Hay
Date
July 12, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.132115] ==================================================================
[   19.132164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.132271] Read of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.132615] 
[   19.132658] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.132745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.132773] Hardware name: linux,dummy-virt (DT)
[   19.132806] Call trace:
[   19.132828]  show_stack+0x20/0x38 (C)
[   19.132881]  dump_stack_lvl+0x8c/0xd0
[   19.132927]  print_report+0x118/0x5d0
[   19.132975]  kasan_report+0xdc/0x128
[   19.133021]  __asan_report_load4_noabort+0x20/0x30
[   19.133075]  kasan_atomics_helper+0x42d8/0x4858
[   19.133126]  kasan_atomics+0x198/0x2e0
[   19.134303]  kasan_save_alloc_info+0x40/0x58
[   19.134907]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.135899] The buggy address is located 0 bytes to the right of
[   19.135899]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.136046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.137095] 
[   19.137431]                                      ^
[   19.138446] ==================================================================
[   19.293407] ==================================================================
[   19.293463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.293517] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.295385] 
[   19.295997] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.296718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.296884] Hardware name: linux,dummy-virt (DT)
[   19.297452] Call trace:
[   19.297543]  show_stack+0x20/0x38 (C)
[   19.298119]  dump_stack_lvl+0x8c/0xd0
[   19.298301]  print_report+0x118/0x5d0
[   19.298352]  kasan_report+0xdc/0x128
[   19.298401]  kasan_check_range+0x100/0x1a8
[   19.298453]  __kasan_check_write+0x20/0x30
[   19.298499]  kasan_atomics_helper+0x10c0/0x4858
[   19.298550]  kasan_atomics+0x198/0x2e0
[   19.298595]  kunit_try_run_case+0x170/0x3f0
[   19.298645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.298699]  kthread+0x328/0x630
[   19.298741]  ret_from_fork+0x10/0x20
[   19.298788] 
[   19.298810] Allocated by task 265:
[   19.298839]  kasan_save_stack+0x3c/0x68
[   19.298883]  kasan_save_track+0x20/0x40
[   19.298923]  kasan_save_alloc_info+0x40/0x58
[   19.298964]  __kasan_kmalloc+0xd4/0xd8
[   19.299003]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.299045]  kasan_atomics+0xb8/0x2e0
[   19.299083]  kunit_try_run_case+0x170/0x3f0
[   19.299122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.299168]  kthread+0x328/0x630
[   19.299221]  ret_from_fork+0x10/0x20
[   19.299259] 
[   19.299281] The buggy address belongs to the object at fff00000c65b1c00
[   19.299281]  which belongs to the cache kmalloc-64 of size 64
[   19.299345] The buggy address is located 0 bytes to the right of
[   19.299345]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.299414] 
[   19.299435] The buggy address belongs to the physical page:
[   19.299468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.299526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.299578] page_type: f5(slab)
[   19.299618] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.299673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.299717] page dumped because: kasan: bad access detected
[   19.299752] 
[   19.299771] Memory state around the buggy address:
[   19.299805]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.299850]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.299896] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.299938]                                      ^
[   19.299971]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.300016]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.300057] ==================================================================
[   19.483000] ==================================================================
[   19.483328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.483675] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.483984] 
[   19.484082] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.484181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.484212] Hardware name: linux,dummy-virt (DT)
[   19.484246] Call trace:
[   19.484281]  show_stack+0x20/0x38 (C)
[   19.484332]  dump_stack_lvl+0x8c/0xd0
[   19.484571]  print_report+0x118/0x5d0
[   19.484626]  kasan_report+0xdc/0x128
[   19.485308]  __asan_report_load8_noabort+0x20/0x30
[   19.485546]  kasan_atomics_helper+0x3e20/0x4858
[   19.485774]  kasan_atomics+0x198/0x2e0
[   19.485828]  kunit_try_run_case+0x170/0x3f0
[   19.485876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.486117]  kthread+0x328/0x630
[   19.486165]  ret_from_fork+0x10/0x20
[   19.486226] 
[   19.486528] Allocated by task 265:
[   19.486564]  kasan_save_stack+0x3c/0x68
[   19.486698]  kasan_save_track+0x20/0x40
[   19.486804]  kasan_save_alloc_info+0x40/0x58
[   19.486870]  __kasan_kmalloc+0xd4/0xd8
[   19.486907]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.486949]  kasan_atomics+0xb8/0x2e0
[   19.486985]  kunit_try_run_case+0x170/0x3f0
[   19.487079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.487125]  kthread+0x328/0x630
[   19.487506]  ret_from_fork+0x10/0x20
[   19.487792] 
[   19.487994] The buggy address belongs to the object at fff00000c65b1c00
[   19.487994]  which belongs to the cache kmalloc-64 of size 64
[   19.488204] The buggy address is located 0 bytes to the right of
[   19.488204]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.488488] 
[   19.488535] The buggy address belongs to the physical page:
[   19.488570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.488630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.488886] page_type: f5(slab)
[   19.489049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.489404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.489459] page dumped because: kasan: bad access detected
[   19.489494] 
[   19.489513] Memory state around the buggy address:
[   19.489551]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.490137]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.490450] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.490498]                                      ^
[   19.490623]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.490682]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.490725] ==================================================================
[   19.323110] ==================================================================
[   19.323190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.323370] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.323772] 
[   19.324078] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.324386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.324463] Hardware name: linux,dummy-virt (DT)
[   19.324535] Call trace:
[   19.324686]  show_stack+0x20/0x38 (C)
[   19.324759]  dump_stack_lvl+0x8c/0xd0
[   19.324835]  print_report+0x118/0x5d0
[   19.325243]  kasan_report+0xdc/0x128
[   19.325572]  kasan_check_range+0x100/0x1a8
[   19.325816]  __kasan_check_write+0x20/0x30
[   19.325898]  kasan_atomics_helper+0x11f8/0x4858
[   19.325955]  kasan_atomics+0x198/0x2e0
[   19.326002]  kunit_try_run_case+0x170/0x3f0
[   19.326051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.326128]  kthread+0x328/0x630
[   19.326205]  ret_from_fork+0x10/0x20
[   19.326255] 
[   19.326276] Allocated by task 265:
[   19.326314]  kasan_save_stack+0x3c/0x68
[   19.326361]  kasan_save_track+0x20/0x40
[   19.326409]  kasan_save_alloc_info+0x40/0x58
[   19.326462]  __kasan_kmalloc+0xd4/0xd8
[   19.326510]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.326551]  kasan_atomics+0xb8/0x2e0
[   19.326590]  kunit_try_run_case+0x170/0x3f0
[   19.326630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.326683]  kthread+0x328/0x630
[   19.326727]  ret_from_fork+0x10/0x20
[   19.326766] 
[   19.326787] The buggy address belongs to the object at fff00000c65b1c00
[   19.326787]  which belongs to the cache kmalloc-64 of size 64
[   19.326851] The buggy address is located 0 bytes to the right of
[   19.326851]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.326920] 
[   19.326952] The buggy address belongs to the physical page:
[   19.327006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.327070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.327128] page_type: f5(slab)
[   19.327189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.327245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.327304] page dumped because: kasan: bad access detected
[   19.327340] 
[   19.327360] Memory state around the buggy address:
[   19.328065]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.328143]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.328217] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.328530]                                      ^
[   19.328693]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.329289]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.329458] ==================================================================
[   19.244736] ==================================================================
[   19.244840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.245254] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.245318] 
[   19.245396] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.245482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.245550] Hardware name: linux,dummy-virt (DT)
[   19.245585] Call trace:
[   19.245608]  show_stack+0x20/0x38 (C)
[   19.245820]  dump_stack_lvl+0x8c/0xd0
[   19.245879]  print_report+0x118/0x5d0
[   19.245928]  kasan_report+0xdc/0x128
[   19.245979]  kasan_check_range+0x100/0x1a8
[   19.246238]  __kasan_check_write+0x20/0x30
[   19.246290]  kasan_atomics_helper+0xeb8/0x4858
[   19.246346]  kasan_atomics+0x198/0x2e0
[   19.246439]  kunit_try_run_case+0x170/0x3f0
[   19.246494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.246704]  kthread+0x328/0x630
[   19.246747]  ret_from_fork+0x10/0x20
[   19.246795] 
[   19.246816] Allocated by task 265:
[   19.246845]  kasan_save_stack+0x3c/0x68
[   19.246888]  kasan_save_track+0x20/0x40
[   19.246939]  kasan_save_alloc_info+0x40/0x58
[   19.246982]  __kasan_kmalloc+0xd4/0xd8
[   19.247118]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.247415]  kasan_atomics+0xb8/0x2e0
[   19.247453]  kunit_try_run_case+0x170/0x3f0
[   19.247495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.247897]  kthread+0x328/0x630
[   19.247939]  ret_from_fork+0x10/0x20
[   19.247977] 
[   19.248050] The buggy address belongs to the object at fff00000c65b1c00
[   19.248050]  which belongs to the cache kmalloc-64 of size 64
[   19.248258] The buggy address is located 0 bytes to the right of
[   19.248258]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.248344] 
[   19.248367] The buggy address belongs to the physical page:
[   19.248401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.248520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.248668] page_type: f5(slab)
[   19.248711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.248849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.248916] page dumped because: kasan: bad access detected
[   19.248980] 
[   19.249002] Memory state around the buggy address:
[   19.249037]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.249126]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.249217] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.249256]                                      ^
[   19.249291]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.249472]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.249517] ==================================================================
[   19.343338] ==================================================================
[   19.343394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.343446] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.343500] 
[   19.343990] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.344383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.344457] Hardware name: linux,dummy-virt (DT)
[   19.344625] Call trace:
[   19.344704]  show_stack+0x20/0x38 (C)
[   19.344886]  dump_stack_lvl+0x8c/0xd0
[   19.345075]  print_report+0x118/0x5d0
[   19.345265]  kasan_report+0xdc/0x128
[   19.345325]  kasan_check_range+0x100/0x1a8
[   19.345546]  __kasan_check_write+0x20/0x30
[   19.345764]  kasan_atomics_helper+0x12d8/0x4858
[   19.345856]  kasan_atomics+0x198/0x2e0
[   19.346042]  kunit_try_run_case+0x170/0x3f0
[   19.346278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.346491]  kthread+0x328/0x630
[   19.346546]  ret_from_fork+0x10/0x20
[   19.347026] 
[   19.347124] Allocated by task 265:
[   19.347444]  kasan_save_stack+0x3c/0x68
[   19.347524]  kasan_save_track+0x20/0x40
[   19.347741]  kasan_save_alloc_info+0x40/0x58
[   19.347959]  __kasan_kmalloc+0xd4/0xd8
[   19.348183]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.348275]  kasan_atomics+0xb8/0x2e0
[   19.348479]  kunit_try_run_case+0x170/0x3f0
[   19.348596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.349199]  kthread+0x328/0x630
[   19.349295]  ret_from_fork+0x10/0x20
[   19.349356] 
[   19.349503] The buggy address belongs to the object at fff00000c65b1c00
[   19.349503]  which belongs to the cache kmalloc-64 of size 64
[   19.349714] The buggy address is located 0 bytes to the right of
[   19.349714]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.350261] 
[   19.350442] The buggy address belongs to the physical page:
[   19.350492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.350716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.351045] page_type: f5(slab)
[   19.351342] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.351500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.351572] page dumped because: kasan: bad access detected
[   19.351924] 
[   19.352017] Memory state around the buggy address:
[   19.352112]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.352332]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.352425] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.352591]                                      ^
[   19.352652]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.352700]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.352750] ==================================================================
[   19.237914] ==================================================================
[   19.237971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.238021] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.238803] 
[   19.238841] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.238928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.238956] Hardware name: linux,dummy-virt (DT)
[   19.238989] Call trace:
[   19.239011]  show_stack+0x20/0x38 (C)
[   19.239065]  dump_stack_lvl+0x8c/0xd0
[   19.239111]  print_report+0x118/0x5d0
[   19.239160]  kasan_report+0xdc/0x128
[   19.239381]  __asan_report_store8_noabort+0x20/0x30
[   19.239838]  kasan_atomics_helper+0x3e5c/0x4858
[   19.239899]  kasan_atomics+0x198/0x2e0
[   19.240030]  kunit_try_run_case+0x170/0x3f0
[   19.240199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.240255]  kthread+0x328/0x630
[   19.240322]  ret_from_fork+0x10/0x20
[   19.240372] 
[   19.240392] Allocated by task 265:
[   19.240653]  kasan_save_stack+0x3c/0x68
[   19.240748]  kasan_save_track+0x20/0x40
[   19.240834]  kasan_save_alloc_info+0x40/0x58
[   19.240928]  __kasan_kmalloc+0xd4/0xd8
[   19.240965]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.241044]  kasan_atomics+0xb8/0x2e0
[   19.241208]  kunit_try_run_case+0x170/0x3f0
[   19.241250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.241297]  kthread+0x328/0x630
[   19.241333]  ret_from_fork+0x10/0x20
[   19.241403] 
[   19.241449] The buggy address belongs to the object at fff00000c65b1c00
[   19.241449]  which belongs to the cache kmalloc-64 of size 64
[   19.241566] The buggy address is located 0 bytes to the right of
[   19.241566]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.241770] 
[   19.241851] The buggy address belongs to the physical page:
[   19.241883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.241994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.242108] page_type: f5(slab)
[   19.242778] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.242838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.242883] page dumped because: kasan: bad access detected
[   19.242917] 
[   19.242938] Memory state around the buggy address:
[   19.242973]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.243327]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.243488] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.243754]                                      ^
[   19.243798]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.243925]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.243968] ==================================================================
[   19.257396] ==================================================================
[   19.257453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.257504] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.258109] 
[   19.258147] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.258247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.258278] Hardware name: linux,dummy-virt (DT)
[   19.258311] Call trace:
[   19.258333]  show_stack+0x20/0x38 (C)
[   19.258384]  dump_stack_lvl+0x8c/0xd0
[   19.258432]  print_report+0x118/0x5d0
[   19.258489]  kasan_report+0xdc/0x128
[   19.258537]  kasan_check_range+0x100/0x1a8
[   19.258909]  __kasan_check_write+0x20/0x30
[   19.258961]  kasan_atomics_helper+0xf88/0x4858
[   19.259375]  kasan_atomics+0x198/0x2e0
[   19.259539]  kunit_try_run_case+0x170/0x3f0
[   19.259689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.259758]  kthread+0x328/0x630
[   19.259802]  ret_from_fork+0x10/0x20
[   19.259851] 
[   19.259872] Allocated by task 265:
[   19.259937]  kasan_save_stack+0x3c/0x68
[   19.259984]  kasan_save_track+0x20/0x40
[   19.260022]  kasan_save_alloc_info+0x40/0x58
[   19.260417]  __kasan_kmalloc+0xd4/0xd8
[   19.260463]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.260583]  kasan_atomics+0xb8/0x2e0
[   19.260624]  kunit_try_run_case+0x170/0x3f0
[   19.260697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.260745]  kthread+0x328/0x630
[   19.260818]  ret_from_fork+0x10/0x20
[   19.260916] 
[   19.260938] The buggy address belongs to the object at fff00000c65b1c00
[   19.260938]  which belongs to the cache kmalloc-64 of size 64
[   19.261132] The buggy address is located 0 bytes to the right of
[   19.261132]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.261231] 
[   19.261350] The buggy address belongs to the physical page:
[   19.261383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.261455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.261506] page_type: f5(slab)
[   19.261637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.261826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.261870] page dumped because: kasan: bad access detected
[   19.262044] 
[   19.262064] Memory state around the buggy address:
[   19.262098]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.262516]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.262830] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.263280]                                      ^
[   19.263475]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.263521]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.263562] ==================================================================
[   19.204489] ==================================================================
[   19.204541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.204607] Read of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.204660] 
[   19.204690] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.205073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.205314] Hardware name: linux,dummy-virt (DT)
[   19.205380] Call trace:
[   19.205507]  show_stack+0x20/0x38 (C)
[   19.205761]  dump_stack_lvl+0x8c/0xd0
[   19.205911]  print_report+0x118/0x5d0
[   19.206008]  kasan_report+0xdc/0x128
[   19.206184]  __asan_report_load4_noabort+0x20/0x30
[   19.206241]  kasan_atomics_helper+0x3dd8/0x4858
[   19.206292]  kasan_atomics+0x198/0x2e0
[   19.206338]  kunit_try_run_case+0x170/0x3f0
[   19.206387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.206785]  kthread+0x328/0x630
[   19.206830]  ret_from_fork+0x10/0x20
[   19.207045] 
[   19.207068] Allocated by task 265:
[   19.207098]  kasan_save_stack+0x3c/0x68
[   19.207141]  kasan_save_track+0x20/0x40
[   19.207192]  kasan_save_alloc_info+0x40/0x58
[   19.207267]  __kasan_kmalloc+0xd4/0xd8
[   19.207306]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.207359]  kasan_atomics+0xb8/0x2e0
[   19.207662]  kunit_try_run_case+0x170/0x3f0
[   19.208120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.208184]  kthread+0x328/0x630
[   19.208238]  ret_from_fork+0x10/0x20
[   19.208276] 
[   19.208304] The buggy address belongs to the object at fff00000c65b1c00
[   19.208304]  which belongs to the cache kmalloc-64 of size 64
[   19.208367] The buggy address is located 0 bytes to the right of
[   19.208367]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.208437] 
[   19.208512] The buggy address belongs to the physical page:
[   19.208643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.208736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.208875] page_type: f5(slab)
[   19.208917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.209059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.209157] page dumped because: kasan: bad access detected
[   19.209215] 
[   19.209234] Memory state around the buggy address:
[   19.209267]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.209313]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.209357] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.209400]                                      ^
[   19.209434]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.209480]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.209521] ==================================================================
[   19.423699] ==================================================================
[   19.423824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.423969] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.424029] 
[   19.424077] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.424366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.424446] Hardware name: linux,dummy-virt (DT)
[   19.424507] Call trace:
[   19.424534]  show_stack+0x20/0x38 (C)
[   19.424585]  dump_stack_lvl+0x8c/0xd0
[   19.424690]  print_report+0x118/0x5d0
[   19.424745]  kasan_report+0xdc/0x128
[   19.424831]  __asan_report_load8_noabort+0x20/0x30
[   19.425086]  kasan_atomics_helper+0x3df4/0x4858
[   19.425149]  kasan_atomics+0x198/0x2e0
[   19.425211]  kunit_try_run_case+0x170/0x3f0
[   19.425267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.425320]  kthread+0x328/0x630
[   19.425364]  ret_from_fork+0x10/0x20
[   19.425622] 
[   19.425670] Allocated by task 265:
[   19.425703]  kasan_save_stack+0x3c/0x68
[   19.425812]  kasan_save_track+0x20/0x40
[   19.425871]  kasan_save_alloc_info+0x40/0x58
[   19.425993]  __kasan_kmalloc+0xd4/0xd8
[   19.426036]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.426078]  kasan_atomics+0xb8/0x2e0
[   19.426115]  kunit_try_run_case+0x170/0x3f0
[   19.426163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.426218]  kthread+0x328/0x630
[   19.426405]  ret_from_fork+0x10/0x20
[   19.426697] 
[   19.426754] The buggy address belongs to the object at fff00000c65b1c00
[   19.426754]  which belongs to the cache kmalloc-64 of size 64
[   19.427043] The buggy address is located 0 bytes to the right of
[   19.427043]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.427244] 
[   19.427337] The buggy address belongs to the physical page:
[   19.427694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.427881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.427946] page_type: f5(slab)
[   19.428057] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.428274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.428384] page dumped because: kasan: bad access detected
[   19.428549] 
[   19.428643] Memory state around the buggy address:
[   19.428686]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.428733]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.428780] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.428822]                                      ^
[   19.428978]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.429349]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.429607] ==================================================================
[   19.102464] ==================================================================
[   19.102520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   19.102571] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.102623] 
[   19.102656] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.102740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.103132] Hardware name: linux,dummy-virt (DT)
[   19.103464] Call trace:
[   19.103500]  show_stack+0x20/0x38 (C)
[   19.103555]  dump_stack_lvl+0x8c/0xd0
[   19.103601]  print_report+0x118/0x5d0
[   19.103697]  kasan_check_range+0x100/0x1a8
[   19.103745]  __kasan_check_write+0x20/0x30
[   19.104257]  kasan_atomics_helper+0x6ec/0x4858
[   19.104439]  kasan_atomics+0x198/0x2e0
[   19.104488]  kunit_try_run_case+0x170/0x3f0
[   19.104539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.104594]  kthread+0x328/0x630
[   19.104637]  ret_from_fork+0x10/0x20
[   19.104696] 
[   19.104717] Allocated by task 265:
[   19.104748]  kasan_save_stack+0x3c/0x68
[   19.105140]  kasan_save_track+0x20/0x40
[   19.105245]  kasan_save_alloc_info+0x40/0x58
[   19.105291]  __kasan_kmalloc+0xd4/0xd8
[   19.105330]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.105372]  kasan_atomics+0xb8/0x2e0
[   19.105409]  kunit_try_run_case+0x170/0x3f0
[   19.105458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.106045]  ret_from_fork+0x10/0x20
[   19.106509] The buggy address is located 0 bytes to the right of
[   19.106509]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.106586] 
[   19.106607] The buggy address belongs to the physical page:
[   19.106638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.106696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.107696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.107997]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.109844] ==================================================================
[   19.250453] ==================================================================
[   19.250664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.250847] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.250900] 
[   19.250932] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.251079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.251267] Hardware name: linux,dummy-virt (DT)
[   19.251398] Call trace:
[   19.251450]  show_stack+0x20/0x38 (C)
[   19.251575]  dump_stack_lvl+0x8c/0xd0
[   19.251622]  print_report+0x118/0x5d0
[   19.252009]  kasan_report+0xdc/0x128
[   19.252094]  kasan_check_range+0x100/0x1a8
[   19.252219]  __kasan_check_write+0x20/0x30
[   19.252291]  kasan_atomics_helper+0xf20/0x4858
[   19.252343]  kasan_atomics+0x198/0x2e0
[   19.252422]  kunit_try_run_case+0x170/0x3f0
[   19.252472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.252722]  kthread+0x328/0x630
[   19.252765]  ret_from_fork+0x10/0x20
[   19.252813] 
[   19.252846] Allocated by task 265:
[   19.252875]  kasan_save_stack+0x3c/0x68
[   19.253245]  kasan_save_track+0x20/0x40
[   19.253293]  kasan_save_alloc_info+0x40/0x58
[   19.253334]  __kasan_kmalloc+0xd4/0xd8
[   19.253384]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.253495]  kasan_atomics+0xb8/0x2e0
[   19.253535]  kunit_try_run_case+0x170/0x3f0
[   19.253576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.253771]  kthread+0x328/0x630
[   19.253862]  ret_from_fork+0x10/0x20
[   19.253902] 
[   19.253923] The buggy address belongs to the object at fff00000c65b1c00
[   19.253923]  which belongs to the cache kmalloc-64 of size 64
[   19.253993] The buggy address is located 0 bytes to the right of
[   19.253993]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.254581] 
[   19.254669] The buggy address belongs to the physical page:
[   19.254702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.254762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.254813] page_type: f5(slab)
[   19.255153] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.255277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.255544] page dumped because: kasan: bad access detected
[   19.255587] 
[   19.255607] Memory state around the buggy address:
[   19.255659]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.255707]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.255890] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.255977]                                      ^
[   19.256014]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.256084]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.256225] ==================================================================
[   19.473887] ==================================================================
[   19.474078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.474242] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.474511] 
[   19.474651] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.475107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.475139] Hardware name: linux,dummy-virt (DT)
[   19.475188] Call trace:
[   19.475279]  show_stack+0x20/0x38 (C)
[   19.475331]  dump_stack_lvl+0x8c/0xd0
[   19.475814]  print_report+0x118/0x5d0
[   19.475866]  kasan_report+0xdc/0x128
[   19.476141]  kasan_check_range+0x100/0x1a8
[   19.476245]  __kasan_check_write+0x20/0x30
[   19.476293]  kasan_atomics_helper+0x175c/0x4858
[   19.476343]  kasan_atomics+0x198/0x2e0
[   19.476390]  kunit_try_run_case+0x170/0x3f0
[   19.476449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.476503]  kthread+0x328/0x630
[   19.476921]  ret_from_fork+0x10/0x20
[   19.477043] 
[   19.477064] Allocated by task 265:
[   19.477093]  kasan_save_stack+0x3c/0x68
[   19.477139]  kasan_save_track+0x20/0x40
[   19.477191]  kasan_save_alloc_info+0x40/0x58
[   19.477246]  __kasan_kmalloc+0xd4/0xd8
[   19.477287]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.477804]  kasan_atomics+0xb8/0x2e0
[   19.477973]  kunit_try_run_case+0x170/0x3f0
[   19.478050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.478100]  kthread+0x328/0x630
[   19.478135]  ret_from_fork+0x10/0x20
[   19.478182] 
[   19.478205] The buggy address belongs to the object at fff00000c65b1c00
[   19.478205]  which belongs to the cache kmalloc-64 of size 64
[   19.478269] The buggy address is located 0 bytes to the right of
[   19.478269]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.478337] 
[   19.478370] The buggy address belongs to the physical page:
[   19.478404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.479408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.479510] page_type: f5(slab)
[   19.479673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.479857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.480191] page dumped because: kasan: bad access detected
[   19.480535] 
[   19.480557] Memory state around the buggy address:
[   19.480659]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.480728]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.480776] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.480817]                                      ^
[   19.480853]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.480942]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.481133] ==================================================================
[   19.213281] ==================================================================
[   19.213331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.213379] Read of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.213439] 
[   19.213593] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.214006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.214042] Hardware name: linux,dummy-virt (DT)
[   19.214074] Call trace:
[   19.214183]  show_stack+0x20/0x38 (C)
[   19.214234]  dump_stack_lvl+0x8c/0xd0
[   19.214280]  print_report+0x118/0x5d0
[   19.214328]  kasan_report+0xdc/0x128
[   19.214374]  __asan_report_load4_noabort+0x20/0x30
[   19.214438]  kasan_atomics_helper+0x3e04/0x4858
[   19.214498]  kasan_atomics+0x198/0x2e0
[   19.214546]  kunit_try_run_case+0x170/0x3f0
[   19.214595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.214660]  kthread+0x328/0x630
[   19.214711]  ret_from_fork+0x10/0x20
[   19.214842] 
[   19.214861] Allocated by task 265:
[   19.214892]  kasan_save_stack+0x3c/0x68
[   19.214933]  kasan_save_track+0x20/0x40
[   19.214987]  kasan_save_alloc_info+0x40/0x58
[   19.215040]  __kasan_kmalloc+0xd4/0xd8
[   19.215193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.215291]  kasan_atomics+0xb8/0x2e0
[   19.215366]  kunit_try_run_case+0x170/0x3f0
[   19.215429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.215476]  kthread+0x328/0x630
[   19.215511]  ret_from_fork+0x10/0x20
[   19.215547] 
[   19.215569] The buggy address belongs to the object at fff00000c65b1c00
[   19.215569]  which belongs to the cache kmalloc-64 of size 64
[   19.215640] The buggy address is located 0 bytes to the right of
[   19.215640]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.215720] 
[   19.215803] The buggy address belongs to the physical page:
[   19.215836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.215894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.216004] page_type: f5(slab)
[   19.216044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.216098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.216152] page dumped because: kasan: bad access detected
[   19.216598] 
[   19.216628] Memory state around the buggy address:
[   19.216665]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.216711]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.216757] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.216797]                                      ^
[   19.216835]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.216892]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.216934] ==================================================================
[   19.416429] ==================================================================
[   19.416584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.416757] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.416838] 
[   19.416871] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.417046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.417080] Hardware name: linux,dummy-virt (DT)
[   19.417131] Call trace:
[   19.417158]  show_stack+0x20/0x38 (C)
[   19.417298]  dump_stack_lvl+0x8c/0xd0
[   19.417491]  print_report+0x118/0x5d0
[   19.417694]  kasan_report+0xdc/0x128
[   19.417785]  kasan_check_range+0x100/0x1a8
[   19.418117]  __kasan_check_write+0x20/0x30
[   19.418252]  kasan_atomics_helper+0x1644/0x4858
[   19.418325]  kasan_atomics+0x198/0x2e0
[   19.418401]  kunit_try_run_case+0x170/0x3f0
[   19.418456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.418597]  kthread+0x328/0x630
[   19.418641]  ret_from_fork+0x10/0x20
[   19.418734] 
[   19.418754] Allocated by task 265:
[   19.418783]  kasan_save_stack+0x3c/0x68
[   19.418947]  kasan_save_track+0x20/0x40
[   19.419002]  kasan_save_alloc_info+0x40/0x58
[   19.419046]  __kasan_kmalloc+0xd4/0xd8
[   19.419190]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.419428]  kasan_atomics+0xb8/0x2e0
[   19.419642]  kunit_try_run_case+0x170/0x3f0
[   19.419821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.419917]  kthread+0x328/0x630
[   19.420059]  ret_from_fork+0x10/0x20
[   19.420134] 
[   19.420156] The buggy address belongs to the object at fff00000c65b1c00
[   19.420156]  which belongs to the cache kmalloc-64 of size 64
[   19.420422] The buggy address is located 0 bytes to the right of
[   19.420422]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.420511] 
[   19.420554] The buggy address belongs to the physical page:
[   19.421240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.421312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.421520] page_type: f5(slab)
[   19.421574] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.421826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.422035] page dumped because: kasan: bad access detected
[   19.422140] 
[   19.422203] Memory state around the buggy address:
[   19.422318]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.422403]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.422457] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.422665]                                      ^
[   19.422840]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.422928]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.423016] ==================================================================
[   19.409222] ==================================================================
[   19.409298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.409359] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.409644] 
[   19.409690] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.409870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.409919] Hardware name: linux,dummy-virt (DT)
[   19.409979] Call trace:
[   19.410008]  show_stack+0x20/0x38 (C)
[   19.410068]  dump_stack_lvl+0x8c/0xd0
[   19.410115]  print_report+0x118/0x5d0
[   19.410214]  kasan_report+0xdc/0x128
[   19.410265]  __asan_report_load8_noabort+0x20/0x30
[   19.410319]  kasan_atomics_helper+0x3db0/0x4858
[   19.410491]  kasan_atomics+0x198/0x2e0
[   19.410545]  kunit_try_run_case+0x170/0x3f0
[   19.410739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.410957]  kthread+0x328/0x630
[   19.411027]  ret_from_fork+0x10/0x20
[   19.411246] 
[   19.411308] Allocated by task 265:
[   19.411457]  kasan_save_stack+0x3c/0x68
[   19.411510]  kasan_save_track+0x20/0x40
[   19.411616]  kasan_save_alloc_info+0x40/0x58
[   19.411728]  __kasan_kmalloc+0xd4/0xd8
[   19.411857]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.411953]  kasan_atomics+0xb8/0x2e0
[   19.412197]  kunit_try_run_case+0x170/0x3f0
[   19.412285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.412428]  kthread+0x328/0x630
[   19.412507]  ret_from_fork+0x10/0x20
[   19.412644] 
[   19.412727] The buggy address belongs to the object at fff00000c65b1c00
[   19.412727]  which belongs to the cache kmalloc-64 of size 64
[   19.412877] The buggy address is located 0 bytes to the right of
[   19.412877]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.412949] 
[   19.412978] The buggy address belongs to the physical page:
[   19.413205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.413350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.413455] page_type: f5(slab)
[   19.413781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.413856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.413989] page dumped because: kasan: bad access detected
[   19.414027] 
[   19.414047] Memory state around the buggy address:
[   19.414143]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.414508]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.414709] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.414938]                                      ^
[   19.415078]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.415133]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.415495] ==================================================================
[   19.146343] ==================================================================
[   19.146401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.146826] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.146935] 
[   19.147115] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.147322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.147473] Hardware name: linux,dummy-virt (DT)
[   19.147510] Call trace:
[   19.147589]  show_stack+0x20/0x38 (C)
[   19.147808]  dump_stack_lvl+0x8c/0xd0
[   19.147919]  print_report+0x118/0x5d0
[   19.147967]  kasan_report+0xdc/0x128
[   19.148014]  kasan_check_range+0x100/0x1a8
[   19.148064]  __kasan_check_write+0x20/0x30
[   19.148110]  kasan_atomics_helper+0x99c/0x4858
[   19.148160]  kasan_atomics+0x198/0x2e0
[   19.148217]  kunit_try_run_case+0x170/0x3f0
[   19.148266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.148332]  kthread+0x328/0x630
[   19.148376]  ret_from_fork+0x10/0x20
[   19.148527] 
[   19.148732] Allocated by task 265:
[   19.148779]  kasan_save_stack+0x3c/0x68
[   19.149033]  kasan_save_track+0x20/0x40
[   19.149078]  kasan_save_alloc_info+0x40/0x58
[   19.149140]  __kasan_kmalloc+0xd4/0xd8
[   19.149190]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.149232]  kasan_atomics+0xb8/0x2e0
[   19.149269]  kunit_try_run_case+0x170/0x3f0
[   19.149741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.149820]  kthread+0x328/0x630
[   19.149920]  ret_from_fork+0x10/0x20
[   19.149966] 
[   19.150009] The buggy address belongs to the object at fff00000c65b1c00
[   19.150009]  which belongs to the cache kmalloc-64 of size 64
[   19.150102] The buggy address is located 0 bytes to the right of
[   19.150102]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.150338] 
[   19.150382] The buggy address belongs to the physical page:
[   19.150413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.150473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.150679] page_type: f5(slab)
[   19.150736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.151384]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.152796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.153737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.153793]  kthread+0x328/0x630
[   19.153842]  ret_from_fork+0x10/0x20
[   19.154095] 
[   19.154138] Allocated by task 265:
[   19.154169]  kasan_save_stack+0x3c/0x68
[   19.154222]  kasan_save_track+0x20/0x40
[   19.154262]  kasan_save_alloc_info+0x40/0x58
[   19.154305]  __kasan_kmalloc+0xd4/0xd8
[   19.154345]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.154387]  kasan_atomics+0xb8/0x2e0
[   19.154426]  kunit_try_run_case+0x170/0x3f0
[   19.154812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.155246]  kthread+0x328/0x630
[   19.155294]  ret_from_fork+0x10/0x20
[   19.155331] 
[   19.155353] The buggy address belongs to the object at fff00000c65b1c00
[   19.155353]  which belongs to the cache kmalloc-64 of size 64
[   19.155907] The buggy address is located 0 bytes to the right of
[   19.155907]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.155982] 
[   19.156111] The buggy address belongs to the physical page:
[   19.156180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.156268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.156319] page_type: f5(slab)
[   19.156385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.156473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.156516] page dumped because: kasan: bad access detected
[   19.156550] 
[   19.156570] Memory state around the buggy address:
[   19.156605]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.156650]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.156696] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.156736]                                      ^
[   19.156812]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.156858]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.156945] ==================================================================
[   19.095710] ==================================================================
[   19.095766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   19.095816] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.095868] 
[   19.095900] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.095983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.096048] Hardware name: linux,dummy-virt (DT)
[   19.096082] Call trace:
[   19.096107]  show_stack+0x20/0x38 (C)
[   19.096359]  dump_stack_lvl+0x8c/0xd0
[   19.096691]  print_report+0x118/0x5d0
[   19.096744]  kasan_report+0xdc/0x128
[   19.096793]  kasan_check_range+0x100/0x1a8
[   19.097191]  __kasan_check_write+0x20/0x30
[   19.097276]  kasan_atomics_helper+0x684/0x4858
[   19.097351]  kasan_atomics+0x198/0x2e0
[   19.097397]  kunit_try_run_case+0x170/0x3f0
[   19.097826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.097881]  kthread+0x328/0x630
[   19.097925]  ret_from_fork+0x10/0x20
[   19.097979] 
[   19.097999] Allocated by task 265:
[   19.098031]  kasan_save_stack+0x3c/0x68
[   19.098083]  kasan_save_track+0x20/0x40
[   19.098402]  kasan_save_alloc_info+0x40/0x58
[   19.098599]  __kasan_kmalloc+0xd4/0xd8
[   19.098854]  kasan_atomics+0xb8/0x2e0
[   19.098892]  kunit_try_run_case+0x170/0x3f0
[   19.098933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.099680] The buggy address is located 0 bytes to the right of
[   19.099680]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.099748] 
[   19.100004] The buggy address belongs to the physical page:
[   19.100075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.100135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.100198] page_type: f5(slab)
[   19.100577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.100687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.100823] page dumped because: kasan: bad access detected
[   19.100909] 
[   19.100957] Memory state around the buggy address:
[   19.101056]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.101116]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.101163] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.101215]                                      ^
[   19.101251]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.101389]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.101542] ==================================================================
[   19.210181] ==================================================================
[   19.210234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.210285] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.210338] 
[   19.210368] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.210452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.210481] Hardware name: linux,dummy-virt (DT)
[   19.210513] Call trace:
[   19.210535]  show_stack+0x20/0x38 (C)
[   19.210583]  dump_stack_lvl+0x8c/0xd0
[   19.210629]  print_report+0x118/0x5d0
[   19.210677]  kasan_report+0xdc/0x128
[   19.210722]  kasan_check_range+0x100/0x1a8
[   19.210772]  __kasan_check_write+0x20/0x30
[   19.210819]  kasan_atomics_helper+0xd3c/0x4858
[   19.210866]  kasan_atomics+0x198/0x2e0
[   19.210912]  kunit_try_run_case+0x170/0x3f0
[   19.210972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.211027]  kthread+0x328/0x630
[   19.211069]  ret_from_fork+0x10/0x20
[   19.211119] 
[   19.211138] Allocated by task 265:
[   19.211168]  kasan_save_stack+0x3c/0x68
[   19.211227]  kasan_save_track+0x20/0x40
[   19.211267]  kasan_save_alloc_info+0x40/0x58
[   19.211309]  __kasan_kmalloc+0xd4/0xd8
[   19.211348]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.211535]  kasan_atomics+0xb8/0x2e0
[   19.211640]  kunit_try_run_case+0x170/0x3f0
[   19.211681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.211780]  kthread+0x328/0x630
[   19.211817]  ret_from_fork+0x10/0x20
[   19.211881] 
[   19.211903] The buggy address belongs to the object at fff00000c65b1c00
[   19.211903]  which belongs to the cache kmalloc-64 of size 64
[   19.211964] The buggy address is located 0 bytes to the right of
[   19.211964]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.212044] 
[   19.212066] The buggy address belongs to the physical page:
[   19.212111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.212168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.212229] page_type: f5(slab)
[   19.212267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.212321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.212366] page dumped because: kasan: bad access detected
[   19.212411] 
[   19.212498] Memory state around the buggy address:
[   19.212564]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.212610]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.212654] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.212705]                                      ^
[   19.212739]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.212802]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.212926] ==================================================================
[   19.218126] ==================================================================
[   19.218192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.218241] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.218293] 
[   19.218322] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.218699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.218945] Hardware name: linux,dummy-virt (DT)
[   19.219028] Call trace:
[   19.219052]  show_stack+0x20/0x38 (C)
[   19.219102]  dump_stack_lvl+0x8c/0xd0
[   19.219692]  print_report+0x118/0x5d0
[   19.219745]  kasan_report+0xdc/0x128
[   19.219793]  kasan_check_range+0x100/0x1a8
[   19.219844]  __kasan_check_read+0x20/0x30
[   19.219916]  kasan_atomics_helper+0xdd4/0x4858
[   19.220060]  kasan_atomics+0x198/0x2e0
[   19.220280]  kunit_try_run_case+0x170/0x3f0
[   19.220523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.220638]  kthread+0x328/0x630
[   19.220701]  ret_from_fork+0x10/0x20
[   19.220892] 
[   19.220912] Allocated by task 265:
[   19.220962]  kasan_save_stack+0x3c/0x68
[   19.221030]  kasan_save_track+0x20/0x40
[   19.221104]  kasan_save_alloc_info+0x40/0x58
[   19.221147]  __kasan_kmalloc+0xd4/0xd8
[   19.221458]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.221767]  kasan_atomics+0xb8/0x2e0
[   19.221871]  kunit_try_run_case+0x170/0x3f0
[   19.221949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.221995]  kthread+0x328/0x630
[   19.222031]  ret_from_fork+0x10/0x20
[   19.222071] 
[   19.222456] The buggy address belongs to the object at fff00000c65b1c00
[   19.222456]  which belongs to the cache kmalloc-64 of size 64
[   19.222527] The buggy address is located 0 bytes to the right of
[   19.222527]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.222843] 
[   19.223306] The buggy address belongs to the physical page:
[   19.223443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.223612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.223666] page_type: f5(slab)
[   19.223708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.223762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.223806] page dumped because: kasan: bad access detected
[   19.223842] 
[   19.223862] Memory state around the buggy address:
[   19.223897]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.223941]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.224232] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.224394]                                      ^
[   19.224465]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.224510]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.224551] ==================================================================
[   19.363592] ==================================================================
[   19.363646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.363697] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.364254] 
[   19.364434] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.364529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.364557] Hardware name: linux,dummy-virt (DT)
[   19.364726] Call trace:
[   19.364938]  show_stack+0x20/0x38 (C)
[   19.365019]  dump_stack_lvl+0x8c/0xd0
[   19.365144]  print_report+0x118/0x5d0
[   19.365217]  kasan_report+0xdc/0x128
[   19.365318]  __asan_report_load8_noabort+0x20/0x30
[   19.365376]  kasan_atomics_helper+0x3f04/0x4858
[   19.365427]  kasan_atomics+0x198/0x2e0
[   19.366008]  kunit_try_run_case+0x170/0x3f0
[   19.366150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.366295]  kthread+0x328/0x630
[   19.366371]  ret_from_fork+0x10/0x20
[   19.366490] 
[   19.366574] Allocated by task 265:
[   19.366607]  kasan_save_stack+0x3c/0x68
[   19.366655]  kasan_save_track+0x20/0x40
[   19.366701]  kasan_save_alloc_info+0x40/0x58
[   19.366855]  __kasan_kmalloc+0xd4/0xd8
[   19.366909]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.367003]  kasan_atomics+0xb8/0x2e0
[   19.367048]  kunit_try_run_case+0x170/0x3f0
[   19.367255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.367312]  kthread+0x328/0x630
[   19.367348]  ret_from_fork+0x10/0x20
[   19.367387] 
[   19.367877] The buggy address belongs to the object at fff00000c65b1c00
[   19.367877]  which belongs to the cache kmalloc-64 of size 64
[   19.367965] The buggy address is located 0 bytes to the right of
[   19.367965]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.368617] 
[   19.369188] The buggy address belongs to the physical page:
[   19.369497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.369615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.369708] page_type: f5(slab)
[   19.369878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.370238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.370468] page dumped because: kasan: bad access detected
[   19.370512] 
[   19.370714] Memory state around the buggy address:
[   19.370893]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.371222]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.371423] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.371499]                                      ^
[   19.371548]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.371927]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.372141] ==================================================================
[   19.431292] ==================================================================
[   19.431348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.431396] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.432890] 
[   19.433456] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.434273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.434406] Hardware name: linux,dummy-virt (DT)
[   19.434440] Call trace:
[   19.434990]  show_stack+0x20/0x38 (C)
[   19.435088]  dump_stack_lvl+0x8c/0xd0
[   19.435164]  print_report+0x118/0x5d0
[   19.435232]  kasan_report+0xdc/0x128
[   19.435278]  kasan_check_range+0x100/0x1a8
[   19.436532]  __kasan_check_write+0x20/0x30
[   19.436596]  kasan_atomics_helper+0x16d0/0x4858
[   19.436646]  kasan_atomics+0x198/0x2e0
[   19.436694]  kunit_try_run_case+0x170/0x3f0
[   19.436743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.438192]  kthread+0x328/0x630
[   19.438778]  ret_from_fork+0x10/0x20
[   19.439422] 
[   19.439488] Allocated by task 265:
[   19.439522]  kasan_save_stack+0x3c/0x68
[   19.440084]  kasan_save_track+0x20/0x40
[   19.440561]  kasan_save_alloc_info+0x40/0x58
[   19.441019]  __kasan_kmalloc+0xd4/0xd8
[   19.441280]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.441331]  kasan_atomics+0xb8/0x2e0
[   19.442091]  kunit_try_run_case+0x170/0x3f0
[   19.442484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.443294]  kthread+0x328/0x630
[   19.443535]  ret_from_fork+0x10/0x20
[   19.443722] 
[   19.443745] The buggy address belongs to the object at fff00000c65b1c00
[   19.443745]  which belongs to the cache kmalloc-64 of size 64
[   19.444281] The buggy address is located 0 bytes to the right of
[   19.444281]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.444754] 
[   19.445471] The buggy address belongs to the physical page:
[   19.446106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.446330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.446496] page_type: f5(slab)
[   19.447072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.447459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.447528] page dumped because: kasan: bad access detected
[   19.447966] 
[   19.448183] Memory state around the buggy address:
[   19.448223]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.449066]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.449315] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.449386]                                      ^
[   19.450201]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.450914]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.451274] ==================================================================
[   19.452604] ==================================================================
[   19.452872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.453431] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.454011] 
[   19.454070] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.454651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.454700] Hardware name: linux,dummy-virt (DT)
[   19.455119] Call trace:
[   19.455145]  show_stack+0x20/0x38 (C)
[   19.456322]  dump_stack_lvl+0x8c/0xd0
[   19.456935]  print_report+0x118/0x5d0
[   19.457313]  kasan_report+0xdc/0x128
[   19.457626]  __asan_report_load8_noabort+0x20/0x30
[   19.457861]  kasan_atomics_helper+0x3e10/0x4858
[   19.458329]  kasan_atomics+0x198/0x2e0
[   19.459324]  kunit_try_run_case+0x170/0x3f0
[   19.459722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.459917]  kthread+0x328/0x630
[   19.460850]  ret_from_fork+0x10/0x20
[   19.461293] 
[   19.461477] Allocated by task 265:
[   19.461674]  kasan_save_stack+0x3c/0x68
[   19.462017]  kasan_save_track+0x20/0x40
[   19.462400]  kasan_save_alloc_info+0x40/0x58
[   19.462578]  __kasan_kmalloc+0xd4/0xd8
[   19.463029]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.463089]  kasan_atomics+0xb8/0x2e0
[   19.463310]  kunit_try_run_case+0x170/0x3f0
[   19.463356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.463404]  kthread+0x328/0x630
[   19.463438]  ret_from_fork+0x10/0x20
[   19.463475] 
[   19.463496] The buggy address belongs to the object at fff00000c65b1c00
[   19.463496]  which belongs to the cache kmalloc-64 of size 64
[   19.463562] The buggy address is located 0 bytes to the right of
[   19.463562]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.463631] 
[   19.465425] The buggy address belongs to the physical page:
[   19.465901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.466718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.466905] page_type: f5(slab)
[   19.466982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.467038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.467925] page dumped because: kasan: bad access detected
[   19.467972] 
[   19.468932] Memory state around the buggy address:
[   19.469095]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.469634]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.469781] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.470521]                                      ^
[   19.470582]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.470632]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.471529] ==================================================================
[   19.330544] ==================================================================
[   19.330599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.330651] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.330706] 
[   19.331222] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.331329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.331490] Hardware name: linux,dummy-virt (DT)
[   19.331604] Call trace:
[   19.332012]  show_stack+0x20/0x38 (C)
[   19.332292]  dump_stack_lvl+0x8c/0xd0
[   19.332471]  print_report+0x118/0x5d0
[   19.332791]  kasan_report+0xdc/0x128
[   19.332882]  kasan_check_range+0x100/0x1a8
[   19.333007]  __kasan_check_write+0x20/0x30
[   19.333218]  kasan_atomics_helper+0x126c/0x4858
[   19.333678]  kasan_atomics+0x198/0x2e0
[   19.333835]  kunit_try_run_case+0x170/0x3f0
[   19.334087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.334865]  kthread+0x328/0x630
[   19.335048]  ret_from_fork+0x10/0x20
[   19.335210] 
[   19.335475] Allocated by task 265:
[   19.335571]  kasan_save_stack+0x3c/0x68
[   19.335958]  kasan_save_track+0x20/0x40
[   19.336230]  kasan_save_alloc_info+0x40/0x58
[   19.336378]  __kasan_kmalloc+0xd4/0xd8
[   19.336604]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.336656]  kasan_atomics+0xb8/0x2e0
[   19.336695]  kunit_try_run_case+0x170/0x3f0
[   19.336850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.337216]  kthread+0x328/0x630
[   19.337401]  ret_from_fork+0x10/0x20
[   19.337779] 
[   19.338047] The buggy address belongs to the object at fff00000c65b1c00
[   19.338047]  which belongs to the cache kmalloc-64 of size 64
[   19.338187] The buggy address is located 0 bytes to the right of
[   19.338187]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.338259] 
[   19.338525] The buggy address belongs to the physical page:
[   19.338902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.339057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.339136] page_type: f5(slab)
[   19.339389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.339484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.339879] page dumped because: kasan: bad access detected
[   19.339925] 
[   19.339946] Memory state around the buggy address:
[   19.340163]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.340240]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.340561] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.340817]                                      ^
[   19.340863]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.341455]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.341571] ==================================================================
[   19.158160] ==================================================================
[   19.158229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.158291] Write of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.158344] 
[   19.158377] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.160612] 
[   19.160633] Allocated by task 265:
[   19.160664]  kasan_save_stack+0x3c/0x68
[   19.160710]  kasan_save_track+0x20/0x40
[   19.160749]  kasan_save_alloc_info+0x40/0x58
[   19.160795]  __kasan_kmalloc+0xd4/0xd8
[   19.161631]  kthread+0x328/0x630
[   19.162350] page_type: f5(slab)
[   19.162881] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.166446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.167065]  kasan_save_stack+0x3c/0x68
[   19.167109]  kasan_save_track+0x20/0x40
[   19.167151]  kasan_save_alloc_info+0x40/0x58
[   19.167206]  __kasan_kmalloc+0xd4/0xd8
[   19.167281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.167537]  kasan_atomics+0xb8/0x2e0
[   19.167822]  kthread+0x328/0x630
[   19.168324] page_type: f5(slab)
[   19.168598] page dumped because: kasan: bad access detected
[   19.170120] 
[   19.170923]  kasan_atomics_helper+0x3dcc/0x4858
[   19.171921]  __kasan_kmalloc+0xd4/0xd8
[   19.172593] 
[   19.172916] page_type: f5(slab)
[   19.173380]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.177837]  kasan_save_alloc_info+0x40/0x58
[   19.178903] 
[   19.179369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.181449] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.184273]  kthread+0x328/0x630
[   19.185046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.185972]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.187780]  kasan_check_range+0x100/0x1a8
[   19.189164]  __kasan_kmalloc+0xd4/0xd8
[   19.190238] 
[   19.190947] page dumped because: kasan: bad access detected
[   19.192726] Read of size 4 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.195622]  kunit_try_run_case+0x170/0x3f0
[   19.197464]                                      ^
[   19.198916] 
[   19.199997]  kasan_check_range+0x100/0x1a8
[   19.201299]  kunit_try_run_case+0x170/0x3f0
[   19.201341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.201388]  kthread+0x328/0x630
[   19.201468]  ret_from_fork+0x10/0x20
[   19.201540] 
[   19.201574] The buggy address belongs to the object at fff00000c65b1c00
[   19.201574]  which belongs to the cache kmalloc-64 of size 64
[   19.201662] The buggy address is located 0 bytes to the right of
[   19.201662]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.201878] 
[   19.201899] The buggy address belongs to the physical page:
[   19.201936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.201993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.202087] page_type: f5(slab)
[   19.202129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.202193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.202238] page dumped because: kasan: bad access detected
[   19.202273] 
[   19.202293] Memory state around the buggy address:
[   19.202325]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.202370]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.202415] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.202854]                                      ^
[   19.202892]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.203314]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.203674] ==================================================================
[   19.225999] ==================================================================
[   19.226270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.226345] Read of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.226504] 
[   19.226535] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.226617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.226645] Hardware name: linux,dummy-virt (DT)
[   19.226678] Call trace:
[   19.226707]  show_stack+0x20/0x38 (C)
[   19.226951]  dump_stack_lvl+0x8c/0xd0
[   19.227186]  print_report+0x118/0x5d0
[   19.227260]  kasan_report+0xdc/0x128
[   19.227753]  __asan_report_load8_noabort+0x20/0x30
[   19.227825]  kasan_atomics_helper+0x3f58/0x4858
[   19.227877]  kasan_atomics+0x198/0x2e0
[   19.228050]  kunit_try_run_case+0x170/0x3f0
[   19.228401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.228464]  kthread+0x328/0x630
[   19.228808]  ret_from_fork+0x10/0x20
[   19.228936] 
[   19.228956] Allocated by task 265:
[   19.229012]  kasan_save_stack+0x3c/0x68
[   19.229074]  kasan_save_track+0x20/0x40
[   19.229234]  kasan_save_alloc_info+0x40/0x58
[   19.229276]  __kasan_kmalloc+0xd4/0xd8
[   19.229321]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.229386]  kasan_atomics+0xb8/0x2e0
[   19.229423]  kunit_try_run_case+0x170/0x3f0
[   19.229463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.229846]  kthread+0x328/0x630
[   19.229884]  ret_from_fork+0x10/0x20
[   19.229922] 
[   19.230111] The buggy address belongs to the object at fff00000c65b1c00
[   19.230111]  which belongs to the cache kmalloc-64 of size 64
[   19.230258] The buggy address is located 0 bytes to the right of
[   19.230258]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.230329] 
[   19.230350] The buggy address belongs to the physical page:
[   19.230539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.230623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.230715] page_type: f5(slab)
[   19.230773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.230945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.230990] page dumped because: kasan: bad access detected
[   19.231024] 
[   19.231188] Memory state around the buggy address:
[   19.231254]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.231402]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.231450] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.231491]                                      ^
[   19.231527]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.231871]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.231931] ==================================================================
[   19.311905] ==================================================================
[   19.312118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.312199] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.312586] 
[   19.312800] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.313084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.313153] Hardware name: linux,dummy-virt (DT)
[   19.313223] Call trace:
[   19.313248]  show_stack+0x20/0x38 (C)
[   19.313303]  dump_stack_lvl+0x8c/0xd0
[   19.313350]  print_report+0x118/0x5d0
[   19.313398]  kasan_report+0xdc/0x128
[   19.313443]  kasan_check_range+0x100/0x1a8
[   19.313966]  __kasan_check_write+0x20/0x30
[   19.314046]  kasan_atomics_helper+0x1190/0x4858
[   19.314331]  kasan_atomics+0x198/0x2e0
[   19.314435]  kunit_try_run_case+0x170/0x3f0
[   19.314495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.314692]  kthread+0x328/0x630
[   19.314932]  ret_from_fork+0x10/0x20
[   19.314996] 
[   19.315016] Allocated by task 265:
[   19.315048]  kasan_save_stack+0x3c/0x68
[   19.315093]  kasan_save_track+0x20/0x40
[   19.315134]  kasan_save_alloc_info+0x40/0x58
[   19.315195]  __kasan_kmalloc+0xd4/0xd8
[   19.315463]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.316108]  kasan_atomics+0xb8/0x2e0
[   19.316277]  kunit_try_run_case+0x170/0x3f0
[   19.316556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.316733]  kthread+0x328/0x630
[   19.316776]  ret_from_fork+0x10/0x20
[   19.316852] 
[   19.317092] The buggy address belongs to the object at fff00000c65b1c00
[   19.317092]  which belongs to the cache kmalloc-64 of size 64
[   19.317304] The buggy address is located 0 bytes to the right of
[   19.317304]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.317619] 
[   19.317648] The buggy address belongs to the physical page:
[   19.317683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.317879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.318163] page_type: f5(slab)
[   19.318403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.318464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.318642] page dumped because: kasan: bad access detected
[   19.319008] 
[   19.319053] Memory state around the buggy address:
[   19.319374]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.319428]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.319859] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.320310]                                      ^
[   19.320357]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.320769]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.321090] ==================================================================
[   19.264828] ==================================================================
[   19.264897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.264948] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.265191] 
[   19.265224] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.265537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.265730] Hardware name: linux,dummy-virt (DT)
[   19.265945] Call trace:
[   19.265969]  show_stack+0x20/0x38 (C)
[   19.266021]  dump_stack_lvl+0x8c/0xd0
[   19.266070]  print_report+0x118/0x5d0
[   19.266116]  kasan_report+0xdc/0x128
[   19.266164]  kasan_check_range+0x100/0x1a8
[   19.266223]  __kasan_check_write+0x20/0x30
[   19.266301]  kasan_atomics_helper+0xff0/0x4858
[   19.266561]  kasan_atomics+0x198/0x2e0
[   19.266968]  kunit_try_run_case+0x170/0x3f0
[   19.267089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.267145]  kthread+0x328/0x630
[   19.267200]  ret_from_fork+0x10/0x20
[   19.267641] 
[   19.267925] Allocated by task 265:
[   19.268012]  kasan_save_stack+0x3c/0x68
[   19.268080]  kasan_save_track+0x20/0x40
[   19.268195]  kasan_save_alloc_info+0x40/0x58
[   19.268360]  __kasan_kmalloc+0xd4/0xd8
[   19.268401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.268445]  kasan_atomics+0xb8/0x2e0
[   19.268483]  kunit_try_run_case+0x170/0x3f0
[   19.268523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.268626]  kthread+0x328/0x630
[   19.268663]  ret_from_fork+0x10/0x20
[   19.269230] 
[   19.269383] The buggy address belongs to the object at fff00000c65b1c00
[   19.269383]  which belongs to the cache kmalloc-64 of size 64
[   19.269451] The buggy address is located 0 bytes to the right of
[   19.269451]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.269520] 
[   19.269542] The buggy address belongs to the physical page:
[   19.269575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.270045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.270219] page_type: f5(slab)
[   19.270292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.270350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.270394] page dumped because: kasan: bad access detected
[   19.270449] 
[   19.270544] Memory state around the buggy address:
[   19.270579]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.270641]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.270687] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.270729]                                      ^
[   19.270763]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.270872]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.270914] ==================================================================
[   19.302397] ==================================================================
[   19.302454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.302504] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.303599] 
[   19.303654] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.303743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.303771] Hardware name: linux,dummy-virt (DT)
[   19.303805] Call trace:
[   19.303828]  show_stack+0x20/0x38 (C)
[   19.303880]  dump_stack_lvl+0x8c/0xd0
[   19.303927]  print_report+0x118/0x5d0
[   19.303975]  kasan_report+0xdc/0x128
[   19.304021]  kasan_check_range+0x100/0x1a8
[   19.304070]  __kasan_check_write+0x20/0x30
[   19.304116]  kasan_atomics_helper+0x1128/0x4858
[   19.304166]  kasan_atomics+0x198/0x2e0
[   19.304355]  kunit_try_run_case+0x170/0x3f0
[   19.304879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.304947]  kthread+0x328/0x630
[   19.304990]  ret_from_fork+0x10/0x20
[   19.305038] 
[   19.305059] Allocated by task 265:
[   19.305090]  kasan_save_stack+0x3c/0x68
[   19.305135]  kasan_save_track+0x20/0x40
[   19.305188]  kasan_save_alloc_info+0x40/0x58
[   19.305232]  __kasan_kmalloc+0xd4/0xd8
[   19.305271]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.305312]  kasan_atomics+0xb8/0x2e0
[   19.305350]  kunit_try_run_case+0x170/0x3f0
[   19.305389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.305436]  kthread+0x328/0x630
[   19.305470]  ret_from_fork+0x10/0x20
[   19.305533] 
[   19.305555] The buggy address belongs to the object at fff00000c65b1c00
[   19.305555]  which belongs to the cache kmalloc-64 of size 64
[   19.305619] The buggy address is located 0 bytes to the right of
[   19.305619]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.306912] 
[   19.309422] The buggy address belongs to the physical page:
[   19.309474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.309537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.309599] page_type: f5(slab)
[   19.309639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.309694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.309738] page dumped because: kasan: bad access detected
[   19.309773] 
[   19.309793] Memory state around the buggy address:
[   19.309828]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.309875]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.309922] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.309968]                                      ^
[   19.310004]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.310851]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.311063] ==================================================================
[   19.272746] ==================================================================
[   19.272835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.273465] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.273804] 
[   19.273841] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.274470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.275540] Hardware name: linux,dummy-virt (DT)
[   19.275764] Call trace:
[   19.275788]  show_stack+0x20/0x38 (C)
[   19.276023]  dump_stack_lvl+0x8c/0xd0
[   19.276683]  print_report+0x118/0x5d0
[   19.276794]  kasan_report+0xdc/0x128
[   19.277196]  kasan_check_range+0x100/0x1a8
[   19.277509]  __kasan_check_write+0x20/0x30
[   19.278143]  kasan_atomics_helper+0x1058/0x4858
[   19.278988]  kasan_atomics+0x198/0x2e0
[   19.279050]  kunit_try_run_case+0x170/0x3f0
[   19.279312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.279740]  kthread+0x328/0x630
[   19.280475]  ret_from_fork+0x10/0x20
[   19.280921] 
[   19.280973] Allocated by task 265:
[   19.281422]  kasan_save_stack+0x3c/0x68
[   19.281474]  kasan_save_track+0x20/0x40
[   19.282209]  kasan_save_alloc_info+0x40/0x58
[   19.282653]  __kasan_kmalloc+0xd4/0xd8
[   19.283182]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.283569]  kasan_atomics+0xb8/0x2e0
[   19.283616]  kunit_try_run_case+0x170/0x3f0
[   19.284061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.284377]  kthread+0x328/0x630
[   19.284415]  ret_from_fork+0x10/0x20
[   19.284770] 
[   19.284969] The buggy address belongs to the object at fff00000c65b1c00
[   19.284969]  which belongs to the cache kmalloc-64 of size 64
[   19.286146] The buggy address is located 0 bytes to the right of
[   19.286146]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.286406] 
[   19.286430] The buggy address belongs to the physical page:
[   19.286535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.286608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.286918] page_type: f5(slab)
[   19.287552] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.288319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.289072] page dumped because: kasan: bad access detected
[   19.289230] 
[   19.289251] Memory state around the buggy address:
[   19.289477]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.289672]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.290476] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.290597]                                      ^
[   19.291008]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.291533]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.291864] ==================================================================
[   19.354404] ==================================================================
[   19.354627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.354858] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.354928] 
[   19.354964] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.355054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.355133] Hardware name: linux,dummy-virt (DT)
[   19.355183] Call trace:
[   19.355210]  show_stack+0x20/0x38 (C)
[   19.355404]  dump_stack_lvl+0x8c/0xd0
[   19.355857]  print_report+0x118/0x5d0
[   19.355982]  kasan_report+0xdc/0x128
[   19.356213]  kasan_check_range+0x100/0x1a8
[   19.356548]  __kasan_check_write+0x20/0x30
[   19.356702]  kasan_atomics_helper+0x1384/0x4858
[   19.356777]  kasan_atomics+0x198/0x2e0
[   19.357049]  kunit_try_run_case+0x170/0x3f0
[   19.357402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.357613]  kthread+0x328/0x630
[   19.357873]  ret_from_fork+0x10/0x20
[   19.358018] 
[   19.358041] Allocated by task 265:
[   19.358071]  kasan_save_stack+0x3c/0x68
[   19.358429]  kasan_save_track+0x20/0x40
[   19.358592]  kasan_save_alloc_info+0x40/0x58
[   19.358665]  __kasan_kmalloc+0xd4/0xd8
[   19.358707]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.358747]  kasan_atomics+0xb8/0x2e0
[   19.358786]  kunit_try_run_case+0x170/0x3f0
[   19.358826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.359044]  kthread+0x328/0x630
[   19.359096]  ret_from_fork+0x10/0x20
[   19.359144] 
[   19.359166] The buggy address belongs to the object at fff00000c65b1c00
[   19.359166]  which belongs to the cache kmalloc-64 of size 64
[   19.359279] The buggy address is located 0 bytes to the right of
[   19.359279]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.359503] 
[   19.359530] The buggy address belongs to the physical page:
[   19.359564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.359623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.359677] page_type: f5(slab)
[   19.360116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.360480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.360647] page dumped because: kasan: bad access detected
[   19.360689] 
[   19.360709] Memory state around the buggy address:
[   19.361199]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.361971]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.362050] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.362113]                                      ^
[   19.362220]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.362270]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.362537] ==================================================================
[   19.491595] ==================================================================
[   19.491733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.491794] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.491899] 
[   19.491996] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.492081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.492108] Hardware name: linux,dummy-virt (DT)
[   19.492141] Call trace:
[   19.492165]  show_stack+0x20/0x38 (C)
[   19.492227]  dump_stack_lvl+0x8c/0xd0
[   19.492274]  print_report+0x118/0x5d0
[   19.492442]  kasan_report+0xdc/0x128
[   19.492964]  kasan_check_range+0x100/0x1a8
[   19.493020]  __kasan_check_write+0x20/0x30
[   19.493066]  kasan_atomics_helper+0x17ec/0x4858
[   19.493115]  kasan_atomics+0x198/0x2e0
[   19.493161]  kunit_try_run_case+0x170/0x3f0
[   19.493219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.493273]  kthread+0x328/0x630
[   19.493316]  ret_from_fork+0x10/0x20
[   19.493370] 
[   19.493469] Allocated by task 265:
[   19.493567]  kasan_save_stack+0x3c/0x68
[   19.493611]  kasan_save_track+0x20/0x40
[   19.493795]  kasan_save_alloc_info+0x40/0x58
[   19.494000]  __kasan_kmalloc+0xd4/0xd8
[   19.494184]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.494226]  kasan_atomics+0xb8/0x2e0
[   19.494720]  kunit_try_run_case+0x170/0x3f0
[   19.494789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.494836]  kthread+0x328/0x630
[   19.494873]  ret_from_fork+0x10/0x20
[   19.494910] 
[   19.494931] The buggy address belongs to the object at fff00000c65b1c00
[   19.494931]  which belongs to the cache kmalloc-64 of size 64
[   19.494993] The buggy address is located 0 bytes to the right of
[   19.494993]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.495063] 
[   19.495084] The buggy address belongs to the physical page:
[   19.495119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.495186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.495522] page_type: f5(slab)
[   19.495578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.495631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.495755] page dumped because: kasan: bad access detected
[   19.495813] 
[   19.495833] Memory state around the buggy address:
[   19.496482]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.496562]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.496608] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.496650]                                      ^
[   19.496686]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.496733]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.496910] ==================================================================
[   19.232741] ==================================================================
[   19.232795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.232844] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.232900] 
[   19.232931] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.233017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.233044] Hardware name: linux,dummy-virt (DT)
[   19.233076] Call trace:
[   19.233099]  show_stack+0x20/0x38 (C)
[   19.233479]  dump_stack_lvl+0x8c/0xd0
[   19.233654]  print_report+0x118/0x5d0
[   19.233707]  kasan_report+0xdc/0x128
[   19.233763]  kasan_check_range+0x100/0x1a8
[   19.233812]  __kasan_check_write+0x20/0x30
[   19.234293]  kasan_atomics_helper+0xe44/0x4858
[   19.234363]  kasan_atomics+0x198/0x2e0
[   19.234410]  kunit_try_run_case+0x170/0x3f0
[   19.234459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.234513]  kthread+0x328/0x630
[   19.234555]  ret_from_fork+0x10/0x20
[   19.234621] 
[   19.234642] Allocated by task 265:
[   19.234673]  kasan_save_stack+0x3c/0x68
[   19.235127]  kasan_save_track+0x20/0x40
[   19.235309]  kasan_save_alloc_info+0x40/0x58
[   19.235506]  __kasan_kmalloc+0xd4/0xd8
[   19.235544]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.235608]  kasan_atomics+0xb8/0x2e0
[   19.235647]  kunit_try_run_case+0x170/0x3f0
[   19.235689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.235891]  kthread+0x328/0x630
[   19.235933]  ret_from_fork+0x10/0x20
[   19.235973] 
[   19.236047] The buggy address belongs to the object at fff00000c65b1c00
[   19.236047]  which belongs to the cache kmalloc-64 of size 64
[   19.236148] The buggy address is located 0 bytes to the right of
[   19.236148]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.236251] 
[   19.236296] The buggy address belongs to the physical page:
[   19.236330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.236594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.236654] page_type: f5(slab)
[   19.236695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.236751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.237031] page dumped because: kasan: bad access detected
[   19.237203] 
[   19.237239] Memory state around the buggy address:
[   19.237275]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.237323]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.237418] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.237579]                                      ^
[   19.237630]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.237677]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.237717] ==================================================================
[   19.373654] ==================================================================
[   19.373845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.373910] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.373976] 
[   19.374008] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.374237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.374300] Hardware name: linux,dummy-virt (DT)
[   19.374333] Call trace:
[   19.374359]  show_stack+0x20/0x38 (C)
[   19.374409]  dump_stack_lvl+0x8c/0xd0
[   19.374465]  print_report+0x118/0x5d0
[   19.374511]  kasan_report+0xdc/0x128
[   19.374558]  kasan_check_range+0x100/0x1a8
[   19.374618]  __kasan_check_write+0x20/0x30
[   19.374673]  kasan_atomics_helper+0x1414/0x4858
[   19.374724]  kasan_atomics+0x198/0x2e0
[   19.374780]  kunit_try_run_case+0x170/0x3f0
[   19.374831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.374887]  kthread+0x328/0x630
[   19.374930]  ret_from_fork+0x10/0x20
[   19.374984] 
[   19.375043] Allocated by task 265:
[   19.375072]  kasan_save_stack+0x3c/0x68
[   19.375117]  kasan_save_track+0x20/0x40
[   19.375155]  kasan_save_alloc_info+0x40/0x58
[   19.375209]  __kasan_kmalloc+0xd4/0xd8
[   19.375255]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.375317]  kasan_atomics+0xb8/0x2e0
[   19.375374]  kunit_try_run_case+0x170/0x3f0
[   19.375415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.376470]  kthread+0x328/0x630
[   19.376542]  ret_from_fork+0x10/0x20
[   19.376621] 
[   19.376754] The buggy address belongs to the object at fff00000c65b1c00
[   19.376754]  which belongs to the cache kmalloc-64 of size 64
[   19.376826] The buggy address is located 0 bytes to the right of
[   19.376826]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.376896] 
[   19.376919] The buggy address belongs to the physical page:
[   19.376955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.377155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.377251] page_type: f5(slab)
[   19.377293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.377349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.377395] page dumped because: kasan: bad access detected
[   19.377458] 
[   19.377484] Memory state around the buggy address:
[   19.377540]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.377588]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.377635] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.377687]                                      ^
[   19.377731]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.377776]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.377822] ==================================================================
[   19.378963] ==================================================================
[   19.379383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.379596] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.379859] 
[   19.379933] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.380385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.380577] Hardware name: linux,dummy-virt (DT)
[   19.380618] Call trace:
[   19.380903]  show_stack+0x20/0x38 (C)
[   19.381246]  dump_stack_lvl+0x8c/0xd0
[   19.381476]  print_report+0x118/0x5d0
[   19.381658]  kasan_report+0xdc/0x128
[   19.381807]  kasan_check_range+0x100/0x1a8
[   19.381921]  __kasan_check_write+0x20/0x30
[   19.382123]  kasan_atomics_helper+0x147c/0x4858
[   19.382300]  kasan_atomics+0x198/0x2e0
[   19.382562]  kunit_try_run_case+0x170/0x3f0
[   19.382892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.383452]  kthread+0x328/0x630
[   19.383624]  ret_from_fork+0x10/0x20
[   19.383789] 
[   19.383879] Allocated by task 265:
[   19.383960]  kasan_save_stack+0x3c/0x68
[   19.384010]  kasan_save_track+0x20/0x40
[   19.384353]  kasan_save_alloc_info+0x40/0x58
[   19.385260]  __kasan_kmalloc+0xd4/0xd8
[   19.385347]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.385429]  kasan_atomics+0xb8/0x2e0
[   19.385491]  kunit_try_run_case+0x170/0x3f0
[   19.385532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.386063]  kthread+0x328/0x630
[   19.386413]  ret_from_fork+0x10/0x20
[   19.386665] 
[   19.386976] The buggy address belongs to the object at fff00000c65b1c00
[   19.386976]  which belongs to the cache kmalloc-64 of size 64
[   19.387075] The buggy address is located 0 bytes to the right of
[   19.387075]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.387413] 
[   19.387562] The buggy address belongs to the physical page:
[   19.387715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.387991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.388302] page_type: f5(slab)
[   19.388517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.388704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.389138] page dumped because: kasan: bad access detected
[   19.389527] 
[   19.389561] Memory state around the buggy address:
[   19.389838]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.390249]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.390350] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.390395]                                      ^
[   19.390495]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.390837]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.391062] ==================================================================
[   19.404975] ==================================================================
[   19.405028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.405131] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.405210] 
[   19.405251] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.405346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.405374] Hardware name: linux,dummy-virt (DT)
[   19.405413] Call trace:
[   19.405447]  show_stack+0x20/0x38 (C)
[   19.405498]  dump_stack_lvl+0x8c/0xd0
[   19.405555]  print_report+0x118/0x5d0
[   19.405617]  kasan_report+0xdc/0x128
[   19.405664]  kasan_check_range+0x100/0x1a8
[   19.405715]  __kasan_check_write+0x20/0x30
[   19.405761]  kasan_atomics_helper+0x15b4/0x4858
[   19.405810]  kasan_atomics+0x198/0x2e0
[   19.405856]  kunit_try_run_case+0x170/0x3f0
[   19.405905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.405967]  kthread+0x328/0x630
[   19.406013]  ret_from_fork+0x10/0x20
[   19.406061] 
[   19.406089] Allocated by task 265:
[   19.406129]  kasan_save_stack+0x3c/0x68
[   19.406191]  kasan_save_track+0x20/0x40
[   19.406233]  kasan_save_alloc_info+0x40/0x58
[   19.406285]  __kasan_kmalloc+0xd4/0xd8
[   19.406327]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.406369]  kasan_atomics+0xb8/0x2e0
[   19.406413]  kunit_try_run_case+0x170/0x3f0
[   19.406453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.406501]  kthread+0x328/0x630
[   19.406545]  ret_from_fork+0x10/0x20
[   19.406590] 
[   19.406613] The buggy address belongs to the object at fff00000c65b1c00
[   19.406613]  which belongs to the cache kmalloc-64 of size 64
[   19.406681] The buggy address is located 0 bytes to the right of
[   19.406681]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.406749] 
[   19.406779] The buggy address belongs to the physical page:
[   19.406813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.406868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.406918] page_type: f5(slab)
[   19.406956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.407011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.407054] page dumped because: kasan: bad access detected
[   19.407089] 
[   19.407118] Memory state around the buggy address:
[   19.407157]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.407279]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.407544] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.407755]                                      ^
[   19.407956]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.408009]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.408610] ==================================================================
[   19.017893] ==================================================================
[   19.020017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   19.020272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.020503]  kasan_report+0xdc/0x128
[   19.020804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.021101]  kasan_save_alloc_info+0x40/0x58
[   19.021552] The buggy address is located 0 bytes to the right of
[   19.021552]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.021686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.022070]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.022611]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.023215] ==================================================================
[   19.398120] ==================================================================
[   19.398184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.398329] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.398389] 
[   19.398449] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.398671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.398702] Hardware name: linux,dummy-virt (DT)
[   19.398737] Call trace:
[   19.398799]  show_stack+0x20/0x38 (C)
[   19.398870]  dump_stack_lvl+0x8c/0xd0
[   19.398916]  print_report+0x118/0x5d0
[   19.398964]  kasan_report+0xdc/0x128
[   19.399010]  kasan_check_range+0x100/0x1a8
[   19.399070]  __kasan_check_write+0x20/0x30
[   19.399126]  kasan_atomics_helper+0x154c/0x4858
[   19.399188]  kasan_atomics+0x198/0x2e0
[   19.399568]  kunit_try_run_case+0x170/0x3f0
[   19.399692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.399845]  kthread+0x328/0x630
[   19.399940]  ret_from_fork+0x10/0x20
[   19.400064] 
[   19.400113] Allocated by task 265:
[   19.400145]  kasan_save_stack+0x3c/0x68
[   19.400441]  kasan_save_track+0x20/0x40
[   19.400562]  kasan_save_alloc_info+0x40/0x58
[   19.400671]  __kasan_kmalloc+0xd4/0xd8
[   19.400947]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.401123]  kasan_atomics+0xb8/0x2e0
[   19.401203]  kunit_try_run_case+0x170/0x3f0
[   19.401333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.401440]  kthread+0x328/0x630
[   19.401568]  ret_from_fork+0x10/0x20
[   19.401635] 
[   19.401658] The buggy address belongs to the object at fff00000c65b1c00
[   19.401658]  which belongs to the cache kmalloc-64 of size 64
[   19.401980] The buggy address is located 0 bytes to the right of
[   19.401980]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.402209] 
[   19.402269] The buggy address belongs to the physical page:
[   19.402423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.402630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.402830] page_type: f5(slab)
[   19.402986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.403250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.403402] page dumped because: kasan: bad access detected
[   19.403448] 
[   19.403468] Memory state around the buggy address:
[   19.403504]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.403551]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.403597] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.403840]                                      ^
[   19.403966]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.404080]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.404361] ==================================================================
[   19.391791] ==================================================================
[   19.391920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.391990] Write of size 8 at addr fff00000c65b1c30 by task kunit_try_catch/265
[   19.392048] 
[   19.392146] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.392255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.392333] Hardware name: linux,dummy-virt (DT)
[   19.392368] Call trace:
[   19.392419]  show_stack+0x20/0x38 (C)
[   19.392472]  dump_stack_lvl+0x8c/0xd0
[   19.392526]  print_report+0x118/0x5d0
[   19.392575]  kasan_report+0xdc/0x128
[   19.392621]  kasan_check_range+0x100/0x1a8
[   19.392671]  __kasan_check_write+0x20/0x30
[   19.392717]  kasan_atomics_helper+0x14e4/0x4858
[   19.392765]  kasan_atomics+0x198/0x2e0
[   19.393067]  kunit_try_run_case+0x170/0x3f0
[   19.393271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.393385]  kthread+0x328/0x630
[   19.393452]  ret_from_fork+0x10/0x20
[   19.393562] 
[   19.393600] Allocated by task 265:
[   19.393633]  kasan_save_stack+0x3c/0x68
[   19.393679]  kasan_save_track+0x20/0x40
[   19.393720]  kasan_save_alloc_info+0x40/0x58
[   19.393928]  __kasan_kmalloc+0xd4/0xd8
[   19.394227]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.394306]  kasan_atomics+0xb8/0x2e0
[   19.394348]  kunit_try_run_case+0x170/0x3f0
[   19.394534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.394609]  kthread+0x328/0x630
[   19.394654]  ret_from_fork+0x10/0x20
[   19.394871] 
[   19.394946] The buggy address belongs to the object at fff00000c65b1c00
[   19.394946]  which belongs to the cache kmalloc-64 of size 64
[   19.395027] The buggy address is located 0 bytes to the right of
[   19.395027]  allocated 48-byte region [fff00000c65b1c00, fff00000c65b1c30)
[   19.395329] 
[   19.395393] The buggy address belongs to the physical page:
[   19.395507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b1
[   19.395602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.395783] page_type: f5(slab)
[   19.395830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.395886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.395931] page dumped because: kasan: bad access detected
[   19.396323] 
[   19.396403] Memory state around the buggy address:
[   19.396492]  fff00000c65b1b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.396804]  fff00000c65b1b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.396959] >fff00000c65b1c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.397052]                                      ^
[   19.397088]  fff00000c65b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.397141]  fff00000c65b1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.397463] ==================================================================

[   16.394865] ==================================================================
[   16.395451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.395729] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.395955] 
[   16.396039] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.396081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.396095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.396117] Call Trace:
[   16.396129]  <TASK>
[   16.396143]  dump_stack_lvl+0x73/0xb0
[   16.396170]  print_report+0xd1/0x610
[   16.396193]  ? __virt_addr_valid+0x1db/0x2d0
[   16.396217]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.396240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.396276]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.396300]  kasan_report+0x141/0x180
[   16.396323]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.396351]  kasan_check_range+0x10c/0x1c0
[   16.396376]  __kasan_check_write+0x18/0x20
[   16.396397]  kasan_atomics_helper+0x1c18/0x5450
[   16.396421]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.396446]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.396472]  ? kasan_atomics+0x152/0x310
[   16.396500]  kasan_atomics+0x1dc/0x310
[   16.396523]  ? __pfx_kasan_atomics+0x10/0x10
[   16.396548]  ? __pfx_read_tsc+0x10/0x10
[   16.396570]  ? ktime_get_ts64+0x86/0x230
[   16.396595]  kunit_try_run_case+0x1a5/0x480
[   16.396619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.396644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.396669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.396694]  ? __kthread_parkme+0x82/0x180
[   16.396716]  ? preempt_count_sub+0x50/0x80
[   16.396742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.396768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.396794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.396821]  kthread+0x337/0x6f0
[   16.396840]  ? trace_preempt_on+0x20/0xc0
[   16.396864]  ? __pfx_kthread+0x10/0x10
[   16.396885]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.396908]  ? calculate_sigpending+0x7b/0xa0
[   16.396933]  ? __pfx_kthread+0x10/0x10
[   16.396955]  ret_from_fork+0x116/0x1d0
[   16.396975]  ? __pfx_kthread+0x10/0x10
[   16.396996]  ret_from_fork_asm+0x1a/0x30
[   16.397028]  </TASK>
[   16.397039] 
[   16.404140] Allocated by task 282:
[   16.404322]  kasan_save_stack+0x45/0x70
[   16.404517]  kasan_save_track+0x18/0x40
[   16.404700]  kasan_save_alloc_info+0x3b/0x50
[   16.404877]  __kasan_kmalloc+0xb7/0xc0
[   16.405072]  __kmalloc_cache_noprof+0x189/0x420
[   16.405255]  kasan_atomics+0x95/0x310
[   16.405435]  kunit_try_run_case+0x1a5/0x480
[   16.405615]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.405858]  kthread+0x337/0x6f0
[   16.406001]  ret_from_fork+0x116/0x1d0
[   16.406167]  ret_from_fork_asm+0x1a/0x30
[   16.406364] 
[   16.406448] The buggy address belongs to the object at ffff888102a0a600
[   16.406448]  which belongs to the cache kmalloc-64 of size 64
[   16.406918] The buggy address is located 0 bytes to the right of
[   16.406918]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.407392] 
[   16.407471] The buggy address belongs to the physical page:
[   16.407643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.407883] flags: 0x200000000000000(node=0|zone=2)
[   16.408046] page_type: f5(slab)
[   16.408165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.408492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.408827] page dumped because: kasan: bad access detected
[   16.409074] 
[   16.409166] Memory state around the buggy address:
[   16.409398]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.409712]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.410025] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.410254]                                      ^
[   16.410418]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.410633]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.410855] ==================================================================
[   15.965965] ==================================================================
[   15.966294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.966599] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.966849] 
[   15.966956] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.966998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.967010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.967031] Call Trace:
[   15.967046]  <TASK>
[   15.967061]  dump_stack_lvl+0x73/0xb0
[   15.967087]  print_report+0xd1/0x610
[   15.967110]  ? __virt_addr_valid+0x1db/0x2d0
[   15.967134]  ? kasan_atomics_helper+0x1148/0x5450
[   15.967157]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.967183]  ? kasan_atomics_helper+0x1148/0x5450
[   15.967206]  kasan_report+0x141/0x180
[   15.967229]  ? kasan_atomics_helper+0x1148/0x5450
[   15.967257]  kasan_check_range+0x10c/0x1c0
[   15.967291]  __kasan_check_write+0x18/0x20
[   15.967312]  kasan_atomics_helper+0x1148/0x5450
[   15.967336]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.967360]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.967386]  ? kasan_atomics+0x152/0x310
[   15.967413]  kasan_atomics+0x1dc/0x310
[   15.967437]  ? __pfx_kasan_atomics+0x10/0x10
[   15.967462]  ? __pfx_read_tsc+0x10/0x10
[   15.967484]  ? ktime_get_ts64+0x86/0x230
[   15.967509]  kunit_try_run_case+0x1a5/0x480
[   15.967534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.967559]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.967584]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.967608]  ? __kthread_parkme+0x82/0x180
[   15.967630]  ? preempt_count_sub+0x50/0x80
[   15.967655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.967683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.967708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.967735]  kthread+0x337/0x6f0
[   15.967755]  ? trace_preempt_on+0x20/0xc0
[   15.967779]  ? __pfx_kthread+0x10/0x10
[   15.967801]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.967824]  ? calculate_sigpending+0x7b/0xa0
[   15.967849]  ? __pfx_kthread+0x10/0x10
[   15.967872]  ret_from_fork+0x116/0x1d0
[   15.967891]  ? __pfx_kthread+0x10/0x10
[   15.967914]  ret_from_fork_asm+0x1a/0x30
[   15.967946]  </TASK>
[   15.967956] 
[   15.976046] Allocated by task 282:
[   15.976319]  kasan_save_stack+0x45/0x70
[   15.976527]  kasan_save_track+0x18/0x40
[   15.976732]  kasan_save_alloc_info+0x3b/0x50
[   15.976943]  __kasan_kmalloc+0xb7/0xc0
[   15.977163]  __kmalloc_cache_noprof+0x189/0x420
[   15.977370]  kasan_atomics+0x95/0x310
[   15.977557]  kunit_try_run_case+0x1a5/0x480
[   15.977760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.977939]  kthread+0x337/0x6f0
[   15.978134]  ret_from_fork+0x116/0x1d0
[   15.978500]  ret_from_fork_asm+0x1a/0x30
[   15.978719] 
[   15.978799] The buggy address belongs to the object at ffff888102a0a600
[   15.978799]  which belongs to the cache kmalloc-64 of size 64
[   15.979459] The buggy address is located 0 bytes to the right of
[   15.979459]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.980226] 
[   15.980350] The buggy address belongs to the physical page:
[   15.980573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.980835] flags: 0x200000000000000(node=0|zone=2)
[   15.981226] page_type: f5(slab)
[   15.981418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.981717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.982032] page dumped because: kasan: bad access detected
[   15.982252] 
[   15.982344] Memory state around the buggy address:
[   15.982500]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.982723]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.982962] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.983283]                                      ^
[   15.983506]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.983817]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.984128] ==================================================================
[   16.637674] ==================================================================
[   16.637944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.638393] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.638618] 
[   16.638727] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.638767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.638780] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.638802] Call Trace:
[   16.638815]  <TASK>
[   16.638829]  dump_stack_lvl+0x73/0xb0
[   16.638855]  print_report+0xd1/0x610
[   16.638877]  ? __virt_addr_valid+0x1db/0x2d0
[   16.638902]  ? kasan_atomics_helper+0x218a/0x5450
[   16.638924]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.638949]  ? kasan_atomics_helper+0x218a/0x5450
[   16.638972]  kasan_report+0x141/0x180
[   16.638994]  ? kasan_atomics_helper+0x218a/0x5450
[   16.639022]  kasan_check_range+0x10c/0x1c0
[   16.639048]  __kasan_check_write+0x18/0x20
[   16.639069]  kasan_atomics_helper+0x218a/0x5450
[   16.639093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.639117]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.639144]  ? kasan_atomics+0x152/0x310
[   16.639171]  kasan_atomics+0x1dc/0x310
[   16.639194]  ? __pfx_kasan_atomics+0x10/0x10
[   16.639220]  ? __pfx_read_tsc+0x10/0x10
[   16.639241]  ? ktime_get_ts64+0x86/0x230
[   16.639278]  kunit_try_run_case+0x1a5/0x480
[   16.639304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.639329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.639353]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.639379]  ? __kthread_parkme+0x82/0x180
[   16.639401]  ? preempt_count_sub+0x50/0x80
[   16.639426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.639452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.639478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.639505]  kthread+0x337/0x6f0
[   16.639525]  ? trace_preempt_on+0x20/0xc0
[   16.639549]  ? __pfx_kthread+0x10/0x10
[   16.639571]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.639594]  ? calculate_sigpending+0x7b/0xa0
[   16.639619]  ? __pfx_kthread+0x10/0x10
[   16.639642]  ret_from_fork+0x116/0x1d0
[   16.639662]  ? __pfx_kthread+0x10/0x10
[   16.639683]  ret_from_fork_asm+0x1a/0x30
[   16.639715]  </TASK>
[   16.639725] 
[   16.646871] Allocated by task 282:
[   16.647047]  kasan_save_stack+0x45/0x70
[   16.647197]  kasan_save_track+0x18/0x40
[   16.647345]  kasan_save_alloc_info+0x3b/0x50
[   16.647495]  __kasan_kmalloc+0xb7/0xc0
[   16.647629]  __kmalloc_cache_noprof+0x189/0x420
[   16.647846]  kasan_atomics+0x95/0x310
[   16.648033]  kunit_try_run_case+0x1a5/0x480
[   16.648239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.648506]  kthread+0x337/0x6f0
[   16.648652]  ret_from_fork+0x116/0x1d0
[   16.648785]  ret_from_fork_asm+0x1a/0x30
[   16.648926] 
[   16.648997] The buggy address belongs to the object at ffff888102a0a600
[   16.648997]  which belongs to the cache kmalloc-64 of size 64
[   16.649481] The buggy address is located 0 bytes to the right of
[   16.649481]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.650041] 
[   16.650140] The buggy address belongs to the physical page:
[   16.650410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.650729] flags: 0x200000000000000(node=0|zone=2)
[   16.650940] page_type: f5(slab)
[   16.651100] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.651395] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.651703] page dumped because: kasan: bad access detected
[   16.651911] 
[   16.652005] Memory state around the buggy address:
[   16.652225]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.652511]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.652780] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.653061]                                      ^
[   16.653289]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.653567]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.653809] ==================================================================
[   15.840795] ==================================================================
[   15.841401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.841701] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.841946] 
[   15.842078] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.842122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.842134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.842309] Call Trace:
[   15.842329]  <TASK>
[   15.842344]  dump_stack_lvl+0x73/0xb0
[   15.842373]  print_report+0xd1/0x610
[   15.842396]  ? __virt_addr_valid+0x1db/0x2d0
[   15.842419]  ? kasan_atomics_helper+0xe78/0x5450
[   15.842442]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.842467]  ? kasan_atomics_helper+0xe78/0x5450
[   15.842490]  kasan_report+0x141/0x180
[   15.842513]  ? kasan_atomics_helper+0xe78/0x5450
[   15.842540]  kasan_check_range+0x10c/0x1c0
[   15.842565]  __kasan_check_write+0x18/0x20
[   15.842586]  kasan_atomics_helper+0xe78/0x5450
[   15.842610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.842635]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.842661]  ? kasan_atomics+0x152/0x310
[   15.842688]  kasan_atomics+0x1dc/0x310
[   15.842717]  ? __pfx_kasan_atomics+0x10/0x10
[   15.842743]  ? __pfx_read_tsc+0x10/0x10
[   15.842765]  ? ktime_get_ts64+0x86/0x230
[   15.842790]  kunit_try_run_case+0x1a5/0x480
[   15.842817]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.842842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.842866]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.842892]  ? __kthread_parkme+0x82/0x180
[   15.842913]  ? preempt_count_sub+0x50/0x80
[   15.842938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.842964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.842990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.843017]  kthread+0x337/0x6f0
[   15.843037]  ? trace_preempt_on+0x20/0xc0
[   15.843062]  ? __pfx_kthread+0x10/0x10
[   15.843084]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.843107]  ? calculate_sigpending+0x7b/0xa0
[   15.843132]  ? __pfx_kthread+0x10/0x10
[   15.843155]  ret_from_fork+0x116/0x1d0
[   15.843175]  ? __pfx_kthread+0x10/0x10
[   15.843196]  ret_from_fork_asm+0x1a/0x30
[   15.843228]  </TASK>
[   15.843338] 
[   15.851165] Allocated by task 282:
[   15.851359]  kasan_save_stack+0x45/0x70
[   15.851561]  kasan_save_track+0x18/0x40
[   15.851754]  kasan_save_alloc_info+0x3b/0x50
[   15.852219]  __kasan_kmalloc+0xb7/0xc0
[   15.852382]  __kmalloc_cache_noprof+0x189/0x420
[   15.852546]  kasan_atomics+0x95/0x310
[   15.852700]  kunit_try_run_case+0x1a5/0x480
[   15.852908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.853160]  kthread+0x337/0x6f0
[   15.853343]  ret_from_fork+0x116/0x1d0
[   15.853535]  ret_from_fork_asm+0x1a/0x30
[   15.854128] 
[   15.854240] The buggy address belongs to the object at ffff888102a0a600
[   15.854240]  which belongs to the cache kmalloc-64 of size 64
[   15.854732] The buggy address is located 0 bytes to the right of
[   15.854732]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.855299] 
[   15.855396] The buggy address belongs to the physical page:
[   15.855572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.855814] flags: 0x200000000000000(node=0|zone=2)
[   15.855979] page_type: f5(slab)
[   15.856148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.856516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.856855] page dumped because: kasan: bad access detected
[   15.857117] 
[   15.857213] Memory state around the buggy address:
[   15.858574]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.858817]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.859450] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.860464]                                      ^
[   15.861075]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.861465]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.861920] ==================================================================
[   16.069856] ==================================================================
[   16.070306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   16.070617] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.070909] 
[   16.071219] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.071278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.071291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.071312] Call Trace:
[   16.071326]  <TASK>
[   16.071340]  dump_stack_lvl+0x73/0xb0
[   16.071368]  print_report+0xd1/0x610
[   16.071390]  ? __virt_addr_valid+0x1db/0x2d0
[   16.071414]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.071436]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.071462]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.071486]  kasan_report+0x141/0x180
[   16.071509]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.071538]  __asan_report_load4_noabort+0x18/0x20
[   16.071564]  kasan_atomics_helper+0x49ce/0x5450
[   16.071588]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.071614]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.071643]  ? kasan_atomics+0x152/0x310
[   16.071671]  kasan_atomics+0x1dc/0x310
[   16.071695]  ? __pfx_kasan_atomics+0x10/0x10
[   16.071720]  ? __pfx_read_tsc+0x10/0x10
[   16.071741]  ? ktime_get_ts64+0x86/0x230
[   16.071767]  kunit_try_run_case+0x1a5/0x480
[   16.071793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.071818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.071841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.071867]  ? __kthread_parkme+0x82/0x180
[   16.071891]  ? preempt_count_sub+0x50/0x80
[   16.071915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.071941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.072074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.072109]  kthread+0x337/0x6f0
[   16.072129]  ? trace_preempt_on+0x20/0xc0
[   16.072154]  ? __pfx_kthread+0x10/0x10
[   16.072175]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.072199]  ? calculate_sigpending+0x7b/0xa0
[   16.072223]  ? __pfx_kthread+0x10/0x10
[   16.072246]  ret_from_fork+0x116/0x1d0
[   16.072277]  ? __pfx_kthread+0x10/0x10
[   16.072299]  ret_from_fork_asm+0x1a/0x30
[   16.072330]  </TASK>
[   16.072341] 
[   16.080108] Allocated by task 282:
[   16.080307]  kasan_save_stack+0x45/0x70
[   16.080514]  kasan_save_track+0x18/0x40
[   16.080709]  kasan_save_alloc_info+0x3b/0x50
[   16.080920]  __kasan_kmalloc+0xb7/0xc0
[   16.081183]  __kmalloc_cache_noprof+0x189/0x420
[   16.081425]  kasan_atomics+0x95/0x310
[   16.081620]  kunit_try_run_case+0x1a5/0x480
[   16.081795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.082079]  kthread+0x337/0x6f0
[   16.082272]  ret_from_fork+0x116/0x1d0
[   16.082462]  ret_from_fork_asm+0x1a/0x30
[   16.082660] 
[   16.082761] The buggy address belongs to the object at ffff888102a0a600
[   16.082761]  which belongs to the cache kmalloc-64 of size 64
[   16.083356] The buggy address is located 0 bytes to the right of
[   16.083356]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.083902] 
[   16.084114] The buggy address belongs to the physical page:
[   16.084385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.084729] flags: 0x200000000000000(node=0|zone=2)
[   16.084930] page_type: f5(slab)
[   16.085174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.085424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.085653] page dumped because: kasan: bad access detected
[   16.085826] 
[   16.085907] Memory state around the buggy address:
[   16.086234]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.086570]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.086907] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.087447]                                      ^
[   16.087685]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.088092]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.088365] ==================================================================
[   15.946039] ==================================================================
[   15.946469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.946822] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.947339] 
[   15.947585] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.947630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.947643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.947664] Call Trace:
[   15.947679]  <TASK>
[   15.947694]  dump_stack_lvl+0x73/0xb0
[   15.947722]  print_report+0xd1/0x610
[   15.947744]  ? __virt_addr_valid+0x1db/0x2d0
[   15.947767]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.947790]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.947814]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.947838]  kasan_report+0x141/0x180
[   15.947861]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.947889]  __asan_report_load4_noabort+0x18/0x20
[   15.947915]  kasan_atomics_helper+0x4a1c/0x5450
[   15.947941]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.947965]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.947991]  ? kasan_atomics+0x152/0x310
[   15.948017]  kasan_atomics+0x1dc/0x310
[   15.948042]  ? __pfx_kasan_atomics+0x10/0x10
[   15.948067]  ? __pfx_read_tsc+0x10/0x10
[   15.948089]  ? ktime_get_ts64+0x86/0x230
[   15.948113]  kunit_try_run_case+0x1a5/0x480
[   15.948138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.948161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.948186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.948211]  ? __kthread_parkme+0x82/0x180
[   15.948232]  ? preempt_count_sub+0x50/0x80
[   15.948256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.948296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.948323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.948349]  kthread+0x337/0x6f0
[   15.948369]  ? trace_preempt_on+0x20/0xc0
[   15.948549]  ? __pfx_kthread+0x10/0x10
[   15.948581]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.948604]  ? calculate_sigpending+0x7b/0xa0
[   15.948631]  ? __pfx_kthread+0x10/0x10
[   15.948654]  ret_from_fork+0x116/0x1d0
[   15.948674]  ? __pfx_kthread+0x10/0x10
[   15.948697]  ret_from_fork_asm+0x1a/0x30
[   15.948729]  </TASK>
[   15.948740] 
[   15.956892] Allocated by task 282:
[   15.957273]  kasan_save_stack+0x45/0x70
[   15.957460]  kasan_save_track+0x18/0x40
[   15.957633]  kasan_save_alloc_info+0x3b/0x50
[   15.957785]  __kasan_kmalloc+0xb7/0xc0
[   15.957947]  __kmalloc_cache_noprof+0x189/0x420
[   15.958377]  kasan_atomics+0x95/0x310
[   15.958664]  kunit_try_run_case+0x1a5/0x480
[   15.958841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.959208]  kthread+0x337/0x6f0
[   15.959389]  ret_from_fork+0x116/0x1d0
[   15.959557]  ret_from_fork_asm+0x1a/0x30
[   15.959738] 
[   15.959831] The buggy address belongs to the object at ffff888102a0a600
[   15.959831]  which belongs to the cache kmalloc-64 of size 64
[   15.960362] The buggy address is located 0 bytes to the right of
[   15.960362]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.960863] 
[   15.960960] The buggy address belongs to the physical page:
[   15.961323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.961570] flags: 0x200000000000000(node=0|zone=2)
[   15.961735] page_type: f5(slab)
[   15.961856] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.962195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.962623] page dumped because: kasan: bad access detected
[   15.962884] 
[   15.963141] Memory state around the buggy address:
[   15.963334]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.963555]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.963776] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.964243]                                      ^
[   15.964492]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.964823]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.965527] ==================================================================
[   16.540815] ==================================================================
[   16.541159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.541970] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.542257] 
[   16.542360] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.542451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.542466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.542488] Call Trace:
[   16.542523]  <TASK>
[   16.542541]  dump_stack_lvl+0x73/0xb0
[   16.542570]  print_report+0xd1/0x610
[   16.542610]  ? __virt_addr_valid+0x1db/0x2d0
[   16.542635]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.542657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.542682]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.542710]  kasan_report+0x141/0x180
[   16.542734]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.542780]  __asan_report_load8_noabort+0x18/0x20
[   16.542807]  kasan_atomics_helper+0x4f71/0x5450
[   16.542831]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.542856]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.542882]  ? kasan_atomics+0x152/0x310
[   16.542909]  kasan_atomics+0x1dc/0x310
[   16.542933]  ? __pfx_kasan_atomics+0x10/0x10
[   16.542958]  ? __pfx_read_tsc+0x10/0x10
[   16.542995]  ? ktime_get_ts64+0x86/0x230
[   16.543034]  kunit_try_run_case+0x1a5/0x480
[   16.543073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.543098]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.543123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.543148]  ? __kthread_parkme+0x82/0x180
[   16.543169]  ? preempt_count_sub+0x50/0x80
[   16.543194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.543221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.543246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.543284]  kthread+0x337/0x6f0
[   16.543304]  ? trace_preempt_on+0x20/0xc0
[   16.543329]  ? __pfx_kthread+0x10/0x10
[   16.543350]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.543373]  ? calculate_sigpending+0x7b/0xa0
[   16.543398]  ? __pfx_kthread+0x10/0x10
[   16.543421]  ret_from_fork+0x116/0x1d0
[   16.543441]  ? __pfx_kthread+0x10/0x10
[   16.543462]  ret_from_fork_asm+0x1a/0x30
[   16.543512]  </TASK>
[   16.543523] 
[   16.550688] Allocated by task 282:
[   16.550873]  kasan_save_stack+0x45/0x70
[   16.551103]  kasan_save_track+0x18/0x40
[   16.551303]  kasan_save_alloc_info+0x3b/0x50
[   16.551521]  __kasan_kmalloc+0xb7/0xc0
[   16.551689]  __kmalloc_cache_noprof+0x189/0x420
[   16.551844]  kasan_atomics+0x95/0x310
[   16.551977]  kunit_try_run_case+0x1a5/0x480
[   16.552121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.552305]  kthread+0x337/0x6f0
[   16.552425]  ret_from_fork+0x116/0x1d0
[   16.552553]  ret_from_fork_asm+0x1a/0x30
[   16.552690] 
[   16.552774] The buggy address belongs to the object at ffff888102a0a600
[   16.552774]  which belongs to the cache kmalloc-64 of size 64
[   16.553328] The buggy address is located 0 bytes to the right of
[   16.553328]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.553963] 
[   16.554073] The buggy address belongs to the physical page:
[   16.554375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.554797] flags: 0x200000000000000(node=0|zone=2)
[   16.555052] page_type: f5(slab)
[   16.555241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.555602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.555824] page dumped because: kasan: bad access detected
[   16.555991] 
[   16.556059] Memory state around the buggy address:
[   16.556210]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.556554]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.556916] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.557269]                                      ^
[   16.557514]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.557824]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.558160] ==================================================================
[   15.582939] ==================================================================
[   15.583179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.583651] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.584106] 
[   15.584215] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.584259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.584285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.584308] Call Trace:
[   15.584324]  <TASK>
[   15.584339]  dump_stack_lvl+0x73/0xb0
[   15.584367]  print_report+0xd1/0x610
[   15.584390]  ? __virt_addr_valid+0x1db/0x2d0
[   15.584414]  ? kasan_atomics_helper+0x697/0x5450
[   15.584437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.584462]  ? kasan_atomics_helper+0x697/0x5450
[   15.584485]  kasan_report+0x141/0x180
[   15.584508]  ? kasan_atomics_helper+0x697/0x5450
[   15.584549]  kasan_check_range+0x10c/0x1c0
[   15.584574]  __kasan_check_write+0x18/0x20
[   15.584595]  kasan_atomics_helper+0x697/0x5450
[   15.584619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.584644]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.584670]  ? kasan_atomics+0x152/0x310
[   15.584697]  kasan_atomics+0x1dc/0x310
[   15.584720]  ? __pfx_kasan_atomics+0x10/0x10
[   15.584746]  ? __pfx_read_tsc+0x10/0x10
[   15.584769]  ? ktime_get_ts64+0x86/0x230
[   15.584793]  kunit_try_run_case+0x1a5/0x480
[   15.584818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.584842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.584866]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.584892]  ? __kthread_parkme+0x82/0x180
[   15.584914]  ? preempt_count_sub+0x50/0x80
[   15.584939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.584964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.585278]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.585315]  kthread+0x337/0x6f0
[   15.585336]  ? trace_preempt_on+0x20/0xc0
[   15.585360]  ? __pfx_kthread+0x10/0x10
[   15.585382]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.585406]  ? calculate_sigpending+0x7b/0xa0
[   15.585432]  ? __pfx_kthread+0x10/0x10
[   15.585454]  ret_from_fork+0x116/0x1d0
[   15.585475]  ? __pfx_kthread+0x10/0x10
[   15.585497]  ret_from_fork_asm+0x1a/0x30
[   15.585529]  </TASK>
[   15.585539] 
[   15.593770] Allocated by task 282:
[   15.593958]  kasan_save_stack+0x45/0x70
[   15.594190]  kasan_save_track+0x18/0x40
[   15.594390]  kasan_save_alloc_info+0x3b/0x50
[   15.594543]  __kasan_kmalloc+0xb7/0xc0
[   15.594678]  __kmalloc_cache_noprof+0x189/0x420
[   15.594904]  kasan_atomics+0x95/0x310
[   15.595191]  kunit_try_run_case+0x1a5/0x480
[   15.595548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.595746]  kthread+0x337/0x6f0
[   15.595869]  ret_from_fork+0x116/0x1d0
[   15.596068]  ret_from_fork_asm+0x1a/0x30
[   15.596286] 
[   15.596384] The buggy address belongs to the object at ffff888102a0a600
[   15.596384]  which belongs to the cache kmalloc-64 of size 64
[   15.596920] The buggy address is located 0 bytes to the right of
[   15.596920]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.597608] 
[   15.597689] The buggy address belongs to the physical page:
[   15.597949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.598519] flags: 0x200000000000000(node=0|zone=2)
[   15.598723] page_type: f5(slab)
[   15.598890] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.599124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.599448] page dumped because: kasan: bad access detected
[   15.599813] 
[   15.599941] Memory state around the buggy address:
[   15.600199]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.600482]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.600708] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.601013]                                      ^
[   15.601246]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.601584]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.601885] ==================================================================
[   15.640844] ==================================================================
[   15.641738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.642569] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.643239] 
[   15.643362] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.643408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.643422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.643445] Call Trace:
[   15.643459]  <TASK>
[   15.643474]  dump_stack_lvl+0x73/0xb0
[   15.643504]  print_report+0xd1/0x610
[   15.643528]  ? __virt_addr_valid+0x1db/0x2d0
[   15.643552]  ? kasan_atomics_helper+0x860/0x5450
[   15.643574]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.643599]  ? kasan_atomics_helper+0x860/0x5450
[   15.643623]  kasan_report+0x141/0x180
[   15.643646]  ? kasan_atomics_helper+0x860/0x5450
[   15.643674]  kasan_check_range+0x10c/0x1c0
[   15.643699]  __kasan_check_write+0x18/0x20
[   15.643720]  kasan_atomics_helper+0x860/0x5450
[   15.643745]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.643769]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.643795]  ? kasan_atomics+0x152/0x310
[   15.643822]  kasan_atomics+0x1dc/0x310
[   15.643846]  ? __pfx_kasan_atomics+0x10/0x10
[   15.643871]  ? __pfx_read_tsc+0x10/0x10
[   15.643893]  ? ktime_get_ts64+0x86/0x230
[   15.643918]  kunit_try_run_case+0x1a5/0x480
[   15.643945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.643969]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.644053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.644078]  ? __kthread_parkme+0x82/0x180
[   15.644100]  ? preempt_count_sub+0x50/0x80
[   15.644126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.644152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.644178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.644206]  kthread+0x337/0x6f0
[   15.644226]  ? trace_preempt_on+0x20/0xc0
[   15.644250]  ? __pfx_kthread+0x10/0x10
[   15.644282]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.644305]  ? calculate_sigpending+0x7b/0xa0
[   15.644329]  ? __pfx_kthread+0x10/0x10
[   15.644352]  ret_from_fork+0x116/0x1d0
[   15.644372]  ? __pfx_kthread+0x10/0x10
[   15.644393]  ret_from_fork_asm+0x1a/0x30
[   15.644426]  </TASK>
[   15.644436] 
[   15.652538] Allocated by task 282:
[   15.652730]  kasan_save_stack+0x45/0x70
[   15.652938]  kasan_save_track+0x18/0x40
[   15.653103]  kasan_save_alloc_info+0x3b/0x50
[   15.653307]  __kasan_kmalloc+0xb7/0xc0
[   15.653490]  __kmalloc_cache_noprof+0x189/0x420
[   15.653648]  kasan_atomics+0x95/0x310
[   15.653802]  kunit_try_run_case+0x1a5/0x480
[   15.654016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.654451]  kthread+0x337/0x6f0
[   15.654637]  ret_from_fork+0x116/0x1d0
[   15.654787]  ret_from_fork_asm+0x1a/0x30
[   15.654929] 
[   15.655001] The buggy address belongs to the object at ffff888102a0a600
[   15.655001]  which belongs to the cache kmalloc-64 of size 64
[   15.655634] The buggy address is located 0 bytes to the right of
[   15.655634]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.656185] 
[   15.656420] The buggy address belongs to the physical page:
[   15.656631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.656930] flags: 0x200000000000000(node=0|zone=2)
[   15.657094] page_type: f5(slab)
[   15.657217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.657565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.657907] page dumped because: kasan: bad access detected
[   15.658161] 
[   15.658335] Memory state around the buggy address:
[   15.658561]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.659198]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.659515] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.659773]                                      ^
[   15.659931]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.660534]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.660912] ==================================================================
[   15.926974] ==================================================================
[   15.927327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.927669] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.928196] 
[   15.928317] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.928362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.928377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.928398] Call Trace:
[   15.928413]  <TASK>
[   15.928429]  dump_stack_lvl+0x73/0xb0
[   15.928458]  print_report+0xd1/0x610
[   15.928481]  ? __virt_addr_valid+0x1db/0x2d0
[   15.928505]  ? kasan_atomics_helper+0x1079/0x5450
[   15.928528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.928552]  ? kasan_atomics_helper+0x1079/0x5450
[   15.928576]  kasan_report+0x141/0x180
[   15.928599]  ? kasan_atomics_helper+0x1079/0x5450
[   15.928627]  kasan_check_range+0x10c/0x1c0
[   15.928652]  __kasan_check_write+0x18/0x20
[   15.928672]  kasan_atomics_helper+0x1079/0x5450
[   15.928696]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.928721]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.928747]  ? kasan_atomics+0x152/0x310
[   15.928774]  kasan_atomics+0x1dc/0x310
[   15.928797]  ? __pfx_kasan_atomics+0x10/0x10
[   15.928823]  ? __pfx_read_tsc+0x10/0x10
[   15.928845]  ? ktime_get_ts64+0x86/0x230
[   15.928870]  kunit_try_run_case+0x1a5/0x480
[   15.928896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.928921]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.928945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.928971]  ? __kthread_parkme+0x82/0x180
[   15.928992]  ? preempt_count_sub+0x50/0x80
[   15.929017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.929043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.929069]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.929096]  kthread+0x337/0x6f0
[   15.929117]  ? trace_preempt_on+0x20/0xc0
[   15.929140]  ? __pfx_kthread+0x10/0x10
[   15.929163]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.929186]  ? calculate_sigpending+0x7b/0xa0
[   15.929211]  ? __pfx_kthread+0x10/0x10
[   15.929234]  ret_from_fork+0x116/0x1d0
[   15.929254]  ? __pfx_kthread+0x10/0x10
[   15.929285]  ret_from_fork_asm+0x1a/0x30
[   15.929317]  </TASK>
[   15.929329] 
[   15.937625] Allocated by task 282:
[   15.937762]  kasan_save_stack+0x45/0x70
[   15.937910]  kasan_save_track+0x18/0x40
[   15.938320]  kasan_save_alloc_info+0x3b/0x50
[   15.938547]  __kasan_kmalloc+0xb7/0xc0
[   15.938746]  __kmalloc_cache_noprof+0x189/0x420
[   15.939034]  kasan_atomics+0x95/0x310
[   15.939236]  kunit_try_run_case+0x1a5/0x480
[   15.939464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.939689]  kthread+0x337/0x6f0
[   15.939812]  ret_from_fork+0x116/0x1d0
[   15.939946]  ret_from_fork_asm+0x1a/0x30
[   15.940455] 
[   15.940564] The buggy address belongs to the object at ffff888102a0a600
[   15.940564]  which belongs to the cache kmalloc-64 of size 64
[   15.941160] The buggy address is located 0 bytes to the right of
[   15.941160]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.941662] 
[   15.941758] The buggy address belongs to the physical page:
[   15.942061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.942405] flags: 0x200000000000000(node=0|zone=2)
[   15.942571] page_type: f5(slab)
[   15.942692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.942933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.943275] page dumped because: kasan: bad access detected
[   15.943535] 
[   15.943630] Memory state around the buggy address:
[   15.943856]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.944351]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.944641] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.944909]                                      ^
[   15.945185]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.945483]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.945706] ==================================================================
[   15.680336] ==================================================================
[   15.680682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.681191] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.681522] 
[   15.681614] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.681658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.681671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.681694] Call Trace:
[   15.681711]  <TASK>
[   15.681728]  dump_stack_lvl+0x73/0xb0
[   15.681758]  print_report+0xd1/0x610
[   15.681782]  ? __virt_addr_valid+0x1db/0x2d0
[   15.681807]  ? kasan_atomics_helper+0x992/0x5450
[   15.681829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.681855]  ? kasan_atomics_helper+0x992/0x5450
[   15.681879]  kasan_report+0x141/0x180
[   15.681902]  ? kasan_atomics_helper+0x992/0x5450
[   15.681930]  kasan_check_range+0x10c/0x1c0
[   15.681955]  __kasan_check_write+0x18/0x20
[   15.681975]  kasan_atomics_helper+0x992/0x5450
[   15.681999]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.682023]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.682049]  ? kasan_atomics+0x152/0x310
[   15.682076]  kasan_atomics+0x1dc/0x310
[   15.682100]  ? __pfx_kasan_atomics+0x10/0x10
[   15.682125]  ? __pfx_read_tsc+0x10/0x10
[   15.682148]  ? ktime_get_ts64+0x86/0x230
[   15.682173]  kunit_try_run_case+0x1a5/0x480
[   15.682200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.682224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.682249]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.682285]  ? __kthread_parkme+0x82/0x180
[   15.682307]  ? preempt_count_sub+0x50/0x80
[   15.682496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.682523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.682550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.682578]  kthread+0x337/0x6f0
[   15.682598]  ? trace_preempt_on+0x20/0xc0
[   15.682624]  ? __pfx_kthread+0x10/0x10
[   15.682647]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.682671]  ? calculate_sigpending+0x7b/0xa0
[   15.682697]  ? __pfx_kthread+0x10/0x10
[   15.682728]  ret_from_fork+0x116/0x1d0
[   15.682748]  ? __pfx_kthread+0x10/0x10
[   15.682770]  ret_from_fork_asm+0x1a/0x30
[   15.682803]  </TASK>
[   15.682814] 
[   15.690824] Allocated by task 282:
[   15.691098]  kasan_save_stack+0x45/0x70
[   15.691326]  kasan_save_track+0x18/0x40
[   15.691505]  kasan_save_alloc_info+0x3b/0x50
[   15.691693]  __kasan_kmalloc+0xb7/0xc0
[   15.691857]  __kmalloc_cache_noprof+0x189/0x420
[   15.692135]  kasan_atomics+0x95/0x310
[   15.692342]  kunit_try_run_case+0x1a5/0x480
[   15.692533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.692712]  kthread+0x337/0x6f0
[   15.692840]  ret_from_fork+0x116/0x1d0
[   15.692976]  ret_from_fork_asm+0x1a/0x30
[   15.693421] 
[   15.693523] The buggy address belongs to the object at ffff888102a0a600
[   15.693523]  which belongs to the cache kmalloc-64 of size 64
[   15.694331] The buggy address is located 0 bytes to the right of
[   15.694331]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.694868] 
[   15.694960] The buggy address belongs to the physical page:
[   15.695224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.695484] flags: 0x200000000000000(node=0|zone=2)
[   15.695651] page_type: f5(slab)
[   15.695775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.696467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.696827] page dumped because: kasan: bad access detected
[   15.697238] 
[   15.697352] Memory state around the buggy address:
[   15.697575]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.697839]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.698292] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.698620]                                      ^
[   15.698865]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.699213]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.699445] ==================================================================
[   15.380822] ==================================================================
[   15.381511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.381818] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.382089] 
[   15.382200] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.382243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.382255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.382288] Call Trace:
[   15.382299]  <TASK>
[   15.382315]  dump_stack_lvl+0x73/0xb0
[   15.382343]  print_report+0xd1/0x610
[   15.382364]  ? __virt_addr_valid+0x1db/0x2d0
[   15.382388]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.382411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.382437]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.382460]  kasan_report+0x141/0x180
[   15.382481]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.382508]  __asan_report_load4_noabort+0x18/0x20
[   15.382534]  kasan_atomics_helper+0x4bbc/0x5450
[   15.382559]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.382583]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.382662]  ? kasan_atomics+0x152/0x310
[   15.382690]  kasan_atomics+0x1dc/0x310
[   15.382717]  ? __pfx_kasan_atomics+0x10/0x10
[   15.382740]  ? __pfx_read_tsc+0x10/0x10
[   15.382762]  ? ktime_get_ts64+0x86/0x230
[   15.382786]  kunit_try_run_case+0x1a5/0x480
[   15.382812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.382836]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.382861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.382884]  ? __kthread_parkme+0x82/0x180
[   15.382905]  ? preempt_count_sub+0x50/0x80
[   15.382930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.382955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.382980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.383018]  kthread+0x337/0x6f0
[   15.383037]  ? trace_preempt_on+0x20/0xc0
[   15.383061]  ? __pfx_kthread+0x10/0x10
[   15.383082]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.383104]  ? calculate_sigpending+0x7b/0xa0
[   15.383129]  ? __pfx_kthread+0x10/0x10
[   15.383162]  ret_from_fork+0x116/0x1d0
[   15.383349]  ? __pfx_kthread+0x10/0x10
[   15.383371]  ret_from_fork_asm+0x1a/0x30
[   15.383402]  </TASK>
[   15.383412] 
[   15.394060] Allocated by task 282:
[   15.394230]  kasan_save_stack+0x45/0x70
[   15.394422]  kasan_save_track+0x18/0x40
[   15.394618]  kasan_save_alloc_info+0x3b/0x50
[   15.394791]  __kasan_kmalloc+0xb7/0xc0
[   15.394925]  __kmalloc_cache_noprof+0x189/0x420
[   15.395273]  kasan_atomics+0x95/0x310
[   15.395509]  kunit_try_run_case+0x1a5/0x480
[   15.395656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.396007]  kthread+0x337/0x6f0
[   15.396274]  ret_from_fork+0x116/0x1d0
[   15.396501]  ret_from_fork_asm+0x1a/0x30
[   15.396679] 
[   15.396777] The buggy address belongs to the object at ffff888102a0a600
[   15.396777]  which belongs to the cache kmalloc-64 of size 64
[   15.397547] The buggy address is located 0 bytes to the right of
[   15.397547]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.398035] 
[   15.398134] The buggy address belongs to the physical page:
[   15.398487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.398807] flags: 0x200000000000000(node=0|zone=2)
[   15.399006] page_type: f5(slab)
[   15.399150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.399567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.399846] page dumped because: kasan: bad access detected
[   15.400042] 
[   15.400165] Memory state around the buggy address:
[   15.400542]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.400777]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.401094] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.401592]                                      ^
[   15.401755]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.402173]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.402595] ==================================================================
[   15.883951] ==================================================================
[   15.884197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.884875] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.885790] 
[   15.885919] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.885965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.885979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.886238] Call Trace:
[   15.886256]  <TASK>
[   15.886288]  dump_stack_lvl+0x73/0xb0
[   15.886321]  print_report+0xd1/0x610
[   15.886344]  ? __virt_addr_valid+0x1db/0x2d0
[   15.886369]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.886393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.886418]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.886441]  kasan_report+0x141/0x180
[   15.886463]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.886492]  kasan_check_range+0x10c/0x1c0
[   15.886516]  __kasan_check_write+0x18/0x20
[   15.886536]  kasan_atomics_helper+0xfa9/0x5450
[   15.886561]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.886585]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.886612]  ? kasan_atomics+0x152/0x310
[   15.886640]  kasan_atomics+0x1dc/0x310
[   15.886664]  ? __pfx_kasan_atomics+0x10/0x10
[   15.886690]  ? __pfx_read_tsc+0x10/0x10
[   15.886716]  ? ktime_get_ts64+0x86/0x230
[   15.886741]  kunit_try_run_case+0x1a5/0x480
[   15.886768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.886792]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.886818]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.886843]  ? __kthread_parkme+0x82/0x180
[   15.886865]  ? preempt_count_sub+0x50/0x80
[   15.886891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.886918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.886943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.886970]  kthread+0x337/0x6f0
[   15.887170]  ? trace_preempt_on+0x20/0xc0
[   15.887197]  ? __pfx_kthread+0x10/0x10
[   15.887219]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.887242]  ? calculate_sigpending+0x7b/0xa0
[   15.887280]  ? __pfx_kthread+0x10/0x10
[   15.887303]  ret_from_fork+0x116/0x1d0
[   15.887323]  ? __pfx_kthread+0x10/0x10
[   15.887345]  ret_from_fork_asm+0x1a/0x30
[   15.887378]  </TASK>
[   15.887389] 
[   15.899537] Allocated by task 282:
[   15.899726]  kasan_save_stack+0x45/0x70
[   15.899920]  kasan_save_track+0x18/0x40
[   15.900071]  kasan_save_alloc_info+0x3b/0x50
[   15.900296]  __kasan_kmalloc+0xb7/0xc0
[   15.900461]  __kmalloc_cache_noprof+0x189/0x420
[   15.900664]  kasan_atomics+0x95/0x310
[   15.900850]  kunit_try_run_case+0x1a5/0x480
[   15.901043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.901341]  kthread+0x337/0x6f0
[   15.901508]  ret_from_fork+0x116/0x1d0
[   15.901708]  ret_from_fork_asm+0x1a/0x30
[   15.902094] 
[   15.902239] The buggy address belongs to the object at ffff888102a0a600
[   15.902239]  which belongs to the cache kmalloc-64 of size 64
[   15.902738] The buggy address is located 0 bytes to the right of
[   15.902738]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.903141] 
[   15.903513] The buggy address belongs to the physical page:
[   15.903791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.904343] flags: 0x200000000000000(node=0|zone=2)
[   15.904585] page_type: f5(slab)
[   15.904714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.905156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.905409] page dumped because: kasan: bad access detected
[   15.905662] 
[   15.905755] Memory state around the buggy address:
[   15.905972]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.906330]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.906556] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.906887]                                      ^
[   15.907076]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.907519]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.907836] ==================================================================
[   16.246357] ==================================================================
[   16.247551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.248252] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.248958] 
[   16.249288] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.249340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.249466] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.249490] Call Trace:
[   16.249505]  <TASK>
[   16.249524]  dump_stack_lvl+0x73/0xb0
[   16.249560]  print_report+0xd1/0x610
[   16.249585]  ? __virt_addr_valid+0x1db/0x2d0
[   16.249610]  ? kasan_atomics_helper+0x177f/0x5450
[   16.249632]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.249657]  ? kasan_atomics_helper+0x177f/0x5450
[   16.249682]  kasan_report+0x141/0x180
[   16.249705]  ? kasan_atomics_helper+0x177f/0x5450
[   16.249733]  kasan_check_range+0x10c/0x1c0
[   16.249757]  __kasan_check_write+0x18/0x20
[   16.249778]  kasan_atomics_helper+0x177f/0x5450
[   16.249802]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.249826]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.249852]  ? kasan_atomics+0x152/0x310
[   16.249879]  kasan_atomics+0x1dc/0x310
[   16.249902]  ? __pfx_kasan_atomics+0x10/0x10
[   16.249927]  ? __pfx_read_tsc+0x10/0x10
[   16.249950]  ? ktime_get_ts64+0x86/0x230
[   16.249975]  kunit_try_run_case+0x1a5/0x480
[   16.250237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.250278]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.250305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.250330]  ? __kthread_parkme+0x82/0x180
[   16.250353]  ? preempt_count_sub+0x50/0x80
[   16.250378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.250403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.250430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.250456]  kthread+0x337/0x6f0
[   16.250476]  ? trace_preempt_on+0x20/0xc0
[   16.250502]  ? __pfx_kthread+0x10/0x10
[   16.250524]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.250546]  ? calculate_sigpending+0x7b/0xa0
[   16.250572]  ? __pfx_kthread+0x10/0x10
[   16.250595]  ret_from_fork+0x116/0x1d0
[   16.250615]  ? __pfx_kthread+0x10/0x10
[   16.250637]  ret_from_fork_asm+0x1a/0x30
[   16.250670]  </TASK>
[   16.250681] 
[   16.263728] Allocated by task 282:
[   16.264164]  kasan_save_stack+0x45/0x70
[   16.264506]  kasan_save_track+0x18/0x40
[   16.264717]  kasan_save_alloc_info+0x3b/0x50
[   16.264930]  __kasan_kmalloc+0xb7/0xc0
[   16.266170]  __kmalloc_cache_noprof+0x189/0x420
[   16.266374]  kasan_atomics+0x95/0x310
[   16.266516]  kunit_try_run_case+0x1a5/0x480
[   16.266668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.266854]  kthread+0x337/0x6f0
[   16.266986]  ret_from_fork+0x116/0x1d0
[   16.267121]  ret_from_fork_asm+0x1a/0x30
[   16.267272] 
[   16.267349] The buggy address belongs to the object at ffff888102a0a600
[   16.267349]  which belongs to the cache kmalloc-64 of size 64
[   16.267706] The buggy address is located 0 bytes to the right of
[   16.267706]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.268075] 
[   16.268148] The buggy address belongs to the physical page:
[   16.270557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.271493] flags: 0x200000000000000(node=0|zone=2)
[   16.271765] page_type: f5(slab)
[   16.271950] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.272788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.273689] page dumped because: kasan: bad access detected
[   16.273927] 
[   16.274339] Memory state around the buggy address:
[   16.274547]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.274855]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.275644] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.276427]                                      ^
[   16.276744]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.277318]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.278122] ==================================================================
[   16.361099] ==================================================================
[   16.361625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.361923] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.362475] 
[   16.362581] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.362623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.362635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.362658] Call Trace:
[   16.362669]  <TASK>
[   16.362685]  dump_stack_lvl+0x73/0xb0
[   16.362720]  print_report+0xd1/0x610
[   16.362743]  ? __virt_addr_valid+0x1db/0x2d0
[   16.362767]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.362789]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.362815]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.362838]  kasan_report+0x141/0x180
[   16.362862]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.362890]  kasan_check_range+0x10c/0x1c0
[   16.362915]  __kasan_check_write+0x18/0x20
[   16.362936]  kasan_atomics_helper+0x1a7f/0x5450
[   16.362960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.362984]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.363010]  ? kasan_atomics+0x152/0x310
[   16.363037]  kasan_atomics+0x1dc/0x310
[   16.363060]  ? __pfx_kasan_atomics+0x10/0x10
[   16.363086]  ? __pfx_read_tsc+0x10/0x10
[   16.363107]  ? ktime_get_ts64+0x86/0x230
[   16.363132]  kunit_try_run_case+0x1a5/0x480
[   16.363158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.363183]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.363207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.363233]  ? __kthread_parkme+0x82/0x180
[   16.363254]  ? preempt_count_sub+0x50/0x80
[   16.363289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.363315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.363341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.363368]  kthread+0x337/0x6f0
[   16.363387]  ? trace_preempt_on+0x20/0xc0
[   16.363411]  ? __pfx_kthread+0x10/0x10
[   16.363432]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.363455]  ? calculate_sigpending+0x7b/0xa0
[   16.363481]  ? __pfx_kthread+0x10/0x10
[   16.363503]  ret_from_fork+0x116/0x1d0
[   16.363523]  ? __pfx_kthread+0x10/0x10
[   16.363544]  ret_from_fork_asm+0x1a/0x30
[   16.363576]  </TASK>
[   16.363587] 
[   16.370685] Allocated by task 282:
[   16.370853]  kasan_save_stack+0x45/0x70
[   16.371030]  kasan_save_track+0x18/0x40
[   16.371218]  kasan_save_alloc_info+0x3b/0x50
[   16.371408]  __kasan_kmalloc+0xb7/0xc0
[   16.371594]  __kmalloc_cache_noprof+0x189/0x420
[   16.371786]  kasan_atomics+0x95/0x310
[   16.371956]  kunit_try_run_case+0x1a5/0x480
[   16.372119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.372307]  kthread+0x337/0x6f0
[   16.372430]  ret_from_fork+0x116/0x1d0
[   16.372591]  ret_from_fork_asm+0x1a/0x30
[   16.372791] 
[   16.372885] The buggy address belongs to the object at ffff888102a0a600
[   16.372885]  which belongs to the cache kmalloc-64 of size 64
[   16.373377] The buggy address is located 0 bytes to the right of
[   16.373377]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.373747] 
[   16.373842] The buggy address belongs to the physical page:
[   16.374097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.374476] flags: 0x200000000000000(node=0|zone=2)
[   16.374718] page_type: f5(slab)
[   16.374889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.375182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.375488] page dumped because: kasan: bad access detected
[   16.375719] 
[   16.375799] Memory state around the buggy address:
[   16.375995]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.376284]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.376564] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.376778]                                      ^
[   16.376932]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.377152]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.377376] ==================================================================
[   15.699903] ==================================================================
[   15.700451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.700722] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.701043] 
[   15.701156] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.701198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.701212] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.701233] Call Trace:
[   15.701250]  <TASK>
[   15.701617]  dump_stack_lvl+0x73/0xb0
[   15.701660]  print_report+0xd1/0x610
[   15.701685]  ? __virt_addr_valid+0x1db/0x2d0
[   15.701710]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.701733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.701767]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.701790]  kasan_report+0x141/0x180
[   15.701813]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.701841]  kasan_check_range+0x10c/0x1c0
[   15.701866]  __kasan_check_write+0x18/0x20
[   15.701887]  kasan_atomics_helper+0xa2b/0x5450
[   15.701911]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.701935]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.702023]  ? kasan_atomics+0x152/0x310
[   15.702072]  kasan_atomics+0x1dc/0x310
[   15.702097]  ? __pfx_kasan_atomics+0x10/0x10
[   15.702122]  ? __pfx_read_tsc+0x10/0x10
[   15.702144]  ? ktime_get_ts64+0x86/0x230
[   15.702170]  kunit_try_run_case+0x1a5/0x480
[   15.702196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.702220]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.702244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.702281]  ? __kthread_parkme+0x82/0x180
[   15.702302]  ? preempt_count_sub+0x50/0x80
[   15.702327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.702355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.702382]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.702410]  kthread+0x337/0x6f0
[   15.702431]  ? trace_preempt_on+0x20/0xc0
[   15.702455]  ? __pfx_kthread+0x10/0x10
[   15.702477]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.702501]  ? calculate_sigpending+0x7b/0xa0
[   15.702528]  ? __pfx_kthread+0x10/0x10
[   15.702551]  ret_from_fork+0x116/0x1d0
[   15.702571]  ? __pfx_kthread+0x10/0x10
[   15.702593]  ret_from_fork_asm+0x1a/0x30
[   15.702626]  </TASK>
[   15.702637] 
[   15.710663] Allocated by task 282:
[   15.710858]  kasan_save_stack+0x45/0x70
[   15.711152]  kasan_save_track+0x18/0x40
[   15.711367]  kasan_save_alloc_info+0x3b/0x50
[   15.711581]  __kasan_kmalloc+0xb7/0xc0
[   15.711773]  __kmalloc_cache_noprof+0x189/0x420
[   15.712028]  kasan_atomics+0x95/0x310
[   15.712230]  kunit_try_run_case+0x1a5/0x480
[   15.712453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.712686]  kthread+0x337/0x6f0
[   15.712848]  ret_from_fork+0x116/0x1d0
[   15.713107]  ret_from_fork_asm+0x1a/0x30
[   15.713305] 
[   15.713391] The buggy address belongs to the object at ffff888102a0a600
[   15.713391]  which belongs to the cache kmalloc-64 of size 64
[   15.713872] The buggy address is located 0 bytes to the right of
[   15.713872]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.714446] 
[   15.714530] The buggy address belongs to the physical page:
[   15.714793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.715233] flags: 0x200000000000000(node=0|zone=2)
[   15.715483] page_type: f5(slab)
[   15.715650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.715945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.716277] page dumped because: kasan: bad access detected
[   15.716537] 
[   15.716634] Memory state around the buggy address:
[   15.716862]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.717237]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.717564] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.717842]                                      ^
[   15.718259]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.718566]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.718839] ==================================================================
[   16.595285] ==================================================================
[   16.595796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.596386] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.597053] 
[   16.597221] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.597275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.597290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.597321] Call Trace:
[   16.597336]  <TASK>
[   16.597351]  dump_stack_lvl+0x73/0xb0
[   16.597385]  print_report+0xd1/0x610
[   16.597408]  ? __virt_addr_valid+0x1db/0x2d0
[   16.597432]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.597455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.597482]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.597505]  kasan_report+0x141/0x180
[   16.597528]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.597557]  kasan_check_range+0x10c/0x1c0
[   16.597582]  __kasan_check_write+0x18/0x20
[   16.597602]  kasan_atomics_helper+0x20c8/0x5450
[   16.597627]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.597651]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.597676]  ? kasan_atomics+0x152/0x310
[   16.597703]  kasan_atomics+0x1dc/0x310
[   16.597727]  ? __pfx_kasan_atomics+0x10/0x10
[   16.597752]  ? __pfx_read_tsc+0x10/0x10
[   16.597775]  ? ktime_get_ts64+0x86/0x230
[   16.597800]  kunit_try_run_case+0x1a5/0x480
[   16.597825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.597850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.597875]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.597900]  ? __kthread_parkme+0x82/0x180
[   16.597921]  ? preempt_count_sub+0x50/0x80
[   16.597947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.597973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.597998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.598026]  kthread+0x337/0x6f0
[   16.598045]  ? trace_preempt_on+0x20/0xc0
[   16.598069]  ? __pfx_kthread+0x10/0x10
[   16.598090]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.598113]  ? calculate_sigpending+0x7b/0xa0
[   16.598138]  ? __pfx_kthread+0x10/0x10
[   16.598161]  ret_from_fork+0x116/0x1d0
[   16.598181]  ? __pfx_kthread+0x10/0x10
[   16.598203]  ret_from_fork_asm+0x1a/0x30
[   16.598235]  </TASK>
[   16.598246] 
[   16.610065] Allocated by task 282:
[   16.610396]  kasan_save_stack+0x45/0x70
[   16.610758]  kasan_save_track+0x18/0x40
[   16.611110]  kasan_save_alloc_info+0x3b/0x50
[   16.611513]  __kasan_kmalloc+0xb7/0xc0
[   16.611806]  __kmalloc_cache_noprof+0x189/0x420
[   16.611965]  kasan_atomics+0x95/0x310
[   16.612104]  kunit_try_run_case+0x1a5/0x480
[   16.612256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.612495]  kthread+0x337/0x6f0
[   16.612638]  ret_from_fork+0x116/0x1d0
[   16.612830]  ret_from_fork_asm+0x1a/0x30
[   16.612992] 
[   16.613088] The buggy address belongs to the object at ffff888102a0a600
[   16.613088]  which belongs to the cache kmalloc-64 of size 64
[   16.613584] The buggy address is located 0 bytes to the right of
[   16.613584]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.614607] 
[   16.614771] The buggy address belongs to the physical page:
[   16.615216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.615465] flags: 0x200000000000000(node=0|zone=2)
[   16.615629] page_type: f5(slab)
[   16.615749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.616050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.616697] page dumped because: kasan: bad access detected
[   16.617157] 
[   16.617320] Memory state around the buggy address:
[   16.617724]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.618340]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.618951] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.619561]                                      ^
[   16.619966]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.620548]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.620767] ==================================================================
[   15.820770] ==================================================================
[   15.821311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.821652] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.821958] 
[   15.822248] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.822307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.822319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.822340] Call Trace:
[   15.822354]  <TASK>
[   15.822369]  dump_stack_lvl+0x73/0xb0
[   15.822398]  print_report+0xd1/0x610
[   15.822421]  ? __virt_addr_valid+0x1db/0x2d0
[   15.822445]  ? kasan_atomics_helper+0xde0/0x5450
[   15.822467]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.822492]  ? kasan_atomics_helper+0xde0/0x5450
[   15.822516]  kasan_report+0x141/0x180
[   15.822539]  ? kasan_atomics_helper+0xde0/0x5450
[   15.822566]  kasan_check_range+0x10c/0x1c0
[   15.822591]  __kasan_check_write+0x18/0x20
[   15.822612]  kasan_atomics_helper+0xde0/0x5450
[   15.822636]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.822661]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.822687]  ? kasan_atomics+0x152/0x310
[   15.822720]  kasan_atomics+0x1dc/0x310
[   15.822744]  ? __pfx_kasan_atomics+0x10/0x10
[   15.822769]  ? __pfx_read_tsc+0x10/0x10
[   15.822792]  ? ktime_get_ts64+0x86/0x230
[   15.822818]  kunit_try_run_case+0x1a5/0x480
[   15.822844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.822869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.822893]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.822919]  ? __kthread_parkme+0x82/0x180
[   15.822940]  ? preempt_count_sub+0x50/0x80
[   15.822966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.823061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.823088]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.823116]  kthread+0x337/0x6f0
[   15.823137]  ? trace_preempt_on+0x20/0xc0
[   15.823161]  ? __pfx_kthread+0x10/0x10
[   15.823183]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.823206]  ? calculate_sigpending+0x7b/0xa0
[   15.823231]  ? __pfx_kthread+0x10/0x10
[   15.823254]  ret_from_fork+0x116/0x1d0
[   15.823285]  ? __pfx_kthread+0x10/0x10
[   15.823307]  ret_from_fork_asm+0x1a/0x30
[   15.823339]  </TASK>
[   15.823350] 
[   15.831666] Allocated by task 282:
[   15.831852]  kasan_save_stack+0x45/0x70
[   15.832134]  kasan_save_track+0x18/0x40
[   15.832330]  kasan_save_alloc_info+0x3b/0x50
[   15.832499]  __kasan_kmalloc+0xb7/0xc0
[   15.832691]  __kmalloc_cache_noprof+0x189/0x420
[   15.832871]  kasan_atomics+0x95/0x310
[   15.833010]  kunit_try_run_case+0x1a5/0x480
[   15.833158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.833346]  kthread+0x337/0x6f0
[   15.833468]  ret_from_fork+0x116/0x1d0
[   15.833602]  ret_from_fork_asm+0x1a/0x30
[   15.833851] 
[   15.834184] The buggy address belongs to the object at ffff888102a0a600
[   15.834184]  which belongs to the cache kmalloc-64 of size 64
[   15.835169] The buggy address is located 0 bytes to the right of
[   15.835169]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.835845] 
[   15.835922] The buggy address belongs to the physical page:
[   15.836097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.836631] flags: 0x200000000000000(node=0|zone=2)
[   15.836879] page_type: f5(slab)
[   15.837052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.837477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.837823] page dumped because: kasan: bad access detected
[   15.838257] 
[   15.838359] Memory state around the buggy address:
[   15.838578]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.838828]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.839347] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.839635]                                      ^
[   15.839795]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.840125]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.840418] ==================================================================
[   16.516567] ==================================================================
[   16.516914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.517404] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.517737] 
[   16.517869] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.517912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.517926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.517948] Call Trace:
[   16.517968]  <TASK>
[   16.517982]  dump_stack_lvl+0x73/0xb0
[   16.518010]  print_report+0xd1/0x610
[   16.518047]  ? __virt_addr_valid+0x1db/0x2d0
[   16.518070]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.518093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.518118]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.518141]  kasan_report+0x141/0x180
[   16.518164]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.518192]  kasan_check_range+0x10c/0x1c0
[   16.518217]  __kasan_check_write+0x18/0x20
[   16.518237]  kasan_atomics_helper+0x1f43/0x5450
[   16.518272]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.518296]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.518322]  ? kasan_atomics+0x152/0x310
[   16.518349]  kasan_atomics+0x1dc/0x310
[   16.518372]  ? __pfx_kasan_atomics+0x10/0x10
[   16.518398]  ? __pfx_read_tsc+0x10/0x10
[   16.518421]  ? ktime_get_ts64+0x86/0x230
[   16.518447]  kunit_try_run_case+0x1a5/0x480
[   16.518472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.518497]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.518522]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.518547]  ? __kthread_parkme+0x82/0x180
[   16.518569]  ? preempt_count_sub+0x50/0x80
[   16.518594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.518620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.518646]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.518673]  kthread+0x337/0x6f0
[   16.518693]  ? trace_preempt_on+0x20/0xc0
[   16.518725]  ? __pfx_kthread+0x10/0x10
[   16.518746]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.518769]  ? calculate_sigpending+0x7b/0xa0
[   16.518795]  ? __pfx_kthread+0x10/0x10
[   16.518818]  ret_from_fork+0x116/0x1d0
[   16.518838]  ? __pfx_kthread+0x10/0x10
[   16.518859]  ret_from_fork_asm+0x1a/0x30
[   16.518891]  </TASK>
[   16.518901] 
[   16.533332] Allocated by task 282:
[   16.533534]  kasan_save_stack+0x45/0x70
[   16.533702]  kasan_save_track+0x18/0x40
[   16.533899]  kasan_save_alloc_info+0x3b/0x50
[   16.534089]  __kasan_kmalloc+0xb7/0xc0
[   16.534257]  __kmalloc_cache_noprof+0x189/0x420
[   16.534428]  kasan_atomics+0x95/0x310
[   16.534617]  kunit_try_run_case+0x1a5/0x480
[   16.534831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.535053]  kthread+0x337/0x6f0
[   16.535173]  ret_from_fork+0x116/0x1d0
[   16.535358]  ret_from_fork_asm+0x1a/0x30
[   16.535558] 
[   16.535658] The buggy address belongs to the object at ffff888102a0a600
[   16.535658]  which belongs to the cache kmalloc-64 of size 64
[   16.536141] The buggy address is located 0 bytes to the right of
[   16.536141]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.536650] 
[   16.536727] The buggy address belongs to the physical page:
[   16.536964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.537260] flags: 0x200000000000000(node=0|zone=2)
[   16.537504] page_type: f5(slab)
[   16.537652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.537956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.538277] page dumped because: kasan: bad access detected
[   16.538486] 
[   16.538582] Memory state around the buggy address:
[   16.538776]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.539001]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.539256] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.539584]                                      ^
[   16.539807]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.540043]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.540257] ==================================================================
[   16.164343] ==================================================================
[   16.164654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   16.165088] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.165391] 
[   16.165476] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.165518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.165531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.165552] Call Trace:
[   16.165567]  <TASK>
[   16.165581]  dump_stack_lvl+0x73/0xb0
[   16.165608]  print_report+0xd1/0x610
[   16.165631]  ? __virt_addr_valid+0x1db/0x2d0
[   16.165655]  ? kasan_atomics_helper+0x151d/0x5450
[   16.165677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.165703]  ? kasan_atomics_helper+0x151d/0x5450
[   16.165726]  kasan_report+0x141/0x180
[   16.165749]  ? kasan_atomics_helper+0x151d/0x5450
[   16.165777]  kasan_check_range+0x10c/0x1c0
[   16.165802]  __kasan_check_write+0x18/0x20
[   16.165823]  kasan_atomics_helper+0x151d/0x5450
[   16.165847]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.165872]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.165898]  ? kasan_atomics+0x152/0x310
[   16.165925]  kasan_atomics+0x1dc/0x310
[   16.165948]  ? __pfx_kasan_atomics+0x10/0x10
[   16.166081]  ? __pfx_read_tsc+0x10/0x10
[   16.166107]  ? ktime_get_ts64+0x86/0x230
[   16.166132]  kunit_try_run_case+0x1a5/0x480
[   16.166158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.166182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.166206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.166232]  ? __kthread_parkme+0x82/0x180
[   16.166253]  ? preempt_count_sub+0x50/0x80
[   16.166289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.166315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.166342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.166369]  kthread+0x337/0x6f0
[   16.166389]  ? trace_preempt_on+0x20/0xc0
[   16.166413]  ? __pfx_kthread+0x10/0x10
[   16.166434]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.166458]  ? calculate_sigpending+0x7b/0xa0
[   16.166485]  ? __pfx_kthread+0x10/0x10
[   16.166508]  ret_from_fork+0x116/0x1d0
[   16.166527]  ? __pfx_kthread+0x10/0x10
[   16.166548]  ret_from_fork_asm+0x1a/0x30
[   16.166580]  </TASK>
[   16.166591] 
[   16.174582] Allocated by task 282:
[   16.174763]  kasan_save_stack+0x45/0x70
[   16.175131]  kasan_save_track+0x18/0x40
[   16.175343]  kasan_save_alloc_info+0x3b/0x50
[   16.175498]  __kasan_kmalloc+0xb7/0xc0
[   16.175634]  __kmalloc_cache_noprof+0x189/0x420
[   16.175810]  kasan_atomics+0x95/0x310
[   16.176113]  kunit_try_run_case+0x1a5/0x480
[   16.176344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.176602]  kthread+0x337/0x6f0
[   16.176776]  ret_from_fork+0x116/0x1d0
[   16.177036]  ret_from_fork_asm+0x1a/0x30
[   16.177245] 
[   16.177353] The buggy address belongs to the object at ffff888102a0a600
[   16.177353]  which belongs to the cache kmalloc-64 of size 64
[   16.177733] The buggy address is located 0 bytes to the right of
[   16.177733]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.178380] 
[   16.178483] The buggy address belongs to the physical page:
[   16.178699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.179200] flags: 0x200000000000000(node=0|zone=2)
[   16.179387] page_type: f5(slab)
[   16.179547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.179895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.180364] page dumped because: kasan: bad access detected
[   16.180620] 
[   16.180714] Memory state around the buggy address:
[   16.180941]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.181260]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.181598] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.181903]                                      ^
[   16.182192]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.182510]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.182743] ==================================================================
[   16.011725] ==================================================================
[   16.013071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   16.013539] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.013846] 
[   16.013950] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.013994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.014008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.014031] Call Trace:
[   16.014045]  <TASK>
[   16.014061]  dump_stack_lvl+0x73/0xb0
[   16.014091]  print_report+0xd1/0x610
[   16.014115]  ? __virt_addr_valid+0x1db/0x2d0
[   16.014139]  ? kasan_atomics_helper+0x1217/0x5450
[   16.014162]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.014188]  ? kasan_atomics_helper+0x1217/0x5450
[   16.014211]  kasan_report+0x141/0x180
[   16.014234]  ? kasan_atomics_helper+0x1217/0x5450
[   16.014293]  kasan_check_range+0x10c/0x1c0
[   16.014318]  __kasan_check_write+0x18/0x20
[   16.014340]  kasan_atomics_helper+0x1217/0x5450
[   16.014363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.014388]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.014414]  ? kasan_atomics+0x152/0x310
[   16.014442]  kasan_atomics+0x1dc/0x310
[   16.014465]  ? __pfx_kasan_atomics+0x10/0x10
[   16.014489]  ? __pfx_read_tsc+0x10/0x10
[   16.014513]  ? ktime_get_ts64+0x86/0x230
[   16.014538]  kunit_try_run_case+0x1a5/0x480
[   16.014563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.014588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.014613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.014637]  ? __kthread_parkme+0x82/0x180
[   16.014659]  ? preempt_count_sub+0x50/0x80
[   16.014684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.014715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.014742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.014768]  kthread+0x337/0x6f0
[   16.014788]  ? trace_preempt_on+0x20/0xc0
[   16.014812]  ? __pfx_kthread+0x10/0x10
[   16.014834]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.014857]  ? calculate_sigpending+0x7b/0xa0
[   16.014882]  ? __pfx_kthread+0x10/0x10
[   16.014904]  ret_from_fork+0x116/0x1d0
[   16.014924]  ? __pfx_kthread+0x10/0x10
[   16.014945]  ret_from_fork_asm+0x1a/0x30
[   16.014977]  </TASK>
[   16.014989] 
[   16.023201] Allocated by task 282:
[   16.023393]  kasan_save_stack+0x45/0x70
[   16.023592]  kasan_save_track+0x18/0x40
[   16.023760]  kasan_save_alloc_info+0x3b/0x50
[   16.023956]  __kasan_kmalloc+0xb7/0xc0
[   16.024191]  __kmalloc_cache_noprof+0x189/0x420
[   16.024363]  kasan_atomics+0x95/0x310
[   16.024548]  kunit_try_run_case+0x1a5/0x480
[   16.024757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.025127]  kthread+0x337/0x6f0
[   16.025326]  ret_from_fork+0x116/0x1d0
[   16.025503]  ret_from_fork_asm+0x1a/0x30
[   16.025646] 
[   16.025720] The buggy address belongs to the object at ffff888102a0a600
[   16.025720]  which belongs to the cache kmalloc-64 of size 64
[   16.026310] The buggy address is located 0 bytes to the right of
[   16.026310]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.026694] 
[   16.026798] The buggy address belongs to the physical page:
[   16.027252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.027637] flags: 0x200000000000000(node=0|zone=2)
[   16.027870] page_type: f5(slab)
[   16.028128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.028472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.028760] page dumped because: kasan: bad access detected
[   16.028955] 
[   16.029119] Memory state around the buggy address:
[   16.029296]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.029628]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.029955] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.030368]                                      ^
[   16.030608]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.030911]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.031395] ==================================================================
[   16.621192] ==================================================================
[   16.621471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.621807] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.622139] 
[   16.622251] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.622303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.622317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.622338] Call Trace:
[   16.622354]  <TASK>
[   16.622371]  dump_stack_lvl+0x73/0xb0
[   16.622397]  print_report+0xd1/0x610
[   16.622419]  ? __virt_addr_valid+0x1db/0x2d0
[   16.622443]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.622466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.622491]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.622515]  kasan_report+0x141/0x180
[   16.622538]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.622566]  __asan_report_load8_noabort+0x18/0x20
[   16.622592]  kasan_atomics_helper+0x4fb2/0x5450
[   16.622619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.622645]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.622671]  ? kasan_atomics+0x152/0x310
[   16.622698]  kasan_atomics+0x1dc/0x310
[   16.622728]  ? __pfx_kasan_atomics+0x10/0x10
[   16.622755]  ? __pfx_read_tsc+0x10/0x10
[   16.622776]  ? ktime_get_ts64+0x86/0x230
[   16.622802]  kunit_try_run_case+0x1a5/0x480
[   16.622828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.622854]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.622880]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.622906]  ? __kthread_parkme+0x82/0x180
[   16.622928]  ? preempt_count_sub+0x50/0x80
[   16.622952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.622979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.623005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.623031]  kthread+0x337/0x6f0
[   16.623051]  ? trace_preempt_on+0x20/0xc0
[   16.623075]  ? __pfx_kthread+0x10/0x10
[   16.623097]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.623120]  ? calculate_sigpending+0x7b/0xa0
[   16.623145]  ? __pfx_kthread+0x10/0x10
[   16.623168]  ret_from_fork+0x116/0x1d0
[   16.623187]  ? __pfx_kthread+0x10/0x10
[   16.623209]  ret_from_fork_asm+0x1a/0x30
[   16.623241]  </TASK>
[   16.623252] 
[   16.630175] Allocated by task 282:
[   16.630314]  kasan_save_stack+0x45/0x70
[   16.630456]  kasan_save_track+0x18/0x40
[   16.630616]  kasan_save_alloc_info+0x3b/0x50
[   16.630833]  __kasan_kmalloc+0xb7/0xc0
[   16.631020]  __kmalloc_cache_noprof+0x189/0x420
[   16.631241]  kasan_atomics+0x95/0x310
[   16.631438]  kunit_try_run_case+0x1a5/0x480
[   16.631649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.631847]  kthread+0x337/0x6f0
[   16.631969]  ret_from_fork+0x116/0x1d0
[   16.632150]  ret_from_fork_asm+0x1a/0x30
[   16.632361] 
[   16.632458] The buggy address belongs to the object at ffff888102a0a600
[   16.632458]  which belongs to the cache kmalloc-64 of size 64
[   16.632904] The buggy address is located 0 bytes to the right of
[   16.632904]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.633301] 
[   16.633398] The buggy address belongs to the physical page:
[   16.633651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.634000] flags: 0x200000000000000(node=0|zone=2)
[   16.634214] page_type: f5(slab)
[   16.634344] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.634577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.634868] page dumped because: kasan: bad access detected
[   16.635124] 
[   16.635216] Memory state around the buggy address:
[   16.635454]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.635780]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.636112] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.636417]                                      ^
[   16.636609]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.636826]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.637147] ==================================================================
[   16.429223] ==================================================================
[   16.430528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.430835] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.431065] 
[   16.431150] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.431195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.431209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.431231] Call Trace:
[   16.431246]  <TASK>
[   16.431260]  dump_stack_lvl+0x73/0xb0
[   16.431494]  print_report+0xd1/0x610
[   16.431519]  ? __virt_addr_valid+0x1db/0x2d0
[   16.431544]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.431567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.431591]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.431779]  kasan_report+0x141/0x180
[   16.431804]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.431833]  kasan_check_range+0x10c/0x1c0
[   16.431859]  __kasan_check_write+0x18/0x20
[   16.431879]  kasan_atomics_helper+0x1ce1/0x5450
[   16.431906]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.431930]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.431956]  ? kasan_atomics+0x152/0x310
[   16.431983]  kasan_atomics+0x1dc/0x310
[   16.432007]  ? __pfx_kasan_atomics+0x10/0x10
[   16.432032]  ? __pfx_read_tsc+0x10/0x10
[   16.432054]  ? ktime_get_ts64+0x86/0x230
[   16.432082]  kunit_try_run_case+0x1a5/0x480
[   16.432108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.432133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.432158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.432183]  ? __kthread_parkme+0x82/0x180
[   16.432204]  ? preempt_count_sub+0x50/0x80
[   16.432228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.432255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.432293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.432319]  kthread+0x337/0x6f0
[   16.432340]  ? trace_preempt_on+0x20/0xc0
[   16.432364]  ? __pfx_kthread+0x10/0x10
[   16.432386]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.432409]  ? calculate_sigpending+0x7b/0xa0
[   16.432434]  ? __pfx_kthread+0x10/0x10
[   16.432456]  ret_from_fork+0x116/0x1d0
[   16.432476]  ? __pfx_kthread+0x10/0x10
[   16.432497]  ret_from_fork_asm+0x1a/0x30
[   16.432530]  </TASK>
[   16.432541] 
[   16.444800] Allocated by task 282:
[   16.444940]  kasan_save_stack+0x45/0x70
[   16.445090]  kasan_save_track+0x18/0x40
[   16.445226]  kasan_save_alloc_info+0x3b/0x50
[   16.445390]  __kasan_kmalloc+0xb7/0xc0
[   16.445525]  __kmalloc_cache_noprof+0x189/0x420
[   16.445682]  kasan_atomics+0x95/0x310
[   16.445816]  kunit_try_run_case+0x1a5/0x480
[   16.445964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.446142]  kthread+0x337/0x6f0
[   16.446278]  ret_from_fork+0x116/0x1d0
[   16.446605]  ret_from_fork_asm+0x1a/0x30
[   16.446958] 
[   16.447113] The buggy address belongs to the object at ffff888102a0a600
[   16.447113]  which belongs to the cache kmalloc-64 of size 64
[   16.448112] The buggy address is located 0 bytes to the right of
[   16.448112]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.449154] 
[   16.449329] The buggy address belongs to the physical page:
[   16.449799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.450482] flags: 0x200000000000000(node=0|zone=2)
[   16.450902] page_type: f5(slab)
[   16.451195] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.451846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.452483] page dumped because: kasan: bad access detected
[   16.452959] 
[   16.453112] Memory state around the buggy address:
[   16.453531]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.454310]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.454921] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.455537]                                      ^
[   16.455968]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.456603]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.457212] ==================================================================
[   15.444670] ==================================================================
[   15.444972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.445388] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.445700] 
[   15.445801] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.445843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.445857] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.445878] Call Trace:
[   15.445893]  <TASK>
[   15.445909]  dump_stack_lvl+0x73/0xb0
[   15.445936]  print_report+0xd1/0x610
[   15.445959]  ? __virt_addr_valid+0x1db/0x2d0
[   15.445983]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.446005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.446030]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.446053]  kasan_report+0x141/0x180
[   15.446076]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.446104]  __asan_report_store4_noabort+0x1b/0x30
[   15.446130]  kasan_atomics_helper+0x4b6e/0x5450
[   15.446155]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.446198]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.446223]  ? kasan_atomics+0x152/0x310
[   15.446251]  kasan_atomics+0x1dc/0x310
[   15.446286]  ? __pfx_kasan_atomics+0x10/0x10
[   15.446311]  ? __pfx_read_tsc+0x10/0x10
[   15.446333]  ? ktime_get_ts64+0x86/0x230
[   15.446358]  kunit_try_run_case+0x1a5/0x480
[   15.446384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.446408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.446433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.446459]  ? __kthread_parkme+0x82/0x180
[   15.446480]  ? preempt_count_sub+0x50/0x80
[   15.446505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.446531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.446558]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.446585]  kthread+0x337/0x6f0
[   15.446605]  ? trace_preempt_on+0x20/0xc0
[   15.446629]  ? __pfx_kthread+0x10/0x10
[   15.446651]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.446674]  ? calculate_sigpending+0x7b/0xa0
[   15.446699]  ? __pfx_kthread+0x10/0x10
[   15.446728]  ret_from_fork+0x116/0x1d0
[   15.446747]  ? __pfx_kthread+0x10/0x10
[   15.446769]  ret_from_fork_asm+0x1a/0x30
[   15.446801]  </TASK>
[   15.446811] 
[   15.454571] Allocated by task 282:
[   15.454767]  kasan_save_stack+0x45/0x70
[   15.454970]  kasan_save_track+0x18/0x40
[   15.455242]  kasan_save_alloc_info+0x3b/0x50
[   15.455443]  __kasan_kmalloc+0xb7/0xc0
[   15.455613]  __kmalloc_cache_noprof+0x189/0x420
[   15.455813]  kasan_atomics+0x95/0x310
[   15.456005]  kunit_try_run_case+0x1a5/0x480
[   15.456161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.456351]  kthread+0x337/0x6f0
[   15.456475]  ret_from_fork+0x116/0x1d0
[   15.456610]  ret_from_fork_asm+0x1a/0x30
[   15.456753] 
[   15.456824] The buggy address belongs to the object at ffff888102a0a600
[   15.456824]  which belongs to the cache kmalloc-64 of size 64
[   15.457301] The buggy address is located 0 bytes to the right of
[   15.457301]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.458594] 
[   15.458691] The buggy address belongs to the physical page:
[   15.458947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.459396] flags: 0x200000000000000(node=0|zone=2)
[   15.459561] page_type: f5(slab)
[   15.459681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.459911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.460354] page dumped because: kasan: bad access detected
[   15.460621] 
[   15.460714] Memory state around the buggy address:
[   15.460942]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.461600]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.461855] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.462393]                                      ^
[   15.462553]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.462778]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.463208] ==================================================================
[   16.679918] ==================================================================
[   16.680434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.681058] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.681373] 
[   16.681478] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.681522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.681535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.681557] Call Trace:
[   16.681573]  <TASK>
[   16.681588]  dump_stack_lvl+0x73/0xb0
[   16.681616]  print_report+0xd1/0x610
[   16.681639]  ? __virt_addr_valid+0x1db/0x2d0
[   16.681662]  ? kasan_atomics_helper+0x224c/0x5450
[   16.681685]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.681710]  ? kasan_atomics_helper+0x224c/0x5450
[   16.681734]  kasan_report+0x141/0x180
[   16.681756]  ? kasan_atomics_helper+0x224c/0x5450
[   16.681785]  kasan_check_range+0x10c/0x1c0
[   16.681810]  __kasan_check_write+0x18/0x20
[   16.681831]  kasan_atomics_helper+0x224c/0x5450
[   16.681856]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.681880]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.681906]  ? kasan_atomics+0x152/0x310
[   16.681933]  kasan_atomics+0x1dc/0x310
[   16.681957]  ? __pfx_kasan_atomics+0x10/0x10
[   16.681983]  ? __pfx_read_tsc+0x10/0x10
[   16.682005]  ? ktime_get_ts64+0x86/0x230
[   16.682031]  kunit_try_run_case+0x1a5/0x480
[   16.682056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.682083]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.682107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.682133]  ? __kthread_parkme+0x82/0x180
[   16.682154]  ? preempt_count_sub+0x50/0x80
[   16.682180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.682207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.682233]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.682260]  kthread+0x337/0x6f0
[   16.682480]  ? trace_preempt_on+0x20/0xc0
[   16.682507]  ? __pfx_kthread+0x10/0x10
[   16.682529]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.682553]  ? calculate_sigpending+0x7b/0xa0
[   16.682578]  ? __pfx_kthread+0x10/0x10
[   16.682636]  ret_from_fork+0x116/0x1d0
[   16.682658]  ? __pfx_kthread+0x10/0x10
[   16.682679]  ret_from_fork_asm+0x1a/0x30
[   16.682718]  </TASK>
[   16.682729] 
[   16.692830] Allocated by task 282:
[   16.693209]  kasan_save_stack+0x45/0x70
[   16.693510]  kasan_save_track+0x18/0x40
[   16.693884]  kasan_save_alloc_info+0x3b/0x50
[   16.694198]  __kasan_kmalloc+0xb7/0xc0
[   16.694636]  __kmalloc_cache_noprof+0x189/0x420
[   16.694918]  kasan_atomics+0x95/0x310
[   16.695201]  kunit_try_run_case+0x1a5/0x480
[   16.695603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.696051]  kthread+0x337/0x6f0
[   16.696288]  ret_from_fork+0x116/0x1d0
[   16.696582]  ret_from_fork_asm+0x1a/0x30
[   16.696879] 
[   16.696987] The buggy address belongs to the object at ffff888102a0a600
[   16.696987]  which belongs to the cache kmalloc-64 of size 64
[   16.697478] The buggy address is located 0 bytes to the right of
[   16.697478]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.697981] 
[   16.698072] The buggy address belongs to the physical page:
[   16.698635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.699178] flags: 0x200000000000000(node=0|zone=2)
[   16.699581] page_type: f5(slab)
[   16.699874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.700390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.700946] page dumped because: kasan: bad access detected
[   16.701314] 
[   16.701545] Memory state around the buggy address:
[   16.701779]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.702068]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.702368] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.702657]                                      ^
[   16.702872]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.703161]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.703826] ==================================================================
[   16.704935] ==================================================================
[   16.705599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.705906] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.706202] 
[   16.706313] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.706356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.706369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.706392] Call Trace:
[   16.706408]  <TASK>
[   16.706424]  dump_stack_lvl+0x73/0xb0
[   16.706452]  print_report+0xd1/0x610
[   16.706474]  ? __virt_addr_valid+0x1db/0x2d0
[   16.706498]  ? kasan_atomics_helper+0x5115/0x5450
[   16.706524]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.706549]  ? kasan_atomics_helper+0x5115/0x5450
[   16.706572]  kasan_report+0x141/0x180
[   16.706596]  ? kasan_atomics_helper+0x5115/0x5450
[   16.706627]  __asan_report_load8_noabort+0x18/0x20
[   16.706655]  kasan_atomics_helper+0x5115/0x5450
[   16.706680]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.706711]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.706738]  ? kasan_atomics+0x152/0x310
[   16.706765]  kasan_atomics+0x1dc/0x310
[   16.706790]  ? __pfx_kasan_atomics+0x10/0x10
[   16.706816]  ? __pfx_read_tsc+0x10/0x10
[   16.706838]  ? ktime_get_ts64+0x86/0x230
[   16.706864]  kunit_try_run_case+0x1a5/0x480
[   16.706890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.706914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.706939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.706965]  ? __kthread_parkme+0x82/0x180
[   16.706986]  ? preempt_count_sub+0x50/0x80
[   16.707011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.707037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.707063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.707090]  kthread+0x337/0x6f0
[   16.707111]  ? trace_preempt_on+0x20/0xc0
[   16.707134]  ? __pfx_kthread+0x10/0x10
[   16.707156]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.707179]  ? calculate_sigpending+0x7b/0xa0
[   16.707205]  ? __pfx_kthread+0x10/0x10
[   16.707227]  ret_from_fork+0x116/0x1d0
[   16.707247]  ? __pfx_kthread+0x10/0x10
[   16.707280]  ret_from_fork_asm+0x1a/0x30
[   16.707312]  </TASK>
[   16.707323] 
[   16.714285] Allocated by task 282:
[   16.714427]  kasan_save_stack+0x45/0x70
[   16.714596]  kasan_save_track+0x18/0x40
[   16.714800]  kasan_save_alloc_info+0x3b/0x50
[   16.714962]  __kasan_kmalloc+0xb7/0xc0
[   16.715158]  __kmalloc_cache_noprof+0x189/0x420
[   16.715356]  kasan_atomics+0x95/0x310
[   16.715524]  kunit_try_run_case+0x1a5/0x480
[   16.715715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.715938]  kthread+0x337/0x6f0
[   16.716095]  ret_from_fork+0x116/0x1d0
[   16.716255]  ret_from_fork_asm+0x1a/0x30
[   16.716424] 
[   16.716509] The buggy address belongs to the object at ffff888102a0a600
[   16.716509]  which belongs to the cache kmalloc-64 of size 64
[   16.716943] The buggy address is located 0 bytes to the right of
[   16.716943]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.717325] 
[   16.717398] The buggy address belongs to the physical page:
[   16.717647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.718002] flags: 0x200000000000000(node=0|zone=2)
[   16.718231] page_type: f5(slab)
[   16.718406] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.718666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.718903] page dumped because: kasan: bad access detected
[   16.719076] 
[   16.719146] Memory state around the buggy address:
[   16.719381]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.719706]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.720033] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.720366]                                      ^
[   16.720589]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.720911]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.721188] ==================================================================
[   15.602344] ==================================================================
[   15.602682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.602940] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.603563] 
[   15.603656] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.603702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.603716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.603738] Call Trace:
[   15.603752]  <TASK>
[   15.603767]  dump_stack_lvl+0x73/0xb0
[   15.603795]  print_report+0xd1/0x610
[   15.603818]  ? __virt_addr_valid+0x1db/0x2d0
[   15.603842]  ? kasan_atomics_helper+0x72f/0x5450
[   15.603865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.603891]  ? kasan_atomics_helper+0x72f/0x5450
[   15.603914]  kasan_report+0x141/0x180
[   15.603937]  ? kasan_atomics_helper+0x72f/0x5450
[   15.603965]  kasan_check_range+0x10c/0x1c0
[   15.603989]  __kasan_check_write+0x18/0x20
[   15.604010]  kasan_atomics_helper+0x72f/0x5450
[   15.604034]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.604059]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.604086]  ? kasan_atomics+0x152/0x310
[   15.604113]  kasan_atomics+0x1dc/0x310
[   15.604136]  ? __pfx_kasan_atomics+0x10/0x10
[   15.604163]  ? __pfx_read_tsc+0x10/0x10
[   15.604184]  ? ktime_get_ts64+0x86/0x230
[   15.604209]  kunit_try_run_case+0x1a5/0x480
[   15.604316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.604345]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.604369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.604395]  ? __kthread_parkme+0x82/0x180
[   15.604416]  ? preempt_count_sub+0x50/0x80
[   15.604441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.604467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.604493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.604520]  kthread+0x337/0x6f0
[   15.604541]  ? trace_preempt_on+0x20/0xc0
[   15.604564]  ? __pfx_kthread+0x10/0x10
[   15.604586]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.604608]  ? calculate_sigpending+0x7b/0xa0
[   15.604634]  ? __pfx_kthread+0x10/0x10
[   15.604657]  ret_from_fork+0x116/0x1d0
[   15.604677]  ? __pfx_kthread+0x10/0x10
[   15.604699]  ret_from_fork_asm+0x1a/0x30
[   15.604730]  </TASK>
[   15.604741] 
[   15.612691] Allocated by task 282:
[   15.612876]  kasan_save_stack+0x45/0x70
[   15.613337]  kasan_save_track+0x18/0x40
[   15.613640]  kasan_save_alloc_info+0x3b/0x50
[   15.613869]  __kasan_kmalloc+0xb7/0xc0
[   15.614203]  __kmalloc_cache_noprof+0x189/0x420
[   15.614427]  kasan_atomics+0x95/0x310
[   15.614564]  kunit_try_run_case+0x1a5/0x480
[   15.614736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.614990]  kthread+0x337/0x6f0
[   15.615216]  ret_from_fork+0x116/0x1d0
[   15.615450]  ret_from_fork_asm+0x1a/0x30
[   15.615654] 
[   15.615732] The buggy address belongs to the object at ffff888102a0a600
[   15.615732]  which belongs to the cache kmalloc-64 of size 64
[   15.616277] The buggy address is located 0 bytes to the right of
[   15.616277]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.616655] 
[   15.616727] The buggy address belongs to the physical page:
[   15.616951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.617307] flags: 0x200000000000000(node=0|zone=2)
[   15.617540] page_type: f5(slab)
[   15.617871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.618161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.618804] page dumped because: kasan: bad access detected
[   15.619115] 
[   15.619210] Memory state around the buggy address:
[   15.619431]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.619684]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.619903] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.620180]                                      ^
[   15.620421]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.620752]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.621075] ==================================================================
[   15.463670] ==================================================================
[   15.464020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.464356] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.464608] 
[   15.464690] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.464730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.464744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.464766] Call Trace:
[   15.464781]  <TASK>
[   15.464795]  dump_stack_lvl+0x73/0xb0
[   15.464822]  print_report+0xd1/0x610
[   15.464843]  ? __virt_addr_valid+0x1db/0x2d0
[   15.464867]  ? kasan_atomics_helper+0x3df/0x5450
[   15.464890]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.464914]  ? kasan_atomics_helper+0x3df/0x5450
[   15.464937]  kasan_report+0x141/0x180
[   15.464960]  ? kasan_atomics_helper+0x3df/0x5450
[   15.464987]  kasan_check_range+0x10c/0x1c0
[   15.465012]  __kasan_check_read+0x15/0x20
[   15.465033]  kasan_atomics_helper+0x3df/0x5450
[   15.465057]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.465082]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.465108]  ? kasan_atomics+0x152/0x310
[   15.465135]  kasan_atomics+0x1dc/0x310
[   15.465159]  ? __pfx_kasan_atomics+0x10/0x10
[   15.465184]  ? __pfx_read_tsc+0x10/0x10
[   15.465205]  ? ktime_get_ts64+0x86/0x230
[   15.465230]  kunit_try_run_case+0x1a5/0x480
[   15.465255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.465289]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.465315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.465340]  ? __kthread_parkme+0x82/0x180
[   15.465363]  ? preempt_count_sub+0x50/0x80
[   15.465388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.465414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.465440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.465466]  kthread+0x337/0x6f0
[   15.465486]  ? trace_preempt_on+0x20/0xc0
[   15.465510]  ? __pfx_kthread+0x10/0x10
[   15.465532]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.465555]  ? calculate_sigpending+0x7b/0xa0
[   15.465581]  ? __pfx_kthread+0x10/0x10
[   15.465604]  ret_from_fork+0x116/0x1d0
[   15.465623]  ? __pfx_kthread+0x10/0x10
[   15.465645]  ret_from_fork_asm+0x1a/0x30
[   15.465677]  </TASK>
[   15.465687] 
[   15.476077] Allocated by task 282:
[   15.476216]  kasan_save_stack+0x45/0x70
[   15.476383]  kasan_save_track+0x18/0x40
[   15.476522]  kasan_save_alloc_info+0x3b/0x50
[   15.476674]  __kasan_kmalloc+0xb7/0xc0
[   15.476938]  __kmalloc_cache_noprof+0x189/0x420
[   15.477318]  kasan_atomics+0x95/0x310
[   15.477456]  kunit_try_run_case+0x1a5/0x480
[   15.477619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.477867]  kthread+0x337/0x6f0
[   15.478036]  ret_from_fork+0x116/0x1d0
[   15.479169]  ret_from_fork_asm+0x1a/0x30
[   15.479414] 
[   15.479512] The buggy address belongs to the object at ffff888102a0a600
[   15.479512]  which belongs to the cache kmalloc-64 of size 64
[   15.479947] The buggy address is located 0 bytes to the right of
[   15.479947]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.481775] 
[   15.481860] The buggy address belongs to the physical page:
[   15.482032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.482558] flags: 0x200000000000000(node=0|zone=2)
[   15.482787] page_type: f5(slab)
[   15.482931] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.483421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.483656] page dumped because: kasan: bad access detected
[   15.483831] 
[   15.483928] Memory state around the buggy address:
[   15.484110]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.484351]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.485510] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.485833]                                      ^
[   15.486297]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.486579]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.486845] ==================================================================
[   15.801181] ==================================================================
[   15.801504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.801911] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.802416] 
[   15.802729] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.802775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.802788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.802809] Call Trace:
[   15.802825]  <TASK>
[   15.802839]  dump_stack_lvl+0x73/0xb0
[   15.802868]  print_report+0xd1/0x610
[   15.802891]  ? __virt_addr_valid+0x1db/0x2d0
[   15.802916]  ? kasan_atomics_helper+0xd47/0x5450
[   15.802939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.802964]  ? kasan_atomics_helper+0xd47/0x5450
[   15.802988]  kasan_report+0x141/0x180
[   15.803011]  ? kasan_atomics_helper+0xd47/0x5450
[   15.803039]  kasan_check_range+0x10c/0x1c0
[   15.803064]  __kasan_check_write+0x18/0x20
[   15.803086]  kasan_atomics_helper+0xd47/0x5450
[   15.803110]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.803134]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.803161]  ? kasan_atomics+0x152/0x310
[   15.803188]  kasan_atomics+0x1dc/0x310
[   15.803212]  ? __pfx_kasan_atomics+0x10/0x10
[   15.803238]  ? __pfx_read_tsc+0x10/0x10
[   15.803260]  ? ktime_get_ts64+0x86/0x230
[   15.803299]  kunit_try_run_case+0x1a5/0x480
[   15.803325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.803349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.803375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.803401]  ? __kthread_parkme+0x82/0x180
[   15.803490]  ? preempt_count_sub+0x50/0x80
[   15.803518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.803545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.803571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.803598]  kthread+0x337/0x6f0
[   15.803619]  ? trace_preempt_on+0x20/0xc0
[   15.803643]  ? __pfx_kthread+0x10/0x10
[   15.803665]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.803688]  ? calculate_sigpending+0x7b/0xa0
[   15.803714]  ? __pfx_kthread+0x10/0x10
[   15.803737]  ret_from_fork+0x116/0x1d0
[   15.803757]  ? __pfx_kthread+0x10/0x10
[   15.803778]  ret_from_fork_asm+0x1a/0x30
[   15.803811]  </TASK>
[   15.803822] 
[   15.812224] Allocated by task 282:
[   15.812420]  kasan_save_stack+0x45/0x70
[   15.812623]  kasan_save_track+0x18/0x40
[   15.812814]  kasan_save_alloc_info+0x3b/0x50
[   15.813044]  __kasan_kmalloc+0xb7/0xc0
[   15.813179]  __kmalloc_cache_noprof+0x189/0x420
[   15.813344]  kasan_atomics+0x95/0x310
[   15.813480]  kunit_try_run_case+0x1a5/0x480
[   15.813815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.814368]  kthread+0x337/0x6f0
[   15.814559]  ret_from_fork+0x116/0x1d0
[   15.814754]  ret_from_fork_asm+0x1a/0x30
[   15.814955] 
[   15.815116] The buggy address belongs to the object at ffff888102a0a600
[   15.815116]  which belongs to the cache kmalloc-64 of size 64
[   15.815602] The buggy address is located 0 bytes to the right of
[   15.815602]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.816167] 
[   15.816281] The buggy address belongs to the physical page:
[   15.816507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.816820] flags: 0x200000000000000(node=0|zone=2)
[   15.817112] page_type: f5(slab)
[   15.817277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.817574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.817880] page dumped because: kasan: bad access detected
[   15.818317] 
[   15.818417] Memory state around the buggy address:
[   15.818630]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.818944]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.819240] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.819468]                                      ^
[   15.819624]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.819906]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.820311] ==================================================================
[   16.654221] ==================================================================
[   16.654571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.654910] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.655856] 
[   16.655978] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.656024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.656037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.656057] Call Trace:
[   16.656069]  <TASK>
[   16.656084]  dump_stack_lvl+0x73/0xb0
[   16.656113]  print_report+0xd1/0x610
[   16.656137]  ? __virt_addr_valid+0x1db/0x2d0
[   16.656159]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.656182]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.656209]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.656232]  kasan_report+0x141/0x180
[   16.656256]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.656295]  __asan_report_load8_noabort+0x18/0x20
[   16.656323]  kasan_atomics_helper+0x4fa5/0x5450
[   16.656347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.656372]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.656398]  ? kasan_atomics+0x152/0x310
[   16.656425]  kasan_atomics+0x1dc/0x310
[   16.656448]  ? __pfx_kasan_atomics+0x10/0x10
[   16.656475]  ? __pfx_read_tsc+0x10/0x10
[   16.656497]  ? ktime_get_ts64+0x86/0x230
[   16.656522]  kunit_try_run_case+0x1a5/0x480
[   16.656547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.656572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.656597]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.656622]  ? __kthread_parkme+0x82/0x180
[   16.656644]  ? preempt_count_sub+0x50/0x80
[   16.656669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.656695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.656721]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.656748]  kthread+0x337/0x6f0
[   16.656768]  ? trace_preempt_on+0x20/0xc0
[   16.656792]  ? __pfx_kthread+0x10/0x10
[   16.657319]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.657344]  ? calculate_sigpending+0x7b/0xa0
[   16.657370]  ? __pfx_kthread+0x10/0x10
[   16.657392]  ret_from_fork+0x116/0x1d0
[   16.657797]  ? __pfx_kthread+0x10/0x10
[   16.657827]  ret_from_fork_asm+0x1a/0x30
[   16.657861]  </TASK>
[   16.657872] 
[   16.668057] Allocated by task 282:
[   16.668494]  kasan_save_stack+0x45/0x70
[   16.668756]  kasan_save_track+0x18/0x40
[   16.669046]  kasan_save_alloc_info+0x3b/0x50
[   16.669408]  __kasan_kmalloc+0xb7/0xc0
[   16.669590]  __kmalloc_cache_noprof+0x189/0x420
[   16.669804]  kasan_atomics+0x95/0x310
[   16.669975]  kunit_try_run_case+0x1a5/0x480
[   16.670166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.670409]  kthread+0x337/0x6f0
[   16.670562]  ret_from_fork+0x116/0x1d0
[   16.670742]  ret_from_fork_asm+0x1a/0x30
[   16.670922] 
[   16.671011] The buggy address belongs to the object at ffff888102a0a600
[   16.671011]  which belongs to the cache kmalloc-64 of size 64
[   16.671999] The buggy address is located 0 bytes to the right of
[   16.671999]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.672809] 
[   16.673044] The buggy address belongs to the physical page:
[   16.673482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.673993] flags: 0x200000000000000(node=0|zone=2)
[   16.674397] page_type: f5(slab)
[   16.674678] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.675178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.675780] page dumped because: kasan: bad access detected
[   16.676083] 
[   16.676181] Memory state around the buggy address:
[   16.676401]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.676696]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.676985] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.677575]                                      ^
[   16.677906]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.678347]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.678822] ==================================================================
[   16.183348] ==================================================================
[   16.183631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   16.183946] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.184505] 
[   16.184617] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.184660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.184673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.184694] Call Trace:
[   16.184708]  <TASK>
[   16.184721]  dump_stack_lvl+0x73/0xb0
[   16.184748]  print_report+0xd1/0x610
[   16.184772]  ? __virt_addr_valid+0x1db/0x2d0
[   16.184795]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.184817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.184842]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.184866]  kasan_report+0x141/0x180
[   16.184889]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.184917]  kasan_check_range+0x10c/0x1c0
[   16.184942]  __kasan_check_write+0x18/0x20
[   16.185043]  kasan_atomics_helper+0x15b6/0x5450
[   16.185073]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.185098]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.185125]  ? kasan_atomics+0x152/0x310
[   16.185151]  kasan_atomics+0x1dc/0x310
[   16.185175]  ? __pfx_kasan_atomics+0x10/0x10
[   16.185200]  ? __pfx_read_tsc+0x10/0x10
[   16.185223]  ? ktime_get_ts64+0x86/0x230
[   16.185248]  kunit_try_run_case+0x1a5/0x480
[   16.185285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.185309]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.185334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.185360]  ? __kthread_parkme+0x82/0x180
[   16.185381]  ? preempt_count_sub+0x50/0x80
[   16.185405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.185431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.185458]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.185484]  kthread+0x337/0x6f0
[   16.185504]  ? trace_preempt_on+0x20/0xc0
[   16.185528]  ? __pfx_kthread+0x10/0x10
[   16.185549]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.185572]  ? calculate_sigpending+0x7b/0xa0
[   16.185598]  ? __pfx_kthread+0x10/0x10
[   16.185620]  ret_from_fork+0x116/0x1d0
[   16.185640]  ? __pfx_kthread+0x10/0x10
[   16.185662]  ret_from_fork_asm+0x1a/0x30
[   16.185694]  </TASK>
[   16.185705] 
[   16.193823] Allocated by task 282:
[   16.194059]  kasan_save_stack+0x45/0x70
[   16.194281]  kasan_save_track+0x18/0x40
[   16.194420]  kasan_save_alloc_info+0x3b/0x50
[   16.194573]  __kasan_kmalloc+0xb7/0xc0
[   16.194772]  __kmalloc_cache_noprof+0x189/0x420
[   16.195172]  kasan_atomics+0x95/0x310
[   16.195386]  kunit_try_run_case+0x1a5/0x480
[   16.195596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.195794]  kthread+0x337/0x6f0
[   16.195916]  ret_from_fork+0x116/0x1d0
[   16.196194]  ret_from_fork_asm+0x1a/0x30
[   16.196408] 
[   16.196507] The buggy address belongs to the object at ffff888102a0a600
[   16.196507]  which belongs to the cache kmalloc-64 of size 64
[   16.197080] The buggy address is located 0 bytes to the right of
[   16.197080]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.197528] 
[   16.197629] The buggy address belongs to the physical page:
[   16.197884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.198371] flags: 0x200000000000000(node=0|zone=2)
[   16.198621] page_type: f5(slab)
[   16.198777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.199255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.199619] page dumped because: kasan: bad access detected
[   16.199877] 
[   16.200071] Memory state around the buggy address:
[   16.200304]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.200601]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.200842] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.201182]                                      ^
[   16.201422]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.201711]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.201945] ==================================================================
[   15.762875] ==================================================================
[   15.763249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.763667] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.763975] 
[   15.764063] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.764107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.764120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.764142] Call Trace:
[   15.764157]  <TASK>
[   15.764172]  dump_stack_lvl+0x73/0xb0
[   15.764200]  print_report+0xd1/0x610
[   15.764223]  ? __virt_addr_valid+0x1db/0x2d0
[   15.764247]  ? kasan_atomics_helper+0xc70/0x5450
[   15.764281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.764306]  ? kasan_atomics_helper+0xc70/0x5450
[   15.764330]  kasan_report+0x141/0x180
[   15.764353]  ? kasan_atomics_helper+0xc70/0x5450
[   15.764381]  kasan_check_range+0x10c/0x1c0
[   15.764406]  __kasan_check_write+0x18/0x20
[   15.764427]  kasan_atomics_helper+0xc70/0x5450
[   15.764451]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.764475]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.764501]  ? kasan_atomics+0x152/0x310
[   15.764529]  kasan_atomics+0x1dc/0x310
[   15.764553]  ? __pfx_kasan_atomics+0x10/0x10
[   15.764579]  ? __pfx_read_tsc+0x10/0x10
[   15.764602]  ? ktime_get_ts64+0x86/0x230
[   15.764627]  kunit_try_run_case+0x1a5/0x480
[   15.764653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.764677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.764703]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.764729]  ? __kthread_parkme+0x82/0x180
[   15.764750]  ? preempt_count_sub+0x50/0x80
[   15.764775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.764801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.764827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.764853]  kthread+0x337/0x6f0
[   15.764873]  ? trace_preempt_on+0x20/0xc0
[   15.764897]  ? __pfx_kthread+0x10/0x10
[   15.764919]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.764941]  ? calculate_sigpending+0x7b/0xa0
[   15.764967]  ? __pfx_kthread+0x10/0x10
[   15.764990]  ret_from_fork+0x116/0x1d0
[   15.765009]  ? __pfx_kthread+0x10/0x10
[   15.765031]  ret_from_fork_asm+0x1a/0x30
[   15.765062]  </TASK>
[   15.765073] 
[   15.773338] Allocated by task 282:
[   15.773528]  kasan_save_stack+0x45/0x70
[   15.773705]  kasan_save_track+0x18/0x40
[   15.773843]  kasan_save_alloc_info+0x3b/0x50
[   15.773994]  __kasan_kmalloc+0xb7/0xc0
[   15.774129]  __kmalloc_cache_noprof+0x189/0x420
[   15.774296]  kasan_atomics+0x95/0x310
[   15.774741]  kunit_try_run_case+0x1a5/0x480
[   15.774951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.775203]  kthread+0x337/0x6f0
[   15.775595]  ret_from_fork+0x116/0x1d0
[   15.775793]  ret_from_fork_asm+0x1a/0x30
[   15.776045] 
[   15.776142] The buggy address belongs to the object at ffff888102a0a600
[   15.776142]  which belongs to the cache kmalloc-64 of size 64
[   15.776618] The buggy address is located 0 bytes to the right of
[   15.776618]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.777009] 
[   15.777081] The buggy address belongs to the physical page:
[   15.777254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.777630] flags: 0x200000000000000(node=0|zone=2)
[   15.777870] page_type: f5(slab)
[   15.778041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.778400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.778710] page dumped because: kasan: bad access detected
[   15.778941] 
[   15.779042] Memory state around the buggy address:
[   15.779250]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.779663]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.779958] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.780358]                                      ^
[   15.780585]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.780888]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.781259] ==================================================================
[   16.202513] ==================================================================
[   16.202863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   16.203406] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.203675] 
[   16.203780] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.203822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.203834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.203855] Call Trace:
[   16.203869]  <TASK>
[   16.203885]  dump_stack_lvl+0x73/0xb0
[   16.203913]  print_report+0xd1/0x610
[   16.203935]  ? __virt_addr_valid+0x1db/0x2d0
[   16.203959]  ? kasan_atomics_helper+0x164f/0x5450
[   16.204105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.204130]  ? kasan_atomics_helper+0x164f/0x5450
[   16.204153]  kasan_report+0x141/0x180
[   16.204177]  ? kasan_atomics_helper+0x164f/0x5450
[   16.204205]  kasan_check_range+0x10c/0x1c0
[   16.204229]  __kasan_check_write+0x18/0x20
[   16.204250]  kasan_atomics_helper+0x164f/0x5450
[   16.204286]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.204309]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.204338]  ? kasan_atomics+0x152/0x310
[   16.204365]  kasan_atomics+0x1dc/0x310
[   16.204389]  ? __pfx_kasan_atomics+0x10/0x10
[   16.204415]  ? __pfx_read_tsc+0x10/0x10
[   16.204437]  ? ktime_get_ts64+0x86/0x230
[   16.204461]  kunit_try_run_case+0x1a5/0x480
[   16.204486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.204511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.204535]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.204561]  ? __kthread_parkme+0x82/0x180
[   16.204582]  ? preempt_count_sub+0x50/0x80
[   16.204607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.204633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.204658]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.204686]  kthread+0x337/0x6f0
[   16.204706]  ? trace_preempt_on+0x20/0xc0
[   16.204730]  ? __pfx_kthread+0x10/0x10
[   16.204752]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.204775]  ? calculate_sigpending+0x7b/0xa0
[   16.204800]  ? __pfx_kthread+0x10/0x10
[   16.204822]  ret_from_fork+0x116/0x1d0
[   16.204841]  ? __pfx_kthread+0x10/0x10
[   16.204863]  ret_from_fork_asm+0x1a/0x30
[   16.204895]  </TASK>
[   16.204906] 
[   16.213056] Allocated by task 282:
[   16.213243]  kasan_save_stack+0x45/0x70
[   16.213461]  kasan_save_track+0x18/0x40
[   16.213622]  kasan_save_alloc_info+0x3b/0x50
[   16.213774]  __kasan_kmalloc+0xb7/0xc0
[   16.213948]  __kmalloc_cache_noprof+0x189/0x420
[   16.214292]  kasan_atomics+0x95/0x310
[   16.214469]  kunit_try_run_case+0x1a5/0x480
[   16.214618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.214885]  kthread+0x337/0x6f0
[   16.215321]  ret_from_fork+0x116/0x1d0
[   16.215481]  ret_from_fork_asm+0x1a/0x30
[   16.215624] 
[   16.215697] The buggy address belongs to the object at ffff888102a0a600
[   16.215697]  which belongs to the cache kmalloc-64 of size 64
[   16.216498] The buggy address is located 0 bytes to the right of
[   16.216498]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.216945] 
[   16.217135] The buggy address belongs to the physical page:
[   16.217408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.217736] flags: 0x200000000000000(node=0|zone=2)
[   16.217947] page_type: f5(slab)
[   16.218188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.218498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.218754] page dumped because: kasan: bad access detected
[   16.219195] 
[   16.219314] Memory state around the buggy address:
[   16.219542]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.219789]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.220227] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.220530]                                      ^
[   16.220703]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.221111]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.221373] ==================================================================
[   15.719375] ==================================================================
[   15.719680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.720083] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.720401] 
[   15.720499] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.720542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.720557] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.720579] Call Trace:
[   15.720595]  <TASK>
[   15.720610]  dump_stack_lvl+0x73/0xb0
[   15.720639]  print_report+0xd1/0x610
[   15.720662]  ? __virt_addr_valid+0x1db/0x2d0
[   15.720686]  ? kasan_atomics_helper+0xac7/0x5450
[   15.720709]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.720734]  ? kasan_atomics_helper+0xac7/0x5450
[   15.720757]  kasan_report+0x141/0x180
[   15.720780]  ? kasan_atomics_helper+0xac7/0x5450
[   15.720808]  kasan_check_range+0x10c/0x1c0
[   15.720832]  __kasan_check_write+0x18/0x20
[   15.720853]  kasan_atomics_helper+0xac7/0x5450
[   15.720878]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.720902]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.720929]  ? kasan_atomics+0x152/0x310
[   15.720956]  kasan_atomics+0x1dc/0x310
[   15.721059]  ? __pfx_kasan_atomics+0x10/0x10
[   15.721085]  ? __pfx_read_tsc+0x10/0x10
[   15.721108]  ? ktime_get_ts64+0x86/0x230
[   15.721134]  kunit_try_run_case+0x1a5/0x480
[   15.721160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.721185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.721210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.721235]  ? __kthread_parkme+0x82/0x180
[   15.721258]  ? preempt_count_sub+0x50/0x80
[   15.721294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.721319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.721345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.721372]  kthread+0x337/0x6f0
[   15.721392]  ? trace_preempt_on+0x20/0xc0
[   15.721417]  ? __pfx_kthread+0x10/0x10
[   15.721439]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.721462]  ? calculate_sigpending+0x7b/0xa0
[   15.721488]  ? __pfx_kthread+0x10/0x10
[   15.721510]  ret_from_fork+0x116/0x1d0
[   15.721530]  ? __pfx_kthread+0x10/0x10
[   15.721551]  ret_from_fork_asm+0x1a/0x30
[   15.721583]  </TASK>
[   15.721595] 
[   15.729621] Allocated by task 282:
[   15.729784]  kasan_save_stack+0x45/0x70
[   15.730152]  kasan_save_track+0x18/0x40
[   15.730316]  kasan_save_alloc_info+0x3b/0x50
[   15.730491]  __kasan_kmalloc+0xb7/0xc0
[   15.730684]  __kmalloc_cache_noprof+0x189/0x420
[   15.730914]  kasan_atomics+0x95/0x310
[   15.731190]  kunit_try_run_case+0x1a5/0x480
[   15.731412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.731630]  kthread+0x337/0x6f0
[   15.731798]  ret_from_fork+0x116/0x1d0
[   15.732037]  ret_from_fork_asm+0x1a/0x30
[   15.732239] 
[   15.732354] The buggy address belongs to the object at ffff888102a0a600
[   15.732354]  which belongs to the cache kmalloc-64 of size 64
[   15.732792] The buggy address is located 0 bytes to the right of
[   15.732792]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.733415] 
[   15.733522] The buggy address belongs to the physical page:
[   15.733740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.734229] flags: 0x200000000000000(node=0|zone=2)
[   15.734486] page_type: f5(slab)
[   15.734634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.734923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.737413] page dumped because: kasan: bad access detected
[   15.738095] 
[   15.738207] Memory state around the buggy address:
[   15.738700]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.739131]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.739495] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.739726]                                      ^
[   15.739883]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.740227]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.740573] ==================================================================
[   15.661313] ==================================================================
[   15.661649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.661944] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.662455] 
[   15.662554] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.662597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.662612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.662633] Call Trace:
[   15.662649]  <TASK>
[   15.662664]  dump_stack_lvl+0x73/0xb0
[   15.662693]  print_report+0xd1/0x610
[   15.662721]  ? __virt_addr_valid+0x1db/0x2d0
[   15.662745]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.662767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.662792]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.662815]  kasan_report+0x141/0x180
[   15.662839]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.662866]  kasan_check_range+0x10c/0x1c0
[   15.662891]  __kasan_check_write+0x18/0x20
[   15.662912]  kasan_atomics_helper+0x8f9/0x5450
[   15.662936]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.662961]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.662988]  ? kasan_atomics+0x152/0x310
[   15.663015]  kasan_atomics+0x1dc/0x310
[   15.663039]  ? __pfx_kasan_atomics+0x10/0x10
[   15.663065]  ? __pfx_read_tsc+0x10/0x10
[   15.663087]  ? ktime_get_ts64+0x86/0x230
[   15.663113]  kunit_try_run_case+0x1a5/0x480
[   15.663138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.663229]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.663258]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.663296]  ? __kthread_parkme+0x82/0x180
[   15.663318]  ? preempt_count_sub+0x50/0x80
[   15.663342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.663380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.663406]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.663434]  kthread+0x337/0x6f0
[   15.663454]  ? trace_preempt_on+0x20/0xc0
[   15.663477]  ? __pfx_kthread+0x10/0x10
[   15.663499]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.663523]  ? calculate_sigpending+0x7b/0xa0
[   15.663548]  ? __pfx_kthread+0x10/0x10
[   15.663571]  ret_from_fork+0x116/0x1d0
[   15.663590]  ? __pfx_kthread+0x10/0x10
[   15.663612]  ret_from_fork_asm+0x1a/0x30
[   15.663644]  </TASK>
[   15.663654] 
[   15.671767] Allocated by task 282:
[   15.671949]  kasan_save_stack+0x45/0x70
[   15.672157]  kasan_save_track+0x18/0x40
[   15.672365]  kasan_save_alloc_info+0x3b/0x50
[   15.672622]  __kasan_kmalloc+0xb7/0xc0
[   15.672818]  __kmalloc_cache_noprof+0x189/0x420
[   15.673013]  kasan_atomics+0x95/0x310
[   15.673180]  kunit_try_run_case+0x1a5/0x480
[   15.673342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.673570]  kthread+0x337/0x6f0
[   15.673740]  ret_from_fork+0x116/0x1d0
[   15.673935]  ret_from_fork_asm+0x1a/0x30
[   15.674100] 
[   15.674200] The buggy address belongs to the object at ffff888102a0a600
[   15.674200]  which belongs to the cache kmalloc-64 of size 64
[   15.674860] The buggy address is located 0 bytes to the right of
[   15.674860]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.675541] 
[   15.675619] The buggy address belongs to the physical page:
[   15.675797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.676041] flags: 0x200000000000000(node=0|zone=2)
[   15.676279] page_type: f5(slab)
[   15.676446] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.676784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.677115] page dumped because: kasan: bad access detected
[   15.677435] 
[   15.677509] Memory state around the buggy address:
[   15.677667]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.677885]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.678101] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.678583]                                      ^
[   15.678826]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.679437]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.679760] ==================================================================
[   15.862925] ==================================================================
[   15.863274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.863886] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.864528] 
[   15.864738] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.864783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.864881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.864905] Call Trace:
[   15.864926]  <TASK>
[   15.864942]  dump_stack_lvl+0x73/0xb0
[   15.864973]  print_report+0xd1/0x610
[   15.865008]  ? __virt_addr_valid+0x1db/0x2d0
[   15.865032]  ? kasan_atomics_helper+0xf10/0x5450
[   15.865054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.865079]  ? kasan_atomics_helper+0xf10/0x5450
[   15.865103]  kasan_report+0x141/0x180
[   15.865126]  ? kasan_atomics_helper+0xf10/0x5450
[   15.865153]  kasan_check_range+0x10c/0x1c0
[   15.865178]  __kasan_check_write+0x18/0x20
[   15.865198]  kasan_atomics_helper+0xf10/0x5450
[   15.865223]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.865247]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.865283]  ? kasan_atomics+0x152/0x310
[   15.865310]  kasan_atomics+0x1dc/0x310
[   15.865333]  ? __pfx_kasan_atomics+0x10/0x10
[   15.865358]  ? __pfx_read_tsc+0x10/0x10
[   15.865381]  ? ktime_get_ts64+0x86/0x230
[   15.865408]  kunit_try_run_case+0x1a5/0x480
[   15.865434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.865459]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.865484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.865510]  ? __kthread_parkme+0x82/0x180
[   15.865531]  ? preempt_count_sub+0x50/0x80
[   15.865557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.865584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.865611]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.865638]  kthread+0x337/0x6f0
[   15.865658]  ? trace_preempt_on+0x20/0xc0
[   15.865683]  ? __pfx_kthread+0x10/0x10
[   15.865705]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.865728]  ? calculate_sigpending+0x7b/0xa0
[   15.865753]  ? __pfx_kthread+0x10/0x10
[   15.865776]  ret_from_fork+0x116/0x1d0
[   15.865795]  ? __pfx_kthread+0x10/0x10
[   15.865817]  ret_from_fork_asm+0x1a/0x30
[   15.865849]  </TASK>
[   15.865860] 
[   15.874532] Allocated by task 282:
[   15.874719]  kasan_save_stack+0x45/0x70
[   15.874923]  kasan_save_track+0x18/0x40
[   15.875211]  kasan_save_alloc_info+0x3b/0x50
[   15.875441]  __kasan_kmalloc+0xb7/0xc0
[   15.875618]  __kmalloc_cache_noprof+0x189/0x420
[   15.875846]  kasan_atomics+0x95/0x310
[   15.875997]  kunit_try_run_case+0x1a5/0x480
[   15.876149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.876338]  kthread+0x337/0x6f0
[   15.876461]  ret_from_fork+0x116/0x1d0
[   15.876597]  ret_from_fork_asm+0x1a/0x30
[   15.876739] 
[   15.876812] The buggy address belongs to the object at ffff888102a0a600
[   15.876812]  which belongs to the cache kmalloc-64 of size 64
[   15.877326] The buggy address is located 0 bytes to the right of
[   15.877326]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.877884] 
[   15.877983] The buggy address belongs to the physical page:
[   15.878242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.878527] flags: 0x200000000000000(node=0|zone=2)
[   15.879186] page_type: f5(slab)
[   15.879346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.879716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.879951] page dumped because: kasan: bad access detected
[   15.880579] 
[   15.880683] Memory state around the buggy address:
[   15.880880]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.881338]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.881576] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.881792]                                      ^
[   15.881965]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.882393]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.883275] ==================================================================
[   15.908244] ==================================================================
[   15.908511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.908840] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.909231] 
[   15.909351] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.909395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.909407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.909428] Call Trace:
[   15.909444]  <TASK>
[   15.909459]  dump_stack_lvl+0x73/0xb0
[   15.909488]  print_report+0xd1/0x610
[   15.909511]  ? __virt_addr_valid+0x1db/0x2d0
[   15.909536]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.909559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.909583]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.909606]  kasan_report+0x141/0x180
[   15.909630]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.909658]  __asan_report_load4_noabort+0x18/0x20
[   15.909684]  kasan_atomics_helper+0x4a36/0x5450
[   15.909708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.909733]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.909759]  ? kasan_atomics+0x152/0x310
[   15.909786]  kasan_atomics+0x1dc/0x310
[   15.909809]  ? __pfx_kasan_atomics+0x10/0x10
[   15.909834]  ? __pfx_read_tsc+0x10/0x10
[   15.909857]  ? ktime_get_ts64+0x86/0x230
[   15.909882]  kunit_try_run_case+0x1a5/0x480
[   15.909908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.909932]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.909958]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.909983]  ? __kthread_parkme+0x82/0x180
[   15.910005]  ? preempt_count_sub+0x50/0x80
[   15.910030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.910056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.910082]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.910177]  kthread+0x337/0x6f0
[   15.910199]  ? trace_preempt_on+0x20/0xc0
[   15.910225]  ? __pfx_kthread+0x10/0x10
[   15.910247]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.910280]  ? calculate_sigpending+0x7b/0xa0
[   15.910306]  ? __pfx_kthread+0x10/0x10
[   15.910329]  ret_from_fork+0x116/0x1d0
[   15.910349]  ? __pfx_kthread+0x10/0x10
[   15.910371]  ret_from_fork_asm+0x1a/0x30
[   15.910403]  </TASK>
[   15.910414] 
[   15.918388] Allocated by task 282:
[   15.918652]  kasan_save_stack+0x45/0x70
[   15.918868]  kasan_save_track+0x18/0x40
[   15.919005]  kasan_save_alloc_info+0x3b/0x50
[   15.919156]  __kasan_kmalloc+0xb7/0xc0
[   15.919302]  __kmalloc_cache_noprof+0x189/0x420
[   15.919459]  kasan_atomics+0x95/0x310
[   15.919741]  kunit_try_run_case+0x1a5/0x480
[   15.919964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.920370]  kthread+0x337/0x6f0
[   15.920664]  ret_from_fork+0x116/0x1d0
[   15.920857]  ret_from_fork_asm+0x1a/0x30
[   15.921055] 
[   15.921355] The buggy address belongs to the object at ffff888102a0a600
[   15.921355]  which belongs to the cache kmalloc-64 of size 64
[   15.921780] The buggy address is located 0 bytes to the right of
[   15.921780]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.922646] 
[   15.922757] The buggy address belongs to the physical page:
[   15.922969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.923341] flags: 0x200000000000000(node=0|zone=2)
[   15.923547] page_type: f5(slab)
[   15.923695] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.923980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.924209] page dumped because: kasan: bad access detected
[   15.924393] 
[   15.924463] Memory state around the buggy address:
[   15.924670]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.924987]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.925496] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.925829]                                      ^
[   15.926149]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.926387]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.926604] ==================================================================
[   16.031765] ==================================================================
[   16.032162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   16.032517] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.032851] 
[   16.032958] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.033106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.033119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.033141] Call Trace:
[   16.033156]  <TASK>
[   16.033171]  dump_stack_lvl+0x73/0xb0
[   16.033200]  print_report+0xd1/0x610
[   16.033222]  ? __virt_addr_valid+0x1db/0x2d0
[   16.033245]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.033280]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.033306]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.033329]  kasan_report+0x141/0x180
[   16.033353]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.033381]  __asan_report_load4_noabort+0x18/0x20
[   16.033407]  kasan_atomics_helper+0x49e8/0x5450
[   16.033432]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.033456]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.033483]  ? kasan_atomics+0x152/0x310
[   16.033510]  kasan_atomics+0x1dc/0x310
[   16.033533]  ? __pfx_kasan_atomics+0x10/0x10
[   16.033558]  ? __pfx_read_tsc+0x10/0x10
[   16.033579]  ? ktime_get_ts64+0x86/0x230
[   16.033604]  kunit_try_run_case+0x1a5/0x480
[   16.033629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.033653]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.033677]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.033702]  ? __kthread_parkme+0x82/0x180
[   16.033723]  ? preempt_count_sub+0x50/0x80
[   16.033748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.033774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.033800]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.033828]  kthread+0x337/0x6f0
[   16.033848]  ? trace_preempt_on+0x20/0xc0
[   16.033871]  ? __pfx_kthread+0x10/0x10
[   16.033893]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.033916]  ? calculate_sigpending+0x7b/0xa0
[   16.033940]  ? __pfx_kthread+0x10/0x10
[   16.034031]  ret_from_fork+0x116/0x1d0
[   16.034057]  ? __pfx_kthread+0x10/0x10
[   16.034078]  ret_from_fork_asm+0x1a/0x30
[   16.034110]  </TASK>
[   16.034121] 
[   16.041958] Allocated by task 282:
[   16.042211]  kasan_save_stack+0x45/0x70
[   16.042431]  kasan_save_track+0x18/0x40
[   16.042633]  kasan_save_alloc_info+0x3b/0x50
[   16.042857]  __kasan_kmalloc+0xb7/0xc0
[   16.043241]  __kmalloc_cache_noprof+0x189/0x420
[   16.043436]  kasan_atomics+0x95/0x310
[   16.043627]  kunit_try_run_case+0x1a5/0x480
[   16.043836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.044160]  kthread+0x337/0x6f0
[   16.044337]  ret_from_fork+0x116/0x1d0
[   16.044507]  ret_from_fork_asm+0x1a/0x30
[   16.044688] 
[   16.044785] The buggy address belongs to the object at ffff888102a0a600
[   16.044785]  which belongs to the cache kmalloc-64 of size 64
[   16.045369] The buggy address is located 0 bytes to the right of
[   16.045369]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.045872] 
[   16.046046] The buggy address belongs to the physical page:
[   16.046227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.046591] flags: 0x200000000000000(node=0|zone=2)
[   16.046832] page_type: f5(slab)
[   16.047201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.047535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.047876] page dumped because: kasan: bad access detected
[   16.048216] 
[   16.048301] Memory state around the buggy address:
[   16.048462]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.048719]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.049045] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.049367]                                      ^
[   16.049580]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.049798]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.050046] ==================================================================
[   16.301656] ==================================================================
[   16.301937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.302451] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.302771] 
[   16.302877] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.302921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.302934] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.302957] Call Trace:
[   16.303007]  <TASK>
[   16.303467]  dump_stack_lvl+0x73/0xb0
[   16.303499]  print_report+0xd1/0x610
[   16.303522]  ? __virt_addr_valid+0x1db/0x2d0
[   16.303546]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.303568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.303593]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.303616]  kasan_report+0x141/0x180
[   16.303639]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.303667]  kasan_check_range+0x10c/0x1c0
[   16.303692]  __kasan_check_write+0x18/0x20
[   16.303713]  kasan_atomics_helper+0x18b1/0x5450
[   16.303737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.303761]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.303787]  ? kasan_atomics+0x152/0x310
[   16.303815]  kasan_atomics+0x1dc/0x310
[   16.303838]  ? __pfx_kasan_atomics+0x10/0x10
[   16.303863]  ? __pfx_read_tsc+0x10/0x10
[   16.303885]  ? ktime_get_ts64+0x86/0x230
[   16.303911]  kunit_try_run_case+0x1a5/0x480
[   16.303937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.303961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.304057]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.304085]  ? __kthread_parkme+0x82/0x180
[   16.304107]  ? preempt_count_sub+0x50/0x80
[   16.304134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.304160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.304187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.304214]  kthread+0x337/0x6f0
[   16.304234]  ? trace_preempt_on+0x20/0xc0
[   16.304259]  ? __pfx_kthread+0x10/0x10
[   16.304293]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.304317]  ? calculate_sigpending+0x7b/0xa0
[   16.304341]  ? __pfx_kthread+0x10/0x10
[   16.304364]  ret_from_fork+0x116/0x1d0
[   16.304383]  ? __pfx_kthread+0x10/0x10
[   16.304406]  ret_from_fork_asm+0x1a/0x30
[   16.304437]  </TASK>
[   16.304448] 
[   16.313838] Allocated by task 282:
[   16.314135]  kasan_save_stack+0x45/0x70
[   16.314473]  kasan_save_track+0x18/0x40
[   16.314679]  kasan_save_alloc_info+0x3b/0x50
[   16.314938]  __kasan_kmalloc+0xb7/0xc0
[   16.315337]  __kmalloc_cache_noprof+0x189/0x420
[   16.315610]  kasan_atomics+0x95/0x310
[   16.315775]  kunit_try_run_case+0x1a5/0x480
[   16.315970]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.316294]  kthread+0x337/0x6f0
[   16.316419]  ret_from_fork+0x116/0x1d0
[   16.316569]  ret_from_fork_asm+0x1a/0x30
[   16.316770] 
[   16.316868] The buggy address belongs to the object at ffff888102a0a600
[   16.316868]  which belongs to the cache kmalloc-64 of size 64
[   16.317417] The buggy address is located 0 bytes to the right of
[   16.317417]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.317899] 
[   16.317989] The buggy address belongs to the physical page:
[   16.318241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.318742] flags: 0x200000000000000(node=0|zone=2)
[   16.318916] page_type: f5(slab)
[   16.319040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.319288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.319613] page dumped because: kasan: bad access detected
[   16.320065] 
[   16.320188] Memory state around the buggy address:
[   16.320436]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.320774]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.321099] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.321426]                                      ^
[   16.321629]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.321906]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.322238] ==================================================================
[   16.499117] ==================================================================
[   16.499798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.500544] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.500779] 
[   16.500862] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.500903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.500919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.500942] Call Trace:
[   16.500958]  <TASK>
[   16.500973]  dump_stack_lvl+0x73/0xb0
[   16.501002]  print_report+0xd1/0x610
[   16.501024]  ? __virt_addr_valid+0x1db/0x2d0
[   16.501048]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.501072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.501097]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.501121]  kasan_report+0x141/0x180
[   16.501144]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.501172]  kasan_check_range+0x10c/0x1c0
[   16.501199]  __kasan_check_write+0x18/0x20
[   16.501220]  kasan_atomics_helper+0x1eaa/0x5450
[   16.501245]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.501280]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.501307]  ? kasan_atomics+0x152/0x310
[   16.501333]  kasan_atomics+0x1dc/0x310
[   16.501357]  ? __pfx_kasan_atomics+0x10/0x10
[   16.501383]  ? __pfx_read_tsc+0x10/0x10
[   16.501405]  ? ktime_get_ts64+0x86/0x230
[   16.501430]  kunit_try_run_case+0x1a5/0x480
[   16.501456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.501481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.501505]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.501531]  ? __kthread_parkme+0x82/0x180
[   16.501552]  ? preempt_count_sub+0x50/0x80
[   16.501577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.501606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.501632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.501659]  kthread+0x337/0x6f0
[   16.501679]  ? trace_preempt_on+0x20/0xc0
[   16.501703]  ? __pfx_kthread+0x10/0x10
[   16.501725]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.501748]  ? calculate_sigpending+0x7b/0xa0
[   16.501772]  ? __pfx_kthread+0x10/0x10
[   16.501795]  ret_from_fork+0x116/0x1d0
[   16.501814]  ? __pfx_kthread+0x10/0x10
[   16.501835]  ret_from_fork_asm+0x1a/0x30
[   16.501867]  </TASK>
[   16.501879] 
[   16.508723] Allocated by task 282:
[   16.508849]  kasan_save_stack+0x45/0x70
[   16.509048]  kasan_save_track+0x18/0x40
[   16.509244]  kasan_save_alloc_info+0x3b/0x50
[   16.509469]  __kasan_kmalloc+0xb7/0xc0
[   16.509660]  __kmalloc_cache_noprof+0x189/0x420
[   16.509899]  kasan_atomics+0x95/0x310
[   16.510087]  kunit_try_run_case+0x1a5/0x480
[   16.510309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.510517]  kthread+0x337/0x6f0
[   16.510637]  ret_from_fork+0x116/0x1d0
[   16.510776]  ret_from_fork_asm+0x1a/0x30
[   16.510930] 
[   16.511027] The buggy address belongs to the object at ffff888102a0a600
[   16.511027]  which belongs to the cache kmalloc-64 of size 64
[   16.511566] The buggy address is located 0 bytes to the right of
[   16.511566]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.512068] 
[   16.512167] The buggy address belongs to the physical page:
[   16.512410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.512659] flags: 0x200000000000000(node=0|zone=2)
[   16.512822] page_type: f5(slab)
[   16.512942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.513177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.513508] page dumped because: kasan: bad access detected
[   16.513764] 
[   16.513859] Memory state around the buggy address:
[   16.514086]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.514713]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.515044] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.515372]                                      ^
[   16.515583]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.515853]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.516096] ==================================================================
[   16.558838] ==================================================================
[   16.559239] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.559494] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.559841] 
[   16.559949] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.560010] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.560024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.560045] Call Trace:
[   16.560058]  <TASK>
[   16.560071]  dump_stack_lvl+0x73/0xb0
[   16.560099]  print_report+0xd1/0x610
[   16.560122]  ? __virt_addr_valid+0x1db/0x2d0
[   16.560146]  ? kasan_atomics_helper+0x2006/0x5450
[   16.560168]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.560192]  ? kasan_atomics_helper+0x2006/0x5450
[   16.560215]  kasan_report+0x141/0x180
[   16.560239]  ? kasan_atomics_helper+0x2006/0x5450
[   16.560296]  kasan_check_range+0x10c/0x1c0
[   16.560322]  __kasan_check_write+0x18/0x20
[   16.560342]  kasan_atomics_helper+0x2006/0x5450
[   16.560367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.560391]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.560418]  ? kasan_atomics+0x152/0x310
[   16.560445]  kasan_atomics+0x1dc/0x310
[   16.560485]  ? __pfx_kasan_atomics+0x10/0x10
[   16.560511]  ? __pfx_read_tsc+0x10/0x10
[   16.560532]  ? ktime_get_ts64+0x86/0x230
[   16.560557]  kunit_try_run_case+0x1a5/0x480
[   16.560584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.560608]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.560647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.560687]  ? __kthread_parkme+0x82/0x180
[   16.560722]  ? preempt_count_sub+0x50/0x80
[   16.560760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.560799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.560852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.560880]  kthread+0x337/0x6f0
[   16.560899]  ? trace_preempt_on+0x20/0xc0
[   16.560924]  ? __pfx_kthread+0x10/0x10
[   16.560946]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.560969]  ? calculate_sigpending+0x7b/0xa0
[   16.560994]  ? __pfx_kthread+0x10/0x10
[   16.561017]  ret_from_fork+0x116/0x1d0
[   16.561037]  ? __pfx_kthread+0x10/0x10
[   16.561058]  ret_from_fork_asm+0x1a/0x30
[   16.561090]  </TASK>
[   16.561101] 
[   16.568546] Allocated by task 282:
[   16.568735]  kasan_save_stack+0x45/0x70
[   16.568876]  kasan_save_track+0x18/0x40
[   16.569086]  kasan_save_alloc_info+0x3b/0x50
[   16.569329]  __kasan_kmalloc+0xb7/0xc0
[   16.569509]  __kmalloc_cache_noprof+0x189/0x420
[   16.569698]  kasan_atomics+0x95/0x310
[   16.569881]  kunit_try_run_case+0x1a5/0x480
[   16.570094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.570318]  kthread+0x337/0x6f0
[   16.570508]  ret_from_fork+0x116/0x1d0
[   16.570722]  ret_from_fork_asm+0x1a/0x30
[   16.570881] 
[   16.570951] The buggy address belongs to the object at ffff888102a0a600
[   16.570951]  which belongs to the cache kmalloc-64 of size 64
[   16.571460] The buggy address is located 0 bytes to the right of
[   16.571460]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.571969] 
[   16.572066] The buggy address belongs to the physical page:
[   16.572353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.572661] flags: 0x200000000000000(node=0|zone=2)
[   16.572893] page_type: f5(slab)
[   16.573032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.573380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.573707] page dumped because: kasan: bad access detected
[   16.573918] 
[   16.573988] Memory state around the buggy address:
[   16.574139]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.574357]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.574661] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.574988]                                      ^
[   16.575213]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.575554]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.575820] ==================================================================
[   15.487474] ==================================================================
[   15.487776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.488319] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.488596] 
[   15.488705] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.488747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.488759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.488782] Call Trace:
[   15.488797]  <TASK>
[   15.488811]  dump_stack_lvl+0x73/0xb0
[   15.488841]  print_report+0xd1/0x610
[   15.488864]  ? __virt_addr_valid+0x1db/0x2d0
[   15.488888]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.488911]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.488936]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.488959]  kasan_report+0x141/0x180
[   15.489047]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.489078]  __asan_report_load4_noabort+0x18/0x20
[   15.489105]  kasan_atomics_helper+0x4b54/0x5450
[   15.489130]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.489155]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.489181]  ? kasan_atomics+0x152/0x310
[   15.489207]  kasan_atomics+0x1dc/0x310
[   15.489232]  ? __pfx_kasan_atomics+0x10/0x10
[   15.489257]  ? __pfx_read_tsc+0x10/0x10
[   15.489303]  ? ktime_get_ts64+0x86/0x230
[   15.489329]  kunit_try_run_case+0x1a5/0x480
[   15.489355]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.489380]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.489405]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.489430]  ? __kthread_parkme+0x82/0x180
[   15.489452]  ? preempt_count_sub+0x50/0x80
[   15.489476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.489502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.489528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.489554]  kthread+0x337/0x6f0
[   15.489575]  ? trace_preempt_on+0x20/0xc0
[   15.489599]  ? __pfx_kthread+0x10/0x10
[   15.489621]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.489644]  ? calculate_sigpending+0x7b/0xa0
[   15.489669]  ? __pfx_kthread+0x10/0x10
[   15.489692]  ret_from_fork+0x116/0x1d0
[   15.489712]  ? __pfx_kthread+0x10/0x10
[   15.489734]  ret_from_fork_asm+0x1a/0x30
[   15.489766]  </TASK>
[   15.489776] 
[   15.497431] Allocated by task 282:
[   15.497617]  kasan_save_stack+0x45/0x70
[   15.497815]  kasan_save_track+0x18/0x40
[   15.497997]  kasan_save_alloc_info+0x3b/0x50
[   15.498201]  __kasan_kmalloc+0xb7/0xc0
[   15.498372]  __kmalloc_cache_noprof+0x189/0x420
[   15.498526]  kasan_atomics+0x95/0x310
[   15.498658]  kunit_try_run_case+0x1a5/0x480
[   15.498865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.499116]  kthread+0x337/0x6f0
[   15.499291]  ret_from_fork+0x116/0x1d0
[   15.499436]  ret_from_fork_asm+0x1a/0x30
[   15.499573] 
[   15.499642] The buggy address belongs to the object at ffff888102a0a600
[   15.499642]  which belongs to the cache kmalloc-64 of size 64
[   15.500126] The buggy address is located 0 bytes to the right of
[   15.500126]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.500849] 
[   15.500939] The buggy address belongs to the physical page:
[   15.501227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.501551] flags: 0x200000000000000(node=0|zone=2)
[   15.501755] page_type: f5(slab)
[   15.501923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.502305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.502531] page dumped because: kasan: bad access detected
[   15.502699] 
[   15.502775] Memory state around the buggy address:
[   15.502926]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.503227]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.503755] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.504057]                                      ^
[   15.504277]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.504485]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.504693] ==================================================================
[   16.322942] ==================================================================
[   16.323365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.323735] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.324135] 
[   16.324224] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.324279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.324292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.324314] Call Trace:
[   16.324330]  <TASK>
[   16.324344]  dump_stack_lvl+0x73/0xb0
[   16.324373]  print_report+0xd1/0x610
[   16.324397]  ? __virt_addr_valid+0x1db/0x2d0
[   16.324420]  ? kasan_atomics_helper+0x194a/0x5450
[   16.324443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.324468]  ? kasan_atomics_helper+0x194a/0x5450
[   16.324491]  kasan_report+0x141/0x180
[   16.324514]  ? kasan_atomics_helper+0x194a/0x5450
[   16.324542]  kasan_check_range+0x10c/0x1c0
[   16.324567]  __kasan_check_write+0x18/0x20
[   16.324588]  kasan_atomics_helper+0x194a/0x5450
[   16.324612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.324636]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.324662]  ? kasan_atomics+0x152/0x310
[   16.324689]  kasan_atomics+0x1dc/0x310
[   16.324713]  ? __pfx_kasan_atomics+0x10/0x10
[   16.324738]  ? __pfx_read_tsc+0x10/0x10
[   16.324760]  ? ktime_get_ts64+0x86/0x230
[   16.324801]  kunit_try_run_case+0x1a5/0x480
[   16.324827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.324852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.324876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.324901]  ? __kthread_parkme+0x82/0x180
[   16.324922]  ? preempt_count_sub+0x50/0x80
[   16.324946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.324972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.325054]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.325083]  kthread+0x337/0x6f0
[   16.325103]  ? trace_preempt_on+0x20/0xc0
[   16.325126]  ? __pfx_kthread+0x10/0x10
[   16.325148]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.325171]  ? calculate_sigpending+0x7b/0xa0
[   16.325196]  ? __pfx_kthread+0x10/0x10
[   16.325218]  ret_from_fork+0x116/0x1d0
[   16.325238]  ? __pfx_kthread+0x10/0x10
[   16.325259]  ret_from_fork_asm+0x1a/0x30
[   16.325304]  </TASK>
[   16.325315] 
[   16.333403] Allocated by task 282:
[   16.333595]  kasan_save_stack+0x45/0x70
[   16.333798]  kasan_save_track+0x18/0x40
[   16.333992]  kasan_save_alloc_info+0x3b/0x50
[   16.334206]  __kasan_kmalloc+0xb7/0xc0
[   16.334408]  __kmalloc_cache_noprof+0x189/0x420
[   16.334628]  kasan_atomics+0x95/0x310
[   16.334822]  kunit_try_run_case+0x1a5/0x480
[   16.335012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.335228]  kthread+0x337/0x6f0
[   16.335599]  ret_from_fork+0x116/0x1d0
[   16.335784]  ret_from_fork_asm+0x1a/0x30
[   16.336029] 
[   16.336133] The buggy address belongs to the object at ffff888102a0a600
[   16.336133]  which belongs to the cache kmalloc-64 of size 64
[   16.336616] The buggy address is located 0 bytes to the right of
[   16.336616]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.337174] 
[   16.337249] The buggy address belongs to the physical page:
[   16.337437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.337680] flags: 0x200000000000000(node=0|zone=2)
[   16.337912] page_type: f5(slab)
[   16.338074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.338423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.338850] page dumped because: kasan: bad access detected
[   16.339028] 
[   16.339099] Memory state around the buggy address:
[   16.339254]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.339587]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.339920] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.340243]                                      ^
[   16.340645]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.340937]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341298] ==================================================================
[   16.482501] ==================================================================
[   16.482827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.483172] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.483459] 
[   16.483566] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.483607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.483621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.483643] Call Trace:
[   16.483655]  <TASK>
[   16.483669]  dump_stack_lvl+0x73/0xb0
[   16.483697]  print_report+0xd1/0x610
[   16.483720]  ? __virt_addr_valid+0x1db/0x2d0
[   16.483743]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.483766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.483791]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.483814]  kasan_report+0x141/0x180
[   16.483837]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.483865]  kasan_check_range+0x10c/0x1c0
[   16.483890]  __kasan_check_write+0x18/0x20
[   16.483911]  kasan_atomics_helper+0x1e12/0x5450
[   16.483935]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.483960]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.483986]  ? kasan_atomics+0x152/0x310
[   16.484013]  kasan_atomics+0x1dc/0x310
[   16.484037]  ? __pfx_kasan_atomics+0x10/0x10
[   16.484063]  ? __pfx_read_tsc+0x10/0x10
[   16.484085]  ? ktime_get_ts64+0x86/0x230
[   16.484109]  kunit_try_run_case+0x1a5/0x480
[   16.484135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.484159]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.484184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.484210]  ? __kthread_parkme+0x82/0x180
[   16.484231]  ? preempt_count_sub+0x50/0x80
[   16.484256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.484293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.484319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.484346]  kthread+0x337/0x6f0
[   16.484365]  ? trace_preempt_on+0x20/0xc0
[   16.484390]  ? __pfx_kthread+0x10/0x10
[   16.484411]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.484433]  ? calculate_sigpending+0x7b/0xa0
[   16.484459]  ? __pfx_kthread+0x10/0x10
[   16.484481]  ret_from_fork+0x116/0x1d0
[   16.484500]  ? __pfx_kthread+0x10/0x10
[   16.484522]  ret_from_fork_asm+0x1a/0x30
[   16.484553]  </TASK>
[   16.484564] 
[   16.491592] Allocated by task 282:
[   16.491724]  kasan_save_stack+0x45/0x70
[   16.491887]  kasan_save_track+0x18/0x40
[   16.492074]  kasan_save_alloc_info+0x3b/0x50
[   16.492302]  __kasan_kmalloc+0xb7/0xc0
[   16.492491]  __kmalloc_cache_noprof+0x189/0x420
[   16.492683]  kasan_atomics+0x95/0x310
[   16.492817]  kunit_try_run_case+0x1a5/0x480
[   16.492965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.493193]  kthread+0x337/0x6f0
[   16.493375]  ret_from_fork+0x116/0x1d0
[   16.493562]  ret_from_fork_asm+0x1a/0x30
[   16.493767] 
[   16.493862] The buggy address belongs to the object at ffff888102a0a600
[   16.493862]  which belongs to the cache kmalloc-64 of size 64
[   16.494416] The buggy address is located 0 bytes to the right of
[   16.494416]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.494858] 
[   16.494931] The buggy address belongs to the physical page:
[   16.495184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.495510] flags: 0x200000000000000(node=0|zone=2)
[   16.495720] page_type: f5(slab)
[   16.495880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.496182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.496446] page dumped because: kasan: bad access detected
[   16.496671] 
[   16.496764] Memory state around the buggy address:
[   16.496988]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.497269]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.497487] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.497703]                                      ^
[   16.497869]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.498185]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.498506] ==================================================================
[   15.424742] ==================================================================
[   15.425136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.425896] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.426447] 
[   15.426555] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.426597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.426611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.426631] Call Trace:
[   15.426643]  <TASK>
[   15.426657]  dump_stack_lvl+0x73/0xb0
[   15.426684]  print_report+0xd1/0x610
[   15.426711]  ? __virt_addr_valid+0x1db/0x2d0
[   15.426732]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.426754]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.426778]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.426800]  kasan_report+0x141/0x180
[   15.426821]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.426849]  __asan_report_load4_noabort+0x18/0x20
[   15.426873]  kasan_atomics_helper+0x4b88/0x5450
[   15.426896]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.426919]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.426944]  ? kasan_atomics+0x152/0x310
[   15.426969]  kasan_atomics+0x1dc/0x310
[   15.427191]  ? __pfx_kasan_atomics+0x10/0x10
[   15.427217]  ? __pfx_read_tsc+0x10/0x10
[   15.427240]  ? ktime_get_ts64+0x86/0x230
[   15.427279]  kunit_try_run_case+0x1a5/0x480
[   15.427305]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.427329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.427353]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.427378]  ? __kthread_parkme+0x82/0x180
[   15.427398]  ? preempt_count_sub+0x50/0x80
[   15.427422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.427447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.427472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.427497]  kthread+0x337/0x6f0
[   15.427517]  ? trace_preempt_on+0x20/0xc0
[   15.427540]  ? __pfx_kthread+0x10/0x10
[   15.427560]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.427582]  ? calculate_sigpending+0x7b/0xa0
[   15.427607]  ? __pfx_kthread+0x10/0x10
[   15.427628]  ret_from_fork+0x116/0x1d0
[   15.427647]  ? __pfx_kthread+0x10/0x10
[   15.427668]  ret_from_fork_asm+0x1a/0x30
[   15.427698]  </TASK>
[   15.427816] 
[   15.435828] Allocated by task 282:
[   15.436118]  kasan_save_stack+0x45/0x70
[   15.436307]  kasan_save_track+0x18/0x40
[   15.436446]  kasan_save_alloc_info+0x3b/0x50
[   15.436647]  __kasan_kmalloc+0xb7/0xc0
[   15.436836]  __kmalloc_cache_noprof+0x189/0x420
[   15.437060]  kasan_atomics+0x95/0x310
[   15.437403]  kunit_try_run_case+0x1a5/0x480
[   15.437562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.437822]  kthread+0x337/0x6f0
[   15.438036]  ret_from_fork+0x116/0x1d0
[   15.438213]  ret_from_fork_asm+0x1a/0x30
[   15.438398] 
[   15.438470] The buggy address belongs to the object at ffff888102a0a600
[   15.438470]  which belongs to the cache kmalloc-64 of size 64
[   15.438833] The buggy address is located 0 bytes to the right of
[   15.438833]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.439390] 
[   15.439485] The buggy address belongs to the physical page:
[   15.439885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.440300] flags: 0x200000000000000(node=0|zone=2)
[   15.440465] page_type: f5(slab)
[   15.440588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.441247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.441587] page dumped because: kasan: bad access detected
[   15.441863] 
[   15.441949] Memory state around the buggy address:
[   15.442200]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.442546]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.442855] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.443337]                                      ^
[   15.443531]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.443831]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.444215] ==================================================================
[   15.505029] ==================================================================
[   15.505752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.506090] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.506424] 
[   15.506530] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.506573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.506588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.506610] Call Trace:
[   15.506624]  <TASK>
[   15.506638]  dump_stack_lvl+0x73/0xb0
[   15.506664]  print_report+0xd1/0x610
[   15.506687]  ? __virt_addr_valid+0x1db/0x2d0
[   15.506717]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.506739]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.506763]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.506787]  kasan_report+0x141/0x180
[   15.506811]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.506839]  kasan_check_range+0x10c/0x1c0
[   15.506864]  __kasan_check_write+0x18/0x20
[   15.506884]  kasan_atomics_helper+0x4a0/0x5450
[   15.506909]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.506933]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.506959]  ? kasan_atomics+0x152/0x310
[   15.506986]  kasan_atomics+0x1dc/0x310
[   15.507009]  ? __pfx_kasan_atomics+0x10/0x10
[   15.507035]  ? __pfx_read_tsc+0x10/0x10
[   15.507056]  ? ktime_get_ts64+0x86/0x230
[   15.507081]  kunit_try_run_case+0x1a5/0x480
[   15.507106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.507131]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.507155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.507180]  ? __kthread_parkme+0x82/0x180
[   15.507202]  ? preempt_count_sub+0x50/0x80
[   15.507226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.507252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.507457]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.507486]  kthread+0x337/0x6f0
[   15.507506]  ? trace_preempt_on+0x20/0xc0
[   15.507531]  ? __pfx_kthread+0x10/0x10
[   15.507553]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.507576]  ? calculate_sigpending+0x7b/0xa0
[   15.507602]  ? __pfx_kthread+0x10/0x10
[   15.507624]  ret_from_fork+0x116/0x1d0
[   15.507643]  ? __pfx_kthread+0x10/0x10
[   15.507664]  ret_from_fork_asm+0x1a/0x30
[   15.507696]  </TASK>
[   15.507707] 
[   15.515519] Allocated by task 282:
[   15.515688]  kasan_save_stack+0x45/0x70
[   15.515886]  kasan_save_track+0x18/0x40
[   15.516047]  kasan_save_alloc_info+0x3b/0x50
[   15.516249]  __kasan_kmalloc+0xb7/0xc0
[   15.516418]  __kmalloc_cache_noprof+0x189/0x420
[   15.516576]  kasan_atomics+0x95/0x310
[   15.516713]  kunit_try_run_case+0x1a5/0x480
[   15.516881]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.517132]  kthread+0x337/0x6f0
[   15.517488]  ret_from_fork+0x116/0x1d0
[   15.517685]  ret_from_fork_asm+0x1a/0x30
[   15.517891] 
[   15.517992] The buggy address belongs to the object at ffff888102a0a600
[   15.517992]  which belongs to the cache kmalloc-64 of size 64
[   15.518629] The buggy address is located 0 bytes to the right of
[   15.518629]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.519220] 
[   15.519306] The buggy address belongs to the physical page:
[   15.519484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.519751] flags: 0x200000000000000(node=0|zone=2)
[   15.519984] page_type: f5(slab)
[   15.520286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.520633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.520923] page dumped because: kasan: bad access detected
[   15.521095] 
[   15.521187] Memory state around the buggy address:
[   15.521426]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.521752]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.522026] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.522242]                                      ^
[   15.522554]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.523177]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.523515] ==================================================================
[   15.542779] ==================================================================
[   15.543122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.543475] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.543803] 
[   15.543907] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.543948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.543962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.543984] Call Trace:
[   15.543999]  <TASK>
[   15.544014]  dump_stack_lvl+0x73/0xb0
[   15.544040]  print_report+0xd1/0x610
[   15.544062]  ? __virt_addr_valid+0x1db/0x2d0
[   15.544089]  ? kasan_atomics_helper+0x565/0x5450
[   15.544111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.544137]  ? kasan_atomics_helper+0x565/0x5450
[   15.544162]  kasan_report+0x141/0x180
[   15.544187]  ? kasan_atomics_helper+0x565/0x5450
[   15.544214]  kasan_check_range+0x10c/0x1c0
[   15.544240]  __kasan_check_write+0x18/0x20
[   15.544275]  kasan_atomics_helper+0x565/0x5450
[   15.544300]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.544324]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.544350]  ? kasan_atomics+0x152/0x310
[   15.544377]  kasan_atomics+0x1dc/0x310
[   15.544401]  ? __pfx_kasan_atomics+0x10/0x10
[   15.544427]  ? __pfx_read_tsc+0x10/0x10
[   15.544449]  ? ktime_get_ts64+0x86/0x230
[   15.544473]  kunit_try_run_case+0x1a5/0x480
[   15.544499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.544523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.544548]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.544573]  ? __kthread_parkme+0x82/0x180
[   15.544595]  ? preempt_count_sub+0x50/0x80
[   15.544620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.544646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.544672]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.544700]  kthread+0x337/0x6f0
[   15.544720]  ? trace_preempt_on+0x20/0xc0
[   15.544743]  ? __pfx_kthread+0x10/0x10
[   15.544765]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.544787]  ? calculate_sigpending+0x7b/0xa0
[   15.544813]  ? __pfx_kthread+0x10/0x10
[   15.544835]  ret_from_fork+0x116/0x1d0
[   15.544855]  ? __pfx_kthread+0x10/0x10
[   15.544876]  ret_from_fork_asm+0x1a/0x30
[   15.544908]  </TASK>
[   15.544919] 
[   15.553228] Allocated by task 282:
[   15.553394]  kasan_save_stack+0x45/0x70
[   15.553540]  kasan_save_track+0x18/0x40
[   15.553678]  kasan_save_alloc_info+0x3b/0x50
[   15.553891]  __kasan_kmalloc+0xb7/0xc0
[   15.554232]  __kmalloc_cache_noprof+0x189/0x420
[   15.554469]  kasan_atomics+0x95/0x310
[   15.554662]  kunit_try_run_case+0x1a5/0x480
[   15.554862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.555260]  kthread+0x337/0x6f0
[   15.555434]  ret_from_fork+0x116/0x1d0
[   15.555608]  ret_from_fork_asm+0x1a/0x30
[   15.555789] 
[   15.555862] The buggy address belongs to the object at ffff888102a0a600
[   15.555862]  which belongs to the cache kmalloc-64 of size 64
[   15.556216] The buggy address is located 0 bytes to the right of
[   15.556216]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.557231] 
[   15.557417] The buggy address belongs to the physical page:
[   15.557605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.557846] flags: 0x200000000000000(node=0|zone=2)
[   15.558360] page_type: f5(slab)
[   15.558537] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.558958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.559426] page dumped because: kasan: bad access detected
[   15.559646] 
[   15.559717] Memory state around the buggy address:
[   15.559874]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.560504]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.560814] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.561064]                                      ^
[   15.561220]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.561451]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.561799] ==================================================================
[   16.411341] ==================================================================
[   16.411684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.412049] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.412400] 
[   16.412504] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.412546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.412558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.412578] Call Trace:
[   16.412593]  <TASK>
[   16.412606]  dump_stack_lvl+0x73/0xb0
[   16.412632]  print_report+0xd1/0x610
[   16.412655]  ? __virt_addr_valid+0x1db/0x2d0
[   16.412678]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.412702]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.412727]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.412751]  kasan_report+0x141/0x180
[   16.412774]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.412802]  __asan_report_load8_noabort+0x18/0x20
[   16.412828]  kasan_atomics_helper+0x4f30/0x5450
[   16.412853]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.412877]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.412904]  ? kasan_atomics+0x152/0x310
[   16.412930]  kasan_atomics+0x1dc/0x310
[   16.412954]  ? __pfx_kasan_atomics+0x10/0x10
[   16.412980]  ? __pfx_read_tsc+0x10/0x10
[   16.413002]  ? ktime_get_ts64+0x86/0x230
[   16.413028]  kunit_try_run_case+0x1a5/0x480
[   16.413052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.413076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.413100]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.413125]  ? __kthread_parkme+0x82/0x180
[   16.413147]  ? preempt_count_sub+0x50/0x80
[   16.413172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.413197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.413223]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.413251]  kthread+0x337/0x6f0
[   16.413280]  ? trace_preempt_on+0x20/0xc0
[   16.413304]  ? __pfx_kthread+0x10/0x10
[   16.413325]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.413348]  ? calculate_sigpending+0x7b/0xa0
[   16.413372]  ? __pfx_kthread+0x10/0x10
[   16.413395]  ret_from_fork+0x116/0x1d0
[   16.413415]  ? __pfx_kthread+0x10/0x10
[   16.413436]  ret_from_fork_asm+0x1a/0x30
[   16.413468]  </TASK>
[   16.413478] 
[   16.420612] Allocated by task 282:
[   16.420795]  kasan_save_stack+0x45/0x70
[   16.420989]  kasan_save_track+0x18/0x40
[   16.421163]  kasan_save_alloc_info+0x3b/0x50
[   16.421355]  __kasan_kmalloc+0xb7/0xc0
[   16.421531]  __kmalloc_cache_noprof+0x189/0x420
[   16.421712]  kasan_atomics+0x95/0x310
[   16.421893]  kunit_try_run_case+0x1a5/0x480
[   16.422063]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.422309]  kthread+0x337/0x6f0
[   16.422464]  ret_from_fork+0x116/0x1d0
[   16.422597]  ret_from_fork_asm+0x1a/0x30
[   16.422747] 
[   16.422816] The buggy address belongs to the object at ffff888102a0a600
[   16.422816]  which belongs to the cache kmalloc-64 of size 64
[   16.423168] The buggy address is located 0 bytes to the right of
[   16.423168]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.423699] 
[   16.423794] The buggy address belongs to the physical page:
[   16.424044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.424397] flags: 0x200000000000000(node=0|zone=2)
[   16.424577] page_type: f5(slab)
[   16.424699] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.424934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.425162] page dumped because: kasan: bad access detected
[   16.425343] 
[   16.425414] Memory state around the buggy address:
[   16.425642]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.425961]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.426355] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.426695]                                      ^
[   16.426930]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.427253]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.427586] ==================================================================
[   16.279247] ==================================================================
[   16.279819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.280076] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.280469] 
[   16.280592] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.280641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.280655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.280678] Call Trace:
[   16.280698]  <TASK>
[   16.280717]  dump_stack_lvl+0x73/0xb0
[   16.280748]  print_report+0xd1/0x610
[   16.280771]  ? __virt_addr_valid+0x1db/0x2d0
[   16.280795]  ? kasan_atomics_helper+0x1818/0x5450
[   16.280819]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.280844]  ? kasan_atomics_helper+0x1818/0x5450
[   16.280867]  kasan_report+0x141/0x180
[   16.280890]  ? kasan_atomics_helper+0x1818/0x5450
[   16.280919]  kasan_check_range+0x10c/0x1c0
[   16.280950]  __kasan_check_write+0x18/0x20
[   16.280971]  kasan_atomics_helper+0x1818/0x5450
[   16.280995]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.281020]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.281046]  ? kasan_atomics+0x152/0x310
[   16.281075]  kasan_atomics+0x1dc/0x310
[   16.281100]  ? __pfx_kasan_atomics+0x10/0x10
[   16.281125]  ? __pfx_read_tsc+0x10/0x10
[   16.281160]  ? ktime_get_ts64+0x86/0x230
[   16.281186]  kunit_try_run_case+0x1a5/0x480
[   16.281215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.281248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.281284]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.281343]  ? __kthread_parkme+0x82/0x180
[   16.281366]  ? preempt_count_sub+0x50/0x80
[   16.281391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.281417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.281444]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.281471]  kthread+0x337/0x6f0
[   16.281491]  ? trace_preempt_on+0x20/0xc0
[   16.281516]  ? __pfx_kthread+0x10/0x10
[   16.281538]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.281561]  ? calculate_sigpending+0x7b/0xa0
[   16.281588]  ? __pfx_kthread+0x10/0x10
[   16.281610]  ret_from_fork+0x116/0x1d0
[   16.281630]  ? __pfx_kthread+0x10/0x10
[   16.281651]  ret_from_fork_asm+0x1a/0x30
[   16.281683]  </TASK>
[   16.281696] 
[   16.290277] Allocated by task 282:
[   16.290468]  kasan_save_stack+0x45/0x70
[   16.290663]  kasan_save_track+0x18/0x40
[   16.290851]  kasan_save_alloc_info+0x3b/0x50
[   16.291743]  __kasan_kmalloc+0xb7/0xc0
[   16.291959]  __kmalloc_cache_noprof+0x189/0x420
[   16.292386]  kasan_atomics+0x95/0x310
[   16.292572]  kunit_try_run_case+0x1a5/0x480
[   16.292728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.293035]  kthread+0x337/0x6f0
[   16.293226]  ret_from_fork+0x116/0x1d0
[   16.293502]  ret_from_fork_asm+0x1a/0x30
[   16.293686] 
[   16.293761] The buggy address belongs to the object at ffff888102a0a600
[   16.293761]  which belongs to the cache kmalloc-64 of size 64
[   16.294498] The buggy address is located 0 bytes to the right of
[   16.294498]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.294966] 
[   16.295043] The buggy address belongs to the physical page:
[   16.295217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.295697] flags: 0x200000000000000(node=0|zone=2)
[   16.296485] page_type: f5(slab)
[   16.296665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.296949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.297572] page dumped because: kasan: bad access detected
[   16.297863] 
[   16.297944] Memory state around the buggy address:
[   16.298315]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.298663]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.299045] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.299365]                                      ^
[   16.299527]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.299847]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.300454] ==================================================================
[   16.126482] ==================================================================
[   16.126793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   16.127283] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.127621] 
[   16.127729] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.127770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.127783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.127804] Call Trace:
[   16.127818]  <TASK>
[   16.127833]  dump_stack_lvl+0x73/0xb0
[   16.127860]  print_report+0xd1/0x610
[   16.127883]  ? __virt_addr_valid+0x1db/0x2d0
[   16.127908]  ? kasan_atomics_helper+0x1467/0x5450
[   16.127930]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.127955]  ? kasan_atomics_helper+0x1467/0x5450
[   16.128086]  kasan_report+0x141/0x180
[   16.128110]  ? kasan_atomics_helper+0x1467/0x5450
[   16.128138]  kasan_check_range+0x10c/0x1c0
[   16.128162]  __kasan_check_write+0x18/0x20
[   16.128183]  kasan_atomics_helper+0x1467/0x5450
[   16.128207]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.128231]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.128257]  ? kasan_atomics+0x152/0x310
[   16.128297]  kasan_atomics+0x1dc/0x310
[   16.128320]  ? __pfx_kasan_atomics+0x10/0x10
[   16.128346]  ? __pfx_read_tsc+0x10/0x10
[   16.128367]  ? ktime_get_ts64+0x86/0x230
[   16.128392]  kunit_try_run_case+0x1a5/0x480
[   16.128418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.128443]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.128468]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.128494]  ? __kthread_parkme+0x82/0x180
[   16.128515]  ? preempt_count_sub+0x50/0x80
[   16.128541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.128566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.128592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.128619]  kthread+0x337/0x6f0
[   16.128639]  ? trace_preempt_on+0x20/0xc0
[   16.128663]  ? __pfx_kthread+0x10/0x10
[   16.128685]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.128708]  ? calculate_sigpending+0x7b/0xa0
[   16.128734]  ? __pfx_kthread+0x10/0x10
[   16.128757]  ret_from_fork+0x116/0x1d0
[   16.128777]  ? __pfx_kthread+0x10/0x10
[   16.128799]  ret_from_fork_asm+0x1a/0x30
[   16.128831]  </TASK>
[   16.128842] 
[   16.136872] Allocated by task 282:
[   16.137113]  kasan_save_stack+0x45/0x70
[   16.137323]  kasan_save_track+0x18/0x40
[   16.137496]  kasan_save_alloc_info+0x3b/0x50
[   16.137684]  __kasan_kmalloc+0xb7/0xc0
[   16.137846]  __kmalloc_cache_noprof+0x189/0x420
[   16.138130]  kasan_atomics+0x95/0x310
[   16.138336]  kunit_try_run_case+0x1a5/0x480
[   16.138545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.138762]  kthread+0x337/0x6f0
[   16.138929]  ret_from_fork+0x116/0x1d0
[   16.139315]  ret_from_fork_asm+0x1a/0x30
[   16.139468] 
[   16.139550] The buggy address belongs to the object at ffff888102a0a600
[   16.139550]  which belongs to the cache kmalloc-64 of size 64
[   16.140193] The buggy address is located 0 bytes to the right of
[   16.140193]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.140681] 
[   16.140778] The buggy address belongs to the physical page:
[   16.141095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.141417] flags: 0x200000000000000(node=0|zone=2)
[   16.141581] page_type: f5(slab)
[   16.141702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.142062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.142419] page dumped because: kasan: bad access detected
[   16.142669] 
[   16.142769] Memory state around the buggy address:
[   16.143170]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.143488]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.143790] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.144188]                                      ^
[   16.144379]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.144599]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.144906] ==================================================================
[   16.088822] ==================================================================
[   16.089250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   16.089580] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.089839] 
[   16.089944] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.090083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.090097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.090118] Call Trace:
[   16.090132]  <TASK>
[   16.090146]  dump_stack_lvl+0x73/0xb0
[   16.090174]  print_report+0xd1/0x610
[   16.090197]  ? __virt_addr_valid+0x1db/0x2d0
[   16.090221]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.090244]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.090280]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.090303]  kasan_report+0x141/0x180
[   16.090326]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.090354]  kasan_check_range+0x10c/0x1c0
[   16.090378]  __kasan_check_read+0x15/0x20
[   16.090399]  kasan_atomics_helper+0x13b5/0x5450
[   16.090423]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.090447]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.090473]  ? kasan_atomics+0x152/0x310
[   16.090500]  kasan_atomics+0x1dc/0x310
[   16.090523]  ? __pfx_kasan_atomics+0x10/0x10
[   16.090548]  ? __pfx_read_tsc+0x10/0x10
[   16.090570]  ? ktime_get_ts64+0x86/0x230
[   16.090594]  kunit_try_run_case+0x1a5/0x480
[   16.090619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.090645]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.090669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.090694]  ? __kthread_parkme+0x82/0x180
[   16.090722]  ? preempt_count_sub+0x50/0x80
[   16.090747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.090773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.090798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.090825]  kthread+0x337/0x6f0
[   16.090845]  ? trace_preempt_on+0x20/0xc0
[   16.090869]  ? __pfx_kthread+0x10/0x10
[   16.090890]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.090913]  ? calculate_sigpending+0x7b/0xa0
[   16.090938]  ? __pfx_kthread+0x10/0x10
[   16.091125]  ret_from_fork+0x116/0x1d0
[   16.091157]  ? __pfx_kthread+0x10/0x10
[   16.091179]  ret_from_fork_asm+0x1a/0x30
[   16.091211]  </TASK>
[   16.091222] 
[   16.098952] Allocated by task 282:
[   16.099277]  kasan_save_stack+0x45/0x70
[   16.099470]  kasan_save_track+0x18/0x40
[   16.099666]  kasan_save_alloc_info+0x3b/0x50
[   16.099840]  __kasan_kmalloc+0xb7/0xc0
[   16.100134]  __kmalloc_cache_noprof+0x189/0x420
[   16.100343]  kasan_atomics+0x95/0x310
[   16.100534]  kunit_try_run_case+0x1a5/0x480
[   16.100737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.101063]  kthread+0x337/0x6f0
[   16.101221]  ret_from_fork+0x116/0x1d0
[   16.101383]  ret_from_fork_asm+0x1a/0x30
[   16.101526] 
[   16.101598] The buggy address belongs to the object at ffff888102a0a600
[   16.101598]  which belongs to the cache kmalloc-64 of size 64
[   16.102136] The buggy address is located 0 bytes to the right of
[   16.102136]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.102690] 
[   16.102770] The buggy address belongs to the physical page:
[   16.102945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.103504] flags: 0x200000000000000(node=0|zone=2)
[   16.103751] page_type: f5(slab)
[   16.103922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.104364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.104627] page dumped because: kasan: bad access detected
[   16.104879] 
[   16.104980] Memory state around the buggy address:
[   16.105190]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.105488]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.105768] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.106078]                                      ^
[   16.106436]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.106708]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.106940] ==================================================================
[   16.341675] ==================================================================
[   16.342038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.342361] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.342679] 
[   16.342779] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.342822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.342835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.342856] Call Trace:
[   16.342870]  <TASK>
[   16.342884]  dump_stack_lvl+0x73/0xb0
[   16.342912]  print_report+0xd1/0x610
[   16.342934]  ? __virt_addr_valid+0x1db/0x2d0
[   16.342958]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.342981]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.343008]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.343031]  kasan_report+0x141/0x180
[   16.343054]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.343082]  kasan_check_range+0x10c/0x1c0
[   16.343107]  __kasan_check_write+0x18/0x20
[   16.343127]  kasan_atomics_helper+0x19e3/0x5450
[   16.343151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.343176]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.343202]  ? kasan_atomics+0x152/0x310
[   16.343228]  kasan_atomics+0x1dc/0x310
[   16.343252]  ? __pfx_kasan_atomics+0x10/0x10
[   16.343287]  ? __pfx_read_tsc+0x10/0x10
[   16.343310]  ? ktime_get_ts64+0x86/0x230
[   16.343334]  kunit_try_run_case+0x1a5/0x480
[   16.343360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.343383]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.343408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.343434]  ? __kthread_parkme+0x82/0x180
[   16.343456]  ? preempt_count_sub+0x50/0x80
[   16.343481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.343507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.343532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.343559]  kthread+0x337/0x6f0
[   16.343579]  ? trace_preempt_on+0x20/0xc0
[   16.343603]  ? __pfx_kthread+0x10/0x10
[   16.343624]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.343647]  ? calculate_sigpending+0x7b/0xa0
[   16.343672]  ? __pfx_kthread+0x10/0x10
[   16.343695]  ret_from_fork+0x116/0x1d0
[   16.343714]  ? __pfx_kthread+0x10/0x10
[   16.343736]  ret_from_fork_asm+0x1a/0x30
[   16.343767]  </TASK>
[   16.343779] 
[   16.352359] Allocated by task 282:
[   16.352526]  kasan_save_stack+0x45/0x70
[   16.352700]  kasan_save_track+0x18/0x40
[   16.352888]  kasan_save_alloc_info+0x3b/0x50
[   16.353133]  __kasan_kmalloc+0xb7/0xc0
[   16.353286]  __kmalloc_cache_noprof+0x189/0x420
[   16.353444]  kasan_atomics+0x95/0x310
[   16.353579]  kunit_try_run_case+0x1a5/0x480
[   16.353727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.353905]  kthread+0x337/0x6f0
[   16.354071]  ret_from_fork+0x116/0x1d0
[   16.354257]  ret_from_fork_asm+0x1a/0x30
[   16.354772] 
[   16.354878] The buggy address belongs to the object at ffff888102a0a600
[   16.354878]  which belongs to the cache kmalloc-64 of size 64
[   16.355328] The buggy address is located 0 bytes to the right of
[   16.355328]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.355702] 
[   16.355778] The buggy address belongs to the physical page:
[   16.355952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.356762] flags: 0x200000000000000(node=0|zone=2)
[   16.357028] page_type: f5(slab)
[   16.357199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.357822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.358174] page dumped because: kasan: bad access detected
[   16.358538] 
[   16.358620] Memory state around the buggy address:
[   16.358824]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.359177]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.359413] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.359629]                                      ^
[   16.359843]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360239]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360575] ==================================================================
[   15.403368] ==================================================================
[   15.403620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.403954] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.404318] 
[   15.404403] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.404445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.404457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.404477] Call Trace:
[   15.404489]  <TASK>
[   15.404501]  dump_stack_lvl+0x73/0xb0
[   15.404528]  print_report+0xd1/0x610
[   15.404549]  ? __virt_addr_valid+0x1db/0x2d0
[   15.404572]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.404594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.404617]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.404639]  kasan_report+0x141/0x180
[   15.404661]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.404687]  __asan_report_store4_noabort+0x1b/0x30
[   15.404713]  kasan_atomics_helper+0x4ba2/0x5450
[   15.404736]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.404758]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.404783]  ? kasan_atomics+0x152/0x310
[   15.404810]  kasan_atomics+0x1dc/0x310
[   15.404831]  ? __pfx_kasan_atomics+0x10/0x10
[   15.404856]  ? __pfx_read_tsc+0x10/0x10
[   15.404877]  ? ktime_get_ts64+0x86/0x230
[   15.404901]  kunit_try_run_case+0x1a5/0x480
[   15.404927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.404950]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.404974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.404998]  ? __kthread_parkme+0x82/0x180
[   15.405019]  ? preempt_count_sub+0x50/0x80
[   15.405043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.405228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.405256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.405296]  kthread+0x337/0x6f0
[   15.405315]  ? trace_preempt_on+0x20/0xc0
[   15.405340]  ? __pfx_kthread+0x10/0x10
[   15.405361]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.405383]  ? calculate_sigpending+0x7b/0xa0
[   15.405407]  ? __pfx_kthread+0x10/0x10
[   15.405429]  ret_from_fork+0x116/0x1d0
[   15.405448]  ? __pfx_kthread+0x10/0x10
[   15.405469]  ret_from_fork_asm+0x1a/0x30
[   15.405499]  </TASK>
[   15.405510] 
[   15.413309] Allocated by task 282:
[   15.413444]  kasan_save_stack+0x45/0x70
[   15.413590]  kasan_save_track+0x18/0x40
[   15.413725]  kasan_save_alloc_info+0x3b/0x50
[   15.413929]  __kasan_kmalloc+0xb7/0xc0
[   15.414120]  __kmalloc_cache_noprof+0x189/0x420
[   15.414357]  kasan_atomics+0x95/0x310
[   15.414550]  kunit_try_run_case+0x1a5/0x480
[   15.414767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.415019]  kthread+0x337/0x6f0
[   15.415187]  ret_from_fork+0x116/0x1d0
[   15.416334]  ret_from_fork_asm+0x1a/0x30
[   15.416512] 
[   15.416964] The buggy address belongs to the object at ffff888102a0a600
[   15.416964]  which belongs to the cache kmalloc-64 of size 64
[   15.417651] The buggy address is located 0 bytes to the right of
[   15.417651]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.418411] 
[   15.418493] The buggy address belongs to the physical page:
[   15.418882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.419395] flags: 0x200000000000000(node=0|zone=2)
[   15.419577] page_type: f5(slab)
[   15.420110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.420405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.420859] page dumped because: kasan: bad access detected
[   15.421119] 
[   15.421196] Memory state around the buggy address:
[   15.421666]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.422040]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.422361] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.422673]                                      ^
[   15.422886]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.423599]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.424092] ==================================================================
[   15.781649] ==================================================================
[   15.781922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.782441] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.782671] 
[   15.782763] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.782806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.782819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.782841] Call Trace:
[   15.782856]  <TASK>
[   15.782871]  dump_stack_lvl+0x73/0xb0
[   15.782899]  print_report+0xd1/0x610
[   15.782922]  ? __virt_addr_valid+0x1db/0x2d0
[   15.782945]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.782968]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.782993]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.783017]  kasan_report+0x141/0x180
[   15.783041]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.783069]  __asan_report_load4_noabort+0x18/0x20
[   15.783096]  kasan_atomics_helper+0x4a84/0x5450
[   15.783320]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.783346]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.783373]  ? kasan_atomics+0x152/0x310
[   15.783400]  kasan_atomics+0x1dc/0x310
[   15.783424]  ? __pfx_kasan_atomics+0x10/0x10
[   15.783450]  ? __pfx_read_tsc+0x10/0x10
[   15.783473]  ? ktime_get_ts64+0x86/0x230
[   15.783498]  kunit_try_run_case+0x1a5/0x480
[   15.783523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.783548]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.783572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.783598]  ? __kthread_parkme+0x82/0x180
[   15.783619]  ? preempt_count_sub+0x50/0x80
[   15.783643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.783670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.783696]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.783723]  kthread+0x337/0x6f0
[   15.783746]  ? trace_preempt_on+0x20/0xc0
[   15.783773]  ? __pfx_kthread+0x10/0x10
[   15.783795]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.783818]  ? calculate_sigpending+0x7b/0xa0
[   15.783843]  ? __pfx_kthread+0x10/0x10
[   15.783867]  ret_from_fork+0x116/0x1d0
[   15.783888]  ? __pfx_kthread+0x10/0x10
[   15.783910]  ret_from_fork_asm+0x1a/0x30
[   15.783943]  </TASK>
[   15.783954] 
[   15.791885] Allocated by task 282:
[   15.792019]  kasan_save_stack+0x45/0x70
[   15.792212]  kasan_save_track+0x18/0x40
[   15.792413]  kasan_save_alloc_info+0x3b/0x50
[   15.792621]  __kasan_kmalloc+0xb7/0xc0
[   15.792807]  __kmalloc_cache_noprof+0x189/0x420
[   15.793030]  kasan_atomics+0x95/0x310
[   15.793191]  kunit_try_run_case+0x1a5/0x480
[   15.793739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.793974]  kthread+0x337/0x6f0
[   15.794280]  ret_from_fork+0x116/0x1d0
[   15.794466]  ret_from_fork_asm+0x1a/0x30
[   15.794629] 
[   15.794700] The buggy address belongs to the object at ffff888102a0a600
[   15.794700]  which belongs to the cache kmalloc-64 of size 64
[   15.795346] The buggy address is located 0 bytes to the right of
[   15.795346]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.795905] 
[   15.796001] The buggy address belongs to the physical page:
[   15.796347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.796664] flags: 0x200000000000000(node=0|zone=2)
[   15.796877] page_type: f5(slab)
[   15.797043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.797626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.797924] page dumped because: kasan: bad access detected
[   15.798311] 
[   15.798406] Memory state around the buggy address:
[   15.798595]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.798861]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.799210] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.799650]                                      ^
[   15.799899]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.800545]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.800821] ==================================================================
[   16.457709] ==================================================================
[   16.458418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.459089] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.459708] 
[   16.459798] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.459840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.459855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.459876] Call Trace:
[   16.459893]  <TASK>
[   16.459910]  dump_stack_lvl+0x73/0xb0
[   16.459937]  print_report+0xd1/0x610
[   16.459960]  ? __virt_addr_valid+0x1db/0x2d0
[   16.459984]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.460007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.460032]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.460056]  kasan_report+0x141/0x180
[   16.460078]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.460107]  kasan_check_range+0x10c/0x1c0
[   16.460132]  __kasan_check_write+0x18/0x20
[   16.460152]  kasan_atomics_helper+0x1d7a/0x5450
[   16.460177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.460202]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.460228]  ? kasan_atomics+0x152/0x310
[   16.460255]  kasan_atomics+0x1dc/0x310
[   16.460296]  ? __pfx_kasan_atomics+0x10/0x10
[   16.460321]  ? __pfx_read_tsc+0x10/0x10
[   16.460343]  ? ktime_get_ts64+0x86/0x230
[   16.460368]  kunit_try_run_case+0x1a5/0x480
[   16.460394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.460418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.460443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.460469]  ? __kthread_parkme+0x82/0x180
[   16.460491]  ? preempt_count_sub+0x50/0x80
[   16.460516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.460542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.460567]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.460593]  kthread+0x337/0x6f0
[   16.460613]  ? trace_preempt_on+0x20/0xc0
[   16.460638]  ? __pfx_kthread+0x10/0x10
[   16.460660]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.460682]  ? calculate_sigpending+0x7b/0xa0
[   16.460708]  ? __pfx_kthread+0x10/0x10
[   16.460731]  ret_from_fork+0x116/0x1d0
[   16.460750]  ? __pfx_kthread+0x10/0x10
[   16.460772]  ret_from_fork_asm+0x1a/0x30
[   16.460805]  </TASK>
[   16.460815] 
[   16.472493] Allocated by task 282:
[   16.472621]  kasan_save_stack+0x45/0x70
[   16.472795]  kasan_save_track+0x18/0x40
[   16.472991]  kasan_save_alloc_info+0x3b/0x50
[   16.473210]  __kasan_kmalloc+0xb7/0xc0
[   16.473534]  __kmalloc_cache_noprof+0x189/0x420
[   16.473924]  kasan_atomics+0x95/0x310
[   16.474247]  kunit_try_run_case+0x1a5/0x480
[   16.474623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.475089]  kthread+0x337/0x6f0
[   16.475396]  ret_from_fork+0x116/0x1d0
[   16.475735]  ret_from_fork_asm+0x1a/0x30
[   16.476090] 
[   16.476244] The buggy address belongs to the object at ffff888102a0a600
[   16.476244]  which belongs to the cache kmalloc-64 of size 64
[   16.477251] The buggy address is located 0 bytes to the right of
[   16.477251]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.478321] 
[   16.478477] The buggy address belongs to the physical page:
[   16.478718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.478961] flags: 0x200000000000000(node=0|zone=2)
[   16.479126] page_type: f5(slab)
[   16.479247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.479567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.479853] page dumped because: kasan: bad access detected
[   16.480069] 
[   16.480141] Memory state around the buggy address:
[   16.480359]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.480603]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.480900] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.481155]                                      ^
[   16.481388]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.481682]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.481937] ==================================================================
[   15.523992] ==================================================================
[   15.524626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.524924] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.525311] 
[   15.525416] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.525458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.525473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.525495] Call Trace:
[   15.525510]  <TASK>
[   15.525526]  dump_stack_lvl+0x73/0xb0
[   15.525554]  print_report+0xd1/0x610
[   15.525577]  ? __virt_addr_valid+0x1db/0x2d0
[   15.525600]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.525623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.525649]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.525673]  kasan_report+0x141/0x180
[   15.525696]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.525725]  __asan_report_store4_noabort+0x1b/0x30
[   15.525751]  kasan_atomics_helper+0x4b3a/0x5450
[   15.525774]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.525799]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.525824]  ? kasan_atomics+0x152/0x310
[   15.525852]  kasan_atomics+0x1dc/0x310
[   15.525875]  ? __pfx_kasan_atomics+0x10/0x10
[   15.525901]  ? __pfx_read_tsc+0x10/0x10
[   15.525923]  ? ktime_get_ts64+0x86/0x230
[   15.525949]  kunit_try_run_case+0x1a5/0x480
[   15.525978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.526021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.526045]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.526072]  ? __kthread_parkme+0x82/0x180
[   15.526095]  ? preempt_count_sub+0x50/0x80
[   15.526120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.526146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.526172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.526199]  kthread+0x337/0x6f0
[   15.526219]  ? trace_preempt_on+0x20/0xc0
[   15.526243]  ? __pfx_kthread+0x10/0x10
[   15.526275]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.526298]  ? calculate_sigpending+0x7b/0xa0
[   15.526324]  ? __pfx_kthread+0x10/0x10
[   15.526347]  ret_from_fork+0x116/0x1d0
[   15.526366]  ? __pfx_kthread+0x10/0x10
[   15.526388]  ret_from_fork_asm+0x1a/0x30
[   15.526420]  </TASK>
[   15.526431] 
[   15.534090] Allocated by task 282:
[   15.534283]  kasan_save_stack+0x45/0x70
[   15.534758]  kasan_save_track+0x18/0x40
[   15.534925]  kasan_save_alloc_info+0x3b/0x50
[   15.535342]  __kasan_kmalloc+0xb7/0xc0
[   15.535537]  __kmalloc_cache_noprof+0x189/0x420
[   15.535699]  kasan_atomics+0x95/0x310
[   15.535875]  kunit_try_run_case+0x1a5/0x480
[   15.536287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.536549]  kthread+0x337/0x6f0
[   15.536697]  ret_from_fork+0x116/0x1d0
[   15.536837]  ret_from_fork_asm+0x1a/0x30
[   15.537136] 
[   15.537249] The buggy address belongs to the object at ffff888102a0a600
[   15.537249]  which belongs to the cache kmalloc-64 of size 64
[   15.537791] The buggy address is located 0 bytes to the right of
[   15.537791]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.538344] 
[   15.538444] The buggy address belongs to the physical page:
[   15.538674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.539049] flags: 0x200000000000000(node=0|zone=2)
[   15.539274] page_type: f5(slab)
[   15.539431] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.539726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.539982] page dumped because: kasan: bad access detected
[   15.540155] 
[   15.540225] Memory state around the buggy address:
[   15.540389]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.540609]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.540920] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.541566]                                      ^
[   15.541807]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.542200]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.542432] ==================================================================
[   15.985878] ==================================================================
[   15.986617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.986963] Read of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.987331] 
[   15.987438] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.987481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.987495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.987518] Call Trace:
[   15.987532]  <TASK>
[   15.987548]  dump_stack_lvl+0x73/0xb0
[   15.987576]  print_report+0xd1/0x610
[   15.987599]  ? __virt_addr_valid+0x1db/0x2d0
[   15.987622]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.987645]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.987671]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.987694]  kasan_report+0x141/0x180
[   15.987718]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.987748]  __asan_report_load4_noabort+0x18/0x20
[   15.987777]  kasan_atomics_helper+0x4a02/0x5450
[   15.987801]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.987825]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.987852]  ? kasan_atomics+0x152/0x310
[   15.987879]  kasan_atomics+0x1dc/0x310
[   15.987902]  ? __pfx_kasan_atomics+0x10/0x10
[   15.987928]  ? __pfx_read_tsc+0x10/0x10
[   15.987950]  ? ktime_get_ts64+0x86/0x230
[   15.987975]  kunit_try_run_case+0x1a5/0x480
[   15.988193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.988236]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.988274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.988300]  ? __kthread_parkme+0x82/0x180
[   15.988321]  ? preempt_count_sub+0x50/0x80
[   15.988346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.988372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.988398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.988425]  kthread+0x337/0x6f0
[   15.988445]  ? trace_preempt_on+0x20/0xc0
[   15.988470]  ? __pfx_kthread+0x10/0x10
[   15.988492]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.988515]  ? calculate_sigpending+0x7b/0xa0
[   15.988540]  ? __pfx_kthread+0x10/0x10
[   15.988563]  ret_from_fork+0x116/0x1d0
[   15.988584]  ? __pfx_kthread+0x10/0x10
[   15.988606]  ret_from_fork_asm+0x1a/0x30
[   15.988638]  </TASK>
[   15.988650] 
[   15.997219] Allocated by task 282:
[   15.997381]  kasan_save_stack+0x45/0x70
[   15.997549]  kasan_save_track+0x18/0x40
[   15.997750]  kasan_save_alloc_info+0x3b/0x50
[   15.997966]  __kasan_kmalloc+0xb7/0xc0
[   15.998243]  __kmalloc_cache_noprof+0x189/0x420
[   15.998475]  kasan_atomics+0x95/0x310
[   16.000110]  kunit_try_run_case+0x1a5/0x480
[   16.000804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.001206]  kthread+0x337/0x6f0
[   16.001361]  ret_from_fork+0x116/0x1d0
[   16.001498]  ret_from_fork_asm+0x1a/0x30
[   16.001639] 
[   16.001714] The buggy address belongs to the object at ffff888102a0a600
[   16.001714]  which belongs to the cache kmalloc-64 of size 64
[   16.002217] The buggy address is located 0 bytes to the right of
[   16.002217]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.002608] 
[   16.002682] The buggy address belongs to the physical page:
[   16.002891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.004052] flags: 0x200000000000000(node=0|zone=2)
[   16.006342] page_type: f5(slab)
[   16.006512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.006747] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.006971] page dumped because: kasan: bad access detected
[   16.007141] 
[   16.007212] Memory state around the buggy address:
[   16.007380]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.007593]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.007805] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.008013]                                      ^
[   16.008165]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.009688]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.010311] ==================================================================
[   16.145423] ==================================================================
[   16.145726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   16.146132] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.146462] 
[   16.146572] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.146613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.146627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.146648] Call Trace:
[   16.146660]  <TASK>
[   16.146674]  dump_stack_lvl+0x73/0xb0
[   16.146702]  print_report+0xd1/0x610
[   16.146731]  ? __virt_addr_valid+0x1db/0x2d0
[   16.146754]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.146777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.146802]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.146826]  kasan_report+0x141/0x180
[   16.146849]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.146877]  __asan_report_store8_noabort+0x1b/0x30
[   16.146904]  kasan_atomics_helper+0x50d4/0x5450
[   16.146928]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.146953]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.147156]  ? kasan_atomics+0x152/0x310
[   16.147184]  kasan_atomics+0x1dc/0x310
[   16.147208]  ? __pfx_kasan_atomics+0x10/0x10
[   16.147234]  ? __pfx_read_tsc+0x10/0x10
[   16.147255]  ? ktime_get_ts64+0x86/0x230
[   16.147295]  kunit_try_run_case+0x1a5/0x480
[   16.147320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.147344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.147369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.147394]  ? __kthread_parkme+0x82/0x180
[   16.147416]  ? preempt_count_sub+0x50/0x80
[   16.147441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.147467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.147493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.147519]  kthread+0x337/0x6f0
[   16.147539]  ? trace_preempt_on+0x20/0xc0
[   16.147563]  ? __pfx_kthread+0x10/0x10
[   16.147585]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.147607]  ? calculate_sigpending+0x7b/0xa0
[   16.147632]  ? __pfx_kthread+0x10/0x10
[   16.147655]  ret_from_fork+0x116/0x1d0
[   16.147674]  ? __pfx_kthread+0x10/0x10
[   16.147696]  ret_from_fork_asm+0x1a/0x30
[   16.147728]  </TASK>
[   16.147739] 
[   16.155578] Allocated by task 282:
[   16.155764]  kasan_save_stack+0x45/0x70
[   16.156079]  kasan_save_track+0x18/0x40
[   16.156299]  kasan_save_alloc_info+0x3b/0x50
[   16.156501]  __kasan_kmalloc+0xb7/0xc0
[   16.156668]  __kmalloc_cache_noprof+0x189/0x420
[   16.156865]  kasan_atomics+0x95/0x310
[   16.157110]  kunit_try_run_case+0x1a5/0x480
[   16.157342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.157549]  kthread+0x337/0x6f0
[   16.157715]  ret_from_fork+0x116/0x1d0
[   16.157875]  ret_from_fork_asm+0x1a/0x30
[   16.158146] 
[   16.158245] The buggy address belongs to the object at ffff888102a0a600
[   16.158245]  which belongs to the cache kmalloc-64 of size 64
[   16.158756] The buggy address is located 0 bytes to the right of
[   16.158756]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.159411] 
[   16.159518] The buggy address belongs to the physical page:
[   16.159754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.160141] flags: 0x200000000000000(node=0|zone=2)
[   16.160323] page_type: f5(slab)
[   16.160447] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.160779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.161199] page dumped because: kasan: bad access detected
[   16.161449] 
[   16.161521] Memory state around the buggy address:
[   16.161677]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.161897]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.162302] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.162625]                                      ^
[   16.162864]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.163451]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.163788] ==================================================================
[   16.221796] ==================================================================
[   16.222186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.222555] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.222835] 
[   16.222947] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.223168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.223184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.223206] Call Trace:
[   16.223221]  <TASK>
[   16.223235]  dump_stack_lvl+0x73/0xb0
[   16.223280]  print_report+0xd1/0x610
[   16.223303]  ? __virt_addr_valid+0x1db/0x2d0
[   16.223327]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.223350]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.223374]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.223397]  kasan_report+0x141/0x180
[   16.223420]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.223448]  kasan_check_range+0x10c/0x1c0
[   16.223473]  __kasan_check_write+0x18/0x20
[   16.223494]  kasan_atomics_helper+0x16e7/0x5450
[   16.223517]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.223542]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.223568]  ? kasan_atomics+0x152/0x310
[   16.223595]  kasan_atomics+0x1dc/0x310
[   16.223619]  ? __pfx_kasan_atomics+0x10/0x10
[   16.223644]  ? __pfx_read_tsc+0x10/0x10
[   16.223665]  ? ktime_get_ts64+0x86/0x230
[   16.223689]  kunit_try_run_case+0x1a5/0x480
[   16.223715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.223739]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.223764]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.223789]  ? __kthread_parkme+0x82/0x180
[   16.223812]  ? preempt_count_sub+0x50/0x80
[   16.223836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.223862]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.223888]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.223916]  kthread+0x337/0x6f0
[   16.223936]  ? trace_preempt_on+0x20/0xc0
[   16.223960]  ? __pfx_kthread+0x10/0x10
[   16.224004]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.224027]  ? calculate_sigpending+0x7b/0xa0
[   16.224053]  ? __pfx_kthread+0x10/0x10
[   16.224076]  ret_from_fork+0x116/0x1d0
[   16.224095]  ? __pfx_kthread+0x10/0x10
[   16.224117]  ret_from_fork_asm+0x1a/0x30
[   16.224149]  </TASK>
[   16.224160] 
[   16.233314] Allocated by task 282:
[   16.233507]  kasan_save_stack+0x45/0x70
[   16.233720]  kasan_save_track+0x18/0x40
[   16.233894]  kasan_save_alloc_info+0x3b/0x50
[   16.234084]  __kasan_kmalloc+0xb7/0xc0
[   16.235190]  __kmalloc_cache_noprof+0x189/0x420
[   16.235433]  kasan_atomics+0x95/0x310
[   16.235744]  kunit_try_run_case+0x1a5/0x480
[   16.235943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.236397]  kthread+0x337/0x6f0
[   16.236583]  ret_from_fork+0x116/0x1d0
[   16.236920]  ret_from_fork_asm+0x1a/0x30
[   16.237300] 
[   16.237555] The buggy address belongs to the object at ffff888102a0a600
[   16.237555]  which belongs to the cache kmalloc-64 of size 64
[   16.238287] The buggy address is located 0 bytes to the right of
[   16.238287]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.239216] 
[   16.239320] The buggy address belongs to the physical page:
[   16.239733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.240274] flags: 0x200000000000000(node=0|zone=2)
[   16.240606] page_type: f5(slab)
[   16.240863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.241336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.241746] page dumped because: kasan: bad access detected
[   16.242183] 
[   16.242409] Memory state around the buggy address:
[   16.242658]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.243273]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.243696] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.244221]                                      ^
[   16.244569]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.245055]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.245473] ==================================================================
[   16.050687] ==================================================================
[   16.051237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   16.051599] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.051892] 
[   16.052115] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.052160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.052172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.052194] Call Trace:
[   16.052209]  <TASK>
[   16.052224]  dump_stack_lvl+0x73/0xb0
[   16.052252]  print_report+0xd1/0x610
[   16.052286]  ? __virt_addr_valid+0x1db/0x2d0
[   16.052311]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.052334]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.052358]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.052381]  kasan_report+0x141/0x180
[   16.052404]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.052431]  kasan_check_range+0x10c/0x1c0
[   16.052456]  __kasan_check_write+0x18/0x20
[   16.052476]  kasan_atomics_helper+0x12e6/0x5450
[   16.052500]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.052524]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.052551]  ? kasan_atomics+0x152/0x310
[   16.052578]  kasan_atomics+0x1dc/0x310
[   16.052601]  ? __pfx_kasan_atomics+0x10/0x10
[   16.052627]  ? __pfx_read_tsc+0x10/0x10
[   16.052648]  ? ktime_get_ts64+0x86/0x230
[   16.052673]  kunit_try_run_case+0x1a5/0x480
[   16.052698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.052723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.052747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.052772]  ? __kthread_parkme+0x82/0x180
[   16.052794]  ? preempt_count_sub+0x50/0x80
[   16.052818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.052846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.052872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.052898]  kthread+0x337/0x6f0
[   16.052918]  ? trace_preempt_on+0x20/0xc0
[   16.052942]  ? __pfx_kthread+0x10/0x10
[   16.053035]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.053064]  ? calculate_sigpending+0x7b/0xa0
[   16.053089]  ? __pfx_kthread+0x10/0x10
[   16.053111]  ret_from_fork+0x116/0x1d0
[   16.053131]  ? __pfx_kthread+0x10/0x10
[   16.053153]  ret_from_fork_asm+0x1a/0x30
[   16.053185]  </TASK>
[   16.053196] 
[   16.061328] Allocated by task 282:
[   16.061521]  kasan_save_stack+0x45/0x70
[   16.061723]  kasan_save_track+0x18/0x40
[   16.061898]  kasan_save_alloc_info+0x3b/0x50
[   16.062188]  __kasan_kmalloc+0xb7/0xc0
[   16.062380]  __kmalloc_cache_noprof+0x189/0x420
[   16.062584]  kasan_atomics+0x95/0x310
[   16.062764]  kunit_try_run_case+0x1a5/0x480
[   16.062956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.063368]  kthread+0x337/0x6f0
[   16.063539]  ret_from_fork+0x116/0x1d0
[   16.063723]  ret_from_fork_asm+0x1a/0x30
[   16.063886] 
[   16.063959] The buggy address belongs to the object at ffff888102a0a600
[   16.063959]  which belongs to the cache kmalloc-64 of size 64
[   16.064432] The buggy address is located 0 bytes to the right of
[   16.064432]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.065057] 
[   16.065155] The buggy address belongs to the physical page:
[   16.065415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.065744] flags: 0x200000000000000(node=0|zone=2)
[   16.065908] page_type: f5(slab)
[   16.066134] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.066502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.066840] page dumped because: kasan: bad access detected
[   16.067277] 
[   16.067379] Memory state around the buggy address:
[   16.067591]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.067879]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.068259] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.068567]                                      ^
[   16.068766]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.069159]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.069437] ==================================================================
[   16.576307] ==================================================================
[   16.576537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.576803] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.577174] 
[   16.577288] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.577348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.577361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.577381] Call Trace:
[   16.577396]  <TASK>
[   16.577410]  dump_stack_lvl+0x73/0xb0
[   16.577437]  print_report+0xd1/0x610
[   16.577460]  ? __virt_addr_valid+0x1db/0x2d0
[   16.577483]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.577505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.577548]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.577572]  kasan_report+0x141/0x180
[   16.577594]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.577637]  __asan_report_load8_noabort+0x18/0x20
[   16.577663]  kasan_atomics_helper+0x4f98/0x5450
[   16.577687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.577712]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.577738]  ? kasan_atomics+0x152/0x310
[   16.577765]  kasan_atomics+0x1dc/0x310
[   16.577806]  ? __pfx_kasan_atomics+0x10/0x10
[   16.577832]  ? __pfx_read_tsc+0x10/0x10
[   16.577854]  ? ktime_get_ts64+0x86/0x230
[   16.577878]  kunit_try_run_case+0x1a5/0x480
[   16.577904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.577928]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.577953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.577978]  ? __kthread_parkme+0x82/0x180
[   16.577999]  ? preempt_count_sub+0x50/0x80
[   16.578040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.578080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.578119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.578159]  kthread+0x337/0x6f0
[   16.578191]  ? trace_preempt_on+0x20/0xc0
[   16.578228]  ? __pfx_kthread+0x10/0x10
[   16.578272]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.578295]  ? calculate_sigpending+0x7b/0xa0
[   16.578321]  ? __pfx_kthread+0x10/0x10
[   16.578343]  ret_from_fork+0x116/0x1d0
[   16.578363]  ? __pfx_kthread+0x10/0x10
[   16.578385]  ret_from_fork_asm+0x1a/0x30
[   16.578418]  </TASK>
[   16.578429] 
[   16.585822] Allocated by task 282:
[   16.585955]  kasan_save_stack+0x45/0x70
[   16.586094]  kasan_save_track+0x18/0x40
[   16.586311]  kasan_save_alloc_info+0x3b/0x50
[   16.586523]  __kasan_kmalloc+0xb7/0xc0
[   16.586719]  __kmalloc_cache_noprof+0x189/0x420
[   16.586916]  kasan_atomics+0x95/0x310
[   16.587095]  kunit_try_run_case+0x1a5/0x480
[   16.587292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.587516]  kthread+0x337/0x6f0
[   16.587689]  ret_from_fork+0x116/0x1d0
[   16.587874]  ret_from_fork_asm+0x1a/0x30
[   16.588087] 
[   16.588161] The buggy address belongs to the object at ffff888102a0a600
[   16.588161]  which belongs to the cache kmalloc-64 of size 64
[   16.588683] The buggy address is located 0 bytes to the right of
[   16.588683]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.589325] 
[   16.589422] The buggy address belongs to the physical page:
[   16.589690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.590032] flags: 0x200000000000000(node=0|zone=2)
[   16.590258] page_type: f5(slab)
[   16.590430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.590770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.591094] page dumped because: kasan: bad access detected
[   16.591342] 
[   16.591435] Memory state around the buggy address:
[   16.591652]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.591904]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.592114] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.592327]                                      ^
[   16.592525]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.593798]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.594421] ==================================================================
[   15.742763] ==================================================================
[   15.743622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.743917] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.744202] 
[   15.744323] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.744370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.744384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.744406] Call Trace:
[   15.744423]  <TASK>
[   15.744439]  dump_stack_lvl+0x73/0xb0
[   15.744467]  print_report+0xd1/0x610
[   15.744491]  ? __virt_addr_valid+0x1db/0x2d0
[   15.744515]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.744538]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.744563]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.744587]  kasan_report+0x141/0x180
[   15.744610]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.744638]  kasan_check_range+0x10c/0x1c0
[   15.744662]  __kasan_check_write+0x18/0x20
[   15.744683]  kasan_atomics_helper+0xb6a/0x5450
[   15.744707]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.744732]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.744758]  ? kasan_atomics+0x152/0x310
[   15.744785]  kasan_atomics+0x1dc/0x310
[   15.744904]  ? __pfx_kasan_atomics+0x10/0x10
[   15.744936]  ? __pfx_read_tsc+0x10/0x10
[   15.744960]  ? ktime_get_ts64+0x86/0x230
[   15.745036]  kunit_try_run_case+0x1a5/0x480
[   15.745063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.745088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.745113]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.745138]  ? __kthread_parkme+0x82/0x180
[   15.745160]  ? preempt_count_sub+0x50/0x80
[   15.745186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.745211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.745237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.745285]  kthread+0x337/0x6f0
[   15.745305]  ? trace_preempt_on+0x20/0xc0
[   15.745330]  ? __pfx_kthread+0x10/0x10
[   15.745352]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.745375]  ? calculate_sigpending+0x7b/0xa0
[   15.745401]  ? __pfx_kthread+0x10/0x10
[   15.745423]  ret_from_fork+0x116/0x1d0
[   15.745443]  ? __pfx_kthread+0x10/0x10
[   15.745466]  ret_from_fork_asm+0x1a/0x30
[   15.745497]  </TASK>
[   15.745509] 
[   15.754350] Allocated by task 282:
[   15.754538]  kasan_save_stack+0x45/0x70
[   15.754750]  kasan_save_track+0x18/0x40
[   15.754949]  kasan_save_alloc_info+0x3b/0x50
[   15.755244]  __kasan_kmalloc+0xb7/0xc0
[   15.755409]  __kmalloc_cache_noprof+0x189/0x420
[   15.755570]  kasan_atomics+0x95/0x310
[   15.755751]  kunit_try_run_case+0x1a5/0x480
[   15.755959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.756286]  kthread+0x337/0x6f0
[   15.756461]  ret_from_fork+0x116/0x1d0
[   15.756605]  ret_from_fork_asm+0x1a/0x30
[   15.756748] 
[   15.756820] The buggy address belongs to the object at ffff888102a0a600
[   15.756820]  which belongs to the cache kmalloc-64 of size 64
[   15.757349] The buggy address is located 0 bytes to the right of
[   15.757349]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.758172] 
[   15.758299] The buggy address belongs to the physical page:
[   15.758483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.758731] flags: 0x200000000000000(node=0|zone=2)
[   15.758897] page_type: f5(slab)
[   15.759047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.759402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.759745] page dumped because: kasan: bad access detected
[   15.760007] 
[   15.760102] Memory state around the buggy address:
[   15.760527]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.760854]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.761196] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.761458]                                      ^
[   15.761685]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.762076]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.762388] ==================================================================
[   16.377994] ==================================================================
[   16.378351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.378685] Write of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.379016] 
[   16.379199] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.379241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.379253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.379286] Call Trace:
[   16.379301]  <TASK>
[   16.379316]  dump_stack_lvl+0x73/0xb0
[   16.379343]  print_report+0xd1/0x610
[   16.379366]  ? __virt_addr_valid+0x1db/0x2d0
[   16.379390]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.379413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.379439]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.379462]  kasan_report+0x141/0x180
[   16.379485]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.379513]  kasan_check_range+0x10c/0x1c0
[   16.379538]  __kasan_check_write+0x18/0x20
[   16.379559]  kasan_atomics_helper+0x1b22/0x5450
[   16.379584]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.379608]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.379634]  ? kasan_atomics+0x152/0x310
[   16.379661]  kasan_atomics+0x1dc/0x310
[   16.379684]  ? __pfx_kasan_atomics+0x10/0x10
[   16.379709]  ? __pfx_read_tsc+0x10/0x10
[   16.379732]  ? ktime_get_ts64+0x86/0x230
[   16.379756]  kunit_try_run_case+0x1a5/0x480
[   16.379783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.379807]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.379832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.379858]  ? __kthread_parkme+0x82/0x180
[   16.379879]  ? preempt_count_sub+0x50/0x80
[   16.379903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.379928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.379955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.379982]  kthread+0x337/0x6f0
[   16.380002]  ? trace_preempt_on+0x20/0xc0
[   16.380026]  ? __pfx_kthread+0x10/0x10
[   16.380048]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.380070]  ? calculate_sigpending+0x7b/0xa0
[   16.380096]  ? __pfx_kthread+0x10/0x10
[   16.380119]  ret_from_fork+0x116/0x1d0
[   16.380138]  ? __pfx_kthread+0x10/0x10
[   16.380160]  ret_from_fork_asm+0x1a/0x30
[   16.380191]  </TASK>
[   16.380202] 
[   16.387368] Allocated by task 282:
[   16.387491]  kasan_save_stack+0x45/0x70
[   16.387634]  kasan_save_track+0x18/0x40
[   16.387780]  kasan_save_alloc_info+0x3b/0x50
[   16.387994]  __kasan_kmalloc+0xb7/0xc0
[   16.388179]  __kmalloc_cache_noprof+0x189/0x420
[   16.388407]  kasan_atomics+0x95/0x310
[   16.388594]  kunit_try_run_case+0x1a5/0x480
[   16.388832]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.389105]  kthread+0x337/0x6f0
[   16.389252]  ret_from_fork+0x116/0x1d0
[   16.389435]  ret_from_fork_asm+0x1a/0x30
[   16.389574] 
[   16.389644] The buggy address belongs to the object at ffff888102a0a600
[   16.389644]  which belongs to the cache kmalloc-64 of size 64
[   16.390169] The buggy address is located 0 bytes to the right of
[   16.390169]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.390652] 
[   16.390737] The buggy address belongs to the physical page:
[   16.390976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.391270] flags: 0x200000000000000(node=0|zone=2)
[   16.391468] page_type: f5(slab)
[   16.391634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.391916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.392221] page dumped because: kasan: bad access detected
[   16.392417] 
[   16.392511] Memory state around the buggy address:
[   16.392729]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.392939]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.393151] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.393421]                                      ^
[   16.393640]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.393949]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.394257] ==================================================================
[   15.562553] ==================================================================
[   15.562793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.563126] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.563467] 
[   15.563573] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.563613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.563626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.563648] Call Trace:
[   15.563661]  <TASK>
[   15.563676]  dump_stack_lvl+0x73/0xb0
[   15.563704]  print_report+0xd1/0x610
[   15.563726]  ? __virt_addr_valid+0x1db/0x2d0
[   15.563750]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.563773]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.563797]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.563822]  kasan_report+0x141/0x180
[   15.563845]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.563872]  kasan_check_range+0x10c/0x1c0
[   15.563897]  __kasan_check_write+0x18/0x20
[   15.563918]  kasan_atomics_helper+0x5fe/0x5450
[   15.563943]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.563967]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.563993]  ? kasan_atomics+0x152/0x310
[   15.564020]  kasan_atomics+0x1dc/0x310
[   15.564044]  ? __pfx_kasan_atomics+0x10/0x10
[   15.564070]  ? __pfx_read_tsc+0x10/0x10
[   15.564091]  ? ktime_get_ts64+0x86/0x230
[   15.564116]  kunit_try_run_case+0x1a5/0x480
[   15.564141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.564166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.564190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.564215]  ? __kthread_parkme+0x82/0x180
[   15.564237]  ? preempt_count_sub+0x50/0x80
[   15.564271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.564297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.564323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.564351]  kthread+0x337/0x6f0
[   15.564370]  ? trace_preempt_on+0x20/0xc0
[   15.564393]  ? __pfx_kthread+0x10/0x10
[   15.564415]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.564437]  ? calculate_sigpending+0x7b/0xa0
[   15.564462]  ? __pfx_kthread+0x10/0x10
[   15.564485]  ret_from_fork+0x116/0x1d0
[   15.564504]  ? __pfx_kthread+0x10/0x10
[   15.564527]  ret_from_fork_asm+0x1a/0x30
[   15.564558]  </TASK>
[   15.564569] 
[   15.572444] Allocated by task 282:
[   15.572600]  kasan_save_stack+0x45/0x70
[   15.572783]  kasan_save_track+0x18/0x40
[   15.572920]  kasan_save_alloc_info+0x3b/0x50
[   15.573072]  __kasan_kmalloc+0xb7/0xc0
[   15.573206]  __kmalloc_cache_noprof+0x189/0x420
[   15.573572]  kasan_atomics+0x95/0x310
[   15.573770]  kunit_try_run_case+0x1a5/0x480
[   15.573976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.574425]  kthread+0x337/0x6f0
[   15.574597]  ret_from_fork+0x116/0x1d0
[   15.574770]  ret_from_fork_asm+0x1a/0x30
[   15.574912] 
[   15.575033] The buggy address belongs to the object at ffff888102a0a600
[   15.575033]  which belongs to the cache kmalloc-64 of size 64
[   15.575595] The buggy address is located 0 bytes to the right of
[   15.575595]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.576145] 
[   15.576248] The buggy address belongs to the physical page:
[   15.576487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.576812] flags: 0x200000000000000(node=0|zone=2)
[   15.577146] page_type: f5(slab)
[   15.577349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.577665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.577978] page dumped because: kasan: bad access detected
[   15.578921] 
[   15.579091] Memory state around the buggy address:
[   15.579311]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.579608]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.579897] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.581610]                                      ^
[   15.581847]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.582175]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.582499] ==================================================================
[   15.621531] ==================================================================
[   15.621921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.622156] Write of size 4 at addr ffff888102a0a630 by task kunit_try_catch/282
[   15.622514] 
[   15.622619] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.622659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.622673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.622694] Call Trace:
[   15.622715]  <TASK>
[   15.622730]  dump_stack_lvl+0x73/0xb0
[   15.622757]  print_report+0xd1/0x610
[   15.622780]  ? __virt_addr_valid+0x1db/0x2d0
[   15.622805]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.622828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.622853]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.622877]  kasan_report+0x141/0x180
[   15.622900]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.622928]  kasan_check_range+0x10c/0x1c0
[   15.622953]  __kasan_check_write+0x18/0x20
[   15.622974]  kasan_atomics_helper+0x7c7/0x5450
[   15.622998]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.623023]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.623049]  ? kasan_atomics+0x152/0x310
[   15.623077]  kasan_atomics+0x1dc/0x310
[   15.623101]  ? __pfx_kasan_atomics+0x10/0x10
[   15.623127]  ? __pfx_read_tsc+0x10/0x10
[   15.623149]  ? ktime_get_ts64+0x86/0x230
[   15.623174]  kunit_try_run_case+0x1a5/0x480
[   15.623200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.623225]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.623250]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.623285]  ? __kthread_parkme+0x82/0x180
[   15.623307]  ? preempt_count_sub+0x50/0x80
[   15.623332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.623358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.623383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.623410]  kthread+0x337/0x6f0
[   15.623429]  ? trace_preempt_on+0x20/0xc0
[   15.623454]  ? __pfx_kthread+0x10/0x10
[   15.623475]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.623498]  ? calculate_sigpending+0x7b/0xa0
[   15.623522]  ? __pfx_kthread+0x10/0x10
[   15.623545]  ret_from_fork+0x116/0x1d0
[   15.623565]  ? __pfx_kthread+0x10/0x10
[   15.623587]  ret_from_fork_asm+0x1a/0x30
[   15.623619]  </TASK>
[   15.623629] 
[   15.631438] Allocated by task 282:
[   15.631616]  kasan_save_stack+0x45/0x70
[   15.632004]  kasan_save_track+0x18/0x40
[   15.632341]  kasan_save_alloc_info+0x3b/0x50
[   15.632533]  __kasan_kmalloc+0xb7/0xc0
[   15.632716]  __kmalloc_cache_noprof+0x189/0x420
[   15.632911]  kasan_atomics+0x95/0x310
[   15.633046]  kunit_try_run_case+0x1a5/0x480
[   15.633226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.633491]  kthread+0x337/0x6f0
[   15.633662]  ret_from_fork+0x116/0x1d0
[   15.633852]  ret_from_fork_asm+0x1a/0x30
[   15.634053] 
[   15.634133] The buggy address belongs to the object at ffff888102a0a600
[   15.634133]  which belongs to the cache kmalloc-64 of size 64
[   15.634505] The buggy address is located 0 bytes to the right of
[   15.634505]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   15.634965] 
[   15.635063] The buggy address belongs to the physical page:
[   15.635530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   15.635944] flags: 0x200000000000000(node=0|zone=2)
[   15.636383] page_type: f5(slab)
[   15.636557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.636897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.637307] page dumped because: kasan: bad access detected
[   15.637513] 
[   15.637614] Memory state around the buggy address:
[   15.637785]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.638012]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.638335] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.638669]                                      ^
[   15.638829]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.639046]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.640301] ==================================================================
[   16.107564] ==================================================================
[   16.107901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   16.108354] Read of size 8 at addr ffff888102a0a630 by task kunit_try_catch/282
[   16.108666] 
[   16.108764] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.108806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.108818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.108839] Call Trace:
[   16.108852]  <TASK>
[   16.108867]  dump_stack_lvl+0x73/0xb0
[   16.108895]  print_report+0xd1/0x610
[   16.108918]  ? __virt_addr_valid+0x1db/0x2d0
[   16.108941]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.109038]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.109068]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.109092]  kasan_report+0x141/0x180
[   16.109116]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.109143]  __asan_report_load8_noabort+0x18/0x20
[   16.109169]  kasan_atomics_helper+0x4eae/0x5450
[   16.109194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.109218]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.109244]  ? kasan_atomics+0x152/0x310
[   16.109282]  kasan_atomics+0x1dc/0x310
[   16.109304]  ? __pfx_kasan_atomics+0x10/0x10
[   16.109330]  ? __pfx_read_tsc+0x10/0x10
[   16.109352]  ? ktime_get_ts64+0x86/0x230
[   16.109377]  kunit_try_run_case+0x1a5/0x480
[   16.109403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.109427]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.109452]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.109477]  ? __kthread_parkme+0x82/0x180
[   16.109499]  ? preempt_count_sub+0x50/0x80
[   16.109522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.109549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.109574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.109601]  kthread+0x337/0x6f0
[   16.109621]  ? trace_preempt_on+0x20/0xc0
[   16.109643]  ? __pfx_kthread+0x10/0x10
[   16.109664]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.109688]  ? calculate_sigpending+0x7b/0xa0
[   16.109714]  ? __pfx_kthread+0x10/0x10
[   16.109736]  ret_from_fork+0x116/0x1d0
[   16.109755]  ? __pfx_kthread+0x10/0x10
[   16.109779]  ret_from_fork_asm+0x1a/0x30
[   16.109811]  </TASK>
[   16.109822] 
[   16.117831] Allocated by task 282:
[   16.118120]  kasan_save_stack+0x45/0x70
[   16.118339]  kasan_save_track+0x18/0x40
[   16.118497]  kasan_save_alloc_info+0x3b/0x50
[   16.118649]  __kasan_kmalloc+0xb7/0xc0
[   16.118815]  __kmalloc_cache_noprof+0x189/0x420
[   16.119223]  kasan_atomics+0x95/0x310
[   16.119417]  kunit_try_run_case+0x1a5/0x480
[   16.119610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.119837]  kthread+0x337/0x6f0
[   16.120091]  ret_from_fork+0x116/0x1d0
[   16.120233]  ret_from_fork_asm+0x1a/0x30
[   16.120387] 
[   16.120486] The buggy address belongs to the object at ffff888102a0a600
[   16.120486]  which belongs to the cache kmalloc-64 of size 64
[   16.121082] The buggy address is located 0 bytes to the right of
[   16.121082]  allocated 48-byte region [ffff888102a0a600, ffff888102a0a630)
[   16.121493] 
[   16.121594] The buggy address belongs to the physical page:
[   16.121847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0a
[   16.122305] flags: 0x200000000000000(node=0|zone=2)
[   16.122526] page_type: f5(slab)
[   16.122683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.123229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.123479] page dumped because: kasan: bad access detected
[   16.123727] 
[   16.123821] Memory state around the buggy address:
[   16.124168]  ffff888102a0a500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.124489]  ffff888102a0a580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.124746] >ffff888102a0a600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.125075]                                      ^
[   16.125314]  ffff888102a0a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.125636]  ffff888102a0a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.125924] ==================================================================