.425182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.425496] page dumped because: kasan: bad access detected
[   15.426156] 
[   15.426244] Memory state around the buggy address:
[   15.426519]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.427104]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.427421] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.427878]                                      ^
[   15.428223]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.428647]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.429191] ==================================================================
[   14.913580] ==================================================================
[   14.913805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.914356] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   14.914686] 
[   14.914995] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.915041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.915054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.915074] Call Trace:
[   14.915090]  <TASK>
[   14.915105]  dump_stack_lvl+0x73/0xb0
[   14.915135]  print_report+0xd1/0x650
[   14.915217]  ? __virt_addr_valid+0x1db/0x2d0
[   14.915241]  ? kasan_atomics_helper+0x3df/0x5450
[   14.915264]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.915288]  ? kasan_atomics_helper+0x3df/0x5450
[   14.915311]  kasan_report+0x141/0x180
[   14.915334]  ? kasan_atomics_helper+0x3df/0x5450
[   14.915362]  kasan_check_range+0x10c/0x1c0
[   14.915387]  __kasan_check_read+0x15/0x20
[   14.915406]  kasan_atomics_helper+0x3df/0x5450
[   14.915430]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.915454]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.915480]  ? kasan_atomics+0x152/0x310
[   14.915508]  kasan_atomics+0x1dc/0x310
[   14.915531]  ? __pfx_kasan_atomics+0x10/0x10
[   14.915556]  ? __pfx_read_tsc+0x10/0x10
[   14.915579]  ? ktime_get_ts64+0x86/0x230
[   14.915603]  kunit_try_run_case+0x1a5/0x480
[   14.915629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.915653]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.915678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.915702]  ? __kthread_parkme+0x82/0x180
[   14.915724]  ? preempt_count_sub+0x50/0x80
[   14.915749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.915775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.915801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.915827]  kthread+0x337/0x6f0
[   14.915847]  ? trace_preempt_on+0x20/0xc0
[   14.915872]  ? __pfx_kthread+0x10/0x10
[   14.915894]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.915916]  ? calculate_sigpending+0x7b/0xa0
[   14.915956]  ? __pfx_kthread+0x10/0x10
[   14.915978]  ret_from_fork+0x116/0x1d0
[   14.915998]  ? __pfx_kthread+0x10/0x10
[   14.916058]  ret_from_fork_asm+0x1a/0x30
[   14.916093]  </TASK>
[   14.916104] 
[   14.924404] Allocated by task 282:
[   14.924558]  kasan_save_stack+0x45/0x70
[   14.924706]  kasan_save_track+0x18/0x40
[   14.925146]  kasan_save_alloc_info+0x3b/0x50
[   14.925356]  __kasan_kmalloc+0xb7/0xc0
[   14.925538]  __kmalloc_cache_noprof+0x189/0x420
[   14.925713]  kasan_atomics+0x95/0x310
[   14.926019]  kunit_try_run_case+0x1a5/0x480
[   14.926209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.926640]  kthread+0x337/0x6f0
[   14.926770]  ret_from_fork+0x116/0x1d0
[   14.926903]  ret_from_fork_asm+0x1a/0x30
[   14.927057] 
[   14.927150] The buggy address belongs to the object at ffff888102a1a680
[   14.927150]  which belongs to the cache kmalloc-64 of size 64
[   14.927842] The buggy address is located 0 bytes to the right of
[   14.927842]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   14.928557] 
[   14.928634] The buggy address belongs to the physical page:
[   14.928805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   14.929146] flags: 0x200000000000000(node=0|zone=2)
[   14.929383] page_type: f5(slab)
[   14.929554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.929897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.930285] page dumped because: kasan: bad access detected
[   14.930675] 
[   14.930751] Memory state around the buggy address:
[   14.930995]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.931407]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.931626] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.931879]                                      ^
[   14.932117]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.932487]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.932800] ==================================================================
[   14.933243] ==================================================================
[   14.933672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.934234] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   14.934660] 
[   14.934777] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.934818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.934831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.934851] Call Trace:
[   14.934866]  <TASK>
[   14.934882]  dump_stack_lvl+0x73/0xb0
[   14.934913]  print_report+0xd1/0x650
[   14.934953]  ? __virt_addr_valid+0x1db/0x2d0
[   14.934978]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.935001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.935083]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.935108]  kasan_report+0x141/0x180
[   14.935131]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.935159]  __asan_report_load4_noabort+0x18/0x20
[   14.935186]  kasan_atomics_helper+0x4b54/0x5450
[   14.935210]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.935234]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.935261]  ? kasan_atomics+0x152/0x310
[   14.935289]  kasan_atomics+0x1dc/0x310
[   14.935312]  ? __pfx_kasan_atomics+0x10/0x10
[   14.935337]  ? __pfx_read_tsc+0x10/0x10
[   14.935359]  ? ktime_get_ts64+0x86/0x230
[   14.935383]  kunit_try_run_case+0x1a5/0x480
[   14.935409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.935433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.935457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.935482]  ? __kthread_parkme+0x82/0x180
[   14.935504]  ? preempt_count_sub+0x50/0x80
[   14.935529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.935555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.935579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.935605]  kthread+0x337/0x6f0
[   14.935626]  ? trace_preempt_on+0x20/0xc0
[   14.935649]  ? __pfx_kthread+0x10/0x10
[   14.935671]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.935694]  ? calculate_sigpending+0x7b/0xa0
[   14.935719]  ? __pfx_kthread+0x10/0x10
[   14.935741]  ret_from_fork+0x116/0x1d0
[   14.935768]  ? __pfx_kthread+0x10/0x10
[   14.935789]  ret_from_fork_asm+0x1a/0x30
[   14.935822]  </TASK>
[   14.935833] 
[   14.944178] Allocated by task 282:
[   14.944357]  kasan_save_stack+0x45/0x70
[   14.944530]  kasan_save_track+0x18/0x40
[   14.944670]  kasan_save_alloc_info+0x3b/0x50
[   14.944928]  __kasan_kmalloc+0xb7/0xc0
[   14.945122]  __kmalloc_cache_noprof+0x189/0x420
[   14.945354]  kasan_atomics+0x95/0x310
[   14.945537]  kunit_try_run_case+0x1a5/0x480
[   14.945735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.945950]  kthread+0x337/0x6f0
[   14.946072]  ret_from_fork+0x116/0x1d0
[   14.946384]  ret_from_fork_asm+0x1a/0x30
[   14.946590] 
[   14.946687] The buggy address belongs to the object at ffff888102a1a680
[   14.946687]  which belongs to the cache kmalloc-64 of size 64
[   14.947139] The buggy address is located 0 bytes to the right of
[   14.947139]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   14.947506] 
[   14.947784] The buggy address belongs to the physical page:
[   14.948186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   14.948518] flags: 0x200000000000000(node=0|zone=2)
[   14.948682] page_type: f5(slab)
[   14.948938] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.949436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.949809] page dumped because: kasan: bad access detected
[   14.950009] 
[   14.950080] Memory state around the buggy address:
[   14.950236]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.950856]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.951202] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.951552]                                      ^
[   14.951708]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.952131]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.952588] ==================================================================
[   15.090893] ==================================================================
[   15.091381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.091815] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.092050] 
[   15.092133] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.092174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.092187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.092208] Call Trace:
[   15.092223]  <TASK>
[   15.092240]  dump_stack_lvl+0x73/0xb0
[   15.092269]  print_report+0xd1/0x650
[   15.092291]  ? __virt_addr_valid+0x1db/0x2d0
[   15.092315]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.092338]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.092373]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.092397]  kasan_report+0x141/0x180
[   15.092420]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.092448]  kasan_check_range+0x10c/0x1c0
[   15.092473]  __kasan_check_write+0x18/0x20
[   15.092493]  kasan_atomics_helper+0x7c7/0x5450
[   15.092517]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.092541]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.092568]  ? kasan_atomics+0x152/0x310
[   15.092597]  kasan_atomics+0x1dc/0x310
[   15.092621]  ? __pfx_kasan_atomics+0x10/0x10
[   15.092647]  ? __pfx_read_tsc+0x10/0x10
[   15.092669]  ? ktime_get_ts64+0x86/0x230
[   15.092694]  kunit_try_run_case+0x1a5/0x480
[   15.092719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.092744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.092778]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.092803]  ? __kthread_parkme+0x82/0x180
[   15.092824]  ? preempt_count_sub+0x50/0x80
[   15.092850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.092876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.092901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.092938]  kthread+0x337/0x6f0
[   15.092958]  ? trace_preempt_on+0x20/0xc0
[   15.092981]  ? __pfx_kthread+0x10/0x10
[   15.093003]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.093026]  ? calculate_sigpending+0x7b/0xa0
[   15.093051]  ? __pfx_kthread+0x10/0x10
[   15.093083]  ret_from_fork+0x116/0x1d0
[   15.093103]  ? __pfx_kthread+0x10/0x10
[   15.093124]  ret_from_fork_asm+0x1a/0x30
[   15.093158]  </TASK>
[   15.093168] 
[   15.100839] Allocated by task 282:
[   15.101026]  kasan_save_stack+0x45/0x70
[   15.101331]  kasan_save_track+0x18/0x40
[   15.101530]  kasan_save_alloc_info+0x3b/0x50
[   15.101740]  __kasan_kmalloc+0xb7/0xc0
[   15.101937]  __kmalloc_cache_noprof+0x189/0x420
[   15.102169]  kasan_atomics+0x95/0x310
[   15.102394]  kunit_try_run_case+0x1a5/0x480
[   15.102581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.102811]  kthread+0x337/0x6f0
[   15.102970]  ret_from_fork+0x116/0x1d0
[   15.103101]  ret_from_fork_asm+0x1a/0x30
[   15.103240] 
[   15.103309] The buggy address belongs to the object at ffff888102a1a680
[   15.103309]  which belongs to the cache kmalloc-64 of size 64
[   15.103654] The buggy address is located 0 bytes to the right of
[   15.103654]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.104941] 
[   15.105076] The buggy address belongs to the physical page:
[   15.105292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.105577] flags: 0x200000000000000(node=0|zone=2)
[   15.105804] page_type: f5(slab)
[   15.105941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.106230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.106457] page dumped because: kasan: bad access detected
[   15.106629] 
[   15.106698] Memory state around the buggy address:
[   15.106852]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.107194]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.107558] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.107977]                                      ^
[   15.108195]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.108612]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.108929] ==================================================================
[   14.860992] ==================================================================
[   14.861227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.861468] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   14.863698] 
[   14.864126] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.864173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.864186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.864206] Call Trace:
[   14.864221]  <TASK>
[   14.864235]  dump_stack_lvl+0x73/0xb0
[   14.864266]  print_report+0xd1/0x650
[   14.864288]  ? __virt_addr_valid+0x1db/0x2d0
[   14.864311]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.864332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.864355]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.864378]  kasan_report+0x141/0x180
[   14.864400]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.864426]  __asan_report_load4_noabort+0x18/0x20
[   14.864451]  kasan_atomics_helper+0x4b88/0x5450
[   14.864474]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.864497]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.864521]  ? kasan_atomics+0x152/0x310
[   14.864548]  kasan_atomics+0x1dc/0x310
[   14.864571]  ? __pfx_kasan_atomics+0x10/0x10
[   14.864594]  ? __pfx_read_tsc+0x10/0x10
[   14.864615]  ? ktime_get_ts64+0x86/0x230
[   14.864639]  kunit_try_run_case+0x1a5/0x480
[   14.864664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.864687]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.864712]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.864736]  ? __kthread_parkme+0x82/0x180
[   14.864791]  ? preempt_count_sub+0x50/0x80
[   14.864816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.864841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.864877]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.864902]  kthread+0x337/0x6f0
[   14.864931]  ? trace_preempt_on+0x20/0xc0
[   14.864955]  ? __pfx_kthread+0x10/0x10
[   14.864975]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.864997]  ? calculate_sigpending+0x7b/0xa0
[   14.865080]  ? __pfx_kthread+0x10/0x10
[   14.865104]  ret_from_fork+0x116/0x1d0
[   14.865123]  ? __pfx_kthread+0x10/0x10
[   14.865143]  ret_from_fork_asm+0x1a/0x30
[   14.865175]  </TASK>
[   14.865185] 
[   14.879667] Allocated by task 282:
[   14.879824]  kasan_save_stack+0x45/0x70
[   14.880347]  kasan_save_track+0x18/0x40
[   14.880709]  kasan_save_alloc_info+0x3b/0x50
[   14.881227]  __kasan_kmalloc+0xb7/0xc0
[   14.881587]  __kmalloc_cache_noprof+0x189/0x420
[   14.882075]  kasan_atomics+0x95/0x310
[   14.882434]  kunit_try_run_case+0x1a5/0x480
[   14.882722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.883408]  kthread+0x337/0x6f0
[   14.883562]  ret_from_fork+0x116/0x1d0
[   14.883981]  ret_from_fork_asm+0x1a/0x30
[   14.884330] 
[   14.884404] The buggy address belongs to the object at ffff888102a1a680
[   14.884404]  which belongs to the cache kmalloc-64 of size 64
[   14.884764] The buggy address is located 0 bytes to the right of
[   14.884764]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   14.885989] 
[   14.886147] The buggy address belongs to the physical page:
[   14.886671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   14.887481] flags: 0x200000000000000(node=0|zone=2)
[   14.888159] page_type: f5(slab)
[   14.888394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.888624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.888966] page dumped because: kasan: bad access detected
[   14.889506] 
[   14.889708] Memory state around the buggy address:
[   14.890158]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.891003]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.891781] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.892601]                                      ^
[   14.892947]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.893549]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.894150] ==================================================================
[   15.736511] ==================================================================
[   15.736822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.737245] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.737546] 
[   15.737626] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.737664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.737675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.737696] Call Trace:
[   15.737709]  <TASK>
[   15.737722]  dump_stack_lvl+0x73/0xb0
[   15.737750]  print_report+0xd1/0x650
[   15.737773]  ? __virt_addr_valid+0x1db/0x2d0
[   15.737797]  ? kasan_atomics_helper+0x151d/0x5450
[   15.737820]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.737845]  ? kasan_atomics_helper+0x151d/0x5450
[   15.737868]  kasan_report+0x141/0x180
[   15.737892]  ? kasan_atomics_helper+0x151d/0x5450
[   15.737931]  kasan_check_range+0x10c/0x1c0
[   15.737957]  __kasan_check_write+0x18/0x20
[   15.737979]  kasan_atomics_helper+0x151d/0x5450
[   15.738005]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.738031]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.738058]  ? kasan_atomics+0x152/0x310
[   15.738086]  kasan_atomics+0x1dc/0x310
[   15.738110]  ? __pfx_kasan_atomics+0x10/0x10
[   15.738135]  ? __pfx_read_tsc+0x10/0x10
[   15.738157]  ? ktime_get_ts64+0x86/0x230
[   15.738183]  kunit_try_run_case+0x1a5/0x480
[   15.738208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.738232]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.738258]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.738283]  ? __kthread_parkme+0x82/0x180
[   15.738304]  ? preempt_count_sub+0x50/0x80
[   15.738328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.738354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.738380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.738407]  kthread+0x337/0x6f0
[   15.738426]  ? trace_preempt_on+0x20/0xc0
[   15.738451]  ? __pfx_kthread+0x10/0x10
[   15.738473]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.738495]  ? calculate_sigpending+0x7b/0xa0
[   15.738528]  ? __pfx_kthread+0x10/0x10
[   15.738551]  ret_from_fork+0x116/0x1d0
[   15.738571]  ? __pfx_kthread+0x10/0x10
[   15.738592]  ret_from_fork_asm+0x1a/0x30
[   15.738636]  </TASK>
[   15.738646] 
[   15.749274] Allocated by task 282:
[   15.749581]  kasan_save_stack+0x45/0x70
[   15.749787]  kasan_save_track+0x18/0x40
[   15.750098]  kasan_save_alloc_info+0x3b/0x50
[   15.750358]  __kasan_kmalloc+0xb7/0xc0
[   15.750608]  __kmalloc_cache_noprof+0x189/0x420
[   15.750917]  kasan_atomics+0x95/0x310
[   15.751087]  kunit_try_run_case+0x1a5/0x480
[   15.751302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.751527]  kthread+0x337/0x6f0
[   15.751686]  ret_from_fork+0x116/0x1d0
[   15.752113]  ret_from_fork_asm+0x1a/0x30
[   15.752386] 
[   15.752475] The buggy address belongs to the object at ffff888102a1a680
[   15.752475]  which belongs to the cache kmalloc-64 of size 64
[   15.753194] The buggy address is located 0 bytes to the right of
[   15.753194]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.753713] 
[   15.754000] The buggy address belongs to the physical page:
[   15.754230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.754668] flags: 0x200000000000000(node=0|zone=2)
[   15.755000] page_type: f5(slab)
[   15.755137] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.755468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.755994] page dumped because: kasan: bad access detected
[   15.756240] 
[   15.756431] Memory state around the buggy address:
[   15.756689]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.757143]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.757457] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.757741]                                      ^
[   15.758153]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.758519]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.758817] ==================================================================
[   16.142204] ==================================================================
[   16.142550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.142916] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.143283] 
[   16.143391] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.143433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.143445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.143465] Call Trace:
[   16.143480]  <TASK>
[   16.143496]  dump_stack_lvl+0x73/0xb0
[   16.143524]  print_report+0xd1/0x650
[   16.143546]  ? __virt_addr_valid+0x1db/0x2d0
[   16.143570]  ? kasan_atomics_helper+0x2006/0x5450
[   16.143593]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.143617]  ? kasan_atomics_helper+0x2006/0x5450
[   16.143641]  kasan_report+0x141/0x180
[   16.143664]  ? kasan_atomics_helper+0x2006/0x5450
[   16.143693]  kasan_check_range+0x10c/0x1c0
[   16.143719]  __kasan_check_write+0x18/0x20
[   16.143762]  kasan_atomics_helper+0x2006/0x5450
[   16.143786]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.143810]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.143836]  ? kasan_atomics+0x152/0x310
[   16.143865]  kasan_atomics+0x1dc/0x310
[   16.143888]  ? __pfx_kasan_atomics+0x10/0x10
[   16.143914]  ? __pfx_read_tsc+0x10/0x10
[   16.143944]  ? ktime_get_ts64+0x86/0x230
[   16.143969]  kunit_try_run_case+0x1a5/0x480
[   16.143994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.144018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.144043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.144069]  ? __kthread_parkme+0x82/0x180
[   16.144090]  ? preempt_count_sub+0x50/0x80
[   16.144115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.144142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.144167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.144194]  kthread+0x337/0x6f0
[   16.144214]  ? trace_preempt_on+0x20/0xc0
[   16.144238]  ? __pfx_kthread+0x10/0x10
[   16.144260]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.144283]  ? calculate_sigpending+0x7b/0xa0
[   16.144308]  ? __pfx_kthread+0x10/0x10
[   16.144331]  ret_from_fork+0x116/0x1d0
[   16.144351]  ? __pfx_kthread+0x10/0x10
[   16.144373]  ret_from_fork_asm+0x1a/0x30
[   16.144406]  </TASK>
[   16.144416] 
[   16.151521] Allocated by task 282:
[   16.151694]  kasan_save_stack+0x45/0x70
[   16.151939]  kasan_save_track+0x18/0x40
[   16.152134]  kasan_save_alloc_info+0x3b/0x50
[   16.152333]  __kasan_kmalloc+0xb7/0xc0
[   16.152499]  __kmalloc_cache_noprof+0x189/0x420
[   16.152686]  kasan_atomics+0x95/0x310
[   16.152897]  kunit_try_run_case+0x1a5/0x480
[   16.153056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.153233]  kthread+0x337/0x6f0
[   16.153356]  ret_from_fork+0x116/0x1d0
[   16.153548]  ret_from_fork_asm+0x1a/0x30
[   16.153762] 
[   16.153859] The buggy address belongs to the object at ffff888102a1a680
[   16.153859]  which belongs to the cache kmalloc-64 of size 64
[   16.154407] The buggy address is located 0 bytes to the right of
[   16.154407]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.155000] 
[   16.155076] The buggy address belongs to the physical page:
[   16.155273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.155511] flags: 0x200000000000000(node=0|zone=2)
[   16.155671] page_type: f5(slab)
[   16.155813] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.156114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.156449] page dumped because: kasan: bad access detected
[   16.156699] 
[   16.156819] Memory state around the buggy address:
[   16.157048]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.157988]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.158340] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.158640]                                      ^
[   16.160480]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.160712]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.160966] ==================================================================
[   14.837556] ==================================================================
[   14.838448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.839818] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   14.840108] 
[   14.840266] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.840311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.840323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.840343] Call Trace:
[   14.840356]  <TASK>
[   14.840553]  dump_stack_lvl+0x73/0xb0
[   14.840591]  print_report+0xd1/0x650
[   14.840614]  ? __virt_addr_valid+0x1db/0x2d0
[   14.840638]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.840660]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.840683]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.840726]  kasan_report+0x141/0x180
[   14.840748]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.840981]  __asan_report_store4_noabort+0x1b/0x30
[   14.841008]  kasan_atomics_helper+0x4ba2/0x5450
[   14.841031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.841054]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.841080]  ? kasan_atomics+0x152/0x310
[   14.841106]  kasan_atomics+0x1dc/0x310
[   14.841129]  ? __pfx_kasan_atomics+0x10/0x10
[   14.841153]  ? __pfx_read_tsc+0x10/0x10
[   14.841173]  ? ktime_get_ts64+0x86/0x230
[   14.841237]  kunit_try_run_case+0x1a5/0x480
[   14.841275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.841300]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.841326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.841352]  ? __kthread_parkme+0x82/0x180
[   14.841372]  ? preempt_count_sub+0x50/0x80
[   14.841396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.841420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.841445]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.841471]  kthread+0x337/0x6f0
[   14.841490]  ? trace_preempt_on+0x20/0xc0
[   14.841513]  ? __pfx_kthread+0x10/0x10
[   14.841534]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.841556]  ? calculate_sigpending+0x7b/0xa0
[   14.841580]  ? __pfx_kthread+0x10/0x10
[   14.841602]  ret_from_fork+0x116/0x1d0
[   14.841623]  ? __pfx_kthread+0x10/0x10
[   14.841644]  ret_from_fork_asm+0x1a/0x30
[   14.841678]  </TASK>
[   14.841688] 
[   14.851211] Allocated by task 282:
[   14.851658]  kasan_save_stack+0x45/0x70
[   14.851863]  kasan_save_track+0x18/0x40
[   14.852056]  kasan_save_alloc_info+0x3b/0x50
[   14.852228]  __kasan_kmalloc+0xb7/0xc0
[   14.852383]  __kmalloc_cache_noprof+0x189/0x420
[   14.852558]  kasan_atomics+0x95/0x310
[   14.852711]  kunit_try_run_case+0x1a5/0x480
[   14.852876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.853092]  kthread+0x337/0x6f0
[   14.853243]  ret_from_fork+0x116/0x1d0
[   14.853397]  ret_from_fork_asm+0x1a/0x30
[   14.853554] 
[   14.853758] The buggy address belongs to the object at ffff888102a1a680
[   14.853758]  which belongs to the cache kmalloc-64 of size 64
[   14.854352] The buggy address is located 0 bytes to the right of
[   14.854352]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   14.854731] 
[   14.854804] The buggy address belongs to the physical page:
[   14.855009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   14.855474] flags: 0x200000000000000(node=0|zone=2)
[   14.855766] page_type: f5(slab)
[   14.855953] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.856371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.856777] page dumped because: kasan: bad access detected
[   14.857170] 
[   14.857382] Memory state around the buggy address:
[   14.857547]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.857858]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.858092] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.858323]                                      ^
[   14.858476]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.860304]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.860540] ==================================================================
[   14.816556] ==================================================================
[   14.817415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.817768] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   14.818352] 
[   14.818467] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.818516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.818528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.818547] Call Trace:
[   14.818558]  <TASK>
[   14.818574]  dump_stack_lvl+0x73/0xb0
[   14.818603]  print_report+0xd1/0x650
[   14.818626]  ? __virt_addr_valid+0x1db/0x2d0
[   14.818650]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.818671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.818695]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.818718]  kasan_report+0x141/0x180
[   14.818740]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.818767]  __asan_report_load4_noabort+0x18/0x20
[   14.818793]  kasan_atomics_helper+0x4bbc/0x5450
[   14.818816]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.818839]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.818866]  ? kasan_atomics+0x152/0x310
[   14.818908]  kasan_atomics+0x1dc/0x310
[   14.818942]  ? __pfx_kasan_atomics+0x10/0x10
[   14.818967]  ? __pfx_read_tsc+0x10/0x10
[   14.818989]  ? ktime_get_ts64+0x86/0x230
[   14.819014]  kunit_try_run_case+0x1a5/0x480
[   14.819039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.819062]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.819098]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.819123]  ? __kthread_parkme+0x82/0x180
[   14.819143]  ? preempt_count_sub+0x50/0x80
[   14.819168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.819193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.819216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.819242]  kthread+0x337/0x6f0
[   14.819260]  ? trace_preempt_on+0x20/0xc0
[   14.819284]  ? __pfx_kthread+0x10/0x10
[   14.819306]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.819328]  ? calculate_sigpending+0x7b/0xa0
[   14.819352]  ? __pfx_kthread+0x10/0x10
[   14.819374]  ret_from_fork+0x116/0x1d0
[   14.819391]  ? __pfx_kthread+0x10/0x10
[   14.819413]  ret_from_fork_asm+0x1a/0x30
[   14.819444]  </TASK>
[   14.819454] 
[   14.827182] Allocated by task 282:
[   14.827319]  kasan_save_stack+0x45/0x70
[   14.827474]  kasan_save_track+0x18/0x40
[   14.827663]  kasan_save_alloc_info+0x3b/0x50
[   14.828224]  __kasan_kmalloc+0xb7/0xc0
[   14.828437]  __kmalloc_cache_noprof+0x189/0x420
[   14.828654]  kasan_atomics+0x95/0x310
[   14.828876]  kunit_try_run_case+0x1a5/0x480
[   14.829192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.829412]  kthread+0x337/0x6f0
[   14.829556]  ret_from_fork+0x116/0x1d0
[   14.829687]  ret_from_fork_asm+0x1a/0x30
[   14.829854] 
[   14.829964] The buggy address belongs to the object at ffff888102a1a680
[   14.829964]  which belongs to the cache kmalloc-64 of size 64
[   14.830591] The buggy address is located 0 bytes to the right of
[   14.830591]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   14.831153] 
[   14.831251] The buggy address belongs to the physical page:
[   14.831681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   14.831959] flags: 0x200000000000000(node=0|zone=2)
[   14.832552] page_type: f5(slab)
[   14.832734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.833126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.833421] page dumped because: kasan: bad access detected
[   14.833621] 
[   14.833690] Memory state around the buggy address:
[   14.833845]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.834250]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.834587] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.834938]                                      ^
[   14.835226]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.835485]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.835699] ==================================================================
[   15.021913] ==================================================================
[   15.022568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.023368] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.023873] 
[   15.024008] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.024053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.024066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.024087] Call Trace:
[   15.024105]  <TASK>
[   15.024121]  dump_stack_lvl+0x73/0xb0
[   15.024151]  print_report+0xd1/0x650
[   15.024173]  ? __virt_addr_valid+0x1db/0x2d0
[   15.024205]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.024229]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.024253]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.024276]  kasan_report+0x141/0x180
[   15.024299]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.024328]  kasan_check_range+0x10c/0x1c0
[   15.024353]  __kasan_check_write+0x18/0x20
[   15.024374]  kasan_atomics_helper+0x5fe/0x5450
[   15.024398]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.024422]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.024448]  ? kasan_atomics+0x152/0x310
[   15.024476]  kasan_atomics+0x1dc/0x310
[   15.024499]  ? __pfx_kasan_atomics+0x10/0x10
[   15.024525]  ? __pfx_read_tsc+0x10/0x10
[   15.024546]  ? ktime_get_ts64+0x86/0x230
[   15.024572]  kunit_try_run_case+0x1a5/0x480
[   15.024597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.024621]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.024646]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.024671]  ? __kthread_parkme+0x82/0x180
[   15.024694]  ? preempt_count_sub+0x50/0x80
[   15.024719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.024754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.024780]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.024806]  kthread+0x337/0x6f0
[   15.024826]  ? trace_preempt_on+0x20/0xc0
[   15.024850]  ? __pfx_kthread+0x10/0x10
[   15.024871]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.024894]  ? calculate_sigpending+0x7b/0xa0
[   15.024931]  ? __pfx_kthread+0x10/0x10
[   15.024954]  ret_from_fork+0x116/0x1d0
[   15.024972]  ? __pfx_kthread+0x10/0x10
[   15.024994]  ret_from_fork_asm+0x1a/0x30
[   15.025029]  </TASK>
[   15.025041] 
[   15.033398] Allocated by task 282:
[   15.033558]  kasan_save_stack+0x45/0x70
[   15.033759]  kasan_save_track+0x18/0x40
[   15.033903]  kasan_save_alloc_info+0x3b/0x50
[   15.034063]  __kasan_kmalloc+0xb7/0xc0
[   15.034196]  __kmalloc_cache_noprof+0x189/0x420
[   15.034351]  kasan_atomics+0x95/0x310
[   15.034562]  kunit_try_run_case+0x1a5/0x480
[   15.034794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.035112]  kthread+0x337/0x6f0
[   15.035283]  ret_from_fork+0x116/0x1d0
[   15.035474]  ret_from_fork_asm+0x1a/0x30
[   15.035737] 
[   15.035882] The buggy address belongs to the object at ffff888102a1a680
[   15.035882]  which belongs to the cache kmalloc-64 of size 64
[   15.036691] The buggy address is located 0 bytes to the right of
[   15.036691]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.037763] 
[   15.038649] The buggy address belongs to the physical page:
[   15.039391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.039956] flags: 0x200000000000000(node=0|zone=2)
[   15.040140] page_type: f5(slab)
[   15.040265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.040497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.040731] page dumped because: kasan: bad access detected
[   15.040905] 
[   15.041869] Memory state around the buggy address:
[   15.042583]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.043530]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.044320] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.044649]                                      ^
[   15.044952]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.045375]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.045780] ==================================================================
[   15.243946] ==================================================================
[   15.244368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.244719] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.245037] 
[   15.245195] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.245250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.245263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.245282] Call Trace:
[   15.245297]  <TASK>
[   15.245401]  dump_stack_lvl+0x73/0xb0
[   15.245432]  print_report+0xd1/0x650
[   15.245455]  ? __virt_addr_valid+0x1db/0x2d0
[   15.245479]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.245501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.245526]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.245549]  kasan_report+0x141/0x180
[   15.245572]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.245599]  kasan_check_range+0x10c/0x1c0
[   15.245625]  __kasan_check_write+0x18/0x20
[   15.245678]  kasan_atomics_helper+0xb6a/0x5450
[   15.245703]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.245738]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.245772]  ? kasan_atomics+0x152/0x310
[   15.245799]  kasan_atomics+0x1dc/0x310
[   15.245824]  ? __pfx_kasan_atomics+0x10/0x10
[   15.245849]  ? __pfx_read_tsc+0x10/0x10
[   15.245871]  ? ktime_get_ts64+0x86/0x230
[   15.245897]  kunit_try_run_case+0x1a5/0x480
[   15.245964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.245988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.246047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.246072]  ? __kthread_parkme+0x82/0x180
[   15.246104]  ? preempt_count_sub+0x50/0x80
[   15.246269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.246303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.246329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.246355]  kthread+0x337/0x6f0
[   15.246378]  ? trace_preempt_on+0x20/0xc0
[   15.246402]  ? __pfx_kthread+0x10/0x10
[   15.246423]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.246446]  ? calculate_sigpending+0x7b/0xa0
[   15.246472]  ? __pfx_kthread+0x10/0x10
[   15.246494]  ret_from_fork+0x116/0x1d0
[   15.246523]  ? __pfx_kthread+0x10/0x10
[   15.246546]  ret_from_fork_asm+0x1a/0x30
[   15.246579]  </TASK>
[   15.246590] 
[   15.255706] Allocated by task 282:
[   15.255842]  kasan_save_stack+0x45/0x70
[   15.256097]  kasan_save_track+0x18/0x40
[   15.256295]  kasan_save_alloc_info+0x3b/0x50
[   15.256509]  __kasan_kmalloc+0xb7/0xc0
[   15.256702]  __kmalloc_cache_noprof+0x189/0x420
[   15.256997]  kasan_atomics+0x95/0x310
[   15.257183]  kunit_try_run_case+0x1a5/0x480
[   15.257508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.257723]  kthread+0x337/0x6f0
[   15.257905]  ret_from_fork+0x116/0x1d0
[   15.258350]  ret_from_fork_asm+0x1a/0x30
[   15.258558] 
[   15.258674] The buggy address belongs to the object at ffff888102a1a680
[   15.258674]  which belongs to the cache kmalloc-64 of size 64
[   15.259149] The buggy address is located 0 bytes to the right of
[   15.259149]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.259827] 
[   15.259972] The buggy address belongs to the physical page:
[   15.260167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.260732] flags: 0x200000000000000(node=0|zone=2)
[   15.260908] page_type: f5(slab)
[   15.261046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.261474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.261853] page dumped because: kasan: bad access detected
[   15.262348] 
[   15.262452] Memory state around the buggy address:
[   15.262633]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.263121]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.263391] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.263679]                                      ^
[   15.264488]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.264947]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.265475] ==================================================================
[   15.565374] ==================================================================
[   15.566226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.566846] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.567085] 
[   15.567171] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.567213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.567226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.567247] Call Trace:
[   15.567263]  <TASK>
[   15.567279]  dump_stack_lvl+0x73/0xb0
[   15.567307]  print_report+0xd1/0x650
[   15.567331]  ? __virt_addr_valid+0x1db/0x2d0
[   15.567355]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.567378]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.567403]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.567427]  kasan_report+0x141/0x180
[   15.567450]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.567479]  __asan_report_load4_noabort+0x18/0x20
[   15.567505]  kasan_atomics_helper+0x49e8/0x5450
[   15.567529]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.567554]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.567579]  ? kasan_atomics+0x152/0x310
[   15.567607]  kasan_atomics+0x1dc/0x310
[   15.567631]  ? __pfx_kasan_atomics+0x10/0x10
[   15.567657]  ? __pfx_read_tsc+0x10/0x10
[   15.567678]  ? ktime_get_ts64+0x86/0x230
[   15.567704]  kunit_try_run_case+0x1a5/0x480
[   15.567728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.567801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.567853]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.567950]  ? __kthread_parkme+0x82/0x180
[   15.567972]  ? preempt_count_sub+0x50/0x80
[   15.568007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.568033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.568060]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.568087]  kthread+0x337/0x6f0
[   15.568107]  ? trace_preempt_on+0x20/0xc0
[   15.568131]  ? __pfx_kthread+0x10/0x10
[   15.568153]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.568176]  ? calculate_sigpending+0x7b/0xa0
[   15.568200]  ? __pfx_kthread+0x10/0x10
[   15.568223]  ret_from_fork+0x116/0x1d0
[   15.568241]  ? __pfx_kthread+0x10/0x10
[   15.568264]  ret_from_fork_asm+0x1a/0x30
[   15.568297]  </TASK>
[   15.568307] 
[   15.580277] Allocated by task 282:
[   15.580443]  kasan_save_stack+0x45/0x70
[   15.580644]  kasan_save_track+0x18/0x40
[   15.581659]  kasan_save_alloc_info+0x3b/0x50
[   15.581852]  __kasan_kmalloc+0xb7/0xc0
[   15.582162]  __kmalloc_cache_noprof+0x189/0x420
[   15.582398]  kasan_atomics+0x95/0x310
[   15.582583]  kunit_try_run_case+0x1a5/0x480
[   15.583110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.583360]  kthread+0x337/0x6f0
[   15.583538]  ret_from_fork+0x116/0x1d0
[   15.583914]  ret_from_fork_asm+0x1a/0x30
[   15.584216] 
[   15.584423] The buggy address belongs to the object at ffff888102a1a680
[   15.584423]  which belongs to the cache kmalloc-64 of size 64
[   15.585141] The buggy address is located 0 bytes to the right of
[   15.585141]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.585821] 
[   15.586035] The buggy address belongs to the physical page:
[   15.586397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.586853] flags: 0x200000000000000(node=0|zone=2)
[   15.587072] page_type: f5(slab)
[   15.587247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.587574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.588157] page dumped because: kasan: bad access detected
[   15.588468] 
[   15.588543] Memory state around the buggy address:
[   15.589072]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.589505]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.589977] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.590385]                                      ^
[   15.590694]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.591136]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.591437] ==================================================================
[   15.047033] ==================================================================
[   15.047414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.048067] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.048489] 
[   15.048749] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.048796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.048808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.048829] Call Trace:
[   15.048846]  <TASK>
[   15.048861]  dump_stack_lvl+0x73/0xb0
[   15.048893]  print_report+0xd1/0x650
[   15.048916]  ? __virt_addr_valid+0x1db/0x2d0
[   15.049032]  ? kasan_atomics_helper+0x697/0x5450
[   15.049055]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.049080]  ? kasan_atomics_helper+0x697/0x5450
[   15.049103]  kasan_report+0x141/0x180
[   15.049127]  ? kasan_atomics_helper+0x697/0x5450
[   15.049156]  kasan_check_range+0x10c/0x1c0
[   15.049181]  __kasan_check_write+0x18/0x20
[   15.049202]  kasan_atomics_helper+0x697/0x5450
[   15.049226]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.049250]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.049276]  ? kasan_atomics+0x152/0x310
[   15.049321]  kasan_atomics+0x1dc/0x310
[   15.049345]  ? __pfx_kasan_atomics+0x10/0x10
[   15.049371]  ? __pfx_read_tsc+0x10/0x10
[   15.049392]  ? ktime_get_ts64+0x86/0x230
[   15.049417]  kunit_try_run_case+0x1a5/0x480
[   15.049442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.049467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.049491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.049516]  ? __kthread_parkme+0x82/0x180
[   15.049537]  ? preempt_count_sub+0x50/0x80
[   15.049562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.049587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.049613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.049639]  kthread+0x337/0x6f0
[   15.049659]  ? trace_preempt_on+0x20/0xc0
[   15.049683]  ? __pfx_kthread+0x10/0x10
[   15.049705]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.049727]  ? calculate_sigpending+0x7b/0xa0
[   15.049760]  ? __pfx_kthread+0x10/0x10
[   15.049783]  ret_from_fork+0x116/0x1d0
[   15.049802]  ? __pfx_kthread+0x10/0x10
[   15.049823]  ret_from_fork_asm+0x1a/0x30
[   15.049858]  </TASK>
[   15.049868] 
[   15.060395] Allocated by task 282:
[   15.060549]  kasan_save_stack+0x45/0x70
[   15.060791]  kasan_save_track+0x18/0x40
[   15.061325]  kasan_save_alloc_info+0x3b/0x50
[   15.061525]  __kasan_kmalloc+0xb7/0xc0
[   15.061711]  __kmalloc_cache_noprof+0x189/0x420
[   15.062021]  kasan_atomics+0x95/0x310
[   15.062356]  kunit_try_run_case+0x1a5/0x480
[   15.062612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.063019]  kthread+0x337/0x6f0
[   15.063196]  ret_from_fork+0x116/0x1d0
[   15.063366]  ret_from_fork_asm+0x1a/0x30
[   15.063700] 
[   15.063851] The buggy address belongs to the object at ffff888102a1a680
[   15.063851]  which belongs to the cache kmalloc-64 of size 64
[   15.064559] The buggy address is located 0 bytes to the right of
[   15.064559]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.065357] 
[   15.065480] The buggy address belongs to the physical page:
[   15.065724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.066112] flags: 0x200000000000000(node=0|zone=2)
[   15.066531] page_type: f5(slab)
[   15.066691] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.067251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.067577] page dumped because: kasan: bad access detected
[   15.067941] 
[   15.068017] Memory state around the buggy address:
[   15.068388]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.068839]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.069142] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.069584]                                      ^
[   15.069818]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.070222]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.070672] ==================================================================
[   15.638659] ==================================================================
[   15.639117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.639633] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.640472] 
[   15.640583] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.640626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.640640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.640661] Call Trace:
[   15.640699]  <TASK>
[   15.640731]  dump_stack_lvl+0x73/0xb0
[   15.640762]  print_report+0xd1/0x650
[   15.640799]  ? __virt_addr_valid+0x1db/0x2d0
[   15.640836]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.640858]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.640897]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.640950]  kasan_report+0x141/0x180
[   15.640974]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.641014]  kasan_check_range+0x10c/0x1c0
[   15.641038]  __kasan_check_read+0x15/0x20
[   15.641059]  kasan_atomics_helper+0x13b5/0x5450
[   15.641407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.641437]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.641464]  ? kasan_atomics+0x152/0x310
[   15.641492]  kasan_atomics+0x1dc/0x310
[   15.641515]  ? __pfx_kasan_atomics+0x10/0x10
[   15.641541]  ? __pfx_read_tsc+0x10/0x10
[   15.641562]  ? ktime_get_ts64+0x86/0x230
[   15.641587]  kunit_try_run_case+0x1a5/0x480
[   15.641611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.641636]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.641660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.641685]  ? __kthread_parkme+0x82/0x180
[   15.641706]  ? preempt_count_sub+0x50/0x80
[   15.641731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.641756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.641782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.641808]  kthread+0x337/0x6f0
[   15.641828]  ? trace_preempt_on+0x20/0xc0
[   15.642779]  ? __pfx_kthread+0x10/0x10
[   15.642820]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.642846]  ? calculate_sigpending+0x7b/0xa0
[   15.642871]  ? __pfx_kthread+0x10/0x10
[   15.642895]  ret_from_fork+0x116/0x1d0
[   15.642916]  ? __pfx_kthread+0x10/0x10
[   15.642954]  ret_from_fork_asm+0x1a/0x30
[   15.642992]  </TASK>
[   15.643004] 
[   15.658281] Allocated by task 282:
[   15.658555]  kasan_save_stack+0x45/0x70
[   15.658871]  kasan_save_track+0x18/0x40
[   15.659112]  kasan_save_alloc_info+0x3b/0x50
[   15.659464]  __kasan_kmalloc+0xb7/0xc0
[   15.659600]  __kmalloc_cache_noprof+0x189/0x420
[   15.659784]  kasan_atomics+0x95/0x310
[   15.660146]  kunit_try_run_case+0x1a5/0x480
[   15.660546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.661094]  kthread+0x337/0x6f0
[   15.661411]  ret_from_fork+0x116/0x1d0
[   15.661752]  ret_from_fork_asm+0x1a/0x30
[   15.662129] 
[   15.662204] The buggy address belongs to the object at ffff888102a1a680
[   15.662204]  which belongs to the cache kmalloc-64 of size 64
[   15.662566] The buggy address is located 0 bytes to the right of
[   15.662566]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.663359] 
[   15.663532] The buggy address belongs to the physical page:
[   15.664089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.664765] flags: 0x200000000000000(node=0|zone=2)
[   15.665213] page_type: f5(slab)
[   15.665505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.666258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.667015] page dumped because: kasan: bad access detected
[   15.667195] 
[   15.667265] Memory state around the buggy address:
[   15.667422]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.667638]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.668084] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.668695]                                      ^
[   15.669193]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.669813]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.670420] ==================================================================
[   15.267816] ==================================================================
[   15.268559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.269235] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.269758] 
[   15.269988] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.270074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.270223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.270250] Call Trace:
[   15.270266]  <TASK>
[   15.270295]  dump_stack_lvl+0x73/0xb0
[   15.270360]  print_report+0xd1/0x650
[   15.270386]  ? __virt_addr_valid+0x1db/0x2d0
[   15.270412]  ? kasan_atomics_helper+0xc70/0x5450
[   15.270436]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.270462]  ? kasan_atomics_helper+0xc70/0x5450
[   15.270486]  kasan_report+0x141/0x180
[   15.270520]  ? kasan_atomics_helper+0xc70/0x5450
[   15.270548]  kasan_check_range+0x10c/0x1c0
[   15.270573]  __kasan_check_write+0x18/0x20
[   15.270592]  kasan_atomics_helper+0xc70/0x5450
[   15.270617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.270640]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.270666]  ? kasan_atomics+0x152/0x310
[   15.270695]  kasan_atomics+0x1dc/0x310
[   15.270719]  ? __pfx_kasan_atomics+0x10/0x10
[   15.270744]  ? __pfx_read_tsc+0x10/0x10
[   15.270777]  ? ktime_get_ts64+0x86/0x230
[   15.270802]  kunit_try_run_case+0x1a5/0x480
[   15.270828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.270852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.270877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.270901]  ? __kthread_parkme+0x82/0x180
[   15.270934]  ? preempt_count_sub+0x50/0x80
[   15.270961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.270986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.271013]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.271039]  kthread+0x337/0x6f0
[   15.271059]  ? trace_preempt_on+0x20/0xc0
[   15.271082]  ? __pfx_kthread+0x10/0x10
[   15.271104]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.271126]  ? calculate_sigpending+0x7b/0xa0
[   15.271152]  ? __pfx_kthread+0x10/0x10
[   15.271174]  ret_from_fork+0x116/0x1d0
[   15.271193]  ? __pfx_kthread+0x10/0x10
[   15.271214]  ret_from_fork_asm+0x1a/0x30
[   15.271247]  </TASK>
[   15.271258] 
[   15.282620] Allocated by task 282:
[   15.283109]  kasan_save_stack+0x45/0x70
[   15.283382]  kasan_save_track+0x18/0x40
[   15.283799]  kasan_save_alloc_info+0x3b/0x50
[   15.284035]  __kasan_kmalloc+0xb7/0xc0
[   15.284210]  __kmalloc_cache_noprof+0x189/0x420
[   15.284415]  kasan_atomics+0x95/0x310
[   15.284590]  kunit_try_run_case+0x1a5/0x480
[   15.285081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.285369]  kthread+0x337/0x6f0
[   15.285762]  ret_from_fork+0x116/0x1d0
[   15.285981]  ret_from_fork_asm+0x1a/0x30
[   15.286168] 
[   15.286259] The buggy address belongs to the object at ffff888102a1a680
[   15.286259]  which belongs to the cache kmalloc-64 of size 64
[   15.286744] The buggy address is located 0 bytes to the right of
[   15.286744]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.287669] 
[   15.287992] The buggy address belongs to the physical page:
[   15.288312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.288639] flags: 0x200000000000000(node=0|zone=2)
[   15.289187] page_type: f5(slab)
[   15.289366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.289680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.290459] page dumped because: kasan: bad access detected
[   15.290769] 
[   15.291101] Memory state around the buggy address:
[   15.291462]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.292298]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.292857] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.293170]                                      ^
[   15.293382]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.293671]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.294267] ==================================================================
[   15.376050] ==================================================================
[   15.377076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.377331] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.377551] 
[   15.377638] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.377682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.377695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.377716] Call Trace:
[   15.378137]  <TASK>
[   15.378159]  dump_stack_lvl+0x73/0xb0
[   15.378190]  print_report+0xd1/0x650
[   15.378214]  ? __virt_addr_valid+0x1db/0x2d0
[   15.378238]  ? kasan_atomics_helper+0xf10/0x5450
[   15.378261]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.378287]  ? kasan_atomics_helper+0xf10/0x5450
[   15.378310]  kasan_report+0x141/0x180
[   15.378333]  ? kasan_atomics_helper+0xf10/0x5450
[   15.378362]  kasan_check_range+0x10c/0x1c0
[   15.378437]  __kasan_check_write+0x18/0x20
[   15.378779]  kasan_atomics_helper+0xf10/0x5450
[   15.378813]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.378838]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.378864]  ? kasan_atomics+0x152/0x310
[   15.378893]  kasan_atomics+0x1dc/0x310
[   15.378917]  ? __pfx_kasan_atomics+0x10/0x10
[   15.378953]  ? __pfx_read_tsc+0x10/0x10
[   15.378974]  ? ktime_get_ts64+0x86/0x230
[   15.378999]  kunit_try_run_case+0x1a5/0x480
[   15.379024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.379048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.379073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.379098]  ? __kthread_parkme+0x82/0x180
[   15.379119]  ? preempt_count_sub+0x50/0x80
[   15.379144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.379170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.379195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.379222]  kthread+0x337/0x6f0
[   15.379241]  ? trace_preempt_on+0x20/0xc0
[   15.379265]  ? __pfx_kthread+0x10/0x10
[   15.379287]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.379311]  ? calculate_sigpending+0x7b/0xa0
[   15.379336]  ? __pfx_kthread+0x10/0x10
[   15.379359]  ret_from_fork+0x116/0x1d0
[   15.379378]  ? __pfx_kthread+0x10/0x10
[   15.379400]  ret_from_fork_asm+0x1a/0x30
[   15.379433]  </TASK>
[   15.379444] 
[   15.388994] Allocated by task 282:
[   15.389187]  kasan_save_stack+0x45/0x70
[   15.389400]  kasan_save_track+0x18/0x40
[   15.389599]  kasan_save_alloc_info+0x3b/0x50
[   15.389875]  __kasan_kmalloc+0xb7/0xc0
[   15.391074]  __kmalloc_cache_noprof+0x189/0x420
[   15.391558]  kasan_atomics+0x95/0x310
[   15.391708]  kunit_try_run_case+0x1a5/0x480
[   15.391867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.392136]  kthread+0x337/0x6f0
[   15.392470]  ret_from_fork+0x116/0x1d0
[   15.392878]  ret_from_fork_asm+0x1a/0x30
[   15.393335] 
[   15.393496] The buggy address belongs to the object at ffff888102a1a680
[   15.393496]  which belongs to the cache kmalloc-64 of size 64
[   15.394716] The buggy address is located 0 bytes to the right of
[   15.394716]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.395850] 
[   15.396044] The buggy address belongs to the physical page:
[   15.396562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.397265] flags: 0x200000000000000(node=0|zone=2)
[   15.397723] page_type: f5(slab)
[   15.398080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.398672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.399272] page dumped because: kasan: bad access detected
[   15.399700] 
[   15.399772] Memory state around the buggy address:
[   15.400239]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.400704]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.400977] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.401189]                                      ^
[   15.401344]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.401560]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.401834] ==================================================================
[   15.821256] ==================================================================
[   15.821828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.823329] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.823687] 
[   15.823771] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.823812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.823824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.823845] Call Trace:
[   15.823858]  <TASK>
[   15.823871]  dump_stack_lvl+0x73/0xb0
[   15.823901]  print_report+0xd1/0x650
[   15.823935]  ? __virt_addr_valid+0x1db/0x2d0
[   15.823959]  ? kasan_atomics_helper+0x177f/0x5450
[   15.823982]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.824007]  ? kasan_atomics_helper+0x177f/0x5450
[   15.824030]  kasan_report+0x141/0x180
[   15.824053]  ? kasan_atomics_helper+0x177f/0x5450
[   15.824082]  kasan_check_range+0x10c/0x1c0
[   15.824106]  __kasan_check_write+0x18/0x20
[   15.824127]  kasan_atomics_helper+0x177f/0x5450
[   15.824151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.824175]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.824201]  ? kasan_atomics+0x152/0x310
[   15.824229]  kasan_atomics+0x1dc/0x310
[   15.824252]  ? __pfx_kasan_atomics+0x10/0x10
[   15.824300]  ? __pfx_read_tsc+0x10/0x10
[   15.824322]  ? ktime_get_ts64+0x86/0x230
[   15.824348]  kunit_try_run_case+0x1a5/0x480
[   15.824373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.824398]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.824429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.824454]  ? __kthread_parkme+0x82/0x180
[   15.824475]  ? preempt_count_sub+0x50/0x80
[   15.824500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.824526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.824551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.824578]  kthread+0x337/0x6f0
[   15.824597]  ? trace_preempt_on+0x20/0xc0
[   15.824632]  ? __pfx_kthread+0x10/0x10
[   15.824653]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.824676]  ? calculate_sigpending+0x7b/0xa0
[   15.824713]  ? __pfx_kthread+0x10/0x10
[   15.824735]  ret_from_fork+0x116/0x1d0
[   15.824755]  ? __pfx_kthread+0x10/0x10
[   15.824777]  ret_from_fork_asm+0x1a/0x30
[   15.824810]  </TASK>
[   15.824820] 
[   15.836352] Allocated by task 282:
[   15.836705]  kasan_save_stack+0x45/0x70
[   15.836939]  kasan_save_track+0x18/0x40
[   15.837140]  kasan_save_alloc_info+0x3b/0x50
[   15.837344]  __kasan_kmalloc+0xb7/0xc0
[   15.837523]  __kmalloc_cache_noprof+0x189/0x420
[   15.837736]  kasan_atomics+0x95/0x310
[   15.838282]  kunit_try_run_case+0x1a5/0x480
[   15.838514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.838887]  kthread+0x337/0x6f0
[   15.839046]  ret_from_fork+0x116/0x1d0
[   15.839365]  ret_from_fork_asm+0x1a/0x30
[   15.839642] 
[   15.839743] The buggy address belongs to the object at ffff888102a1a680
[   15.839743]  which belongs to the cache kmalloc-64 of size 64
[   15.840429] The buggy address is located 0 bytes to the right of
[   15.840429]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.841299] 
[   15.841408] The buggy address belongs to the physical page:
[   15.841654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.842151] flags: 0x200000000000000(node=0|zone=2)
[   15.842458] page_type: f5(slab)
[   15.842595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.843222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.843622] page dumped because: kasan: bad access detected
[   15.844064] 
[   15.844165] Memory state around the buggy address:
[   15.844375]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.844684]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.845143] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.845527]                                      ^
[   15.845744]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.846211]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.846582] ==================================================================
[   14.894531] ==================================================================
[   14.894761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.895081] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   14.895375] 
[   14.895456] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.895496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.895508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.895527] Call Trace:
[   14.895542]  <TASK>
[   14.895556]  dump_stack_lvl+0x73/0xb0
[   14.895584]  print_report+0xd1/0x650
[   14.895605]  ? __virt_addr_valid+0x1db/0x2d0
[   14.895628]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.895650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.895673]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.895695]  kasan_report+0x141/0x180
[   14.895881]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.895912]  __asan_report_store4_noabort+0x1b/0x30
[   14.895972]  kasan_atomics_helper+0x4b6e/0x5450
[   14.895997]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.896021]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.896196]  ? kasan_atomics+0x152/0x310
[   14.896230]  kasan_atomics+0x1dc/0x310
[   14.896253]  ? __pfx_kasan_atomics+0x10/0x10
[   14.896279]  ? __pfx_read_tsc+0x10/0x10
[   14.896301]  ? ktime_get_ts64+0x86/0x230
[   14.896327]  kunit_try_run_case+0x1a5/0x480
[   14.896352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.896376]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.896402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.896426]  ? __kthread_parkme+0x82/0x180
[   14.896448]  ? preempt_count_sub+0x50/0x80
[   14.896473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.896499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.896524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.896551]  kthread+0x337/0x6f0
[   14.896571]  ? trace_preempt_on+0x20/0xc0
[   14.896596]  ? __pfx_kthread+0x10/0x10
[   14.896617]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.896640]  ? calculate_sigpending+0x7b/0xa0
[   14.896665]  ? __pfx_kthread+0x10/0x10
[   14.896687]  ret_from_fork+0x116/0x1d0
[   14.896706]  ? __pfx_kthread+0x10/0x10
[   14.896728]  ret_from_fork_asm+0x1a/0x30
[   14.896761]  </TASK>
[   14.896772] 
[   14.905046] Allocated by task 282:
[   14.905236]  kasan_save_stack+0x45/0x70
[   14.905442]  kasan_save_track+0x18/0x40
[   14.905638]  kasan_save_alloc_info+0x3b/0x50
[   14.905827]  __kasan_kmalloc+0xb7/0xc0
[   14.906128]  __kmalloc_cache_noprof+0x189/0x420
[   14.906320]  kasan_atomics+0x95/0x310
[   14.906459]  kunit_try_run_case+0x1a5/0x480
[   14.906672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.907081]  kthread+0x337/0x6f0
[   14.907242]  ret_from_fork+0x116/0x1d0
[   14.907419]  ret_from_fork_asm+0x1a/0x30
[   14.907590] 
[   14.907661] The buggy address belongs to the object at ffff888102a1a680
[   14.907661]  which belongs to the cache kmalloc-64 of size 64
[   14.908213] The buggy address is located 0 bytes to the right of
[   14.908213]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   14.908598] 
[   14.908708] The buggy address belongs to the physical page:
[   14.909279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   14.909648] flags: 0x200000000000000(node=0|zone=2)
[   14.909885] page_type: f5(slab)
[   14.910070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.910429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.910754] page dumped because: kasan: bad access detected
[   14.910937] 
[   14.911008] Memory state around the buggy address:
[   14.911164]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.911489]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.911951] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.912344]                                      ^
[   14.912519]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912744]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.913140] ==================================================================
[   15.313621] ==================================================================
[   15.314299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.314660] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.314900] 
[   15.315121] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.315163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.315175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.315207] Call Trace:
[   15.315221]  <TASK>
[   15.315237]  dump_stack_lvl+0x73/0xb0
[   15.315265]  print_report+0xd1/0x650
[   15.315301]  ? __virt_addr_valid+0x1db/0x2d0
[   15.315325]  ? kasan_atomics_helper+0xd47/0x5450
[   15.315348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.315372]  ? kasan_atomics_helper+0xd47/0x5450
[   15.315396]  kasan_report+0x141/0x180
[   15.315419]  ? kasan_atomics_helper+0xd47/0x5450
[   15.315448]  kasan_check_range+0x10c/0x1c0
[   15.315474]  __kasan_check_write+0x18/0x20
[   15.315495]  kasan_atomics_helper+0xd47/0x5450
[   15.315519]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.315552]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.315578]  ? kasan_atomics+0x152/0x310
[   15.315606]  kasan_atomics+0x1dc/0x310
[   15.315640]  ? __pfx_kasan_atomics+0x10/0x10
[   15.315666]  ? __pfx_read_tsc+0x10/0x10
[   15.315688]  ? ktime_get_ts64+0x86/0x230
[   15.315714]  kunit_try_run_case+0x1a5/0x480
[   15.315752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.315776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.315802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.315849]  ? __kthread_parkme+0x82/0x180
[   15.315870]  ? preempt_count_sub+0x50/0x80
[   15.315896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.315931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.315956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.315984]  kthread+0x337/0x6f0
[   15.316004]  ? trace_preempt_on+0x20/0xc0
[   15.316030]  ? __pfx_kthread+0x10/0x10
[   15.316051]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.316073]  ? calculate_sigpending+0x7b/0xa0
[   15.316099]  ? __pfx_kthread+0x10/0x10
[   15.316121]  ret_from_fork+0x116/0x1d0
[   15.316140]  ? __pfx_kthread+0x10/0x10
[   15.316171]  ret_from_fork_asm+0x1a/0x30
[   15.316204]  </TASK>
[   15.316215] 
[   15.324166] Allocated by task 282:
[   15.324357]  kasan_save_stack+0x45/0x70
[   15.324524]  kasan_save_track+0x18/0x40
[   15.324743]  kasan_save_alloc_info+0x3b/0x50
[   15.324907]  __kasan_kmalloc+0xb7/0xc0
[   15.325053]  __kmalloc_cache_noprof+0x189/0x420
[   15.325212]  kasan_atomics+0x95/0x310
[   15.325421]  kunit_try_run_case+0x1a5/0x480
[   15.325634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.325882]  kthread+0x337/0x6f0
[   15.326130]  ret_from_fork+0x116/0x1d0
[   15.326345]  ret_from_fork_asm+0x1a/0x30
[   15.326492] 
[   15.326570] The buggy address belongs to the object at ffff888102a1a680
[   15.326570]  which belongs to the cache kmalloc-64 of size 64
[   15.327370] The buggy address is located 0 bytes to the right of
[   15.327370]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.327930] 
[   15.328016] The buggy address belongs to the physical page:
[   15.328263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.328613] flags: 0x200000000000000(node=0|zone=2)
[   15.328864] page_type: f5(slab)
[   15.329038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.329353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.329627] page dumped because: kasan: bad access detected
[   15.329799] 
[   15.329869] Memory state around the buggy address:
[   15.330034]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.330249]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.330600] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.331233]                                      ^
[   15.331461]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.331773]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.332100] ==================================================================
[   15.071270] ==================================================================
[   15.071614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.072296] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.072670] 
[   15.072891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.072947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.072961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.072981] Call Trace:
[   15.072995]  <TASK>
[   15.073010]  dump_stack_lvl+0x73/0xb0
[   15.073041]  print_report+0xd1/0x650
[   15.073064]  ? __virt_addr_valid+0x1db/0x2d0
[   15.073089]  ? kasan_atomics_helper+0x72f/0x5450
[   15.073111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.073136]  ? kasan_atomics_helper+0x72f/0x5450
[   15.073160]  kasan_report+0x141/0x180
[   15.073183]  ? kasan_atomics_helper+0x72f/0x5450
[   15.073211]  kasan_check_range+0x10c/0x1c0
[   15.073236]  __kasan_check_write+0x18/0x20
[   15.073257]  kasan_atomics_helper+0x72f/0x5450
[   15.073281]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.073305]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.073331]  ? kasan_atomics+0x152/0x310
[   15.073360]  kasan_atomics+0x1dc/0x310
[   15.073383]  ? __pfx_kasan_atomics+0x10/0x10
[   15.073408]  ? __pfx_read_tsc+0x10/0x10
[   15.073431]  ? ktime_get_ts64+0x86/0x230
[   15.073456]  kunit_try_run_case+0x1a5/0x480
[   15.073482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.073506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.073530]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.073556]  ? __kthread_parkme+0x82/0x180
[   15.073576]  ? preempt_count_sub+0x50/0x80
[   15.073600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.073626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.073653]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.073679]  kthread+0x337/0x6f0
[   15.073698]  ? trace_preempt_on+0x20/0xc0
[   15.073724]  ? __pfx_kthread+0x10/0x10
[   15.073745]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.073783]  ? calculate_sigpending+0x7b/0xa0
[   15.073808]  ? __pfx_kthread+0x10/0x10
[   15.073831]  ret_from_fork+0x116/0x1d0
[   15.073849]  ? __pfx_kthread+0x10/0x10
[   15.073872]  ret_from_fork_asm+0x1a/0x30
[   15.073905]  </TASK>
[   15.073915] 
[   15.082045] Allocated by task 282:
[   15.082178]  kasan_save_stack+0x45/0x70
[   15.082324]  kasan_save_track+0x18/0x40
[   15.082457]  kasan_save_alloc_info+0x3b/0x50
[   15.083005]  __kasan_kmalloc+0xb7/0xc0
[   15.083193]  __kmalloc_cache_noprof+0x189/0x420
[   15.083417]  kasan_atomics+0x95/0x310
[   15.083612]  kunit_try_run_case+0x1a5/0x480
[   15.083898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.084252]  kthread+0x337/0x6f0
[   15.084410]  ret_from_fork+0x116/0x1d0
[   15.084543]  ret_from_fork_asm+0x1a/0x30
[   15.084732] 
[   15.084838] The buggy address belongs to the object at ffff888102a1a680
[   15.084838]  which belongs to the cache kmalloc-64 of size 64
[   15.085337] The buggy address is located 0 bytes to the right of
[   15.085337]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.085699] 
[   15.085769] The buggy address belongs to the physical page:
[   15.086126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.086488] flags: 0x200000000000000(node=0|zone=2)
[   15.086699] page_type: f5(slab)
[   15.086959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.087195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.087420] page dumped because: kasan: bad access detected
[   15.087590] 
[   15.087745] Memory state around the buggy address:
[   15.088105]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.088612]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.089053] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.089354]                                      ^
[   15.089538]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.089753]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.090017] ==================================================================
[   15.759482] ==================================================================
[   15.759743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.760431] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.760868] 
[   15.761064] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.761107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.761121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.761253] Call Trace:
[   15.761270]  <TASK>
[   15.761288]  dump_stack_lvl+0x73/0xb0
[   15.761318]  print_report+0xd1/0x650
[   15.761343]  ? __virt_addr_valid+0x1db/0x2d0
[   15.761366]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.761389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.761414]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.761437]  kasan_report+0x141/0x180
[   15.761460]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.761490]  kasan_check_range+0x10c/0x1c0
[   15.761515]  __kasan_check_write+0x18/0x20
[   15.761536]  kasan_atomics_helper+0x15b6/0x5450
[   15.761561]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.761585]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.761612]  ? kasan_atomics+0x152/0x310
[   15.761640]  kasan_atomics+0x1dc/0x310
[   15.761664]  ? __pfx_kasan_atomics+0x10/0x10
[   15.761689]  ? __pfx_read_tsc+0x10/0x10
[   15.761711]  ? ktime_get_ts64+0x86/0x230
[   15.761736]  kunit_try_run_case+0x1a5/0x480
[   15.761772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.761796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.761821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.761847]  ? __kthread_parkme+0x82/0x180
[   15.761868]  ? preempt_count_sub+0x50/0x80
[   15.761894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.761933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.761959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.761987]  kthread+0x337/0x6f0
[   15.762007]  ? trace_preempt_on+0x20/0xc0
[   15.762032]  ? __pfx_kthread+0x10/0x10
[   15.762055]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.762077]  ? calculate_sigpending+0x7b/0xa0
[   15.762103]  ? __pfx_kthread+0x10/0x10
[   15.762125]  ret_from_fork+0x116/0x1d0
[   15.762144]  ? __pfx_kthread+0x10/0x10
[   15.762166]  ret_from_fork_asm+0x1a/0x30
[   15.762200]  </TASK>
[   15.762211] 
[   15.771854] Allocated by task 282:
[   15.772210]  kasan_save_stack+0x45/0x70
[   15.772410]  kasan_save_track+0x18/0x40
[   15.772598]  kasan_save_alloc_info+0x3b/0x50
[   15.772790]  __kasan_kmalloc+0xb7/0xc0
[   15.773115]  __kmalloc_cache_noprof+0x189/0x420
[   15.773334]  kasan_atomics+0x95/0x310
[   15.773508]  kunit_try_run_case+0x1a5/0x480
[   15.773707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.774133]  kthread+0x337/0x6f0
[   15.774379]  ret_from_fork+0x116/0x1d0
[   15.774541]  ret_from_fork_asm+0x1a/0x30
[   15.774746] 
[   15.774833] The buggy address belongs to the object at ffff888102a1a680
[   15.774833]  which belongs to the cache kmalloc-64 of size 64
[   15.775545] The buggy address is located 0 bytes to the right of
[   15.775545]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.776250] 
[   15.776340] The buggy address belongs to the physical page:
[   15.776581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.777136] flags: 0x200000000000000(node=0|zone=2)
[   15.777429] page_type: f5(slab)
[   15.777555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.778117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.778514] page dumped because: kasan: bad access detected
[   15.778738] 
[   15.778902] Memory state around the buggy address:
[   15.779197]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.779633]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.780030] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.780336]                                      ^
[   15.780541]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781102]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781700] ==================================================================
[   15.905984] ==================================================================
[   15.907159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.907430] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.907780] 
[   15.907891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.907952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.907966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.907988] Call Trace:
[   15.908002]  <TASK>
[   15.908017]  dump_stack_lvl+0x73/0xb0
[   15.908047]  print_report+0xd1/0x650
[   15.908071]  ? __virt_addr_valid+0x1db/0x2d0
[   15.908095]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.908118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.908143]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.908166]  kasan_report+0x141/0x180
[   15.908190]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.908218]  kasan_check_range+0x10c/0x1c0
[   15.908244]  __kasan_check_write+0x18/0x20
[   15.908265]  kasan_atomics_helper+0x19e3/0x5450
[   15.908289]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.908313]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.908339]  ? kasan_atomics+0x152/0x310
[   15.908367]  kasan_atomics+0x1dc/0x310
[   15.908390]  ? __pfx_kasan_atomics+0x10/0x10
[   15.908416]  ? __pfx_read_tsc+0x10/0x10
[   15.908437]  ? ktime_get_ts64+0x86/0x230
[   15.908463]  kunit_try_run_case+0x1a5/0x480
[   15.908488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.908512]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.908537]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.908562]  ? __kthread_parkme+0x82/0x180
[   15.908584]  ? preempt_count_sub+0x50/0x80
[   15.908608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.908634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.908660]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.908686]  kthread+0x337/0x6f0
[   15.908705]  ? trace_preempt_on+0x20/0xc0
[   15.908730]  ? __pfx_kthread+0x10/0x10
[   15.908772]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.908796]  ? calculate_sigpending+0x7b/0xa0
[   15.908821]  ? __pfx_kthread+0x10/0x10
[   15.908844]  ret_from_fork+0x116/0x1d0
[   15.908862]  ? __pfx_kthread+0x10/0x10
[   15.908884]  ret_from_fork_asm+0x1a/0x30
[   15.908947]  </TASK>
[   15.908958] 
[   15.916029] Allocated by task 282:
[   15.916214]  kasan_save_stack+0x45/0x70
[   15.916423]  kasan_save_track+0x18/0x40
[   15.916617]  kasan_save_alloc_info+0x3b/0x50
[   15.916860]  __kasan_kmalloc+0xb7/0xc0
[   15.917122]  __kmalloc_cache_noprof+0x189/0x420
[   15.917313]  kasan_atomics+0x95/0x310
[   15.917487]  kunit_try_run_case+0x1a5/0x480
[   15.917664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.917911]  kthread+0x337/0x6f0
[   15.918098]  ret_from_fork+0x116/0x1d0
[   15.918255]  ret_from_fork_asm+0x1a/0x30
[   15.918448] 
[   15.918540] The buggy address belongs to the object at ffff888102a1a680
[   15.918540]  which belongs to the cache kmalloc-64 of size 64
[   15.919062] The buggy address is located 0 bytes to the right of
[   15.919062]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.919552] 
[   15.919648] The buggy address belongs to the physical page:
[   15.919907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.920251] flags: 0x200000000000000(node=0|zone=2)
[   15.920441] page_type: f5(slab)
[   15.920561] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.920826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.921064] page dumped because: kasan: bad access detected
[   15.921276] 
[   15.921370] Memory state around the buggy address:
[   15.921594]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.921936]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.922253] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.922583]                                      ^
[   15.922756]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.923024]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.923350] ==================================================================
[   16.055957] ==================================================================
[   16.057036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.057371] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.057694] 
[   16.057842] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.057886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.057898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.057931] Call Trace:
[   16.057950]  <TASK>
[   16.057966]  dump_stack_lvl+0x73/0xb0
[   16.057996]  print_report+0xd1/0x650
[   16.058018]  ? __virt_addr_valid+0x1db/0x2d0
[   16.058052]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.058075]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.058099]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.058133]  kasan_report+0x141/0x180
[   16.058157]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.058184]  kasan_check_range+0x10c/0x1c0
[   16.058210]  __kasan_check_write+0x18/0x20
[   16.058231]  kasan_atomics_helper+0x1e12/0x5450
[   16.058255]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.058279]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.058306]  ? kasan_atomics+0x152/0x310
[   16.058335]  kasan_atomics+0x1dc/0x310
[   16.058359]  ? __pfx_kasan_atomics+0x10/0x10
[   16.058394]  ? __pfx_read_tsc+0x10/0x10
[   16.058417]  ? ktime_get_ts64+0x86/0x230
[   16.058442]  kunit_try_run_case+0x1a5/0x480
[   16.058480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.058508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.058544]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.058569]  ? __kthread_parkme+0x82/0x180
[   16.058591]  ? preempt_count_sub+0x50/0x80
[   16.058616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.058642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.058668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.058695]  kthread+0x337/0x6f0
[   16.058716]  ? trace_preempt_on+0x20/0xc0
[   16.058740]  ? __pfx_kthread+0x10/0x10
[   16.058772]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.058795]  ? calculate_sigpending+0x7b/0xa0
[   16.058820]  ? __pfx_kthread+0x10/0x10
[   16.058843]  ret_from_fork+0x116/0x1d0
[   16.058863]  ? __pfx_kthread+0x10/0x10
[   16.058885]  ret_from_fork_asm+0x1a/0x30
[   16.058928]  </TASK>
[   16.058938] 
[   16.067655] Allocated by task 282:
[   16.068216]  kasan_save_stack+0x45/0x70
[   16.068508]  kasan_save_track+0x18/0x40
[   16.069116]  kasan_save_alloc_info+0x3b/0x50
[   16.069353]  __kasan_kmalloc+0xb7/0xc0
[   16.069541]  __kmalloc_cache_noprof+0x189/0x420
[   16.069949]  kasan_atomics+0x95/0x310
[   16.070209]  kunit_try_run_case+0x1a5/0x480
[   16.070417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.070661]  kthread+0x337/0x6f0
[   16.071160]  ret_from_fork+0x116/0x1d0
[   16.071432]  ret_from_fork_asm+0x1a/0x30
[   16.071753] 
[   16.071859] The buggy address belongs to the object at ffff888102a1a680
[   16.071859]  which belongs to the cache kmalloc-64 of size 64
[   16.072350] The buggy address is located 0 bytes to the right of
[   16.072350]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.073139] 
[   16.073378] The buggy address belongs to the physical page:
[   16.073839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.074174] flags: 0x200000000000000(node=0|zone=2)
[   16.074350] page_type: f5(slab)
[   16.074474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.074718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.074985] page dumped because: kasan: bad access detected
[   16.075236] 
[   16.075332] Memory state around the buggy address:
[   16.075560]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.075891]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.077104] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.077842]                                      ^
[   16.078362]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.079160]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.079864] ==================================================================
[   15.671504] ==================================================================
[   15.672193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.672965] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.673527] 
[   15.673733] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.673777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.673790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.673811] Call Trace:
[   15.673828]  <TASK>
[   15.673844]  dump_stack_lvl+0x73/0xb0
[   15.673883]  print_report+0xd1/0x650
[   15.673907]  ? __virt_addr_valid+0x1db/0x2d0
[   15.673947]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.673972]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.673997]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.674021]  kasan_report+0x141/0x180
[   15.674053]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.674082]  __asan_report_load8_noabort+0x18/0x20
[   15.674119]  kasan_atomics_helper+0x4eae/0x5450
[   15.674142]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.674166]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.674193]  ? kasan_atomics+0x152/0x310
[   15.674220]  kasan_atomics+0x1dc/0x310
[   15.674243]  ? __pfx_kasan_atomics+0x10/0x10
[   15.674269]  ? __pfx_read_tsc+0x10/0x10
[   15.674290]  ? ktime_get_ts64+0x86/0x230
[   15.674316]  kunit_try_run_case+0x1a5/0x480
[   15.674341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.674366]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.674390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.674415]  ? __kthread_parkme+0x82/0x180
[   15.674436]  ? preempt_count_sub+0x50/0x80
[   15.674461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.674487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.674517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.674543]  kthread+0x337/0x6f0
[   15.674562]  ? trace_preempt_on+0x20/0xc0
[   15.674587]  ? __pfx_kthread+0x10/0x10
[   15.674608]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.674630]  ? calculate_sigpending+0x7b/0xa0
[   15.674656]  ? __pfx_kthread+0x10/0x10
[   15.674679]  ret_from_fork+0x116/0x1d0
[   15.674698]  ? __pfx_kthread+0x10/0x10
[   15.674720]  ret_from_fork_asm+0x1a/0x30
[   15.674753]  </TASK>
[   15.674765] 
[   15.686953] Allocated by task 282:
[   15.687356]  kasan_save_stack+0x45/0x70
[   15.687726]  kasan_save_track+0x18/0x40
[   15.688105]  kasan_save_alloc_info+0x3b/0x50
[   15.688499]  __kasan_kmalloc+0xb7/0xc0
[   15.688851]  __kmalloc_cache_noprof+0x189/0x420
[   15.689298]  kasan_atomics+0x95/0x310
[   15.689576]  kunit_try_run_case+0x1a5/0x480
[   15.689724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.689934]  kthread+0x337/0x6f0
[   15.690060]  ret_from_fork+0x116/0x1d0
[   15.690193]  ret_from_fork_asm+0x1a/0x30
[   15.690334] 
[   15.690403] The buggy address belongs to the object at ffff888102a1a680
[   15.690403]  which belongs to the cache kmalloc-64 of size 64
[   15.690767] The buggy address is located 0 bytes to the right of
[   15.690767]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.691843] 
[   15.692016] The buggy address belongs to the physical page:
[   15.692487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.693375] flags: 0x200000000000000(node=0|zone=2)
[   15.693830] page_type: f5(slab)
[   15.694134] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.694802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.695446] page dumped because: kasan: bad access detected
[   15.695961] 
[   15.696151] Memory state around the buggy address:
[   15.696568]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.697139]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.697357] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.697570]                                      ^
[   15.697723]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698336]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698965] ==================================================================
[   15.988262] ==================================================================
[   15.988516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.989137] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.989489] 
[   15.989623] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.989679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.989693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.989713] Call Trace:
[   15.989726]  <TASK>
[   15.989740]  dump_stack_lvl+0x73/0xb0
[   15.989780]  print_report+0xd1/0x650
[   15.989804]  ? __virt_addr_valid+0x1db/0x2d0
[   15.989829]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.989861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.989887]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.989910]  kasan_report+0x141/0x180
[   15.989951]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.989979]  __asan_report_load8_noabort+0x18/0x20
[   15.990005]  kasan_atomics_helper+0x4f30/0x5450
[   15.990030]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.990054]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.990080]  ? kasan_atomics+0x152/0x310
[   15.990109]  kasan_atomics+0x1dc/0x310
[   15.990142]  ? __pfx_kasan_atomics+0x10/0x10
[   15.990167]  ? __pfx_read_tsc+0x10/0x10
[   15.990190]  ? ktime_get_ts64+0x86/0x230
[   15.990227]  kunit_try_run_case+0x1a5/0x480
[   15.990253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.990277]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.990302]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.990327]  ? __kthread_parkme+0x82/0x180
[   15.990348]  ? preempt_count_sub+0x50/0x80
[   15.990373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.990399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.990424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.990451]  kthread+0x337/0x6f0
[   15.990479]  ? trace_preempt_on+0x20/0xc0
[   15.990511]  ? __pfx_kthread+0x10/0x10
[   15.990532]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.990566]  ? calculate_sigpending+0x7b/0xa0
[   15.990590]  ? __pfx_kthread+0x10/0x10
[   15.990613]  ret_from_fork+0x116/0x1d0
[   15.990632]  ? __pfx_kthread+0x10/0x10
[   15.990654]  ret_from_fork_asm+0x1a/0x30
[   15.990688]  </TASK>
[   15.990698] 
[   15.998208] Allocated by task 282:
[   15.998336]  kasan_save_stack+0x45/0x70
[   15.998518]  kasan_save_track+0x18/0x40
[   15.998734]  kasan_save_alloc_info+0x3b/0x50
[   15.998950]  __kasan_kmalloc+0xb7/0xc0
[   15.999140]  __kmalloc_cache_noprof+0x189/0x420
[   15.999362]  kasan_atomics+0x95/0x310
[   15.999729]  kunit_try_run_case+0x1a5/0x480
[   15.999970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.000190]  kthread+0x337/0x6f0
[   16.000393]  ret_from_fork+0x116/0x1d0
[   16.000544]  ret_from_fork_asm+0x1a/0x30
[   16.000747] 
[   16.000852] The buggy address belongs to the object at ffff888102a1a680
[   16.000852]  which belongs to the cache kmalloc-64 of size 64
[   16.001363] The buggy address is located 0 bytes to the right of
[   16.001363]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.001968] 
[   16.002041] The buggy address belongs to the physical page:
[   16.002217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.002459] flags: 0x200000000000000(node=0|zone=2)
[   16.002674] page_type: f5(slab)
[   16.002979] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.003322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.003657] page dumped because: kasan: bad access detected
[   16.004123] 
[   16.004218] Memory state around the buggy address:
[   16.004373]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.004589]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.004994] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.005312]                                      ^
[   16.005514]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.005729]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.006275] ==================================================================
[   15.804064] ==================================================================
[   15.804402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.804895] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.805136] 
[   15.805221] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.805263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.805275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.805295] Call Trace:
[   15.805311]  <TASK>
[   15.805327]  dump_stack_lvl+0x73/0xb0
[   15.805356]  print_report+0xd1/0x650
[   15.805379]  ? __virt_addr_valid+0x1db/0x2d0
[   15.805403]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.805425]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.805449]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.805473]  kasan_report+0x141/0x180
[   15.805495]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.805523]  kasan_check_range+0x10c/0x1c0
[   15.805548]  __kasan_check_write+0x18/0x20
[   15.805568]  kasan_atomics_helper+0x16e7/0x5450
[   15.805592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.805616]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.805642]  ? kasan_atomics+0x152/0x310
[   15.805670]  kasan_atomics+0x1dc/0x310
[   15.805693]  ? __pfx_kasan_atomics+0x10/0x10
[   15.805718]  ? __pfx_read_tsc+0x10/0x10
[   15.805739]  ? ktime_get_ts64+0x86/0x230
[   15.805779]  kunit_try_run_case+0x1a5/0x480
[   15.805804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.805828]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.805852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.805877]  ? __kthread_parkme+0x82/0x180
[   15.805898]  ? preempt_count_sub+0x50/0x80
[   15.805933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.805959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.805984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.806011]  kthread+0x337/0x6f0
[   15.806031]  ? trace_preempt_on+0x20/0xc0
[   15.806055]  ? __pfx_kthread+0x10/0x10
[   15.806077]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.806100]  ? calculate_sigpending+0x7b/0xa0
[   15.806125]  ? __pfx_kthread+0x10/0x10
[   15.806148]  ret_from_fork+0x116/0x1d0
[   15.806167]  ? __pfx_kthread+0x10/0x10
[   15.806189]  ret_from_fork_asm+0x1a/0x30
[   15.806222]  </TASK>
[   15.806233] 
[   15.813846] Allocated by task 282:
[   15.814000]  kasan_save_stack+0x45/0x70
[   15.814175]  kasan_save_track+0x18/0x40
[   15.814371]  kasan_save_alloc_info+0x3b/0x50
[   15.814543]  __kasan_kmalloc+0xb7/0xc0
[   15.814736]  __kmalloc_cache_noprof+0x189/0x420
[   15.814927]  kasan_atomics+0x95/0x310
[   15.815119]  kunit_try_run_case+0x1a5/0x480
[   15.815309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.815543]  kthread+0x337/0x6f0
[   15.815665]  ret_from_fork+0x116/0x1d0
[   15.815797]  ret_from_fork_asm+0x1a/0x30
[   15.815963] 
[   15.816063] The buggy address belongs to the object at ffff888102a1a680
[   15.816063]  which belongs to the cache kmalloc-64 of size 64
[   15.816587] The buggy address is located 0 bytes to the right of
[   15.816587]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.817037] 
[   15.817109] The buggy address belongs to the physical page:
[   15.817465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.817791] flags: 0x200000000000000(node=0|zone=2)
[   15.818019] page_type: f5(slab)
[   15.818174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.818465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.818791] page dumped because: kasan: bad access detected
[   15.818972] 
[   15.819055] Memory state around the buggy address:
[   15.819278]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.819561]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.819878] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.820161]                                      ^
[   15.820362]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820600]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820812] ==================================================================
[   15.480013] ==================================================================
[   15.480317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.480672] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.481023] 
[   15.481215] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.481255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.481267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.481287] Call Trace:
[   15.481300]  <TASK>
[   15.481314]  dump_stack_lvl+0x73/0xb0
[   15.481342]  print_report+0xd1/0x650
[   15.481365]  ? __virt_addr_valid+0x1db/0x2d0
[   15.481389]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.481414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.481438]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.481461]  kasan_report+0x141/0x180
[   15.481484]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.481512]  __asan_report_load4_noabort+0x18/0x20
[   15.481538]  kasan_atomics_helper+0x4a1c/0x5450
[   15.481562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.481586]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.481612]  ? kasan_atomics+0x152/0x310
[   15.481639]  kasan_atomics+0x1dc/0x310
[   15.481663]  ? __pfx_kasan_atomics+0x10/0x10
[   15.481711]  ? __pfx_read_tsc+0x10/0x10
[   15.481732]  ? ktime_get_ts64+0x86/0x230
[   15.481766]  kunit_try_run_case+0x1a5/0x480
[   15.481792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.481815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.481857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.481896]  ? __kthread_parkme+0x82/0x180
[   15.481928]  ? preempt_count_sub+0x50/0x80
[   15.481953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.481979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.482004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.482031]  kthread+0x337/0x6f0
[   15.482051]  ? trace_preempt_on+0x20/0xc0
[   15.482075]  ? __pfx_kthread+0x10/0x10
[   15.482097]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.482120]  ? calculate_sigpending+0x7b/0xa0
[   15.482145]  ? __pfx_kthread+0x10/0x10
[   15.482168]  ret_from_fork+0x116/0x1d0
[   15.482187]  ? __pfx_kthread+0x10/0x10
[   15.482209]  ret_from_fork_asm+0x1a/0x30
[   15.482244]  </TASK>
[   15.482276] 
[   15.490190] Allocated by task 282:
[   15.490382]  kasan_save_stack+0x45/0x70
[   15.490632]  kasan_save_track+0x18/0x40
[   15.490850]  kasan_save_alloc_info+0x3b/0x50
[   15.491083]  __kasan_kmalloc+0xb7/0xc0
[   15.491271]  __kmalloc_cache_noprof+0x189/0x420
[   15.491494]  kasan_atomics+0x95/0x310
[   15.491688]  kunit_try_run_case+0x1a5/0x480
[   15.491935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.492188]  kthread+0x337/0x6f0
[   15.492320]  ret_from_fork+0x116/0x1d0
[   15.492498]  ret_from_fork_asm+0x1a/0x30
[   15.492638] 
[   15.492730] The buggy address belongs to the object at ffff888102a1a680
[   15.492730]  which belongs to the cache kmalloc-64 of size 64
[   15.493275] The buggy address is located 0 bytes to the right of
[   15.493275]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.493817] 
[   15.493916] The buggy address belongs to the physical page:
[   15.494156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.494498] flags: 0x200000000000000(node=0|zone=2)
[   15.494736] page_type: f5(slab)
[   15.494893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.495135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.495361] page dumped because: kasan: bad access detected
[   15.495532] 
[   15.495607] Memory state around the buggy address:
[   15.495958]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.496280]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.496602] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.496953]                                      ^
[   15.497206]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.497520]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.497836] ==================================================================
[   14.990757] ==================================================================
[   14.991107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.991607] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   14.992098] 
[   14.992208] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.992250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.992263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.992284] Call Trace:
[   14.992298]  <TASK>
[   14.992313]  dump_stack_lvl+0x73/0xb0
[   14.992343]  print_report+0xd1/0x650
[   14.992368]  ? __virt_addr_valid+0x1db/0x2d0
[   14.992392]  ? kasan_atomics_helper+0x565/0x5450
[   14.992416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.992441]  ? kasan_atomics_helper+0x565/0x5450
[   14.992464]  kasan_report+0x141/0x180
[   14.992487]  ? kasan_atomics_helper+0x565/0x5450
[   14.992517]  kasan_check_range+0x10c/0x1c0
[   14.992543]  __kasan_check_write+0x18/0x20
[   14.992564]  kasan_atomics_helper+0x565/0x5450
[   14.992588]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.992612]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.992639]  ? kasan_atomics+0x152/0x310
[   14.992667]  kasan_atomics+0x1dc/0x310
[   14.992691]  ? __pfx_kasan_atomics+0x10/0x10
[   14.992717]  ? __pfx_read_tsc+0x10/0x10
[   14.992738]  ? ktime_get_ts64+0x86/0x230
[   14.992775]  kunit_try_run_case+0x1a5/0x480
[   14.992800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.992825]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.992851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.992876]  ? __kthread_parkme+0x82/0x180
[   14.992896]  ? preempt_count_sub+0x50/0x80
[   14.992934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.992960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.992986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.993012]  kthread+0x337/0x6f0
[   14.993032]  ? trace_preempt_on+0x20/0xc0
[   14.993057]  ? __pfx_kthread+0x10/0x10
[   14.993079]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.993102]  ? calculate_sigpending+0x7b/0xa0
[   14.993128]  ? __pfx_kthread+0x10/0x10
[   14.993150]  ret_from_fork+0x116/0x1d0
[   14.993169]  ? __pfx_kthread+0x10/0x10
[   14.993191]  ret_from_fork_asm+0x1a/0x30
[   14.993224]  </TASK>
[   14.993402] 
[   15.007734] Allocated by task 282:
[   15.008236]  kasan_save_stack+0x45/0x70
[   15.008697]  kasan_save_track+0x18/0x40
[   15.008880]  kasan_save_alloc_info+0x3b/0x50
[   15.009049]  __kasan_kmalloc+0xb7/0xc0
[   15.009420]  __kmalloc_cache_noprof+0x189/0x420
[   15.009927]  kasan_atomics+0x95/0x310
[   15.010350]  kunit_try_run_case+0x1a5/0x480
[   15.010727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.011279]  kthread+0x337/0x6f0
[   15.011574]  ret_from_fork+0x116/0x1d0
[   15.011977]  ret_from_fork_asm+0x1a/0x30
[   15.012378] 
[   15.012533] The buggy address belongs to the object at ffff888102a1a680
[   15.012533]  which belongs to the cache kmalloc-64 of size 64
[   15.012930] The buggy address is located 0 bytes to the right of
[   15.012930]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.013369] 
[   15.013453] The buggy address belongs to the physical page:
[   15.013627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.014115] flags: 0x200000000000000(node=0|zone=2)
[   15.014604] page_type: f5(slab)
[   15.014961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.015714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.016443] page dumped because: kasan: bad access detected
[   15.017044] 
[   15.017199] Memory state around the buggy address:
[   15.017620]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.018288]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.018984] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.019694]                                      ^
[   15.020152]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.020873]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.021330] ==================================================================
[   16.161421] ==================================================================
[   16.161664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.161960] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.162243] 
[   16.162614] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.162661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.162675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.162695] Call Trace:
[   16.162709]  <TASK>
[   16.162723]  dump_stack_lvl+0x73/0xb0
[   16.164526]  print_report+0xd1/0x650
[   16.164553]  ? __virt_addr_valid+0x1db/0x2d0
[   16.164580]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.164604]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.164629]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.164653]  kasan_report+0x141/0x180
[   16.164676]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.164705]  __asan_report_load8_noabort+0x18/0x20
[   16.164732]  kasan_atomics_helper+0x4f98/0x5450
[   16.164782]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.164806]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.164833]  ? kasan_atomics+0x152/0x310
[   16.164861]  kasan_atomics+0x1dc/0x310
[   16.164884]  ? __pfx_kasan_atomics+0x10/0x10
[   16.164910]  ? __pfx_read_tsc+0x10/0x10
[   16.164986]  ? ktime_get_ts64+0x86/0x230
[   16.165013]  kunit_try_run_case+0x1a5/0x480
[   16.165039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.165063]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.165089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.165114]  ? __kthread_parkme+0x82/0x180
[   16.165135]  ? preempt_count_sub+0x50/0x80
[   16.165160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.165185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.165211]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.165237]  kthread+0x337/0x6f0
[   16.165257]  ? trace_preempt_on+0x20/0xc0
[   16.165281]  ? __pfx_kthread+0x10/0x10
[   16.165302]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.165325]  ? calculate_sigpending+0x7b/0xa0
[   16.165351]  ? __pfx_kthread+0x10/0x10
[   16.165374]  ret_from_fork+0x116/0x1d0
[   16.165394]  ? __pfx_kthread+0x10/0x10
[   16.165415]  ret_from_fork_asm+0x1a/0x30
[   16.165450]  </TASK>
[   16.165462] 
[   16.172399] Allocated by task 282:
[   16.172584]  kasan_save_stack+0x45/0x70
[   16.172790]  kasan_save_track+0x18/0x40
[   16.172988]  kasan_save_alloc_info+0x3b/0x50
[   16.173191]  __kasan_kmalloc+0xb7/0xc0
[   16.173359]  __kmalloc_cache_noprof+0x189/0x420
[   16.173563]  kasan_atomics+0x95/0x310
[   16.173724]  kunit_try_run_case+0x1a5/0x480
[   16.173953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.174141]  kthread+0x337/0x6f0
[   16.174262]  ret_from_fork+0x116/0x1d0
[   16.174395]  ret_from_fork_asm+0x1a/0x30
[   16.174567] 
[   16.174659] The buggy address belongs to the object at ffff888102a1a680
[   16.174659]  which belongs to the cache kmalloc-64 of size 64
[   16.175220] The buggy address is located 0 bytes to the right of
[   16.175220]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.175591] 
[   16.175664] The buggy address belongs to the physical page:
[   16.175947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.176307] flags: 0x200000000000000(node=0|zone=2)
[   16.176542] page_type: f5(slab)
[   16.176720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.177101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.177352] page dumped because: kasan: bad access detected
[   16.177524] 
[   16.177593] Memory state around the buggy address:
[   16.177766]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.178058]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.178375] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.178692]                                      ^
[   16.178948]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.179233]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.179448] ==================================================================
[   16.237609] ==================================================================
[   16.238719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.239275] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.239498] 
[   16.239581] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.239621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.239634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.239654] Call Trace:
[   16.239669]  <TASK>
[   16.239684]  dump_stack_lvl+0x73/0xb0
[   16.239714]  print_report+0xd1/0x650
[   16.239739]  ? __virt_addr_valid+0x1db/0x2d0
[   16.240127]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.240429]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.240466]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.240505]  kasan_report+0x141/0x180
[   16.240530]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.240560]  __asan_report_load8_noabort+0x18/0x20
[   16.240586]  kasan_atomics_helper+0x4fa5/0x5450
[   16.240610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.240634]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.240660]  ? kasan_atomics+0x152/0x310
[   16.240691]  kasan_atomics+0x1dc/0x310
[   16.240715]  ? __pfx_kasan_atomics+0x10/0x10
[   16.240740]  ? __pfx_read_tsc+0x10/0x10
[   16.240775]  ? ktime_get_ts64+0x86/0x230
[   16.240801]  kunit_try_run_case+0x1a5/0x480
[   16.240826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.240851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.240877]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.240902]  ? __kthread_parkme+0x82/0x180
[   16.240934]  ? preempt_count_sub+0x50/0x80
[   16.240959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.240985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.241011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.241037]  kthread+0x337/0x6f0
[   16.241056]  ? trace_preempt_on+0x20/0xc0
[   16.241081]  ? __pfx_kthread+0x10/0x10
[   16.241103]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.241129]  ? calculate_sigpending+0x7b/0xa0
[   16.241155]  ? __pfx_kthread+0x10/0x10
[   16.241179]  ret_from_fork+0x116/0x1d0
[   16.241199]  ? __pfx_kthread+0x10/0x10
[   16.241221]  ret_from_fork_asm+0x1a/0x30
[   16.241254]  </TASK>
[   16.241265] 
[   16.254509] Allocated by task 282:
[   16.254894]  kasan_save_stack+0x45/0x70
[   16.255204]  kasan_save_track+0x18/0x40
[   16.255464]  kasan_save_alloc_info+0x3b/0x50
[   16.255612]  __kasan_kmalloc+0xb7/0xc0
[   16.255742]  __kmalloc_cache_noprof+0x189/0x420
[   16.256188]  kasan_atomics+0x95/0x310
[   16.256552]  kunit_try_run_case+0x1a5/0x480
[   16.256985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.257477]  kthread+0x337/0x6f0
[   16.257780]  ret_from_fork+0x116/0x1d0
[   16.258124]  ret_from_fork_asm+0x1a/0x30
[   16.258263] 
[   16.258333] The buggy address belongs to the object at ffff888102a1a680
[   16.258333]  which belongs to the cache kmalloc-64 of size 64
[   16.258679] The buggy address is located 0 bytes to the right of
[   16.258679]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.259743] 
[   16.259940] The buggy address belongs to the physical page:
[   16.260430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.261153] flags: 0x200000000000000(node=0|zone=2)
[   16.261702] page_type: f5(slab)
[   16.262066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.262735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.263230] page dumped because: kasan: bad access detected
[   16.263396] 
[   16.263464] Memory state around the buggy address:
[   16.263612]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.263846]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.264158] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.264491]                                      ^
[   16.264644]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.265065]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.265351] ==================================================================
[   15.332547] ==================================================================
[   15.332817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.333181] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.333684] 
[   15.333884] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.333938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.333951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.333971] Call Trace:
[   15.333987]  <TASK>
[   15.334002]  dump_stack_lvl+0x73/0xb0
[   15.334043]  print_report+0xd1/0x650
[   15.334066]  ? __virt_addr_valid+0x1db/0x2d0
[   15.334102]  ? kasan_atomics_helper+0xde0/0x5450
[   15.334125]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.334149]  ? kasan_atomics_helper+0xde0/0x5450
[   15.334172]  kasan_report+0x141/0x180
[   15.334195]  ? kasan_atomics_helper+0xde0/0x5450
[   15.334223]  kasan_check_range+0x10c/0x1c0
[   15.334248]  __kasan_check_write+0x18/0x20
[   15.334268]  kasan_atomics_helper+0xde0/0x5450
[   15.334292]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.334316]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.334343]  ? kasan_atomics+0x152/0x310
[   15.334370]  kasan_atomics+0x1dc/0x310
[   15.334394]  ? __pfx_kasan_atomics+0x10/0x10
[   15.334419]  ? __pfx_read_tsc+0x10/0x10
[   15.334450]  ? ktime_get_ts64+0x86/0x230
[   15.334476]  kunit_try_run_case+0x1a5/0x480
[   15.334517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.334543]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.334568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.334594]  ? __kthread_parkme+0x82/0x180
[   15.334624]  ? preempt_count_sub+0x50/0x80
[   15.334649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.334675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.334712]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.334738]  kthread+0x337/0x6f0
[   15.334767]  ? trace_preempt_on+0x20/0xc0
[   15.334792]  ? __pfx_kthread+0x10/0x10
[   15.334823]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.334846]  ? calculate_sigpending+0x7b/0xa0
[   15.334872]  ? __pfx_kthread+0x10/0x10
[   15.334905]  ret_from_fork+0x116/0x1d0
[   15.334933]  ? __pfx_kthread+0x10/0x10
[   15.334955]  ret_from_fork_asm+0x1a/0x30
[   15.334988]  </TASK>
[   15.334998] 
[   15.342641] Allocated by task 282:
[   15.342883]  kasan_save_stack+0x45/0x70
[   15.343080]  kasan_save_track+0x18/0x40
[   15.343282]  kasan_save_alloc_info+0x3b/0x50
[   15.343495]  __kasan_kmalloc+0xb7/0xc0
[   15.343685]  __kmalloc_cache_noprof+0x189/0x420
[   15.343928]  kasan_atomics+0x95/0x310
[   15.344087]  kunit_try_run_case+0x1a5/0x480
[   15.344274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.344481]  kthread+0x337/0x6f0
[   15.344651]  ret_from_fork+0x116/0x1d0
[   15.344852]  ret_from_fork_asm+0x1a/0x30
[   15.345033] 
[   15.345154] The buggy address belongs to the object at ffff888102a1a680
[   15.345154]  which belongs to the cache kmalloc-64 of size 64
[   15.345632] The buggy address is located 0 bytes to the right of
[   15.345632]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.346077] 
[   15.346151] The buggy address belongs to the physical page:
[   15.346323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.346568] flags: 0x200000000000000(node=0|zone=2)
[   15.346730] page_type: f5(slab)
[   15.346897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.347556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.347900] page dumped because: kasan: bad access detected
[   15.348161] 
[   15.348253] Memory state around the buggy address:
[   15.348468]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.348682]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.348895] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.349115]                                      ^
[   15.349270]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.349548]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.350028] ==================================================================
[   15.350585] ==================================================================
[   15.351058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.351427] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.351786] 
[   15.351892] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.351944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.351957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.351979] Call Trace:
[   15.351996]  <TASK>
[   15.352013]  dump_stack_lvl+0x73/0xb0
[   15.352042]  print_report+0xd1/0x650
[   15.352065]  ? __virt_addr_valid+0x1db/0x2d0
[   15.352091]  ? kasan_atomics_helper+0xe78/0x5450
[   15.352113]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.352137]  ? kasan_atomics_helper+0xe78/0x5450
[   15.352171]  kasan_report+0x141/0x180
[   15.352194]  ? kasan_atomics_helper+0xe78/0x5450
[   15.352222]  kasan_check_range+0x10c/0x1c0
[   15.352257]  __kasan_check_write+0x18/0x20
[   15.352280]  kasan_atomics_helper+0xe78/0x5450
[   15.352304]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.352336]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.352362]  ? kasan_atomics+0x152/0x310
[   15.352390]  kasan_atomics+0x1dc/0x310
[   15.352424]  ? __pfx_kasan_atomics+0x10/0x10
[   15.352451]  ? __pfx_read_tsc+0x10/0x10
[   15.352473]  ? ktime_get_ts64+0x86/0x230
[   15.352508]  kunit_try_run_case+0x1a5/0x480
[   15.352533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.352567]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.352592]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.352617]  ? __kthread_parkme+0x82/0x180
[   15.352648]  ? preempt_count_sub+0x50/0x80
[   15.352673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.352699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.352735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.352771]  kthread+0x337/0x6f0
[   15.352791]  ? trace_preempt_on+0x20/0xc0
[   15.352816]  ? __pfx_kthread+0x10/0x10
[   15.352846]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.352869]  ? calculate_sigpending+0x7b/0xa0
[   15.352905]  ? __pfx_kthread+0x10/0x10
[   15.352937]  ret_from_fork+0x116/0x1d0
[   15.352956]  ? __pfx_kthread+0x10/0x10
[   15.352978]  ret_from_fork_asm+0x1a/0x30
[   15.353020]  </TASK>
[   15.353030] 
[   15.363983] Allocated by task 282:
[   15.364281]  kasan_save_stack+0x45/0x70
[   15.364509]  kasan_save_track+0x18/0x40
[   15.364667]  kasan_save_alloc_info+0x3b/0x50
[   15.364877]  __kasan_kmalloc+0xb7/0xc0
[   15.365263]  __kmalloc_cache_noprof+0x189/0x420
[   15.365543]  kasan_atomics+0x95/0x310
[   15.365806]  kunit_try_run_case+0x1a5/0x480
[   15.366115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.366313]  kthread+0x337/0x6f0
[   15.366609]  ret_from_fork+0x116/0x1d0
[   15.366807]  ret_from_fork_asm+0x1a/0x30
[   15.367107] 
[   15.367181] The buggy address belongs to the object at ffff888102a1a680
[   15.367181]  which belongs to the cache kmalloc-64 of size 64
[   15.367669] The buggy address is located 0 bytes to the right of
[   15.367669]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.368417] 
[   15.368520] The buggy address belongs to the physical page:
[   15.368990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.369305] flags: 0x200000000000000(node=0|zone=2)
[   15.369668] page_type: f5(slab)
[   15.369828] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.370265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.370681] page dumped because: kasan: bad access detected
[   15.370892] 
[   15.371075] Memory state around the buggy address:
[   15.371435]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.371773]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.372178] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.372523]                                      ^
[   15.372734]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.373239]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.373618] ==================================================================
[   16.266488] ==================================================================
[   16.267068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.267396] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.267692] 
[   16.267831] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.267874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.267909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.267939] Call Trace:
[   16.267956]  <TASK>
[   16.267973]  dump_stack_lvl+0x73/0xb0
[   16.268003]  print_report+0xd1/0x650
[   16.268027]  ? __virt_addr_valid+0x1db/0x2d0
[   16.268060]  ? kasan_atomics_helper+0x224c/0x5450
[   16.268082]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.268107]  ? kasan_atomics_helper+0x224c/0x5450
[   16.268141]  kasan_report+0x141/0x180
[   16.268164]  ? kasan_atomics_helper+0x224c/0x5450
[   16.268193]  kasan_check_range+0x10c/0x1c0
[   16.268218]  __kasan_check_write+0x18/0x20
[   16.268239]  kasan_atomics_helper+0x224c/0x5450
[   16.268263]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.268287]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.268313]  ? kasan_atomics+0x152/0x310
[   16.268350]  kasan_atomics+0x1dc/0x310
[   16.268374]  ? __pfx_kasan_atomics+0x10/0x10
[   16.268399]  ? __pfx_read_tsc+0x10/0x10
[   16.268431]  ? ktime_get_ts64+0x86/0x230
[   16.268456]  kunit_try_run_case+0x1a5/0x480
[   16.268482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.268506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.268531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.268564]  ? __kthread_parkme+0x82/0x180
[   16.268585]  ? preempt_count_sub+0x50/0x80
[   16.268621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.268647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.268672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.268698]  kthread+0x337/0x6f0
[   16.268718]  ? trace_preempt_on+0x20/0xc0
[   16.268742]  ? __pfx_kthread+0x10/0x10
[   16.268778]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.268800]  ? calculate_sigpending+0x7b/0xa0
[   16.268825]  ? __pfx_kthread+0x10/0x10
[   16.268847]  ret_from_fork+0x116/0x1d0
[   16.268867]  ? __pfx_kthread+0x10/0x10
[   16.268888]  ret_from_fork_asm+0x1a/0x30
[   16.268929]  </TASK>
[   16.268940] 
[   16.276287] Allocated by task 282:
[   16.276409]  kasan_save_stack+0x45/0x70
[   16.276583]  kasan_save_track+0x18/0x40
[   16.276798]  kasan_save_alloc_info+0x3b/0x50
[   16.277113]  __kasan_kmalloc+0xb7/0xc0
[   16.277336]  __kmalloc_cache_noprof+0x189/0x420
[   16.277558]  kasan_atomics+0x95/0x310
[   16.277758]  kunit_try_run_case+0x1a5/0x480
[   16.277981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.278272]  kthread+0x337/0x6f0
[   16.278461]  ret_from_fork+0x116/0x1d0
[   16.278668]  ret_from_fork_asm+0x1a/0x30
[   16.278949] 
[   16.279037] The buggy address belongs to the object at ffff888102a1a680
[   16.279037]  which belongs to the cache kmalloc-64 of size 64
[   16.279580] The buggy address is located 0 bytes to the right of
[   16.279580]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.280222] 
[   16.280335] The buggy address belongs to the physical page:
[   16.280660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.281020] flags: 0x200000000000000(node=0|zone=2)
[   16.281410] page_type: f5(slab)
[   16.281757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.282073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.282295] page dumped because: kasan: bad access detected
[   16.282458] 
[   16.282536] Memory state around the buggy address:
[   16.282767]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.283211]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.283561] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.283991]                                      ^
[   16.284252]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.284516]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.284815] ==================================================================
[   16.080729] ==================================================================
[   16.080981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.082109] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.083203] 
[   16.083411] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.083456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.083469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.083492] Call Trace:
[   16.083507]  <TASK>
[   16.083524]  dump_stack_lvl+0x73/0xb0
[   16.083556]  print_report+0xd1/0x650
[   16.083581]  ? __virt_addr_valid+0x1db/0x2d0
[   16.083606]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.083629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.083654]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.083677]  kasan_report+0x141/0x180
[   16.083700]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.083729]  kasan_check_range+0x10c/0x1c0
[   16.083781]  __kasan_check_write+0x18/0x20
[   16.083802]  kasan_atomics_helper+0x1eaa/0x5450
[   16.083826]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.083850]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.083877]  ? kasan_atomics+0x152/0x310
[   16.083907]  kasan_atomics+0x1dc/0x310
[   16.083942]  ? __pfx_kasan_atomics+0x10/0x10
[   16.083968]  ? __pfx_read_tsc+0x10/0x10
[   16.083993]  ? ktime_get_ts64+0x86/0x230
[   16.084021]  kunit_try_run_case+0x1a5/0x480
[   16.084048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.084073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.084099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.084124]  ? __kthread_parkme+0x82/0x180
[   16.084147]  ? preempt_count_sub+0x50/0x80
[   16.084172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.084198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.084224]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.084251]  kthread+0x337/0x6f0
[   16.084271]  ? trace_preempt_on+0x20/0xc0
[   16.084297]  ? __pfx_kthread+0x10/0x10
[   16.084319]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.084342]  ? calculate_sigpending+0x7b/0xa0
[   16.084368]  ? __pfx_kthread+0x10/0x10
[   16.084390]  ret_from_fork+0x116/0x1d0
[   16.084409]  ? __pfx_kthread+0x10/0x10
[   16.084430]  ret_from_fork_asm+0x1a/0x30
[   16.084463]  </TASK>
[   16.084474] 
[   16.095363] Allocated by task 282:
[   16.095557]  kasan_save_stack+0x45/0x70
[   16.095784]  kasan_save_track+0x18/0x40
[   16.095990]  kasan_save_alloc_info+0x3b/0x50
[   16.096177]  __kasan_kmalloc+0xb7/0xc0
[   16.096309]  __kmalloc_cache_noprof+0x189/0x420
[   16.096487]  kasan_atomics+0x95/0x310
[   16.096676]  kunit_try_run_case+0x1a5/0x480
[   16.096898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.097213]  kthread+0x337/0x6f0
[   16.097338]  ret_from_fork+0x116/0x1d0
[   16.097472]  ret_from_fork_asm+0x1a/0x30
[   16.097649] 
[   16.097744] The buggy address belongs to the object at ffff888102a1a680
[   16.097744]  which belongs to the cache kmalloc-64 of size 64
[   16.098308] The buggy address is located 0 bytes to the right of
[   16.098308]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.098727] 
[   16.098801] The buggy address belongs to the physical page:
[   16.099061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.099511] flags: 0x200000000000000(node=0|zone=2)
[   16.099690] page_type: f5(slab)
[   16.099812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.100325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.100687] page dumped because: kasan: bad access detected
[   16.100979] 
[   16.101069] Memory state around the buggy address:
[   16.101290]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.101601]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.101958] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.102203]                                      ^
[   16.102431]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.102660]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.103109] ==================================================================
[   15.109269] ==================================================================
[   15.109998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.110358] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.110652] 
[   15.110782] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.110823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.110835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.110855] Call Trace:
[   15.110869]  <TASK>
[   15.110884]  dump_stack_lvl+0x73/0xb0
[   15.110913]  print_report+0xd1/0x650
[   15.110946]  ? __virt_addr_valid+0x1db/0x2d0
[   15.110970]  ? kasan_atomics_helper+0x860/0x5450
[   15.110992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.111027]  ? kasan_atomics_helper+0x860/0x5450
[   15.111057]  kasan_report+0x141/0x180
[   15.111080]  ? kasan_atomics_helper+0x860/0x5450
[   15.111108]  kasan_check_range+0x10c/0x1c0
[   15.111133]  __kasan_check_write+0x18/0x20
[   15.111153]  kasan_atomics_helper+0x860/0x5450
[   15.111178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.111201]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.111228]  ? kasan_atomics+0x152/0x310
[   15.111256]  kasan_atomics+0x1dc/0x310
[   15.111279]  ? __pfx_kasan_atomics+0x10/0x10
[   15.111305]  ? __pfx_read_tsc+0x10/0x10
[   15.111327]  ? ktime_get_ts64+0x86/0x230
[   15.111352]  kunit_try_run_case+0x1a5/0x480
[   15.111378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.111402]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.111428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.111453]  ? __kthread_parkme+0x82/0x180
[   15.111476]  ? preempt_count_sub+0x50/0x80
[   15.111502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.111527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.111553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.111581]  kthread+0x337/0x6f0
[   15.111601]  ? trace_preempt_on+0x20/0xc0
[   15.111625]  ? __pfx_kthread+0x10/0x10
[   15.111646]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.111669]  ? calculate_sigpending+0x7b/0xa0
[   15.111696]  ? __pfx_kthread+0x10/0x10
[   15.111720]  ret_from_fork+0x116/0x1d0
[   15.111742]  ? __pfx_kthread+0x10/0x10
[   15.111764]  ret_from_fork_asm+0x1a/0x30
[   15.111797]  </TASK>
[   15.111807] 
[   15.130384] Allocated by task 282:
[   15.130973]  kasan_save_stack+0x45/0x70
[   15.131145]  kasan_save_track+0x18/0x40
[   15.131285]  kasan_save_alloc_info+0x3b/0x50
[   15.131440]  __kasan_kmalloc+0xb7/0xc0
[   15.131577]  __kmalloc_cache_noprof+0x189/0x420
[   15.131734]  kasan_atomics+0x95/0x310
[   15.132402]  kunit_try_run_case+0x1a5/0x480
[   15.132845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.133465]  kthread+0x337/0x6f0
[   15.133823]  ret_from_fork+0x116/0x1d0
[   15.134419]  ret_from_fork_asm+0x1a/0x30
[   15.134871] 
[   15.135042] The buggy address belongs to the object at ffff888102a1a680
[   15.135042]  which belongs to the cache kmalloc-64 of size 64
[   15.136279] The buggy address is located 0 bytes to the right of
[   15.136279]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.137005] 
[   15.137265] The buggy address belongs to the physical page:
[   15.137797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.138239] flags: 0x200000000000000(node=0|zone=2)
[   15.138735] page_type: f5(slab)
[   15.139081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.139640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.140176] page dumped because: kasan: bad access detected
[   15.140679] 
[   15.140889] Memory state around the buggy address:
[   15.141120]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.141734]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.141965] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.142627]                                      ^
[   15.143166]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.143825]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.144510] ==================================================================
[   16.030747] ==================================================================
[   16.031418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.032085] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.032719] 
[   16.032901] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.032959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.032972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.032993] Call Trace:
[   16.033009]  <TASK>
[   16.033025]  dump_stack_lvl+0x73/0xb0
[   16.033056]  print_report+0xd1/0x650
[   16.033089]  ? __virt_addr_valid+0x1db/0x2d0
[   16.033114]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.033137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.033167]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.033191]  kasan_report+0x141/0x180
[   16.033214]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.033243]  kasan_check_range+0x10c/0x1c0
[   16.033268]  __kasan_check_write+0x18/0x20
[   16.033289]  kasan_atomics_helper+0x1d7a/0x5450
[   16.033314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.033338]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.033366]  ? kasan_atomics+0x152/0x310
[   16.033394]  kasan_atomics+0x1dc/0x310
[   16.033418]  ? __pfx_kasan_atomics+0x10/0x10
[   16.033444]  ? __pfx_read_tsc+0x10/0x10
[   16.033466]  ? ktime_get_ts64+0x86/0x230
[   16.033491]  kunit_try_run_case+0x1a5/0x480
[   16.033517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.033543]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.033568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.033594]  ? __kthread_parkme+0x82/0x180
[   16.033615]  ? preempt_count_sub+0x50/0x80
[   16.033641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.033667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.033693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.033719]  kthread+0x337/0x6f0
[   16.033738]  ? trace_preempt_on+0x20/0xc0
[   16.033783]  ? __pfx_kthread+0x10/0x10
[   16.033806]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.033829]  ? calculate_sigpending+0x7b/0xa0
[   16.033853]  ? __pfx_kthread+0x10/0x10
[   16.033876]  ret_from_fork+0x116/0x1d0
[   16.033895]  ? __pfx_kthread+0x10/0x10
[   16.033917]  ret_from_fork_asm+0x1a/0x30
[   16.033959]  </TASK>
[   16.033970] 
[   16.046089] Allocated by task 282:
[   16.046385]  kasan_save_stack+0x45/0x70
[   16.046794]  kasan_save_track+0x18/0x40
[   16.046984]  kasan_save_alloc_info+0x3b/0x50
[   16.047410]  __kasan_kmalloc+0xb7/0xc0
[   16.047735]  __kmalloc_cache_noprof+0x189/0x420
[   16.047902]  kasan_atomics+0x95/0x310
[   16.048268]  kunit_try_run_case+0x1a5/0x480
[   16.048661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.049177]  kthread+0x337/0x6f0
[   16.049300]  ret_from_fork+0x116/0x1d0
[   16.049433]  ret_from_fork_asm+0x1a/0x30
[   16.049575] 
[   16.049646] The buggy address belongs to the object at ffff888102a1a680
[   16.049646]  which belongs to the cache kmalloc-64 of size 64
[   16.050129] The buggy address is located 0 bytes to the right of
[   16.050129]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.050616] 
[   16.050727] The buggy address belongs to the physical page:
[   16.050937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.051429] flags: 0x200000000000000(node=0|zone=2)
[   16.051740] page_type: f5(slab)
[   16.051932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.052260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.052519] page dumped because: kasan: bad access detected
[   16.052794] 
[   16.052886] Memory state around the buggy address:
[   16.053098]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.053434]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.053750] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.054073]                                      ^
[   16.054296]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.054541]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.055045] ==================================================================
[   14.953110] ==================================================================
[   14.953446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.953710] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   14.954145] 
[   14.954229] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.954331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.954345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.954367] Call Trace:
[   14.954382]  <TASK>
[   14.954397]  dump_stack_lvl+0x73/0xb0
[   14.954426]  print_report+0xd1/0x650
[   14.954449]  ? __virt_addr_valid+0x1db/0x2d0
[   14.954472]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.954493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.954524]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.954548]  kasan_report+0x141/0x180
[   14.954571]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.954599]  kasan_check_range+0x10c/0x1c0
[   14.954625]  __kasan_check_write+0x18/0x20
[   14.954646]  kasan_atomics_helper+0x4a0/0x5450
[   14.954669]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.954694]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.954720]  ? kasan_atomics+0x152/0x310
[   14.954747]  kasan_atomics+0x1dc/0x310
[   14.954772]  ? __pfx_kasan_atomics+0x10/0x10
[   14.954798]  ? __pfx_read_tsc+0x10/0x10
[   14.954819]  ? ktime_get_ts64+0x86/0x230
[   14.954844]  kunit_try_run_case+0x1a5/0x480
[   14.954868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.954892]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.954928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.954954]  ? __kthread_parkme+0x82/0x180
[   14.954974]  ? preempt_count_sub+0x50/0x80
[   14.954999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.955075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.955102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.955129]  kthread+0x337/0x6f0
[   14.955148]  ? trace_preempt_on+0x20/0xc0
[   14.955173]  ? __pfx_kthread+0x10/0x10
[   14.955194]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.955217]  ? calculate_sigpending+0x7b/0xa0
[   14.955241]  ? __pfx_kthread+0x10/0x10
[   14.955264]  ret_from_fork+0x116/0x1d0
[   14.955283]  ? __pfx_kthread+0x10/0x10
[   14.955305]  ret_from_fork_asm+0x1a/0x30
[   14.955338]  </TASK>
[   14.955348] 
[   14.963476] Allocated by task 282:
[   14.963666]  kasan_save_stack+0x45/0x70
[   14.963837]  kasan_save_track+0x18/0x40
[   14.964066]  kasan_save_alloc_info+0x3b/0x50
[   14.964424]  __kasan_kmalloc+0xb7/0xc0
[   14.964587]  __kmalloc_cache_noprof+0x189/0x420
[   14.964745]  kasan_atomics+0x95/0x310
[   14.964943]  kunit_try_run_case+0x1a5/0x480
[   14.965278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.965514]  kthread+0x337/0x6f0
[   14.965636]  ret_from_fork+0x116/0x1d0
[   14.965876]  ret_from_fork_asm+0x1a/0x30
[   14.966216] 
[   14.966319] The buggy address belongs to the object at ffff888102a1a680
[   14.966319]  which belongs to the cache kmalloc-64 of size 64
[   14.966759] The buggy address is located 0 bytes to the right of
[   14.966759]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   14.967312] 
[   14.967429] The buggy address belongs to the physical page:
[   14.967602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   14.967841] flags: 0x200000000000000(node=0|zone=2)
[   14.968015] page_type: f5(slab)
[   14.968180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.968519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.968980] page dumped because: kasan: bad access detected
[   14.969161] 
[   14.969230] Memory state around the buggy address:
[   14.969382]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.969595]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.969810] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.970365]                                      ^
[   14.970615]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.971225]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.971556] ==================================================================
[   15.969994] ==================================================================
[   15.970557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.971038] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.971303] 
[   15.971416] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.971457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.971470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.971491] Call Trace:
[   15.971506]  <TASK>
[   15.971522]  dump_stack_lvl+0x73/0xb0
[   15.971553]  print_report+0xd1/0x650
[   15.971576]  ? __virt_addr_valid+0x1db/0x2d0
[   15.971600]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.971623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.971649]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.971672]  kasan_report+0x141/0x180
[   15.971695]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.971724]  kasan_check_range+0x10c/0x1c0
[   15.971749]  __kasan_check_write+0x18/0x20
[   15.971805]  kasan_atomics_helper+0x1c18/0x5450
[   15.971830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.971865]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.971891]  ? kasan_atomics+0x152/0x310
[   15.971927]  kasan_atomics+0x1dc/0x310
[   15.971952]  ? __pfx_kasan_atomics+0x10/0x10
[   15.971978]  ? __pfx_read_tsc+0x10/0x10
[   15.971999]  ? ktime_get_ts64+0x86/0x230
[   15.972024]  kunit_try_run_case+0x1a5/0x480
[   15.972076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972100]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.972125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.972178]  ? __kthread_parkme+0x82/0x180
[   15.972199]  ? preempt_count_sub+0x50/0x80
[   15.972224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.972276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.972303]  kthread+0x337/0x6f0
[   15.972349]  ? trace_preempt_on+0x20/0xc0
[   15.972373]  ? __pfx_kthread+0x10/0x10
[   15.972396]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.972430]  ? calculate_sigpending+0x7b/0xa0
[   15.972454]  ? __pfx_kthread+0x10/0x10
[   15.972478]  ret_from_fork+0x116/0x1d0
[   15.972522]  ? __pfx_kthread+0x10/0x10
[   15.972544]  ret_from_fork_asm+0x1a/0x30
[   15.972578]  </TASK>
[   15.972599] 
[   15.980476] Allocated by task 282:
[   15.980646]  kasan_save_stack+0x45/0x70
[   15.980903]  kasan_save_track+0x18/0x40
[   15.981142]  kasan_save_alloc_info+0x3b/0x50
[   15.981351]  __kasan_kmalloc+0xb7/0xc0
[   15.981540]  __kmalloc_cache_noprof+0x189/0x420
[   15.981786]  kasan_atomics+0x95/0x310
[   15.981941]  kunit_try_run_case+0x1a5/0x480
[   15.982139]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.982310]  kthread+0x337/0x6f0
[   15.982429]  ret_from_fork+0x116/0x1d0
[   15.982564]  ret_from_fork_asm+0x1a/0x30
[   15.982708] 
[   15.982851] The buggy address belongs to the object at ffff888102a1a680
[   15.982851]  which belongs to the cache kmalloc-64 of size 64
[   15.983418] The buggy address is located 0 bytes to the right of
[   15.983418]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.984027] 
[   15.984122] The buggy address belongs to the physical page:
[   15.984334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.984566] flags: 0x200000000000000(node=0|zone=2)
[   15.984811] page_type: f5(slab)
[   15.984986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.985335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.985636] page dumped because: kasan: bad access detected
[   15.985957] 
[   15.986062] Memory state around the buggy address:
[   15.986252]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.986493]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.986705] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.986933]                                      ^
[   15.987165]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.987471]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.987776] ==================================================================
[   15.145113] ==================================================================
[   15.145346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.145574] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.145967] 
[   15.146182] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.146226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.146238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.146259] Call Trace:
[   15.146276]  <TASK>
[   15.146292]  dump_stack_lvl+0x73/0xb0
[   15.146454]  print_report+0xd1/0x650
[   15.146480]  ? __virt_addr_valid+0x1db/0x2d0
[   15.146525]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.146547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.146572]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.146596]  kasan_report+0x141/0x180
[   15.146620]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.146648]  kasan_check_range+0x10c/0x1c0
[   15.146675]  __kasan_check_write+0x18/0x20
[   15.146698]  kasan_atomics_helper+0x8f9/0x5450
[   15.146723]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.146748]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.146796]  ? kasan_atomics+0x152/0x310
[   15.146824]  kasan_atomics+0x1dc/0x310
[   15.146858]  ? __pfx_kasan_atomics+0x10/0x10
[   15.146884]  ? __pfx_read_tsc+0x10/0x10
[   15.146906]  ? ktime_get_ts64+0x86/0x230
[   15.146939]  kunit_try_run_case+0x1a5/0x480
[   15.146965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.146998]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.147023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.147059]  ? __kthread_parkme+0x82/0x180
[   15.147134]  ? preempt_count_sub+0x50/0x80
[   15.147159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.147197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.147223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.147260]  kthread+0x337/0x6f0
[   15.147281]  ? trace_preempt_on+0x20/0xc0
[   15.147306]  ? __pfx_kthread+0x10/0x10
[   15.147328]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.147361]  ? calculate_sigpending+0x7b/0xa0
[   15.147385]  ? __pfx_kthread+0x10/0x10
[   15.147407]  ret_from_fork+0x116/0x1d0
[   15.147437]  ? __pfx_kthread+0x10/0x10
[   15.147459]  ret_from_fork_asm+0x1a/0x30
[   15.147492]  </TASK>
[   15.147503] 
[   15.161639] Allocated by task 282:
[   15.161786]  kasan_save_stack+0x45/0x70
[   15.162170]  kasan_save_track+0x18/0x40
[   15.162539]  kasan_save_alloc_info+0x3b/0x50
[   15.162993]  __kasan_kmalloc+0xb7/0xc0
[   15.163565]  __kmalloc_cache_noprof+0x189/0x420
[   15.164094]  kasan_atomics+0x95/0x310
[   15.164465]  kunit_try_run_case+0x1a5/0x480
[   15.164890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.165595]  kthread+0x337/0x6f0
[   15.166047]  ret_from_fork+0x116/0x1d0
[   15.166413]  ret_from_fork_asm+0x1a/0x30
[   15.166794] 
[   15.166974] The buggy address belongs to the object at ffff888102a1a680
[   15.166974]  which belongs to the cache kmalloc-64 of size 64
[   15.168360] The buggy address is located 0 bytes to the right of
[   15.168360]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.168741] 
[   15.168816] The buggy address belongs to the physical page:
[   15.169014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.169369] flags: 0x200000000000000(node=0|zone=2)
[   15.169627] page_type: f5(slab)
[   15.169811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.170173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.170496] page dumped because: kasan: bad access detected
[   15.170725] 
[   15.170832] Memory state around the buggy address:
[   15.171296]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.171626]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.171893] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.172260]                                      ^
[   15.172528]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.172934]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.173200] ==================================================================
[   16.197376] ==================================================================
[   16.197623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.198037] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.198286] 
[   16.198368] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.198408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.198421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.198441] Call Trace:
[   16.198455]  <TASK>
[   16.198471]  dump_stack_lvl+0x73/0xb0
[   16.198499]  print_report+0xd1/0x650
[   16.198526]  ? __virt_addr_valid+0x1db/0x2d0
[   16.198551]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.198573]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.198598]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.198621]  kasan_report+0x141/0x180
[   16.198644]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.198672]  __asan_report_load8_noabort+0x18/0x20
[   16.198698]  kasan_atomics_helper+0x4fb2/0x5450
[   16.198722]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.198768]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.198794]  ? kasan_atomics+0x152/0x310
[   16.198822]  kasan_atomics+0x1dc/0x310
[   16.198845]  ? __pfx_kasan_atomics+0x10/0x10
[   16.198871]  ? __pfx_read_tsc+0x10/0x10
[   16.198892]  ? ktime_get_ts64+0x86/0x230
[   16.198917]  kunit_try_run_case+0x1a5/0x480
[   16.198951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.198975]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.199000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.199026]  ? __kthread_parkme+0x82/0x180
[   16.199047]  ? preempt_count_sub+0x50/0x80
[   16.199072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.199099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.199126]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.199152]  kthread+0x337/0x6f0
[   16.199172]  ? trace_preempt_on+0x20/0xc0
[   16.199196]  ? __pfx_kthread+0x10/0x10
[   16.199218]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.199240]  ? calculate_sigpending+0x7b/0xa0
[   16.199265]  ? __pfx_kthread+0x10/0x10
[   16.199288]  ret_from_fork+0x116/0x1d0
[   16.199307]  ? __pfx_kthread+0x10/0x10
[   16.199329]  ret_from_fork_asm+0x1a/0x30
[   16.199362]  </TASK>
[   16.199374] 
[   16.206681] Allocated by task 282:
[   16.206860]  kasan_save_stack+0x45/0x70
[   16.207064]  kasan_save_track+0x18/0x40
[   16.207236]  kasan_save_alloc_info+0x3b/0x50
[   16.207387]  __kasan_kmalloc+0xb7/0xc0
[   16.207521]  __kmalloc_cache_noprof+0x189/0x420
[   16.207678]  kasan_atomics+0x95/0x310
[   16.207838]  kunit_try_run_case+0x1a5/0x480
[   16.207996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.208175]  kthread+0x337/0x6f0
[   16.208343]  ret_from_fork+0x116/0x1d0
[   16.208531]  ret_from_fork_asm+0x1a/0x30
[   16.208730] 
[   16.208846] The buggy address belongs to the object at ffff888102a1a680
[   16.208846]  which belongs to the cache kmalloc-64 of size 64
[   16.209374] The buggy address is located 0 bytes to the right of
[   16.209374]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.209880] 
[   16.209964] The buggy address belongs to the physical page:
[   16.210136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.210375] flags: 0x200000000000000(node=0|zone=2)
[   16.210541] page_type: f5(slab)
[   16.210663] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.211023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.211369] page dumped because: kasan: bad access detected
[   16.211626] 
[   16.211725] Memory state around the buggy address:
[   16.211992]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.212310]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.212633] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.212990]                                      ^
[   16.213220]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.213536]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.213776] ==================================================================
[   15.782528] ==================================================================
[   15.783527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.783955] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.784193] 
[   15.784283] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.784326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.784339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.784359] Call Trace:
[   15.784373]  <TASK>
[   15.784389]  dump_stack_lvl+0x73/0xb0
[   15.784419]  print_report+0xd1/0x650
[   15.784441]  ? __virt_addr_valid+0x1db/0x2d0
[   15.784465]  ? kasan_atomics_helper+0x164f/0x5450
[   15.784488]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.784513]  ? kasan_atomics_helper+0x164f/0x5450
[   15.784536]  kasan_report+0x141/0x180
[   15.784559]  ? kasan_atomics_helper+0x164f/0x5450
[   15.784587]  kasan_check_range+0x10c/0x1c0
[   15.784612]  __kasan_check_write+0x18/0x20
[   15.784633]  kasan_atomics_helper+0x164f/0x5450
[   15.784656]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.784680]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.784707]  ? kasan_atomics+0x152/0x310
[   15.784734]  kasan_atomics+0x1dc/0x310
[   15.784769]  ? __pfx_kasan_atomics+0x10/0x10
[   15.784796]  ? __pfx_read_tsc+0x10/0x10
[   15.784818]  ? ktime_get_ts64+0x86/0x230
[   15.784843]  kunit_try_run_case+0x1a5/0x480
[   15.785023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.785048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.785074]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.785100]  ? __kthread_parkme+0x82/0x180
[   15.785121]  ? preempt_count_sub+0x50/0x80
[   15.785148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.785174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.785201]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.785227]  kthread+0x337/0x6f0
[   15.785248]  ? trace_preempt_on+0x20/0xc0
[   15.785272]  ? __pfx_kthread+0x10/0x10
[   15.785296]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.785318]  ? calculate_sigpending+0x7b/0xa0
[   15.785343]  ? __pfx_kthread+0x10/0x10
[   15.785366]  ret_from_fork+0x116/0x1d0
[   15.785386]  ? __pfx_kthread+0x10/0x10
[   15.785408]  ret_from_fork_asm+0x1a/0x30
[   15.785441]  </TASK>
[   15.785452] 
[   15.795950] Allocated by task 282:
[   15.796139]  kasan_save_stack+0x45/0x70
[   15.796346]  kasan_save_track+0x18/0x40
[   15.796539]  kasan_save_alloc_info+0x3b/0x50
[   15.796847]  __kasan_kmalloc+0xb7/0xc0
[   15.796993]  __kmalloc_cache_noprof+0x189/0x420
[   15.797149]  kasan_atomics+0x95/0x310
[   15.797314]  kunit_try_run_case+0x1a5/0x480
[   15.797524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.797826]  kthread+0x337/0x6f0
[   15.797988]  ret_from_fork+0x116/0x1d0
[   15.798151]  ret_from_fork_asm+0x1a/0x30
[   15.798291] 
[   15.798362] The buggy address belongs to the object at ffff888102a1a680
[   15.798362]  which belongs to the cache kmalloc-64 of size 64
[   15.798861] The buggy address is located 0 bytes to the right of
[   15.798861]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.799413] 
[   15.799485] The buggy address belongs to the physical page:
[   15.799667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.800410] flags: 0x200000000000000(node=0|zone=2)
[   15.800627] page_type: f5(slab)
[   15.800773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.801107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.801357] page dumped because: kasan: bad access detected
[   15.801582] 
[   15.801679] Memory state around the buggy address:
[   15.802011]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.802298]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.802586] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.802898]                                      ^
[   15.803088]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.803306]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.803518] ==================================================================
[   15.718485] ==================================================================
[   15.718723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.719082] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.719568] 
[   15.719777] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.719818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.719830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.719850] Call Trace:
[   15.719865]  <TASK>
[   15.719881]  dump_stack_lvl+0x73/0xb0
[   15.719908]  print_report+0xd1/0x650
[   15.719942]  ? __virt_addr_valid+0x1db/0x2d0
[   15.719966]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.719989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.720012]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.720036]  kasan_report+0x141/0x180
[   15.720059]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.720088]  __asan_report_store8_noabort+0x1b/0x30
[   15.720115]  kasan_atomics_helper+0x50d4/0x5450
[   15.720139]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.720163]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.720189]  ? kasan_atomics+0x152/0x310
[   15.720217]  kasan_atomics+0x1dc/0x310
[   15.720241]  ? __pfx_kasan_atomics+0x10/0x10
[   15.720266]  ? __pfx_read_tsc+0x10/0x10
[   15.720287]  ? ktime_get_ts64+0x86/0x230
[   15.720312]  kunit_try_run_case+0x1a5/0x480
[   15.720337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.720361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.720386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.720411]  ? __kthread_parkme+0x82/0x180
[   15.720432]  ? preempt_count_sub+0x50/0x80
[   15.720457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.720482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.720508]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.720534]  kthread+0x337/0x6f0
[   15.720554]  ? trace_preempt_on+0x20/0xc0
[   15.720578]  ? __pfx_kthread+0x10/0x10
[   15.720600]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.720623]  ? calculate_sigpending+0x7b/0xa0
[   15.720648]  ? __pfx_kthread+0x10/0x10
[   15.720670]  ret_from_fork+0x116/0x1d0
[   15.720690]  ? __pfx_kthread+0x10/0x10
[   15.720711]  ret_from_fork_asm+0x1a/0x30
[   15.720744]  </TASK>
[   15.720768] 
[   15.728207] Allocated by task 282:
[   15.728382]  kasan_save_stack+0x45/0x70
[   15.728586]  kasan_save_track+0x18/0x40
[   15.728809]  kasan_save_alloc_info+0x3b/0x50
[   15.729033]  __kasan_kmalloc+0xb7/0xc0
[   15.729225]  __kmalloc_cache_noprof+0x189/0x420
[   15.729434]  kasan_atomics+0x95/0x310
[   15.729610]  kunit_try_run_case+0x1a5/0x480
[   15.729757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.729943]  kthread+0x337/0x6f0
[   15.730063]  ret_from_fork+0x116/0x1d0
[   15.730195]  ret_from_fork_asm+0x1a/0x30
[   15.730335] 
[   15.730404] The buggy address belongs to the object at ffff888102a1a680
[   15.730404]  which belongs to the cache kmalloc-64 of size 64
[   15.730858] The buggy address is located 0 bytes to the right of
[   15.730858]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.731930] 
[   15.732005] The buggy address belongs to the physical page:
[   15.732176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.732413] flags: 0x200000000000000(node=0|zone=2)
[   15.732573] page_type: f5(slab)
[   15.732691] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.733404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.733746] page dumped because: kasan: bad access detected
[   15.734022] 
[   15.734118] Memory state around the buggy address:
[   15.734313]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.734534]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.734748] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.735083]                                      ^
[   15.735311]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.735634]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.736031] ==================================================================
[   16.285526] ==================================================================
[   16.285988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.286356] Read of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   16.286662] 
[   16.286789] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.286831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.286854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.286875] Call Trace:
[   16.286888]  <TASK>
[   16.286903]  dump_stack_lvl+0x73/0xb0
[   16.286942]  print_report+0xd1/0x650
[   16.286964]  ? __virt_addr_valid+0x1db/0x2d0
[   16.286987]  ? kasan_atomics_helper+0x5115/0x5450
[   16.287040]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.287064]  ? kasan_atomics_helper+0x5115/0x5450
[   16.287087]  kasan_report+0x141/0x180
[   16.287121]  ? kasan_atomics_helper+0x5115/0x5450
[   16.287175]  __asan_report_load8_noabort+0x18/0x20
[   16.287201]  kasan_atomics_helper+0x5115/0x5450
[   16.287226]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.287260]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.287287]  ? kasan_atomics+0x152/0x310
[   16.287340]  kasan_atomics+0x1dc/0x310
[   16.287365]  ? __pfx_kasan_atomics+0x10/0x10
[   16.287401]  ? __pfx_read_tsc+0x10/0x10
[   16.287423]  ? ktime_get_ts64+0x86/0x230
[   16.287468]  kunit_try_run_case+0x1a5/0x480
[   16.287495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.287519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.287545]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.287570]  ? __kthread_parkme+0x82/0x180
[   16.287610]  ? preempt_count_sub+0x50/0x80
[   16.287648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.287711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.287769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.287795]  kthread+0x337/0x6f0
[   16.287815]  ? trace_preempt_on+0x20/0xc0
[   16.287851]  ? __pfx_kthread+0x10/0x10
[   16.287872]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.287895]  ? calculate_sigpending+0x7b/0xa0
[   16.287929]  ? __pfx_kthread+0x10/0x10
[   16.287951]  ret_from_fork+0x116/0x1d0
[   16.287971]  ? __pfx_kthread+0x10/0x10
[   16.287993]  ret_from_fork_asm+0x1a/0x30
[   16.288026]  </TASK>
[   16.288037] 
[   16.295824] Allocated by task 282:
[   16.296152]  kasan_save_stack+0x45/0x70
[   16.296449]  kasan_save_track+0x18/0x40
[   16.296683]  kasan_save_alloc_info+0x3b/0x50
[   16.296972]  __kasan_kmalloc+0xb7/0xc0
[   16.297102]  __kmalloc_cache_noprof+0x189/0x420
[   16.297252]  kasan_atomics+0x95/0x310
[   16.297380]  kunit_try_run_case+0x1a5/0x480
[   16.297589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.298036]  kthread+0x337/0x6f0
[   16.298275]  ret_from_fork+0x116/0x1d0
[   16.298531]  ret_from_fork_asm+0x1a/0x30
[   16.298743] 
[   16.298851] The buggy address belongs to the object at ffff888102a1a680
[   16.298851]  which belongs to the cache kmalloc-64 of size 64
[   16.299337] The buggy address is located 0 bytes to the right of
[   16.299337]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   16.299928] 
[   16.300085] The buggy address belongs to the physical page:
[   16.300453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   16.300723] flags: 0x200000000000000(node=0|zone=2)
[   16.301167] page_type: f5(slab)
[   16.301375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.301757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.302053] page dumped because: kasan: bad access detected
[   16.302469] 
[   16.302683] Memory state around the buggy address:
[   16.302894]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.303218]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.303476] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.303679]                                      ^
[   16.304065]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.304415]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.304768] ==================================================================
[   15.847274] ==================================================================
[   15.847712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.847958] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.848809] 
[   15.848970] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.849018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.849031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.849052] Call Trace:
[   15.849069]  <TASK>
[   15.849087]  dump_stack_lvl+0x73/0xb0
[   15.849118]  print_report+0xd1/0x650
[   15.849141]  ? __virt_addr_valid+0x1db/0x2d0
[   15.849165]  ? kasan_atomics_helper+0x1818/0x5450
[   15.849188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.849212]  ? kasan_atomics_helper+0x1818/0x5450
[   15.849235]  kasan_report+0x141/0x180
[   15.849258]  ? kasan_atomics_helper+0x1818/0x5450
[   15.849286]  kasan_check_range+0x10c/0x1c0
[   15.849311]  __kasan_check_write+0x18/0x20
[   15.849331]  kasan_atomics_helper+0x1818/0x5450
[   15.849356]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.849379]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.849406]  ? kasan_atomics+0x152/0x310
[   15.849433]  kasan_atomics+0x1dc/0x310
[   15.849457]  ? __pfx_kasan_atomics+0x10/0x10
[   15.849482]  ? __pfx_read_tsc+0x10/0x10
[   15.849504]  ? ktime_get_ts64+0x86/0x230
[   15.849529]  kunit_try_run_case+0x1a5/0x480
[   15.849554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.849577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.849602]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.849627]  ? __kthread_parkme+0x82/0x180
[   15.849649]  ? preempt_count_sub+0x50/0x80
[   15.849675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.849700]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.849725]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.849753]  kthread+0x337/0x6f0
[   15.849773]  ? trace_preempt_on+0x20/0xc0
[   15.849797]  ? __pfx_kthread+0x10/0x10
[   15.849818]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.849841]  ? calculate_sigpending+0x7b/0xa0
[   15.849866]  ? __pfx_kthread+0x10/0x10
[   15.849889]  ret_from_fork+0x116/0x1d0
[   15.849907]  ? __pfx_kthread+0x10/0x10
[   15.849940]  ret_from_fork_asm+0x1a/0x30
[   15.849973]  </TASK>
[   15.849984] 
[   15.857319] Allocated by task 282:
[   15.857495]  kasan_save_stack+0x45/0x70
[   15.857697]  kasan_save_track+0x18/0x40
[   15.858010]  kasan_save_alloc_info+0x3b/0x50
[   15.858223]  __kasan_kmalloc+0xb7/0xc0
[   15.858372]  __kmalloc_cache_noprof+0x189/0x420
[   15.858535]  kasan_atomics+0x95/0x310
[   15.858669]  kunit_try_run_case+0x1a5/0x480
[   15.858868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.859233]  kthread+0x337/0x6f0
[   15.859408]  ret_from_fork+0x116/0x1d0
[   15.859581]  ret_from_fork_asm+0x1a/0x30
[   15.859725] 
[   15.859941] The buggy address belongs to the object at ffff888102a1a680
[   15.859941]  which belongs to the cache kmalloc-64 of size 64
[   15.860387] The buggy address is located 0 bytes to the right of
[   15.860387]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.860810] 
[   15.860905] The buggy address belongs to the physical page:
[   15.861165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.861520] flags: 0x200000000000000(node=0|zone=2)
[   15.861765] page_type: f5(slab)
[   15.861942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.862243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.862507] page dumped because: kasan: bad access detected
[   15.862753] 
[   15.862853] Memory state around the buggy address:
[   15.863057]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.863273]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.863489] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.863805]                                      ^
[   15.864037]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.864345]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.864561] ==================================================================
[   15.864978] ==================================================================
[   15.865319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.865670] Write of size 8 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.866012] 
[   15.866118] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.866160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.866172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.866192] Call Trace:
[   15.866206]  <TASK>
[   15.866220]  dump_stack_lvl+0x73/0xb0
[   15.866249]  print_report+0xd1/0x650
[   15.866272]  ? __virt_addr_valid+0x1db/0x2d0
[   15.866295]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.866317]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.866342]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.866365]  kasan_report+0x141/0x180
[   15.866388]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.866415]  kasan_check_range+0x10c/0x1c0
[   15.866440]  __kasan_check_write+0x18/0x20
[   15.866473]  kasan_atomics_helper+0x18b1/0x5450
[   15.866497]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.866528]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.866554]  ? kasan_atomics+0x152/0x310
[   15.866583]  kasan_atomics+0x1dc/0x310
[   15.866608]  ? __pfx_kasan_atomics+0x10/0x10
[   15.866633]  ? __pfx_read_tsc+0x10/0x10
[   15.866655]  ? ktime_get_ts64+0x86/0x230
[   15.866682]  kunit_try_run_case+0x1a5/0x480
[   15.866710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.866736]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.866769]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.866794]  ? __kthread_parkme+0x82/0x180
[   15.866816]  ? preempt_count_sub+0x50/0x80
[   15.866840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.866866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.866892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.866929]  kthread+0x337/0x6f0
[   15.866950]  ? trace_preempt_on+0x20/0xc0
[   15.866974]  ? __pfx_kthread+0x10/0x10
[   15.866996]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.867018]  ? calculate_sigpending+0x7b/0xa0
[   15.867043]  ? __pfx_kthread+0x10/0x10
[   15.867065]  ret_from_fork+0x116/0x1d0
[   15.867086]  ? __pfx_kthread+0x10/0x10
[   15.867107]  ret_from_fork_asm+0x1a/0x30
[   15.867141]  </TASK>
[   15.867151] 
[   15.874490] Allocated by task 282:
[   15.874653]  kasan_save_stack+0x45/0x70
[   15.874862]  kasan_save_track+0x18/0x40
[   15.875011]  kasan_save_alloc_info+0x3b/0x50
[   15.875191]  __kasan_kmalloc+0xb7/0xc0
[   15.875384]  __kmalloc_cache_noprof+0x189/0x420
[   15.875607]  kasan_atomics+0x95/0x310
[   15.875835]  kunit_try_run_case+0x1a5/0x480
[   15.876036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.876220]  kthread+0x337/0x6f0
[   15.876391]  ret_from_fork+0x116/0x1d0
[   15.876572]  ret_from_fork_asm+0x1a/0x30
[   15.876712] 
[   15.876861] The buggy address belongs to the object at ffff888102a1a680
[   15.876861]  which belongs to the cache kmalloc-64 of size 64
[   15.877394] The buggy address is located 0 bytes to the right of
[   15.877394]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.877762] 
[   15.877856] The buggy address belongs to the physical page:
[   15.878186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.878621] flags: 0x200000000000000(node=0|zone=2)
[   15.878885] page_type: f5(slab)
[   15.879026] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.879300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.879531] page dumped because: kasan: bad access detected
[   15.879767] 
[   15.879862] Memory state around the buggy address:
[   15.880099]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.880429]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.880669] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.881064]                                      ^
[   15.881282]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.881498]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.881778] ==================================================================
[   15.535767] ==================================================================
[   15.536176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.536583] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.537236] 
[   15.537350] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.537392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.537405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.537426] Call Trace:
[   15.537441]  <TASK>
[   15.537457]  dump_stack_lvl+0x73/0xb0
[   15.537487]  print_report+0xd1/0x650
[   15.537510]  ? __virt_addr_valid+0x1db/0x2d0
[   15.537533]  ? kasan_atomics_helper+0x1217/0x5450
[   15.537556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.537581]  ? kasan_atomics_helper+0x1217/0x5450
[   15.537604]  kasan_report+0x141/0x180
[   15.537628]  ? kasan_atomics_helper+0x1217/0x5450
[   15.537656]  kasan_check_range+0x10c/0x1c0
[   15.537681]  __kasan_check_write+0x18/0x20
[   15.537703]  kasan_atomics_helper+0x1217/0x5450
[   15.537727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.538786]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.538835]  ? kasan_atomics+0x152/0x310
[   15.538867]  kasan_atomics+0x1dc/0x310
[   15.538894]  ? __pfx_kasan_atomics+0x10/0x10
[   15.538930]  ? __pfx_read_tsc+0x10/0x10
[   15.538953]  ? ktime_get_ts64+0x86/0x230
[   15.538982]  kunit_try_run_case+0x1a5/0x480
[   15.539010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.539034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.539059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.539085]  ? __kthread_parkme+0x82/0x180
[   15.539106]  ? preempt_count_sub+0x50/0x80
[   15.539132]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.539158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.539184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.539211]  kthread+0x337/0x6f0
[   15.539231]  ? trace_preempt_on+0x20/0xc0
[   15.539256]  ? __pfx_kthread+0x10/0x10
[   15.539278]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.539300]  ? calculate_sigpending+0x7b/0xa0
[   15.539325]  ? __pfx_kthread+0x10/0x10
[   15.539347]  ret_from_fork+0x116/0x1d0
[   15.539367]  ? __pfx_kthread+0x10/0x10
[   15.539388]  ret_from_fork_asm+0x1a/0x30
[   15.539421]  </TASK>
[   15.539432] 
[   15.551531] Allocated by task 282:
[   15.551665]  kasan_save_stack+0x45/0x70
[   15.552171]  kasan_save_track+0x18/0x40
[   15.552512]  kasan_save_alloc_info+0x3b/0x50
[   15.553000]  __kasan_kmalloc+0xb7/0xc0
[   15.553391]  __kmalloc_cache_noprof+0x189/0x420
[   15.553930]  kasan_atomics+0x95/0x310
[   15.554326]  kunit_try_run_case+0x1a5/0x480
[   15.554766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.555296]  kthread+0x337/0x6f0
[   15.555647]  ret_from_fork+0x116/0x1d0
[   15.556087]  ret_from_fork_asm+0x1a/0x30
[   15.556487] 
[   15.556699] The buggy address belongs to the object at ffff888102a1a680
[   15.556699]  which belongs to the cache kmalloc-64 of size 64
[   15.557686] The buggy address is located 0 bytes to the right of
[   15.557686]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.558203] 
[   15.558280] The buggy address belongs to the physical page:
[   15.558452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.558694] flags: 0x200000000000000(node=0|zone=2)
[   15.558878] page_type: f5(slab)
[   15.559009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.559587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.560509] page dumped because: kasan: bad access detected
[   15.561163] 
[   15.561340] Memory state around the buggy address:
[   15.561607]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.562197]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.562420] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.562641]                                      ^
[   15.562956]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.563610]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.564306] ==================================================================
[   15.173763] ==================================================================
[   15.174235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.174519] Write of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.174884] 
[   15.175001] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.175054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.175066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.175087] Call Trace:
[   15.175274]  <TASK>
[   15.175299]  dump_stack_lvl+0x73/0xb0
[   15.175333]  print_report+0xd1/0x650
[   15.175371]  ? __virt_addr_valid+0x1db/0x2d0
[   15.175405]  ? kasan_atomics_helper+0x992/0x5450
[   15.175428]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.175453]  ? kasan_atomics_helper+0x992/0x5450
[   15.175487]  kasan_report+0x141/0x180
[   15.175510]  ? kasan_atomics_helper+0x992/0x5450
[   15.175538]  kasan_check_range+0x10c/0x1c0
[   15.175562]  __kasan_check_write+0x18/0x20
[   15.175582]  kasan_atomics_helper+0x992/0x5450
[   15.175606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.175630]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.175656]  ? kasan_atomics+0x152/0x310
[   15.175685]  kasan_atomics+0x1dc/0x310
[   15.175708]  ? __pfx_kasan_atomics+0x10/0x10
[   15.175734]  ? __pfx_read_tsc+0x10/0x10
[   15.175763]  ? ktime_get_ts64+0x86/0x230
[   15.175799]  kunit_try_run_case+0x1a5/0x480
[   15.175823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.175847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.175883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.175915]  ? __kthread_parkme+0x82/0x180
[   15.175947]  ? preempt_count_sub+0x50/0x80
[   15.175972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.176009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.176034]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.176061]  kthread+0x337/0x6f0
[   15.176081]  ? trace_preempt_on+0x20/0xc0
[   15.176106]  ? __pfx_kthread+0x10/0x10
[   15.176128]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.176151]  ? calculate_sigpending+0x7b/0xa0
[   15.176176]  ? __pfx_kthread+0x10/0x10
[   15.176200]  ret_from_fork+0x116/0x1d0
[   15.176219]  ? __pfx_kthread+0x10/0x10
[   15.176241]  ret_from_fork_asm+0x1a/0x30
[   15.176275]  </TASK>
[   15.176343] 
[   15.185023] Allocated by task 282:
[   15.185166]  kasan_save_stack+0x45/0x70
[   15.185392]  kasan_save_track+0x18/0x40
[   15.185586]  kasan_save_alloc_info+0x3b/0x50
[   15.185800]  __kasan_kmalloc+0xb7/0xc0
[   15.186119]  __kmalloc_cache_noprof+0x189/0x420
[   15.186276]  kasan_atomics+0x95/0x310
[   15.186543]  kunit_try_run_case+0x1a5/0x480
[   15.186815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.187108]  kthread+0x337/0x6f0
[   15.187321]  ret_from_fork+0x116/0x1d0
[   15.187500]  ret_from_fork_asm+0x1a/0x30
[   15.187698] 
[   15.187815] The buggy address belongs to the object at ffff888102a1a680
[   15.187815]  which belongs to the cache kmalloc-64 of size 64
[   15.188449] The buggy address is located 0 bytes to the right of
[   15.188449]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.188836] 
[   15.189000] The buggy address belongs to the physical page:
[   15.189418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.189784] flags: 0x200000000000000(node=0|zone=2)
[   15.189961] page_type: f5(slab)
[   15.190197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.190550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.190874] page dumped because: kasan: bad access detected
[   15.191362] 
[   15.191466] Memory state around the buggy address:
[   15.191689]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.192276]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.192502] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.192846]                                      ^
[   15.193243]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.193604]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.193985] ==================================================================
[   15.294970] ==================================================================
[   15.295405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.295746] Read of size 4 at addr ffff888102a1a6b0 by task kunit_try_catch/282
[   15.296077] 
[   15.296164] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.296209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.296222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.296243] Call Trace:
[   15.296261]  <TASK>
[   15.296278]  dump_stack_lvl+0x73/0xb0
[   15.296320]  print_report+0xd1/0x650
[   15.296343]  ? __virt_addr_valid+0x1db/0x2d0
[   15.296368]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.296403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.296428]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.296452]  kasan_report+0x141/0x180
[   15.296486]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.296514]  __asan_report_load4_noabort+0x18/0x20
[   15.296540]  kasan_atomics_helper+0x4a84/0x5450
[   15.296565]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.296588]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.296614]  ? kasan_atomics+0x152/0x310
[   15.296642]  kasan_atomics+0x1dc/0x310
[   15.296665]  ? __pfx_kasan_atomics+0x10/0x10
[   15.296691]  ? __pfx_read_tsc+0x10/0x10
[   15.296713]  ? ktime_get_ts64+0x86/0x230
[   15.296738]  kunit_try_run_case+0x1a5/0x480
[   15.296773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.296797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.296832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.296857]  ? __kthread_parkme+0x82/0x180
[   15.296889]  ? preempt_count_sub+0x50/0x80
[   15.296916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.296950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.296976]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.297002]  kthread+0x337/0x6f0
[   15.297021]  ? trace_preempt_on+0x20/0xc0
[   15.297055]  ? __pfx_kthread+0x10/0x10
[   15.297076]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.297098]  ? calculate_sigpending+0x7b/0xa0
[   15.297134]  ? __pfx_kthread+0x10/0x10
[   15.297157]  ret_from_fork+0x116/0x1d0
[   15.297176]  ? __pfx_kthread+0x10/0x10
[   15.297198]  ret_from_fork_asm+0x1a/0x30
[   15.297240]  </TASK>
[   15.297251] 
[   15.305204] Allocated by task 282:
[   15.305375]  kasan_save_stack+0x45/0x70
[   15.305575]  kasan_save_track+0x18/0x40
[   15.305778]  kasan_save_alloc_info+0x3b/0x50
[   15.305990]  __kasan_kmalloc+0xb7/0xc0
[   15.306124]  __kmalloc_cache_noprof+0x189/0x420
[   15.306303]  kasan_atomics+0x95/0x310
[   15.306490]  kunit_try_run_case+0x1a5/0x480
[   15.306728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.307074]  kthread+0x337/0x6f0
[   15.307197]  ret_from_fork+0x116/0x1d0
[   15.307329]  ret_from_fork_asm+0x1a/0x30
[   15.307526] 
[   15.307618] The buggy address belongs to the object at ffff888102a1a680
[   15.307618]  which belongs to the cache kmalloc-64 of size 64
[   15.308332] The buggy address is located 0 bytes to the right of
[   15.308332]  allocated 48-byte region [ffff888102a1a680, ffff888102a1a6b0)
[   15.308912] 
[   15.309022] The buggy address belongs to the physical page:
[   15.309287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1a
[   15.309632] flags: 0x200000000000000(node=0|zone=2)
[   15.309904] page_type: f5(slab)
[   15.310087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.310317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.310545] page dumped because: kasan: bad access detected
[   15.310734] 
[   15.310827] Memory state around the buggy address:
[   15.311088]  ffff888102a1a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.311416]  ffff888102a1a600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.311732] >ffff888102a1a680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.312098]                                      ^
[   15.312252]  ffff888102a1a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.312465]  ffff888102a1a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.312676] ==================================================================