Hay
Date
July 12, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   23.133797] ==================================================================
[   23.133948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   23.134211] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.134338] 
[   23.134442] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.134668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.134749] Hardware name: linux,dummy-virt (DT)
[   23.134838] Call trace:
[   23.134898]  show_stack+0x20/0x38 (C)
[   23.135016]  dump_stack_lvl+0x8c/0xd0
[   23.135120]  print_report+0x118/0x608
[   23.135209]  kasan_report+0xdc/0x128
[   23.135608]  kasan_check_range+0x100/0x1a8
[   23.135726]  __kasan_check_write+0x20/0x30
[   23.135848]  kasan_atomics_helper+0x12d8/0x4858
[   23.135968]  kasan_atomics+0x198/0x2e0
[   23.136087]  kunit_try_run_case+0x170/0x3f0
[   23.136215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.136337]  kthread+0x328/0x630
[   23.136657]  ret_from_fork+0x10/0x20
[   23.136887] 
[   23.136946] Allocated by task 266:
[   23.137022]  kasan_save_stack+0x3c/0x68
[   23.137389]  kasan_save_track+0x20/0x40
[   23.137501]  kasan_save_alloc_info+0x40/0x58
[   23.137814]  __kasan_kmalloc+0xd4/0xd8
[   23.137922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.138003]  kasan_atomics+0xb8/0x2e0
[   23.138080]  kunit_try_run_case+0x170/0x3f0
[   23.138168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.138547]  kthread+0x328/0x630
[   23.138891]  ret_from_fork+0x10/0x20
[   23.139183] 
[   23.139232] The buggy address belongs to the object at fff00000c5958200
[   23.139232]  which belongs to the cache kmalloc-64 of size 64
[   23.139594] The buggy address is located 0 bytes to the right of
[   23.139594]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.140180] 
[   23.140306] The buggy address belongs to the physical page:
[   23.140421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.140546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.140664] page_type: f5(slab)
[   23.140794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.140983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.141100] page dumped because: kasan: bad access detected
[   23.141203] 
[   23.141247] Memory state around the buggy address:
[   23.141329]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.141429]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.141524] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.141620]                                      ^
[   23.141705]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.141810]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.141921] ==================================================================
[   23.044157] ==================================================================
[   23.044539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   23.044750] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.045149] 
[   23.045455] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.046130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.046195] Hardware name: linux,dummy-virt (DT)
[   23.046269] Call trace:
[   23.046885]  show_stack+0x20/0x38 (C)
[   23.047469]  dump_stack_lvl+0x8c/0xd0
[   23.047670]  print_report+0x118/0x608
[   23.047983]  kasan_report+0xdc/0x128
[   23.048282]  kasan_check_range+0x100/0x1a8
[   23.048523]  __kasan_check_write+0x20/0x30
[   23.048953]  kasan_atomics_helper+0xf20/0x4858
[   23.049132]  kasan_atomics+0x198/0x2e0
[   23.049256]  kunit_try_run_case+0x170/0x3f0
[   23.049369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.049491]  kthread+0x328/0x630
[   23.049587]  ret_from_fork+0x10/0x20
[   23.049701] 
[   23.049749] Allocated by task 266:
[   23.049815]  kasan_save_stack+0x3c/0x68
[   23.050233]  kasan_save_track+0x20/0x40
[   23.050535]  kasan_save_alloc_info+0x40/0x58
[   23.051315]  __kasan_kmalloc+0xd4/0xd8
[   23.051421]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.051596]  kasan_atomics+0xb8/0x2e0
[   23.051703]  kunit_try_run_case+0x170/0x3f0
[   23.052236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.052387]  kthread+0x328/0x630
[   23.052512]  ret_from_fork+0x10/0x20
[   23.052604] 
[   23.053752] The buggy address belongs to the object at fff00000c5958200
[   23.053752]  which belongs to the cache kmalloc-64 of size 64
[   23.054314] The buggy address is located 0 bytes to the right of
[   23.054314]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.054567] 
[   23.054627] The buggy address belongs to the physical page:
[   23.054904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.055118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.055412] page_type: f5(slab)
[   23.055507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.055633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.055758] page dumped because: kasan: bad access detected
[   23.055858] 
[   23.055919] Memory state around the buggy address:
[   23.056009]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.056123]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.056233] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.056325]                                      ^
[   23.056412]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.056524]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.056632] ==================================================================
[   23.180277] ==================================================================
[   23.180391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   23.180515] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.180631] 
[   23.180695] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.180901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.180964] Hardware name: linux,dummy-virt (DT)
[   23.181038] Call trace:
[   23.181087]  show_stack+0x20/0x38 (C)
[   23.181308]  dump_stack_lvl+0x8c/0xd0
[   23.181515]  print_report+0x118/0x608
[   23.181632]  kasan_report+0xdc/0x128
[   23.181721]  kasan_check_range+0x100/0x1a8
[   23.181852]  __kasan_check_write+0x20/0x30
[   23.181954]  kasan_atomics_helper+0x154c/0x4858
[   23.182076]  kasan_atomics+0x198/0x2e0
[   23.182175]  kunit_try_run_case+0x170/0x3f0
[   23.182277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.182399]  kthread+0x328/0x630
[   23.182459]  ret_from_fork+0x10/0x20
[   23.182516] 
[   23.182555] Allocated by task 266:
[   23.182594]  kasan_save_stack+0x3c/0x68
[   23.182645]  kasan_save_track+0x20/0x40
[   23.182690]  kasan_save_alloc_info+0x40/0x58
[   23.182737]  __kasan_kmalloc+0xd4/0xd8
[   23.182779]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.182849]  kasan_atomics+0xb8/0x2e0
[   23.182940]  kunit_try_run_case+0x170/0x3f0
[   23.183031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.183171]  kthread+0x328/0x630
[   23.183334]  ret_from_fork+0x10/0x20
[   23.183448] 
[   23.183959] The buggy address belongs to the object at fff00000c5958200
[   23.183959]  which belongs to the cache kmalloc-64 of size 64
[   23.184329] The buggy address is located 0 bytes to the right of
[   23.184329]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.184911] 
[   23.185132] The buggy address belongs to the physical page:
[   23.185211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.185616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.185785] page_type: f5(slab)
[   23.186398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.186549] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.186661] page dumped because: kasan: bad access detected
[   23.187689] 
[   23.187976] Memory state around the buggy address:
[   23.188431]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.188926]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.189377] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.189495]                                      ^
[   23.189602]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.189689]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.190210] ==================================================================
[   23.024345] ==================================================================
[   23.024467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   23.024590] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.024709] 
[   23.024773] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.025028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.025087] Hardware name: linux,dummy-virt (DT)
[   23.025200] Call trace:
[   23.025233]  show_stack+0x20/0x38 (C)
[   23.025349]  dump_stack_lvl+0x8c/0xd0
[   23.025415]  print_report+0x118/0x608
[   23.025470]  kasan_report+0xdc/0x128
[   23.025542]  __asan_report_store8_noabort+0x20/0x30
[   23.025685]  kasan_atomics_helper+0x3e5c/0x4858
[   23.025972]  kasan_atomics+0x198/0x2e0
[   23.026238]  kunit_try_run_case+0x170/0x3f0
[   23.026343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.026451]  kthread+0x328/0x630
[   23.026536]  ret_from_fork+0x10/0x20
[   23.026624] 
[   23.026668] Allocated by task 266:
[   23.026734]  kasan_save_stack+0x3c/0x68
[   23.027211]  kasan_save_track+0x20/0x40
[   23.027347]  kasan_save_alloc_info+0x40/0x58
[   23.027998]  __kasan_kmalloc+0xd4/0xd8
[   23.028365]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.028516]  kasan_atomics+0xb8/0x2e0
[   23.028609]  kunit_try_run_case+0x170/0x3f0
[   23.028938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.029221]  kthread+0x328/0x630
[   23.029312]  ret_from_fork+0x10/0x20
[   23.029455] 
[   23.029515] The buggy address belongs to the object at fff00000c5958200
[   23.029515]  which belongs to the cache kmalloc-64 of size 64
[   23.029874] The buggy address is located 0 bytes to the right of
[   23.029874]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.030273] 
[   23.030413] The buggy address belongs to the physical page:
[   23.030765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.030926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.031035] page_type: f5(slab)
[   23.031102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.031205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.031292] page dumped because: kasan: bad access detected
[   23.031361] 
[   23.031404] Memory state around the buggy address:
[   23.031482]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.031592]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.031906] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.032519]                                      ^
[   23.032643]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.032762]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.033280] ==================================================================
[   23.226832] ==================================================================
[   23.226933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   23.227036] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.227145] 
[   23.227743] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.228196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.228278] Hardware name: linux,dummy-virt (DT)
[   23.228428] Call trace:
[   23.228497]  show_stack+0x20/0x38 (C)
[   23.228887]  dump_stack_lvl+0x8c/0xd0
[   23.229001]  print_report+0x118/0x608
[   23.229104]  kasan_report+0xdc/0x128
[   23.229756]  __asan_report_load8_noabort+0x20/0x30
[   23.229920]  kasan_atomics_helper+0x3df4/0x4858
[   23.230079]  kasan_atomics+0x198/0x2e0
[   23.230173]  kunit_try_run_case+0x170/0x3f0
[   23.230281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.230388]  kthread+0x328/0x630
[   23.230518]  ret_from_fork+0x10/0x20
[   23.230642] 
[   23.230687] Allocated by task 266:
[   23.230764]  kasan_save_stack+0x3c/0x68
[   23.230879]  kasan_save_track+0x20/0x40
[   23.231007]  kasan_save_alloc_info+0x40/0x58
[   23.231107]  __kasan_kmalloc+0xd4/0xd8
[   23.231196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.231333]  kasan_atomics+0xb8/0x2e0
[   23.231417]  kunit_try_run_case+0x170/0x3f0
[   23.231510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.231610]  kthread+0x328/0x630
[   23.231687]  ret_from_fork+0x10/0x20
[   23.231775] 
[   23.231833] The buggy address belongs to the object at fff00000c5958200
[   23.231833]  which belongs to the cache kmalloc-64 of size 64
[   23.231971] The buggy address is located 0 bytes to the right of
[   23.231971]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.232135] 
[   23.232205] The buggy address belongs to the physical page:
[   23.232311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.232437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.232552] page_type: f5(slab)
[   23.232665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.232795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.232902] page dumped because: kasan: bad access detected
[   23.233006] 
[   23.233055] Memory state around the buggy address:
[   23.233190]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.233311]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.233414] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.233548]                                      ^
[   23.233635]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.233733]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.233847] ==================================================================
[   23.246239] ==================================================================
[   23.246349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   23.246447] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.246594] 
[   23.246664] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.247320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.247509] Hardware name: linux,dummy-virt (DT)
[   23.247599] Call trace:
[   23.247991]  show_stack+0x20/0x38 (C)
[   23.248999]  dump_stack_lvl+0x8c/0xd0
[   23.249269]  print_report+0x118/0x608
[   23.249410]  kasan_report+0xdc/0x128
[   23.249518]  __asan_report_load8_noabort+0x20/0x30
[   23.249626]  kasan_atomics_helper+0x3e10/0x4858
[   23.249716]  kasan_atomics+0x198/0x2e0
[   23.249805]  kunit_try_run_case+0x170/0x3f0
[   23.249922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.250977]  kthread+0x328/0x630
[   23.251206]  ret_from_fork+0x10/0x20
[   23.251317] 
[   23.251361] Allocated by task 266:
[   23.251426]  kasan_save_stack+0x3c/0x68
[   23.251525]  kasan_save_track+0x20/0x40
[   23.251611]  kasan_save_alloc_info+0x40/0x58
[   23.252350]  __kasan_kmalloc+0xd4/0xd8
[   23.252577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.252685]  kasan_atomics+0xb8/0x2e0
[   23.252784]  kunit_try_run_case+0x170/0x3f0
[   23.253314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.253601]  kthread+0x328/0x630
[   23.254024]  ret_from_fork+0x10/0x20
[   23.254405] 
[   23.254461] The buggy address belongs to the object at fff00000c5958200
[   23.254461]  which belongs to the cache kmalloc-64 of size 64
[   23.255001] The buggy address is located 0 bytes to the right of
[   23.255001]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.255355] 
[   23.255617] The buggy address belongs to the physical page:
[   23.255867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.255971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.256459] page_type: f5(slab)
[   23.256838] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.256969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.257064] page dumped because: kasan: bad access detected
[   23.257655] 
[   23.257906] Memory state around the buggy address:
[   23.258002]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.258095]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.258180] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.258262]                                      ^
[   23.258330]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.258429]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.259142] ==================================================================
[   23.017167] ==================================================================
[   23.017326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   23.017444] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.017554] 
[   23.017625] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.017948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.018049] Hardware name: linux,dummy-virt (DT)
[   23.018163] Call trace:
[   23.018242]  show_stack+0x20/0x38 (C)
[   23.018413]  dump_stack_lvl+0x8c/0xd0
[   23.018533]  print_report+0x118/0x608
[   23.018673]  kasan_report+0xdc/0x128
[   23.018842]  kasan_check_range+0x100/0x1a8
[   23.018935]  __kasan_check_write+0x20/0x30
[   23.019032]  kasan_atomics_helper+0xe44/0x4858
[   23.019194]  kasan_atomics+0x198/0x2e0
[   23.019290]  kunit_try_run_case+0x170/0x3f0
[   23.019385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.019495]  kthread+0x328/0x630
[   23.019598]  ret_from_fork+0x10/0x20
[   23.019692] 
[   23.019763] Allocated by task 266:
[   23.019856]  kasan_save_stack+0x3c/0x68
[   23.019958]  kasan_save_track+0x20/0x40
[   23.020091]  kasan_save_alloc_info+0x40/0x58
[   23.020322]  __kasan_kmalloc+0xd4/0xd8
[   23.020985]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.021232]  kasan_atomics+0xb8/0x2e0
[   23.021353]  kunit_try_run_case+0x170/0x3f0
[   23.021448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.021571]  kthread+0x328/0x630
[   23.021690]  ret_from_fork+0x10/0x20
[   23.021771] 
[   23.021815] The buggy address belongs to the object at fff00000c5958200
[   23.021815]  which belongs to the cache kmalloc-64 of size 64
[   23.021955] The buggy address is located 0 bytes to the right of
[   23.021955]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.022105] 
[   23.022177] The buggy address belongs to the physical page:
[   23.022252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.022467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.022584] page_type: f5(slab)
[   23.022708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.022874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.022960] page dumped because: kasan: bad access detected
[   23.023039] 
[   23.023089] Memory state around the buggy address:
[   23.023206]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.023358]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.023512] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.023646]                                      ^
[   23.023724]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.023835]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.023927] ==================================================================
[   22.993364] ==================================================================
[   22.993474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   22.993634] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   22.993746] 
[   22.993853] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.994073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.994173] Hardware name: linux,dummy-virt (DT)
[   22.994239] Call trace:
[   22.994289]  show_stack+0x20/0x38 (C)
[   22.994461]  dump_stack_lvl+0x8c/0xd0
[   22.994579]  print_report+0x118/0x608
[   22.994737]  kasan_report+0xdc/0x128
[   22.994851]  kasan_check_range+0x100/0x1a8
[   22.994947]  __kasan_check_read+0x20/0x30
[   22.995086]  kasan_atomics_helper+0xdd4/0x4858
[   22.995194]  kasan_atomics+0x198/0x2e0
[   22.995291]  kunit_try_run_case+0x170/0x3f0
[   22.995379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.995477]  kthread+0x328/0x630
[   22.995569]  ret_from_fork+0x10/0x20
[   22.995685] 
[   22.995752] Allocated by task 266:
[   22.995859]  kasan_save_stack+0x3c/0x68
[   22.995989]  kasan_save_track+0x20/0x40
[   22.996109]  kasan_save_alloc_info+0x40/0x58
[   22.996233]  __kasan_kmalloc+0xd4/0xd8
[   22.996327]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.996418]  kasan_atomics+0xb8/0x2e0
[   22.996534]  kunit_try_run_case+0x170/0x3f0
[   22.996622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.996740]  kthread+0x328/0x630
[   22.996817]  ret_from_fork+0x10/0x20
[   22.997538] 
[   22.997634] The buggy address belongs to the object at fff00000c5958200
[   22.997634]  which belongs to the cache kmalloc-64 of size 64
[   22.998474] The buggy address is located 0 bytes to the right of
[   22.998474]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   22.998665] 
[   22.998715] The buggy address belongs to the physical page:
[   22.999298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   22.999755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.999896] page_type: f5(slab)
[   22.999980] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.000078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.000153] page dumped because: kasan: bad access detected
[   23.000219] 
[   23.000262] Memory state around the buggy address:
[   23.000319]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.000402]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.000496] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.000578]                                      ^
[   23.000649]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.000742]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.000846] ==================================================================
[   23.066923] ==================================================================
[   23.067035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   23.067162] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.067290] 
[   23.067726] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.068195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.068303] Hardware name: linux,dummy-virt (DT)
[   23.068408] Call trace:
[   23.068483]  show_stack+0x20/0x38 (C)
[   23.068596]  dump_stack_lvl+0x8c/0xd0
[   23.068724]  print_report+0x118/0x608
[   23.068934]  kasan_report+0xdc/0x128
[   23.069085]  kasan_check_range+0x100/0x1a8
[   23.069380]  __kasan_check_write+0x20/0x30
[   23.069527]  kasan_atomics_helper+0xff0/0x4858
[   23.069746]  kasan_atomics+0x198/0x2e0
[   23.070018]  kunit_try_run_case+0x170/0x3f0
[   23.070195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.070381]  kthread+0x328/0x630
[   23.070498]  ret_from_fork+0x10/0x20
[   23.070629] 
[   23.070674] Allocated by task 266:
[   23.070932]  kasan_save_stack+0x3c/0x68
[   23.071112]  kasan_save_track+0x20/0x40
[   23.071387]  kasan_save_alloc_info+0x40/0x58
[   23.071838]  __kasan_kmalloc+0xd4/0xd8
[   23.072210]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.072320]  kasan_atomics+0xb8/0x2e0
[   23.072419]  kunit_try_run_case+0x170/0x3f0
[   23.072523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.072639]  kthread+0x328/0x630
[   23.073363]  ret_from_fork+0x10/0x20
[   23.073805] 
[   23.073987] The buggy address belongs to the object at fff00000c5958200
[   23.073987]  which belongs to the cache kmalloc-64 of size 64
[   23.074914] The buggy address is located 0 bytes to the right of
[   23.074914]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.075123] 
[   23.075181] The buggy address belongs to the physical page:
[   23.075263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.075387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.075507] page_type: f5(slab)
[   23.075608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.075755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.075876] page dumped because: kasan: bad access detected
[   23.075967] 
[   23.076044] Memory state around the buggy address:
[   23.076166]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.076328]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.076488] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.076593]                                      ^
[   23.076678]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.076789]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.076899] ==================================================================
[   23.148856] ==================================================================
[   23.148999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   23.149121] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.149262] 
[   23.149327] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.149519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.149586] Hardware name: linux,dummy-virt (DT)
[   23.149692] Call trace:
[   23.149757]  show_stack+0x20/0x38 (C)
[   23.149892]  dump_stack_lvl+0x8c/0xd0
[   23.150041]  print_report+0x118/0x608
[   23.150215]  kasan_report+0xdc/0x128
[   23.150371]  __asan_report_load8_noabort+0x20/0x30
[   23.150571]  kasan_atomics_helper+0x3f04/0x4858
[   23.150690]  kasan_atomics+0x198/0x2e0
[   23.150783]  kunit_try_run_case+0x170/0x3f0
[   23.150927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.151055]  kthread+0x328/0x630
[   23.151195]  ret_from_fork+0x10/0x20
[   23.151367] 
[   23.151420] Allocated by task 266:
[   23.151520]  kasan_save_stack+0x3c/0x68
[   23.151663]  kasan_save_track+0x20/0x40
[   23.151756]  kasan_save_alloc_info+0x40/0x58
[   23.151857]  __kasan_kmalloc+0xd4/0xd8
[   23.151933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.152018]  kasan_atomics+0xb8/0x2e0
[   23.152104]  kunit_try_run_case+0x170/0x3f0
[   23.152196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.152369]  kthread+0x328/0x630
[   23.152492]  ret_from_fork+0x10/0x20
[   23.152568] 
[   23.152616] The buggy address belongs to the object at fff00000c5958200
[   23.152616]  which belongs to the cache kmalloc-64 of size 64
[   23.152770] The buggy address is located 0 bytes to the right of
[   23.152770]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.152960] 
[   23.153037] The buggy address belongs to the physical page:
[   23.153156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.153320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.153428] page_type: f5(slab)
[   23.153517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.153685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.153800] page dumped because: kasan: bad access detected
[   23.153889] 
[   23.153935] Memory state around the buggy address:
[   23.154016]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.154125]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.154268] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.154416]                                      ^
[   23.154548]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.154713]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.154860] ==================================================================
[   23.275090] ==================================================================
[   23.275214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   23.275338] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.277171] 
[   23.277307] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.277662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.277875] Hardware name: linux,dummy-virt (DT)
[   23.277965] Call trace:
[   23.278025]  show_stack+0x20/0x38 (C)
[   23.278135]  dump_stack_lvl+0x8c/0xd0
[   23.278238]  print_report+0x118/0x608
[   23.278344]  kasan_report+0xdc/0x128
[   23.278448]  __asan_report_load8_noabort+0x20/0x30
[   23.279236]  kasan_atomics_helper+0x3e20/0x4858
[   23.279386]  kasan_atomics+0x198/0x2e0
[   23.279503]  kunit_try_run_case+0x170/0x3f0
[   23.280580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.281126]  kthread+0x328/0x630
[   23.281382]  ret_from_fork+0x10/0x20
[   23.281522] 
[   23.281579] Allocated by task 266:
[   23.281701]  kasan_save_stack+0x3c/0x68
[   23.281807]  kasan_save_track+0x20/0x40
[   23.281932]  kasan_save_alloc_info+0x40/0x58
[   23.282055]  __kasan_kmalloc+0xd4/0xd8
[   23.282159]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.282247]  kasan_atomics+0xb8/0x2e0
[   23.282319]  kunit_try_run_case+0x170/0x3f0
[   23.282621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.282744]  kthread+0x328/0x630
[   23.283122]  ret_from_fork+0x10/0x20
[   23.283232] 
[   23.283435] The buggy address belongs to the object at fff00000c5958200
[   23.283435]  which belongs to the cache kmalloc-64 of size 64
[   23.283580] The buggy address is located 0 bytes to the right of
[   23.283580]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.284345] 
[   23.284402] The buggy address belongs to the physical page:
[   23.284670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.285186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.285350] page_type: f5(slab)
[   23.285460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.285621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.285803] page dumped because: kasan: bad access detected
[   23.286035] 
[   23.286074] Memory state around the buggy address:
[   23.286170]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.286275]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.286410] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.286514]                                      ^
[   23.286864]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.287014]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.287163] ==================================================================
[   23.090386] ==================================================================
[   23.090447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   23.090513] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.090583] 
[   23.090617] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.090711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.090744] Hardware name: linux,dummy-virt (DT)
[   23.090782] Call trace:
[   23.090811]  show_stack+0x20/0x38 (C)
[   23.090933]  dump_stack_lvl+0x8c/0xd0
[   23.091042]  print_report+0x118/0x608
[   23.091137]  kasan_report+0xdc/0x128
[   23.091242]  kasan_check_range+0x100/0x1a8
[   23.091352]  __kasan_check_write+0x20/0x30
[   23.091770]  kasan_atomics_helper+0x10c0/0x4858
[   23.092103]  kasan_atomics+0x198/0x2e0
[   23.092392]  kunit_try_run_case+0x170/0x3f0
[   23.092517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.092647]  kthread+0x328/0x630
[   23.092891]  ret_from_fork+0x10/0x20
[   23.093013] 
[   23.093062] Allocated by task 266:
[   23.093299]  kasan_save_stack+0x3c/0x68
[   23.093733]  kasan_save_track+0x20/0x40
[   23.093874]  kasan_save_alloc_info+0x40/0x58
[   23.093986]  __kasan_kmalloc+0xd4/0xd8
[   23.094283]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.094468]  kasan_atomics+0xb8/0x2e0
[   23.094671]  kunit_try_run_case+0x170/0x3f0
[   23.094773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.095365]  kthread+0x328/0x630
[   23.095730]  ret_from_fork+0x10/0x20
[   23.095908] 
[   23.095981] The buggy address belongs to the object at fff00000c5958200
[   23.095981]  which belongs to the cache kmalloc-64 of size 64
[   23.096137] The buggy address is located 0 bytes to the right of
[   23.096137]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.096291] 
[   23.096701] The buggy address belongs to the physical page:
[   23.096920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.097204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.097365] page_type: f5(slab)
[   23.097470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.097608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.097729] page dumped because: kasan: bad access detected
[   23.098031] 
[   23.098081] Memory state around the buggy address:
[   23.098151]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.098275]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.098575] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.098890]                                      ^
[   23.099168]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.099357]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.099455] ==================================================================
[   23.259750] ==================================================================
[   23.259867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   23.260844] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.262707] 
[   23.262839] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.263050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.263118] Hardware name: linux,dummy-virt (DT)
[   23.263178] Call trace:
[   23.263260]  show_stack+0x20/0x38 (C)
[   23.263390]  dump_stack_lvl+0x8c/0xd0
[   23.264085]  print_report+0x118/0x608
[   23.264627]  kasan_report+0xdc/0x128
[   23.264768]  kasan_check_range+0x100/0x1a8
[   23.265163]  __kasan_check_write+0x20/0x30
[   23.265551]  kasan_atomics_helper+0x175c/0x4858
[   23.266455]  kasan_atomics+0x198/0x2e0
[   23.266611]  kunit_try_run_case+0x170/0x3f0
[   23.266722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.266856]  kthread+0x328/0x630
[   23.266946]  ret_from_fork+0x10/0x20
[   23.267056] 
[   23.267104] Allocated by task 266:
[   23.267165]  kasan_save_stack+0x3c/0x68
[   23.267253]  kasan_save_track+0x20/0x40
[   23.267335]  kasan_save_alloc_info+0x40/0x58
[   23.267417]  __kasan_kmalloc+0xd4/0xd8
[   23.267494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.267584]  kasan_atomics+0xb8/0x2e0
[   23.267667]  kunit_try_run_case+0x170/0x3f0
[   23.267748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.267874]  kthread+0x328/0x630
[   23.267963]  ret_from_fork+0x10/0x20
[   23.268057] 
[   23.268109] The buggy address belongs to the object at fff00000c5958200
[   23.268109]  which belongs to the cache kmalloc-64 of size 64
[   23.268254] The buggy address is located 0 bytes to the right of
[   23.268254]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.268395] 
[   23.268437] The buggy address belongs to the physical page:
[   23.268501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.268596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.268699] page_type: f5(slab)
[   23.268816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.272991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.273097] page dumped because: kasan: bad access detected
[   23.273185] 
[   23.273225] Memory state around the buggy address:
[   23.273305]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.273406]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.273499] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.273589]                                      ^
[   23.273703]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.273795]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.273943] ==================================================================
[   23.203349] ==================================================================
[   23.203459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   23.203728] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.203983] 
[   23.204116] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.204630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.204785] Hardware name: linux,dummy-virt (DT)
[   23.204923] Call trace:
[   23.205038]  show_stack+0x20/0x38 (C)
[   23.205325]  dump_stack_lvl+0x8c/0xd0
[   23.205424]  print_report+0x118/0x608
[   23.205520]  kasan_report+0xdc/0x128
[   23.205622]  __asan_report_load8_noabort+0x20/0x30
[   23.206624]  kasan_atomics_helper+0x3db0/0x4858
[   23.206959]  kasan_atomics+0x198/0x2e0
[   23.207196]  kunit_try_run_case+0x170/0x3f0
[   23.207433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.207558]  kthread+0x328/0x630
[   23.207937]  ret_from_fork+0x10/0x20
[   23.208102] 
[   23.208148] Allocated by task 266:
[   23.208212]  kasan_save_stack+0x3c/0x68
[   23.208308]  kasan_save_track+0x20/0x40
[   23.208394]  kasan_save_alloc_info+0x40/0x58
[   23.208710]  __kasan_kmalloc+0xd4/0xd8
[   23.208937]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.209157]  kasan_atomics+0xb8/0x2e0
[   23.209245]  kunit_try_run_case+0x170/0x3f0
[   23.209336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.209643]  kthread+0x328/0x630
[   23.209736]  ret_from_fork+0x10/0x20
[   23.209872] 
[   23.209917] The buggy address belongs to the object at fff00000c5958200
[   23.209917]  which belongs to the cache kmalloc-64 of size 64
[   23.210064] The buggy address is located 0 bytes to the right of
[   23.210064]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.210222] 
[   23.210278] The buggy address belongs to the physical page:
[   23.210354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.210475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.210600] page_type: f5(slab)
[   23.210701] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.210872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.211039] page dumped because: kasan: bad access detected
[   23.211158] 
[   23.211223] Memory state around the buggy address:
[   23.211336]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.211469]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.211592] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.211742]                                      ^
[   23.211889]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.211997]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.212564] ==================================================================
[   23.287754] ==================================================================
[   23.288199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   23.288331] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.288510] 
[   23.288605] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.288875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.288936] Hardware name: linux,dummy-virt (DT)
[   23.289015] Call trace:
[   23.289092]  show_stack+0x20/0x38 (C)
[   23.289260]  dump_stack_lvl+0x8c/0xd0
[   23.289368]  print_report+0x118/0x608
[   23.289865]  kasan_report+0xdc/0x128
[   23.290111]  kasan_check_range+0x100/0x1a8
[   23.290244]  __kasan_check_write+0x20/0x30
[   23.290374]  kasan_atomics_helper+0x17ec/0x4858
[   23.290496]  kasan_atomics+0x198/0x2e0
[   23.290609]  kunit_try_run_case+0x170/0x3f0
[   23.290705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.290840]  kthread+0x328/0x630
[   23.290947]  ret_from_fork+0x10/0x20
[   23.291515] 
[   23.291935] Allocated by task 266:
[   23.292040]  kasan_save_stack+0x3c/0x68
[   23.292355]  kasan_save_track+0x20/0x40
[   23.292559]  kasan_save_alloc_info+0x40/0x58
[   23.292657]  __kasan_kmalloc+0xd4/0xd8
[   23.293099]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.293230]  kasan_atomics+0xb8/0x2e0
[   23.293760]  kunit_try_run_case+0x170/0x3f0
[   23.293906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.294489]  kthread+0x328/0x630
[   23.294991]  ret_from_fork+0x10/0x20
[   23.295108] 
[   23.295255] The buggy address belongs to the object at fff00000c5958200
[   23.295255]  which belongs to the cache kmalloc-64 of size 64
[   23.295515] The buggy address is located 0 bytes to the right of
[   23.295515]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.296076] 
[   23.296234] The buggy address belongs to the physical page:
[   23.296323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.296466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.296597] page_type: f5(slab)
[   23.297213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.297431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.297633] page dumped because: kasan: bad access detected
[   23.297710] 
[   23.297762] Memory state around the buggy address:
[   23.298031]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.298202]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.298437] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.298660]                                      ^
[   23.298852]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.298974]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.299634] ==================================================================
[   23.059040] ==================================================================
[   23.059157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   23.059261] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.059391] 
[   23.059464] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.059949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.060015] Hardware name: linux,dummy-virt (DT)
[   23.060092] Call trace:
[   23.060145]  show_stack+0x20/0x38 (C)
[   23.060279]  dump_stack_lvl+0x8c/0xd0
[   23.060493]  print_report+0x118/0x608
[   23.060630]  kasan_report+0xdc/0x128
[   23.060746]  kasan_check_range+0x100/0x1a8
[   23.060881]  __kasan_check_write+0x20/0x30
[   23.061000]  kasan_atomics_helper+0xf88/0x4858
[   23.061112]  kasan_atomics+0x198/0x2e0
[   23.061257]  kunit_try_run_case+0x170/0x3f0
[   23.061419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.061548]  kthread+0x328/0x630
[   23.061638]  ret_from_fork+0x10/0x20
[   23.061757] 
[   23.061808] Allocated by task 266:
[   23.061952]  kasan_save_stack+0x3c/0x68
[   23.062069]  kasan_save_track+0x20/0x40
[   23.062310]  kasan_save_alloc_info+0x40/0x58
[   23.062418]  __kasan_kmalloc+0xd4/0xd8
[   23.062560]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.062715]  kasan_atomics+0xb8/0x2e0
[   23.062809]  kunit_try_run_case+0x170/0x3f0
[   23.062927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.063270]  kthread+0x328/0x630
[   23.063553]  ret_from_fork+0x10/0x20
[   23.063651] 
[   23.063702] The buggy address belongs to the object at fff00000c5958200
[   23.063702]  which belongs to the cache kmalloc-64 of size 64
[   23.063863] The buggy address is located 0 bytes to the right of
[   23.063863]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.064008] 
[   23.064277] The buggy address belongs to the physical page:
[   23.064752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.065066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.065231] page_type: f5(slab)
[   23.065287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.065393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.065500] page dumped because: kasan: bad access detected
[   23.065570] 
[   23.065614] Memory state around the buggy address:
[   23.065691]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.065804]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.065978] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.066118]                                      ^
[   23.066244]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.066391]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.066494] ==================================================================
[   23.162173] ==================================================================
[   23.162261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   23.162374] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.162486] 
[   23.162561] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.162746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.162814] Hardware name: linux,dummy-virt (DT)
[   23.162914] Call trace:
[   23.162965]  show_stack+0x20/0x38 (C)
[   23.163076]  dump_stack_lvl+0x8c/0xd0
[   23.163180]  print_report+0x118/0x608
[   23.163292]  kasan_report+0xdc/0x128
[   23.163395]  kasan_check_range+0x100/0x1a8
[   23.163514]  __kasan_check_write+0x20/0x30
[   23.163612]  kasan_atomics_helper+0x147c/0x4858
[   23.163769]  kasan_atomics+0x198/0x2e0
[   23.164007]  kunit_try_run_case+0x170/0x3f0
[   23.164131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.164247]  kthread+0x328/0x630
[   23.164345]  ret_from_fork+0x10/0x20
[   23.164438] 
[   23.164480] Allocated by task 266:
[   23.164550]  kasan_save_stack+0x3c/0x68
[   23.164677]  kasan_save_track+0x20/0x40
[   23.164770]  kasan_save_alloc_info+0x40/0x58
[   23.164892]  __kasan_kmalloc+0xd4/0xd8
[   23.164996]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.165086]  kasan_atomics+0xb8/0x2e0
[   23.165341]  kunit_try_run_case+0x170/0x3f0
[   23.165443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.165549]  kthread+0x328/0x630
[   23.165631]  ret_from_fork+0x10/0x20
[   23.165718] 
[   23.165766] The buggy address belongs to the object at fff00000c5958200
[   23.165766]  which belongs to the cache kmalloc-64 of size 64
[   23.166320] The buggy address is located 0 bytes to the right of
[   23.166320]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.167108] 
[   23.167181] The buggy address belongs to the physical page:
[   23.167257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.167629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.168191] page_type: f5(slab)
[   23.168295] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.168431] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.168544] page dumped because: kasan: bad access detected
[   23.168631] 
[   23.168806] Memory state around the buggy address:
[   23.168917]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.169946]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.170270] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.170362]                                      ^
[   23.170433]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.170537]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.170638] ==================================================================
[   22.830038] ==================================================================
[   22.830168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   22.830288] Write of size 4 at addr fff00000c5958230 by task kunit_try_catch/266
[   22.830398] 
[   22.830458] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.830726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.830849] Hardware name: linux,dummy-virt (DT)
[   22.830971] Call trace:
[   22.831065]  show_stack+0x20/0x38 (C)
[   22.831189]  dump_stack_lvl+0x8c/0xd0
[   22.831356]  print_report+0x118/0x608
[   22.831478]  kasan_report+0xdc/0x128
[   22.831598]  kasan_check_range+0x100/0x1a8
[   22.831730]  __kasan_check_write+0x20/0x30
[   22.831863]  kasan_atomics_helper+0xa6c/0x4858
[   22.831984]  kasan_atomics+0x198/0x2e0
[   22.832129]  kunit_try_run_case+0x170/0x3f0
[   22.832250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.832402]  kthread+0x328/0x630
[   22.832515]  ret_from_fork+0x10/0x20
[   22.832645] 
[   22.832704] Allocated by task 266:
[   22.832803]  kasan_save_stack+0x3c/0x68
[   22.832924]  kasan_save_track+0x20/0x40
[   22.833021]  kasan_save_alloc_info+0x40/0x58
[   22.833231]  __kasan_kmalloc+0xd4/0xd8
[   22.833331]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.833521]  kasan_atomics+0xb8/0x2e0
[   22.833735]  kunit_try_run_case+0x170/0x3f0
[   22.834106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.834241]  kthread+0x328/0x630
[   22.834343]  ret_from_fork+0x10/0x20
[   22.834447] 
[   22.834638] The buggy address belongs to the object at fff00000c5958200
[   22.834638]  which belongs to the cache kmalloc-64 of size 64
[   22.835316] The buggy address is located 0 bytes to the right of
[   22.835316]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   22.835501] 
[   22.835566] The buggy address belongs to the physical page:
[   22.835742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   22.835921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.836043] page_type: f5(slab)
[   22.836144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.836283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.836393] page dumped because: kasan: bad access detected
[   22.837262] 
[   22.837680] Memory state around the buggy address:
[   22.838114]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.838752]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.839291] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.839933]                                      ^
[   22.840372]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.840966]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.843051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.848962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.850640]  __kasan_kmalloc+0xd4/0xd8
[   22.850741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.850865]  kasan_atomics+0xb8/0x2e0
[   22.850969]  kunit_try_run_case+0x170/0x3f0
[   22.851073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.852642]  kthread+0x328/0x630
[   22.854270]  ret_from_fork+0x10/0x20
[   22.854584] 
[   22.854643] The buggy address belongs to the object at fff00000c5958200
[   22.854643]  which belongs to the cache kmalloc-64 of size 64
[   22.855449] The buggy address is located 0 bytes to the right of
[   22.855449]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   22.857033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.858383] 
[   22.860044] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.863262] 
[   22.864526] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.869941]  kasan_atomics+0x198/0x2e0
[   22.875502]  kasan_atomics+0xb8/0x2e0
[   22.875611]  kunit_try_run_case+0x170/0x3f0
[   22.875714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.875842]  kthread+0x328/0x630
[   22.875937]  ret_from_fork+0x10/0x20
[   22.876019] 
[   22.876066] The buggy address belongs to the object at fff00000c5958200
[   22.876066]  which belongs to the cache kmalloc-64 of size 64
[   22.876659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.880018] 
[   22.881506]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.882682]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.892733]  __kasan_check_write+0x20/0x30
[   22.898415]  kasan_atomics+0xb8/0x2e0
[   22.900868]  kthread+0x328/0x630
[   22.904133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   22.908662]                                      ^
[   22.917321]  kasan_report+0xdc/0x128
[   22.924399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.928107] page_type: f5(slab)
[   22.930774] 
[   22.933611] ==================================================================
[   22.986865] ==================================================================
[   22.986975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   22.987159] Read of size 4 at addr fff00000c5958230 by task kunit_try_catch/266
[   22.987284] 
[   22.987356] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.987565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.987640] Hardware name: linux,dummy-virt (DT)
[   22.987723] Call trace:
[   22.987779]  show_stack+0x20/0x38 (C)
[   22.987925]  dump_stack_lvl+0x8c/0xd0
[   22.988030]  print_report+0x118/0x608
[   22.988151]  kasan_report+0xdc/0x128
[   22.988250]  __asan_report_load4_noabort+0x20/0x30
[   22.988439]  kasan_atomics_helper+0x3e04/0x4858
[   22.988548]  kasan_atomics+0x198/0x2e0
[   22.988654]  kunit_try_run_case+0x170/0x3f0
[   22.988806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.989015]  kthread+0x328/0x630
[   22.989208]  ret_from_fork+0x10/0x20
[   22.989379] 
[   22.989420] Allocated by task 266:
[   22.989485]  kasan_save_stack+0x3c/0x68
[   22.989658]  kasan_save_track+0x20/0x40
[   22.989793]  kasan_save_alloc_info+0x40/0x58
[   22.989955]  __kasan_kmalloc+0xd4/0xd8
[   22.990076]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.990171]  kasan_atomics+0xb8/0x2e0
[   22.990264]  kunit_try_run_case+0x170/0x3f0
[   22.990381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.990467]  kthread+0x328/0x630
[   22.990532]  ret_from_fork+0x10/0x20
[   22.990618] 
[   22.990665] The buggy address belongs to the object at fff00000c5958200
[   22.990665]  which belongs to the cache kmalloc-64 of size 64
[   22.990806] The buggy address is located 0 bytes to the right of
[   22.990806]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   22.991004] 
[   22.991055] The buggy address belongs to the physical page:
[   22.991171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   22.991299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.991415] page_type: f5(slab)
[   22.991532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.991660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.991753] page dumped because: kasan: bad access detected
[   22.991846] 
[   22.991892] Memory state around the buggy address:
[   22.991965]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.992079]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.992177] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.992306]                                      ^
[   22.992380]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.992510]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.992630] ==================================================================
[   22.782312] ==================================================================
[   22.782430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   22.782567] Read of size 4 at addr fff00000c5958230 by task kunit_try_catch/266
[   22.782702] 
[   22.782783] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.783005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.783083] Hardware name: linux,dummy-virt (DT)
[   22.783167] Call trace:
[   22.783228]  show_stack+0x20/0x38 (C)
[   22.783355]  dump_stack_lvl+0x8c/0xd0
[   22.783479]  print_report+0x118/0x608
[   22.783602]  kasan_report+0xdc/0x128
[   22.783718]  __asan_report_load4_noabort+0x20/0x30
[   22.785898]  kasan_atomics_helper+0x42d8/0x4858
[   22.786743]  kasan_atomics+0x198/0x2e0
[   22.787398]  kunit_try_run_case+0x170/0x3f0
[   22.787671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.788057]  kthread+0x328/0x630
[   22.788702]  ret_from_fork+0x10/0x20
[   22.789281] 
[   22.789395] Allocated by task 266:
[   22.789464]  kasan_save_stack+0x3c/0x68
[   22.789562]  kasan_save_track+0x20/0x40
[   22.789639]  kasan_save_alloc_info+0x40/0x58
[   22.789730]  __kasan_kmalloc+0xd4/0xd8
[   22.789830]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.790755]  kasan_atomics+0xb8/0x2e0
[   22.791212]  kunit_try_run_case+0x170/0x3f0
[   22.791585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.792048]  kthread+0x328/0x630
[   22.792186]  ret_from_fork+0x10/0x20
[   22.792503] 
[   22.792861] The buggy address belongs to the object at fff00000c5958200
[   22.792861]  which belongs to the cache kmalloc-64 of size 64
[   22.793099] The buggy address is located 0 bytes to the right of
[   22.793099]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   22.793412] 
[   22.793575] The buggy address belongs to the physical page:
[   22.794088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   22.794457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.794785] page_type: f5(slab)
[   22.794937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.795165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.795639] page dumped because: kasan: bad access detected
[   22.795807] 
[   22.795870] Memory state around the buggy address:
[   22.795955]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.796065]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.796169] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.796271]                                      ^
[   22.796361]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.797621]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.797741] ==================================================================
[   23.119128] ==================================================================
[   23.119232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   23.119376] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.119496] 
[   23.119556] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.119718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.119778] Hardware name: linux,dummy-virt (DT)
[   23.122615] Call trace:
[   23.122697]  show_stack+0x20/0x38 (C)
[   23.122854]  dump_stack_lvl+0x8c/0xd0
[   23.122964]  print_report+0x118/0x608
[   23.123069]  kasan_report+0xdc/0x128
[   23.123169]  kasan_check_range+0x100/0x1a8
[   23.123274]  __kasan_check_write+0x20/0x30
[   23.123381]  kasan_atomics_helper+0x126c/0x4858
[   23.123498]  kasan_atomics+0x198/0x2e0
[   23.123612]  kunit_try_run_case+0x170/0x3f0
[   23.123713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.123843]  kthread+0x328/0x630
[   23.123929]  ret_from_fork+0x10/0x20
[   23.124029] 
[   23.124072] Allocated by task 266:
[   23.124134]  kasan_save_stack+0x3c/0x68
[   23.124229]  kasan_save_track+0x20/0x40
[   23.124315]  kasan_save_alloc_info+0x40/0x58
[   23.124752]  __kasan_kmalloc+0xd4/0xd8
[   23.124952]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.125514]  kasan_atomics+0xb8/0x2e0
[   23.125867]  kunit_try_run_case+0x170/0x3f0
[   23.126856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.127038]  kthread+0x328/0x630
[   23.127132]  ret_from_fork+0x10/0x20
[   23.127295] 
[   23.127356] The buggy address belongs to the object at fff00000c5958200
[   23.127356]  which belongs to the cache kmalloc-64 of size 64
[   23.127546] The buggy address is located 0 bytes to the right of
[   23.127546]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.127970] 
[   23.128036] The buggy address belongs to the physical page:
[   23.128128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.128503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.129152] page_type: f5(slab)
[   23.129267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.129401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.129507] page dumped because: kasan: bad access detected
[   23.129811] 
[   23.129881] Memory state around the buggy address:
[   23.130145]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.130836]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.130978] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.131079]                                      ^
[   23.131156]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.132141]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.132653] ==================================================================
[   23.100466] ==================================================================
[   23.100710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   23.101034] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.101207] 
[   23.101279] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.101479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.101556] Hardware name: linux,dummy-virt (DT)
[   23.101628] Call trace:
[   23.101683]  show_stack+0x20/0x38 (C)
[   23.101797]  dump_stack_lvl+0x8c/0xd0
[   23.101921]  print_report+0x118/0x608
[   23.102054]  kasan_report+0xdc/0x128
[   23.102223]  kasan_check_range+0x100/0x1a8
[   23.102348]  __kasan_check_write+0x20/0x30
[   23.102464]  kasan_atomics_helper+0x1128/0x4858
[   23.102603]  kasan_atomics+0x198/0x2e0
[   23.102722]  kunit_try_run_case+0x170/0x3f0
[   23.102870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.103066]  kthread+0x328/0x630
[   23.103210]  ret_from_fork+0x10/0x20
[   23.103325] 
[   23.103385] Allocated by task 266:
[   23.103490]  kasan_save_stack+0x3c/0x68
[   23.103636]  kasan_save_track+0x20/0x40
[   23.103766]  kasan_save_alloc_info+0x40/0x58
[   23.103895]  __kasan_kmalloc+0xd4/0xd8
[   23.103978]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.104069]  kasan_atomics+0xb8/0x2e0
[   23.104168]  kunit_try_run_case+0x170/0x3f0
[   23.104285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.104389]  kthread+0x328/0x630
[   23.104464]  ret_from_fork+0x10/0x20
[   23.104556] 
[   23.104611] The buggy address belongs to the object at fff00000c5958200
[   23.104611]  which belongs to the cache kmalloc-64 of size 64
[   23.104787] The buggy address is located 0 bytes to the right of
[   23.104787]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.104960] 
[   23.105011] The buggy address belongs to the physical page:
[   23.105091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.105302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.105422] page_type: f5(slab)
[   23.105502] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.105618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.105715] page dumped because: kasan: bad access detected
[   23.105810] 
[   23.105870] Memory state around the buggy address:
[   23.105943]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.106040]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.106175] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.106271]                                      ^
[   23.106361]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.106459]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.106580] ==================================================================
[   23.155344] ==================================================================
[   23.155615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   23.155814] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.155986] 
[   23.156059] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.156250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.156314] Hardware name: linux,dummy-virt (DT)
[   23.156394] Call trace:
[   23.156450]  show_stack+0x20/0x38 (C)
[   23.156555]  dump_stack_lvl+0x8c/0xd0
[   23.156655]  print_report+0x118/0x608
[   23.156805]  kasan_report+0xdc/0x128
[   23.156939]  kasan_check_range+0x100/0x1a8
[   23.157053]  __kasan_check_write+0x20/0x30
[   23.157195]  kasan_atomics_helper+0x1414/0x4858
[   23.157355]  kasan_atomics+0x198/0x2e0
[   23.157502]  kunit_try_run_case+0x170/0x3f0
[   23.157664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.157840]  kthread+0x328/0x630
[   23.157940]  ret_from_fork+0x10/0x20
[   23.158049] 
[   23.158095] Allocated by task 266:
[   23.158155]  kasan_save_stack+0x3c/0x68
[   23.158238]  kasan_save_track+0x20/0x40
[   23.158304]  kasan_save_alloc_info+0x40/0x58
[   23.158402]  __kasan_kmalloc+0xd4/0xd8
[   23.158476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.158568]  kasan_atomics+0xb8/0x2e0
[   23.158661]  kunit_try_run_case+0x170/0x3f0
[   23.158845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.158954]  kthread+0x328/0x630
[   23.159023]  ret_from_fork+0x10/0x20
[   23.159088] 
[   23.159145] The buggy address belongs to the object at fff00000c5958200
[   23.159145]  which belongs to the cache kmalloc-64 of size 64
[   23.159259] The buggy address is located 0 bytes to the right of
[   23.159259]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.159405] 
[   23.159460] The buggy address belongs to the physical page:
[   23.159534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.159654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.159781] page_type: f5(slab)
[   23.159894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.160015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.160113] page dumped because: kasan: bad access detected
[   23.160189] 
[   23.160234] Memory state around the buggy address:
[   23.160309]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.160417]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.160527] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.160666]                                      ^
[   23.160773]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.161681]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.161787] ==================================================================
[   23.033788] ==================================================================
[   23.033920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   23.034045] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.034157] 
[   23.034217] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.034397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.034464] Hardware name: linux,dummy-virt (DT)
[   23.034555] Call trace:
[   23.034618]  show_stack+0x20/0x38 (C)
[   23.034748]  dump_stack_lvl+0x8c/0xd0
[   23.034883]  print_report+0x118/0x608
[   23.035006]  kasan_report+0xdc/0x128
[   23.035121]  kasan_check_range+0x100/0x1a8
[   23.035245]  __kasan_check_write+0x20/0x30
[   23.035371]  kasan_atomics_helper+0xeb8/0x4858
[   23.035548]  kasan_atomics+0x198/0x2e0
[   23.035668]  kunit_try_run_case+0x170/0x3f0
[   23.035791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.035926]  kthread+0x328/0x630
[   23.036021]  ret_from_fork+0x10/0x20
[   23.036133] 
[   23.036187] Allocated by task 266:
[   23.036250]  kasan_save_stack+0x3c/0x68
[   23.036354]  kasan_save_track+0x20/0x40
[   23.036450]  kasan_save_alloc_info+0x40/0x58
[   23.036555]  __kasan_kmalloc+0xd4/0xd8
[   23.036646]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.036746]  kasan_atomics+0xb8/0x2e0
[   23.036852]  kunit_try_run_case+0x170/0x3f0
[   23.037404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.037650]  kthread+0x328/0x630
[   23.037713]  ret_from_fork+0x10/0x20
[   23.037759] 
[   23.037787] The buggy address belongs to the object at fff00000c5958200
[   23.037787]  which belongs to the cache kmalloc-64 of size 64
[   23.037909] The buggy address is located 0 bytes to the right of
[   23.037909]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.038071] 
[   23.038117] The buggy address belongs to the physical page:
[   23.038174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.038577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.038713] page_type: f5(slab)
[   23.038808] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.039617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.039752] page dumped because: kasan: bad access detected
[   23.040084] 
[   23.040326] Memory state around the buggy address:
[   23.040557]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.040679]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.040782] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.040892]                                      ^
[   23.041674]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.042420]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.042979] ==================================================================
[   22.821764] ==================================================================
[   22.821897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   22.822005] Write of size 4 at addr fff00000c5958230 by task kunit_try_catch/266
[   22.822118] 
[   22.822197] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.822413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.822490] Hardware name: linux,dummy-virt (DT)
[   22.822586] Call trace:
[   22.822651]  show_stack+0x20/0x38 (C)
[   22.823795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.824256] Allocated by task 266:
[   22.824327]  kasan_save_stack+0x3c/0x68
[   22.824627]  kasan_save_track+0x20/0x40
[   22.824849]  kasan_save_alloc_info+0x40/0x58
[   22.825185]  __kasan_kmalloc+0xd4/0xd8
[   22.825494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.825592]  kasan_atomics+0xb8/0x2e0
[   22.825675]  kunit_try_run_case+0x170/0x3f0
[   22.826011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.826140]  kthread+0x328/0x630
[   22.826254]  ret_from_fork+0x10/0x20
[   22.826349] 
[   22.826465] The buggy address belongs to the object at fff00000c5958200
[   22.826465]  which belongs to the cache kmalloc-64 of size 64
[   22.826633] The buggy address is located 0 bytes to the right of
[   22.826633]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   22.826799] 
[   22.826893] The buggy address belongs to the physical page:
[   22.827005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   22.827196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.827369] page_type: f5(slab)
[   22.827476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.827655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.827813] page dumped because: kasan: bad access detected
[   22.827958] 
[   22.828010] Memory state around the buggy address:
[   22.828091]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.828202]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.828309] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.828410]                                      ^
[   22.828494]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.828604]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.828704] ==================================================================
[   23.001222] ==================================================================
[   23.001312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   23.001405] Read of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.001498] 
[   23.001550] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.001728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.001787] Hardware name: linux,dummy-virt (DT)
[   23.005997] Call trace:
[   23.006065]  show_stack+0x20/0x38 (C)
[   23.006176]  dump_stack_lvl+0x8c/0xd0
[   23.006283]  print_report+0x118/0x608
[   23.006384]  kasan_report+0xdc/0x128
[   23.006482]  __asan_report_load8_noabort+0x20/0x30
[   23.006617]  kasan_atomics_helper+0x3f58/0x4858
[   23.006737]  kasan_atomics+0x198/0x2e0
[   23.006865]  kunit_try_run_case+0x170/0x3f0
[   23.006977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.007108]  kthread+0x328/0x630
[   23.007210]  ret_from_fork+0x10/0x20
[   23.007318] 
[   23.007367] Allocated by task 266:
[   23.007441]  kasan_save_stack+0x3c/0x68
[   23.007541]  kasan_save_track+0x20/0x40
[   23.007633]  kasan_save_alloc_info+0x40/0x58
[   23.007731]  __kasan_kmalloc+0xd4/0xd8
[   23.008912]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.009062]  kasan_atomics+0xb8/0x2e0
[   23.009467]  kunit_try_run_case+0x170/0x3f0
[   23.009855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.009978]  kthread+0x328/0x630
[   23.010516]  ret_from_fork+0x10/0x20
[   23.010649] 
[   23.010714] The buggy address belongs to the object at fff00000c5958200
[   23.010714]  which belongs to the cache kmalloc-64 of size 64
[   23.011119] The buggy address is located 0 bytes to the right of
[   23.011119]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.011850] 
[   23.011922] The buggy address belongs to the physical page:
[   23.012008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.012727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.013229] page_type: f5(slab)
[   23.013339] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.013474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.013560] page dumped because: kasan: bad access detected
[   23.014127] 
[   23.014195] Memory state around the buggy address:
[   23.014721]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.014896]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.015018] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.015360]                                      ^
[   23.015680]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.016203]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.016414] ==================================================================
[   23.213397] ==================================================================
[   23.213511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   23.213631] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.213757] 
[   23.213845] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.214042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.214111] Hardware name: linux,dummy-virt (DT)
[   23.214183] Call trace:
[   23.214241]  show_stack+0x20/0x38 (C)
[   23.214352]  dump_stack_lvl+0x8c/0xd0
[   23.214462]  print_report+0x118/0x608
[   23.214588]  kasan_report+0xdc/0x128
[   23.214717]  kasan_check_range+0x100/0x1a8
[   23.214866]  __kasan_check_write+0x20/0x30
[   23.214968]  kasan_atomics_helper+0x1644/0x4858
[   23.215109]  kasan_atomics+0x198/0x2e0
[   23.215247]  kunit_try_run_case+0x170/0x3f0
[   23.215370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.215498]  kthread+0x328/0x630
[   23.215604]  ret_from_fork+0x10/0x20
[   23.215877] 
[   23.215934] Allocated by task 266:
[   23.216336]  kasan_save_stack+0x3c/0x68
[   23.216446]  kasan_save_track+0x20/0x40
[   23.216651]  kasan_save_alloc_info+0x40/0x58
[   23.216879]  __kasan_kmalloc+0xd4/0xd8
[   23.217367]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.217879]  kasan_atomics+0xb8/0x2e0
[   23.217978]  kunit_try_run_case+0x170/0x3f0
[   23.218072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.218175]  kthread+0x328/0x630
[   23.218255]  ret_from_fork+0x10/0x20
[   23.218331] 
[   23.218373] The buggy address belongs to the object at fff00000c5958200
[   23.218373]  which belongs to the cache kmalloc-64 of size 64
[   23.218695] The buggy address is located 0 bytes to the right of
[   23.218695]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.219553] 
[   23.219926] The buggy address belongs to the physical page:
[   23.220276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.220683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.220948] page_type: f5(slab)
[   23.221524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.222107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.222199] page dumped because: kasan: bad access detected
[   23.222938] 
[   23.223118] Memory state around the buggy address:
[   23.223287]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.223400]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.223908] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.224519]                                      ^
[   23.224675]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.225299]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.225736] ==================================================================
[   22.811941] ==================================================================
[   22.812049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   22.812163] Write of size 4 at addr fff00000c5958230 by task kunit_try_catch/266
[   22.812284] 
[   22.812358] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.812558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.812630] Hardware name: linux,dummy-virt (DT)
[   22.812713] Call trace:
[   22.812768]  show_stack+0x20/0x38 (C)
[   22.812902]  dump_stack_lvl+0x8c/0xd0
[   22.813007]  print_report+0x118/0x608
[   22.813123]  kasan_report+0xdc/0x128
[   22.813877]  kasan_check_range+0x100/0x1a8
[   22.814031]  __kasan_check_write+0x20/0x30
[   22.814115]  kasan_atomics_helper+0x99c/0x4858
[   22.814198]  kasan_atomics+0x198/0x2e0
[   22.814292]  kunit_try_run_case+0x170/0x3f0
[   22.814374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.814475]  kthread+0x328/0x630
[   22.814568]  ret_from_fork+0x10/0x20
[   22.814673] 
[   22.814721] Allocated by task 266:
[   22.814800]  kasan_save_stack+0x3c/0x68
[   22.814952]  kasan_save_track+0x20/0x40
[   22.815065]  kasan_save_alloc_info+0x40/0x58
[   22.815166]  __kasan_kmalloc+0xd4/0xd8
[   22.815258]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.815355]  kasan_atomics+0xb8/0x2e0
[   22.815448]  kunit_try_run_case+0x170/0x3f0
[   22.815550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.815662]  kthread+0x328/0x630
[   22.815748]  ret_from_fork+0x10/0x20
[   22.815855] 
[   22.815911] The buggy address belongs to the object at fff00000c5958200
[   22.815911]  which belongs to the cache kmalloc-64 of size 64
[   22.816061] The buggy address is located 0 bytes to the right of
[   22.816061]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   22.816226] 
[   22.816279] The buggy address belongs to the physical page:
[   22.816374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   22.816496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.817182] page_type: f5(slab)
[   22.817328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.817500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.817639] page dumped because: kasan: bad access detected
[   22.817717] 
[   22.817760] Memory state around the buggy address:
[   22.817843]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.818257]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.818432] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.818572]                                      ^
[   22.820908]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.821004]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.821057] ==================================================================
[   22.973084] ==================================================================
[   22.973217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   22.973375] Read of size 4 at addr fff00000c5958230 by task kunit_try_catch/266
[   22.973503] 
[   22.973593] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.973798] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.973891] Hardware name: linux,dummy-virt (DT)
[   22.973975] Call trace:
[   22.974032]  show_stack+0x20/0x38 (C)
[   22.974152]  dump_stack_lvl+0x8c/0xd0
[   22.974273]  print_report+0x118/0x608
[   22.974388]  kasan_report+0xdc/0x128
[   22.974508]  __asan_report_load4_noabort+0x20/0x30
[   22.974655]  kasan_atomics_helper+0x3dd8/0x4858
[   22.974780]  kasan_atomics+0x198/0x2e0
[   22.974941]  kunit_try_run_case+0x170/0x3f0
[   22.975058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.975181]  kthread+0x328/0x630
[   22.975435]  ret_from_fork+0x10/0x20
[   22.975594] 
[   22.975635] Allocated by task 266:
[   22.975716]  kasan_save_stack+0x3c/0x68
[   22.975848]  kasan_save_track+0x20/0x40
[   22.975958]  kasan_save_alloc_info+0x40/0x58
[   22.976056]  __kasan_kmalloc+0xd4/0xd8
[   22.976161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.976304]  kasan_atomics+0xb8/0x2e0
[   22.976400]  kunit_try_run_case+0x170/0x3f0
[   22.976587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.976731]  kthread+0x328/0x630
[   22.976835]  ret_from_fork+0x10/0x20
[   22.977024] 
[   22.977095] The buggy address belongs to the object at fff00000c5958200
[   22.977095]  which belongs to the cache kmalloc-64 of size 64
[   22.977244] The buggy address is located 0 bytes to the right of
[   22.977244]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   22.977407] 
[   22.977453] The buggy address belongs to the physical page:
[   22.977520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   22.977622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.977772] page_type: f5(slab)
[   22.977967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.978090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.978179] page dumped because: kasan: bad access detected
[   22.978234] 
[   22.978266] Memory state around the buggy address:
[   22.978329]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.978433]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.978558] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.978652]                                      ^
[   22.978814]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.978967]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.979156] ==================================================================
[   22.979794] ==================================================================
[   22.980000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   22.980180] Write of size 4 at addr fff00000c5958230 by task kunit_try_catch/266
[   22.980357] 
[   22.980470] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.980709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.980778] Hardware name: linux,dummy-virt (DT)
[   22.980862] Call trace:
[   22.980922]  show_stack+0x20/0x38 (C)
[   22.981022]  dump_stack_lvl+0x8c/0xd0
[   22.981427]  print_report+0x118/0x608
[   22.981732]  kasan_report+0xdc/0x128
[   22.982161]  kasan_check_range+0x100/0x1a8
[   22.982463]  __kasan_check_write+0x20/0x30
[   22.982745]  kasan_atomics_helper+0xd3c/0x4858
[   22.983161]  kasan_atomics+0x198/0x2e0
[   22.983307]  kunit_try_run_case+0x170/0x3f0
[   22.983417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.983580]  kthread+0x328/0x630
[   22.983715]  ret_from_fork+0x10/0x20
[   22.983849] 
[   22.983905] Allocated by task 266:
[   22.983985]  kasan_save_stack+0x3c/0x68
[   22.984095]  kasan_save_track+0x20/0x40
[   22.984210]  kasan_save_alloc_info+0x40/0x58
[   22.984353]  __kasan_kmalloc+0xd4/0xd8
[   22.984489]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.984590]  kasan_atomics+0xb8/0x2e0
[   22.984682]  kunit_try_run_case+0x170/0x3f0
[   22.984776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.984886]  kthread+0x328/0x630
[   22.984968]  ret_from_fork+0x10/0x20
[   22.985165] 
[   22.985266] The buggy address belongs to the object at fff00000c5958200
[   22.985266]  which belongs to the cache kmalloc-64 of size 64
[   22.985395] The buggy address is located 0 bytes to the right of
[   22.985395]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   22.985562] 
[   22.985626] The buggy address belongs to the physical page:
[   22.985715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   22.985844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.985950] page_type: f5(slab)
[   22.986052] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.986128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.986179] page dumped because: kasan: bad access detected
[   22.986216] 
[   22.986240] Memory state around the buggy address:
[   22.986280]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.986328]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.986378] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.986421]                                      ^
[   22.986462]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.986512]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.986571] ==================================================================
[   23.142733] ==================================================================
[   23.142857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   23.142961] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.143065] 
[   23.143129] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.143314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.143380] Hardware name: linux,dummy-virt (DT)
[   23.143451] Call trace:
[   23.143510]  show_stack+0x20/0x38 (C)
[   23.143617]  dump_stack_lvl+0x8c/0xd0
[   23.143730]  print_report+0x118/0x608
[   23.143859]  kasan_report+0xdc/0x128
[   23.143977]  kasan_check_range+0x100/0x1a8
[   23.144093]  __kasan_check_write+0x20/0x30
[   23.144208]  kasan_atomics_helper+0x1384/0x4858
[   23.144320]  kasan_atomics+0x198/0x2e0
[   23.144432]  kunit_try_run_case+0x170/0x3f0
[   23.144552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.144681]  kthread+0x328/0x630
[   23.144791]  ret_from_fork+0x10/0x20
[   23.144905] 
[   23.144949] Allocated by task 266:
[   23.145098]  kasan_save_stack+0x3c/0x68
[   23.145240]  kasan_save_track+0x20/0x40
[   23.145325]  kasan_save_alloc_info+0x40/0x58
[   23.145420]  __kasan_kmalloc+0xd4/0xd8
[   23.145599]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.145730]  kasan_atomics+0xb8/0x2e0
[   23.145870]  kunit_try_run_case+0x170/0x3f0
[   23.146001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.146128]  kthread+0x328/0x630
[   23.146201]  ret_from_fork+0x10/0x20
[   23.146273] 
[   23.146312] The buggy address belongs to the object at fff00000c5958200
[   23.146312]  which belongs to the cache kmalloc-64 of size 64
[   23.146465] The buggy address is located 0 bytes to the right of
[   23.146465]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.146639] 
[   23.146697] The buggy address belongs to the physical page:
[   23.146773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.146914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.147094] page_type: f5(slab)
[   23.147197] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.147341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.147451] page dumped because: kasan: bad access detected
[   23.147529] 
[   23.147577] Memory state around the buggy address:
[   23.147661]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.147774]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.147911] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.148032]                                      ^
[   23.148117]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.148280]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.148410] ==================================================================
[   22.798554] ==================================================================
[   22.798672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   22.798778] Write of size 4 at addr fff00000c5958230 by task kunit_try_catch/266
[   22.798916] 
[   22.798993] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.799192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.799342] Call trace:
[   22.799508]  dump_stack_lvl+0x8c/0xd0
[   22.799621]  print_report+0x118/0x608
[   22.799728]  kasan_report+0xdc/0x128
[   22.802042]  kasan_check_range+0x100/0x1a8
[   22.802255]  __kasan_check_write+0x20/0x30
[   22.802431]  kasan_atomics_helper+0x934/0x4858
[   22.802785]  kasan_atomics+0x198/0x2e0
[   22.803066]  kunit_try_run_case+0x170/0x3f0
[   22.803255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.803995]  kthread+0x328/0x630
[   22.804307]  ret_from_fork+0x10/0x20
[   22.804439] 
[   22.804495] Allocated by task 266:
[   22.804570]  kasan_save_stack+0x3c/0x68
[   22.804677]  kasan_save_track+0x20/0x40
[   22.804772]  kasan_save_alloc_info+0x40/0x58
[   22.804895]  __kasan_kmalloc+0xd4/0xd8
[   22.804991]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.805092]  kasan_atomics+0xb8/0x2e0
[   22.805173]  kunit_try_run_case+0x170/0x3f0
[   22.805261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.805351]  kthread+0x328/0x630
[   22.805430]  ret_from_fork+0x10/0x20
[   22.805522] 
[   22.805577] The buggy address belongs to the object at fff00000c5958200
[   22.805577]  which belongs to the cache kmalloc-64 of size 64
[   22.808039] The buggy address is located 0 bytes to the right of
[   22.808039]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   22.808734] 
[   22.808789] The buggy address belongs to the physical page:
[   22.809359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   22.809609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.809705] page_type: f5(slab)
[   22.810066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.810229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.810388] page dumped because: kasan: bad access detected
[   22.810508] 
[   22.810576] Memory state around the buggy address:
[   22.810703]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.810815]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.810948] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.811047]                                      ^
[   22.811133]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.811241]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.811338] ==================================================================
[   23.112618] ==================================================================
[   23.112723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   23.112856] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.112967] 
[   23.113047] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.113400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.113463] Hardware name: linux,dummy-virt (DT)
[   23.113528] Call trace:
[   23.113584]  show_stack+0x20/0x38 (C)
[   23.113719]  dump_stack_lvl+0x8c/0xd0
[   23.113841]  print_report+0x118/0x608
[   23.113955]  kasan_report+0xdc/0x128
[   23.114075]  kasan_check_range+0x100/0x1a8
[   23.114175]  __kasan_check_write+0x20/0x30
[   23.114304]  kasan_atomics_helper+0x11f8/0x4858
[   23.114418]  kasan_atomics+0x198/0x2e0
[   23.114509]  kunit_try_run_case+0x170/0x3f0
[   23.114620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.114750]  kthread+0x328/0x630
[   23.114858]  ret_from_fork+0x10/0x20
[   23.114991] 
[   23.115061] Allocated by task 266:
[   23.115172]  kasan_save_stack+0x3c/0x68
[   23.115305]  kasan_save_track+0x20/0x40
[   23.115431]  kasan_save_alloc_info+0x40/0x58
[   23.115571]  __kasan_kmalloc+0xd4/0xd8
[   23.115708]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.115865]  kasan_atomics+0xb8/0x2e0
[   23.115966]  kunit_try_run_case+0x170/0x3f0
[   23.116102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.116207]  kthread+0x328/0x630
[   23.116290]  ret_from_fork+0x10/0x20
[   23.116393] 
[   23.116440] The buggy address belongs to the object at fff00000c5958200
[   23.116440]  which belongs to the cache kmalloc-64 of size 64
[   23.116583] The buggy address is located 0 bytes to the right of
[   23.116583]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.116812] 
[   23.116906] The buggy address belongs to the physical page:
[   23.116977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.117083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.117581] page_type: f5(slab)
[   23.117673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.117799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.117915] page dumped because: kasan: bad access detected
[   23.117992] 
[   23.118031] Memory state around the buggy address:
[   23.118096]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.118181]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.118264] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.118348]                                      ^
[   23.118424]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.118525]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.118610] ==================================================================
[   23.107041] ==================================================================
[   23.107187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   23.107282] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.107389] 
[   23.107520] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.107794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.107899] Hardware name: linux,dummy-virt (DT)
[   23.108006] Call trace:
[   23.108079]  show_stack+0x20/0x38 (C)
[   23.108242]  dump_stack_lvl+0x8c/0xd0
[   23.108386]  print_report+0x118/0x608
[   23.108538]  kasan_report+0xdc/0x128
[   23.108678]  kasan_check_range+0x100/0x1a8
[   23.108862]  __kasan_check_write+0x20/0x30
[   23.108964]  kasan_atomics_helper+0x1190/0x4858
[   23.109081]  kasan_atomics+0x198/0x2e0
[   23.109199]  kunit_try_run_case+0x170/0x3f0
[   23.109306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.109469]  kthread+0x328/0x630
[   23.109570]  ret_from_fork+0x10/0x20
[   23.109672] 
[   23.109723] Allocated by task 266:
[   23.109788]  kasan_save_stack+0x3c/0x68
[   23.109914]  kasan_save_track+0x20/0x40
[   23.110000]  kasan_save_alloc_info+0x40/0x58
[   23.110088]  __kasan_kmalloc+0xd4/0xd8
[   23.110154]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.110227]  kasan_atomics+0xb8/0x2e0
[   23.110295]  kunit_try_run_case+0x170/0x3f0
[   23.110374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.110421]  kthread+0x328/0x630
[   23.110456]  ret_from_fork+0x10/0x20
[   23.110494] 
[   23.110521] The buggy address belongs to the object at fff00000c5958200
[   23.110521]  which belongs to the cache kmalloc-64 of size 64
[   23.110605] The buggy address is located 0 bytes to the right of
[   23.110605]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.110677] 
[   23.110699] The buggy address belongs to the physical page:
[   23.110732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.110785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.110870] page_type: f5(slab)
[   23.110959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.111077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.111216] page dumped because: kasan: bad access detected
[   23.111300] 
[   23.111343] Memory state around the buggy address:
[   23.111438]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.111586]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.111726] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.111874]                                      ^
[   23.111952]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.112051]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.112138] ==================================================================
[   23.191568] ==================================================================
[   23.191704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   23.192148] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.192270] 
[   23.192338] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.193277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.193377] Hardware name: linux,dummy-virt (DT)
[   23.193515] Call trace:
[   23.193580]  show_stack+0x20/0x38 (C)
[   23.193749]  dump_stack_lvl+0x8c/0xd0
[   23.194046]  print_report+0x118/0x608
[   23.194407]  kasan_report+0xdc/0x128
[   23.194543]  kasan_check_range+0x100/0x1a8
[   23.194674]  __kasan_check_write+0x20/0x30
[   23.195225]  kasan_atomics_helper+0x15b4/0x4858
[   23.195790]  kasan_atomics+0x198/0x2e0
[   23.196138]  kunit_try_run_case+0x170/0x3f0
[   23.196295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.196435]  kthread+0x328/0x630
[   23.196551]  ret_from_fork+0x10/0x20
[   23.196672] 
[   23.196803] Allocated by task 266:
[   23.196909]  kasan_save_stack+0x3c/0x68
[   23.197067]  kasan_save_track+0x20/0x40
[   23.197545]  kasan_save_alloc_info+0x40/0x58
[   23.197940]  __kasan_kmalloc+0xd4/0xd8
[   23.198388]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.198534]  kasan_atomics+0xb8/0x2e0
[   23.198738]  kunit_try_run_case+0x170/0x3f0
[   23.198894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.199007]  kthread+0x328/0x630
[   23.199244]  ret_from_fork+0x10/0x20
[   23.199342] 
[   23.199630] The buggy address belongs to the object at fff00000c5958200
[   23.199630]  which belongs to the cache kmalloc-64 of size 64
[   23.200314] The buggy address is located 0 bytes to the right of
[   23.200314]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.200480] 
[   23.200532] The buggy address belongs to the physical page:
[   23.200599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.200711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.200838] page_type: f5(slab)
[   23.200927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.201104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.201237] page dumped because: kasan: bad access detected
[   23.201312] 
[   23.201361] Memory state around the buggy address:
[   23.201442]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.201894]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.202269] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.202372]                                      ^
[   23.202457]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.202581]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.202722] ==================================================================
[   23.078093] ==================================================================
[   23.078202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   23.078309] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.078416] 
[   23.078486] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.079202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.079314] Hardware name: linux,dummy-virt (DT)
[   23.079427] Call trace:
[   23.079520]  show_stack+0x20/0x38 (C)
[   23.079694]  dump_stack_lvl+0x8c/0xd0
[   23.080194]  print_report+0x118/0x608
[   23.080340]  kasan_report+0xdc/0x128
[   23.080460]  kasan_check_range+0x100/0x1a8
[   23.080792]  __kasan_check_write+0x20/0x30
[   23.080968]  kasan_atomics_helper+0x1058/0x4858
[   23.081171]  kasan_atomics+0x198/0x2e0
[   23.081373]  kunit_try_run_case+0x170/0x3f0
[   23.081494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.081992]  kthread+0x328/0x630
[   23.082200]  ret_from_fork+0x10/0x20
[   23.082538] 
[   23.082590] Allocated by task 266:
[   23.082671]  kasan_save_stack+0x3c/0x68
[   23.082877]  kasan_save_track+0x20/0x40
[   23.082975]  kasan_save_alloc_info+0x40/0x58
[   23.083362]  __kasan_kmalloc+0xd4/0xd8
[   23.083847]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.084104]  kasan_atomics+0xb8/0x2e0
[   23.084243]  kunit_try_run_case+0x170/0x3f0
[   23.084486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.084754]  kthread+0x328/0x630
[   23.084859]  ret_from_fork+0x10/0x20
[   23.084955] 
[   23.085010] The buggy address belongs to the object at fff00000c5958200
[   23.085010]  which belongs to the cache kmalloc-64 of size 64
[   23.085192] The buggy address is located 0 bytes to the right of
[   23.085192]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.085972] 
[   23.086148] The buggy address belongs to the physical page:
[   23.086416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.086558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.086682] page_type: f5(slab)
[   23.086923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.087218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.087647] page dumped because: kasan: bad access detected
[   23.087760] 
[   23.087809] Memory state around the buggy address:
[   23.088241]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.088371]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.088693] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.089016]                                      ^
[   23.089098]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.089231]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.089968] ==================================================================
[   23.234282] ==================================================================
[   23.234342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   23.234425] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.234548] 
[   23.234633] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.234840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.234905] Hardware name: linux,dummy-virt (DT)
[   23.235278] Call trace:
[   23.235561]  show_stack+0x20/0x38 (C)
[   23.235691]  dump_stack_lvl+0x8c/0xd0
[   23.235804]  print_report+0x118/0x608
[   23.235926]  kasan_report+0xdc/0x128
[   23.236030]  kasan_check_range+0x100/0x1a8
[   23.236141]  __kasan_check_write+0x20/0x30
[   23.236247]  kasan_atomics_helper+0x16d0/0x4858
[   23.237003]  kasan_atomics+0x198/0x2e0
[   23.237645]  kunit_try_run_case+0x170/0x3f0
[   23.238261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.238485]  kthread+0x328/0x630
[   23.239056]  ret_from_fork+0x10/0x20
[   23.239236] 
[   23.239298] Allocated by task 266:
[   23.239727]  kasan_save_stack+0x3c/0x68
[   23.239847]  kasan_save_track+0x20/0x40
[   23.239940]  kasan_save_alloc_info+0x40/0x58
[   23.240083]  __kasan_kmalloc+0xd4/0xd8
[   23.240180]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.240709]  kasan_atomics+0xb8/0x2e0
[   23.241016]  kunit_try_run_case+0x170/0x3f0
[   23.241294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.241515]  kthread+0x328/0x630
[   23.241605]  ret_from_fork+0x10/0x20
[   23.241707] 
[   23.242128] The buggy address belongs to the object at fff00000c5958200
[   23.242128]  which belongs to the cache kmalloc-64 of size 64
[   23.242282] The buggy address is located 0 bytes to the right of
[   23.242282]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.242488] 
[   23.242549] The buggy address belongs to the physical page:
[   23.242732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.242934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.243068] page_type: f5(slab)
[   23.243151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.243274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.243380] page dumped because: kasan: bad access detected
[   23.243462] 
[   23.243508] Memory state around the buggy address:
[   23.243592]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.243709]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.243834] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.243938]                                      ^
[   23.244027]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.244134]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.244234] ==================================================================
[   23.173092] ==================================================================
[   23.173257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   23.173412] Write of size 8 at addr fff00000c5958230 by task kunit_try_catch/266
[   23.173508] 
[   23.173584] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   23.173761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.173839] Hardware name: linux,dummy-virt (DT)
[   23.174312] Call trace:
[   23.174409]  show_stack+0x20/0x38 (C)
[   23.174950]  dump_stack_lvl+0x8c/0xd0
[   23.175218]  print_report+0x118/0x608
[   23.175328]  kasan_report+0xdc/0x128
[   23.175476]  kasan_check_range+0x100/0x1a8
[   23.175647]  __kasan_check_write+0x20/0x30
[   23.175805]  kasan_atomics_helper+0x14e4/0x4858
[   23.176044]  kasan_atomics+0x198/0x2e0
[   23.176198]  kunit_try_run_case+0x170/0x3f0
[   23.176312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.176432]  kthread+0x328/0x630
[   23.176532]  ret_from_fork+0x10/0x20
[   23.176631] 
[   23.176676] Allocated by task 266:
[   23.176743]  kasan_save_stack+0x3c/0x68
[   23.176854]  kasan_save_track+0x20/0x40
[   23.176949]  kasan_save_alloc_info+0x40/0x58
[   23.177054]  __kasan_kmalloc+0xd4/0xd8
[   23.177201]  __kmalloc_cache_noprof+0x16c/0x3c0
[   23.177297]  kasan_atomics+0xb8/0x2e0
[   23.177454]  kunit_try_run_case+0x170/0x3f0
[   23.177559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.177663]  kthread+0x328/0x630
[   23.177746]  ret_from_fork+0x10/0x20
[   23.177857] 
[   23.177914] The buggy address belongs to the object at fff00000c5958200
[   23.177914]  which belongs to the cache kmalloc-64 of size 64
[   23.178106] The buggy address is located 0 bytes to the right of
[   23.178106]  allocated 48-byte region [fff00000c5958200, fff00000c5958230)
[   23.178286] 
[   23.178340] The buggy address belongs to the physical page:
[   23.178418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105958
[   23.178551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.178690] page_type: f5(slab)
[   23.178832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.178948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.179036] page dumped because: kasan: bad access detected
[   23.179099] 
[   23.179169] Memory state around the buggy address:
[   23.179240]  fff00000c5958100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.179343]  fff00000c5958180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.179449] >fff00000c5958200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.179545]                                      ^
[   23.179626]  fff00000c5958280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.179728]  fff00000c5958300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.179817] ==================================================================

[   15.524110] ==================================================================
[   15.524508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.525040] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.525522] 
[   15.525672] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.525715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.525739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.525769] Call Trace:
[   15.525782]  <TASK>
[   15.525799]  dump_stack_lvl+0x73/0xb0
[   15.525859]  print_report+0xd1/0x650
[   15.525884]  ? __virt_addr_valid+0x1db/0x2d0
[   15.525908]  ? kasan_atomics_helper+0x992/0x5450
[   15.525943]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.525967]  ? kasan_atomics_helper+0x992/0x5450
[   15.525991]  kasan_report+0x141/0x180
[   15.526049]  ? kasan_atomics_helper+0x992/0x5450
[   15.526077]  kasan_check_range+0x10c/0x1c0
[   15.526101]  __kasan_check_write+0x18/0x20
[   15.526132]  kasan_atomics_helper+0x992/0x5450
[   15.526157]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.526181]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.526207]  ? kasan_atomics+0x152/0x310
[   15.526234]  kasan_atomics+0x1dc/0x310
[   15.526284]  ? __pfx_kasan_atomics+0x10/0x10
[   15.526310]  ? __pfx_read_tsc+0x10/0x10
[   15.526332]  ? ktime_get_ts64+0x86/0x230
[   15.526375]  kunit_try_run_case+0x1a5/0x480
[   15.526400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.526452]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.526477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.526503]  ? __kthread_parkme+0x82/0x180
[   15.526535]  ? preempt_count_sub+0x50/0x80
[   15.526560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.526586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.526613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.526639]  kthread+0x337/0x6f0
[   15.526671]  ? trace_preempt_on+0x20/0xc0
[   15.526696]  ? __pfx_kthread+0x10/0x10
[   15.526718]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.526742]  ? calculate_sigpending+0x7b/0xa0
[   15.526776]  ? __pfx_kthread+0x10/0x10
[   15.526799]  ret_from_fork+0x116/0x1d0
[   15.526819]  ? __pfx_kthread+0x10/0x10
[   15.526841]  ret_from_fork_asm+0x1a/0x30
[   15.526873]  </TASK>
[   15.526884] 
[   15.535660] Allocated by task 283:
[   15.535877]  kasan_save_stack+0x45/0x70
[   15.536147]  kasan_save_track+0x18/0x40
[   15.536359]  kasan_save_alloc_info+0x3b/0x50
[   15.536589]  __kasan_kmalloc+0xb7/0xc0
[   15.536791]  __kmalloc_cache_noprof+0x189/0x420
[   15.537069]  kasan_atomics+0x95/0x310
[   15.537324]  kunit_try_run_case+0x1a5/0x480
[   15.537534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.537775]  kthread+0x337/0x6f0
[   15.537908]  ret_from_fork+0x116/0x1d0
[   15.538097]  ret_from_fork_asm+0x1a/0x30
[   15.538347] 
[   15.538486] The buggy address belongs to the object at ffff888103ad1980
[   15.538486]  which belongs to the cache kmalloc-64 of size 64
[   15.539009] The buggy address is located 0 bytes to the right of
[   15.539009]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.539376] 
[   15.539447] The buggy address belongs to the physical page:
[   15.539694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.540153] flags: 0x200000000000000(node=0|zone=2)
[   15.540426] page_type: f5(slab)
[   15.540619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.540962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.541188] page dumped because: kasan: bad access detected
[   15.541394] 
[   15.541487] Memory state around the buggy address:
[   15.541787]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.542206]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.542560] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.542884]                                      ^
[   15.543067]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.543436]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.544112] ==================================================================
[   15.545621] ==================================================================
[   15.546239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.546616] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.547237] 
[   15.547501] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.547549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.547562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.547585] Call Trace:
[   15.547599]  <TASK>
[   15.547614]  dump_stack_lvl+0x73/0xb0
[   15.547646]  print_report+0xd1/0x650
[   15.547679]  ? __virt_addr_valid+0x1db/0x2d0
[   15.547704]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.547726]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.547765]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.547788]  kasan_report+0x141/0x180
[   15.547812]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.547839]  kasan_check_range+0x10c/0x1c0
[   15.547865]  __kasan_check_write+0x18/0x20
[   15.547886]  kasan_atomics_helper+0xa2b/0x5450
[   15.547909]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.547934]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.547962]  ? kasan_atomics+0x152/0x310
[   15.547991]  kasan_atomics+0x1dc/0x310
[   15.548014]  ? __pfx_kasan_atomics+0x10/0x10
[   15.548040]  ? __pfx_read_tsc+0x10/0x10
[   15.548062]  ? ktime_get_ts64+0x86/0x230
[   15.548088]  kunit_try_run_case+0x1a5/0x480
[   15.548115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.548139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.548166]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.548191]  ? __kthread_parkme+0x82/0x180
[   15.548214]  ? preempt_count_sub+0x50/0x80
[   15.548238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.548263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.548290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.548317]  kthread+0x337/0x6f0
[   15.548336]  ? trace_preempt_on+0x20/0xc0
[   15.548361]  ? __pfx_kthread+0x10/0x10
[   15.548383]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.548406]  ? calculate_sigpending+0x7b/0xa0
[   15.548431]  ? __pfx_kthread+0x10/0x10
[   15.548453]  ret_from_fork+0x116/0x1d0
[   15.548472]  ? __pfx_kthread+0x10/0x10
[   15.548494]  ret_from_fork_asm+0x1a/0x30
[   15.548526]  </TASK>
[   15.548538] 
[   15.559814] Allocated by task 283:
[   15.560325]  kasan_save_stack+0x45/0x70
[   15.560517]  kasan_save_track+0x18/0x40
[   15.560901]  kasan_save_alloc_info+0x3b/0x50
[   15.561210]  __kasan_kmalloc+0xb7/0xc0
[   15.561521]  __kmalloc_cache_noprof+0x189/0x420
[   15.561916]  kasan_atomics+0x95/0x310
[   15.562209]  kunit_try_run_case+0x1a5/0x480
[   15.562510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.562910]  kthread+0x337/0x6f0
[   15.563209]  ret_from_fork+0x116/0x1d0
[   15.563440]  ret_from_fork_asm+0x1a/0x30
[   15.563608] 
[   15.563704] The buggy address belongs to the object at ffff888103ad1980
[   15.563704]  which belongs to the cache kmalloc-64 of size 64
[   15.564514] The buggy address is located 0 bytes to the right of
[   15.564514]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.565322] 
[   15.565410] The buggy address belongs to the physical page:
[   15.565910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.566340] flags: 0x200000000000000(node=0|zone=2)
[   15.566660] page_type: f5(slab)
[   15.566865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.567339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.567798] page dumped because: kasan: bad access detected
[   15.568149] 
[   15.568251] Memory state around the buggy address:
[   15.568469]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.568785]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.569303] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.569785]                                      ^
[   15.570115]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.570538]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.570950] ==================================================================
[   16.277948] ==================================================================
[   16.278279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.278627] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.279180] 
[   16.279284] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.279425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.279440] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.279461] Call Trace:
[   16.279478]  <TASK>
[   16.279495]  dump_stack_lvl+0x73/0xb0
[   16.279526]  print_report+0xd1/0x650
[   16.279550]  ? __virt_addr_valid+0x1db/0x2d0
[   16.279575]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.279597]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.279622]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.279645]  kasan_report+0x141/0x180
[   16.279736]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.279778]  kasan_check_range+0x10c/0x1c0
[   16.279803]  __kasan_check_write+0x18/0x20
[   16.279824]  kasan_atomics_helper+0x1a7f/0x5450
[   16.279848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.279872]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.279898]  ? kasan_atomics+0x152/0x310
[   16.279926]  kasan_atomics+0x1dc/0x310
[   16.279950]  ? __pfx_kasan_atomics+0x10/0x10
[   16.279979]  ? __pfx_read_tsc+0x10/0x10
[   16.280001]  ? ktime_get_ts64+0x86/0x230
[   16.280027]  kunit_try_run_case+0x1a5/0x480
[   16.280054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.280081]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.280107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.280133]  ? __kthread_parkme+0x82/0x180
[   16.280155]  ? preempt_count_sub+0x50/0x80
[   16.280181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.280207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.280233]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.280259]  kthread+0x337/0x6f0
[   16.280280]  ? trace_preempt_on+0x20/0xc0
[   16.280306]  ? __pfx_kthread+0x10/0x10
[   16.280328]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.280351]  ? calculate_sigpending+0x7b/0xa0
[   16.280376]  ? __pfx_kthread+0x10/0x10
[   16.280398]  ret_from_fork+0x116/0x1d0
[   16.280418]  ? __pfx_kthread+0x10/0x10
[   16.280439]  ret_from_fork_asm+0x1a/0x30
[   16.280471]  </TASK>
[   16.280483] 
[   16.290736] Allocated by task 283:
[   16.291090]  kasan_save_stack+0x45/0x70
[   16.291301]  kasan_save_track+0x18/0x40
[   16.291499]  kasan_save_alloc_info+0x3b/0x50
[   16.291991]  __kasan_kmalloc+0xb7/0xc0
[   16.292174]  __kmalloc_cache_noprof+0x189/0x420
[   16.292479]  kasan_atomics+0x95/0x310
[   16.292655]  kunit_try_run_case+0x1a5/0x480
[   16.292994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.293324]  kthread+0x337/0x6f0
[   16.293451]  ret_from_fork+0x116/0x1d0
[   16.293792]  ret_from_fork_asm+0x1a/0x30
[   16.294062] 
[   16.294141] The buggy address belongs to the object at ffff888103ad1980
[   16.294141]  which belongs to the cache kmalloc-64 of size 64
[   16.294638] The buggy address is located 0 bytes to the right of
[   16.294638]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.295150] 
[   16.295231] The buggy address belongs to the physical page:
[   16.295464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.296178] flags: 0x200000000000000(node=0|zone=2)
[   16.296499] page_type: f5(slab)
[   16.296644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.297082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.297467] page dumped because: kasan: bad access detected
[   16.297873] 
[   16.297966] Memory state around the buggy address:
[   16.298337]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.298697]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.299099] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.299383]                                      ^
[   16.299576]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.300078]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.300456] ==================================================================
[   15.269689] ==================================================================
[   15.270383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.270853] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.271524] 
[   15.271892] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.271940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.271953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.271975] Call Trace:
[   15.272011]  <TASK>
[   15.272028]  dump_stack_lvl+0x73/0xb0
[   15.272058]  print_report+0xd1/0x650
[   15.272082]  ? __virt_addr_valid+0x1db/0x2d0
[   15.272106]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.272128]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.272153]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.272176]  kasan_report+0x141/0x180
[   15.272199]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.272226]  kasan_check_range+0x10c/0x1c0
[   15.272252]  __kasan_check_write+0x18/0x20
[   15.272273]  kasan_atomics_helper+0x4a0/0x5450
[   15.272298]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.272322]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.272349]  ? kasan_atomics+0x152/0x310
[   15.272376]  kasan_atomics+0x1dc/0x310
[   15.272400]  ? __pfx_kasan_atomics+0x10/0x10
[   15.272426]  ? __pfx_read_tsc+0x10/0x10
[   15.272447]  ? ktime_get_ts64+0x86/0x230
[   15.272473]  kunit_try_run_case+0x1a5/0x480
[   15.272499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.272523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.272549]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.272574]  ? __kthread_parkme+0x82/0x180
[   15.272596]  ? preempt_count_sub+0x50/0x80
[   15.272621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.272763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.272799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.272827]  kthread+0x337/0x6f0
[   15.272849]  ? trace_preempt_on+0x20/0xc0
[   15.272875]  ? __pfx_kthread+0x10/0x10
[   15.272897]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.272921]  ? calculate_sigpending+0x7b/0xa0
[   15.272947]  ? __pfx_kthread+0x10/0x10
[   15.272970]  ret_from_fork+0x116/0x1d0
[   15.272990]  ? __pfx_kthread+0x10/0x10
[   15.273012]  ret_from_fork_asm+0x1a/0x30
[   15.273044]  </TASK>
[   15.273055] 
[   15.284867] Allocated by task 283:
[   15.285023]  kasan_save_stack+0x45/0x70
[   15.285231]  kasan_save_track+0x18/0x40
[   15.285420]  kasan_save_alloc_info+0x3b/0x50
[   15.285626]  __kasan_kmalloc+0xb7/0xc0
[   15.286459]  __kmalloc_cache_noprof+0x189/0x420
[   15.286653]  kasan_atomics+0x95/0x310
[   15.286897]  kunit_try_run_case+0x1a5/0x480
[   15.287109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.287359]  kthread+0x337/0x6f0
[   15.287535]  ret_from_fork+0x116/0x1d0
[   15.288065]  ret_from_fork_asm+0x1a/0x30
[   15.288277] 
[   15.288580] The buggy address belongs to the object at ffff888103ad1980
[   15.288580]  which belongs to the cache kmalloc-64 of size 64
[   15.289330] The buggy address is located 0 bytes to the right of
[   15.289330]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.290048] 
[   15.290368] The buggy address belongs to the physical page:
[   15.290784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.291377] flags: 0x200000000000000(node=0|zone=2)
[   15.291596] page_type: f5(slab)
[   15.291820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.292569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.293080] page dumped because: kasan: bad access detected
[   15.293449] 
[   15.293674] Memory state around the buggy address:
[   15.294119]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.294446]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.295028] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.295419]                                      ^
[   15.295768]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.296387]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.296928] ==================================================================
[   15.792597] ==================================================================
[   15.793123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.793432] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.793729] 
[   15.793851] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.793915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.793928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.793948] Call Trace:
[   15.793964]  <TASK>
[   15.793981]  dump_stack_lvl+0x73/0xb0
[   15.794010]  print_report+0xd1/0x650
[   15.794032]  ? __virt_addr_valid+0x1db/0x2d0
[   15.794056]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.794079]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.794103]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.794143]  kasan_report+0x141/0x180
[   15.794167]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.794195]  __asan_report_load4_noabort+0x18/0x20
[   15.794221]  kasan_atomics_helper+0x4a36/0x5450
[   15.794245]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.794269]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.794295]  ? kasan_atomics+0x152/0x310
[   15.794322]  kasan_atomics+0x1dc/0x310
[   15.794347]  ? __pfx_kasan_atomics+0x10/0x10
[   15.794377]  ? __pfx_read_tsc+0x10/0x10
[   15.794400]  ? ktime_get_ts64+0x86/0x230
[   15.794425]  kunit_try_run_case+0x1a5/0x480
[   15.794451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.794476]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.794501]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.794527]  ? __kthread_parkme+0x82/0x180
[   15.794549]  ? preempt_count_sub+0x50/0x80
[   15.794573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.794599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.794625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.794651]  kthread+0x337/0x6f0
[   15.794671]  ? trace_preempt_on+0x20/0xc0
[   15.794716]  ? __pfx_kthread+0x10/0x10
[   15.794738]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.794779]  ? calculate_sigpending+0x7b/0xa0
[   15.794805]  ? __pfx_kthread+0x10/0x10
[   15.794827]  ret_from_fork+0x116/0x1d0
[   15.794847]  ? __pfx_kthread+0x10/0x10
[   15.794868]  ret_from_fork_asm+0x1a/0x30
[   15.794901]  </TASK>
[   15.794912] 
[   15.802183] Allocated by task 283:
[   15.802968]  kasan_save_stack+0x45/0x70
[   15.803170]  kasan_save_track+0x18/0x40
[   15.803411]  kasan_save_alloc_info+0x3b/0x50
[   15.803631]  __kasan_kmalloc+0xb7/0xc0
[   15.803837]  __kmalloc_cache_noprof+0x189/0x420
[   15.804022]  kasan_atomics+0x95/0x310
[   15.804204]  kunit_try_run_case+0x1a5/0x480
[   15.804387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.804612]  kthread+0x337/0x6f0
[   15.804833]  ret_from_fork+0x116/0x1d0
[   15.805055]  ret_from_fork_asm+0x1a/0x30
[   15.805202] 
[   15.805270] The buggy address belongs to the object at ffff888103ad1980
[   15.805270]  which belongs to the cache kmalloc-64 of size 64
[   15.805604] The buggy address is located 0 bytes to the right of
[   15.805604]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.806207] 
[   15.806308] The buggy address belongs to the physical page:
[   15.806570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.806962] flags: 0x200000000000000(node=0|zone=2)
[   15.807189] page_type: f5(slab)
[   15.807335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.807734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.808027] page dumped because: kasan: bad access detected
[   15.808202] 
[   15.808272] Memory state around the buggy address:
[   15.808475]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.808874]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.809201] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.809522]                                      ^
[   15.809759]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810104]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810358] ==================================================================
[   15.181173] ==================================================================
[   15.181495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.182031] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.182611] 
[   15.182767] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.182817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.183018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.183046] Call Trace:
[   15.183061]  <TASK>
[   15.183077]  dump_stack_lvl+0x73/0xb0
[   15.183109]  print_report+0xd1/0x650
[   15.183131]  ? __virt_addr_valid+0x1db/0x2d0
[   15.183156]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.183177]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.183201]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.183223]  kasan_report+0x141/0x180
[   15.183244]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.183271]  __asan_report_store4_noabort+0x1b/0x30
[   15.183296]  kasan_atomics_helper+0x4b6e/0x5450
[   15.183320]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.183344]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.183369]  ? kasan_atomics+0x152/0x310
[   15.183395]  kasan_atomics+0x1dc/0x310
[   15.183418]  ? __pfx_kasan_atomics+0x10/0x10
[   15.183443]  ? __pfx_read_tsc+0x10/0x10
[   15.183463]  ? ktime_get_ts64+0x86/0x230
[   15.183487]  kunit_try_run_case+0x1a5/0x480
[   15.183511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.183534]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.183558]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.183583]  ? __kthread_parkme+0x82/0x180
[   15.183603]  ? preempt_count_sub+0x50/0x80
[   15.183628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.183667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.183716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.183743]  kthread+0x337/0x6f0
[   15.183777]  ? trace_preempt_on+0x20/0xc0
[   15.183802]  ? __pfx_kthread+0x10/0x10
[   15.183824]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.183846]  ? calculate_sigpending+0x7b/0xa0
[   15.183870]  ? __pfx_kthread+0x10/0x10
[   15.183892]  ret_from_fork+0x116/0x1d0
[   15.183910]  ? __pfx_kthread+0x10/0x10
[   15.183931]  ret_from_fork_asm+0x1a/0x30
[   15.183961]  </TASK>
[   15.183971] 
[   15.197503] Allocated by task 283:
[   15.197656]  kasan_save_stack+0x45/0x70
[   15.197820]  kasan_save_track+0x18/0x40
[   15.197957]  kasan_save_alloc_info+0x3b/0x50
[   15.198105]  __kasan_kmalloc+0xb7/0xc0
[   15.198237]  __kmalloc_cache_noprof+0x189/0x420
[   15.198399]  kasan_atomics+0x95/0x310
[   15.198532]  kunit_try_run_case+0x1a5/0x480
[   15.198676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.199162]  kthread+0x337/0x6f0
[   15.199457]  ret_from_fork+0x116/0x1d0
[   15.199873]  ret_from_fork_asm+0x1a/0x30
[   15.200223] 
[   15.200378] The buggy address belongs to the object at ffff888103ad1980
[   15.200378]  which belongs to the cache kmalloc-64 of size 64
[   15.201581] The buggy address is located 0 bytes to the right of
[   15.201581]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.202797] 
[   15.202963] The buggy address belongs to the physical page:
[   15.203432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.204158] flags: 0x200000000000000(node=0|zone=2)
[   15.204583] page_type: f5(slab)
[   15.204956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.205597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.206330] page dumped because: kasan: bad access detected
[   15.206520] 
[   15.206591] Memory state around the buggy address:
[   15.207068]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.207774]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.208370] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.208595]                                      ^
[   15.209083]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.209755]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.209978] ==================================================================
[   16.253402] ==================================================================
[   16.254131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.254467] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.255057] 
[   16.255183] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.255229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.255242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.255263] Call Trace:
[   16.255279]  <TASK>
[   16.255296]  dump_stack_lvl+0x73/0xb0
[   16.255326]  print_report+0xd1/0x650
[   16.255349]  ? __virt_addr_valid+0x1db/0x2d0
[   16.255373]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.255396]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.255422]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.255445]  kasan_report+0x141/0x180
[   16.255468]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.255496]  kasan_check_range+0x10c/0x1c0
[   16.255521]  __kasan_check_write+0x18/0x20
[   16.255542]  kasan_atomics_helper+0x19e3/0x5450
[   16.255566]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.255590]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.255618]  ? kasan_atomics+0x152/0x310
[   16.255645]  kasan_atomics+0x1dc/0x310
[   16.255830]  ? __pfx_kasan_atomics+0x10/0x10
[   16.255858]  ? __pfx_read_tsc+0x10/0x10
[   16.255879]  ? ktime_get_ts64+0x86/0x230
[   16.255905]  kunit_try_run_case+0x1a5/0x480
[   16.255931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.255956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.255982]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.256008]  ? __kthread_parkme+0x82/0x180
[   16.256029]  ? preempt_count_sub+0x50/0x80
[   16.256055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.256082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.256107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.256134]  kthread+0x337/0x6f0
[   16.256154]  ? trace_preempt_on+0x20/0xc0
[   16.256178]  ? __pfx_kthread+0x10/0x10
[   16.256200]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.256224]  ? calculate_sigpending+0x7b/0xa0
[   16.256248]  ? __pfx_kthread+0x10/0x10
[   16.256271]  ret_from_fork+0x116/0x1d0
[   16.256290]  ? __pfx_kthread+0x10/0x10
[   16.256313]  ret_from_fork_asm+0x1a/0x30
[   16.256344]  </TASK>
[   16.256355] 
[   16.266738] Allocated by task 283:
[   16.267007]  kasan_save_stack+0x45/0x70
[   16.267308]  kasan_save_track+0x18/0x40
[   16.267502]  kasan_save_alloc_info+0x3b/0x50
[   16.267778]  __kasan_kmalloc+0xb7/0xc0
[   16.268102]  __kmalloc_cache_noprof+0x189/0x420
[   16.268384]  kasan_atomics+0x95/0x310
[   16.268579]  kunit_try_run_case+0x1a5/0x480
[   16.268964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.269216]  kthread+0x337/0x6f0
[   16.269365]  ret_from_fork+0x116/0x1d0
[   16.269542]  ret_from_fork_asm+0x1a/0x30
[   16.270011] 
[   16.270121] The buggy address belongs to the object at ffff888103ad1980
[   16.270121]  which belongs to the cache kmalloc-64 of size 64
[   16.270722] The buggy address is located 0 bytes to the right of
[   16.270722]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.271384] 
[   16.271463] The buggy address belongs to the physical page:
[   16.271967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.272408] flags: 0x200000000000000(node=0|zone=2)
[   16.272639] page_type: f5(slab)
[   16.272975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.273377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.273855] page dumped because: kasan: bad access detected
[   16.274080] 
[   16.274317] Memory state around the buggy address:
[   16.274525]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.275034]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.275401] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.275787]                                      ^
[   16.276026]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.276482]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.276908] ==================================================================
[   15.297584] ==================================================================
[   15.298316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.299012] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.299726] 
[   15.299850] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.300100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.300119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.300141] Call Trace:
[   15.300157]  <TASK>
[   15.300174]  dump_stack_lvl+0x73/0xb0
[   15.300206]  print_report+0xd1/0x650
[   15.300229]  ? __virt_addr_valid+0x1db/0x2d0
[   15.300252]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.300275]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.300299]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.300323]  kasan_report+0x141/0x180
[   15.300346]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.300374]  __asan_report_store4_noabort+0x1b/0x30
[   15.300401]  kasan_atomics_helper+0x4b3a/0x5450
[   15.300425]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.300449]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.300476]  ? kasan_atomics+0x152/0x310
[   15.300503]  kasan_atomics+0x1dc/0x310
[   15.300529]  ? __pfx_kasan_atomics+0x10/0x10
[   15.300554]  ? __pfx_read_tsc+0x10/0x10
[   15.300577]  ? ktime_get_ts64+0x86/0x230
[   15.300603]  kunit_try_run_case+0x1a5/0x480
[   15.300630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.300715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.300755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.300782]  ? __kthread_parkme+0x82/0x180
[   15.300804]  ? preempt_count_sub+0x50/0x80
[   15.300829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.300855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.300881]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.300909]  kthread+0x337/0x6f0
[   15.300929]  ? trace_preempt_on+0x20/0xc0
[   15.300953]  ? __pfx_kthread+0x10/0x10
[   15.300975]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.300999]  ? calculate_sigpending+0x7b/0xa0
[   15.301024]  ? __pfx_kthread+0x10/0x10
[   15.301047]  ret_from_fork+0x116/0x1d0
[   15.301067]  ? __pfx_kthread+0x10/0x10
[   15.301090]  ret_from_fork_asm+0x1a/0x30
[   15.301122]  </TASK>
[   15.301133] 
[   15.314343] Allocated by task 283:
[   15.314696]  kasan_save_stack+0x45/0x70
[   15.315137]  kasan_save_track+0x18/0x40
[   15.315517]  kasan_save_alloc_info+0x3b/0x50
[   15.315986]  __kasan_kmalloc+0xb7/0xc0
[   15.316243]  __kmalloc_cache_noprof+0x189/0x420
[   15.316401]  kasan_atomics+0x95/0x310
[   15.316535]  kunit_try_run_case+0x1a5/0x480
[   15.316690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.316898]  kthread+0x337/0x6f0
[   15.317061]  ret_from_fork+0x116/0x1d0
[   15.317234]  ret_from_fork_asm+0x1a/0x30
[   15.317411] 
[   15.317483] The buggy address belongs to the object at ffff888103ad1980
[   15.317483]  which belongs to the cache kmalloc-64 of size 64
[   15.318089] The buggy address is located 0 bytes to the right of
[   15.318089]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.318686] 
[   15.318870] The buggy address belongs to the physical page:
[   15.319097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.319370] flags: 0x200000000000000(node=0|zone=2)
[   15.319619] page_type: f5(slab)
[   15.319817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.320222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.320525] page dumped because: kasan: bad access detected
[   15.320813] 
[   15.320910] Memory state around the buggy address:
[   15.321127]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.321430]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.321767] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.321979]                                      ^
[   15.322189]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.322516]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.322811] ==================================================================
[   16.477849] ==================================================================
[   16.478178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.478469] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.478871] 
[   16.478982] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.479025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.479048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.479068] Call Trace:
[   16.479081]  <TASK>
[   16.479096]  dump_stack_lvl+0x73/0xb0
[   16.479138]  print_report+0xd1/0x650
[   16.479160]  ? __virt_addr_valid+0x1db/0x2d0
[   16.479184]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.479207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.479231]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.479254]  kasan_report+0x141/0x180
[   16.479278]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.479306]  __asan_report_load8_noabort+0x18/0x20
[   16.479332]  kasan_atomics_helper+0x4f71/0x5450
[   16.479356]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.479381]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.479408]  ? kasan_atomics+0x152/0x310
[   16.479435]  kasan_atomics+0x1dc/0x310
[   16.479458]  ? __pfx_kasan_atomics+0x10/0x10
[   16.479484]  ? __pfx_read_tsc+0x10/0x10
[   16.479506]  ? ktime_get_ts64+0x86/0x230
[   16.479530]  kunit_try_run_case+0x1a5/0x480
[   16.479555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.479580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.479604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.479630]  ? __kthread_parkme+0x82/0x180
[   16.479651]  ? preempt_count_sub+0x50/0x80
[   16.479697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.479723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.479766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.479793]  kthread+0x337/0x6f0
[   16.479814]  ? trace_preempt_on+0x20/0xc0
[   16.479839]  ? __pfx_kthread+0x10/0x10
[   16.479860]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.479883]  ? calculate_sigpending+0x7b/0xa0
[   16.479909]  ? __pfx_kthread+0x10/0x10
[   16.479932]  ret_from_fork+0x116/0x1d0
[   16.479953]  ? __pfx_kthread+0x10/0x10
[   16.479974]  ret_from_fork_asm+0x1a/0x30
[   16.480005]  </TASK>
[   16.480016] 
[   16.487461] Allocated by task 283:
[   16.487636]  kasan_save_stack+0x45/0x70
[   16.487844]  kasan_save_track+0x18/0x40
[   16.488039]  kasan_save_alloc_info+0x3b/0x50
[   16.488245]  __kasan_kmalloc+0xb7/0xc0
[   16.488443]  __kmalloc_cache_noprof+0x189/0x420
[   16.488675]  kasan_atomics+0x95/0x310
[   16.488892]  kunit_try_run_case+0x1a5/0x480
[   16.489080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.489304]  kthread+0x337/0x6f0
[   16.489425]  ret_from_fork+0x116/0x1d0
[   16.489558]  ret_from_fork_asm+0x1a/0x30
[   16.489797] 
[   16.489892] The buggy address belongs to the object at ffff888103ad1980
[   16.489892]  which belongs to the cache kmalloc-64 of size 64
[   16.490456] The buggy address is located 0 bytes to the right of
[   16.490456]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.491009] 
[   16.491081] The buggy address belongs to the physical page:
[   16.491253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.491640] flags: 0x200000000000000(node=0|zone=2)
[   16.492076] page_type: f5(slab)
[   16.492259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.492546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.493047] page dumped because: kasan: bad access detected
[   16.493247] 
[   16.493362] Memory state around the buggy address:
[   16.493549]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.493922]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.494235] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.494532]                                      ^
[   16.494808]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495118]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495421] ==================================================================
[   15.682622] ==================================================================
[   15.682967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.683269] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.683492] 
[   15.683575] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.683615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.683628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.683649] Call Trace:
[   15.683663]  <TASK>
[   15.683678]  dump_stack_lvl+0x73/0xb0
[   15.683705]  print_report+0xd1/0x650
[   15.683729]  ? __virt_addr_valid+0x1db/0x2d0
[   15.683764]  ? kasan_atomics_helper+0xde0/0x5450
[   15.683788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.683811]  ? kasan_atomics_helper+0xde0/0x5450
[   15.683835]  kasan_report+0x141/0x180
[   15.683858]  ? kasan_atomics_helper+0xde0/0x5450
[   15.683885]  kasan_check_range+0x10c/0x1c0
[   15.683910]  __kasan_check_write+0x18/0x20
[   15.683931]  kasan_atomics_helper+0xde0/0x5450
[   15.683955]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.683980]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.684007]  ? kasan_atomics+0x152/0x310
[   15.684035]  kasan_atomics+0x1dc/0x310
[   15.684059]  ? __pfx_kasan_atomics+0x10/0x10
[   15.684085]  ? __pfx_read_tsc+0x10/0x10
[   15.684106]  ? ktime_get_ts64+0x86/0x230
[   15.684133]  kunit_try_run_case+0x1a5/0x480
[   15.684158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.684182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.684207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.684244]  ? __kthread_parkme+0x82/0x180
[   15.684265]  ? preempt_count_sub+0x50/0x80
[   15.684290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.684317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.684342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.684369]  kthread+0x337/0x6f0
[   15.684389]  ? trace_preempt_on+0x20/0xc0
[   15.684415]  ? __pfx_kthread+0x10/0x10
[   15.684437]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.684460]  ? calculate_sigpending+0x7b/0xa0
[   15.684485]  ? __pfx_kthread+0x10/0x10
[   15.684508]  ret_from_fork+0x116/0x1d0
[   15.684526]  ? __pfx_kthread+0x10/0x10
[   15.684548]  ret_from_fork_asm+0x1a/0x30
[   15.684580]  </TASK>
[   15.684590] 
[   15.691762] Allocated by task 283:
[   15.692055]  kasan_save_stack+0x45/0x70
[   15.692261]  kasan_save_track+0x18/0x40
[   15.692462]  kasan_save_alloc_info+0x3b/0x50
[   15.692742]  __kasan_kmalloc+0xb7/0xc0
[   15.693348]  __kmalloc_cache_noprof+0x189/0x420
[   15.693522]  kasan_atomics+0x95/0x310
[   15.693658]  kunit_try_run_case+0x1a5/0x480
[   15.695161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.695739]  kthread+0x337/0x6f0
[   15.696177]  ret_from_fork+0x116/0x1d0
[   15.696324]  ret_from_fork_asm+0x1a/0x30
[   15.696468] 
[   15.696541] The buggy address belongs to the object at ffff888103ad1980
[   15.696541]  which belongs to the cache kmalloc-64 of size 64
[   15.698171] The buggy address is located 0 bytes to the right of
[   15.698171]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.699617] 
[   15.700011] The buggy address belongs to the physical page:
[   15.700666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.701100] flags: 0x200000000000000(node=0|zone=2)
[   15.701275] page_type: f5(slab)
[   15.701398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.701630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.702840] page dumped because: kasan: bad access detected
[   15.703485] 
[   15.703839] Memory state around the buggy address:
[   15.704410]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.705369]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.705885] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.706518]                                      ^
[   15.706914]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.707644]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.708205] ==================================================================
[   15.766608] ==================================================================
[   15.767367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.767987] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.768215] 
[   15.768302] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.768344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.768357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.768379] Call Trace:
[   15.768396]  <TASK>
[   15.768412]  dump_stack_lvl+0x73/0xb0
[   15.768441]  print_report+0xd1/0x650
[   15.768464]  ? __virt_addr_valid+0x1db/0x2d0
[   15.768489]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.768510]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.768535]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.768558]  kasan_report+0x141/0x180
[   15.768581]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.768608]  kasan_check_range+0x10c/0x1c0
[   15.768633]  __kasan_check_write+0x18/0x20
[   15.768663]  kasan_atomics_helper+0xfa9/0x5450
[   15.768688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.768711]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.768737]  ? kasan_atomics+0x152/0x310
[   15.768777]  kasan_atomics+0x1dc/0x310
[   15.768801]  ? __pfx_kasan_atomics+0x10/0x10
[   15.768826]  ? __pfx_read_tsc+0x10/0x10
[   15.768848]  ? ktime_get_ts64+0x86/0x230
[   15.768873]  kunit_try_run_case+0x1a5/0x480
[   15.768897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.768922]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.768948]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.768974]  ? __kthread_parkme+0x82/0x180
[   15.768994]  ? preempt_count_sub+0x50/0x80
[   15.769019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.769045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.769071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.769098]  kthread+0x337/0x6f0
[   15.769119]  ? trace_preempt_on+0x20/0xc0
[   15.769144]  ? __pfx_kthread+0x10/0x10
[   15.769165]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.769188]  ? calculate_sigpending+0x7b/0xa0
[   15.769213]  ? __pfx_kthread+0x10/0x10
[   15.769235]  ret_from_fork+0x116/0x1d0
[   15.769255]  ? __pfx_kthread+0x10/0x10
[   15.769276]  ret_from_fork_asm+0x1a/0x30
[   15.769308]  </TASK>
[   15.769319] 
[   15.781397] Allocated by task 283:
[   15.781536]  kasan_save_stack+0x45/0x70
[   15.781740]  kasan_save_track+0x18/0x40
[   15.782085]  kasan_save_alloc_info+0x3b/0x50
[   15.782474]  __kasan_kmalloc+0xb7/0xc0
[   15.782852]  __kmalloc_cache_noprof+0x189/0x420
[   15.783292]  kasan_atomics+0x95/0x310
[   15.783662]  kunit_try_run_case+0x1a5/0x480
[   15.784059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.784533]  kthread+0x337/0x6f0
[   15.784932]  ret_from_fork+0x116/0x1d0
[   15.785287]  ret_from_fork_asm+0x1a/0x30
[   15.785661] 
[   15.785827] The buggy address belongs to the object at ffff888103ad1980
[   15.785827]  which belongs to the cache kmalloc-64 of size 64
[   15.786869] The buggy address is located 0 bytes to the right of
[   15.786869]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.788061] 
[   15.788218] The buggy address belongs to the physical page:
[   15.788711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.789021] flags: 0x200000000000000(node=0|zone=2)
[   15.789188] page_type: f5(slab)
[   15.789309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.789544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.789900] page dumped because: kasan: bad access detected
[   15.790148] 
[   15.790253] Memory state around the buggy address:
[   15.790436]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.790691]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.791037] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.791273]                                      ^
[   15.791494]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.791847]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.792104] ==================================================================
[   15.347498] ==================================================================
[   15.347778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.349319] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.350689] 
[   15.351001] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.351103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.351116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.351139] Call Trace:
[   15.351248]  <TASK>
[   15.351267]  dump_stack_lvl+0x73/0xb0
[   15.351301]  print_report+0xd1/0x650
[   15.351326]  ? __virt_addr_valid+0x1db/0x2d0
[   15.351350]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.351373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.351398]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.351420]  kasan_report+0x141/0x180
[   15.351443]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.351471]  kasan_check_range+0x10c/0x1c0
[   15.351497]  __kasan_check_write+0x18/0x20
[   15.351518]  kasan_atomics_helper+0x5fe/0x5450
[   15.351542]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.351566]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.351593]  ? kasan_atomics+0x152/0x310
[   15.351620]  kasan_atomics+0x1dc/0x310
[   15.351713]  ? __pfx_kasan_atomics+0x10/0x10
[   15.351742]  ? __pfx_read_tsc+0x10/0x10
[   15.351777]  ? ktime_get_ts64+0x86/0x230
[   15.351802]  kunit_try_run_case+0x1a5/0x480
[   15.351828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.351852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.351879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.351904]  ? __kthread_parkme+0x82/0x180
[   15.351925]  ? preempt_count_sub+0x50/0x80
[   15.351951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.351977]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.352002]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.352029]  kthread+0x337/0x6f0
[   15.352050]  ? trace_preempt_on+0x20/0xc0
[   15.352075]  ? __pfx_kthread+0x10/0x10
[   15.352097]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.352120]  ? calculate_sigpending+0x7b/0xa0
[   15.352144]  ? __pfx_kthread+0x10/0x10
[   15.352167]  ret_from_fork+0x116/0x1d0
[   15.352186]  ? __pfx_kthread+0x10/0x10
[   15.352208]  ret_from_fork_asm+0x1a/0x30
[   15.352240]  </TASK>
[   15.352252] 
[   15.367933] Allocated by task 283:
[   15.368292]  kasan_save_stack+0x45/0x70
[   15.368533]  kasan_save_track+0x18/0x40
[   15.368867]  kasan_save_alloc_info+0x3b/0x50
[   15.369372]  __kasan_kmalloc+0xb7/0xc0
[   15.369782]  __kmalloc_cache_noprof+0x189/0x420
[   15.370139]  kasan_atomics+0x95/0x310
[   15.370282]  kunit_try_run_case+0x1a5/0x480
[   15.370445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.370624]  kthread+0x337/0x6f0
[   15.371044]  ret_from_fork+0x116/0x1d0
[   15.371413]  ret_from_fork_asm+0x1a/0x30
[   15.371871] 
[   15.372034] The buggy address belongs to the object at ffff888103ad1980
[   15.372034]  which belongs to the cache kmalloc-64 of size 64
[   15.373138] The buggy address is located 0 bytes to the right of
[   15.373138]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.374319] 
[   15.374408] The buggy address belongs to the physical page:
[   15.374586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.375304] flags: 0x200000000000000(node=0|zone=2)
[   15.375822] page_type: f5(slab)
[   15.376187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.377003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.377663] page dumped because: kasan: bad access detected
[   15.378165] 
[   15.378240] Memory state around the buggy address:
[   15.378402]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.378618]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.379454] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.380156]                                      ^
[   15.380587]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.381305]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.381943] ==================================================================
[   16.047409] ==================================================================
[   16.047843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   16.048212] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.048523] 
[   16.048615] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.048665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.048677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.048697] Call Trace:
[   16.048711]  <TASK>
[   16.048726]  dump_stack_lvl+0x73/0xb0
[   16.048767]  print_report+0xd1/0x650
[   16.048790]  ? __virt_addr_valid+0x1db/0x2d0
[   16.048814]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.048836]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.048861]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.048883]  kasan_report+0x141/0x180
[   16.048907]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.048934]  __asan_report_store8_noabort+0x1b/0x30
[   16.048961]  kasan_atomics_helper+0x50d4/0x5450
[   16.048984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.049009]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.049036]  ? kasan_atomics+0x152/0x310
[   16.049063]  kasan_atomics+0x1dc/0x310
[   16.049086]  ? __pfx_kasan_atomics+0x10/0x10
[   16.049112]  ? __pfx_read_tsc+0x10/0x10
[   16.049133]  ? ktime_get_ts64+0x86/0x230
[   16.049160]  kunit_try_run_case+0x1a5/0x480
[   16.049187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.049211]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.049236]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.049262]  ? __kthread_parkme+0x82/0x180
[   16.049283]  ? preempt_count_sub+0x50/0x80
[   16.049308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.049333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.049358]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.049386]  kthread+0x337/0x6f0
[   16.049406]  ? trace_preempt_on+0x20/0xc0
[   16.049431]  ? __pfx_kthread+0x10/0x10
[   16.049453]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.049476]  ? calculate_sigpending+0x7b/0xa0
[   16.049501]  ? __pfx_kthread+0x10/0x10
[   16.049524]  ret_from_fork+0x116/0x1d0
[   16.049543]  ? __pfx_kthread+0x10/0x10
[   16.049565]  ret_from_fork_asm+0x1a/0x30
[   16.049596]  </TASK>
[   16.049608] 
[   16.056770] Allocated by task 283:
[   16.056897]  kasan_save_stack+0x45/0x70
[   16.057039]  kasan_save_track+0x18/0x40
[   16.057174]  kasan_save_alloc_info+0x3b/0x50
[   16.057321]  __kasan_kmalloc+0xb7/0xc0
[   16.057454]  __kmalloc_cache_noprof+0x189/0x420
[   16.057610]  kasan_atomics+0x95/0x310
[   16.057741]  kunit_try_run_case+0x1a5/0x480
[   16.057959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.058213]  kthread+0x337/0x6f0
[   16.058403]  ret_from_fork+0x116/0x1d0
[   16.058591]  ret_from_fork_asm+0x1a/0x30
[   16.058978] 
[   16.059073] The buggy address belongs to the object at ffff888103ad1980
[   16.059073]  which belongs to the cache kmalloc-64 of size 64
[   16.059597] The buggy address is located 0 bytes to the right of
[   16.059597]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.060463] 
[   16.060535] The buggy address belongs to the physical page:
[   16.060705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.060951] flags: 0x200000000000000(node=0|zone=2)
[   16.061111] page_type: f5(slab)
[   16.061230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.061458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.061879] page dumped because: kasan: bad access detected
[   16.062136] 
[   16.062231] Memory state around the buggy address:
[   16.062468]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.062964]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.063290] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.063609]                                      ^
[   16.063890]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.064177]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.064419] ==================================================================
[   15.849403] ==================================================================
[   15.849773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.850117] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.850458] 
[   15.850569] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.850691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.850705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.850726] Call Trace:
[   15.850741]  <TASK>
[   15.850771]  dump_stack_lvl+0x73/0xb0
[   15.850801]  print_report+0xd1/0x650
[   15.850824]  ? __virt_addr_valid+0x1db/0x2d0
[   15.850849]  ? kasan_atomics_helper+0x1148/0x5450
[   15.850871]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.850896]  ? kasan_atomics_helper+0x1148/0x5450
[   15.850951]  kasan_report+0x141/0x180
[   15.850996]  ? kasan_atomics_helper+0x1148/0x5450
[   15.851025]  kasan_check_range+0x10c/0x1c0
[   15.851051]  __kasan_check_write+0x18/0x20
[   15.851072]  kasan_atomics_helper+0x1148/0x5450
[   15.851097]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.851121]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.851148]  ? kasan_atomics+0x152/0x310
[   15.851176]  kasan_atomics+0x1dc/0x310
[   15.851200]  ? __pfx_kasan_atomics+0x10/0x10
[   15.851226]  ? __pfx_read_tsc+0x10/0x10
[   15.851247]  ? ktime_get_ts64+0x86/0x230
[   15.851273]  kunit_try_run_case+0x1a5/0x480
[   15.851298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851323]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.851348]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.851374]  ? __kthread_parkme+0x82/0x180
[   15.851397]  ? preempt_count_sub+0x50/0x80
[   15.851422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.851473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.851501]  kthread+0x337/0x6f0
[   15.851521]  ? trace_preempt_on+0x20/0xc0
[   15.851546]  ? __pfx_kthread+0x10/0x10
[   15.851568]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.851591]  ? calculate_sigpending+0x7b/0xa0
[   15.851617]  ? __pfx_kthread+0x10/0x10
[   15.851660]  ret_from_fork+0x116/0x1d0
[   15.851680]  ? __pfx_kthread+0x10/0x10
[   15.851701]  ret_from_fork_asm+0x1a/0x30
[   15.851733]  </TASK>
[   15.851755] 
[   15.859774] Allocated by task 283:
[   15.859962]  kasan_save_stack+0x45/0x70
[   15.860166]  kasan_save_track+0x18/0x40
[   15.860439]  kasan_save_alloc_info+0x3b/0x50
[   15.860769]  __kasan_kmalloc+0xb7/0xc0
[   15.860914]  __kmalloc_cache_noprof+0x189/0x420
[   15.861185]  kasan_atomics+0x95/0x310
[   15.861452]  kunit_try_run_case+0x1a5/0x480
[   15.861771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.861992]  kthread+0x337/0x6f0
[   15.862152]  ret_from_fork+0x116/0x1d0
[   15.862322]  ret_from_fork_asm+0x1a/0x30
[   15.862469] 
[   15.862567] The buggy address belongs to the object at ffff888103ad1980
[   15.862567]  which belongs to the cache kmalloc-64 of size 64
[   15.863837] The buggy address is located 0 bytes to the right of
[   15.863837]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.864282] 
[   15.864359] The buggy address belongs to the physical page:
[   15.864531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.866683] flags: 0x200000000000000(node=0|zone=2)
[   15.868195] page_type: f5(slab)
[   15.869119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.871171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.872216] page dumped because: kasan: bad access detected
[   15.872409] 
[   15.872482] Memory state around the buggy address:
[   15.872939]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.873780]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.874588] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.875477]                                      ^
[   15.875804]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.876030]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.876244] ==================================================================
[   16.176445] ==================================================================
[   16.176737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.177321] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.177970] 
[   16.178074] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.178121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.178135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.178159] Call Trace:
[   16.178176]  <TASK>
[   16.178195]  dump_stack_lvl+0x73/0xb0
[   16.178225]  print_report+0xd1/0x650
[   16.178251]  ? __virt_addr_valid+0x1db/0x2d0
[   16.178276]  ? kasan_atomics_helper+0x1818/0x5450
[   16.178300]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.178326]  ? kasan_atomics_helper+0x1818/0x5450
[   16.178350]  kasan_report+0x141/0x180
[   16.178379]  ? kasan_atomics_helper+0x1818/0x5450
[   16.178407]  kasan_check_range+0x10c/0x1c0
[   16.178434]  __kasan_check_write+0x18/0x20
[   16.178457]  kasan_atomics_helper+0x1818/0x5450
[   16.178482]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.178507]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.178534]  ? kasan_atomics+0x152/0x310
[   16.178561]  kasan_atomics+0x1dc/0x310
[   16.178586]  ? __pfx_kasan_atomics+0x10/0x10
[   16.178612]  ? __pfx_read_tsc+0x10/0x10
[   16.178633]  ? ktime_get_ts64+0x86/0x230
[   16.178881]  kunit_try_run_case+0x1a5/0x480
[   16.178914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.178941]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.178968]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.178994]  ? __kthread_parkme+0x82/0x180
[   16.179016]  ? preempt_count_sub+0x50/0x80
[   16.179042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.179069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.179097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.179203]  kthread+0x337/0x6f0
[   16.179229]  ? trace_preempt_on+0x20/0xc0
[   16.179255]  ? __pfx_kthread+0x10/0x10
[   16.179279]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.179305]  ? calculate_sigpending+0x7b/0xa0
[   16.179331]  ? __pfx_kthread+0x10/0x10
[   16.179354]  ret_from_fork+0x116/0x1d0
[   16.179374]  ? __pfx_kthread+0x10/0x10
[   16.179397]  ret_from_fork_asm+0x1a/0x30
[   16.179431]  </TASK>
[   16.179444] 
[   16.190589] Allocated by task 283:
[   16.190960]  kasan_save_stack+0x45/0x70
[   16.191257]  kasan_save_track+0x18/0x40
[   16.191567]  kasan_save_alloc_info+0x3b/0x50
[   16.191892]  __kasan_kmalloc+0xb7/0xc0
[   16.192090]  __kmalloc_cache_noprof+0x189/0x420
[   16.192309]  kasan_atomics+0x95/0x310
[   16.192485]  kunit_try_run_case+0x1a5/0x480
[   16.192664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.193278]  kthread+0x337/0x6f0
[   16.193428]  ret_from_fork+0x116/0x1d0
[   16.193948]  ret_from_fork_asm+0x1a/0x30
[   16.194233] 
[   16.194338] The buggy address belongs to the object at ffff888103ad1980
[   16.194338]  which belongs to the cache kmalloc-64 of size 64
[   16.195194] The buggy address is located 0 bytes to the right of
[   16.195194]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.195997] 
[   16.196220] The buggy address belongs to the physical page:
[   16.196535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.197092] flags: 0x200000000000000(node=0|zone=2)
[   16.197431] page_type: f5(slab)
[   16.197757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.198193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.198625] page dumped because: kasan: bad access detected
[   16.198996] 
[   16.199198] Memory state around the buggy address:
[   16.199472]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.199838]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.200157] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.200465]                                      ^
[   16.200946]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.201349]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.201797] ==================================================================
[   15.501126] ==================================================================
[   15.501415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.501941] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.502299] 
[   15.502455] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.502500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.502513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.502549] Call Trace:
[   15.502579]  <TASK>
[   15.502595]  dump_stack_lvl+0x73/0xb0
[   15.502639]  print_report+0xd1/0x650
[   15.502682]  ? __virt_addr_valid+0x1db/0x2d0
[   15.502708]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.502732]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.502828]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.502853]  kasan_report+0x141/0x180
[   15.502877]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.502904]  kasan_check_range+0x10c/0x1c0
[   15.502929]  __kasan_check_write+0x18/0x20
[   15.502958]  kasan_atomics_helper+0x8f9/0x5450
[   15.503014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.503038]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.503065]  ? kasan_atomics+0x152/0x310
[   15.503104]  kasan_atomics+0x1dc/0x310
[   15.503127]  ? __pfx_kasan_atomics+0x10/0x10
[   15.503152]  ? __pfx_read_tsc+0x10/0x10
[   15.503175]  ? ktime_get_ts64+0x86/0x230
[   15.503200]  kunit_try_run_case+0x1a5/0x480
[   15.503252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.503279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.503305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.503341]  ? __kthread_parkme+0x82/0x180
[   15.503363]  ? preempt_count_sub+0x50/0x80
[   15.503414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.503440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.503467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.503504]  kthread+0x337/0x6f0
[   15.503525]  ? trace_preempt_on+0x20/0xc0
[   15.503550]  ? __pfx_kthread+0x10/0x10
[   15.503572]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.503596]  ? calculate_sigpending+0x7b/0xa0
[   15.503621]  ? __pfx_kthread+0x10/0x10
[   15.503644]  ret_from_fork+0x116/0x1d0
[   15.503680]  ? __pfx_kthread+0x10/0x10
[   15.503702]  ret_from_fork_asm+0x1a/0x30
[   15.503734]  </TASK>
[   15.503755] 
[   15.513249] Allocated by task 283:
[   15.513719]  kasan_save_stack+0x45/0x70
[   15.514000]  kasan_save_track+0x18/0x40
[   15.514145]  kasan_save_alloc_info+0x3b/0x50
[   15.514357]  __kasan_kmalloc+0xb7/0xc0
[   15.514556]  __kmalloc_cache_noprof+0x189/0x420
[   15.514898]  kasan_atomics+0x95/0x310
[   15.515141]  kunit_try_run_case+0x1a5/0x480
[   15.515376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.515651]  kthread+0x337/0x6f0
[   15.515911]  ret_from_fork+0x116/0x1d0
[   15.516125]  ret_from_fork_asm+0x1a/0x30
[   15.516349] 
[   15.516460] The buggy address belongs to the object at ffff888103ad1980
[   15.516460]  which belongs to the cache kmalloc-64 of size 64
[   15.517180] The buggy address is located 0 bytes to the right of
[   15.517180]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.518203] 
[   15.518374] The buggy address belongs to the physical page:
[   15.518672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.519126] flags: 0x200000000000000(node=0|zone=2)
[   15.519386] page_type: f5(slab)
[   15.519510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.520056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.520502] page dumped because: kasan: bad access detected
[   15.520820] 
[   15.520894] Memory state around the buggy address:
[   15.521108]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.521436]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.521870] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.522157]                                      ^
[   15.522313]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.522640]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.523211] ==================================================================
[   16.203025] ==================================================================
[   16.203345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.203929] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.204479] 
[   16.204711] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.204881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.204898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.204920] Call Trace:
[   16.204938]  <TASK>
[   16.204956]  dump_stack_lvl+0x73/0xb0
[   16.204988]  print_report+0xd1/0x650
[   16.205012]  ? __virt_addr_valid+0x1db/0x2d0
[   16.205037]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.205060]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.205086]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.205110]  kasan_report+0x141/0x180
[   16.205134]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.205161]  kasan_check_range+0x10c/0x1c0
[   16.205187]  __kasan_check_write+0x18/0x20
[   16.205208]  kasan_atomics_helper+0x18b1/0x5450
[   16.205233]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.205258]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.205284]  ? kasan_atomics+0x152/0x310
[   16.205312]  kasan_atomics+0x1dc/0x310
[   16.205335]  ? __pfx_kasan_atomics+0x10/0x10
[   16.205361]  ? __pfx_read_tsc+0x10/0x10
[   16.205384]  ? ktime_get_ts64+0x86/0x230
[   16.205410]  kunit_try_run_case+0x1a5/0x480
[   16.205436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.205460]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.205487]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.205513]  ? __kthread_parkme+0x82/0x180
[   16.205534]  ? preempt_count_sub+0x50/0x80
[   16.205560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.205586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.205612]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.205639]  kthread+0x337/0x6f0
[   16.205673]  ? trace_preempt_on+0x20/0xc0
[   16.205698]  ? __pfx_kthread+0x10/0x10
[   16.205720]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.205743]  ? calculate_sigpending+0x7b/0xa0
[   16.205781]  ? __pfx_kthread+0x10/0x10
[   16.205804]  ret_from_fork+0x116/0x1d0
[   16.205823]  ? __pfx_kthread+0x10/0x10
[   16.205845]  ret_from_fork_asm+0x1a/0x30
[   16.205877]  </TASK>
[   16.205889] 
[   16.216727] Allocated by task 283:
[   16.217143]  kasan_save_stack+0x45/0x70
[   16.217425]  kasan_save_track+0x18/0x40
[   16.217755]  kasan_save_alloc_info+0x3b/0x50
[   16.218075]  __kasan_kmalloc+0xb7/0xc0
[   16.218355]  __kmalloc_cache_noprof+0x189/0x420
[   16.218596]  kasan_atomics+0x95/0x310
[   16.218974]  kunit_try_run_case+0x1a5/0x480
[   16.219284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.219626]  kthread+0x337/0x6f0
[   16.219893]  ret_from_fork+0x116/0x1d0
[   16.220107]  ret_from_fork_asm+0x1a/0x30
[   16.220288] 
[   16.220378] The buggy address belongs to the object at ffff888103ad1980
[   16.220378]  which belongs to the cache kmalloc-64 of size 64
[   16.221355] The buggy address is located 0 bytes to the right of
[   16.221355]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.222056] 
[   16.222339] The buggy address belongs to the physical page:
[   16.222603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.223051] flags: 0x200000000000000(node=0|zone=2)
[   16.223368] page_type: f5(slab)
[   16.223619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.224139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.224554] page dumped because: kasan: bad access detected
[   16.224965] 
[   16.225044] Memory state around the buggy address:
[   16.225405]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.225860]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.226173] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.226478]                                      ^
[   16.227014]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.227304]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.227728] ==================================================================
[   15.647002] ==================================================================
[   15.647553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.648209] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.648540] 
[   15.648650] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.648695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.648708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.648728] Call Trace:
[   15.648742]  <TASK>
[   15.648769]  dump_stack_lvl+0x73/0xb0
[   15.648801]  print_report+0xd1/0x650
[   15.648825]  ? __virt_addr_valid+0x1db/0x2d0
[   15.648849]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.648872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.648896]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.648920]  kasan_report+0x141/0x180
[   15.648942]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.648970]  __asan_report_load4_noabort+0x18/0x20
[   15.648996]  kasan_atomics_helper+0x4a84/0x5450
[   15.649020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.649044]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.649071]  ? kasan_atomics+0x152/0x310
[   15.649098]  kasan_atomics+0x1dc/0x310
[   15.649121]  ? __pfx_kasan_atomics+0x10/0x10
[   15.649147]  ? __pfx_read_tsc+0x10/0x10
[   15.649168]  ? ktime_get_ts64+0x86/0x230
[   15.649194]  kunit_try_run_case+0x1a5/0x480
[   15.649219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.649243]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.649268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.649293]  ? __kthread_parkme+0x82/0x180
[   15.649314]  ? preempt_count_sub+0x50/0x80
[   15.649339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.649365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.649391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.649418]  kthread+0x337/0x6f0
[   15.649437]  ? trace_preempt_on+0x20/0xc0
[   15.649462]  ? __pfx_kthread+0x10/0x10
[   15.649484]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.649508]  ? calculate_sigpending+0x7b/0xa0
[   15.649532]  ? __pfx_kthread+0x10/0x10
[   15.649555]  ret_from_fork+0x116/0x1d0
[   15.649575]  ? __pfx_kthread+0x10/0x10
[   15.649596]  ret_from_fork_asm+0x1a/0x30
[   15.649628]  </TASK>
[   15.649639] 
[   15.656801] Allocated by task 283:
[   15.656975]  kasan_save_stack+0x45/0x70
[   15.657152]  kasan_save_track+0x18/0x40
[   15.657289]  kasan_save_alloc_info+0x3b/0x50
[   15.657486]  __kasan_kmalloc+0xb7/0xc0
[   15.657701]  __kmalloc_cache_noprof+0x189/0x420
[   15.657941]  kasan_atomics+0x95/0x310
[   15.658115]  kunit_try_run_case+0x1a5/0x480
[   15.658268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.658524]  kthread+0x337/0x6f0
[   15.658664]  ret_from_fork+0x116/0x1d0
[   15.658877]  ret_from_fork_asm+0x1a/0x30
[   15.659049] 
[   15.659151] The buggy address belongs to the object at ffff888103ad1980
[   15.659151]  which belongs to the cache kmalloc-64 of size 64
[   15.659596] The buggy address is located 0 bytes to the right of
[   15.659596]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.660269] 
[   15.660372] The buggy address belongs to the physical page:
[   15.660598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.660918] flags: 0x200000000000000(node=0|zone=2)
[   15.661091] page_type: f5(slab)
[   15.661214] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.661446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.661769] page dumped because: kasan: bad access detected
[   15.662115] 
[   15.662209] Memory state around the buggy address:
[   15.662435]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.662868]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.663111] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.663324]                                      ^
[   15.663478]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.663693]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.664254] ==================================================================
[   16.617734] ==================================================================
[   16.618121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.618575] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.619225] 
[   16.619450] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.619511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.619629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.619655] Call Trace:
[   16.619673]  <TASK>
[   16.619690]  dump_stack_lvl+0x73/0xb0
[   16.619737]  print_report+0xd1/0x650
[   16.619773]  ? __virt_addr_valid+0x1db/0x2d0
[   16.619796]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.619819]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.619844]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.619867]  kasan_report+0x141/0x180
[   16.619890]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.619918]  __asan_report_load8_noabort+0x18/0x20
[   16.619947]  kasan_atomics_helper+0x4fa5/0x5450
[   16.619971]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.619995]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.620022]  ? kasan_atomics+0x152/0x310
[   16.620048]  kasan_atomics+0x1dc/0x310
[   16.620073]  ? __pfx_kasan_atomics+0x10/0x10
[   16.620099]  ? __pfx_read_tsc+0x10/0x10
[   16.620121]  ? ktime_get_ts64+0x86/0x230
[   16.620148]  kunit_try_run_case+0x1a5/0x480
[   16.620173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.620197]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.620223]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.620249]  ? __kthread_parkme+0x82/0x180
[   16.620270]  ? preempt_count_sub+0x50/0x80
[   16.620296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.620321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.620347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.620373]  kthread+0x337/0x6f0
[   16.620394]  ? trace_preempt_on+0x20/0xc0
[   16.620419]  ? __pfx_kthread+0x10/0x10
[   16.620440]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.620463]  ? calculate_sigpending+0x7b/0xa0
[   16.620489]  ? __pfx_kthread+0x10/0x10
[   16.620512]  ret_from_fork+0x116/0x1d0
[   16.620531]  ? __pfx_kthread+0x10/0x10
[   16.620552]  ret_from_fork_asm+0x1a/0x30
[   16.620585]  </TASK>
[   16.620597] 
[   16.632839] Allocated by task 283:
[   16.633009]  kasan_save_stack+0x45/0x70
[   16.633197]  kasan_save_track+0x18/0x40
[   16.633374]  kasan_save_alloc_info+0x3b/0x50
[   16.633570]  __kasan_kmalloc+0xb7/0xc0
[   16.634107]  __kmalloc_cache_noprof+0x189/0x420
[   16.634459]  kasan_atomics+0x95/0x310
[   16.635030]  kunit_try_run_case+0x1a5/0x480
[   16.635367]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.636003]  kthread+0x337/0x6f0
[   16.636251]  ret_from_fork+0x116/0x1d0
[   16.636440]  ret_from_fork_asm+0x1a/0x30
[   16.636626] 
[   16.637037] The buggy address belongs to the object at ffff888103ad1980
[   16.637037]  which belongs to the cache kmalloc-64 of size 64
[   16.637531] The buggy address is located 0 bytes to the right of
[   16.637531]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.638675] 
[   16.638910] The buggy address belongs to the physical page:
[   16.639348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.639896] flags: 0x200000000000000(node=0|zone=2)
[   16.640321] page_type: f5(slab)
[   16.640624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.641103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.641423] page dumped because: kasan: bad access detected
[   16.641656] 
[   16.641993] Memory state around the buggy address:
[   16.642204]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.642469]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.642685] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.643006]                                      ^
[   16.643160]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.643375]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.643583] ==================================================================
[   15.618241] ==================================================================
[   15.619102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.619379] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.619609] 
[   15.619931] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.620192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.620210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.620233] Call Trace:
[   15.620252]  <TASK>
[   15.620270]  dump_stack_lvl+0x73/0xb0
[   15.620301]  print_report+0xd1/0x650
[   15.620335]  ? __virt_addr_valid+0x1db/0x2d0
[   15.620359]  ? kasan_atomics_helper+0xc70/0x5450
[   15.620381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.620406]  ? kasan_atomics_helper+0xc70/0x5450
[   15.620430]  kasan_report+0x141/0x180
[   15.620453]  ? kasan_atomics_helper+0xc70/0x5450
[   15.620480]  kasan_check_range+0x10c/0x1c0
[   15.620505]  __kasan_check_write+0x18/0x20
[   15.620526]  kasan_atomics_helper+0xc70/0x5450
[   15.620550]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.620574]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.620601]  ? kasan_atomics+0x152/0x310
[   15.620628]  kasan_atomics+0x1dc/0x310
[   15.620678]  ? __pfx_kasan_atomics+0x10/0x10
[   15.620705]  ? __pfx_read_tsc+0x10/0x10
[   15.620728]  ? ktime_get_ts64+0x86/0x230
[   15.620764]  kunit_try_run_case+0x1a5/0x480
[   15.620790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.620814]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.620840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.620866]  ? __kthread_parkme+0x82/0x180
[   15.620888]  ? preempt_count_sub+0x50/0x80
[   15.620913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.620939]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.620965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.620992]  kthread+0x337/0x6f0
[   15.621011]  ? trace_preempt_on+0x20/0xc0
[   15.621036]  ? __pfx_kthread+0x10/0x10
[   15.621058]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.621081]  ? calculate_sigpending+0x7b/0xa0
[   15.621106]  ? __pfx_kthread+0x10/0x10
[   15.621129]  ret_from_fork+0x116/0x1d0
[   15.621149]  ? __pfx_kthread+0x10/0x10
[   15.621171]  ret_from_fork_asm+0x1a/0x30
[   15.621203]  </TASK>
[   15.621215] 
[   15.634279] Allocated by task 283:
[   15.634679]  kasan_save_stack+0x45/0x70
[   15.634950]  kasan_save_track+0x18/0x40
[   15.635243]  kasan_save_alloc_info+0x3b/0x50
[   15.635592]  __kasan_kmalloc+0xb7/0xc0
[   15.635948]  __kmalloc_cache_noprof+0x189/0x420
[   15.636278]  kasan_atomics+0x95/0x310
[   15.636461]  kunit_try_run_case+0x1a5/0x480
[   15.636853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.637138]  kthread+0x337/0x6f0
[   15.637417]  ret_from_fork+0x116/0x1d0
[   15.637609]  ret_from_fork_asm+0x1a/0x30
[   15.638143] 
[   15.638231] The buggy address belongs to the object at ffff888103ad1980
[   15.638231]  which belongs to the cache kmalloc-64 of size 64
[   15.639314] The buggy address is located 0 bytes to the right of
[   15.639314]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.640093] 
[   15.640204] The buggy address belongs to the physical page:
[   15.640445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.640946] flags: 0x200000000000000(node=0|zone=2)
[   15.641350] page_type: f5(slab)
[   15.641641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.641978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.642289] page dumped because: kasan: bad access detected
[   15.642528] 
[   15.642617] Memory state around the buggy address:
[   15.643179]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.643669]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.644170] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.644643]                                      ^
[   15.645000]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.645304]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.645597] ==================================================================
[   16.100791] ==================================================================
[   16.101140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   16.101482] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.101945] 
[   16.102031] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.102073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.102085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.102106] Call Trace:
[   16.102120]  <TASK>
[   16.102135]  dump_stack_lvl+0x73/0xb0
[   16.102163]  print_report+0xd1/0x650
[   16.102187]  ? __virt_addr_valid+0x1db/0x2d0
[   16.102211]  ? kasan_atomics_helper+0x164f/0x5450
[   16.102234]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.102258]  ? kasan_atomics_helper+0x164f/0x5450
[   16.102282]  kasan_report+0x141/0x180
[   16.102304]  ? kasan_atomics_helper+0x164f/0x5450
[   16.102332]  kasan_check_range+0x10c/0x1c0
[   16.102356]  __kasan_check_write+0x18/0x20
[   16.102384]  kasan_atomics_helper+0x164f/0x5450
[   16.102407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.102431]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.102458]  ? kasan_atomics+0x152/0x310
[   16.102486]  kasan_atomics+0x1dc/0x310
[   16.102509]  ? __pfx_kasan_atomics+0x10/0x10
[   16.102534]  ? __pfx_read_tsc+0x10/0x10
[   16.102556]  ? ktime_get_ts64+0x86/0x230
[   16.102582]  kunit_try_run_case+0x1a5/0x480
[   16.102607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.102631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.102658]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.102683]  ? __kthread_parkme+0x82/0x180
[   16.102704]  ? preempt_count_sub+0x50/0x80
[   16.102730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.102767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.102793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.102819]  kthread+0x337/0x6f0
[   16.102849]  ? trace_preempt_on+0x20/0xc0
[   16.102873]  ? __pfx_kthread+0x10/0x10
[   16.102895]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.102918]  ? calculate_sigpending+0x7b/0xa0
[   16.102942]  ? __pfx_kthread+0x10/0x10
[   16.102965]  ret_from_fork+0x116/0x1d0
[   16.102984]  ? __pfx_kthread+0x10/0x10
[   16.103005]  ret_from_fork_asm+0x1a/0x30
[   16.103037]  </TASK>
[   16.103049] 
[   16.110773] Allocated by task 283:
[   16.110931]  kasan_save_stack+0x45/0x70
[   16.111099]  kasan_save_track+0x18/0x40
[   16.111235]  kasan_save_alloc_info+0x3b/0x50
[   16.111448]  __kasan_kmalloc+0xb7/0xc0
[   16.111635]  __kmalloc_cache_noprof+0x189/0x420
[   16.111862]  kasan_atomics+0x95/0x310
[   16.112026]  kunit_try_run_case+0x1a5/0x480
[   16.112174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.112357]  kthread+0x337/0x6f0
[   16.112513]  ret_from_fork+0x116/0x1d0
[   16.112698]  ret_from_fork_asm+0x1a/0x30
[   16.112904] 
[   16.112997] The buggy address belongs to the object at ffff888103ad1980
[   16.112997]  which belongs to the cache kmalloc-64 of size 64
[   16.113490] The buggy address is located 0 bytes to the right of
[   16.113490]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.113892] 
[   16.113989] The buggy address belongs to the physical page:
[   16.114244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.114600] flags: 0x200000000000000(node=0|zone=2)
[   16.114914] page_type: f5(slab)
[   16.115313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.115954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.116195] page dumped because: kasan: bad access detected
[   16.116363] 
[   16.116432] Memory state around the buggy address:
[   16.116581]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.118357]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.118666] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.118999]                                      ^
[   16.119220]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.119586]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.121457] ==================================================================
[   16.514163] ==================================================================
[   16.514540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.514908] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.515139] 
[   16.515223] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.515265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.515277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.515298] Call Trace:
[   16.515315]  <TASK>
[   16.515331]  dump_stack_lvl+0x73/0xb0
[   16.515369]  print_report+0xd1/0x650
[   16.515393]  ? __virt_addr_valid+0x1db/0x2d0
[   16.515416]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.515451]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.515474]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.515498]  kasan_report+0x141/0x180
[   16.515520]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.515548]  __asan_report_load8_noabort+0x18/0x20
[   16.515574]  kasan_atomics_helper+0x4f98/0x5450
[   16.515598]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.515622]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.515648]  ? kasan_atomics+0x152/0x310
[   16.515675]  kasan_atomics+0x1dc/0x310
[   16.515698]  ? __pfx_kasan_atomics+0x10/0x10
[   16.515724]  ? __pfx_read_tsc+0x10/0x10
[   16.515754]  ? ktime_get_ts64+0x86/0x230
[   16.515779]  kunit_try_run_case+0x1a5/0x480
[   16.515804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.515828]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.515853]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.515878]  ? __kthread_parkme+0x82/0x180
[   16.515899]  ? preempt_count_sub+0x50/0x80
[   16.515923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.515949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.515976]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.516002]  kthread+0x337/0x6f0
[   16.516029]  ? trace_preempt_on+0x20/0xc0
[   16.516063]  ? __pfx_kthread+0x10/0x10
[   16.516084]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.516107]  ? calculate_sigpending+0x7b/0xa0
[   16.516143]  ? __pfx_kthread+0x10/0x10
[   16.516165]  ret_from_fork+0x116/0x1d0
[   16.516184]  ? __pfx_kthread+0x10/0x10
[   16.516206]  ret_from_fork_asm+0x1a/0x30
[   16.516237]  </TASK>
[   16.516249] 
[   16.524277] Allocated by task 283:
[   16.524449]  kasan_save_stack+0x45/0x70
[   16.524632]  kasan_save_track+0x18/0x40
[   16.524893]  kasan_save_alloc_info+0x3b/0x50
[   16.525134]  __kasan_kmalloc+0xb7/0xc0
[   16.525312]  __kmalloc_cache_noprof+0x189/0x420
[   16.525639]  kasan_atomics+0x95/0x310
[   16.525815]  kunit_try_run_case+0x1a5/0x480
[   16.526026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.526346]  kthread+0x337/0x6f0
[   16.526517]  ret_from_fork+0x116/0x1d0
[   16.526715]  ret_from_fork_asm+0x1a/0x30
[   16.526931] 
[   16.527046] The buggy address belongs to the object at ffff888103ad1980
[   16.527046]  which belongs to the cache kmalloc-64 of size 64
[   16.527588] The buggy address is located 0 bytes to the right of
[   16.527588]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.528027] 
[   16.528098] The buggy address belongs to the physical page:
[   16.528263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.528491] flags: 0x200000000000000(node=0|zone=2)
[   16.528644] page_type: f5(slab)
[   16.528784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.529133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.529486] page dumped because: kasan: bad access detected
[   16.529832] 
[   16.529925] Memory state around the buggy address:
[   16.530144]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.530463]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.530822] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.531032]                                      ^
[   16.531180]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.531386]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.531588] ==================================================================
[   16.349315] ==================================================================
[   16.349610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.350709] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.351034] 
[   16.351148] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.351347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.351361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.351383] Call Trace:
[   16.351401]  <TASK>
[   16.351417]  dump_stack_lvl+0x73/0xb0
[   16.351447]  print_report+0xd1/0x650
[   16.351471]  ? __virt_addr_valid+0x1db/0x2d0
[   16.351496]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.351519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.351543]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.351566]  kasan_report+0x141/0x180
[   16.351590]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.351617]  __asan_report_load8_noabort+0x18/0x20
[   16.351644]  kasan_atomics_helper+0x4f30/0x5450
[   16.351681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.351706]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.351733]  ? kasan_atomics+0x152/0x310
[   16.351773]  kasan_atomics+0x1dc/0x310
[   16.351796]  ? __pfx_kasan_atomics+0x10/0x10
[   16.351822]  ? __pfx_read_tsc+0x10/0x10
[   16.351844]  ? ktime_get_ts64+0x86/0x230
[   16.351869]  kunit_try_run_case+0x1a5/0x480
[   16.351895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.351920]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.351946]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.351972]  ? __kthread_parkme+0x82/0x180
[   16.351993]  ? preempt_count_sub+0x50/0x80
[   16.352019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.352045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.352071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.352098]  kthread+0x337/0x6f0
[   16.352118]  ? trace_preempt_on+0x20/0xc0
[   16.352143]  ? __pfx_kthread+0x10/0x10
[   16.352165]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.352188]  ? calculate_sigpending+0x7b/0xa0
[   16.352212]  ? __pfx_kthread+0x10/0x10
[   16.352235]  ret_from_fork+0x116/0x1d0
[   16.352254]  ? __pfx_kthread+0x10/0x10
[   16.352275]  ret_from_fork_asm+0x1a/0x30
[   16.352308]  </TASK>
[   16.352319] 
[   16.362249] Allocated by task 283:
[   16.362411]  kasan_save_stack+0x45/0x70
[   16.362617]  kasan_save_track+0x18/0x40
[   16.363127]  kasan_save_alloc_info+0x3b/0x50
[   16.363319]  __kasan_kmalloc+0xb7/0xc0
[   16.363640]  __kmalloc_cache_noprof+0x189/0x420
[   16.363948]  kasan_atomics+0x95/0x310
[   16.364235]  kunit_try_run_case+0x1a5/0x480
[   16.364430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.364802]  kthread+0x337/0x6f0
[   16.364984]  ret_from_fork+0x116/0x1d0
[   16.365162]  ret_from_fork_asm+0x1a/0x30
[   16.365351] 
[   16.365441] The buggy address belongs to the object at ffff888103ad1980
[   16.365441]  which belongs to the cache kmalloc-64 of size 64
[   16.366207] The buggy address is located 0 bytes to the right of
[   16.366207]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.367030] 
[   16.367134] The buggy address belongs to the physical page:
[   16.367508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.367933] flags: 0x200000000000000(node=0|zone=2)
[   16.368251] page_type: f5(slab)
[   16.368425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.368879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.369258] page dumped because: kasan: bad access detected
[   16.369493] 
[   16.369574] Memory state around the buggy address:
[   16.370038]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.370441]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.370902] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.371275]                                      ^
[   16.371559]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.372038]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.372333] ==================================================================
[   15.445868] ==================================================================
[   15.446128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.446826] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.447471] 
[   15.447561] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.447605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.447617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.447638] Call Trace:
[   15.447667]  <TASK>
[   15.447686]  dump_stack_lvl+0x73/0xb0
[   15.447718]  print_report+0xd1/0x650
[   15.447742]  ? __virt_addr_valid+0x1db/0x2d0
[   15.447779]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.447803]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.447828]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.447851]  kasan_report+0x141/0x180
[   15.447874]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.447903]  kasan_check_range+0x10c/0x1c0
[   15.447930]  __kasan_check_write+0x18/0x20
[   15.447951]  kasan_atomics_helper+0x7c7/0x5450
[   15.447975]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.447999]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.448026]  ? kasan_atomics+0x152/0x310
[   15.448054]  kasan_atomics+0x1dc/0x310
[   15.448078]  ? __pfx_kasan_atomics+0x10/0x10
[   15.448103]  ? __pfx_read_tsc+0x10/0x10
[   15.448126]  ? ktime_get_ts64+0x86/0x230
[   15.448152]  kunit_try_run_case+0x1a5/0x480
[   15.448178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.448203]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.448229]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.448268]  ? __kthread_parkme+0x82/0x180
[   15.448298]  ? preempt_count_sub+0x50/0x80
[   15.448345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.448371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.448397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.448424]  kthread+0x337/0x6f0
[   15.448444]  ? trace_preempt_on+0x20/0xc0
[   15.448470]  ? __pfx_kthread+0x10/0x10
[   15.448491]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.448514]  ? calculate_sigpending+0x7b/0xa0
[   15.448540]  ? __pfx_kthread+0x10/0x10
[   15.448563]  ret_from_fork+0x116/0x1d0
[   15.448583]  ? __pfx_kthread+0x10/0x10
[   15.448605]  ret_from_fork_asm+0x1a/0x30
[   15.448638]  </TASK>
[   15.448659] 
[   15.462146] Allocated by task 283:
[   15.462278]  kasan_save_stack+0x45/0x70
[   15.462429]  kasan_save_track+0x18/0x40
[   15.462563]  kasan_save_alloc_info+0x3b/0x50
[   15.462982]  __kasan_kmalloc+0xb7/0xc0
[   15.463407]  __kmalloc_cache_noprof+0x189/0x420
[   15.463903]  kasan_atomics+0x95/0x310
[   15.464407]  kunit_try_run_case+0x1a5/0x480
[   15.464906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.465418]  kthread+0x337/0x6f0
[   15.465766]  ret_from_fork+0x116/0x1d0
[   15.466235]  ret_from_fork_asm+0x1a/0x30
[   15.466837] 
[   15.467062] The buggy address belongs to the object at ffff888103ad1980
[   15.467062]  which belongs to the cache kmalloc-64 of size 64
[   15.467596] The buggy address is located 0 bytes to the right of
[   15.467596]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.468841] 
[   15.469117] The buggy address belongs to the physical page:
[   15.469466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.469948] flags: 0x200000000000000(node=0|zone=2)
[   15.470423] page_type: f5(slab)
[   15.470793] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.471379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.471607] page dumped because: kasan: bad access detected
[   15.472321] 
[   15.472485] Memory state around the buggy address:
[   15.473039]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.473678]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.474205] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.474423]                                      ^
[   15.474574]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.475192]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.475907] ==================================================================
[   16.012136] ==================================================================
[   16.012535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   16.012892] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.014045] 
[   16.014130] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.014174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.014187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.014208] Call Trace:
[   16.014224]  <TASK>
[   16.014240]  dump_stack_lvl+0x73/0xb0
[   16.014268]  print_report+0xd1/0x650
[   16.014290]  ? __virt_addr_valid+0x1db/0x2d0
[   16.014314]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.014337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.014366]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.014390]  kasan_report+0x141/0x180
[   16.014413]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.014441]  __asan_report_load8_noabort+0x18/0x20
[   16.014467]  kasan_atomics_helper+0x4eae/0x5450
[   16.014492]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.014516]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.014544]  ? kasan_atomics+0x152/0x310
[   16.014574]  kasan_atomics+0x1dc/0x310
[   16.014597]  ? __pfx_kasan_atomics+0x10/0x10
[   16.014623]  ? __pfx_read_tsc+0x10/0x10
[   16.014645]  ? ktime_get_ts64+0x86/0x230
[   16.014683]  kunit_try_run_case+0x1a5/0x480
[   16.014708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.014733]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.014770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.014794]  ? __kthread_parkme+0x82/0x180
[   16.014816]  ? preempt_count_sub+0x50/0x80
[   16.014841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.014866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.014892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.014918]  kthread+0x337/0x6f0
[   16.014937]  ? trace_preempt_on+0x20/0xc0
[   16.014962]  ? __pfx_kthread+0x10/0x10
[   16.014984]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.015006]  ? calculate_sigpending+0x7b/0xa0
[   16.015031]  ? __pfx_kthread+0x10/0x10
[   16.015053]  ret_from_fork+0x116/0x1d0
[   16.015073]  ? __pfx_kthread+0x10/0x10
[   16.015094]  ret_from_fork_asm+0x1a/0x30
[   16.015126]  </TASK>
[   16.015137] 
[   16.022757] Allocated by task 283:
[   16.022930]  kasan_save_stack+0x45/0x70
[   16.023073]  kasan_save_track+0x18/0x40
[   16.023207]  kasan_save_alloc_info+0x3b/0x50
[   16.023357]  __kasan_kmalloc+0xb7/0xc0
[   16.023526]  __kmalloc_cache_noprof+0x189/0x420
[   16.023715]  kasan_atomics+0x95/0x310
[   16.023905]  kunit_try_run_case+0x1a5/0x480
[   16.024117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.024301]  kthread+0x337/0x6f0
[   16.024425]  ret_from_fork+0x116/0x1d0
[   16.024558]  ret_from_fork_asm+0x1a/0x30
[   16.024758] 
[   16.024855] The buggy address belongs to the object at ffff888103ad1980
[   16.024855]  which belongs to the cache kmalloc-64 of size 64
[   16.025390] The buggy address is located 0 bytes to the right of
[   16.025390]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.025890] 
[   16.025964] The buggy address belongs to the physical page:
[   16.026167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.026536] flags: 0x200000000000000(node=0|zone=2)
[   16.026939] page_type: f5(slab)
[   16.027109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.027417] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.027762] page dumped because: kasan: bad access detected
[   16.027972] 
[   16.028042] Memory state around the buggy address:
[   16.028196]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.028435]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.028765] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.029141]                                      ^
[   16.029298]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.029512]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.029805] ==================================================================
[   15.737599] ==================================================================
[   15.738731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.739192] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.739776] 
[   15.740002] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.740049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.740061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.740082] Call Trace:
[   15.740097]  <TASK>
[   15.740112]  dump_stack_lvl+0x73/0xb0
[   15.740143]  print_report+0xd1/0x650
[   15.740166]  ? __virt_addr_valid+0x1db/0x2d0
[   15.740210]  ? kasan_atomics_helper+0xf10/0x5450
[   15.740233]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.740258]  ? kasan_atomics_helper+0xf10/0x5450
[   15.740281]  kasan_report+0x141/0x180
[   15.740303]  ? kasan_atomics_helper+0xf10/0x5450
[   15.740330]  kasan_check_range+0x10c/0x1c0
[   15.740355]  __kasan_check_write+0x18/0x20
[   15.740376]  kasan_atomics_helper+0xf10/0x5450
[   15.740400]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.740424]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.740450]  ? kasan_atomics+0x152/0x310
[   15.740477]  kasan_atomics+0x1dc/0x310
[   15.740501]  ? __pfx_kasan_atomics+0x10/0x10
[   15.740526]  ? __pfx_read_tsc+0x10/0x10
[   15.740548]  ? ktime_get_ts64+0x86/0x230
[   15.740573]  kunit_try_run_case+0x1a5/0x480
[   15.740598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.740622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.740662]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.740688]  ? __kthread_parkme+0x82/0x180
[   15.740709]  ? preempt_count_sub+0x50/0x80
[   15.740734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.740771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.740796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.740823]  kthread+0x337/0x6f0
[   15.740843]  ? trace_preempt_on+0x20/0xc0
[   15.740868]  ? __pfx_kthread+0x10/0x10
[   15.740889]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.740912]  ? calculate_sigpending+0x7b/0xa0
[   15.740937]  ? __pfx_kthread+0x10/0x10
[   15.740959]  ret_from_fork+0x116/0x1d0
[   15.740978]  ? __pfx_kthread+0x10/0x10
[   15.741001]  ret_from_fork_asm+0x1a/0x30
[   15.741033]  </TASK>
[   15.741044] 
[   15.753647] Allocated by task 283:
[   15.753986]  kasan_save_stack+0x45/0x70
[   15.754191]  kasan_save_track+0x18/0x40
[   15.754329]  kasan_save_alloc_info+0x3b/0x50
[   15.754486]  __kasan_kmalloc+0xb7/0xc0
[   15.754623]  __kmalloc_cache_noprof+0x189/0x420
[   15.755047]  kasan_atomics+0x95/0x310
[   15.755374]  kunit_try_run_case+0x1a5/0x480
[   15.755798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.756278]  kthread+0x337/0x6f0
[   15.756569]  ret_from_fork+0x116/0x1d0
[   15.756935]  ret_from_fork_asm+0x1a/0x30
[   15.757295] 
[   15.757456] The buggy address belongs to the object at ffff888103ad1980
[   15.757456]  which belongs to the cache kmalloc-64 of size 64
[   15.758322] The buggy address is located 0 bytes to the right of
[   15.758322]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.758718] 
[   15.758886] The buggy address belongs to the physical page:
[   15.759355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.760255] flags: 0x200000000000000(node=0|zone=2)
[   15.760830] page_type: f5(slab)
[   15.761121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.761788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.762120] page dumped because: kasan: bad access detected
[   15.762294] 
[   15.762368] Memory state around the buggy address:
[   15.762523]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.762834]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.763430] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.764104]                                      ^
[   15.764514]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765149]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765767] ==================================================================
[   15.571889] ==================================================================
[   15.572419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.572871] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.573394] 
[   15.573554] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.573713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.573729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.573759] Call Trace:
[   15.573774]  <TASK>
[   15.573790]  dump_stack_lvl+0x73/0xb0
[   15.573821]  print_report+0xd1/0x650
[   15.573845]  ? __virt_addr_valid+0x1db/0x2d0
[   15.573869]  ? kasan_atomics_helper+0xac7/0x5450
[   15.573891]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.573916]  ? kasan_atomics_helper+0xac7/0x5450
[   15.573939]  kasan_report+0x141/0x180
[   15.573962]  ? kasan_atomics_helper+0xac7/0x5450
[   15.573989]  kasan_check_range+0x10c/0x1c0
[   15.574014]  __kasan_check_write+0x18/0x20
[   15.574035]  kasan_atomics_helper+0xac7/0x5450
[   15.574059]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.574083]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.574110]  ? kasan_atomics+0x152/0x310
[   15.574137]  kasan_atomics+0x1dc/0x310
[   15.574160]  ? __pfx_kasan_atomics+0x10/0x10
[   15.574187]  ? __pfx_read_tsc+0x10/0x10
[   15.574210]  ? ktime_get_ts64+0x86/0x230
[   15.574235]  kunit_try_run_case+0x1a5/0x480
[   15.574261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.574286]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.574311]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.574337]  ? __kthread_parkme+0x82/0x180
[   15.574358]  ? preempt_count_sub+0x50/0x80
[   15.574390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.574416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.574442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.574470]  kthread+0x337/0x6f0
[   15.574490]  ? trace_preempt_on+0x20/0xc0
[   15.574516]  ? __pfx_kthread+0x10/0x10
[   15.574538]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.574562]  ? calculate_sigpending+0x7b/0xa0
[   15.574587]  ? __pfx_kthread+0x10/0x10
[   15.574609]  ret_from_fork+0x116/0x1d0
[   15.574629]  ? __pfx_kthread+0x10/0x10
[   15.574652]  ret_from_fork_asm+0x1a/0x30
[   15.574687]  </TASK>
[   15.574699] 
[   15.582606] Allocated by task 283:
[   15.582740]  kasan_save_stack+0x45/0x70
[   15.582891]  kasan_save_track+0x18/0x40
[   15.583063]  kasan_save_alloc_info+0x3b/0x50
[   15.583278]  __kasan_kmalloc+0xb7/0xc0
[   15.583469]  __kmalloc_cache_noprof+0x189/0x420
[   15.583848]  kasan_atomics+0x95/0x310
[   15.584049]  kunit_try_run_case+0x1a5/0x480
[   15.584256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.584497]  kthread+0x337/0x6f0
[   15.584661]  ret_from_fork+0x116/0x1d0
[   15.584864]  ret_from_fork_asm+0x1a/0x30
[   15.585107] 
[   15.585203] The buggy address belongs to the object at ffff888103ad1980
[   15.585203]  which belongs to the cache kmalloc-64 of size 64
[   15.585765] The buggy address is located 0 bytes to the right of
[   15.585765]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.586343] 
[   15.586506] The buggy address belongs to the physical page:
[   15.586818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.587175] flags: 0x200000000000000(node=0|zone=2)
[   15.587486] page_type: f5(slab)
[   15.587660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.588029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.588291] page dumped because: kasan: bad access detected
[   15.588533] 
[   15.588674] Memory state around the buggy address:
[   15.588940]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.589302]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.589649] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.589915]                                      ^
[   15.590178]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.590537]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.590965] ==================================================================
[   15.210345] ==================================================================
[   15.210583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.211422] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.212128] 
[   15.212304] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.212347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.212359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.212379] Call Trace:
[   15.212395]  <TASK>
[   15.212410]  dump_stack_lvl+0x73/0xb0
[   15.212440]  print_report+0xd1/0x650
[   15.212463]  ? __virt_addr_valid+0x1db/0x2d0
[   15.212486]  ? kasan_atomics_helper+0x3df/0x5450
[   15.212507]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.212530]  ? kasan_atomics_helper+0x3df/0x5450
[   15.212552]  kasan_report+0x141/0x180
[   15.212574]  ? kasan_atomics_helper+0x3df/0x5450
[   15.212600]  kasan_check_range+0x10c/0x1c0
[   15.212624]  __kasan_check_read+0x15/0x20
[   15.212722]  kasan_atomics_helper+0x3df/0x5450
[   15.212756]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.212780]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.212806]  ? kasan_atomics+0x152/0x310
[   15.212833]  kasan_atomics+0x1dc/0x310
[   15.212856]  ? __pfx_kasan_atomics+0x10/0x10
[   15.212881]  ? __pfx_read_tsc+0x10/0x10
[   15.212901]  ? ktime_get_ts64+0x86/0x230
[   15.212926]  kunit_try_run_case+0x1a5/0x480
[   15.212951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.212974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.213000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.213024]  ? __kthread_parkme+0x82/0x180
[   15.213045]  ? preempt_count_sub+0x50/0x80
[   15.213069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.213094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.213119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.213146]  kthread+0x337/0x6f0
[   15.213165]  ? trace_preempt_on+0x20/0xc0
[   15.213189]  ? __pfx_kthread+0x10/0x10
[   15.213209]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.213231]  ? calculate_sigpending+0x7b/0xa0
[   15.213256]  ? __pfx_kthread+0x10/0x10
[   15.213278]  ret_from_fork+0x116/0x1d0
[   15.213297]  ? __pfx_kthread+0x10/0x10
[   15.213317]  ret_from_fork_asm+0x1a/0x30
[   15.213348]  </TASK>
[   15.213358] 
[   15.226219] Allocated by task 283:
[   15.226536]  kasan_save_stack+0x45/0x70
[   15.226987]  kasan_save_track+0x18/0x40
[   15.227333]  kasan_save_alloc_info+0x3b/0x50
[   15.227793]  __kasan_kmalloc+0xb7/0xc0
[   15.228138]  __kmalloc_cache_noprof+0x189/0x420
[   15.228358]  kasan_atomics+0x95/0x310
[   15.228492]  kunit_try_run_case+0x1a5/0x480
[   15.228707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.229196]  kthread+0x337/0x6f0
[   15.229490]  ret_from_fork+0x116/0x1d0
[   15.229898]  ret_from_fork_asm+0x1a/0x30
[   15.230259] 
[   15.230416] The buggy address belongs to the object at ffff888103ad1980
[   15.230416]  which belongs to the cache kmalloc-64 of size 64
[   15.231193] The buggy address is located 0 bytes to the right of
[   15.231193]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.231565] 
[   15.231718] The buggy address belongs to the physical page:
[   15.232326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.233075] flags: 0x200000000000000(node=0|zone=2)
[   15.233537] page_type: f5(slab)
[   15.233970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.234243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.234477] page dumped because: kasan: bad access detected
[   15.234768] 
[   15.234926] Memory state around the buggy address:
[   15.235341]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.236166]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.236867] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.237465]                                      ^
[   15.237889]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.238109]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.238322] ==================================================================
[   15.323282] ==================================================================
[   15.323577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.323880] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.324221] 
[   15.324401] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.324463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.324475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.324496] Call Trace:
[   15.324510]  <TASK>
[   15.324526]  dump_stack_lvl+0x73/0xb0
[   15.324554]  print_report+0xd1/0x650
[   15.324578]  ? __virt_addr_valid+0x1db/0x2d0
[   15.324601]  ? kasan_atomics_helper+0x565/0x5450
[   15.324624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.324673]  ? kasan_atomics_helper+0x565/0x5450
[   15.324697]  kasan_report+0x141/0x180
[   15.324722]  ? kasan_atomics_helper+0x565/0x5450
[   15.324763]  kasan_check_range+0x10c/0x1c0
[   15.324789]  __kasan_check_write+0x18/0x20
[   15.324809]  kasan_atomics_helper+0x565/0x5450
[   15.324834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.324872]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.324926]  ? kasan_atomics+0x152/0x310
[   15.324953]  kasan_atomics+0x1dc/0x310
[   15.324977]  ? __pfx_kasan_atomics+0x10/0x10
[   15.325005]  ? __pfx_read_tsc+0x10/0x10
[   15.325027]  ? ktime_get_ts64+0x86/0x230
[   15.325054]  kunit_try_run_case+0x1a5/0x480
[   15.325079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.325104]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.325129]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.325155]  ? __kthread_parkme+0x82/0x180
[   15.325176]  ? preempt_count_sub+0x50/0x80
[   15.325201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.325227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.325253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.325280]  kthread+0x337/0x6f0
[   15.325300]  ? trace_preempt_on+0x20/0xc0
[   15.325325]  ? __pfx_kthread+0x10/0x10
[   15.325347]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.325370]  ? calculate_sigpending+0x7b/0xa0
[   15.325395]  ? __pfx_kthread+0x10/0x10
[   15.325419]  ret_from_fork+0x116/0x1d0
[   15.325440]  ? __pfx_kthread+0x10/0x10
[   15.325464]  ret_from_fork_asm+0x1a/0x30
[   15.325495]  </TASK>
[   15.325506] 
[   15.333718] Allocated by task 283:
[   15.333858]  kasan_save_stack+0x45/0x70
[   15.334170]  kasan_save_track+0x18/0x40
[   15.334370]  kasan_save_alloc_info+0x3b/0x50
[   15.334522]  __kasan_kmalloc+0xb7/0xc0
[   15.334681]  __kmalloc_cache_noprof+0x189/0x420
[   15.334850]  kasan_atomics+0x95/0x310
[   15.335011]  kunit_try_run_case+0x1a5/0x480
[   15.335217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.335471]  kthread+0x337/0x6f0
[   15.335654]  ret_from_fork+0x116/0x1d0
[   15.336062]  ret_from_fork_asm+0x1a/0x30
[   15.336280] 
[   15.336353] The buggy address belongs to the object at ffff888103ad1980
[   15.336353]  which belongs to the cache kmalloc-64 of size 64
[   15.336887] The buggy address is located 0 bytes to the right of
[   15.336887]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.337566] 
[   15.337679] The buggy address belongs to the physical page:
[   15.337898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.338141] flags: 0x200000000000000(node=0|zone=2)
[   15.338365] page_type: f5(slab)
[   15.338510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.338777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.339003] page dumped because: kasan: bad access detected
[   15.339220] 
[   15.339315] Memory state around the buggy address:
[   15.339541]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.342214]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.343905] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.344454]                                      ^
[   15.344622]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.346337]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.347117] ==================================================================
[   15.414285] ==================================================================
[   15.415059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.415769] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.416416] 
[   15.416624] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.416669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.416681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.416703] Call Trace:
[   15.416719]  <TASK>
[   15.416753]  dump_stack_lvl+0x73/0xb0
[   15.416884]  print_report+0xd1/0x650
[   15.416907]  ? __virt_addr_valid+0x1db/0x2d0
[   15.416931]  ? kasan_atomics_helper+0x72f/0x5450
[   15.416954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.416978]  ? kasan_atomics_helper+0x72f/0x5450
[   15.417002]  kasan_report+0x141/0x180
[   15.417025]  ? kasan_atomics_helper+0x72f/0x5450
[   15.417052]  kasan_check_range+0x10c/0x1c0
[   15.417078]  __kasan_check_write+0x18/0x20
[   15.417099]  kasan_atomics_helper+0x72f/0x5450
[   15.417124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.417148]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.417174]  ? kasan_atomics+0x152/0x310
[   15.417202]  kasan_atomics+0x1dc/0x310
[   15.417226]  ? __pfx_kasan_atomics+0x10/0x10
[   15.417251]  ? __pfx_read_tsc+0x10/0x10
[   15.417272]  ? ktime_get_ts64+0x86/0x230
[   15.417297]  kunit_try_run_case+0x1a5/0x480
[   15.417322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.417347]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.417372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.417398]  ? __kthread_parkme+0x82/0x180
[   15.417420]  ? preempt_count_sub+0x50/0x80
[   15.417445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.417470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.417496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.417523]  kthread+0x337/0x6f0
[   15.417543]  ? trace_preempt_on+0x20/0xc0
[   15.417567]  ? __pfx_kthread+0x10/0x10
[   15.417589]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.417613]  ? calculate_sigpending+0x7b/0xa0
[   15.417637]  ? __pfx_kthread+0x10/0x10
[   15.417705]  ret_from_fork+0x116/0x1d0
[   15.417725]  ? __pfx_kthread+0x10/0x10
[   15.417758]  ret_from_fork_asm+0x1a/0x30
[   15.417790]  </TASK>
[   15.417801] 
[   15.431024] Allocated by task 283:
[   15.431349]  kasan_save_stack+0x45/0x70
[   15.431729]  kasan_save_track+0x18/0x40
[   15.431908]  kasan_save_alloc_info+0x3b/0x50
[   15.432335]  __kasan_kmalloc+0xb7/0xc0
[   15.432646]  __kmalloc_cache_noprof+0x189/0x420
[   15.433077]  kasan_atomics+0x95/0x310
[   15.433224]  kunit_try_run_case+0x1a5/0x480
[   15.433376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.433554]  kthread+0x337/0x6f0
[   15.433985]  ret_from_fork+0x116/0x1d0
[   15.434459]  ret_from_fork_asm+0x1a/0x30
[   15.434960] 
[   15.435124] The buggy address belongs to the object at ffff888103ad1980
[   15.435124]  which belongs to the cache kmalloc-64 of size 64
[   15.436361] The buggy address is located 0 bytes to the right of
[   15.436361]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.437590] 
[   15.437782] The buggy address belongs to the physical page:
[   15.438255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.438541] flags: 0x200000000000000(node=0|zone=2)
[   15.438922] page_type: f5(slab)
[   15.439250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.439973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.440807] page dumped because: kasan: bad access detected
[   15.441254] 
[   15.441339] Memory state around the buggy address:
[   15.441499]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.441949]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.442731] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.443364]                                      ^
[   15.443859]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.444471]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.445122] ==================================================================
[   16.672727] ==================================================================
[   16.673119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.673553] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.674246] 
[   16.674350] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.674612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.674628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.674650] Call Trace:
[   16.674667]  <TASK>
[   16.674684]  dump_stack_lvl+0x73/0xb0
[   16.674715]  print_report+0xd1/0x650
[   16.674782]  ? __virt_addr_valid+0x1db/0x2d0
[   16.674806]  ? kasan_atomics_helper+0x5115/0x5450
[   16.674829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.674854]  ? kasan_atomics_helper+0x5115/0x5450
[   16.674879]  kasan_report+0x141/0x180
[   16.674902]  ? kasan_atomics_helper+0x5115/0x5450
[   16.674929]  __asan_report_load8_noabort+0x18/0x20
[   16.674956]  kasan_atomics_helper+0x5115/0x5450
[   16.674979]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.675003]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.675029]  ? kasan_atomics+0x152/0x310
[   16.675057]  kasan_atomics+0x1dc/0x310
[   16.675080]  ? __pfx_kasan_atomics+0x10/0x10
[   16.675106]  ? __pfx_read_tsc+0x10/0x10
[   16.675127]  ? ktime_get_ts64+0x86/0x230
[   16.675151]  kunit_try_run_case+0x1a5/0x480
[   16.675176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.675201]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.675226]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.675252]  ? __kthread_parkme+0x82/0x180
[   16.675273]  ? preempt_count_sub+0x50/0x80
[   16.675298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.675324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.675350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.675377]  kthread+0x337/0x6f0
[   16.675399]  ? trace_preempt_on+0x20/0xc0
[   16.675424]  ? __pfx_kthread+0x10/0x10
[   16.675446]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.675468]  ? calculate_sigpending+0x7b/0xa0
[   16.675493]  ? __pfx_kthread+0x10/0x10
[   16.675516]  ret_from_fork+0x116/0x1d0
[   16.675535]  ? __pfx_kthread+0x10/0x10
[   16.675557]  ret_from_fork_asm+0x1a/0x30
[   16.675588]  </TASK>
[   16.675599] 
[   16.687570] Allocated by task 283:
[   16.687860]  kasan_save_stack+0x45/0x70
[   16.688269]  kasan_save_track+0x18/0x40
[   16.688642]  kasan_save_alloc_info+0x3b/0x50
[   16.688959]  __kasan_kmalloc+0xb7/0xc0
[   16.689339]  __kmalloc_cache_noprof+0x189/0x420
[   16.689577]  kasan_atomics+0x95/0x310
[   16.689906]  kunit_try_run_case+0x1a5/0x480
[   16.690323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.690788]  kthread+0x337/0x6f0
[   16.690916]  ret_from_fork+0x116/0x1d0
[   16.691052]  ret_from_fork_asm+0x1a/0x30
[   16.691194] 
[   16.691265] The buggy address belongs to the object at ffff888103ad1980
[   16.691265]  which belongs to the cache kmalloc-64 of size 64
[   16.691618] The buggy address is located 0 bytes to the right of
[   16.691618]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.692789] 
[   16.692956] The buggy address belongs to the physical page:
[   16.693486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.694246] flags: 0x200000000000000(node=0|zone=2)
[   16.694787] page_type: f5(slab)
[   16.695104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.695818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.696468] page dumped because: kasan: bad access detected
[   16.696815] 
[   16.696901] Memory state around the buggy address:
[   16.697220]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.697438]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.697668] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.697892]                                      ^
[   16.698048]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.698267]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.698586] ==================================================================
[   15.664815] ==================================================================
[   15.665163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.665783] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.666141] 
[   15.666250] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.666291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.666303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.666323] Call Trace:
[   15.666339]  <TASK>
[   15.666354]  dump_stack_lvl+0x73/0xb0
[   15.666391]  print_report+0xd1/0x650
[   15.666414]  ? __virt_addr_valid+0x1db/0x2d0
[   15.666439]  ? kasan_atomics_helper+0xd47/0x5450
[   15.666461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.666485]  ? kasan_atomics_helper+0xd47/0x5450
[   15.666508]  kasan_report+0x141/0x180
[   15.666531]  ? kasan_atomics_helper+0xd47/0x5450
[   15.666559]  kasan_check_range+0x10c/0x1c0
[   15.666584]  __kasan_check_write+0x18/0x20
[   15.666604]  kasan_atomics_helper+0xd47/0x5450
[   15.666628]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.666653]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.666679]  ? kasan_atomics+0x152/0x310
[   15.666706]  kasan_atomics+0x1dc/0x310
[   15.666730]  ? __pfx_kasan_atomics+0x10/0x10
[   15.666767]  ? __pfx_read_tsc+0x10/0x10
[   15.666789]  ? ktime_get_ts64+0x86/0x230
[   15.666814]  kunit_try_run_case+0x1a5/0x480
[   15.666839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.666863]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.666897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.666922]  ? __kthread_parkme+0x82/0x180
[   15.666943]  ? preempt_count_sub+0x50/0x80
[   15.666968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.666994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.667020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.667046]  kthread+0x337/0x6f0
[   15.667066]  ? trace_preempt_on+0x20/0xc0
[   15.667091]  ? __pfx_kthread+0x10/0x10
[   15.667113]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.667136]  ? calculate_sigpending+0x7b/0xa0
[   15.667160]  ? __pfx_kthread+0x10/0x10
[   15.667183]  ret_from_fork+0x116/0x1d0
[   15.667203]  ? __pfx_kthread+0x10/0x10
[   15.667225]  ret_from_fork_asm+0x1a/0x30
[   15.667256]  </TASK>
[   15.667267] 
[   15.674443] Allocated by task 283:
[   15.674574]  kasan_save_stack+0x45/0x70
[   15.674763]  kasan_save_track+0x18/0x40
[   15.674954]  kasan_save_alloc_info+0x3b/0x50
[   15.675167]  __kasan_kmalloc+0xb7/0xc0
[   15.675355]  __kmalloc_cache_noprof+0x189/0x420
[   15.675577]  kasan_atomics+0x95/0x310
[   15.675932]  kunit_try_run_case+0x1a5/0x480
[   15.676162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.676416]  kthread+0x337/0x6f0
[   15.676538]  ret_from_fork+0x116/0x1d0
[   15.676689]  ret_from_fork_asm+0x1a/0x30
[   15.676904] 
[   15.677001] The buggy address belongs to the object at ffff888103ad1980
[   15.677001]  which belongs to the cache kmalloc-64 of size 64
[   15.677503] The buggy address is located 0 bytes to the right of
[   15.677503]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.678017] 
[   15.678116] The buggy address belongs to the physical page:
[   15.678323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.678608] flags: 0x200000000000000(node=0|zone=2)
[   15.679010] page_type: f5(slab)
[   15.679132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.679361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.679595] page dumped because: kasan: bad access detected
[   15.680042] 
[   15.680136] Memory state around the buggy address:
[   15.680360]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.680685]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.681027] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.681280]                                      ^
[   15.681495]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.681855]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.682152] ==================================================================
[   15.090281] ==================================================================
[   15.091503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.092015] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.093230] 
[   15.093461] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.093512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.093524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.093547] Call Trace:
[   15.093561]  <TASK>
[   15.093577]  dump_stack_lvl+0x73/0xb0
[   15.093608]  print_report+0xd1/0x650
[   15.093631]  ? __virt_addr_valid+0x1db/0x2d0
[   15.093840]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.093868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.093893]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.093915]  kasan_report+0x141/0x180
[   15.093938]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.093964]  __asan_report_load4_noabort+0x18/0x20
[   15.093989]  kasan_atomics_helper+0x4bbc/0x5450
[   15.094012]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.094036]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.094062]  ? kasan_atomics+0x152/0x310
[   15.094089]  kasan_atomics+0x1dc/0x310
[   15.094111]  ? __pfx_kasan_atomics+0x10/0x10
[   15.094136]  ? __pfx_read_tsc+0x10/0x10
[   15.094157]  ? ktime_get_ts64+0x86/0x230
[   15.094181]  kunit_try_run_case+0x1a5/0x480
[   15.094206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.094229]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.094254]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.094278]  ? __kthread_parkme+0x82/0x180
[   15.094298]  ? preempt_count_sub+0x50/0x80
[   15.094323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.094348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.094379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.094404]  kthread+0x337/0x6f0
[   15.094424]  ? trace_preempt_on+0x20/0xc0
[   15.094448]  ? __pfx_kthread+0x10/0x10
[   15.094468]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.094491]  ? calculate_sigpending+0x7b/0xa0
[   15.094515]  ? __pfx_kthread+0x10/0x10
[   15.094536]  ret_from_fork+0x116/0x1d0
[   15.094554]  ? __pfx_kthread+0x10/0x10
[   15.094574]  ret_from_fork_asm+0x1a/0x30
[   15.094605]  </TASK>
[   15.094616] 
[   15.112028] Allocated by task 283:
[   15.112175]  kasan_save_stack+0x45/0x70
[   15.112334]  kasan_save_track+0x18/0x40
[   15.112467]  kasan_save_alloc_info+0x3b/0x50
[   15.112611]  __kasan_kmalloc+0xb7/0xc0
[   15.113318]  __kmalloc_cache_noprof+0x189/0x420
[   15.113791]  kasan_atomics+0x95/0x310
[   15.114238]  kunit_try_run_case+0x1a5/0x480
[   15.114673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.115292]  kthread+0x337/0x6f0
[   15.115623]  ret_from_fork+0x116/0x1d0
[   15.116123]  ret_from_fork_asm+0x1a/0x30
[   15.116276] 
[   15.116349] The buggy address belongs to the object at ffff888103ad1980
[   15.116349]  which belongs to the cache kmalloc-64 of size 64
[   15.116721] The buggy address is located 0 bytes to the right of
[   15.116721]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.117480] 
[   15.117559] The buggy address belongs to the physical page:
[   15.118372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.119501] flags: 0x200000000000000(node=0|zone=2)
[   15.120000] page_type: f5(slab)
[   15.120131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.120361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.120586] page dumped because: kasan: bad access detected
[   15.120783] 
[   15.120852] Memory state around the buggy address:
[   15.121397]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.121985]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.122406] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.122864]                                      ^
[   15.123128]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.123376]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.123688] ==================================================================
[   16.590901] ==================================================================
[   16.591218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.591534] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.592419] 
[   16.592544] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.592591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.592605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.592626] Call Trace:
[   16.592642]  <TASK>
[   16.592823]  dump_stack_lvl+0x73/0xb0
[   16.592872]  print_report+0xd1/0x650
[   16.592897]  ? __virt_addr_valid+0x1db/0x2d0
[   16.592921]  ? kasan_atomics_helper+0x218a/0x5450
[   16.592943]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.592983]  ? kasan_atomics_helper+0x218a/0x5450
[   16.593007]  kasan_report+0x141/0x180
[   16.593064]  ? kasan_atomics_helper+0x218a/0x5450
[   16.593095]  kasan_check_range+0x10c/0x1c0
[   16.593133]  __kasan_check_write+0x18/0x20
[   16.593154]  kasan_atomics_helper+0x218a/0x5450
[   16.593179]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.593215]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.593242]  ? kasan_atomics+0x152/0x310
[   16.593280]  kasan_atomics+0x1dc/0x310
[   16.593304]  ? __pfx_kasan_atomics+0x10/0x10
[   16.593330]  ? __pfx_read_tsc+0x10/0x10
[   16.593364]  ? ktime_get_ts64+0x86/0x230
[   16.593390]  kunit_try_run_case+0x1a5/0x480
[   16.593415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.593450]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.593475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.593512]  ? __kthread_parkme+0x82/0x180
[   16.593535]  ? preempt_count_sub+0x50/0x80
[   16.593560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.593597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.593624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.593674]  kthread+0x337/0x6f0
[   16.593696]  ? trace_preempt_on+0x20/0xc0
[   16.593722]  ? __pfx_kthread+0x10/0x10
[   16.593766]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.593790]  ? calculate_sigpending+0x7b/0xa0
[   16.593814]  ? __pfx_kthread+0x10/0x10
[   16.593849]  ret_from_fork+0x116/0x1d0
[   16.593869]  ? __pfx_kthread+0x10/0x10
[   16.593890]  ret_from_fork_asm+0x1a/0x30
[   16.593933]  </TASK>
[   16.593945] 
[   16.605460] Allocated by task 283:
[   16.605641]  kasan_save_stack+0x45/0x70
[   16.606089]  kasan_save_track+0x18/0x40
[   16.606272]  kasan_save_alloc_info+0x3b/0x50
[   16.606478]  __kasan_kmalloc+0xb7/0xc0
[   16.606655]  __kmalloc_cache_noprof+0x189/0x420
[   16.607153]  kasan_atomics+0x95/0x310
[   16.607331]  kunit_try_run_case+0x1a5/0x480
[   16.607525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.608040]  kthread+0x337/0x6f0
[   16.608464]  ret_from_fork+0x116/0x1d0
[   16.608853]  ret_from_fork_asm+0x1a/0x30
[   16.609082] 
[   16.609174] The buggy address belongs to the object at ffff888103ad1980
[   16.609174]  which belongs to the cache kmalloc-64 of size 64
[   16.609910] The buggy address is located 0 bytes to the right of
[   16.609910]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.610498] 
[   16.610597] The buggy address belongs to the physical page:
[   16.611136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.611807] flags: 0x200000000000000(node=0|zone=2)
[   16.612112] page_type: f5(slab)
[   16.612537] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.613002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.613314] page dumped because: kasan: bad access detected
[   16.613548] 
[   16.613639] Memory state around the buggy address:
[   16.614155]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.614597]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.615171] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.615618]                                      ^
[   16.615849]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.616138]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.616426] ==================================================================
[   16.064940] ==================================================================
[   16.065240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   16.065960] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.066226] 
[   16.066387] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.066463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.066474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.066495] Call Trace:
[   16.066508]  <TASK>
[   16.066522]  dump_stack_lvl+0x73/0xb0
[   16.066550]  print_report+0xd1/0x650
[   16.066573]  ? __virt_addr_valid+0x1db/0x2d0
[   16.066596]  ? kasan_atomics_helper+0x151d/0x5450
[   16.066619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.066654]  ? kasan_atomics_helper+0x151d/0x5450
[   16.066677]  kasan_report+0x141/0x180
[   16.066851]  ? kasan_atomics_helper+0x151d/0x5450
[   16.066895]  kasan_check_range+0x10c/0x1c0
[   16.066920]  __kasan_check_write+0x18/0x20
[   16.066941]  kasan_atomics_helper+0x151d/0x5450
[   16.066965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.066989]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.067016]  ? kasan_atomics+0x152/0x310
[   16.067043]  kasan_atomics+0x1dc/0x310
[   16.067067]  ? __pfx_kasan_atomics+0x10/0x10
[   16.067093]  ? __pfx_read_tsc+0x10/0x10
[   16.067113]  ? ktime_get_ts64+0x86/0x230
[   16.067138]  kunit_try_run_case+0x1a5/0x480
[   16.067165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.067189]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.067215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.067240]  ? __kthread_parkme+0x82/0x180
[   16.067261]  ? preempt_count_sub+0x50/0x80
[   16.067288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.067315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.067341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.067367]  kthread+0x337/0x6f0
[   16.067388]  ? trace_preempt_on+0x20/0xc0
[   16.067412]  ? __pfx_kthread+0x10/0x10
[   16.067434]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.067457]  ? calculate_sigpending+0x7b/0xa0
[   16.067481]  ? __pfx_kthread+0x10/0x10
[   16.067505]  ret_from_fork+0x116/0x1d0
[   16.067524]  ? __pfx_kthread+0x10/0x10
[   16.067546]  ret_from_fork_asm+0x1a/0x30
[   16.067577]  </TASK>
[   16.067588] 
[   16.075235] Allocated by task 283:
[   16.075370]  kasan_save_stack+0x45/0x70
[   16.075514]  kasan_save_track+0x18/0x40
[   16.075651]  kasan_save_alloc_info+0x3b/0x50
[   16.075890]  __kasan_kmalloc+0xb7/0xc0
[   16.076080]  __kmalloc_cache_noprof+0x189/0x420
[   16.076302]  kasan_atomics+0x95/0x310
[   16.076489]  kunit_try_run_case+0x1a5/0x480
[   16.076701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.076900]  kthread+0x337/0x6f0
[   16.077073]  ret_from_fork+0x116/0x1d0
[   16.077262]  ret_from_fork_asm+0x1a/0x30
[   16.077426] 
[   16.077522] The buggy address belongs to the object at ffff888103ad1980
[   16.077522]  which belongs to the cache kmalloc-64 of size 64
[   16.078018] The buggy address is located 0 bytes to the right of
[   16.078018]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.078521] 
[   16.078618] The buggy address belongs to the physical page:
[   16.078906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.079155] flags: 0x200000000000000(node=0|zone=2)
[   16.079318] page_type: f5(slab)
[   16.079439] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.079688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.080045] page dumped because: kasan: bad access detected
[   16.080302] 
[   16.080398] Memory state around the buggy address:
[   16.080611]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.080982]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.081221] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.081431]                                      ^
[   16.081614]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.082247]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.082541] ==================================================================
[   16.030381] ==================================================================
[   16.030809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   16.031158] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.031454] 
[   16.031534] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.031575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.031588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.031608] Call Trace:
[   16.031624]  <TASK>
[   16.031639]  dump_stack_lvl+0x73/0xb0
[   16.031675]  print_report+0xd1/0x650
[   16.031699]  ? __virt_addr_valid+0x1db/0x2d0
[   16.031723]  ? kasan_atomics_helper+0x1467/0x5450
[   16.031757]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.031782]  ? kasan_atomics_helper+0x1467/0x5450
[   16.031806]  kasan_report+0x141/0x180
[   16.031829]  ? kasan_atomics_helper+0x1467/0x5450
[   16.031858]  kasan_check_range+0x10c/0x1c0
[   16.031883]  __kasan_check_write+0x18/0x20
[   16.031904]  kasan_atomics_helper+0x1467/0x5450
[   16.031928]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.031952]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.031978]  ? kasan_atomics+0x152/0x310
[   16.032005]  kasan_atomics+0x1dc/0x310
[   16.032029]  ? __pfx_kasan_atomics+0x10/0x10
[   16.032054]  ? __pfx_read_tsc+0x10/0x10
[   16.032076]  ? ktime_get_ts64+0x86/0x230
[   16.032101]  kunit_try_run_case+0x1a5/0x480
[   16.032127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.032153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.032180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.032204]  ? __kthread_parkme+0x82/0x180
[   16.032226]  ? preempt_count_sub+0x50/0x80
[   16.032250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.032275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.032302]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.032328]  kthread+0x337/0x6f0
[   16.032348]  ? trace_preempt_on+0x20/0xc0
[   16.032373]  ? __pfx_kthread+0x10/0x10
[   16.032395]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.032418]  ? calculate_sigpending+0x7b/0xa0
[   16.032444]  ? __pfx_kthread+0x10/0x10
[   16.032466]  ret_from_fork+0x116/0x1d0
[   16.032487]  ? __pfx_kthread+0x10/0x10
[   16.032508]  ret_from_fork_asm+0x1a/0x30
[   16.032540]  </TASK>
[   16.032551] 
[   16.039826] Allocated by task 283:
[   16.040008]  kasan_save_stack+0x45/0x70
[   16.040207]  kasan_save_track+0x18/0x40
[   16.040382]  kasan_save_alloc_info+0x3b/0x50
[   16.040574]  __kasan_kmalloc+0xb7/0xc0
[   16.040783]  __kmalloc_cache_noprof+0x189/0x420
[   16.040993]  kasan_atomics+0x95/0x310
[   16.041158]  kunit_try_run_case+0x1a5/0x480
[   16.041306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.041482]  kthread+0x337/0x6f0
[   16.041603]  ret_from_fork+0x116/0x1d0
[   16.041736]  ret_from_fork_asm+0x1a/0x30
[   16.041886] 
[   16.041956] The buggy address belongs to the object at ffff888103ad1980
[   16.041956]  which belongs to the cache kmalloc-64 of size 64
[   16.042443] The buggy address is located 0 bytes to the right of
[   16.042443]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.043161] 
[   16.043239] The buggy address belongs to the physical page:
[   16.043411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.043656] flags: 0x200000000000000(node=0|zone=2)
[   16.043901] page_type: f5(slab)
[   16.044068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.044407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.044760] page dumped because: kasan: bad access detected
[   16.044954] 
[   16.045023] Memory state around the buggy address:
[   16.045178]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.045393]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.045798] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.046121]                                      ^
[   16.046353]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.046724]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.047039] ==================================================================
[   15.990905] ==================================================================
[   15.991633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.992444] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.993181] 
[   15.993355] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.993418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.993432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.993453] Call Trace:
[   15.993466]  <TASK>
[   15.993480]  dump_stack_lvl+0x73/0xb0
[   15.993510]  print_report+0xd1/0x650
[   15.993534]  ? __virt_addr_valid+0x1db/0x2d0
[   15.993557]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.993579]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.993603]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.993627]  kasan_report+0x141/0x180
[   15.993660]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.993689]  kasan_check_range+0x10c/0x1c0
[   15.993714]  __kasan_check_read+0x15/0x20
[   15.993735]  kasan_atomics_helper+0x13b5/0x5450
[   15.993770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.993794]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.993822]  ? kasan_atomics+0x152/0x310
[   15.993850]  kasan_atomics+0x1dc/0x310
[   15.993873]  ? __pfx_kasan_atomics+0x10/0x10
[   15.993899]  ? __pfx_read_tsc+0x10/0x10
[   15.993921]  ? ktime_get_ts64+0x86/0x230
[   15.993945]  kunit_try_run_case+0x1a5/0x480
[   15.993970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.993995]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.994020]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.994045]  ? __kthread_parkme+0x82/0x180
[   15.994066]  ? preempt_count_sub+0x50/0x80
[   15.994092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.994118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.994144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.994170]  kthread+0x337/0x6f0
[   15.994191]  ? trace_preempt_on+0x20/0xc0
[   15.994215]  ? __pfx_kthread+0x10/0x10
[   15.994237]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.994261]  ? calculate_sigpending+0x7b/0xa0
[   15.994287]  ? __pfx_kthread+0x10/0x10
[   15.994309]  ret_from_fork+0x116/0x1d0
[   15.994330]  ? __pfx_kthread+0x10/0x10
[   15.994352]  ret_from_fork_asm+0x1a/0x30
[   15.994392]  </TASK>
[   15.994402] 
[   16.004220] Allocated by task 283:
[   16.004370]  kasan_save_stack+0x45/0x70
[   16.004511]  kasan_save_track+0x18/0x40
[   16.004644]  kasan_save_alloc_info+0x3b/0x50
[   16.004912]  __kasan_kmalloc+0xb7/0xc0
[   16.005124]  __kmalloc_cache_noprof+0x189/0x420
[   16.005346]  kasan_atomics+0x95/0x310
[   16.005520]  kunit_try_run_case+0x1a5/0x480
[   16.005693]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.005879]  kthread+0x337/0x6f0
[   16.005996]  ret_from_fork+0x116/0x1d0
[   16.006182]  ret_from_fork_asm+0x1a/0x30
[   16.006384] 
[   16.006482] The buggy address belongs to the object at ffff888103ad1980
[   16.006482]  which belongs to the cache kmalloc-64 of size 64
[   16.006979] The buggy address is located 0 bytes to the right of
[   16.006979]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.007339] 
[   16.007516] The buggy address belongs to the physical page:
[   16.007845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.008215] flags: 0x200000000000000(node=0|zone=2)
[   16.008451] page_type: f5(slab)
[   16.008618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.008971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.009264] page dumped because: kasan: bad access detected
[   16.009493] 
[   16.009596] Memory state around the buggy address:
[   16.009841]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.010126]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.010423] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.010737]                                      ^
[   16.010976]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.011284]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.011584] ==================================================================
[   16.122204] ==================================================================
[   16.122567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.122949] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.124307] 
[   16.124414] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.124461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.124474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.124496] Call Trace:
[   16.124514]  <TASK>
[   16.124532]  dump_stack_lvl+0x73/0xb0
[   16.124562]  print_report+0xd1/0x650
[   16.124587]  ? __virt_addr_valid+0x1db/0x2d0
[   16.124610]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.124642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.124668]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.124690]  kasan_report+0x141/0x180
[   16.124713]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.124740]  kasan_check_range+0x10c/0x1c0
[   16.124775]  __kasan_check_write+0x18/0x20
[   16.124796]  kasan_atomics_helper+0x16e7/0x5450
[   16.124820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.124844]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.124870]  ? kasan_atomics+0x152/0x310
[   16.124897]  kasan_atomics+0x1dc/0x310
[   16.124922]  ? __pfx_kasan_atomics+0x10/0x10
[   16.124948]  ? __pfx_read_tsc+0x10/0x10
[   16.124970]  ? ktime_get_ts64+0x86/0x230
[   16.124997]  kunit_try_run_case+0x1a5/0x480
[   16.125021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.125046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.125072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.125097]  ? __kthread_parkme+0x82/0x180
[   16.125118]  ? preempt_count_sub+0x50/0x80
[   16.125142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.125168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.125193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.125220]  kthread+0x337/0x6f0
[   16.125239]  ? trace_preempt_on+0x20/0xc0
[   16.125264]  ? __pfx_kthread+0x10/0x10
[   16.125285]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.125308]  ? calculate_sigpending+0x7b/0xa0
[   16.125333]  ? __pfx_kthread+0x10/0x10
[   16.125356]  ret_from_fork+0x116/0x1d0
[   16.125374]  ? __pfx_kthread+0x10/0x10
[   16.125396]  ret_from_fork_asm+0x1a/0x30
[   16.125428]  </TASK>
[   16.125440] 
[   16.139111] Allocated by task 283:
[   16.139361]  kasan_save_stack+0x45/0x70
[   16.139557]  kasan_save_track+0x18/0x40
[   16.140017]  kasan_save_alloc_info+0x3b/0x50
[   16.140197]  __kasan_kmalloc+0xb7/0xc0
[   16.140518]  __kmalloc_cache_noprof+0x189/0x420
[   16.140811]  kasan_atomics+0x95/0x310
[   16.141154]  kunit_try_run_case+0x1a5/0x480
[   16.141473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.141830]  kthread+0x337/0x6f0
[   16.141982]  ret_from_fork+0x116/0x1d0
[   16.142294]  ret_from_fork_asm+0x1a/0x30
[   16.142569] 
[   16.142719] The buggy address belongs to the object at ffff888103ad1980
[   16.142719]  which belongs to the cache kmalloc-64 of size 64
[   16.143331] The buggy address is located 0 bytes to the right of
[   16.143331]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.144120] 
[   16.144242] The buggy address belongs to the physical page:
[   16.144641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.145133] flags: 0x200000000000000(node=0|zone=2)
[   16.145403] page_type: f5(slab)
[   16.145722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.146093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.146416] page dumped because: kasan: bad access detected
[   16.146756] 
[   16.147003] Memory state around the buggy address:
[   16.147187]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.147708]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.148175] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.148579]                                      ^
[   16.148912]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.149258]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.149678] ==================================================================
[   16.301606] ==================================================================
[   16.302325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.302796] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.303175] 
[   16.303502] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.303551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.303565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.303585] Call Trace:
[   16.303601]  <TASK>
[   16.303616]  dump_stack_lvl+0x73/0xb0
[   16.303647]  print_report+0xd1/0x650
[   16.303671]  ? __virt_addr_valid+0x1db/0x2d0
[   16.303695]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.303717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.303742]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.303779]  kasan_report+0x141/0x180
[   16.303802]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.303830]  kasan_check_range+0x10c/0x1c0
[   16.303854]  __kasan_check_write+0x18/0x20
[   16.303875]  kasan_atomics_helper+0x1b22/0x5450
[   16.303899]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.303923]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.303951]  ? kasan_atomics+0x152/0x310
[   16.303979]  kasan_atomics+0x1dc/0x310
[   16.304002]  ? __pfx_kasan_atomics+0x10/0x10
[   16.304028]  ? __pfx_read_tsc+0x10/0x10
[   16.304050]  ? ktime_get_ts64+0x86/0x230
[   16.304077]  kunit_try_run_case+0x1a5/0x480
[   16.304103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.304127]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.304153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.304179]  ? __kthread_parkme+0x82/0x180
[   16.304201]  ? preempt_count_sub+0x50/0x80
[   16.304225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.304252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.304279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.304305]  kthread+0x337/0x6f0
[   16.304325]  ? trace_preempt_on+0x20/0xc0
[   16.304349]  ? __pfx_kthread+0x10/0x10
[   16.304371]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.304393]  ? calculate_sigpending+0x7b/0xa0
[   16.304420]  ? __pfx_kthread+0x10/0x10
[   16.304442]  ret_from_fork+0x116/0x1d0
[   16.304461]  ? __pfx_kthread+0x10/0x10
[   16.304483]  ret_from_fork_asm+0x1a/0x30
[   16.304514]  </TASK>
[   16.304525] 
[   16.314776] Allocated by task 283:
[   16.315037]  kasan_save_stack+0x45/0x70
[   16.315225]  kasan_save_track+0x18/0x40
[   16.315413]  kasan_save_alloc_info+0x3b/0x50
[   16.315610]  __kasan_kmalloc+0xb7/0xc0
[   16.315828]  __kmalloc_cache_noprof+0x189/0x420
[   16.316344]  kasan_atomics+0x95/0x310
[   16.316609]  kunit_try_run_case+0x1a5/0x480
[   16.316807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.317221]  kthread+0x337/0x6f0
[   16.317462]  ret_from_fork+0x116/0x1d0
[   16.317807]  ret_from_fork_asm+0x1a/0x30
[   16.318076] 
[   16.318170] The buggy address belongs to the object at ffff888103ad1980
[   16.318170]  which belongs to the cache kmalloc-64 of size 64
[   16.318960] The buggy address is located 0 bytes to the right of
[   16.318960]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.319537] 
[   16.319628] The buggy address belongs to the physical page:
[   16.319864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.320403] flags: 0x200000000000000(node=0|zone=2)
[   16.320618] page_type: f5(slab)
[   16.320935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.321329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.321801] page dumped because: kasan: bad access detected
[   16.322133] 
[   16.322217] Memory state around the buggy address:
[   16.322523]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.322992]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.323354] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.323618]                                      ^
[   16.323978]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.324430]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.324762] ==================================================================
[   16.325469] ==================================================================
[   16.326236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.326709] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.327234] 
[   16.327349] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.327394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.327406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.327577] Call Trace:
[   16.327595]  <TASK>
[   16.327610]  dump_stack_lvl+0x73/0xb0
[   16.327642]  print_report+0xd1/0x650
[   16.327682]  ? __virt_addr_valid+0x1db/0x2d0
[   16.327706]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.327729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.327765]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.327789]  kasan_report+0x141/0x180
[   16.327812]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.327838]  kasan_check_range+0x10c/0x1c0
[   16.327865]  __kasan_check_write+0x18/0x20
[   16.327886]  kasan_atomics_helper+0x1c18/0x5450
[   16.327910]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.327933]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.327960]  ? kasan_atomics+0x152/0x310
[   16.327987]  kasan_atomics+0x1dc/0x310
[   16.328011]  ? __pfx_kasan_atomics+0x10/0x10
[   16.328037]  ? __pfx_read_tsc+0x10/0x10
[   16.328059]  ? ktime_get_ts64+0x86/0x230
[   16.328084]  kunit_try_run_case+0x1a5/0x480
[   16.328110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.328134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.328159]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.328185]  ? __kthread_parkme+0x82/0x180
[   16.328206]  ? preempt_count_sub+0x50/0x80
[   16.328231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.328257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.328283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.328311]  kthread+0x337/0x6f0
[   16.328331]  ? trace_preempt_on+0x20/0xc0
[   16.328355]  ? __pfx_kthread+0x10/0x10
[   16.328377]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.328400]  ? calculate_sigpending+0x7b/0xa0
[   16.328425]  ? __pfx_kthread+0x10/0x10
[   16.328447]  ret_from_fork+0x116/0x1d0
[   16.328467]  ? __pfx_kthread+0x10/0x10
[   16.328488]  ret_from_fork_asm+0x1a/0x30
[   16.328519]  </TASK>
[   16.328531] 
[   16.338889] Allocated by task 283:
[   16.339081]  kasan_save_stack+0x45/0x70
[   16.339287]  kasan_save_track+0x18/0x40
[   16.339472]  kasan_save_alloc_info+0x3b/0x50
[   16.339680]  __kasan_kmalloc+0xb7/0xc0
[   16.340118]  __kmalloc_cache_noprof+0x189/0x420
[   16.340291]  kasan_atomics+0x95/0x310
[   16.340603]  kunit_try_run_case+0x1a5/0x480
[   16.340964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.341312]  kthread+0x337/0x6f0
[   16.341473]  ret_from_fork+0x116/0x1d0
[   16.341788]  ret_from_fork_asm+0x1a/0x30
[   16.342135] 
[   16.342220] The buggy address belongs to the object at ffff888103ad1980
[   16.342220]  which belongs to the cache kmalloc-64 of size 64
[   16.342890] The buggy address is located 0 bytes to the right of
[   16.342890]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.343381] 
[   16.343478] The buggy address belongs to the physical page:
[   16.343702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.344037] flags: 0x200000000000000(node=0|zone=2)
[   16.344251] page_type: f5(slab)
[   16.344405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.345198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.345484] page dumped because: kasan: bad access detected
[   16.345823] 
[   16.345999] Memory state around the buggy address:
[   16.346210]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.346654]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.347155] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.347556]                                      ^
[   16.347820]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.348264]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.348617] ==================================================================
[   15.151791] ==================================================================
[   15.152116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.153198] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.153514] 
[   15.153798] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.154004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.154019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.154040] Call Trace:
[   15.154053]  <TASK>
[   15.154068]  dump_stack_lvl+0x73/0xb0
[   15.154099]  print_report+0xd1/0x650
[   15.154122]  ? __virt_addr_valid+0x1db/0x2d0
[   15.154146]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.154168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.154191]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.154214]  kasan_report+0x141/0x180
[   15.154236]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.154262]  __asan_report_load4_noabort+0x18/0x20
[   15.154288]  kasan_atomics_helper+0x4b88/0x5450
[   15.154311]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.154334]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.154366]  ? kasan_atomics+0x152/0x310
[   15.154393]  kasan_atomics+0x1dc/0x310
[   15.154415]  ? __pfx_kasan_atomics+0x10/0x10
[   15.154439]  ? __pfx_read_tsc+0x10/0x10
[   15.154460]  ? ktime_get_ts64+0x86/0x230
[   15.154484]  kunit_try_run_case+0x1a5/0x480
[   15.154509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.154532]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.154556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.154581]  ? __kthread_parkme+0x82/0x180
[   15.154601]  ? preempt_count_sub+0x50/0x80
[   15.154625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.154702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.154729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.154766]  kthread+0x337/0x6f0
[   15.154786]  ? trace_preempt_on+0x20/0xc0
[   15.154810]  ? __pfx_kthread+0x10/0x10
[   15.154831]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.154855]  ? calculate_sigpending+0x7b/0xa0
[   15.154879]  ? __pfx_kthread+0x10/0x10
[   15.154901]  ret_from_fork+0x116/0x1d0
[   15.154919]  ? __pfx_kthread+0x10/0x10
[   15.154941]  ret_from_fork_asm+0x1a/0x30
[   15.154971]  </TASK>
[   15.154982] 
[   15.167418] Allocated by task 283:
[   15.167903]  kasan_save_stack+0x45/0x70
[   15.168420]  kasan_save_track+0x18/0x40
[   15.168764]  kasan_save_alloc_info+0x3b/0x50
[   15.169139]  __kasan_kmalloc+0xb7/0xc0
[   15.169443]  __kmalloc_cache_noprof+0x189/0x420
[   15.169865]  kasan_atomics+0x95/0x310
[   15.170024]  kunit_try_run_case+0x1a5/0x480
[   15.170355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.170629]  kthread+0x337/0x6f0
[   15.171129]  ret_from_fork+0x116/0x1d0
[   15.171308]  ret_from_fork_asm+0x1a/0x30
[   15.171653] 
[   15.171905] The buggy address belongs to the object at ffff888103ad1980
[   15.171905]  which belongs to the cache kmalloc-64 of size 64
[   15.172984] The buggy address is located 0 bytes to the right of
[   15.172984]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.173583] 
[   15.173831] The buggy address belongs to the physical page:
[   15.174066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.174392] flags: 0x200000000000000(node=0|zone=2)
[   15.174623] page_type: f5(slab)
[   15.175108] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.175499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.176103] page dumped because: kasan: bad access detected
[   15.176494] 
[   15.176604] Memory state around the buggy address:
[   15.177194]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.177497]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.177974] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.178449]                                      ^
[   15.179097]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.179396]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.179924] ==================================================================
[   15.970797] ==================================================================
[   15.971117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.971483] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.971847] 
[   15.971978] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.972020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.972031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.972051] Call Trace:
[   15.972066]  <TASK>
[   15.972080]  dump_stack_lvl+0x73/0xb0
[   15.972109]  print_report+0xd1/0x650
[   15.972132]  ? __virt_addr_valid+0x1db/0x2d0
[   15.972157]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.972179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.972205]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.972228]  kasan_report+0x141/0x180
[   15.972251]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.972278]  __asan_report_load4_noabort+0x18/0x20
[   15.972303]  kasan_atomics_helper+0x49ce/0x5450
[   15.972327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.972351]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.972378]  ? kasan_atomics+0x152/0x310
[   15.972405]  kasan_atomics+0x1dc/0x310
[   15.972428]  ? __pfx_kasan_atomics+0x10/0x10
[   15.972454]  ? __pfx_read_tsc+0x10/0x10
[   15.972476]  ? ktime_get_ts64+0x86/0x230
[   15.972501]  kunit_try_run_case+0x1a5/0x480
[   15.972526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972551]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.972576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.972622]  ? __kthread_parkme+0x82/0x180
[   15.972645]  ? preempt_count_sub+0x50/0x80
[   15.972677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.972729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.972767]  kthread+0x337/0x6f0
[   15.972787]  ? trace_preempt_on+0x20/0xc0
[   15.972812]  ? __pfx_kthread+0x10/0x10
[   15.972834]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.972857]  ? calculate_sigpending+0x7b/0xa0
[   15.972882]  ? __pfx_kthread+0x10/0x10
[   15.972905]  ret_from_fork+0x116/0x1d0
[   15.972925]  ? __pfx_kthread+0x10/0x10
[   15.972946]  ret_from_fork_asm+0x1a/0x30
[   15.972976]  </TASK>
[   15.972987] 
[   15.980199] Allocated by task 283:
[   15.980357]  kasan_save_stack+0x45/0x70
[   15.980558]  kasan_save_track+0x18/0x40
[   15.980861]  kasan_save_alloc_info+0x3b/0x50
[   15.981116]  __kasan_kmalloc+0xb7/0xc0
[   15.981318]  __kmalloc_cache_noprof+0x189/0x420
[   15.981538]  kasan_atomics+0x95/0x310
[   15.981700]  kunit_try_run_case+0x1a5/0x480
[   15.981924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.982120]  kthread+0x337/0x6f0
[   15.982347]  ret_from_fork+0x116/0x1d0
[   15.982520]  ret_from_fork_asm+0x1a/0x30
[   15.982700] 
[   15.982880] The buggy address belongs to the object at ffff888103ad1980
[   15.982880]  which belongs to the cache kmalloc-64 of size 64
[   15.983941] The buggy address is located 0 bytes to the right of
[   15.983941]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.985029] 
[   15.985155] The buggy address belongs to the physical page:
[   15.985417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.985664] flags: 0x200000000000000(node=0|zone=2)
[   15.986020] page_type: f5(slab)
[   15.986274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.986504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.986741] page dumped because: kasan: bad access detected
[   15.987175] 
[   15.987346] Memory state around the buggy address:
[   15.987799]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.988072]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.988290] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.988501]                                      ^
[   15.988678]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.989323]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.990062] ==================================================================
[   16.083045] ==================================================================
[   16.083375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   16.083833] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.084122] 
[   16.084231] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.084271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.084283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.084304] Call Trace:
[   16.084319]  <TASK>
[   16.084333]  dump_stack_lvl+0x73/0xb0
[   16.084362]  print_report+0xd1/0x650
[   16.084384]  ? __virt_addr_valid+0x1db/0x2d0
[   16.084407]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.084430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.084454]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.084477]  kasan_report+0x141/0x180
[   16.084500]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.084527]  kasan_check_range+0x10c/0x1c0
[   16.084551]  __kasan_check_write+0x18/0x20
[   16.084572]  kasan_atomics_helper+0x15b6/0x5450
[   16.084595]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.084618]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.084644]  ? kasan_atomics+0x152/0x310
[   16.084687]  kasan_atomics+0x1dc/0x310
[   16.084710]  ? __pfx_kasan_atomics+0x10/0x10
[   16.084735]  ? __pfx_read_tsc+0x10/0x10
[   16.084768]  ? ktime_get_ts64+0x86/0x230
[   16.084793]  kunit_try_run_case+0x1a5/0x480
[   16.084818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.084842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.084868]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.084894]  ? __kthread_parkme+0x82/0x180
[   16.084915]  ? preempt_count_sub+0x50/0x80
[   16.084940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.084965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.084991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.085018]  kthread+0x337/0x6f0
[   16.085039]  ? trace_preempt_on+0x20/0xc0
[   16.085063]  ? __pfx_kthread+0x10/0x10
[   16.085085]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.085108]  ? calculate_sigpending+0x7b/0xa0
[   16.085133]  ? __pfx_kthread+0x10/0x10
[   16.085155]  ret_from_fork+0x116/0x1d0
[   16.085175]  ? __pfx_kthread+0x10/0x10
[   16.085197]  ret_from_fork_asm+0x1a/0x30
[   16.085229]  </TASK>
[   16.085239] 
[   16.092731] Allocated by task 283:
[   16.092901]  kasan_save_stack+0x45/0x70
[   16.093089]  kasan_save_track+0x18/0x40
[   16.093270]  kasan_save_alloc_info+0x3b/0x50
[   16.093447]  __kasan_kmalloc+0xb7/0xc0
[   16.093581]  __kmalloc_cache_noprof+0x189/0x420
[   16.093953]  kasan_atomics+0x95/0x310
[   16.094144]  kunit_try_run_case+0x1a5/0x480
[   16.094338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.094564]  kthread+0x337/0x6f0
[   16.094758]  ret_from_fork+0x116/0x1d0
[   16.094899]  ret_from_fork_asm+0x1a/0x30
[   16.095038] 
[   16.095108] The buggy address belongs to the object at ffff888103ad1980
[   16.095108]  which belongs to the cache kmalloc-64 of size 64
[   16.095466] The buggy address is located 0 bytes to the right of
[   16.095466]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.096059] 
[   16.096156] The buggy address belongs to the physical page:
[   16.096411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.096776] flags: 0x200000000000000(node=0|zone=2)
[   16.097100] page_type: f5(slab)
[   16.097270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.097578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.098034] page dumped because: kasan: bad access detected
[   16.098247] 
[   16.098340] Memory state around the buggy address:
[   16.098521]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.098849]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.099237] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.099536]                                      ^
[   16.099779]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.100000]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.100213] ==================================================================
[   15.811078] ==================================================================
[   15.811475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.811916] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.812254] 
[   15.812375] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.812420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.812433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.812453] Call Trace:
[   15.812468]  <TASK>
[   15.812483]  dump_stack_lvl+0x73/0xb0
[   15.812546]  print_report+0xd1/0x650
[   15.812593]  ? __virt_addr_valid+0x1db/0x2d0
[   15.812665]  ? kasan_atomics_helper+0x1079/0x5450
[   15.812691]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.812727]  ? kasan_atomics_helper+0x1079/0x5450
[   15.812759]  kasan_report+0x141/0x180
[   15.812782]  ? kasan_atomics_helper+0x1079/0x5450
[   15.812810]  kasan_check_range+0x10c/0x1c0
[   15.812835]  __kasan_check_write+0x18/0x20
[   15.812855]  kasan_atomics_helper+0x1079/0x5450
[   15.812879]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.812904]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.812931]  ? kasan_atomics+0x152/0x310
[   15.812958]  kasan_atomics+0x1dc/0x310
[   15.812982]  ? __pfx_kasan_atomics+0x10/0x10
[   15.813009]  ? __pfx_read_tsc+0x10/0x10
[   15.813031]  ? ktime_get_ts64+0x86/0x230
[   15.813055]  kunit_try_run_case+0x1a5/0x480
[   15.813112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.813137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.813201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.813227]  ? __kthread_parkme+0x82/0x180
[   15.813259]  ? preempt_count_sub+0x50/0x80
[   15.813284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.813310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.813336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.813363]  kthread+0x337/0x6f0
[   15.813383]  ? trace_preempt_on+0x20/0xc0
[   15.813407]  ? __pfx_kthread+0x10/0x10
[   15.813428]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.813451]  ? calculate_sigpending+0x7b/0xa0
[   15.813477]  ? __pfx_kthread+0x10/0x10
[   15.813499]  ret_from_fork+0x116/0x1d0
[   15.813518]  ? __pfx_kthread+0x10/0x10
[   15.813539]  ret_from_fork_asm+0x1a/0x30
[   15.813571]  </TASK>
[   15.813582] 
[   15.821512] Allocated by task 283:
[   15.821722]  kasan_save_stack+0x45/0x70
[   15.821976]  kasan_save_track+0x18/0x40
[   15.822255]  kasan_save_alloc_info+0x3b/0x50
[   15.822506]  __kasan_kmalloc+0xb7/0xc0
[   15.822661]  __kmalloc_cache_noprof+0x189/0x420
[   15.822925]  kasan_atomics+0x95/0x310
[   15.823135]  kunit_try_run_case+0x1a5/0x480
[   15.823401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.823584]  kthread+0x337/0x6f0
[   15.823804]  ret_from_fork+0x116/0x1d0
[   15.824059]  ret_from_fork_asm+0x1a/0x30
[   15.824308] 
[   15.824401] The buggy address belongs to the object at ffff888103ad1980
[   15.824401]  which belongs to the cache kmalloc-64 of size 64
[   15.824975] The buggy address is located 0 bytes to the right of
[   15.824975]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.825469] 
[   15.825566] The buggy address belongs to the physical page:
[   15.825851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.826239] flags: 0x200000000000000(node=0|zone=2)
[   15.826498] page_type: f5(slab)
[   15.826725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.827058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.827288] page dumped because: kasan: bad access detected
[   15.827540] 
[   15.827632] Memory state around the buggy address:
[   15.827921]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.828246]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.828527] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.828877]                                      ^
[   15.829038]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.829354]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.829754] ==================================================================
[   16.150329] ==================================================================
[   16.151082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.151404] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.151842] 
[   16.151941] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.152023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.152036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.152057] Call Trace:
[   16.152084]  <TASK>
[   16.152101]  dump_stack_lvl+0x73/0xb0
[   16.152134]  print_report+0xd1/0x650
[   16.152376]  ? __virt_addr_valid+0x1db/0x2d0
[   16.152411]  ? kasan_atomics_helper+0x177f/0x5450
[   16.152435]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.152461]  ? kasan_atomics_helper+0x177f/0x5450
[   16.152485]  kasan_report+0x141/0x180
[   16.152509]  ? kasan_atomics_helper+0x177f/0x5450
[   16.152538]  kasan_check_range+0x10c/0x1c0
[   16.152563]  __kasan_check_write+0x18/0x20
[   16.152585]  kasan_atomics_helper+0x177f/0x5450
[   16.152610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.152636]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.152678]  ? kasan_atomics+0x152/0x310
[   16.152706]  kasan_atomics+0x1dc/0x310
[   16.152730]  ? __pfx_kasan_atomics+0x10/0x10
[   16.152768]  ? __pfx_read_tsc+0x10/0x10
[   16.152790]  ? ktime_get_ts64+0x86/0x230
[   16.152816]  kunit_try_run_case+0x1a5/0x480
[   16.152842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.152867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.152892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.152918]  ? __kthread_parkme+0x82/0x180
[   16.152941]  ? preempt_count_sub+0x50/0x80
[   16.152966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.152992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.153018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.153046]  kthread+0x337/0x6f0
[   16.153067]  ? trace_preempt_on+0x20/0xc0
[   16.153092]  ? __pfx_kthread+0x10/0x10
[   16.153115]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.153139]  ? calculate_sigpending+0x7b/0xa0
[   16.153164]  ? __pfx_kthread+0x10/0x10
[   16.153187]  ret_from_fork+0x116/0x1d0
[   16.153206]  ? __pfx_kthread+0x10/0x10
[   16.153229]  ret_from_fork_asm+0x1a/0x30
[   16.153260]  </TASK>
[   16.153272] 
[   16.164539] Allocated by task 283:
[   16.164932]  kasan_save_stack+0x45/0x70
[   16.165234]  kasan_save_track+0x18/0x40
[   16.165437]  kasan_save_alloc_info+0x3b/0x50
[   16.165630]  __kasan_kmalloc+0xb7/0xc0
[   16.166109]  __kmalloc_cache_noprof+0x189/0x420
[   16.166324]  kasan_atomics+0x95/0x310
[   16.166595]  kunit_try_run_case+0x1a5/0x480
[   16.166935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.167259]  kthread+0x337/0x6f0
[   16.167523]  ret_from_fork+0x116/0x1d0
[   16.167899]  ret_from_fork_asm+0x1a/0x30
[   16.168180] 
[   16.168283] The buggy address belongs to the object at ffff888103ad1980
[   16.168283]  which belongs to the cache kmalloc-64 of size 64
[   16.169004] The buggy address is located 0 bytes to the right of
[   16.169004]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.169712] 
[   16.169933] The buggy address belongs to the physical page:
[   16.170174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.170497] flags: 0x200000000000000(node=0|zone=2)
[   16.170932] page_type: f5(slab)
[   16.171211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.171636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.172132] page dumped because: kasan: bad access detected
[   16.172478] 
[   16.172671] Memory state around the buggy address:
[   16.173029]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.173437]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.173890] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.174239]                                      ^
[   16.174650]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.174996]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.175389] ==================================================================
[   16.495892] ==================================================================
[   16.496124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.496354] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.496576] 
[   16.496658] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.496721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.496734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.496774] Call Trace:
[   16.496787]  <TASK>
[   16.496801]  dump_stack_lvl+0x73/0xb0
[   16.496828]  print_report+0xd1/0x650
[   16.496851]  ? __virt_addr_valid+0x1db/0x2d0
[   16.496873]  ? kasan_atomics_helper+0x2006/0x5450
[   16.496896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.496920]  ? kasan_atomics_helper+0x2006/0x5450
[   16.496943]  kasan_report+0x141/0x180
[   16.496966]  ? kasan_atomics_helper+0x2006/0x5450
[   16.496994]  kasan_check_range+0x10c/0x1c0
[   16.497019]  __kasan_check_write+0x18/0x20
[   16.497039]  kasan_atomics_helper+0x2006/0x5450
[   16.497064]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.497088]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.497114]  ? kasan_atomics+0x152/0x310
[   16.497143]  kasan_atomics+0x1dc/0x310
[   16.497167]  ? __pfx_kasan_atomics+0x10/0x10
[   16.497192]  ? __pfx_read_tsc+0x10/0x10
[   16.497214]  ? ktime_get_ts64+0x86/0x230
[   16.497238]  kunit_try_run_case+0x1a5/0x480
[   16.497263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.497287]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.497312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.497337]  ? __kthread_parkme+0x82/0x180
[   16.497359]  ? preempt_count_sub+0x50/0x80
[   16.497383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.497409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.497435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.497462]  kthread+0x337/0x6f0
[   16.497482]  ? trace_preempt_on+0x20/0xc0
[   16.497506]  ? __pfx_kthread+0x10/0x10
[   16.497528]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.497551]  ? calculate_sigpending+0x7b/0xa0
[   16.497577]  ? __pfx_kthread+0x10/0x10
[   16.497601]  ret_from_fork+0x116/0x1d0
[   16.497622]  ? __pfx_kthread+0x10/0x10
[   16.497644]  ret_from_fork_asm+0x1a/0x30
[   16.497699]  </TASK>
[   16.497710] 
[   16.505488] Allocated by task 283:
[   16.505632]  kasan_save_stack+0x45/0x70
[   16.505854]  kasan_save_track+0x18/0x40
[   16.506154]  kasan_save_alloc_info+0x3b/0x50
[   16.506304]  __kasan_kmalloc+0xb7/0xc0
[   16.506443]  __kmalloc_cache_noprof+0x189/0x420
[   16.506599]  kasan_atomics+0x95/0x310
[   16.506731]  kunit_try_run_case+0x1a5/0x480
[   16.507196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.507480]  kthread+0x337/0x6f0
[   16.507653]  ret_from_fork+0x116/0x1d0
[   16.507975]  ret_from_fork_asm+0x1a/0x30
[   16.508198] 
[   16.508317] The buggy address belongs to the object at ffff888103ad1980
[   16.508317]  which belongs to the cache kmalloc-64 of size 64
[   16.508892] The buggy address is located 0 bytes to the right of
[   16.508892]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.509392] 
[   16.509480] The buggy address belongs to the physical page:
[   16.509763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.510110] flags: 0x200000000000000(node=0|zone=2)
[   16.510332] page_type: f5(slab)
[   16.510484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.510869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.511195] page dumped because: kasan: bad access detected
[   16.511450] 
[   16.511544] Memory state around the buggy address:
[   16.511791]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.512120]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.512437] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.512814]                                      ^
[   16.513042]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.513347]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.513559] ==================================================================
[   16.562975] ==================================================================
[   16.563562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.564298] Read of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.564998] 
[   16.565230] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.565294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.565308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.565329] Call Trace:
[   16.565350]  <TASK>
[   16.565368]  dump_stack_lvl+0x73/0xb0
[   16.565400]  print_report+0xd1/0x650
[   16.565423]  ? __virt_addr_valid+0x1db/0x2d0
[   16.565447]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.565471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.565495]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.565519]  kasan_report+0x141/0x180
[   16.565541]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.565569]  __asan_report_load8_noabort+0x18/0x20
[   16.565595]  kasan_atomics_helper+0x4fb2/0x5450
[   16.565619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.565643]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.565702]  ? kasan_atomics+0x152/0x310
[   16.565731]  kasan_atomics+0x1dc/0x310
[   16.565765]  ? __pfx_kasan_atomics+0x10/0x10
[   16.565790]  ? __pfx_read_tsc+0x10/0x10
[   16.565812]  ? ktime_get_ts64+0x86/0x230
[   16.565837]  kunit_try_run_case+0x1a5/0x480
[   16.565862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.565887]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.565913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.565938]  ? __kthread_parkme+0x82/0x180
[   16.565960]  ? preempt_count_sub+0x50/0x80
[   16.565984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.566010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.566036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.566063]  kthread+0x337/0x6f0
[   16.566083]  ? trace_preempt_on+0x20/0xc0
[   16.566107]  ? __pfx_kthread+0x10/0x10
[   16.566129]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.566153]  ? calculate_sigpending+0x7b/0xa0
[   16.566178]  ? __pfx_kthread+0x10/0x10
[   16.566200]  ret_from_fork+0x116/0x1d0
[   16.566219]  ? __pfx_kthread+0x10/0x10
[   16.566241]  ret_from_fork_asm+0x1a/0x30
[   16.566273]  </TASK>
[   16.566284] 
[   16.577564] Allocated by task 283:
[   16.577943]  kasan_save_stack+0x45/0x70
[   16.578265]  kasan_save_track+0x18/0x40
[   16.578662]  kasan_save_alloc_info+0x3b/0x50
[   16.579002]  __kasan_kmalloc+0xb7/0xc0
[   16.579200]  __kmalloc_cache_noprof+0x189/0x420
[   16.579404]  kasan_atomics+0x95/0x310
[   16.579578]  kunit_try_run_case+0x1a5/0x480
[   16.580090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.580465]  kthread+0x337/0x6f0
[   16.580629]  ret_from_fork+0x116/0x1d0
[   16.581059]  ret_from_fork_asm+0x1a/0x30
[   16.581376] 
[   16.581597] The buggy address belongs to the object at ffff888103ad1980
[   16.581597]  which belongs to the cache kmalloc-64 of size 64
[   16.582134] The buggy address is located 0 bytes to the right of
[   16.582134]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.582643] 
[   16.583034] The buggy address belongs to the physical page:
[   16.583475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.584117] flags: 0x200000000000000(node=0|zone=2)
[   16.584536] page_type: f5(slab)
[   16.584987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.585454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.586224] page dumped because: kasan: bad access detected
[   16.586680] 
[   16.586797] Memory state around the buggy address:
[   16.587159]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.587461]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.588117] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.588546]                                      ^
[   16.589069]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.589462]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.589956] ==================================================================
[   16.644914] ==================================================================
[   16.645458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.646123] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.646566] 
[   16.646661] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.646708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.646721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.646741] Call Trace:
[   16.646767]  <TASK>
[   16.646784]  dump_stack_lvl+0x73/0xb0
[   16.646816]  print_report+0xd1/0x650
[   16.646839]  ? __virt_addr_valid+0x1db/0x2d0
[   16.646864]  ? kasan_atomics_helper+0x224c/0x5450
[   16.646886]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.646911]  ? kasan_atomics_helper+0x224c/0x5450
[   16.646933]  kasan_report+0x141/0x180
[   16.646957]  ? kasan_atomics_helper+0x224c/0x5450
[   16.646984]  kasan_check_range+0x10c/0x1c0
[   16.647009]  __kasan_check_write+0x18/0x20
[   16.647030]  kasan_atomics_helper+0x224c/0x5450
[   16.647054]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.647078]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.647105]  ? kasan_atomics+0x152/0x310
[   16.647133]  kasan_atomics+0x1dc/0x310
[   16.647158]  ? __pfx_kasan_atomics+0x10/0x10
[   16.647183]  ? __pfx_read_tsc+0x10/0x10
[   16.647205]  ? ktime_get_ts64+0x86/0x230
[   16.647230]  kunit_try_run_case+0x1a5/0x480
[   16.647255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.647454]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.647499]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.647525]  ? __kthread_parkme+0x82/0x180
[   16.647548]  ? preempt_count_sub+0x50/0x80
[   16.647602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.647630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.647657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.647684]  kthread+0x337/0x6f0
[   16.647705]  ? trace_preempt_on+0x20/0xc0
[   16.647731]  ? __pfx_kthread+0x10/0x10
[   16.647768]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.647791]  ? calculate_sigpending+0x7b/0xa0
[   16.647816]  ? __pfx_kthread+0x10/0x10
[   16.647839]  ret_from_fork+0x116/0x1d0
[   16.647859]  ? __pfx_kthread+0x10/0x10
[   16.647881]  ret_from_fork_asm+0x1a/0x30
[   16.647913]  </TASK>
[   16.647924] 
[   16.659058] Allocated by task 283:
[   16.659245]  kasan_save_stack+0x45/0x70
[   16.659450]  kasan_save_track+0x18/0x40
[   16.659644]  kasan_save_alloc_info+0x3b/0x50
[   16.660170]  __kasan_kmalloc+0xb7/0xc0
[   16.660539]  __kmalloc_cache_noprof+0x189/0x420
[   16.661024]  kasan_atomics+0x95/0x310
[   16.661270]  kunit_try_run_case+0x1a5/0x480
[   16.661477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.661984]  kthread+0x337/0x6f0
[   16.662210]  ret_from_fork+0x116/0x1d0
[   16.662528]  ret_from_fork_asm+0x1a/0x30
[   16.662970] 
[   16.663085] The buggy address belongs to the object at ffff888103ad1980
[   16.663085]  which belongs to the cache kmalloc-64 of size 64
[   16.663575] The buggy address is located 0 bytes to the right of
[   16.663575]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.664803] 
[   16.664891] The buggy address belongs to the physical page:
[   16.665316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.666004] flags: 0x200000000000000(node=0|zone=2)
[   16.666470] page_type: f5(slab)
[   16.666729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.667238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.667881] page dumped because: kasan: bad access detected
[   16.668138] 
[   16.668229] Memory state around the buggy address:
[   16.668438]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.668952]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.669468] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.670087]                                      ^
[   16.670317]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.670617]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.671393] ==================================================================
[   15.476683] ==================================================================
[   15.477521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.478092] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.479099] 
[   15.479377] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.479423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.479466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.479487] Call Trace:
[   15.479503]  <TASK>
[   15.479520]  dump_stack_lvl+0x73/0xb0
[   15.479563]  print_report+0xd1/0x650
[   15.479586]  ? __virt_addr_valid+0x1db/0x2d0
[   15.479611]  ? kasan_atomics_helper+0x860/0x5450
[   15.479633]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.479672]  ? kasan_atomics_helper+0x860/0x5450
[   15.479696]  kasan_report+0x141/0x180
[   15.479719]  ? kasan_atomics_helper+0x860/0x5450
[   15.479756]  kasan_check_range+0x10c/0x1c0
[   15.479782]  __kasan_check_write+0x18/0x20
[   15.479803]  kasan_atomics_helper+0x860/0x5450
[   15.479826]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.479851]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.479878]  ? kasan_atomics+0x152/0x310
[   15.479905]  kasan_atomics+0x1dc/0x310
[   15.479929]  ? __pfx_kasan_atomics+0x10/0x10
[   15.479955]  ? __pfx_read_tsc+0x10/0x10
[   15.479977]  ? ktime_get_ts64+0x86/0x230
[   15.480003]  kunit_try_run_case+0x1a5/0x480
[   15.480028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.480053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.480079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.480105]  ? __kthread_parkme+0x82/0x180
[   15.480127]  ? preempt_count_sub+0x50/0x80
[   15.480152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.480178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.480204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.480231]  kthread+0x337/0x6f0
[   15.480252]  ? trace_preempt_on+0x20/0xc0
[   15.480277]  ? __pfx_kthread+0x10/0x10
[   15.480298]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.480322]  ? calculate_sigpending+0x7b/0xa0
[   15.480347]  ? __pfx_kthread+0x10/0x10
[   15.480370]  ret_from_fork+0x116/0x1d0
[   15.480390]  ? __pfx_kthread+0x10/0x10
[   15.480411]  ret_from_fork_asm+0x1a/0x30
[   15.480443]  </TASK>
[   15.480454] 
[   15.490951] Allocated by task 283:
[   15.491095]  kasan_save_stack+0x45/0x70
[   15.491260]  kasan_save_track+0x18/0x40
[   15.491462]  kasan_save_alloc_info+0x3b/0x50
[   15.491684]  __kasan_kmalloc+0xb7/0xc0
[   15.491955]  __kmalloc_cache_noprof+0x189/0x420
[   15.492158]  kasan_atomics+0x95/0x310
[   15.492463]  kunit_try_run_case+0x1a5/0x480
[   15.492810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.493089]  kthread+0x337/0x6f0
[   15.493305]  ret_from_fork+0x116/0x1d0
[   15.493462]  ret_from_fork_asm+0x1a/0x30
[   15.493600] 
[   15.493766] The buggy address belongs to the object at ffff888103ad1980
[   15.493766]  which belongs to the cache kmalloc-64 of size 64
[   15.494397] The buggy address is located 0 bytes to the right of
[   15.494397]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.495145] 
[   15.495284] The buggy address belongs to the physical page:
[   15.495916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.496301] flags: 0x200000000000000(node=0|zone=2)
[   15.496528] page_type: f5(slab)
[   15.496794] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.497108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.497330] page dumped because: kasan: bad access detected
[   15.497497] 
[   15.497593] Memory state around the buggy address:
[   15.497966]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.498337]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.498794] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.499106]                                      ^
[   15.499365]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.500060]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.500416] ==================================================================
[   16.534085] ==================================================================
[   16.534858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.535365] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.536434] 
[   16.536608] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.536670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.536683] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.536703] Call Trace:
[   16.536850]  <TASK>
[   16.536871]  dump_stack_lvl+0x73/0xb0
[   16.536906]  print_report+0xd1/0x650
[   16.536946]  ? __virt_addr_valid+0x1db/0x2d0
[   16.536977]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.537000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.537026]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.537050]  kasan_report+0x141/0x180
[   16.537073]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.537100]  kasan_check_range+0x10c/0x1c0
[   16.537126]  __kasan_check_write+0x18/0x20
[   16.537146]  kasan_atomics_helper+0x20c8/0x5450
[   16.537170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.537194]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.537220]  ? kasan_atomics+0x152/0x310
[   16.537247]  kasan_atomics+0x1dc/0x310
[   16.537270]  ? __pfx_kasan_atomics+0x10/0x10
[   16.537295]  ? __pfx_read_tsc+0x10/0x10
[   16.537318]  ? ktime_get_ts64+0x86/0x230
[   16.537345]  kunit_try_run_case+0x1a5/0x480
[   16.537370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.537395]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.537421]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.537446]  ? __kthread_parkme+0x82/0x180
[   16.537467]  ? preempt_count_sub+0x50/0x80
[   16.537492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.537518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.537544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.537571]  kthread+0x337/0x6f0
[   16.537591]  ? trace_preempt_on+0x20/0xc0
[   16.537616]  ? __pfx_kthread+0x10/0x10
[   16.537637]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.537689]  ? calculate_sigpending+0x7b/0xa0
[   16.537716]  ? __pfx_kthread+0x10/0x10
[   16.537739]  ret_from_fork+0x116/0x1d0
[   16.537769]  ? __pfx_kthread+0x10/0x10
[   16.537790]  ret_from_fork_asm+0x1a/0x30
[   16.537823]  </TASK>
[   16.537835] 
[   16.549783] Allocated by task 283:
[   16.549965]  kasan_save_stack+0x45/0x70
[   16.550154]  kasan_save_track+0x18/0x40
[   16.550329]  kasan_save_alloc_info+0x3b/0x50
[   16.550528]  __kasan_kmalloc+0xb7/0xc0
[   16.551008]  __kmalloc_cache_noprof+0x189/0x420
[   16.551363]  kasan_atomics+0x95/0x310
[   16.551545]  kunit_try_run_case+0x1a5/0x480
[   16.552003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.552436]  kthread+0x337/0x6f0
[   16.552838]  ret_from_fork+0x116/0x1d0
[   16.553287]  ret_from_fork_asm+0x1a/0x30
[   16.553569] 
[   16.553824] The buggy address belongs to the object at ffff888103ad1980
[   16.553824]  which belongs to the cache kmalloc-64 of size 64
[   16.554731] The buggy address is located 0 bytes to the right of
[   16.554731]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.555631] 
[   16.556018] The buggy address belongs to the physical page:
[   16.556283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.556615] flags: 0x200000000000000(node=0|zone=2)
[   16.557079] page_type: f5(slab)
[   16.557399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.557998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.558414] page dumped because: kasan: bad access detected
[   16.558834] 
[   16.558943] Memory state around the buggy address:
[   16.559152]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.559437]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.560004] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.560523]                                      ^
[   16.560964]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.561402]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.561944] ==================================================================
[   15.905959] ==================================================================
[   15.906282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.906616] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.907691] 
[   15.907895] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.908059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.908074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.908096] Call Trace:
[   15.908111]  <TASK>
[   15.908127]  dump_stack_lvl+0x73/0xb0
[   15.908159]  print_report+0xd1/0x650
[   15.908183]  ? __virt_addr_valid+0x1db/0x2d0
[   15.908207]  ? kasan_atomics_helper+0x1217/0x5450
[   15.908230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.908254]  ? kasan_atomics_helper+0x1217/0x5450
[   15.908278]  kasan_report+0x141/0x180
[   15.908301]  ? kasan_atomics_helper+0x1217/0x5450
[   15.908328]  kasan_check_range+0x10c/0x1c0
[   15.908353]  __kasan_check_write+0x18/0x20
[   15.908374]  kasan_atomics_helper+0x1217/0x5450
[   15.908399]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.908423]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.908450]  ? kasan_atomics+0x152/0x310
[   15.908477]  kasan_atomics+0x1dc/0x310
[   15.908501]  ? __pfx_kasan_atomics+0x10/0x10
[   15.908527]  ? __pfx_read_tsc+0x10/0x10
[   15.908550]  ? ktime_get_ts64+0x86/0x230
[   15.908575]  kunit_try_run_case+0x1a5/0x480
[   15.908601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.908625]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.908803]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.908835]  ? __kthread_parkme+0x82/0x180
[   15.908857]  ? preempt_count_sub+0x50/0x80
[   15.908882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.908908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.908935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.908963]  kthread+0x337/0x6f0
[   15.908985]  ? trace_preempt_on+0x20/0xc0
[   15.909010]  ? __pfx_kthread+0x10/0x10
[   15.909032]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.909055]  ? calculate_sigpending+0x7b/0xa0
[   15.909080]  ? __pfx_kthread+0x10/0x10
[   15.909102]  ret_from_fork+0x116/0x1d0
[   15.909122]  ? __pfx_kthread+0x10/0x10
[   15.909144]  ret_from_fork_asm+0x1a/0x30
[   15.909175]  </TASK>
[   15.909187] 
[   15.920477] Allocated by task 283:
[   15.920827]  kasan_save_stack+0x45/0x70
[   15.921267]  kasan_save_track+0x18/0x40
[   15.921619]  kasan_save_alloc_info+0x3b/0x50
[   15.921929]  __kasan_kmalloc+0xb7/0xc0
[   15.922061]  __kmalloc_cache_noprof+0x189/0x420
[   15.922212]  kasan_atomics+0x95/0x310
[   15.922342]  kunit_try_run_case+0x1a5/0x480
[   15.922491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.922684]  kthread+0x337/0x6f0
[   15.923005]  ret_from_fork+0x116/0x1d0
[   15.923339]  ret_from_fork_asm+0x1a/0x30
[   15.923730] 
[   15.923897] The buggy address belongs to the object at ffff888103ad1980
[   15.923897]  which belongs to the cache kmalloc-64 of size 64
[   15.925048] The buggy address is located 0 bytes to the right of
[   15.925048]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.926315] 
[   15.926518] The buggy address belongs to the physical page:
[   15.927047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.927670] flags: 0x200000000000000(node=0|zone=2)
[   15.928124] page_type: f5(slab)
[   15.928246] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.928469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.928779] page dumped because: kasan: bad access detected
[   15.929255] 
[   15.929410] Memory state around the buggy address:
[   15.929834]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.930511]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.931335] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.932074]                                      ^
[   15.932406]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.932613]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.933187] ==================================================================
[   15.708658] ==================================================================
[   15.709486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.710230] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.710936] 
[   15.711112] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.711157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.711170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.711190] Call Trace:
[   15.711207]  <TASK>
[   15.711225]  dump_stack_lvl+0x73/0xb0
[   15.711254]  print_report+0xd1/0x650
[   15.711278]  ? __virt_addr_valid+0x1db/0x2d0
[   15.711302]  ? kasan_atomics_helper+0xe78/0x5450
[   15.711323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.711348]  ? kasan_atomics_helper+0xe78/0x5450
[   15.711371]  kasan_report+0x141/0x180
[   15.711393]  ? kasan_atomics_helper+0xe78/0x5450
[   15.711421]  kasan_check_range+0x10c/0x1c0
[   15.711445]  __kasan_check_write+0x18/0x20
[   15.711466]  kasan_atomics_helper+0xe78/0x5450
[   15.711489]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.711513]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.711541]  ? kasan_atomics+0x152/0x310
[   15.711567]  kasan_atomics+0x1dc/0x310
[   15.711591]  ? __pfx_kasan_atomics+0x10/0x10
[   15.711616]  ? __pfx_read_tsc+0x10/0x10
[   15.711638]  ? ktime_get_ts64+0x86/0x230
[   15.711686]  kunit_try_run_case+0x1a5/0x480
[   15.711711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.711766]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.711794]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.711820]  ? __kthread_parkme+0x82/0x180
[   15.711841]  ? preempt_count_sub+0x50/0x80
[   15.711866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.711892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.711917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.711944]  kthread+0x337/0x6f0
[   15.711964]  ? trace_preempt_on+0x20/0xc0
[   15.711988]  ? __pfx_kthread+0x10/0x10
[   15.712010]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.712033]  ? calculate_sigpending+0x7b/0xa0
[   15.712058]  ? __pfx_kthread+0x10/0x10
[   15.712081]  ret_from_fork+0x116/0x1d0
[   15.712100]  ? __pfx_kthread+0x10/0x10
[   15.712121]  ret_from_fork_asm+0x1a/0x30
[   15.712153]  </TASK>
[   15.712164] 
[   15.724942] Allocated by task 283:
[   15.725235]  kasan_save_stack+0x45/0x70
[   15.725379]  kasan_save_track+0x18/0x40
[   15.725511]  kasan_save_alloc_info+0x3b/0x50
[   15.725683]  __kasan_kmalloc+0xb7/0xc0
[   15.726058]  __kmalloc_cache_noprof+0x189/0x420
[   15.726502]  kasan_atomics+0x95/0x310
[   15.726896]  kunit_try_run_case+0x1a5/0x480
[   15.727296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.727781]  kthread+0x337/0x6f0
[   15.728178]  ret_from_fork+0x116/0x1d0
[   15.728459]  ret_from_fork_asm+0x1a/0x30
[   15.728597] 
[   15.728685] The buggy address belongs to the object at ffff888103ad1980
[   15.728685]  which belongs to the cache kmalloc-64 of size 64
[   15.729282] The buggy address is located 0 bytes to the right of
[   15.729282]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.729636] 
[   15.729844] The buggy address belongs to the physical page:
[   15.730364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.731124] flags: 0x200000000000000(node=0|zone=2)
[   15.731572] page_type: f5(slab)
[   15.731933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.732592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.733182] page dumped because: kasan: bad access detected
[   15.733712] 
[   15.733843] Memory state around the buggy address:
[   15.734115]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.734536]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.734782] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.735287]                                      ^
[   15.735440]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.735677]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.736327] ==================================================================
[   16.441786] ==================================================================
[   16.442130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.442356] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.442584] 
[   16.442677] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.442718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.442731] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.442764] Call Trace:
[   16.442780]  <TASK>
[   16.442795]  dump_stack_lvl+0x73/0xb0
[   16.442823]  print_report+0xd1/0x650
[   16.442848]  ? __virt_addr_valid+0x1db/0x2d0
[   16.442875]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.442898]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.442923]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.442947]  kasan_report+0x141/0x180
[   16.442983]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.443012]  kasan_check_range+0x10c/0x1c0
[   16.443037]  __kasan_check_write+0x18/0x20
[   16.443068]  kasan_atomics_helper+0x1eaa/0x5450
[   16.443093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.443118]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.443145]  ? kasan_atomics+0x152/0x310
[   16.443172]  kasan_atomics+0x1dc/0x310
[   16.443196]  ? __pfx_kasan_atomics+0x10/0x10
[   16.443222]  ? __pfx_read_tsc+0x10/0x10
[   16.443243]  ? ktime_get_ts64+0x86/0x230
[   16.443277]  kunit_try_run_case+0x1a5/0x480
[   16.443302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.443337]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.443363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.443388]  ? __kthread_parkme+0x82/0x180
[   16.443410]  ? preempt_count_sub+0x50/0x80
[   16.443435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.443460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.443486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.443522]  kthread+0x337/0x6f0
[   16.443543]  ? trace_preempt_on+0x20/0xc0
[   16.443568]  ? __pfx_kthread+0x10/0x10
[   16.443601]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.443624]  ? calculate_sigpending+0x7b/0xa0
[   16.443650]  ? __pfx_kthread+0x10/0x10
[   16.443675]  ret_from_fork+0x116/0x1d0
[   16.443696]  ? __pfx_kthread+0x10/0x10
[   16.443726]  ret_from_fork_asm+0x1a/0x30
[   16.443772]  </TASK>
[   16.443785] 
[   16.451702] Allocated by task 283:
[   16.451863]  kasan_save_stack+0x45/0x70
[   16.452069]  kasan_save_track+0x18/0x40
[   16.452200]  kasan_save_alloc_info+0x3b/0x50
[   16.452417]  __kasan_kmalloc+0xb7/0xc0
[   16.452547]  __kmalloc_cache_noprof+0x189/0x420
[   16.452934]  kasan_atomics+0x95/0x310
[   16.453097]  kunit_try_run_case+0x1a5/0x480
[   16.453321]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.453531]  kthread+0x337/0x6f0
[   16.453647]  ret_from_fork+0x116/0x1d0
[   16.453853]  ret_from_fork_asm+0x1a/0x30
[   16.454050] 
[   16.454165] The buggy address belongs to the object at ffff888103ad1980
[   16.454165]  which belongs to the cache kmalloc-64 of size 64
[   16.454662] The buggy address is located 0 bytes to the right of
[   16.454662]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.455139] 
[   16.455238] The buggy address belongs to the physical page:
[   16.455490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.455922] flags: 0x200000000000000(node=0|zone=2)
[   16.456149] page_type: f5(slab)
[   16.456265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.456586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.456940] page dumped because: kasan: bad access detected
[   16.457108] 
[   16.457175] Memory state around the buggy address:
[   16.457325]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.457532]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.457795] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.458202]                                      ^
[   16.458461]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.458833]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.459105] ==================================================================
[   15.124478] ==================================================================
[   15.125048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.125483] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.125956] 
[   15.126341] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.126396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.126410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.126429] Call Trace:
[   15.126445]  <TASK>
[   15.126462]  dump_stack_lvl+0x73/0xb0
[   15.126493]  print_report+0xd1/0x650
[   15.126516]  ? __virt_addr_valid+0x1db/0x2d0
[   15.126539]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.126561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.126585]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.126607]  kasan_report+0x141/0x180
[   15.126629]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.126656]  __asan_report_store4_noabort+0x1b/0x30
[   15.126801]  kasan_atomics_helper+0x4ba2/0x5450
[   15.126828]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.126852]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.126880]  ? kasan_atomics+0x152/0x310
[   15.126907]  kasan_atomics+0x1dc/0x310
[   15.126930]  ? __pfx_kasan_atomics+0x10/0x10
[   15.126954]  ? __pfx_read_tsc+0x10/0x10
[   15.126975]  ? ktime_get_ts64+0x86/0x230
[   15.127001]  kunit_try_run_case+0x1a5/0x480
[   15.127026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.127050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.127076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.127100]  ? __kthread_parkme+0x82/0x180
[   15.127122]  ? preempt_count_sub+0x50/0x80
[   15.127146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.127171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.127196]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.127222]  kthread+0x337/0x6f0
[   15.127242]  ? trace_preempt_on+0x20/0xc0
[   15.127265]  ? __pfx_kthread+0x10/0x10
[   15.127286]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.127308]  ? calculate_sigpending+0x7b/0xa0
[   15.127333]  ? __pfx_kthread+0x10/0x10
[   15.127355]  ret_from_fork+0x116/0x1d0
[   15.127373]  ? __pfx_kthread+0x10/0x10
[   15.127394]  ret_from_fork_asm+0x1a/0x30
[   15.127425]  </TASK>
[   15.127436] 
[   15.139239] Allocated by task 283:
[   15.139598]  kasan_save_stack+0x45/0x70
[   15.139822]  kasan_save_track+0x18/0x40
[   15.140133]  kasan_save_alloc_info+0x3b/0x50
[   15.140316]  __kasan_kmalloc+0xb7/0xc0
[   15.140505]  __kmalloc_cache_noprof+0x189/0x420
[   15.140692]  kasan_atomics+0x95/0x310
[   15.141214]  kunit_try_run_case+0x1a5/0x480
[   15.141475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.141853]  kthread+0x337/0x6f0
[   15.142231]  ret_from_fork+0x116/0x1d0
[   15.142548]  ret_from_fork_asm+0x1a/0x30
[   15.142866] 
[   15.142969] The buggy address belongs to the object at ffff888103ad1980
[   15.142969]  which belongs to the cache kmalloc-64 of size 64
[   15.143656] The buggy address is located 0 bytes to the right of
[   15.143656]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.144390] 
[   15.144659] The buggy address belongs to the physical page:
[   15.144947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.145400] flags: 0x200000000000000(node=0|zone=2)
[   15.145686] page_type: f5(slab)
[   15.146034] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.146365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.146937] page dumped because: kasan: bad access detected
[   15.147265] 
[   15.147363] Memory state around the buggy address:
[   15.147621]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.148165]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.148551] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.149116]                                      ^
[   15.149413]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.149847]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.150168] ==================================================================
[   16.423729] ==================================================================
[   16.424149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.424385] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.424634] 
[   16.424743] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.424795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.424807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.424829] Call Trace:
[   16.424845]  <TASK>
[   16.424861]  dump_stack_lvl+0x73/0xb0
[   16.424888]  print_report+0xd1/0x650
[   16.424910]  ? __virt_addr_valid+0x1db/0x2d0
[   16.424932]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.424988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.425014]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.425037]  kasan_report+0x141/0x180
[   16.425072]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.425099]  kasan_check_range+0x10c/0x1c0
[   16.425124]  __kasan_check_write+0x18/0x20
[   16.425145]  kasan_atomics_helper+0x1e12/0x5450
[   16.425169]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.425193]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.425220]  ? kasan_atomics+0x152/0x310
[   16.425247]  kasan_atomics+0x1dc/0x310
[   16.425270]  ? __pfx_kasan_atomics+0x10/0x10
[   16.425296]  ? __pfx_read_tsc+0x10/0x10
[   16.425317]  ? ktime_get_ts64+0x86/0x230
[   16.425342]  kunit_try_run_case+0x1a5/0x480
[   16.425367]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.425392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.425418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.425443]  ? __kthread_parkme+0x82/0x180
[   16.425464]  ? preempt_count_sub+0x50/0x80
[   16.425489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.425515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.425541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.425578]  kthread+0x337/0x6f0
[   16.425599]  ? trace_preempt_on+0x20/0xc0
[   16.425624]  ? __pfx_kthread+0x10/0x10
[   16.425664]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.425687]  ? calculate_sigpending+0x7b/0xa0
[   16.425712]  ? __pfx_kthread+0x10/0x10
[   16.425742]  ret_from_fork+0x116/0x1d0
[   16.425775]  ? __pfx_kthread+0x10/0x10
[   16.425798]  ret_from_fork_asm+0x1a/0x30
[   16.425830]  </TASK>
[   16.425841] 
[   16.433523] Allocated by task 283:
[   16.433678]  kasan_save_stack+0x45/0x70
[   16.433904]  kasan_save_track+0x18/0x40
[   16.434106]  kasan_save_alloc_info+0x3b/0x50
[   16.434314]  __kasan_kmalloc+0xb7/0xc0
[   16.434491]  __kmalloc_cache_noprof+0x189/0x420
[   16.434650]  kasan_atomics+0x95/0x310
[   16.434794]  kunit_try_run_case+0x1a5/0x480
[   16.434983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.435251]  kthread+0x337/0x6f0
[   16.435420]  ret_from_fork+0x116/0x1d0
[   16.435606]  ret_from_fork_asm+0x1a/0x30
[   16.435813] 
[   16.435927] The buggy address belongs to the object at ffff888103ad1980
[   16.435927]  which belongs to the cache kmalloc-64 of size 64
[   16.436336] The buggy address is located 0 bytes to the right of
[   16.436336]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.436985] 
[   16.437081] The buggy address belongs to the physical page:
[   16.437331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.437724] flags: 0x200000000000000(node=0|zone=2)
[   16.437928] page_type: f5(slab)
[   16.438116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.438428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.438779] page dumped because: kasan: bad access detected
[   16.439018] 
[   16.439138] Memory state around the buggy address:
[   16.439297]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.439506]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.439710] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.439927]                                      ^
[   16.440074]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.440603]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.441221] ==================================================================
[   15.591783] ==================================================================
[   15.592164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.592554] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.592987] 
[   15.593127] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.593171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.593184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.593216] Call Trace:
[   15.593233]  <TASK>
[   15.593275]  dump_stack_lvl+0x73/0xb0
[   15.593306]  print_report+0xd1/0x650
[   15.593329]  ? __virt_addr_valid+0x1db/0x2d0
[   15.593363]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.593402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.593436]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.593459]  kasan_report+0x141/0x180
[   15.593492]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.593519]  kasan_check_range+0x10c/0x1c0
[   15.593544]  __kasan_check_write+0x18/0x20
[   15.593565]  kasan_atomics_helper+0xb6a/0x5450
[   15.593589]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.593612]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.593639]  ? kasan_atomics+0x152/0x310
[   15.593673]  kasan_atomics+0x1dc/0x310
[   15.593697]  ? __pfx_kasan_atomics+0x10/0x10
[   15.593764]  ? __pfx_read_tsc+0x10/0x10
[   15.593786]  ? ktime_get_ts64+0x86/0x230
[   15.593811]  kunit_try_run_case+0x1a5/0x480
[   15.593837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.593861]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.593914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.593939]  ? __kthread_parkme+0x82/0x180
[   15.593988]  ? preempt_count_sub+0x50/0x80
[   15.594028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.594067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.594118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.594158]  kthread+0x337/0x6f0
[   15.594179]  ? trace_preempt_on+0x20/0xc0
[   15.594203]  ? __pfx_kthread+0x10/0x10
[   15.594225]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.594248]  ? calculate_sigpending+0x7b/0xa0
[   15.594282]  ? __pfx_kthread+0x10/0x10
[   15.594305]  ret_from_fork+0x116/0x1d0
[   15.594325]  ? __pfx_kthread+0x10/0x10
[   15.594356]  ret_from_fork_asm+0x1a/0x30
[   15.594392]  </TASK>
[   15.594403] 
[   15.601206] Allocated by task 283:
[   15.601330]  kasan_save_stack+0x45/0x70
[   15.601471]  kasan_save_track+0x18/0x40
[   15.601772]  kasan_save_alloc_info+0x3b/0x50
[   15.601977]  __kasan_kmalloc+0xb7/0xc0
[   15.602178]  __kmalloc_cache_noprof+0x189/0x420
[   15.602394]  kasan_atomics+0x95/0x310
[   15.602565]  kunit_try_run_case+0x1a5/0x480
[   15.602851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.603212]  kthread+0x337/0x6f0
[   15.603432]  ret_from_fork+0x116/0x1d0
[   15.603628]  ret_from_fork_asm+0x1a/0x30
[   15.603851] 
[   15.604017] The buggy address belongs to the object at ffff888103ad1980
[   15.604017]  which belongs to the cache kmalloc-64 of size 64
[   15.604595] The buggy address is located 0 bytes to the right of
[   15.604595]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.605438] 
[   15.605551] The buggy address belongs to the physical page:
[   15.606793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.607319] flags: 0x200000000000000(node=0|zone=2)
[   15.607481] page_type: f5(slab)
[   15.607600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.608685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.609028] page dumped because: kasan: bad access detected
[   15.609208] 
[   15.609279] Memory state around the buggy address:
[   15.609500]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.613075]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.613996] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.614709]                                      ^
[   15.615377]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.616237]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.616540] ==================================================================
[   16.373441] ==================================================================
[   16.373828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.374130] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.374442] 
[   16.374538] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.374580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.374594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.374614] Call Trace:
[   16.374631]  <TASK>
[   16.374648]  dump_stack_lvl+0x73/0xb0
[   16.374677]  print_report+0xd1/0x650
[   16.374701]  ? __virt_addr_valid+0x1db/0x2d0
[   16.374724]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.374759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.374783]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.374806]  kasan_report+0x141/0x180
[   16.374830]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.374857]  kasan_check_range+0x10c/0x1c0
[   16.374882]  __kasan_check_write+0x18/0x20
[   16.374903]  kasan_atomics_helper+0x1ce1/0x5450
[   16.374926]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.374951]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.374977]  ? kasan_atomics+0x152/0x310
[   16.375005]  kasan_atomics+0x1dc/0x310
[   16.375028]  ? __pfx_kasan_atomics+0x10/0x10
[   16.375054]  ? __pfx_read_tsc+0x10/0x10
[   16.375076]  ? ktime_get_ts64+0x86/0x230
[   16.375103]  kunit_try_run_case+0x1a5/0x480
[   16.375128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.375154]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.375180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.375205]  ? __kthread_parkme+0x82/0x180
[   16.375226]  ? preempt_count_sub+0x50/0x80
[   16.375251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.375277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.375303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.375330]  kthread+0x337/0x6f0
[   16.375350]  ? trace_preempt_on+0x20/0xc0
[   16.375374]  ? __pfx_kthread+0x10/0x10
[   16.375396]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.375420]  ? calculate_sigpending+0x7b/0xa0
[   16.375445]  ? __pfx_kthread+0x10/0x10
[   16.375467]  ret_from_fork+0x116/0x1d0
[   16.375486]  ? __pfx_kthread+0x10/0x10
[   16.375507]  ret_from_fork_asm+0x1a/0x30
[   16.375538]  </TASK>
[   16.375550] 
[   16.383853] Allocated by task 283:
[   16.383981]  kasan_save_stack+0x45/0x70
[   16.384122]  kasan_save_track+0x18/0x40
[   16.384253]  kasan_save_alloc_info+0x3b/0x50
[   16.384399]  __kasan_kmalloc+0xb7/0xc0
[   16.384532]  __kmalloc_cache_noprof+0x189/0x420
[   16.384684]  kasan_atomics+0x95/0x310
[   16.384827]  kunit_try_run_case+0x1a5/0x480
[   16.384972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.385142]  kthread+0x337/0x6f0
[   16.385261]  ret_from_fork+0x116/0x1d0
[   16.385967]  ret_from_fork_asm+0x1a/0x30
[   16.386180] 
[   16.386277] The buggy address belongs to the object at ffff888103ad1980
[   16.386277]  which belongs to the cache kmalloc-64 of size 64
[   16.386835] The buggy address is located 0 bytes to the right of
[   16.386835]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.387235] 
[   16.387327] The buggy address belongs to the physical page:
[   16.387568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.390553] flags: 0x200000000000000(node=0|zone=2)
[   16.390811] page_type: f5(slab)
[   16.391066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.391851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.392099] page dumped because: kasan: bad access detected
[   16.392274] 
[   16.392347] Memory state around the buggy address:
[   16.392502]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.392724]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.393739] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.394797]                                      ^
[   16.395498]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.396394]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.397068] ==================================================================
[   16.398321] ==================================================================
[   16.398570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.399986] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.400806] 
[   16.401117] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.401173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.401187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.401208] Call Trace:
[   16.401223]  <TASK>
[   16.401240]  dump_stack_lvl+0x73/0xb0
[   16.401271]  print_report+0xd1/0x650
[   16.401294]  ? __virt_addr_valid+0x1db/0x2d0
[   16.401320]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.401343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.401368]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.401391]  kasan_report+0x141/0x180
[   16.401414]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.401442]  kasan_check_range+0x10c/0x1c0
[   16.401467]  __kasan_check_write+0x18/0x20
[   16.401488]  kasan_atomics_helper+0x1d7a/0x5450
[   16.401512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.401536]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.401562]  ? kasan_atomics+0x152/0x310
[   16.401589]  kasan_atomics+0x1dc/0x310
[   16.401613]  ? __pfx_kasan_atomics+0x10/0x10
[   16.401639]  ? __pfx_read_tsc+0x10/0x10
[   16.401793]  ? ktime_get_ts64+0x86/0x230
[   16.401824]  kunit_try_run_case+0x1a5/0x480
[   16.401888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.401914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.401940]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.401967]  ? __kthread_parkme+0x82/0x180
[   16.401988]  ? preempt_count_sub+0x50/0x80
[   16.402014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.402040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.402066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.402093]  kthread+0x337/0x6f0
[   16.402114]  ? trace_preempt_on+0x20/0xc0
[   16.402138]  ? __pfx_kthread+0x10/0x10
[   16.402159]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.402183]  ? calculate_sigpending+0x7b/0xa0
[   16.402208]  ? __pfx_kthread+0x10/0x10
[   16.402231]  ret_from_fork+0x116/0x1d0
[   16.402250]  ? __pfx_kthread+0x10/0x10
[   16.402272]  ret_from_fork_asm+0x1a/0x30
[   16.402302]  </TASK>
[   16.402314] 
[   16.415183] Allocated by task 283:
[   16.415379]  kasan_save_stack+0x45/0x70
[   16.415548]  kasan_save_track+0x18/0x40
[   16.415804]  kasan_save_alloc_info+0x3b/0x50
[   16.415959]  __kasan_kmalloc+0xb7/0xc0
[   16.416117]  __kmalloc_cache_noprof+0x189/0x420
[   16.416341]  kasan_atomics+0x95/0x310
[   16.416533]  kunit_try_run_case+0x1a5/0x480
[   16.416776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.416995]  kthread+0x337/0x6f0
[   16.417117]  ret_from_fork+0x116/0x1d0
[   16.417301]  ret_from_fork_asm+0x1a/0x30
[   16.417501] 
[   16.417599] The buggy address belongs to the object at ffff888103ad1980
[   16.417599]  which belongs to the cache kmalloc-64 of size 64
[   16.418197] The buggy address is located 0 bytes to the right of
[   16.418197]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.418647] 
[   16.418721] The buggy address belongs to the physical page:
[   16.418969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.419313] flags: 0x200000000000000(node=0|zone=2)
[   16.419478] page_type: f5(slab)
[   16.419614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.420359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.420673] page dumped because: kasan: bad access detected
[   16.420939] 
[   16.421025] Memory state around the buggy address:
[   16.421250]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.421552]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.421869] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.422168]                                      ^
[   16.422384]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.422758]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.423048] ==================================================================
[   16.459491] ==================================================================
[   16.459783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.460278] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.460609] 
[   16.460741] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.460800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.460812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.460832] Call Trace:
[   16.460847]  <TASK>
[   16.460863]  dump_stack_lvl+0x73/0xb0
[   16.460891]  print_report+0xd1/0x650
[   16.460914]  ? __virt_addr_valid+0x1db/0x2d0
[   16.460937]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.460970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.460994]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.461017]  kasan_report+0x141/0x180
[   16.461051]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.461078]  kasan_check_range+0x10c/0x1c0
[   16.461103]  __kasan_check_write+0x18/0x20
[   16.461124]  kasan_atomics_helper+0x1f43/0x5450
[   16.461148]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.461172]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.461198]  ? kasan_atomics+0x152/0x310
[   16.461225]  kasan_atomics+0x1dc/0x310
[   16.461249]  ? __pfx_kasan_atomics+0x10/0x10
[   16.461274]  ? __pfx_read_tsc+0x10/0x10
[   16.461296]  ? ktime_get_ts64+0x86/0x230
[   16.461322]  kunit_try_run_case+0x1a5/0x480
[   16.461347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.461371]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.461397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.461422]  ? __kthread_parkme+0x82/0x180
[   16.461443]  ? preempt_count_sub+0x50/0x80
[   16.461468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.461494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.461520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.461547]  kthread+0x337/0x6f0
[   16.461568]  ? trace_preempt_on+0x20/0xc0
[   16.461592]  ? __pfx_kthread+0x10/0x10
[   16.461614]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.461637]  ? calculate_sigpending+0x7b/0xa0
[   16.461672]  ? __pfx_kthread+0x10/0x10
[   16.461694]  ret_from_fork+0x116/0x1d0
[   16.461714]  ? __pfx_kthread+0x10/0x10
[   16.461736]  ret_from_fork_asm+0x1a/0x30
[   16.461777]  </TASK>
[   16.461788] 
[   16.469176] Allocated by task 283:
[   16.469303]  kasan_save_stack+0x45/0x70
[   16.469444]  kasan_save_track+0x18/0x40
[   16.469581]  kasan_save_alloc_info+0x3b/0x50
[   16.469945]  __kasan_kmalloc+0xb7/0xc0
[   16.470137]  __kmalloc_cache_noprof+0x189/0x420
[   16.470385]  kasan_atomics+0x95/0x310
[   16.470574]  kunit_try_run_case+0x1a5/0x480
[   16.470945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.471119]  kthread+0x337/0x6f0
[   16.471239]  ret_from_fork+0x116/0x1d0
[   16.471370]  ret_from_fork_asm+0x1a/0x30
[   16.471507] 
[   16.471575] The buggy address belongs to the object at ffff888103ad1980
[   16.471575]  which belongs to the cache kmalloc-64 of size 64
[   16.472409] The buggy address is located 0 bytes to the right of
[   16.472409]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.473016] 
[   16.473130] The buggy address belongs to the physical page:
[   16.473439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.473841] flags: 0x200000000000000(node=0|zone=2)
[   16.474102] page_type: f5(slab)
[   16.474244] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.474482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.474972] page dumped because: kasan: bad access detected
[   16.475228] 
[   16.475345] Memory state around the buggy address:
[   16.475549]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.475889]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.476197] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.476494]                                      ^
[   16.476730]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.477035]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.477331] ==================================================================
[   15.830484] ==================================================================
[   15.830799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.831291] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.831630] 
[   15.831771] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.831847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.831860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.831881] Call Trace:
[   15.831898]  <TASK>
[   15.831924]  dump_stack_lvl+0x73/0xb0
[   15.831953]  print_report+0xd1/0x650
[   15.831977]  ? __virt_addr_valid+0x1db/0x2d0
[   15.832000]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.832023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.832047]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.832070]  kasan_report+0x141/0x180
[   15.832093]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.832121]  __asan_report_load4_noabort+0x18/0x20
[   15.832147]  kasan_atomics_helper+0x4a1c/0x5450
[   15.832171]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.832195]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.832222]  ? kasan_atomics+0x152/0x310
[   15.832249]  kasan_atomics+0x1dc/0x310
[   15.832273]  ? __pfx_kasan_atomics+0x10/0x10
[   15.832299]  ? __pfx_read_tsc+0x10/0x10
[   15.832321]  ? ktime_get_ts64+0x86/0x230
[   15.832345]  kunit_try_run_case+0x1a5/0x480
[   15.832370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.832395]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.832419]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.832445]  ? __kthread_parkme+0x82/0x180
[   15.832466]  ? preempt_count_sub+0x50/0x80
[   15.832491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.832516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.832542]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.832568]  kthread+0x337/0x6f0
[   15.832588]  ? trace_preempt_on+0x20/0xc0
[   15.832613]  ? __pfx_kthread+0x10/0x10
[   15.832679]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.832705]  ? calculate_sigpending+0x7b/0xa0
[   15.832730]  ? __pfx_kthread+0x10/0x10
[   15.832768]  ret_from_fork+0x116/0x1d0
[   15.832787]  ? __pfx_kthread+0x10/0x10
[   15.832809]  ret_from_fork_asm+0x1a/0x30
[   15.832841]  </TASK>
[   15.832852] 
[   15.840421] Allocated by task 283:
[   15.840718]  kasan_save_stack+0x45/0x70
[   15.840984]  kasan_save_track+0x18/0x40
[   15.841154]  kasan_save_alloc_info+0x3b/0x50
[   15.841304]  __kasan_kmalloc+0xb7/0xc0
[   15.841479]  __kmalloc_cache_noprof+0x189/0x420
[   15.841774]  kasan_atomics+0x95/0x310
[   15.841989]  kunit_try_run_case+0x1a5/0x480
[   15.842183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.842407]  kthread+0x337/0x6f0
[   15.842580]  ret_from_fork+0x116/0x1d0
[   15.842765]  ret_from_fork_asm+0x1a/0x30
[   15.842933] 
[   15.843028] The buggy address belongs to the object at ffff888103ad1980
[   15.843028]  which belongs to the cache kmalloc-64 of size 64
[   15.843495] The buggy address is located 0 bytes to the right of
[   15.843495]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.844109] 
[   15.844226] The buggy address belongs to the physical page:
[   15.844480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.844871] flags: 0x200000000000000(node=0|zone=2)
[   15.845038] page_type: f5(slab)
[   15.845158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.845389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.845740] page dumped because: kasan: bad access detected
[   15.846051] 
[   15.846147] Memory state around the buggy address:
[   15.846379]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.846729]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.847060] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.847348]                                      ^
[   15.847576]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.847899]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.848116] ==================================================================
[   15.239877] ==================================================================
[   15.240517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.241237] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.242625] 
[   15.242837] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.243161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.243180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.243203] Call Trace:
[   15.243219]  <TASK>
[   15.243238]  dump_stack_lvl+0x73/0xb0
[   15.243270]  print_report+0xd1/0x650
[   15.243293]  ? __virt_addr_valid+0x1db/0x2d0
[   15.243318]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.243341]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.243365]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.243389]  kasan_report+0x141/0x180
[   15.243412]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.243439]  __asan_report_load4_noabort+0x18/0x20
[   15.243465]  kasan_atomics_helper+0x4b54/0x5450
[   15.243489]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.243513]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.243539]  ? kasan_atomics+0x152/0x310
[   15.243567]  kasan_atomics+0x1dc/0x310
[   15.243590]  ? __pfx_kasan_atomics+0x10/0x10
[   15.243615]  ? __pfx_read_tsc+0x10/0x10
[   15.243636]  ? ktime_get_ts64+0x86/0x230
[   15.243687]  kunit_try_run_case+0x1a5/0x480
[   15.243712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.243737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.243774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.243799]  ? __kthread_parkme+0x82/0x180
[   15.243821]  ? preempt_count_sub+0x50/0x80
[   15.243847]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.243873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.243900]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.243926]  kthread+0x337/0x6f0
[   15.243947]  ? trace_preempt_on+0x20/0xc0
[   15.243973]  ? __pfx_kthread+0x10/0x10
[   15.243994]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.244017]  ? calculate_sigpending+0x7b/0xa0
[   15.244042]  ? __pfx_kthread+0x10/0x10
[   15.244064]  ret_from_fork+0x116/0x1d0
[   15.244084]  ? __pfx_kthread+0x10/0x10
[   15.244105]  ret_from_fork_asm+0x1a/0x30
[   15.244137]  </TASK>
[   15.244148] 
[   15.257981] Allocated by task 283:
[   15.258149]  kasan_save_stack+0x45/0x70
[   15.258346]  kasan_save_track+0x18/0x40
[   15.258530]  kasan_save_alloc_info+0x3b/0x50
[   15.259087]  __kasan_kmalloc+0xb7/0xc0
[   15.259264]  __kmalloc_cache_noprof+0x189/0x420
[   15.259428]  kasan_atomics+0x95/0x310
[   15.259938]  kunit_try_run_case+0x1a5/0x480
[   15.260266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.260488]  kthread+0x337/0x6f0
[   15.260858]  ret_from_fork+0x116/0x1d0
[   15.261203]  ret_from_fork_asm+0x1a/0x30
[   15.261477] 
[   15.261580] The buggy address belongs to the object at ffff888103ad1980
[   15.261580]  which belongs to the cache kmalloc-64 of size 64
[   15.262275] The buggy address is located 0 bytes to the right of
[   15.262275]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.263125] 
[   15.263209] The buggy address belongs to the physical page:
[   15.263454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.264114] flags: 0x200000000000000(node=0|zone=2)
[   15.264482] page_type: f5(slab)
[   15.264627] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.265324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.265782] page dumped because: kasan: bad access detected
[   15.266029] 
[   15.266120] Memory state around the buggy address:
[   15.266336]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.266663]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.267380] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.267922]                                      ^
[   15.268148]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.268452]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.269003] ==================================================================
[   15.382588] ==================================================================
[   15.383458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.384213] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.384936] 
[   15.385034] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.385092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.385105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.385137] Call Trace:
[   15.385154]  <TASK>
[   15.385171]  dump_stack_lvl+0x73/0xb0
[   15.385202]  print_report+0xd1/0x650
[   15.385235]  ? __virt_addr_valid+0x1db/0x2d0
[   15.385260]  ? kasan_atomics_helper+0x697/0x5450
[   15.385283]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.385319]  ? kasan_atomics_helper+0x697/0x5450
[   15.385342]  kasan_report+0x141/0x180
[   15.385366]  ? kasan_atomics_helper+0x697/0x5450
[   15.385404]  kasan_check_range+0x10c/0x1c0
[   15.385429]  __kasan_check_write+0x18/0x20
[   15.385450]  kasan_atomics_helper+0x697/0x5450
[   15.385474]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.385497]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.385534]  ? kasan_atomics+0x152/0x310
[   15.385562]  kasan_atomics+0x1dc/0x310
[   15.385596]  ? __pfx_kasan_atomics+0x10/0x10
[   15.385622]  ? __pfx_read_tsc+0x10/0x10
[   15.385644]  ? ktime_get_ts64+0x86/0x230
[   15.385670]  kunit_try_run_case+0x1a5/0x480
[   15.385703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.385727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.385770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.385796]  ? __kthread_parkme+0x82/0x180
[   15.385819]  ? preempt_count_sub+0x50/0x80
[   15.385844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.385870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.385896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.385981]  kthread+0x337/0x6f0
[   15.386004]  ? trace_preempt_on+0x20/0xc0
[   15.386029]  ? __pfx_kthread+0x10/0x10
[   15.386050]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.386074]  ? calculate_sigpending+0x7b/0xa0
[   15.386099]  ? __pfx_kthread+0x10/0x10
[   15.386121]  ret_from_fork+0x116/0x1d0
[   15.386141]  ? __pfx_kthread+0x10/0x10
[   15.386163]  ret_from_fork_asm+0x1a/0x30
[   15.386194]  </TASK>
[   15.386206] 
[   15.400293] Allocated by task 283:
[   15.400631]  kasan_save_stack+0x45/0x70
[   15.400995]  kasan_save_track+0x18/0x40
[   15.401137]  kasan_save_alloc_info+0x3b/0x50
[   15.401558]  __kasan_kmalloc+0xb7/0xc0
[   15.401975]  __kmalloc_cache_noprof+0x189/0x420
[   15.402236]  kasan_atomics+0x95/0x310
[   15.402375]  kunit_try_run_case+0x1a5/0x480
[   15.402523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.402997]  kthread+0x337/0x6f0
[   15.403402]  ret_from_fork+0x116/0x1d0
[   15.403821]  ret_from_fork_asm+0x1a/0x30
[   15.404307] 
[   15.404519] The buggy address belongs to the object at ffff888103ad1980
[   15.404519]  which belongs to the cache kmalloc-64 of size 64
[   15.405842] The buggy address is located 0 bytes to the right of
[   15.405842]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.406401] 
[   15.406476] The buggy address belongs to the physical page:
[   15.406651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.406902] flags: 0x200000000000000(node=0|zone=2)
[   15.407067] page_type: f5(slab)
[   15.407188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.407427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.407713] page dumped because: kasan: bad access detected
[   15.408232] 
[   15.408388] Memory state around the buggy address:
[   15.408938]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.409586]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.410493] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.411387]                                      ^
[   15.411848]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.412689]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.413452] ==================================================================
[   16.228423] ==================================================================
[   16.229179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.229610] Write of size 8 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   16.230281] 
[   16.230417] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.230569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.230583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.230604] Call Trace:
[   16.230618]  <TASK>
[   16.230634]  dump_stack_lvl+0x73/0xb0
[   16.230666]  print_report+0xd1/0x650
[   16.230690]  ? __virt_addr_valid+0x1db/0x2d0
[   16.230715]  ? kasan_atomics_helper+0x194a/0x5450
[   16.230737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.230774]  ? kasan_atomics_helper+0x194a/0x5450
[   16.230797]  kasan_report+0x141/0x180
[   16.230820]  ? kasan_atomics_helper+0x194a/0x5450
[   16.230848]  kasan_check_range+0x10c/0x1c0
[   16.230873]  __kasan_check_write+0x18/0x20
[   16.230893]  kasan_atomics_helper+0x194a/0x5450
[   16.230918]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.230943]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.230969]  ? kasan_atomics+0x152/0x310
[   16.230996]  kasan_atomics+0x1dc/0x310
[   16.231020]  ? __pfx_kasan_atomics+0x10/0x10
[   16.231045]  ? __pfx_read_tsc+0x10/0x10
[   16.231067]  ? ktime_get_ts64+0x86/0x230
[   16.231092]  kunit_try_run_case+0x1a5/0x480
[   16.231117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.231142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.231167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.231192]  ? __kthread_parkme+0x82/0x180
[   16.231214]  ? preempt_count_sub+0x50/0x80
[   16.231239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.231264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.231290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.231316]  kthread+0x337/0x6f0
[   16.231337]  ? trace_preempt_on+0x20/0xc0
[   16.231361]  ? __pfx_kthread+0x10/0x10
[   16.231383]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.231406]  ? calculate_sigpending+0x7b/0xa0
[   16.231431]  ? __pfx_kthread+0x10/0x10
[   16.231454]  ret_from_fork+0x116/0x1d0
[   16.231474]  ? __pfx_kthread+0x10/0x10
[   16.231495]  ret_from_fork_asm+0x1a/0x30
[   16.231526]  </TASK>
[   16.231537] 
[   16.242332] Allocated by task 283:
[   16.242619]  kasan_save_stack+0x45/0x70
[   16.242941]  kasan_save_track+0x18/0x40
[   16.243201]  kasan_save_alloc_info+0x3b/0x50
[   16.243468]  __kasan_kmalloc+0xb7/0xc0
[   16.243796]  __kmalloc_cache_noprof+0x189/0x420
[   16.244041]  kasan_atomics+0x95/0x310
[   16.244203]  kunit_try_run_case+0x1a5/0x480
[   16.244397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.244640]  kthread+0x337/0x6f0
[   16.245097]  ret_from_fork+0x116/0x1d0
[   16.245260]  ret_from_fork_asm+0x1a/0x30
[   16.245565] 
[   16.245683] The buggy address belongs to the object at ffff888103ad1980
[   16.245683]  which belongs to the cache kmalloc-64 of size 64
[   16.246414] The buggy address is located 0 bytes to the right of
[   16.246414]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   16.247164] 
[   16.247252] The buggy address belongs to the physical page:
[   16.247491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   16.248064] flags: 0x200000000000000(node=0|zone=2)
[   16.248393] page_type: f5(slab)
[   16.248575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.249176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.249568] page dumped because: kasan: bad access detected
[   16.249946] 
[   16.250050] Memory state around the buggy address:
[   16.250396]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.250881]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.251250] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.251557]                                      ^
[   16.251787]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.252280]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.252643] ==================================================================
[   15.934072] ==================================================================
[   15.934713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.935417] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.936042] 
[   15.936213] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.936257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.936270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.936291] Call Trace:
[   15.936309]  <TASK>
[   15.936325]  dump_stack_lvl+0x73/0xb0
[   15.936355]  print_report+0xd1/0x650
[   15.936379]  ? __virt_addr_valid+0x1db/0x2d0
[   15.936428]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.936451]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.936477]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.936500]  kasan_report+0x141/0x180
[   15.936523]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.936550]  __asan_report_load4_noabort+0x18/0x20
[   15.936599]  kasan_atomics_helper+0x49e8/0x5450
[   15.936623]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.936649]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.936684]  ? kasan_atomics+0x152/0x310
[   15.936712]  kasan_atomics+0x1dc/0x310
[   15.936736]  ? __pfx_kasan_atomics+0x10/0x10
[   15.936772]  ? __pfx_read_tsc+0x10/0x10
[   15.936793]  ? ktime_get_ts64+0x86/0x230
[   15.936818]  kunit_try_run_case+0x1a5/0x480
[   15.936844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.936869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.936896]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.936921]  ? __kthread_parkme+0x82/0x180
[   15.936942]  ? preempt_count_sub+0x50/0x80
[   15.936967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.936993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.937018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.937046]  kthread+0x337/0x6f0
[   15.937066]  ? trace_preempt_on+0x20/0xc0
[   15.937091]  ? __pfx_kthread+0x10/0x10
[   15.937113]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.937137]  ? calculate_sigpending+0x7b/0xa0
[   15.937162]  ? __pfx_kthread+0x10/0x10
[   15.937184]  ret_from_fork+0x116/0x1d0
[   15.937203]  ? __pfx_kthread+0x10/0x10
[   15.937225]  ret_from_fork_asm+0x1a/0x30
[   15.937256]  </TASK>
[   15.937267] 
[   15.944586] Allocated by task 283:
[   15.944769]  kasan_save_stack+0x45/0x70
[   15.944909]  kasan_save_track+0x18/0x40
[   15.945042]  kasan_save_alloc_info+0x3b/0x50
[   15.945186]  __kasan_kmalloc+0xb7/0xc0
[   15.945390]  __kmalloc_cache_noprof+0x189/0x420
[   15.945608]  kasan_atomics+0x95/0x310
[   15.945953]  kunit_try_run_case+0x1a5/0x480
[   15.946135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.946305]  kthread+0x337/0x6f0
[   15.946427]  ret_from_fork+0x116/0x1d0
[   15.946609]  ret_from_fork_asm+0x1a/0x30
[   15.946812] 
[   15.946905] The buggy address belongs to the object at ffff888103ad1980
[   15.946905]  which belongs to the cache kmalloc-64 of size 64
[   15.947464] The buggy address is located 0 bytes to the right of
[   15.947464]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.947954] 
[   15.948025] The buggy address belongs to the physical page:
[   15.948190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.948432] flags: 0x200000000000000(node=0|zone=2)
[   15.948677] page_type: f5(slab)
[   15.948884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.949234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.949595] page dumped because: kasan: bad access detected
[   15.949910] 
[   15.949978] Memory state around the buggy address:
[   15.950128]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.950481]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.950767] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.950975]                                      ^
[   15.951128]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.951536]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.951848] ==================================================================
[   15.877463] ==================================================================
[   15.878228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.879196] Read of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.879978] 
[   15.880262] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.880319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.880333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.880353] Call Trace:
[   15.880371]  <TASK>
[   15.880390]  dump_stack_lvl+0x73/0xb0
[   15.880422]  print_report+0xd1/0x650
[   15.880447]  ? __virt_addr_valid+0x1db/0x2d0
[   15.880472]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.880495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.880520]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.880543]  kasan_report+0x141/0x180
[   15.880566]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.880595]  __asan_report_load4_noabort+0x18/0x20
[   15.880623]  kasan_atomics_helper+0x4a02/0x5450
[   15.880655]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.880679]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.880707]  ? kasan_atomics+0x152/0x310
[   15.880734]  kasan_atomics+0x1dc/0x310
[   15.880766]  ? __pfx_kasan_atomics+0x10/0x10
[   15.880791]  ? __pfx_read_tsc+0x10/0x10
[   15.880814]  ? ktime_get_ts64+0x86/0x230
[   15.880841]  kunit_try_run_case+0x1a5/0x480
[   15.880867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.880892]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.880919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.880944]  ? __kthread_parkme+0x82/0x180
[   15.880966]  ? preempt_count_sub+0x50/0x80
[   15.880991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.881018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.881043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.881069]  kthread+0x337/0x6f0
[   15.881090]  ? trace_preempt_on+0x20/0xc0
[   15.881115]  ? __pfx_kthread+0x10/0x10
[   15.881136]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.881159]  ? calculate_sigpending+0x7b/0xa0
[   15.881184]  ? __pfx_kthread+0x10/0x10
[   15.881207]  ret_from_fork+0x116/0x1d0
[   15.881226]  ? __pfx_kthread+0x10/0x10
[   15.881248]  ret_from_fork_asm+0x1a/0x30
[   15.881281]  </TASK>
[   15.881292] 
[   15.895264] Allocated by task 283:
[   15.895397]  kasan_save_stack+0x45/0x70
[   15.895543]  kasan_save_track+0x18/0x40
[   15.895690]  kasan_save_alloc_info+0x3b/0x50
[   15.895976]  __kasan_kmalloc+0xb7/0xc0
[   15.896110]  __kmalloc_cache_noprof+0x189/0x420
[   15.896288]  kasan_atomics+0x95/0x310
[   15.896474]  kunit_try_run_case+0x1a5/0x480
[   15.896695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.897106]  kthread+0x337/0x6f0
[   15.897276]  ret_from_fork+0x116/0x1d0
[   15.897455]  ret_from_fork_asm+0x1a/0x30
[   15.897641] 
[   15.898077] The buggy address belongs to the object at ffff888103ad1980
[   15.898077]  which belongs to the cache kmalloc-64 of size 64
[   15.899008] The buggy address is located 0 bytes to the right of
[   15.899008]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.899819] 
[   15.899928] The buggy address belongs to the physical page:
[   15.900277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.900613] flags: 0x200000000000000(node=0|zone=2)
[   15.901070] page_type: f5(slab)
[   15.901362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.901998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.902397] page dumped because: kasan: bad access detected
[   15.902634] 
[   15.902909] Memory state around the buggy address:
[   15.903365]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.903843]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.904159] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.904447]                                      ^
[   15.904801]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.905273]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.905501] ==================================================================
[   15.952315] ==================================================================
[   15.952949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.953444] Write of size 4 at addr ffff888103ad19b0 by task kunit_try_catch/283
[   15.953826] 
[   15.953959] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.954002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.954014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.954035] Call Trace:
[   15.954051]  <TASK>
[   15.954068]  dump_stack_lvl+0x73/0xb0
[   15.954096]  print_report+0xd1/0x650
[   15.954119]  ? __virt_addr_valid+0x1db/0x2d0
[   15.954143]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.954167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.954199]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.954222]  kasan_report+0x141/0x180
[   15.954245]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.954272]  kasan_check_range+0x10c/0x1c0
[   15.954297]  __kasan_check_write+0x18/0x20
[   15.954318]  kasan_atomics_helper+0x12e6/0x5450
[   15.954342]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.954372]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.954398]  ? kasan_atomics+0x152/0x310
[   15.954426]  kasan_atomics+0x1dc/0x310
[   15.954449]  ? __pfx_kasan_atomics+0x10/0x10
[   15.954475]  ? __pfx_read_tsc+0x10/0x10
[   15.954497]  ? ktime_get_ts64+0x86/0x230
[   15.954523]  kunit_try_run_case+0x1a5/0x480
[   15.954548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.954572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.954598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.954623]  ? __kthread_parkme+0x82/0x180
[   15.954644]  ? preempt_count_sub+0x50/0x80
[   15.954696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.954723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.954760]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.954787]  kthread+0x337/0x6f0
[   15.954808]  ? trace_preempt_on+0x20/0xc0
[   15.954832]  ? __pfx_kthread+0x10/0x10
[   15.954854]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.954876]  ? calculate_sigpending+0x7b/0xa0
[   15.954902]  ? __pfx_kthread+0x10/0x10
[   15.954924]  ret_from_fork+0x116/0x1d0
[   15.954943]  ? __pfx_kthread+0x10/0x10
[   15.954965]  ret_from_fork_asm+0x1a/0x30
[   15.955018]  </TASK>
[   15.955029] 
[   15.962410] Allocated by task 283:
[   15.962589]  kasan_save_stack+0x45/0x70
[   15.962911]  kasan_save_track+0x18/0x40
[   15.963193]  kasan_save_alloc_info+0x3b/0x50
[   15.963387]  __kasan_kmalloc+0xb7/0xc0
[   15.963566]  __kmalloc_cache_noprof+0x189/0x420
[   15.963854]  kasan_atomics+0x95/0x310
[   15.964060]  kunit_try_run_case+0x1a5/0x480
[   15.964272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.964509]  kthread+0x337/0x6f0
[   15.964632]  ret_from_fork+0x116/0x1d0
[   15.964776]  ret_from_fork_asm+0x1a/0x30
[   15.964917] 
[   15.964988] The buggy address belongs to the object at ffff888103ad1980
[   15.964988]  which belongs to the cache kmalloc-64 of size 64
[   15.965451] The buggy address is located 0 bytes to the right of
[   15.965451]  allocated 48-byte region [ffff888103ad1980, ffff888103ad19b0)
[   15.966011] 
[   15.966106] The buggy address belongs to the physical page:
[   15.966398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad1
[   15.966811] flags: 0x200000000000000(node=0|zone=2)
[   15.966973] page_type: f5(slab)
[   15.967093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.967324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.967598] page dumped because: kasan: bad access detected
[   15.968116] 
[   15.968211] Memory state around the buggy address:
[   15.968459]  ffff888103ad1880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.968871]  ffff888103ad1900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.969194] >ffff888103ad1980: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.969452]                                      ^
[   15.969613]  ffff888103ad1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.969994]  ffff888103ad1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.970329] ==================================================================