Hay
Date
July 8, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.007909] ==================================================================
[   22.007972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   22.008060] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.008426] 
[   22.008519] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.008649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.008712] Hardware name: linux,dummy-virt (DT)
[   22.008749] Call trace:
[   22.008818]  show_stack+0x20/0x38 (C)
[   22.008879]  dump_stack_lvl+0x8c/0xd0
[   22.009078]  print_report+0x118/0x608
[   22.009146]  kasan_report+0xdc/0x128
[   22.009207]  kasan_check_range+0x100/0x1a8
[   22.009264]  __kasan_check_write+0x20/0x30
[   22.009310]  kasan_atomics_helper+0x1058/0x4858
[   22.009544]  kasan_atomics+0x198/0x2e0
[   22.009919]  kunit_try_run_case+0x170/0x3f0
[   22.010113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.010212]  kthread+0x328/0x630
[   22.010297]  ret_from_fork+0x10/0x20
[   22.010395] 
[   22.010454] Allocated by task 265:
[   22.010487]  kasan_save_stack+0x3c/0x68
[   22.010530]  kasan_save_track+0x20/0x40
[   22.010743]  kasan_save_alloc_info+0x40/0x58
[   22.010856]  __kasan_kmalloc+0xd4/0xd8
[   22.010907]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.010983]  kasan_atomics+0xb8/0x2e0
[   22.011181]  kunit_try_run_case+0x170/0x3f0
[   22.011365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.011419]  kthread+0x328/0x630
[   22.011461]  ret_from_fork+0x10/0x20
[   22.011527] 
[   22.011598] The buggy address belongs to the object at fff00000c63cef80
[   22.011598]  which belongs to the cache kmalloc-64 of size 64
[   22.011785] The buggy address is located 0 bytes to the right of
[   22.011785]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.011934] 
[   22.012014] The buggy address belongs to the physical page:
[   22.012215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.012287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.012518] page_type: f5(slab)
[   22.012685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.012760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.012812] page dumped because: kasan: bad access detected
[   22.012883] 
[   22.012914] Memory state around the buggy address:
[   22.012950]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.012997]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.013042] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.013084]                                      ^
[   22.013129]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.013185]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.013234] ==================================================================
[   21.937530] ==================================================================
[   21.937581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   21.937632] Read of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.937686] 
[   21.937718] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.938331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.938375] Hardware name: linux,dummy-virt (DT)
[   21.938407] Call trace:
[   21.938686]  show_stack+0x20/0x38 (C)
[   21.938802]  dump_stack_lvl+0x8c/0xd0
[   21.938993]  print_report+0x118/0x608
[   21.939042]  kasan_report+0xdc/0x128
[   21.939280]  __asan_report_load4_noabort+0x20/0x30
[   21.939426]  kasan_atomics_helper+0x3e04/0x4858
[   21.939475]  kasan_atomics+0x198/0x2e0
[   21.939536]  kunit_try_run_case+0x170/0x3f0
[   21.939693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.939899]  kthread+0x328/0x630
[   21.940030]  ret_from_fork+0x10/0x20
[   21.940124] 
[   21.940486] Allocated by task 265:
[   21.940525]  kasan_save_stack+0x3c/0x68
[   21.940573]  kasan_save_track+0x20/0x40
[   21.940613]  kasan_save_alloc_info+0x40/0x58
[   21.940656]  __kasan_kmalloc+0xd4/0xd8
[   21.940693]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.940931]  kasan_atomics+0xb8/0x2e0
[   21.941050]  kunit_try_run_case+0x170/0x3f0
[   21.941097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.941143]  kthread+0x328/0x630
[   21.941192]  ret_from_fork+0x10/0x20
[   21.941231] 
[   21.941329] The buggy address belongs to the object at fff00000c63cef80
[   21.941329]  which belongs to the cache kmalloc-64 of size 64
[   21.941419] The buggy address is located 0 bytes to the right of
[   21.941419]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.941853] 
[   21.941909] The buggy address belongs to the physical page:
[   21.941946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.942005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.942056] page_type: f5(slab)
[   21.942108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.942173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.942274] page dumped because: kasan: bad access detected
[   21.942681] 
[   21.942993] Memory state around the buggy address:
[   21.943032]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.943109]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.943241] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.943318]                                      ^
[   21.943355]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.943465]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.943793] ==================================================================
[   22.050995] ==================================================================
[   22.051045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   22.051247] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.051374] 
[   22.051408] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.051518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.051547] Hardware name: linux,dummy-virt (DT)
[   22.051580] Call trace:
[   22.051820]  show_stack+0x20/0x38 (C)
[   22.051973]  dump_stack_lvl+0x8c/0xd0
[   22.052080]  print_report+0x118/0x608
[   22.052226]  kasan_report+0xdc/0x128
[   22.052341]  kasan_check_range+0x100/0x1a8
[   22.052426]  __kasan_check_write+0x20/0x30
[   22.052530]  kasan_atomics_helper+0x12d8/0x4858
[   22.052599]  kasan_atomics+0x198/0x2e0
[   22.052647]  kunit_try_run_case+0x170/0x3f0
[   22.052697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.052778]  kthread+0x328/0x630
[   22.052926]  ret_from_fork+0x10/0x20
[   22.053051] 
[   22.053178] Allocated by task 265:
[   22.053242]  kasan_save_stack+0x3c/0x68
[   22.053324]  kasan_save_track+0x20/0x40
[   22.053401]  kasan_save_alloc_info+0x40/0x58
[   22.053489]  __kasan_kmalloc+0xd4/0xd8
[   22.053538]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.053580]  kasan_atomics+0xb8/0x2e0
[   22.053833]  kunit_try_run_case+0x170/0x3f0
[   22.053919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.054003]  kthread+0x328/0x630
[   22.054100]  ret_from_fork+0x10/0x20
[   22.054272] 
[   22.054397] The buggy address belongs to the object at fff00000c63cef80
[   22.054397]  which belongs to the cache kmalloc-64 of size 64
[   22.054536] The buggy address is located 0 bytes to the right of
[   22.054536]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.054605] 
[   22.054629] The buggy address belongs to the physical page:
[   22.054897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.055050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.055170] page_type: f5(slab)
[   22.055438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.055593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.055662] page dumped because: kasan: bad access detected
[   22.055768] 
[   22.055892] Memory state around the buggy address:
[   22.055946]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.056007]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.056053] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.056095]                                      ^
[   22.056531]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.056683]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.057026] ==================================================================
[   21.957587] ==================================================================
[   21.957830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.957889] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.958077] 
[   21.958108] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.958222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.958249] Hardware name: linux,dummy-virt (DT)
[   21.958282] Call trace:
[   21.958305]  show_stack+0x20/0x38 (C)
[   21.958354]  dump_stack_lvl+0x8c/0xd0
[   21.958963]  print_report+0x118/0x608
[   21.959021]  kasan_report+0xdc/0x128
[   21.959244]  kasan_check_range+0x100/0x1a8
[   21.959303]  __kasan_check_write+0x20/0x30
[   21.959408]  kasan_atomics_helper+0xe44/0x4858
[   21.959673]  kasan_atomics+0x198/0x2e0
[   21.959903]  kunit_try_run_case+0x170/0x3f0
[   21.960076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.960143]  kthread+0x328/0x630
[   21.960276]  ret_from_fork+0x10/0x20
[   21.960324] 
[   21.960345] Allocated by task 265:
[   21.960375]  kasan_save_stack+0x3c/0x68
[   21.960417]  kasan_save_track+0x20/0x40
[   21.960557]  kasan_save_alloc_info+0x40/0x58
[   21.960615]  __kasan_kmalloc+0xd4/0xd8
[   21.960654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.960748]  kasan_atomics+0xb8/0x2e0
[   21.960788]  kunit_try_run_case+0x170/0x3f0
[   21.960828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.960914]  kthread+0x328/0x630
[   21.961088]  ret_from_fork+0x10/0x20
[   21.961225] 
[   21.961249] The buggy address belongs to the object at fff00000c63cef80
[   21.961249]  which belongs to the cache kmalloc-64 of size 64
[   21.961450] The buggy address is located 0 bytes to the right of
[   21.961450]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.961529] 
[   21.961594] The buggy address belongs to the physical page:
[   21.961712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.961794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.961878] page_type: f5(slab)
[   21.961958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.962136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.962756] page dumped because: kasan: bad access detected
[   21.962804] 
[   21.962847] Memory state around the buggy address:
[   21.962883]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.962937]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.963152] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.963358]                                      ^
[   21.963398]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.963682]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.963880] ==================================================================
[   22.030413] ==================================================================
[   22.030464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   22.030513] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.030565] 
[   22.030597] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.030679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.030732] Hardware name: linux,dummy-virt (DT)
[   22.030775] Call trace:
[   22.030798]  show_stack+0x20/0x38 (C)
[   22.030847]  dump_stack_lvl+0x8c/0xd0
[   22.030905]  print_report+0x118/0x608
[   22.030954]  kasan_report+0xdc/0x128
[   22.031014]  kasan_check_range+0x100/0x1a8
[   22.031072]  __kasan_check_write+0x20/0x30
[   22.031118]  kasan_atomics_helper+0x1190/0x4858
[   22.031983]  kasan_atomics+0x198/0x2e0
[   22.032095]  kunit_try_run_case+0x170/0x3f0
[   22.032484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.032561]  kthread+0x328/0x630
[   22.032710]  ret_from_fork+0x10/0x20
[   22.032958] 
[   22.033366] Allocated by task 265:
[   22.033998]  kasan_save_stack+0x3c/0x68
[   22.036437]  kasan_save_track+0x20/0x40
[   22.036495]  kasan_save_alloc_info+0x40/0x58
[   22.036538]  __kasan_kmalloc+0xd4/0xd8
[   22.036579]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.036622]  kasan_atomics+0xb8/0x2e0
[   22.036661]  kunit_try_run_case+0x170/0x3f0
[   22.036702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.036751]  kthread+0x328/0x630
[   22.036786]  ret_from_fork+0x10/0x20
[   22.036825] 
[   22.036847] The buggy address belongs to the object at fff00000c63cef80
[   22.036847]  which belongs to the cache kmalloc-64 of size 64
[   22.036909] The buggy address is located 0 bytes to the right of
[   22.036909]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.036979] 
[   22.037003] The buggy address belongs to the physical page:
[   22.037037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.037093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.037143] page_type: f5(slab)
[   22.037198] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.037252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.037295] page dumped because: kasan: bad access detected
[   22.037329] 
[   22.037350] Memory state around the buggy address:
[   22.037384]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.037429]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.038812] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.039270]                                      ^
[   22.039546]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.039593]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.039635] ==================================================================
[   21.856016] ==================================================================
[   21.856095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   21.856242] Read of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.856303] 
[   21.856333] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.856452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.856481] Hardware name: linux,dummy-virt (DT)
[   21.856549] Call trace:
[   21.856574]  show_stack+0x20/0x38 (C)
[   21.856636]  dump_stack_lvl+0x8c/0xd0
[   21.856691]  print_report+0x118/0x608
[   21.856768]  kasan_report+0xdc/0x128
[   21.856826]  __asan_report_load4_noabort+0x20/0x30
[   21.856878]  kasan_atomics_helper+0x42d8/0x4858
[   21.856933]  kasan_atomics+0x198/0x2e0
[   21.856980]  kunit_try_run_case+0x170/0x3f0
[   21.857444]  kasan_save_stack+0x3c/0x68
[   21.857671]  __kasan_kmalloc+0xd4/0xd8
[   21.857756]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.857798]  kasan_atomics+0xb8/0x2e0
[   21.857835]  kunit_try_run_case+0x170/0x3f0
[   21.857994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.858147]  kthread+0x328/0x630
[   21.858281]  ret_from_fork+0x10/0x20
[   21.858388] 
[   21.858438] The buggy address belongs to the object at fff00000c63cef80
[   21.858438]  which belongs to the cache kmalloc-64 of size 64
[   21.858593] 
[   21.858652] The buggy address belongs to the physical page:
[   21.858741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.859267] 
[   21.859350]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.860772] ==================================================================
[   22.098365] ==================================================================
[   22.098448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   22.098501] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.098572] 
[   22.098818] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.098945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.098982] Hardware name: linux,dummy-virt (DT)
[   22.099017] Call trace:
[   22.099074]  show_stack+0x20/0x38 (C)
[   22.099127]  dump_stack_lvl+0x8c/0xd0
[   22.099254]  print_report+0x118/0x608
[   22.099330]  kasan_report+0xdc/0x128
[   22.099382]  kasan_check_range+0x100/0x1a8
[   22.099433]  __kasan_check_write+0x20/0x30
[   22.099478]  kasan_atomics_helper+0x15b4/0x4858
[   22.099527]  kasan_atomics+0x198/0x2e0
[   22.099584]  kunit_try_run_case+0x170/0x3f0
[   22.099634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.099815]  kthread+0x328/0x630
[   22.099928]  ret_from_fork+0x10/0x20
[   22.100017] 
[   22.100048] Allocated by task 265:
[   22.100126]  kasan_save_stack+0x3c/0x68
[   22.100456]  kasan_save_track+0x20/0x40
[   22.100556]  kasan_save_alloc_info+0x40/0x58
[   22.100640]  __kasan_kmalloc+0xd4/0xd8
[   22.100681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.100749]  kasan_atomics+0xb8/0x2e0
[   22.100789]  kunit_try_run_case+0x170/0x3f0
[   22.100837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.100883]  kthread+0x328/0x630
[   22.100917]  ret_from_fork+0x10/0x20
[   22.100956] 
[   22.100979] The buggy address belongs to the object at fff00000c63cef80
[   22.100979]  which belongs to the cache kmalloc-64 of size 64
[   22.101050] The buggy address is located 0 bytes to the right of
[   22.101050]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.101133] 
[   22.101177] The buggy address belongs to the physical page:
[   22.101222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.101278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.101346] page_type: f5(slab)
[   22.101415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.101469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.101527] page dumped because: kasan: bad access detected
[   22.101566] 
[   22.101588] Memory state around the buggy address:
[   22.101621]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.101681]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.101732] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.101774]                                      ^
[   22.101816]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.101869]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.101907] ==================================================================
[   22.013507] ==================================================================
[   22.013558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   22.013620] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.013673] 
[   22.013703] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.013784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.013823] Hardware name: linux,dummy-virt (DT)
[   22.013856] Call trace:
[   22.013879]  show_stack+0x20/0x38 (C)
[   22.013929]  dump_stack_lvl+0x8c/0xd0
[   22.013975]  print_report+0x118/0x608
[   22.014023]  kasan_report+0xdc/0x128
[   22.014070]  kasan_check_range+0x100/0x1a8
[   22.014119]  __kasan_check_write+0x20/0x30
[   22.014595]  kasan_atomics_helper+0x10c0/0x4858
[   22.014983]  kasan_atomics+0x198/0x2e0
[   22.015042]  kunit_try_run_case+0x170/0x3f0
[   22.015093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.015252]  kthread+0x328/0x630
[   22.015304]  ret_from_fork+0x10/0x20
[   22.015393] 
[   22.015450] Allocated by task 265:
[   22.015483]  kasan_save_stack+0x3c/0x68
[   22.016137]  kasan_save_track+0x20/0x40
[   22.016456]  kasan_save_alloc_info+0x40/0x58
[   22.016610]  __kasan_kmalloc+0xd4/0xd8
[   22.016794]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.016938]  kasan_atomics+0xb8/0x2e0
[   22.016984]  kunit_try_run_case+0x170/0x3f0
[   22.017048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.017101]  kthread+0x328/0x630
[   22.017265]  ret_from_fork+0x10/0x20
[   22.017531] 
[   22.017575] The buggy address belongs to the object at fff00000c63cef80
[   22.017575]  which belongs to the cache kmalloc-64 of size 64
[   22.017997] The buggy address is located 0 bytes to the right of
[   22.017997]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.018220] 
[   22.018436] The buggy address belongs to the physical page:
[   22.018770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.018846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.019471] page_type: f5(slab)
[   22.019636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.019698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.019742] page dumped because: kasan: bad access detected
[   22.019959] 
[   22.020470] Memory state around the buggy address:
[   22.020532]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.020582]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.020896] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.021035]                                      ^
[   22.021094]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.021334]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.021726] ==================================================================
[   21.878632] ==================================================================
[   21.878687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   21.878738] Write of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.878788] 
[   21.878820] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.878921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.878951] Hardware name: linux,dummy-virt (DT)
[   21.878984] Call trace:
[   21.879009]  show_stack+0x20/0x38 (C)
[   21.879056]  dump_stack_lvl+0x8c/0xd0
[   21.879114]  print_report+0x118/0x608
[   21.879463]  kasan_report+0xdc/0x128
[   21.879740]  kasan_check_range+0x100/0x1a8
[   21.879818]  __kasan_check_write+0x20/0x30
[   21.879998]  kasan_atomics_helper+0xa6c/0x4858
[   21.880050]  kasan_atomics+0x198/0x2e0
[   21.880369]  kunit_try_run_case+0x170/0x3f0
[   21.880531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.880795]  kthread+0x328/0x630
[   21.880931]  ret_from_fork+0x10/0x20
[   21.881114] 
[   21.881194] Allocated by task 265:
[   21.881225]  kasan_save_stack+0x3c/0x68
[   21.881269]  kasan_save_track+0x20/0x40
[   21.881529]  kasan_save_alloc_info+0x40/0x58
[   21.881651]  __kasan_kmalloc+0xd4/0xd8
[   21.881759]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.882021]  kasan_atomics+0xb8/0x2e0
[   21.882180]  kunit_try_run_case+0x170/0x3f0
[   21.882330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.882465]  kthread+0x328/0x630
[   21.882526]  ret_from_fork+0x10/0x20
[   21.882565] 
[   21.882586] The buggy address belongs to the object at fff00000c63cef80
[   21.882586]  which belongs to the cache kmalloc-64 of size 64
[   21.882856] The buggy address is located 0 bytes to the right of
[   21.882856]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.883037] 
[   21.883145] The buggy address belongs to the physical page:
[   21.883523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.883603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.883828] page_type: f5(slab)
[   21.883898] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.883949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.883991] page dumped because: kasan: bad access detected
[   21.884026] 
[   21.884046] Memory state around the buggy address:
[   21.884078]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.884146]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.884203] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.884372]                                      ^
[   21.884486]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.884581]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.884675] ==================================================================
[   22.130744] ==================================================================
[   22.130793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   22.130860] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.130922] 
[   22.130953] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.131034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.131063] Hardware name: linux,dummy-virt (DT)
[   22.131094] Call trace:
[   22.131116]  show_stack+0x20/0x38 (C)
[   22.131179]  dump_stack_lvl+0x8c/0xd0
[   22.131228]  print_report+0x118/0x608
[   22.131277]  kasan_report+0xdc/0x128
[   22.131351]  __asan_report_load8_noabort+0x20/0x30
[   22.131402]  kasan_atomics_helper+0x3e20/0x4858
[   22.131771]  kasan_atomics+0x198/0x2e0
[   22.131841]  kunit_try_run_case+0x170/0x3f0
[   22.132083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.132245]  kthread+0x328/0x630
[   22.132341]  ret_from_fork+0x10/0x20
[   22.132460] 
[   22.132548] Allocated by task 265:
[   22.132693]  kasan_save_stack+0x3c/0x68
[   22.132736]  kasan_save_track+0x20/0x40
[   22.132777]  kasan_save_alloc_info+0x40/0x58
[   22.132817]  __kasan_kmalloc+0xd4/0xd8
[   22.132857]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.133025]  kasan_atomics+0xb8/0x2e0
[   22.133065]  kunit_try_run_case+0x170/0x3f0
[   22.133175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.133266]  kthread+0x328/0x630
[   22.133304]  ret_from_fork+0x10/0x20
[   22.133380] 
[   22.133459] The buggy address belongs to the object at fff00000c63cef80
[   22.133459]  which belongs to the cache kmalloc-64 of size 64
[   22.133576] The buggy address is located 0 bytes to the right of
[   22.133576]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.133946] 
[   22.134024] The buggy address belongs to the physical page:
[   22.134189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.134307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.134423] page_type: f5(slab)
[   22.134506] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.134634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.134709] page dumped because: kasan: bad access detected
[   22.134744] 
[   22.134764] Memory state around the buggy address:
[   22.134797]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.135214]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.135383] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.135466]                                      ^
[   22.135541]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.135926]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.136034] ==================================================================
[   21.964497] ==================================================================
[   21.964551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.964604] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.964656] 
[   21.964687] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.964772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.964844] Hardware name: linux,dummy-virt (DT)
[   21.964929] Call trace:
[   21.964993]  show_stack+0x20/0x38 (C)
[   21.965044]  dump_stack_lvl+0x8c/0xd0
[   21.965144]  print_report+0x118/0x608
[   21.965207]  kasan_report+0xdc/0x128
[   21.965255]  __asan_report_store8_noabort+0x20/0x30
[   21.965308]  kasan_atomics_helper+0x3e5c/0x4858
[   21.965378]  kasan_atomics+0x198/0x2e0
[   21.965501]  kunit_try_run_case+0x170/0x3f0
[   21.965618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.965888]  kthread+0x328/0x630
[   21.966091]  ret_from_fork+0x10/0x20
[   21.966595] 
[   21.966617] Allocated by task 265:
[   21.966647]  kasan_save_stack+0x3c/0x68
[   21.966732]  kasan_save_track+0x20/0x40
[   21.967069]  kasan_save_alloc_info+0x40/0x58
[   21.967115]  __kasan_kmalloc+0xd4/0xd8
[   21.967152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.967201]  kasan_atomics+0xb8/0x2e0
[   21.967239]  kunit_try_run_case+0x170/0x3f0
[   21.967279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.967325]  kthread+0x328/0x630
[   21.967358]  ret_from_fork+0x10/0x20
[   21.967396] 
[   21.967418] The buggy address belongs to the object at fff00000c63cef80
[   21.967418]  which belongs to the cache kmalloc-64 of size 64
[   21.967479] The buggy address is located 0 bytes to the right of
[   21.967479]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.967591] 
[   21.967613] The buggy address belongs to the physical page:
[   21.967648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.967919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.967978] page_type: f5(slab)
[   21.968019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.968263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.968311] page dumped because: kasan: bad access detected
[   21.968344] 
[   21.968394] Memory state around the buggy address:
[   21.968518]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.968662]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.968779] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.968819]                                      ^
[   21.968853]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.968913]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.968954] ==================================================================
[   22.065592] ==================================================================
[   22.065642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   22.065693] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.065747] 
[   22.065777] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.065858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.065887] Hardware name: linux,dummy-virt (DT)
[   22.065932] Call trace:
[   22.065955]  show_stack+0x20/0x38 (C)
[   22.066006]  dump_stack_lvl+0x8c/0xd0
[   22.066055]  print_report+0x118/0x608
[   22.066103]  kasan_report+0xdc/0x128
[   22.066150]  __asan_report_load8_noabort+0x20/0x30
[   22.066218]  kasan_atomics_helper+0x3f04/0x4858
[   22.066581]  kasan_atomics+0x198/0x2e0
[   22.066870]  kunit_try_run_case+0x170/0x3f0
[   22.066948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.067069]  kthread+0x328/0x630
[   22.067137]  ret_from_fork+0x10/0x20
[   22.067205] 
[   22.067436] Allocated by task 265:
[   22.067503]  kasan_save_stack+0x3c/0x68
[   22.067690]  kasan_save_track+0x20/0x40
[   22.068124]  kasan_save_alloc_info+0x40/0x58
[   22.068270]  __kasan_kmalloc+0xd4/0xd8
[   22.068365]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.068516]  kasan_atomics+0xb8/0x2e0
[   22.068589]  kunit_try_run_case+0x170/0x3f0
[   22.068631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.069068]  kthread+0x328/0x630
[   22.069377]  ret_from_fork+0x10/0x20
[   22.069626] 
[   22.069654] The buggy address belongs to the object at fff00000c63cef80
[   22.069654]  which belongs to the cache kmalloc-64 of size 64
[   22.069882] The buggy address is located 0 bytes to the right of
[   22.069882]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.070242] 
[   22.070375] The buggy address belongs to the physical page:
[   22.070437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.070651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.071000] page_type: f5(slab)
[   22.071211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.071354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.071646] page dumped because: kasan: bad access detected
[   22.071973] 
[   22.072183] Memory state around the buggy address:
[   22.072258]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.072628]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.072694] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.073036]                                      ^
[   22.073153]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.073317]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.073609] ==================================================================
[   22.082963] ==================================================================
[   22.083014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   22.083064] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.083116] 
[   22.083169] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.083263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.083299] Hardware name: linux,dummy-virt (DT)
[   22.083340] Call trace:
[   22.083363]  show_stack+0x20/0x38 (C)
[   22.083417]  dump_stack_lvl+0x8c/0xd0
[   22.083466]  print_report+0x118/0x608
[   22.084351]  kasan_report+0xdc/0x128
[   22.084422]  kasan_check_range+0x100/0x1a8
[   22.084495]  __kasan_check_write+0x20/0x30
[   22.084626]  kasan_atomics_helper+0x147c/0x4858
[   22.084682]  kasan_atomics+0x198/0x2e0
[   22.084750]  kunit_try_run_case+0x170/0x3f0
[   22.085073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.085193]  kthread+0x328/0x630
[   22.085635]  ret_from_fork+0x10/0x20
[   22.085818] 
[   22.085887] Allocated by task 265:
[   22.086037]  kasan_save_stack+0x3c/0x68
[   22.086083]  kasan_save_track+0x20/0x40
[   22.086482]  kasan_save_alloc_info+0x40/0x58
[   22.086718]  __kasan_kmalloc+0xd4/0xd8
[   22.086883]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.087000]  kasan_atomics+0xb8/0x2e0
[   22.087801]  kunit_try_run_case+0x170/0x3f0
[   22.087867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.087916]  kthread+0x328/0x630
[   22.087950]  ret_from_fork+0x10/0x20
[   22.087990] 
[   22.088013] The buggy address belongs to the object at fff00000c63cef80
[   22.088013]  which belongs to the cache kmalloc-64 of size 64
[   22.088076] The buggy address is located 0 bytes to the right of
[   22.088076]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.088143] 
[   22.088176] The buggy address belongs to the physical page:
[   22.088212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.088271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.088320] page_type: f5(slab)
[   22.088363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.088418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.088461] page dumped because: kasan: bad access detected
[   22.088496] 
[   22.088517] Memory state around the buggy address:
[   22.088551]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.088597]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.088642] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.088683]                                      ^
[   22.088716]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.088761]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.088799] ==================================================================
[   22.041866] ==================================================================
[   22.041924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   22.041978] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.042029] 
[   22.042064] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.042147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.042202] Hardware name: linux,dummy-virt (DT)
[   22.042236] Call trace:
[   22.042262]  show_stack+0x20/0x38 (C)
[   22.042313]  dump_stack_lvl+0x8c/0xd0
[   22.042362]  print_report+0x118/0x608
[   22.042408]  kasan_report+0xdc/0x128
[   22.042455]  kasan_check_range+0x100/0x1a8
[   22.042503]  __kasan_check_write+0x20/0x30
[   22.042549]  kasan_atomics_helper+0x11f8/0x4858
[   22.042598]  kasan_atomics+0x198/0x2e0
[   22.042644]  kunit_try_run_case+0x170/0x3f0
[   22.042693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.042747]  kthread+0x328/0x630
[   22.042789]  ret_from_fork+0x10/0x20
[   22.042839] 
[   22.042859] Allocated by task 265:
[   22.042887]  kasan_save_stack+0x3c/0x68
[   22.042935]  kasan_save_track+0x20/0x40
[   22.042974]  kasan_save_alloc_info+0x40/0x58
[   22.043016]  __kasan_kmalloc+0xd4/0xd8
[   22.043054]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.043096]  kasan_atomics+0xb8/0x2e0
[   22.043132]  kunit_try_run_case+0x170/0x3f0
[   22.043188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.045237]  kthread+0x328/0x630
[   22.045295]  ret_from_fork+0x10/0x20
[   22.045335] 
[   22.045358] The buggy address belongs to the object at fff00000c63cef80
[   22.045358]  which belongs to the cache kmalloc-64 of size 64
[   22.045419] The buggy address is located 0 bytes to the right of
[   22.045419]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.045486] 
[   22.045509] The buggy address belongs to the physical page:
[   22.045543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.045599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.045649] page_type: f5(slab)
[   22.045689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.045743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.045786] page dumped because: kasan: bad access detected
[   22.045820] 
[   22.045841] Memory state around the buggy address:
[   22.045875]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.045919]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.045963] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.046005]                                      ^
[   22.046039]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.046081]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.046121] ==================================================================
[   22.117122] ==================================================================
[   22.117191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   22.117415] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.117474] 
[   22.117615] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.117702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.117732] Hardware name: linux,dummy-virt (DT)
[   22.117764] Call trace:
[   22.117885]  show_stack+0x20/0x38 (C)
[   22.117980]  dump_stack_lvl+0x8c/0xd0
[   22.118032]  print_report+0x118/0x608
[   22.118258]  kasan_report+0xdc/0x128
[   22.118321]  kasan_check_range+0x100/0x1a8
[   22.118413]  __kasan_check_write+0x20/0x30
[   22.118460]  kasan_atomics_helper+0x16d0/0x4858
[   22.118511]  kasan_atomics+0x198/0x2e0
[   22.118668]  kunit_try_run_case+0x170/0x3f0
[   22.118770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.118854]  kthread+0x328/0x630
[   22.118907]  ret_from_fork+0x10/0x20
[   22.118955] 
[   22.118976] Allocated by task 265:
[   22.119005]  kasan_save_stack+0x3c/0x68
[   22.119047]  kasan_save_track+0x20/0x40
[   22.119087]  kasan_save_alloc_info+0x40/0x58
[   22.119128]  __kasan_kmalloc+0xd4/0xd8
[   22.119179]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.119416]  kasan_atomics+0xb8/0x2e0
[   22.119559]  kunit_try_run_case+0x170/0x3f0
[   22.119672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.119851]  kthread+0x328/0x630
[   22.119885]  ret_from_fork+0x10/0x20
[   22.119925] 
[   22.119946] The buggy address belongs to the object at fff00000c63cef80
[   22.119946]  which belongs to the cache kmalloc-64 of size 64
[   22.120008] The buggy address is located 0 bytes to the right of
[   22.120008]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.120172] 
[   22.120220] The buggy address belongs to the physical page:
[   22.120354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.120474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.120749] page_type: f5(slab)
[   22.120811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.120865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.120909] page dumped because: kasan: bad access detected
[   22.120944] 
[   22.120964] Memory state around the buggy address:
[   22.121018]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.121063]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.121123] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.121175]                                      ^
[   22.121211]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.121254]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.121295] ==================================================================
[   22.121495] ==================================================================
[   22.121543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   22.121593] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.121645] 
[   22.121676] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.121757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.122021] Hardware name: linux,dummy-virt (DT)
[   22.122077] Call trace:
[   22.122146]  show_stack+0x20/0x38 (C)
[   22.122213]  dump_stack_lvl+0x8c/0xd0
[   22.122270]  print_report+0x118/0x608
[   22.122541]  kasan_report+0xdc/0x128
[   22.122631]  __asan_report_load8_noabort+0x20/0x30
[   22.122716]  kasan_atomics_helper+0x3e10/0x4858
[   22.122778]  kasan_atomics+0x198/0x2e0
[   22.122833]  kunit_try_run_case+0x170/0x3f0
[   22.122884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.122968]  kthread+0x328/0x630
[   22.123012]  ret_from_fork+0x10/0x20
[   22.123067] 
[   22.123175] Allocated by task 265:
[   22.123242]  kasan_save_stack+0x3c/0x68
[   22.123287]  kasan_save_track+0x20/0x40
[   22.123348]  kasan_save_alloc_info+0x40/0x58
[   22.123392]  __kasan_kmalloc+0xd4/0xd8
[   22.123429]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.123471]  kasan_atomics+0xb8/0x2e0
[   22.123518]  kunit_try_run_case+0x170/0x3f0
[   22.123559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.123605]  kthread+0x328/0x630
[   22.123639]  ret_from_fork+0x10/0x20
[   22.123842] 
[   22.123965] The buggy address belongs to the object at fff00000c63cef80
[   22.123965]  which belongs to the cache kmalloc-64 of size 64
[   22.124119] The buggy address is located 0 bytes to the right of
[   22.124119]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.124421] 
[   22.124448] The buggy address belongs to the physical page:
[   22.124531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.124689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.124799] page_type: f5(slab)
[   22.124857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.124963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.125019] page dumped because: kasan: bad access detected
[   22.125112] 
[   22.125222] Memory state around the buggy address:
[   22.125297]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.125357]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.125403] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.125444]                                      ^
[   22.125480]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.125685]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.125731] ==================================================================
[   22.136470] ==================================================================
[   22.136520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   22.136723] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.136785] 
[   22.136890] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.136981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.137029] Hardware name: linux,dummy-virt (DT)
[   22.137103] Call trace:
[   22.137174]  show_stack+0x20/0x38 (C)
[   22.137225]  dump_stack_lvl+0x8c/0xd0
[   22.137592]  print_report+0x118/0x608
[   22.137755]  kasan_report+0xdc/0x128
[   22.137807]  kasan_check_range+0x100/0x1a8
[   22.137859]  __kasan_check_write+0x20/0x30
[   22.137904]  kasan_atomics_helper+0x17ec/0x4858
[   22.137993]  kasan_atomics+0x198/0x2e0
[   22.138048]  kunit_try_run_case+0x170/0x3f0
[   22.138100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.138418]  kthread+0x328/0x630
[   22.138512]  ret_from_fork+0x10/0x20
[   22.138571] 
[   22.138610] Allocated by task 265:
[   22.138642]  kasan_save_stack+0x3c/0x68
[   22.138684]  kasan_save_track+0x20/0x40
[   22.138724]  kasan_save_alloc_info+0x40/0x58
[   22.139060]  __kasan_kmalloc+0xd4/0xd8
[   22.139134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.139221]  kasan_atomics+0xb8/0x2e0
[   22.139289]  kunit_try_run_case+0x170/0x3f0
[   22.139332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.139979]  kthread+0x328/0x630
[   22.140136]  ret_from_fork+0x10/0x20
[   22.140285] 
[   22.140425] The buggy address belongs to the object at fff00000c63cef80
[   22.140425]  which belongs to the cache kmalloc-64 of size 64
[   22.140546] The buggy address is located 0 bytes to the right of
[   22.140546]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.140612] 
[   22.140635] The buggy address belongs to the physical page:
[   22.140670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.141060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.141548] page_type: f5(slab)
[   22.141635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.141699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.141744] page dumped because: kasan: bad access detected
[   22.141781] 
[   22.141802] Memory state around the buggy address:
[   22.141836]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.141882]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.141976] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.142021]                                      ^
[   22.142057]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.142104]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.142183] ==================================================================
[   22.089009] ==================================================================
[   22.089057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   22.089105] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.089172] 
[   22.089201] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.089285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.089314] Hardware name: linux,dummy-virt (DT)
[   22.089346] Call trace:
[   22.089369]  show_stack+0x20/0x38 (C)
[   22.089417]  dump_stack_lvl+0x8c/0xd0
[   22.089464]  print_report+0x118/0x608
[   22.089512]  kasan_report+0xdc/0x128
[   22.089557]  kasan_check_range+0x100/0x1a8
[   22.089609]  __kasan_check_write+0x20/0x30
[   22.089655]  kasan_atomics_helper+0x14e4/0x4858
[   22.089705]  kasan_atomics+0x198/0x2e0
[   22.089752]  kunit_try_run_case+0x170/0x3f0
[   22.089799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.089853]  kthread+0x328/0x630
[   22.089896]  ret_from_fork+0x10/0x20
[   22.089942] 
[   22.089962] Allocated by task 265:
[   22.089991]  kasan_save_stack+0x3c/0x68
[   22.090032]  kasan_save_track+0x20/0x40
[   22.090072]  kasan_save_alloc_info+0x40/0x58
[   22.090115]  __kasan_kmalloc+0xd4/0xd8
[   22.090185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.090228]  kasan_atomics+0xb8/0x2e0
[   22.090447]  kunit_try_run_case+0x170/0x3f0
[   22.090500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.090578]  kthread+0x328/0x630
[   22.090613]  ret_from_fork+0x10/0x20
[   22.090670] 
[   22.090720] The buggy address belongs to the object at fff00000c63cef80
[   22.090720]  which belongs to the cache kmalloc-64 of size 64
[   22.090783] The buggy address is located 0 bytes to the right of
[   22.090783]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.090850] 
[   22.090871] The buggy address belongs to the physical page:
[   22.090910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.090965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.091013] page_type: f5(slab)
[   22.091054] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.091107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.091150] page dumped because: kasan: bad access detected
[   22.091196] 
[   22.091218] Memory state around the buggy address:
[   22.091252]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.091297]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.091342] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.091540]                                      ^
[   22.091768]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.092132]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.092200] ==================================================================
[   22.102715] ==================================================================
[   22.102823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   22.102875] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.102936] 
[   22.103083] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.103177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.103214] Hardware name: linux,dummy-virt (DT)
[   22.103248] Call trace:
[   22.103288]  show_stack+0x20/0x38 (C)
[   22.103340]  dump_stack_lvl+0x8c/0xd0
[   22.103387]  print_report+0x118/0x608
[   22.103453]  kasan_report+0xdc/0x128
[   22.103534]  __asan_report_load8_noabort+0x20/0x30
[   22.103609]  kasan_atomics_helper+0x3db0/0x4858
[   22.103658]  kasan_atomics+0x198/0x2e0
[   22.103901]  kunit_try_run_case+0x170/0x3f0
[   22.104024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.104154]  kthread+0x328/0x630
[   22.104279]  ret_from_fork+0x10/0x20
[   22.104347] 
[   22.104385] Allocated by task 265:
[   22.104462]  kasan_save_stack+0x3c/0x68
[   22.104743]  kasan_save_track+0x20/0x40
[   22.104971]  kasan_save_alloc_info+0x40/0x58
[   22.105099]  __kasan_kmalloc+0xd4/0xd8
[   22.105211]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.105357]  kasan_atomics+0xb8/0x2e0
[   22.105504]  kunit_try_run_case+0x170/0x3f0
[   22.105564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.105637]  kthread+0x328/0x630
[   22.105683]  ret_from_fork+0x10/0x20
[   22.105720] 
[   22.105742] The buggy address belongs to the object at fff00000c63cef80
[   22.105742]  which belongs to the cache kmalloc-64 of size 64
[   22.106017] The buggy address is located 0 bytes to the right of
[   22.106017]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.106106] 
[   22.106129] The buggy address belongs to the physical page:
[   22.106289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.106462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.106586] page_type: f5(slab)
[   22.106734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.106807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.106851] page dumped because: kasan: bad access detected
[   22.106884] 
[   22.106911] Memory state around the buggy address:
[   22.107091]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.107250]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.107334] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.107430]                                      ^
[   22.107488]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.107559]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.107903] ==================================================================
[   21.951395] ==================================================================
[   21.951731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.951879] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.951984] 
[   21.952023] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.952142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.952181] Hardware name: linux,dummy-virt (DT)
[   21.952215] Call trace:
[   21.952341]  show_stack+0x20/0x38 (C)
[   21.952400]  dump_stack_lvl+0x8c/0xd0
[   21.952451]  print_report+0x118/0x608
[   21.952499]  kasan_report+0xdc/0x128
[   21.952565]  __asan_report_load8_noabort+0x20/0x30
[   21.952616]  kasan_atomics_helper+0x3f58/0x4858
[   21.952688]  kasan_atomics+0x198/0x2e0
[   21.952809]  kunit_try_run_case+0x170/0x3f0
[   21.952908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.952962]  kthread+0x328/0x630
[   21.953348]  ret_from_fork+0x10/0x20
[   21.953452] 
[   21.953492] Allocated by task 265:
[   21.953522]  kasan_save_stack+0x3c/0x68
[   21.953567]  kasan_save_track+0x20/0x40
[   21.953607]  kasan_save_alloc_info+0x40/0x58
[   21.953647]  __kasan_kmalloc+0xd4/0xd8
[   21.953686]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.953728]  kasan_atomics+0xb8/0x2e0
[   21.953766]  kunit_try_run_case+0x170/0x3f0
[   21.953827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.953874]  kthread+0x328/0x630
[   21.953930]  ret_from_fork+0x10/0x20
[   21.954093] 
[   21.954128] The buggy address belongs to the object at fff00000c63cef80
[   21.954128]  which belongs to the cache kmalloc-64 of size 64
[   21.954198] The buggy address is located 0 bytes to the right of
[   21.954198]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.954304] 
[   21.954330] The buggy address belongs to the physical page:
[   21.954502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.954684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.954772] page_type: f5(slab)
[   21.954813] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.954866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.954913] page dumped because: kasan: bad access detected
[   21.955086] 
[   21.955915] Memory state around the buggy address:
[   21.955959]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.956008]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.956051] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.956274]                                      ^
[   21.956390]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.956436]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.956477] ==================================================================
[   21.970433] ==================================================================
[   21.971314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.971438] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.971948] 
[   21.971987] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.972103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.972134] Hardware name: linux,dummy-virt (DT)
[   21.972337] Call trace:
[   21.972564]  show_stack+0x20/0x38 (C)
[   21.972624]  dump_stack_lvl+0x8c/0xd0
[   21.972934]  print_report+0x118/0x608
[   21.973034]  kasan_report+0xdc/0x128
[   21.973122]  kasan_check_range+0x100/0x1a8
[   21.973349]  __kasan_check_write+0x20/0x30
[   21.973419]  kasan_atomics_helper+0xeb8/0x4858
[   21.973782]  kasan_atomics+0x198/0x2e0
[   21.973839]  kunit_try_run_case+0x170/0x3f0
[   21.974060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.974206]  kthread+0x328/0x630
[   21.974298]  ret_from_fork+0x10/0x20
[   21.974690] 
[   21.974716] Allocated by task 265:
[   21.974836]  kasan_save_stack+0x3c/0x68
[   21.975017]  kasan_save_track+0x20/0x40
[   21.975346]  kasan_save_alloc_info+0x40/0x58
[   21.975723]  __kasan_kmalloc+0xd4/0xd8
[   21.975778]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.975819]  kasan_atomics+0xb8/0x2e0
[   21.975856]  kunit_try_run_case+0x170/0x3f0
[   21.976058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.976124]  kthread+0x328/0x630
[   21.976422]  ret_from_fork+0x10/0x20
[   21.976795] 
[   21.976824] The buggy address belongs to the object at fff00000c63cef80
[   21.976824]  which belongs to the cache kmalloc-64 of size 64
[   21.977036] The buggy address is located 0 bytes to the right of
[   21.977036]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.977219] 
[   21.977475] The buggy address belongs to the physical page:
[   21.977520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.977695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.977939] page_type: f5(slab)
[   21.977989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.978153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.978395] page dumped because: kasan: bad access detected
[   21.978476] 
[   21.978497] Memory state around the buggy address:
[   21.978533]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.978978]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.979116] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.979394]                                      ^
[   21.979478]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.979835]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.979903] ==================================================================
[   22.000855] ==================================================================
[   22.001015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   22.001114] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.001180] 
[   22.001212] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.001295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.001661] Hardware name: linux,dummy-virt (DT)
[   22.001806] Call trace:
[   22.001833]  show_stack+0x20/0x38 (C)
[   22.001884]  dump_stack_lvl+0x8c/0xd0
[   22.001951]  print_report+0x118/0x608
[   22.001999]  kasan_report+0xdc/0x128
[   22.002272]  kasan_check_range+0x100/0x1a8
[   22.002354]  __kasan_check_write+0x20/0x30
[   22.002428]  kasan_atomics_helper+0xff0/0x4858
[   22.002490]  kasan_atomics+0x198/0x2e0
[   22.002546]  kunit_try_run_case+0x170/0x3f0
[   22.002597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.002651]  kthread+0x328/0x630
[   22.002693]  ret_from_fork+0x10/0x20
[   22.002741] 
[   22.002762] Allocated by task 265:
[   22.002791]  kasan_save_stack+0x3c/0x68
[   22.002844]  kasan_save_track+0x20/0x40
[   22.003105]  kasan_save_alloc_info+0x40/0x58
[   22.003271]  __kasan_kmalloc+0xd4/0xd8
[   22.003322]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.003408]  kasan_atomics+0xb8/0x2e0
[   22.003450]  kunit_try_run_case+0x170/0x3f0
[   22.003490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.003549]  kthread+0x328/0x630
[   22.003613]  ret_from_fork+0x10/0x20
[   22.003654] 
[   22.003677] The buggy address belongs to the object at fff00000c63cef80
[   22.003677]  which belongs to the cache kmalloc-64 of size 64
[   22.004296] The buggy address is located 0 bytes to the right of
[   22.004296]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.004479] 
[   22.004625] The buggy address belongs to the physical page:
[   22.004772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.004848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.004927] page_type: f5(slab)
[   22.005033] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.005430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.005482] page dumped because: kasan: bad access detected
[   22.005526] 
[   22.005548] Memory state around the buggy address:
[   22.005625]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.005686]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.005750] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.006138]                                      ^
[   22.006481]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.006736]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.006786] ==================================================================
[   21.945716] ==================================================================
[   21.945770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   21.945823] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.946230] 
[   21.946265] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.946437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.946702] Hardware name: linux,dummy-virt (DT)
[   21.946964] Call trace:
[   21.947058]  show_stack+0x20/0x38 (C)
[   21.947184]  dump_stack_lvl+0x8c/0xd0
[   21.947236]  print_report+0x118/0x608
[   21.947284]  kasan_report+0xdc/0x128
[   21.947331]  kasan_check_range+0x100/0x1a8
[   21.947380]  __kasan_check_read+0x20/0x30
[   21.947425]  kasan_atomics_helper+0xdd4/0x4858
[   21.947474]  kasan_atomics+0x198/0x2e0
[   21.947530]  kunit_try_run_case+0x170/0x3f0
[   21.947578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.947786]  kthread+0x328/0x630
[   21.947949]  ret_from_fork+0x10/0x20
[   21.948001] 
[   21.948313] Allocated by task 265:
[   21.948427]  kasan_save_stack+0x3c/0x68
[   21.948478]  kasan_save_track+0x20/0x40
[   21.948567]  kasan_save_alloc_info+0x40/0x58
[   21.948609]  __kasan_kmalloc+0xd4/0xd8
[   21.948648]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.948918]  kasan_atomics+0xb8/0x2e0
[   21.948969]  kunit_try_run_case+0x170/0x3f0
[   21.949011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.949057]  kthread+0x328/0x630
[   21.949093]  ret_from_fork+0x10/0x20
[   21.949132] 
[   21.949152] The buggy address belongs to the object at fff00000c63cef80
[   21.949152]  which belongs to the cache kmalloc-64 of size 64
[   21.949223] The buggy address is located 0 bytes to the right of
[   21.949223]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.949566] 
[   21.949655] The buggy address belongs to the physical page:
[   21.949698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.949768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.949817] page_type: f5(slab)
[   21.949941] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.950177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.950220] page dumped because: kasan: bad access detected
[   21.950254] 
[   21.950275] Memory state around the buggy address:
[   21.950310]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.950353]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.950397] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.950437]                                      ^
[   21.950472]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.950809]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.950853] ==================================================================
[   22.046387] ==================================================================
[   22.046438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   22.046510] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.046561] 
[   22.046634] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.046877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.046930] Hardware name: linux,dummy-virt (DT)
[   22.046964] Call trace:
[   22.047064]  show_stack+0x20/0x38 (C)
[   22.047170]  dump_stack_lvl+0x8c/0xd0
[   22.047436]  print_report+0x118/0x608
[   22.047717]  kasan_report+0xdc/0x128
[   22.047840]  kasan_check_range+0x100/0x1a8
[   22.047946]  __kasan_check_write+0x20/0x30
[   22.048016]  kasan_atomics_helper+0x126c/0x4858
[   22.048065]  kasan_atomics+0x198/0x2e0
[   22.048127]  kunit_try_run_case+0x170/0x3f0
[   22.048190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.048245]  kthread+0x328/0x630
[   22.048287]  ret_from_fork+0x10/0x20
[   22.048361] 
[   22.048389] Allocated by task 265:
[   22.048418]  kasan_save_stack+0x3c/0x68
[   22.048477]  kasan_save_track+0x20/0x40
[   22.048517]  kasan_save_alloc_info+0x40/0x58
[   22.048565]  __kasan_kmalloc+0xd4/0xd8
[   22.048612]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.048654]  kasan_atomics+0xb8/0x2e0
[   22.048691]  kunit_try_run_case+0x170/0x3f0
[   22.048741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.048786]  kthread+0x328/0x630
[   22.048822]  ret_from_fork+0x10/0x20
[   22.048860] 
[   22.048890] The buggy address belongs to the object at fff00000c63cef80
[   22.048890]  which belongs to the cache kmalloc-64 of size 64
[   22.048951] The buggy address is located 0 bytes to the right of
[   22.048951]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.049017] 
[   22.049048] The buggy address belongs to the physical page:
[   22.049090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.049168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.049217] page_type: f5(slab)
[   22.049257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.049310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.049353] page dumped because: kasan: bad access detected
[   22.049387] 
[   22.049658] Memory state around the buggy address:
[   22.049702]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.049763]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.050046] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.050191]                                      ^
[   22.050260]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.050528]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.050656] ==================================================================
[   22.126369] ==================================================================
[   22.126606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   22.126666] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.126855] 
[   22.126979] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.127067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.127115] Hardware name: linux,dummy-virt (DT)
[   22.127214] Call trace:
[   22.127272]  show_stack+0x20/0x38 (C)
[   22.127325]  dump_stack_lvl+0x8c/0xd0
[   22.127374]  print_report+0x118/0x608
[   22.127422]  kasan_report+0xdc/0x128
[   22.127584]  kasan_check_range+0x100/0x1a8
[   22.127677]  __kasan_check_write+0x20/0x30
[   22.127763]  kasan_atomics_helper+0x175c/0x4858
[   22.127822]  kasan_atomics+0x198/0x2e0
[   22.127928]  kunit_try_run_case+0x170/0x3f0
[   22.127999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.128089]  kthread+0x328/0x630
[   22.128223]  ret_from_fork+0x10/0x20
[   22.128329] 
[   22.128350] Allocated by task 265:
[   22.128379]  kasan_save_stack+0x3c/0x68
[   22.128560]  kasan_save_track+0x20/0x40
[   22.128600]  kasan_save_alloc_info+0x40/0x58
[   22.128643]  __kasan_kmalloc+0xd4/0xd8
[   22.128681]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.128814]  kasan_atomics+0xb8/0x2e0
[   22.128876]  kunit_try_run_case+0x170/0x3f0
[   22.128918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.128993]  kthread+0x328/0x630
[   22.129081]  ret_from_fork+0x10/0x20
[   22.129130] 
[   22.129151] The buggy address belongs to the object at fff00000c63cef80
[   22.129151]  which belongs to the cache kmalloc-64 of size 64
[   22.129342] The buggy address is located 0 bytes to the right of
[   22.129342]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.129467] 
[   22.129546] The buggy address belongs to the physical page:
[   22.129662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.129799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.129893] page_type: f5(slab)
[   22.130028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.130134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.130192] page dumped because: kasan: bad access detected
[   22.130227] 
[   22.130247] Memory state around the buggy address:
[   22.130290]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.130336]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.130387] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.130432]                                      ^
[   22.130467]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.130520]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.130559] ==================================================================
[   22.074556] ==================================================================
[   22.074609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   22.074886] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.075098] 
[   22.075138] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.075291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.075336] Hardware name: linux,dummy-virt (DT)
[   22.075370] Call trace:
[   22.075404]  show_stack+0x20/0x38 (C)
[   22.075456]  dump_stack_lvl+0x8c/0xd0
[   22.075967]  print_report+0x118/0x608
[   22.076031]  kasan_report+0xdc/0x128
[   22.076170]  kasan_check_range+0x100/0x1a8
[   22.076369]  __kasan_check_write+0x20/0x30
[   22.076686]  kasan_atomics_helper+0x1414/0x4858
[   22.076877]  kasan_atomics+0x198/0x2e0
[   22.076954]  kunit_try_run_case+0x170/0x3f0
[   22.077128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.077291]  kthread+0x328/0x630
[   22.077614]  ret_from_fork+0x10/0x20
[   22.077773] 
[   22.077981] Allocated by task 265:
[   22.078226]  kasan_save_stack+0x3c/0x68
[   22.078347]  kasan_save_track+0x20/0x40
[   22.078520]  kasan_save_alloc_info+0x40/0x58
[   22.078638]  __kasan_kmalloc+0xd4/0xd8
[   22.078706]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.079054]  kasan_atomics+0xb8/0x2e0
[   22.079130]  kunit_try_run_case+0x170/0x3f0
[   22.079475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.079621]  kthread+0x328/0x630
[   22.079689]  ret_from_fork+0x10/0x20
[   22.079779] 
[   22.079823] The buggy address belongs to the object at fff00000c63cef80
[   22.079823]  which belongs to the cache kmalloc-64 of size 64
[   22.080339] The buggy address is located 0 bytes to the right of
[   22.080339]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.080689] 
[   22.081063] The buggy address belongs to the physical page:
[   22.081266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.081534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.081681] page_type: f5(slab)
[   22.082035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.082218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.082267] page dumped because: kasan: bad access detected
[   22.082302] 
[   22.082372] Memory state around the buggy address:
[   22.082426]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.082488]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.082534] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.082575]                                      ^
[   22.082619]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.082672]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.082720] ==================================================================
[   21.925740] ==================================================================
[   21.925790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   21.926095] Read of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.926173] 
[   21.926205] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.926286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.926316] Hardware name: linux,dummy-virt (DT)
[   21.926350] Call trace:
[   21.926373]  show_stack+0x20/0x38 (C)
[   21.926444]  dump_stack_lvl+0x8c/0xd0
[   21.926493]  print_report+0x118/0x608
[   21.926543]  kasan_report+0xdc/0x128
[   21.926590]  __asan_report_load4_noabort+0x20/0x30
[   21.926643]  kasan_atomics_helper+0x3dd8/0x4858
[   21.926693]  kasan_atomics+0x198/0x2e0
[   21.926740]  kunit_try_run_case+0x170/0x3f0
[   21.926790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.926856]  kthread+0x328/0x630
[   21.926908]  ret_from_fork+0x10/0x20
[   21.926955] 
[   21.926981] Allocated by task 265:
[   21.927142]  kasan_save_stack+0x3c/0x68
[   21.927314]  kasan_save_track+0x20/0x40
[   21.927353]  kasan_save_alloc_info+0x40/0x58
[   21.927482]  __kasan_kmalloc+0xd4/0xd8
[   21.927523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.927565]  kasan_atomics+0xb8/0x2e0
[   21.927605]  kunit_try_run_case+0x170/0x3f0
[   21.927645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.927691]  kthread+0x328/0x630
[   21.927726]  ret_from_fork+0x10/0x20
[   21.928041] 
[   21.928184] The buggy address belongs to the object at fff00000c63cef80
[   21.928184]  which belongs to the cache kmalloc-64 of size 64
[   21.928569] The buggy address is located 0 bytes to the right of
[   21.928569]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.928642] 
[   21.928664] The buggy address belongs to the physical page:
[   21.928782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.928853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.928950] page_type: f5(slab)
[   21.928990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.929085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.929296] page dumped because: kasan: bad access detected
[   21.929465] 
[   21.929486] Memory state around the buggy address:
[   21.929519]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.929587]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.929692] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.929884]                                      ^
[   21.929920]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.929998]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.930040] ==================================================================
[   21.980945] ==================================================================
[   21.981000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.981052] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.981105] 
[   21.981774] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.982511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.982542] Hardware name: linux,dummy-virt (DT)
[   21.982575] Call trace:
[   21.982600]  show_stack+0x20/0x38 (C)
[   21.982653]  dump_stack_lvl+0x8c/0xd0
[   21.982701]  print_report+0x118/0x608
[   21.982748]  kasan_report+0xdc/0x128
[   21.982794]  kasan_check_range+0x100/0x1a8
[   21.982843]  __kasan_check_write+0x20/0x30
[   21.982897]  kasan_atomics_helper+0xf20/0x4858
[   21.982946]  kasan_atomics+0x198/0x2e0
[   21.982993]  kunit_try_run_case+0x170/0x3f0
[   21.983042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.983096]  kthread+0x328/0x630
[   21.983140]  ret_from_fork+0x10/0x20
[   21.983198] 
[   21.983218] Allocated by task 265:
[   21.983249]  kasan_save_stack+0x3c/0x68
[   21.983291]  kasan_save_track+0x20/0x40
[   21.983332]  kasan_save_alloc_info+0x40/0x58
[   21.983373]  __kasan_kmalloc+0xd4/0xd8
[   21.983413]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.983453]  kasan_atomics+0xb8/0x2e0
[   21.983490]  kunit_try_run_case+0x170/0x3f0
[   21.984707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.984816]  kthread+0x328/0x630
[   21.985058]  ret_from_fork+0x10/0x20
[   21.985326] 
[   21.985460] The buggy address belongs to the object at fff00000c63cef80
[   21.985460]  which belongs to the cache kmalloc-64 of size 64
[   21.985683] The buggy address is located 0 bytes to the right of
[   21.985683]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.985804] 
[   21.986200] The buggy address belongs to the physical page:
[   21.986244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.986300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.986352] page_type: f5(slab)
[   21.986626] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.986938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.987123] page dumped because: kasan: bad access detected
[   21.987169] 
[   21.987191] Memory state around the buggy address:
[   21.987376]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.987504]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.987968] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.988040]                                      ^
[   21.988082]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.988127]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.988593] ==================================================================
[   22.108407] ==================================================================
[   22.108457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   22.108506] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.108605] 
[   22.108637] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.108719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.108746] Hardware name: linux,dummy-virt (DT)
[   22.108914] Call trace:
[   22.108948]  show_stack+0x20/0x38 (C)
[   22.109001]  dump_stack_lvl+0x8c/0xd0
[   22.109080]  print_report+0x118/0x608
[   22.109175]  kasan_report+0xdc/0x128
[   22.109405]  kasan_check_range+0x100/0x1a8
[   22.109465]  __kasan_check_write+0x20/0x30
[   22.109514]  kasan_atomics_helper+0x1644/0x4858
[   22.109573]  kasan_atomics+0x198/0x2e0
[   22.109635]  kunit_try_run_case+0x170/0x3f0
[   22.109733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.109834]  kthread+0x328/0x630
[   22.109878]  ret_from_fork+0x10/0x20
[   22.109967] 
[   22.110016] Allocated by task 265:
[   22.110063]  kasan_save_stack+0x3c/0x68
[   22.110107]  kasan_save_track+0x20/0x40
[   22.110145]  kasan_save_alloc_info+0x40/0x58
[   22.110220]  __kasan_kmalloc+0xd4/0xd8
[   22.110259]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.110301]  kasan_atomics+0xb8/0x2e0
[   22.110338]  kunit_try_run_case+0x170/0x3f0
[   22.110379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.110540]  kthread+0x328/0x630
[   22.110578]  ret_from_fork+0x10/0x20
[   22.110615] 
[   22.110675] The buggy address belongs to the object at fff00000c63cef80
[   22.110675]  which belongs to the cache kmalloc-64 of size 64
[   22.110764] The buggy address is located 0 bytes to the right of
[   22.110764]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.110857] 
[   22.110881] The buggy address belongs to the physical page:
[   22.111020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.111231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.111346] page_type: f5(slab)
[   22.111409] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.111483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.111566] page dumped because: kasan: bad access detected
[   22.111638] 
[   22.111660] Memory state around the buggy address:
[   22.111693]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.111739]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.111817] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.111859]                                      ^
[   22.111982]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.112027]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.112123] ==================================================================
[   21.990565] ==================================================================
[   21.990773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.990827] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.990880] 
[   21.991358] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.991463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.991633] Hardware name: linux,dummy-virt (DT)
[   21.991699] Call trace:
[   21.991726]  show_stack+0x20/0x38 (C)
[   21.992353]  dump_stack_lvl+0x8c/0xd0
[   21.992585]  print_report+0x118/0x608
[   21.992702]  kasan_report+0xdc/0x128
[   21.992903]  kasan_check_range+0x100/0x1a8
[   21.992952]  __kasan_check_write+0x20/0x30
[   21.993319]  kasan_atomics_helper+0xf88/0x4858
[   21.993505]  kasan_atomics+0x198/0x2e0
[   21.993930]  kunit_try_run_case+0x170/0x3f0
[   21.994319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.994375]  kthread+0x328/0x630
[   21.994913]  ret_from_fork+0x10/0x20
[   21.995101] 
[   21.995275] Allocated by task 265:
[   21.995409]  kasan_save_stack+0x3c/0x68
[   21.995458]  kasan_save_track+0x20/0x40
[   21.995507]  kasan_save_alloc_info+0x40/0x58
[   21.996361]  __kasan_kmalloc+0xd4/0xd8
[   21.996484]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.996668]  kasan_atomics+0xb8/0x2e0
[   21.996717]  kunit_try_run_case+0x170/0x3f0
[   21.996907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.997261]  kthread+0x328/0x630
[   21.997370]  ret_from_fork+0x10/0x20
[   21.997411] 
[   21.997623] The buggy address belongs to the object at fff00000c63cef80
[   21.997623]  which belongs to the cache kmalloc-64 of size 64
[   21.998057] The buggy address is located 0 bytes to the right of
[   21.998057]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.998374] 
[   21.998398] The buggy address belongs to the physical page:
[   21.998687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.998750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.998802] page_type: f5(slab)
[   21.998843] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.998901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.998944] page dumped because: kasan: bad access detected
[   21.999867] 
[   21.999896] Memory state around the buggy address:
[   21.999933]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.999980]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.000025] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.000067]                                      ^
[   22.000101]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.000145]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.000363] ==================================================================
[   21.863439] ==================================================================
[   21.863832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   21.863930] Write of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.864018] 
[   21.864145] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.864306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.864367] Hardware name: linux,dummy-virt (DT)
[   21.864437] Call trace:
[   21.864518]  show_stack+0x20/0x38 (C)
[   21.864698]  dump_stack_lvl+0x8c/0xd0
[   21.864824]  print_report+0x118/0x608
[   21.864973]  kasan_report+0xdc/0x128
[   21.865042]  kasan_check_range+0x100/0x1a8
[   21.865126]  __kasan_check_write+0x20/0x30
[   21.865182]  kasan_atomics_helper+0x99c/0x4858
[   21.865232]  kasan_atomics+0x198/0x2e0
[   21.865549]  kunit_try_run_case+0x170/0x3f0
[   21.865626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.865756]  kthread+0x328/0x630
[   21.865899]  ret_from_fork+0x10/0x20
[   21.866152] 
[   21.866273] Allocated by task 265:
[   21.866304]  kasan_save_stack+0x3c/0x68
[   21.866365]  kasan_save_track+0x20/0x40
[   21.866404]  kasan_save_alloc_info+0x40/0x58
[   21.866446]  __kasan_kmalloc+0xd4/0xd8
[   21.866611]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.866679]  kasan_atomics+0xb8/0x2e0
[   21.866797]  kunit_try_run_case+0x170/0x3f0
[   21.866869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.866969]  kthread+0x328/0x630
[   21.867005]  ret_from_fork+0x10/0x20
[   21.867214] 
[   21.867475] The buggy address belongs to the object at fff00000c63cef80
[   21.867475]  which belongs to the cache kmalloc-64 of size 64
[   21.867742] The buggy address is located 0 bytes to the right of
[   21.867742]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.867885] 
[   21.867907] The buggy address belongs to the physical page:
[   21.867947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.868050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.868289] page_type: f5(slab)
[   21.868347] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.868398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.868635] page dumped because: kasan: bad access detected
[   21.868735] 
[   21.868846] Memory state around the buggy address:
[   21.868972]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.869084]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.869179] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.869332]                                      ^
[   21.869485]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.869602]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.869701] ==================================================================
[   21.886399] ==================================================================
[   21.886541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   21.886594] Write of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.886776] 
[   21.886857] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.886985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.887302]  kasan_report+0xdc/0x128
[   21.888667]  __kasan_kmalloc+0xd4/0xd8
[   21.888782]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.888895]  kasan_atomics+0xb8/0x2e0
[   21.889071]  kunit_try_run_case+0x170/0x3f0
[   21.889504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.889584]  kthread+0x328/0x630
[   21.889636]  ret_from_fork+0x10/0x20
[   21.889676] 
[   21.889699] The buggy address belongs to the object at fff00000c63cef80
[   21.889699]  which belongs to the cache kmalloc-64 of size 64
[   21.890208] page dumped because: kasan: bad access detected
[   21.890946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   21.893597]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.894978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.896411]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.898920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.900723]  kthread+0x328/0x630
[   21.901517]  kasan_atomics+0xb8/0x2e0
[   21.901981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.903267]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.906901]  kunit_try_run_case+0x170/0x3f0
[   21.907289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.907832]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.909492] Call trace:
[   21.911016]  kasan_save_stack+0x3c/0x68
[   21.911578]  kunit_try_run_case+0x170/0x3f0
[   21.913079] page dumped because: kasan: bad access detected
[   21.914324] ==================================================================
[   21.723985] ==================================================================
[   21.744021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   21.747270]  kthread+0x328/0x630
[   21.747378] 
[   21.748319]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.749484] 
[   21.751202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.752061]                                      ^
[   21.752306]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.753460] ==================================================================
[   22.057486] ==================================================================
[   22.057537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   22.057908] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.057977] 
[   22.058084] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.058184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.058229] Hardware name: linux,dummy-virt (DT)
[   22.058262] Call trace:
[   22.058322]  show_stack+0x20/0x38 (C)
[   22.058387]  dump_stack_lvl+0x8c/0xd0
[   22.058450]  print_report+0x118/0x608
[   22.058497]  kasan_report+0xdc/0x128
[   22.058544]  kasan_check_range+0x100/0x1a8
[   22.058830]  __kasan_check_write+0x20/0x30
[   22.058904]  kasan_atomics_helper+0x1384/0x4858
[   22.058963]  kasan_atomics+0x198/0x2e0
[   22.059020]  kunit_try_run_case+0x170/0x3f0
[   22.059073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.059127]  kthread+0x328/0x630
[   22.059180]  ret_from_fork+0x10/0x20
[   22.059229] 
[   22.059249] Allocated by task 265:
[   22.059277]  kasan_save_stack+0x3c/0x68
[   22.059329]  kasan_save_track+0x20/0x40
[   22.059427]  kasan_save_alloc_info+0x40/0x58
[   22.059478]  __kasan_kmalloc+0xd4/0xd8
[   22.060145]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.060699]  kasan_atomics+0xb8/0x2e0
[   22.060782]  kunit_try_run_case+0x170/0x3f0
[   22.060855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.060931]  kthread+0x328/0x630
[   22.061248]  ret_from_fork+0x10/0x20
[   22.061759] 
[   22.062127] The buggy address belongs to the object at fff00000c63cef80
[   22.062127]  which belongs to the cache kmalloc-64 of size 64
[   22.062233] The buggy address is located 0 bytes to the right of
[   22.062233]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.062312] 
[   22.062334] The buggy address belongs to the physical page:
[   22.062371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.062650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.063066] page_type: f5(slab)
[   22.063192] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.063788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.063887] page dumped because: kasan: bad access detected
[   22.063925] 
[   22.063946] Memory state around the buggy address:
[   22.064318]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.064514]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.064606] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.064809]                                      ^
[   22.065035]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.065222]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.065325] ==================================================================
[   21.870904] ==================================================================
[   21.871066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   21.871298] Write of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.871363] 
[   21.871555] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.871754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.871853] Hardware name: linux,dummy-virt (DT)
[   21.872854]  __kasan_check_write+0x20/0x30
[   21.873886] 
[   21.874021] Allocated by task 265:
[   21.874188]  kasan_save_stack+0x3c/0x68
[   21.874295]  kasan_save_track+0x20/0x40
[   21.874473]  kasan_save_alloc_info+0x40/0x58
[   21.874617]  __kasan_kmalloc+0xd4/0xd8
[   21.874765]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.874838]  kasan_atomics+0xb8/0x2e0
[   21.874902]  kunit_try_run_case+0x170/0x3f0
[   21.875227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.875365]  kthread+0x328/0x630
[   21.875591]  ret_from_fork+0x10/0x20
[   21.875749] 
[   21.875868] The buggy address belongs to the object at fff00000c63cef80
[   21.875868]  which belongs to the cache kmalloc-64 of size 64
[   21.876051] The buggy address is located 0 bytes to the right of
[   21.876051]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.876222] 
[   21.876254] The buggy address belongs to the physical page:
[   21.876289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.876345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.876630] page_type: f5(slab)
[   21.876830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.876979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.877057] page dumped because: kasan: bad access detected
[   21.877100] 
[   21.877122] Memory state around the buggy address:
[   21.877303]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.877489]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.877591] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.877714]                                      ^
[   21.877827]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.877937]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.878079] ==================================================================
[   22.093056] ==================================================================
[   22.093146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   22.093218] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.093274] 
[   22.093334] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.093418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.093476] Hardware name: linux,dummy-virt (DT)
[   22.093510] Call trace:
[   22.093591]  show_stack+0x20/0x38 (C)
[   22.093643]  dump_stack_lvl+0x8c/0xd0
[   22.093691]  print_report+0x118/0x608
[   22.093738]  kasan_report+0xdc/0x128
[   22.093783]  kasan_check_range+0x100/0x1a8
[   22.093839]  __kasan_check_write+0x20/0x30
[   22.093904]  kasan_atomics_helper+0x154c/0x4858
[   22.093959]  kasan_atomics+0x198/0x2e0
[   22.094006]  kunit_try_run_case+0x170/0x3f0
[   22.094065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.094339]  kthread+0x328/0x630
[   22.094453]  ret_from_fork+0x10/0x20
[   22.094525] 
[   22.094561] Allocated by task 265:
[   22.094794]  kasan_save_stack+0x3c/0x68
[   22.094849]  kasan_save_track+0x20/0x40
[   22.094976]  kasan_save_alloc_info+0x40/0x58
[   22.095020]  __kasan_kmalloc+0xd4/0xd8
[   22.095060]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.095107]  kasan_atomics+0xb8/0x2e0
[   22.095153]  kunit_try_run_case+0x170/0x3f0
[   22.095221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.095286]  kthread+0x328/0x630
[   22.095322]  ret_from_fork+0x10/0x20
[   22.095361] 
[   22.095430] The buggy address belongs to the object at fff00000c63cef80
[   22.095430]  which belongs to the cache kmalloc-64 of size 64
[   22.095543] The buggy address is located 0 bytes to the right of
[   22.095543]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.095628] 
[   22.095661] The buggy address belongs to the physical page:
[   22.095696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.095753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.095803] page_type: f5(slab)
[   22.096077] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.096234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.096346] page dumped because: kasan: bad access detected
[   22.096702] 
[   22.096746] Memory state around the buggy address:
[   22.096822]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.096934]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.096981] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.097021]                                      ^
[   22.097346]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.097467]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.097558] ==================================================================
[   21.931175] ==================================================================
[   21.931243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   21.931443] Write of size 4 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   21.931690] 
[   21.931876] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   21.932244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.932276] Hardware name: linux,dummy-virt (DT)
[   21.932307] Call trace:
[   21.932333]  show_stack+0x20/0x38 (C)
[   21.932545]  dump_stack_lvl+0x8c/0xd0
[   21.932596]  print_report+0x118/0x608
[   21.932740]  kasan_report+0xdc/0x128
[   21.933001]  kasan_check_range+0x100/0x1a8
[   21.933052]  __kasan_check_write+0x20/0x30
[   21.933098]  kasan_atomics_helper+0xd3c/0x4858
[   21.933148]  kasan_atomics+0x198/0x2e0
[   21.933404]  kunit_try_run_case+0x170/0x3f0
[   21.933579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.933636]  kthread+0x328/0x630
[   21.933677]  ret_from_fork+0x10/0x20
[   21.933726] 
[   21.933748] Allocated by task 265:
[   21.933803]  kasan_save_stack+0x3c/0x68
[   21.933989]  kasan_save_track+0x20/0x40
[   21.934364]  kasan_save_alloc_info+0x40/0x58
[   21.934415]  __kasan_kmalloc+0xd4/0xd8
[   21.934456]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.934815]  kasan_atomics+0xb8/0x2e0
[   21.935007]  kunit_try_run_case+0x170/0x3f0
[   21.935057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.935382]  kthread+0x328/0x630
[   21.935424]  ret_from_fork+0x10/0x20
[   21.935476] 
[   21.935499] The buggy address belongs to the object at fff00000c63cef80
[   21.935499]  which belongs to the cache kmalloc-64 of size 64
[   21.935561] The buggy address is located 0 bytes to the right of
[   21.935561]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   21.935750] 
[   21.935934] The buggy address belongs to the physical page:
[   21.936112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   21.936231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.936421] page_type: f5(slab)
[   21.936462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.936514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.936556] page dumped because: kasan: bad access detected
[   21.936633] 
[   21.936654] Memory state around the buggy address:
[   21.936688]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.936733]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.936778] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.936820]                                      ^
[   21.936888]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.936980]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.937020] ==================================================================
[   22.023078] ==================================================================
[   22.023142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   22.023375] Write of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.023685] 
[   22.024090] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.024442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.024587] Hardware name: linux,dummy-virt (DT)
[   22.025016] Call trace:
[   22.025112]  show_stack+0x20/0x38 (C)
[   22.025290]  dump_stack_lvl+0x8c/0xd0
[   22.025575]  print_report+0x118/0x608
[   22.025757]  kasan_report+0xdc/0x128
[   22.026305]  kasan_check_range+0x100/0x1a8
[   22.026485]  __kasan_check_write+0x20/0x30
[   22.026555]  kasan_atomics_helper+0x1128/0x4858
[   22.026743]  kasan_atomics+0x198/0x2e0
[   22.026851]  kunit_try_run_case+0x170/0x3f0
[   22.027036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.027294]  kthread+0x328/0x630
[   22.027593]  ret_from_fork+0x10/0x20
[   22.028111] 
[   22.028235] Allocated by task 265:
[   22.028274]  kasan_save_stack+0x3c/0x68
[   22.028331]  kasan_save_track+0x20/0x40
[   22.028372]  kasan_save_alloc_info+0x40/0x58
[   22.028426]  __kasan_kmalloc+0xd4/0xd8
[   22.028466]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.028508]  kasan_atomics+0xb8/0x2e0
[   22.028546]  kunit_try_run_case+0x170/0x3f0
[   22.028587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.028644]  kthread+0x328/0x630
[   22.028693]  ret_from_fork+0x10/0x20
[   22.028731] 
[   22.028760] The buggy address belongs to the object at fff00000c63cef80
[   22.028760]  which belongs to the cache kmalloc-64 of size 64
[   22.028822] The buggy address is located 0 bytes to the right of
[   22.028822]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.028902] 
[   22.028937] The buggy address belongs to the physical page:
[   22.028973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.029031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.029081] page_type: f5(slab)
[   22.029120] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.029543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.029596] page dumped because: kasan: bad access detected
[   22.029632] 
[   22.029801] Memory state around the buggy address:
[   22.029840]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.029889]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.029935] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.029976]                                      ^
[   22.030029]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.030101]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.030167] ==================================================================
[   22.112918] ==================================================================
[   22.113057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   22.113110] Read of size 8 at addr fff00000c63cefb0 by task kunit_try_catch/265
[   22.113256] 
[   22.113290] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   22.113419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.113465] Hardware name: linux,dummy-virt (DT)
[   22.113498] Call trace:
[   22.113538]  show_stack+0x20/0x38 (C)
[   22.113589]  dump_stack_lvl+0x8c/0xd0
[   22.113779]  print_report+0x118/0x608
[   22.113960]  kasan_report+0xdc/0x128
[   22.114045]  __asan_report_load8_noabort+0x20/0x30
[   22.114119]  kasan_atomics_helper+0x3df4/0x4858
[   22.114195]  kasan_atomics+0x198/0x2e0
[   22.114260]  kunit_try_run_case+0x170/0x3f0
[   22.114312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.114380]  kthread+0x328/0x630
[   22.114425]  ret_from_fork+0x10/0x20
[   22.114490] 
[   22.114511] Allocated by task 265:
[   22.114541]  kasan_save_stack+0x3c/0x68
[   22.114582]  kasan_save_track+0x20/0x40
[   22.114734]  kasan_save_alloc_info+0x40/0x58
[   22.114782]  __kasan_kmalloc+0xd4/0xd8
[   22.114822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.114873]  kasan_atomics+0xb8/0x2e0
[   22.114919]  kunit_try_run_case+0x170/0x3f0
[   22.114994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.115060]  kthread+0x328/0x630
[   22.115094]  ret_from_fork+0x10/0x20
[   22.115206] 
[   22.115234] The buggy address belongs to the object at fff00000c63cef80
[   22.115234]  which belongs to the cache kmalloc-64 of size 64
[   22.115296] The buggy address is located 0 bytes to the right of
[   22.115296]  allocated 48-byte region [fff00000c63cef80, fff00000c63cefb0)
[   22.115536] 
[   22.115624] The buggy address belongs to the physical page:
[   22.115699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ce
[   22.115758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.115835] page_type: f5(slab)
[   22.115900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.115954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.116106] page dumped because: kasan: bad access detected
[   22.116246] 
[   22.116309] Memory state around the buggy address:
[   22.116360]  fff00000c63cee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.116408]  fff00000c63cef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.116470] >fff00000c63cef80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.116512]                                      ^
[   22.116548]  fff00000c63cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.116591]  fff00000c63cf080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.116632] ==================================================================

[   14.907766] ==================================================================
[   14.909572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.910546] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   14.911460] 
[   14.911763] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.911813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.911824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.911845] Call Trace:
[   14.911857]  <TASK>
[   14.911872]  dump_stack_lvl+0x73/0xb0
[   14.911904]  print_report+0xd1/0x650
[   14.911927]  ? __virt_addr_valid+0x1db/0x2d0
[   14.911952]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.911974]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.911997]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.912020]  kasan_report+0x141/0x180
[   14.912041]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.912068]  __asan_report_load4_noabort+0x18/0x20
[   14.912093]  kasan_atomics_helper+0x4bbc/0x5450
[   14.912115]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.912139]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.912165]  ? kasan_atomics+0x152/0x310
[   14.912191]  kasan_atomics+0x1dc/0x310
[   14.912214]  ? __pfx_kasan_atomics+0x10/0x10
[   14.912239]  ? __pfx_read_tsc+0x10/0x10
[   14.912259]  ? ktime_get_ts64+0x86/0x230
[   14.912285]  kunit_try_run_case+0x1a5/0x480
[   14.912309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.912332]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.912356]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.912380]  ? __kthread_parkme+0x82/0x180
[   14.912401]  ? preempt_count_sub+0x50/0x80
[   14.912426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.912451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.912476]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.912501]  kthread+0x337/0x6f0
[   14.912520]  ? trace_preempt_on+0x20/0xc0
[   14.912544]  ? __pfx_kthread+0x10/0x10
[   14.912564]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.912586]  ? calculate_sigpending+0x7b/0xa0
[   14.912624]  ? __pfx_kthread+0x10/0x10
[   14.912675]  ret_from_fork+0x116/0x1d0
[   14.912693]  ? __pfx_kthread+0x10/0x10
[   14.912714]  ret_from_fork_asm+0x1a/0x30
[   14.912758]  </TASK>
[   14.912768] 
[   14.924189] Allocated by task 283:
[   14.924350]  kasan_save_stack+0x45/0x70
[   14.924804]  kasan_save_track+0x18/0x40
[   14.925034]  kasan_save_alloc_info+0x3b/0x50
[   14.925404]  __kasan_kmalloc+0xb7/0xc0
[   14.925844]  __kmalloc_cache_noprof+0x189/0x420
[   14.926169]  kasan_atomics+0x95/0x310
[   14.926530]  kunit_try_run_case+0x1a5/0x480
[   14.926757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.927076]  kthread+0x337/0x6f0
[   14.927274]  ret_from_fork+0x116/0x1d0
[   14.927457]  ret_from_fork_asm+0x1a/0x30
[   14.927942] 
[   14.928096] The buggy address belongs to the object at ffff888102ba6080
[   14.928096]  which belongs to the cache kmalloc-64 of size 64
[   14.928668] The buggy address is located 0 bytes to the right of
[   14.928668]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   14.929650] 
[   14.929870] The buggy address belongs to the physical page:
[   14.930241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   14.930671] flags: 0x200000000000000(node=0|zone=2)
[   14.930901] page_type: f5(slab)
[   14.931098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.931476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.931745] page dumped because: kasan: bad access detected
[   14.932089] 
[   14.932195] Memory state around the buggy address:
[   14.932375]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.932734]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.933053] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.933362]                                      ^
[   14.933527]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.934033]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.934247] ==================================================================
[   15.143490] ==================================================================
[   15.143850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.144345] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.144850] 
[   15.144987] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.145029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.145043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.145064] Call Trace:
[   15.145080]  <TASK>
[   15.145108]  dump_stack_lvl+0x73/0xb0
[   15.145139]  print_report+0xd1/0x650
[   15.145161]  ? __virt_addr_valid+0x1db/0x2d0
[   15.145198]  ? kasan_atomics_helper+0x72f/0x5450
[   15.145221]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.145244]  ? kasan_atomics_helper+0x72f/0x5450
[   15.145267]  kasan_report+0x141/0x180
[   15.145290]  ? kasan_atomics_helper+0x72f/0x5450
[   15.145327]  kasan_check_range+0x10c/0x1c0
[   15.145352]  __kasan_check_write+0x18/0x20
[   15.145374]  kasan_atomics_helper+0x72f/0x5450
[   15.145407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.145432]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.145458]  ? kasan_atomics+0x152/0x310
[   15.145485]  kasan_atomics+0x1dc/0x310
[   15.145517]  ? __pfx_kasan_atomics+0x10/0x10
[   15.145550]  ? __pfx_read_tsc+0x10/0x10
[   15.145572]  ? ktime_get_ts64+0x86/0x230
[   15.145597]  kunit_try_run_case+0x1a5/0x480
[   15.145641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.145665]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.145690]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.145720]  ? __kthread_parkme+0x82/0x180
[   15.145741]  ? preempt_count_sub+0x50/0x80
[   15.145776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.145801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.145838]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.145863]  kthread+0x337/0x6f0
[   15.145884]  ? trace_preempt_on+0x20/0xc0
[   15.145909]  ? __pfx_kthread+0x10/0x10
[   15.145978]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.146015]  ? calculate_sigpending+0x7b/0xa0
[   15.146042]  ? __pfx_kthread+0x10/0x10
[   15.146065]  ret_from_fork+0x116/0x1d0
[   15.146085]  ? __pfx_kthread+0x10/0x10
[   15.146107]  ret_from_fork_asm+0x1a/0x30
[   15.146149]  </TASK>
[   15.146160] 
[   15.160798] Allocated by task 283:
[   15.161221]  kasan_save_stack+0x45/0x70
[   15.161578]  kasan_save_track+0x18/0x40
[   15.161789]  kasan_save_alloc_info+0x3b/0x50
[   15.162233]  __kasan_kmalloc+0xb7/0xc0
[   15.162591]  __kmalloc_cache_noprof+0x189/0x420
[   15.162816]  kasan_atomics+0x95/0x310
[   15.163343]  kunit_try_run_case+0x1a5/0x480
[   15.163722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.164290]  kthread+0x337/0x6f0
[   15.164457]  ret_from_fork+0x116/0x1d0
[   15.164874]  ret_from_fork_asm+0x1a/0x30
[   15.165332] 
[   15.165572] The buggy address belongs to the object at ffff888102ba6080
[   15.165572]  which belongs to the cache kmalloc-64 of size 64
[   15.166662] The buggy address is located 0 bytes to the right of
[   15.166662]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.167462] 
[   15.167628] The buggy address belongs to the physical page:
[   15.167868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.168661] flags: 0x200000000000000(node=0|zone=2)
[   15.169448] page_type: f5(slab)
[   15.169663] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.170250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.170723] page dumped because: kasan: bad access detected
[   15.171015] 
[   15.171110] Memory state around the buggy address:
[   15.171322]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.171961]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.172615] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.173110]                                      ^
[   15.173333]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.173864]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.174454] ==================================================================
[   16.227029] ==================================================================
[   16.227324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.227707] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.227929] 
[   16.228013] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.228055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.228068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.228089] Call Trace:
[   16.228103]  <TASK>
[   16.228119]  dump_stack_lvl+0x73/0xb0
[   16.228147]  print_report+0xd1/0x650
[   16.228170]  ? __virt_addr_valid+0x1db/0x2d0
[   16.228193]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.228216]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.228241]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.228264]  kasan_report+0x141/0x180
[   16.228287]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.228315]  kasan_check_range+0x10c/0x1c0
[   16.228340]  __kasan_check_write+0x18/0x20
[   16.228360]  kasan_atomics_helper+0x20c8/0x5450
[   16.228384]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.228408]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.228435]  ? kasan_atomics+0x152/0x310
[   16.228462]  kasan_atomics+0x1dc/0x310
[   16.228485]  ? __pfx_kasan_atomics+0x10/0x10
[   16.228511]  ? __pfx_read_tsc+0x10/0x10
[   16.228532]  ? ktime_get_ts64+0x86/0x230
[   16.228557]  kunit_try_run_case+0x1a5/0x480
[   16.228583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.228618]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.228645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.228669]  ? __kthread_parkme+0x82/0x180
[   16.228691]  ? preempt_count_sub+0x50/0x80
[   16.228716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.228741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.228767]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.228794]  kthread+0x337/0x6f0
[   16.228814]  ? trace_preempt_on+0x20/0xc0
[   16.228838]  ? __pfx_kthread+0x10/0x10
[   16.228860]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.228883]  ? calculate_sigpending+0x7b/0xa0
[   16.228909]  ? __pfx_kthread+0x10/0x10
[   16.228931]  ret_from_fork+0x116/0x1d0
[   16.228958]  ? __pfx_kthread+0x10/0x10
[   16.228980]  ret_from_fork_asm+0x1a/0x30
[   16.229013]  </TASK>
[   16.229025] 
[   16.236747] Allocated by task 283:
[   16.236943]  kasan_save_stack+0x45/0x70
[   16.237162]  kasan_save_track+0x18/0x40
[   16.237362]  kasan_save_alloc_info+0x3b/0x50
[   16.237577]  __kasan_kmalloc+0xb7/0xc0
[   16.237785]  __kmalloc_cache_noprof+0x189/0x420
[   16.237980]  kasan_atomics+0x95/0x310
[   16.238112]  kunit_try_run_case+0x1a5/0x480
[   16.238258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.238521]  kthread+0x337/0x6f0
[   16.238697]  ret_from_fork+0x116/0x1d0
[   16.238862]  ret_from_fork_asm+0x1a/0x30
[   16.239000] 
[   16.239069] The buggy address belongs to the object at ffff888102ba6080
[   16.239069]  which belongs to the cache kmalloc-64 of size 64
[   16.239417] The buggy address is located 0 bytes to the right of
[   16.239417]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.240121] 
[   16.240220] The buggy address belongs to the physical page:
[   16.240476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.240849] flags: 0x200000000000000(node=0|zone=2)
[   16.241091] page_type: f5(slab)
[   16.241216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.241443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.241903] page dumped because: kasan: bad access detected
[   16.242156] 
[   16.242252] Memory state around the buggy address:
[   16.242440]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.242778]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.243053] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.243285]                                      ^
[   16.243443]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.243674]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.244010] ==================================================================
[   15.060770] ==================================================================
[   15.061633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.062106] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.062396] 
[   15.062506] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.062551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.062565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.062588] Call Trace:
[   15.062619]  <TASK>
[   15.062639]  dump_stack_lvl+0x73/0xb0
[   15.062672]  print_report+0xd1/0x650
[   15.062695]  ? __virt_addr_valid+0x1db/0x2d0
[   15.062720]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.062742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.062767]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.062790]  kasan_report+0x141/0x180
[   15.062813]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.062840]  __asan_report_store4_noabort+0x1b/0x30
[   15.062867]  kasan_atomics_helper+0x4b3a/0x5450
[   15.062891]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.062914]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.062942]  ? kasan_atomics+0x152/0x310
[   15.062970]  kasan_atomics+0x1dc/0x310
[   15.062993]  ? __pfx_kasan_atomics+0x10/0x10
[   15.063019]  ? __pfx_read_tsc+0x10/0x10
[   15.063041]  ? ktime_get_ts64+0x86/0x230
[   15.063067]  kunit_try_run_case+0x1a5/0x480
[   15.063093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.063117]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.063143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.063170]  ? __kthread_parkme+0x82/0x180
[   15.063193]  ? preempt_count_sub+0x50/0x80
[   15.063219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.063245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.063271]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.063297]  kthread+0x337/0x6f0
[   15.063317]  ? trace_preempt_on+0x20/0xc0
[   15.063343]  ? __pfx_kthread+0x10/0x10
[   15.063365]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.063387]  ? calculate_sigpending+0x7b/0xa0
[   15.063414]  ? __pfx_kthread+0x10/0x10
[   15.063437]  ret_from_fork+0x116/0x1d0
[   15.063457]  ? __pfx_kthread+0x10/0x10
[   15.063478]  ret_from_fork_asm+0x1a/0x30
[   15.063512]  </TASK>
[   15.063524] 
[   15.072198] Allocated by task 283:
[   15.072657]  kasan_save_stack+0x45/0x70
[   15.072868]  kasan_save_track+0x18/0x40
[   15.073166]  kasan_save_alloc_info+0x3b/0x50
[   15.073349]  __kasan_kmalloc+0xb7/0xc0
[   15.073539]  __kmalloc_cache_noprof+0x189/0x420
[   15.073780]  kasan_atomics+0x95/0x310
[   15.073917]  kunit_try_run_case+0x1a5/0x480
[   15.074336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.074642]  kthread+0x337/0x6f0
[   15.074791]  ret_from_fork+0x116/0x1d0
[   15.075076]  ret_from_fork_asm+0x1a/0x30
[   15.075294] 
[   15.075382] The buggy address belongs to the object at ffff888102ba6080
[   15.075382]  which belongs to the cache kmalloc-64 of size 64
[   15.075859] The buggy address is located 0 bytes to the right of
[   15.075859]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.076345] 
[   15.076447] The buggy address belongs to the physical page:
[   15.076709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.077359] flags: 0x200000000000000(node=0|zone=2)
[   15.077660] page_type: f5(slab)
[   15.077853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.078088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.078705] page dumped because: kasan: bad access detected
[   15.078996] 
[   15.079107] Memory state around the buggy address:
[   15.079442]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.079743]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.080259] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.080583]                                      ^
[   15.080821]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.081166]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.081518] ==================================================================
[   16.329404] ==================================================================
[   16.329803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.330338] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.330681] 
[   16.330808] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.330848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.330861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.330882] Call Trace:
[   16.330899]  <TASK>
[   16.330914]  dump_stack_lvl+0x73/0xb0
[   16.330942]  print_report+0xd1/0x650
[   16.330965]  ? __virt_addr_valid+0x1db/0x2d0
[   16.330988]  ? kasan_atomics_helper+0x224c/0x5450
[   16.331011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.331035]  ? kasan_atomics_helper+0x224c/0x5450
[   16.331057]  kasan_report+0x141/0x180
[   16.331080]  ? kasan_atomics_helper+0x224c/0x5450
[   16.331109]  kasan_check_range+0x10c/0x1c0
[   16.331134]  __kasan_check_write+0x18/0x20
[   16.331155]  kasan_atomics_helper+0x224c/0x5450
[   16.331179]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.331203]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.331229]  ? kasan_atomics+0x152/0x310
[   16.331257]  kasan_atomics+0x1dc/0x310
[   16.331280]  ? __pfx_kasan_atomics+0x10/0x10
[   16.331306]  ? __pfx_read_tsc+0x10/0x10
[   16.331327]  ? ktime_get_ts64+0x86/0x230
[   16.331352]  kunit_try_run_case+0x1a5/0x480
[   16.331389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.331413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.331439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.331476]  ? __kthread_parkme+0x82/0x180
[   16.331498]  ? preempt_count_sub+0x50/0x80
[   16.331523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.331559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.331584]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.331627]  kthread+0x337/0x6f0
[   16.331646]  ? trace_preempt_on+0x20/0xc0
[   16.331692]  ? __pfx_kthread+0x10/0x10
[   16.331715]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.331737]  ? calculate_sigpending+0x7b/0xa0
[   16.331763]  ? __pfx_kthread+0x10/0x10
[   16.331785]  ret_from_fork+0x116/0x1d0
[   16.331805]  ? __pfx_kthread+0x10/0x10
[   16.331826]  ret_from_fork_asm+0x1a/0x30
[   16.331860]  </TASK>
[   16.331870] 
[   16.339637] Allocated by task 283:
[   16.339763]  kasan_save_stack+0x45/0x70
[   16.339906]  kasan_save_track+0x18/0x40
[   16.340098]  kasan_save_alloc_info+0x3b/0x50
[   16.340322]  __kasan_kmalloc+0xb7/0xc0
[   16.340507]  __kmalloc_cache_noprof+0x189/0x420
[   16.340710]  kasan_atomics+0x95/0x310
[   16.340851]  kunit_try_run_case+0x1a5/0x480
[   16.341301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.341576]  kthread+0x337/0x6f0
[   16.341819]  ret_from_fork+0x116/0x1d0
[   16.342012]  ret_from_fork_asm+0x1a/0x30
[   16.342159] 
[   16.342229] The buggy address belongs to the object at ffff888102ba6080
[   16.342229]  which belongs to the cache kmalloc-64 of size 64
[   16.342678] The buggy address is located 0 bytes to the right of
[   16.342678]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.343172] 
[   16.343244] The buggy address belongs to the physical page:
[   16.343416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.343767] flags: 0x200000000000000(node=0|zone=2)
[   16.344004] page_type: f5(slab)
[   16.344198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.344628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.344982] page dumped because: kasan: bad access detected
[   16.345239] 
[   16.345324] Memory state around the buggy address:
[   16.345479]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.345828]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.346162] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.346421]                                      ^
[   16.346810]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.347154]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.347403] ==================================================================
[   16.173714] ==================================================================
[   16.174376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.174703] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.175011] 
[   16.175121] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.175163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.175175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.175197] Call Trace:
[   16.175214]  <TASK>
[   16.175231]  dump_stack_lvl+0x73/0xb0
[   16.175259]  print_report+0xd1/0x650
[   16.175282]  ? __virt_addr_valid+0x1db/0x2d0
[   16.175305]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.175327]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.175351]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.175374]  kasan_report+0x141/0x180
[   16.175397]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.175425]  __asan_report_load8_noabort+0x18/0x20
[   16.175451]  kasan_atomics_helper+0x4f71/0x5450
[   16.175475]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.175500]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.175541]  ? kasan_atomics+0x152/0x310
[   16.175568]  kasan_atomics+0x1dc/0x310
[   16.175592]  ? __pfx_kasan_atomics+0x10/0x10
[   16.175627]  ? __pfx_read_tsc+0x10/0x10
[   16.175649]  ? ktime_get_ts64+0x86/0x230
[   16.175674]  kunit_try_run_case+0x1a5/0x480
[   16.175699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.175724]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.175749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.175775]  ? __kthread_parkme+0x82/0x180
[   16.175796]  ? preempt_count_sub+0x50/0x80
[   16.175822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.175847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.175873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.175899]  kthread+0x337/0x6f0
[   16.175919]  ? trace_preempt_on+0x20/0xc0
[   16.175944]  ? __pfx_kthread+0x10/0x10
[   16.175966]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.175989]  ? calculate_sigpending+0x7b/0xa0
[   16.176015]  ? __pfx_kthread+0x10/0x10
[   16.176037]  ret_from_fork+0x116/0x1d0
[   16.176056]  ? __pfx_kthread+0x10/0x10
[   16.176077]  ret_from_fork_asm+0x1a/0x30
[   16.176109]  </TASK>
[   16.176119] 
[   16.183459] Allocated by task 283:
[   16.183693]  kasan_save_stack+0x45/0x70
[   16.183853]  kasan_save_track+0x18/0x40
[   16.184043]  kasan_save_alloc_info+0x3b/0x50
[   16.184238]  __kasan_kmalloc+0xb7/0xc0
[   16.184418]  __kmalloc_cache_noprof+0x189/0x420
[   16.184630]  kasan_atomics+0x95/0x310
[   16.184815]  kunit_try_run_case+0x1a5/0x480
[   16.184999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.185174]  kthread+0x337/0x6f0
[   16.185293]  ret_from_fork+0x116/0x1d0
[   16.185423]  ret_from_fork_asm+0x1a/0x30
[   16.185562] 
[   16.185641] The buggy address belongs to the object at ffff888102ba6080
[   16.185641]  which belongs to the cache kmalloc-64 of size 64
[   16.185990] The buggy address is located 0 bytes to the right of
[   16.185990]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.186449] 
[   16.186644] The buggy address belongs to the physical page:
[   16.186890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.187229] flags: 0x200000000000000(node=0|zone=2)
[   16.187450] page_type: f5(slab)
[   16.187675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.188009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.188338] page dumped because: kasan: bad access detected
[   16.188687] 
[   16.188784] Memory state around the buggy address:
[   16.188947]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.189161]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.189374] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.189806]                                      ^
[   16.190032]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.190357]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.190922] ==================================================================
[   15.728519] ==================================================================
[   15.729209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.729465] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.729737] 
[   15.729957] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.730005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.730030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.730053] Call Trace:
[   15.730074]  <TASK>
[   15.730106]  dump_stack_lvl+0x73/0xb0
[   15.730138]  print_report+0xd1/0x650
[   15.730173]  ? __virt_addr_valid+0x1db/0x2d0
[   15.730199]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.730222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.730247]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.730270]  kasan_report+0x141/0x180
[   15.730294]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.730322]  __asan_report_load8_noabort+0x18/0x20
[   15.730349]  kasan_atomics_helper+0x4eae/0x5450
[   15.730377]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.730401]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.730430]  ? kasan_atomics+0x152/0x310
[   15.730468]  kasan_atomics+0x1dc/0x310
[   15.730492]  ? __pfx_kasan_atomics+0x10/0x10
[   15.730537]  ? __pfx_read_tsc+0x10/0x10
[   15.730561]  ? ktime_get_ts64+0x86/0x230
[   15.730587]  kunit_try_run_case+0x1a5/0x480
[   15.730626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.730650]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.730676]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.730701]  ? __kthread_parkme+0x82/0x180
[   15.730724]  ? preempt_count_sub+0x50/0x80
[   15.730749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.730775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.730801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.730827]  kthread+0x337/0x6f0
[   15.730848]  ? trace_preempt_on+0x20/0xc0
[   15.730873]  ? __pfx_kthread+0x10/0x10
[   15.730895]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.730918]  ? calculate_sigpending+0x7b/0xa0
[   15.730943]  ? __pfx_kthread+0x10/0x10
[   15.730966]  ret_from_fork+0x116/0x1d0
[   15.730986]  ? __pfx_kthread+0x10/0x10
[   15.731007]  ret_from_fork_asm+0x1a/0x30
[   15.731041]  </TASK>
[   15.731052] 
[   15.740881] Allocated by task 283:
[   15.741015]  kasan_save_stack+0x45/0x70
[   15.741160]  kasan_save_track+0x18/0x40
[   15.741295]  kasan_save_alloc_info+0x3b/0x50
[   15.741444]  __kasan_kmalloc+0xb7/0xc0
[   15.741628]  __kmalloc_cache_noprof+0x189/0x420
[   15.741971]  kasan_atomics+0x95/0x310
[   15.742308]  kunit_try_run_case+0x1a5/0x480
[   15.742834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.743342]  kthread+0x337/0x6f0
[   15.743730]  ret_from_fork+0x116/0x1d0
[   15.744060]  ret_from_fork_asm+0x1a/0x30
[   15.744406] 
[   15.744573] The buggy address belongs to the object at ffff888102ba6080
[   15.744573]  which belongs to the cache kmalloc-64 of size 64
[   15.745629] The buggy address is located 0 bytes to the right of
[   15.745629]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.746744] 
[   15.746911] The buggy address belongs to the physical page:
[   15.747393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.748158] flags: 0x200000000000000(node=0|zone=2)
[   15.748501] page_type: f5(slab)
[   15.748834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.749120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.749345] page dumped because: kasan: bad access detected
[   15.749535] 
[   15.749697] Memory state around the buggy address:
[   15.750105]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.750811]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.751408] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.752019]                                      ^
[   15.752436]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.753147]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.753650] ==================================================================
[   16.097093] ==================================================================
[   16.097542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.097900] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.098465] 
[   16.098680] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.098821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.098835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.098856] Call Trace:
[   16.098873]  <TASK>
[   16.098890]  dump_stack_lvl+0x73/0xb0
[   16.098921]  print_report+0xd1/0x650
[   16.098942]  ? __virt_addr_valid+0x1db/0x2d0
[   16.098966]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.098989]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.099013]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.099036]  kasan_report+0x141/0x180
[   16.099059]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.099088]  kasan_check_range+0x10c/0x1c0
[   16.099112]  __kasan_check_write+0x18/0x20
[   16.099133]  kasan_atomics_helper+0x1d7a/0x5450
[   16.099156]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.099180]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.099206]  ? kasan_atomics+0x152/0x310
[   16.099233]  kasan_atomics+0x1dc/0x310
[   16.099257]  ? __pfx_kasan_atomics+0x10/0x10
[   16.099282]  ? __pfx_read_tsc+0x10/0x10
[   16.099304]  ? ktime_get_ts64+0x86/0x230
[   16.099328]  kunit_try_run_case+0x1a5/0x480
[   16.099353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.099377]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.099402]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.099427]  ? __kthread_parkme+0x82/0x180
[   16.099449]  ? preempt_count_sub+0x50/0x80
[   16.099474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.099617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.099647]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.099673]  kthread+0x337/0x6f0
[   16.099694]  ? trace_preempt_on+0x20/0xc0
[   16.099719]  ? __pfx_kthread+0x10/0x10
[   16.099740]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.099763]  ? calculate_sigpending+0x7b/0xa0
[   16.099788]  ? __pfx_kthread+0x10/0x10
[   16.099811]  ret_from_fork+0x116/0x1d0
[   16.099830]  ? __pfx_kthread+0x10/0x10
[   16.099851]  ret_from_fork_asm+0x1a/0x30
[   16.099884]  </TASK>
[   16.099895] 
[   16.109901] Allocated by task 283:
[   16.110216]  kasan_save_stack+0x45/0x70
[   16.110372]  kasan_save_track+0x18/0x40
[   16.110715]  kasan_save_alloc_info+0x3b/0x50
[   16.110941]  __kasan_kmalloc+0xb7/0xc0
[   16.111123]  __kmalloc_cache_noprof+0x189/0x420
[   16.111327]  kasan_atomics+0x95/0x310
[   16.111495]  kunit_try_run_case+0x1a5/0x480
[   16.111934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.112130]  kthread+0x337/0x6f0
[   16.112422]  ret_from_fork+0x116/0x1d0
[   16.112637]  ret_from_fork_asm+0x1a/0x30
[   16.113001] 
[   16.113085] The buggy address belongs to the object at ffff888102ba6080
[   16.113085]  which belongs to the cache kmalloc-64 of size 64
[   16.113771] The buggy address is located 0 bytes to the right of
[   16.113771]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.114471] 
[   16.114552] The buggy address belongs to the physical page:
[   16.115042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.115452] flags: 0x200000000000000(node=0|zone=2)
[   16.115655] page_type: f5(slab)
[   16.115984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.116403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.116743] page dumped because: kasan: bad access detected
[   16.117004] 
[   16.117086] Memory state around the buggy address:
[   16.117288]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.117575]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.118195] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.118611]                                      ^
[   16.118795]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.119221]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.119619] ==================================================================
[   16.156394] ==================================================================
[   16.156750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.157188] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.157518] 
[   16.157635] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.157676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.157689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.157714] Call Trace:
[   16.157731]  <TASK>
[   16.157748]  dump_stack_lvl+0x73/0xb0
[   16.157775]  print_report+0xd1/0x650
[   16.157797]  ? __virt_addr_valid+0x1db/0x2d0
[   16.157819]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.157840]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.157863]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.157885]  kasan_report+0x141/0x180
[   16.157922]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.157951]  kasan_check_range+0x10c/0x1c0
[   16.157975]  __kasan_check_write+0x18/0x20
[   16.157996]  kasan_atomics_helper+0x1f43/0x5450
[   16.158020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.158044]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.158071]  ? kasan_atomics+0x152/0x310
[   16.158100]  kasan_atomics+0x1dc/0x310
[   16.158124]  ? __pfx_kasan_atomics+0x10/0x10
[   16.158149]  ? __pfx_read_tsc+0x10/0x10
[   16.158171]  ? ktime_get_ts64+0x86/0x230
[   16.158197]  kunit_try_run_case+0x1a5/0x480
[   16.158222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.158246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.158271]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.158296]  ? __kthread_parkme+0x82/0x180
[   16.158318]  ? preempt_count_sub+0x50/0x80
[   16.158344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.158370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.158396]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.158422]  kthread+0x337/0x6f0
[   16.158441]  ? trace_preempt_on+0x20/0xc0
[   16.158466]  ? __pfx_kthread+0x10/0x10
[   16.158488]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.158510]  ? calculate_sigpending+0x7b/0xa0
[   16.158545]  ? __pfx_kthread+0x10/0x10
[   16.158567]  ret_from_fork+0x116/0x1d0
[   16.158587]  ? __pfx_kthread+0x10/0x10
[   16.158619]  ret_from_fork_asm+0x1a/0x30
[   16.158652]  </TASK>
[   16.158663] 
[   16.166062] Allocated by task 283:
[   16.166224]  kasan_save_stack+0x45/0x70
[   16.166401]  kasan_save_track+0x18/0x40
[   16.166582]  kasan_save_alloc_info+0x3b/0x50
[   16.166787]  __kasan_kmalloc+0xb7/0xc0
[   16.166949]  __kmalloc_cache_noprof+0x189/0x420
[   16.167105]  kasan_atomics+0x95/0x310
[   16.167239]  kunit_try_run_case+0x1a5/0x480
[   16.167385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.167667]  kthread+0x337/0x6f0
[   16.167835]  ret_from_fork+0x116/0x1d0
[   16.168035]  ret_from_fork_asm+0x1a/0x30
[   16.168232] 
[   16.168324] The buggy address belongs to the object at ffff888102ba6080
[   16.168324]  which belongs to the cache kmalloc-64 of size 64
[   16.168934] The buggy address is located 0 bytes to the right of
[   16.168934]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.169367] 
[   16.169438] The buggy address belongs to the physical page:
[   16.169710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.170245] flags: 0x200000000000000(node=0|zone=2)
[   16.170546] page_type: f5(slab)
[   16.170677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.170907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.171131] page dumped because: kasan: bad access detected
[   16.171302] 
[   16.171370] Memory state around the buggy address:
[   16.171592]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.171925]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.172237] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.172545]                                      ^
[   16.172775]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.173079]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.173297] ==================================================================
[   15.662329] ==================================================================
[   15.662700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.663179] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.663514] 
[   15.663636] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.663680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.663692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.663714] Call Trace:
[   15.663731]  <TASK>
[   15.663749]  dump_stack_lvl+0x73/0xb0
[   15.663778]  print_report+0xd1/0x650
[   15.663801]  ? __virt_addr_valid+0x1db/0x2d0
[   15.663826]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.663847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.663871]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.663894]  kasan_report+0x141/0x180
[   15.663917]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.663945]  kasan_check_range+0x10c/0x1c0
[   15.663970]  __kasan_check_write+0x18/0x20
[   15.663990]  kasan_atomics_helper+0x12e6/0x5450
[   15.664014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.664038]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.664065]  ? kasan_atomics+0x152/0x310
[   15.664092]  kasan_atomics+0x1dc/0x310
[   15.664115]  ? __pfx_kasan_atomics+0x10/0x10
[   15.664141]  ? __pfx_read_tsc+0x10/0x10
[   15.664163]  ? ktime_get_ts64+0x86/0x230
[   15.664189]  kunit_try_run_case+0x1a5/0x480
[   15.664214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.664238]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.664265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.664290]  ? __kthread_parkme+0x82/0x180
[   15.664312]  ? preempt_count_sub+0x50/0x80
[   15.664338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.664363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.664389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.664415]  kthread+0x337/0x6f0
[   15.664435]  ? trace_preempt_on+0x20/0xc0
[   15.664460]  ? __pfx_kthread+0x10/0x10
[   15.664482]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.664504]  ? calculate_sigpending+0x7b/0xa0
[   15.664530]  ? __pfx_kthread+0x10/0x10
[   15.664552]  ret_from_fork+0x116/0x1d0
[   15.664571]  ? __pfx_kthread+0x10/0x10
[   15.664593]  ret_from_fork_asm+0x1a/0x30
[   15.664635]  </TASK>
[   15.664646] 
[   15.672109] Allocated by task 283:
[   15.672298]  kasan_save_stack+0x45/0x70
[   15.672511]  kasan_save_track+0x18/0x40
[   15.672710]  kasan_save_alloc_info+0x3b/0x50
[   15.672874]  __kasan_kmalloc+0xb7/0xc0
[   15.673017]  __kmalloc_cache_noprof+0x189/0x420
[   15.673243]  kasan_atomics+0x95/0x310
[   15.673433]  kunit_try_run_case+0x1a5/0x480
[   15.673647]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.673897]  kthread+0x337/0x6f0
[   15.674049]  ret_from_fork+0x116/0x1d0
[   15.674222]  ret_from_fork_asm+0x1a/0x30
[   15.674402] 
[   15.674495] The buggy address belongs to the object at ffff888102ba6080
[   15.674495]  which belongs to the cache kmalloc-64 of size 64
[   15.674974] The buggy address is located 0 bytes to the right of
[   15.674974]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.675446] 
[   15.675539] The buggy address belongs to the physical page:
[   15.675798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.676107] flags: 0x200000000000000(node=0|zone=2)
[   15.676296] page_type: f5(slab)
[   15.676416] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.677008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.677296] page dumped because: kasan: bad access detected
[   15.677466] 
[   15.677613] Memory state around the buggy address:
[   15.677848]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.678145]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.678415] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.678814]                                      ^
[   15.679010]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.679264]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.679477] ==================================================================
[   15.697820] ==================================================================
[   15.698212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.699146] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.699410] 
[   15.699503] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.699548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.699561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.699584] Call Trace:
[   15.699612]  <TASK>
[   15.699630]  dump_stack_lvl+0x73/0xb0
[   15.699662]  print_report+0xd1/0x650
[   15.699685]  ? __virt_addr_valid+0x1db/0x2d0
[   15.699710]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.700738]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.700782]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.700806]  kasan_report+0x141/0x180
[   15.700831]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.700866]  kasan_check_range+0x10c/0x1c0
[   15.700891]  __kasan_check_read+0x15/0x20
[   15.700910]  kasan_atomics_helper+0x13b5/0x5450
[   15.700934]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.700959]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.700986]  ? kasan_atomics+0x152/0x310
[   15.701012]  kasan_atomics+0x1dc/0x310
[   15.701036]  ? __pfx_kasan_atomics+0x10/0x10
[   15.701061]  ? __pfx_read_tsc+0x10/0x10
[   15.701084]  ? ktime_get_ts64+0x86/0x230
[   15.701109]  kunit_try_run_case+0x1a5/0x480
[   15.701136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.701160]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.701187]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.701212]  ? __kthread_parkme+0x82/0x180
[   15.701234]  ? preempt_count_sub+0x50/0x80
[   15.701259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.701285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.701310]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.701336]  kthread+0x337/0x6f0
[   15.701356]  ? trace_preempt_on+0x20/0xc0
[   15.701381]  ? __pfx_kthread+0x10/0x10
[   15.701403]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.701425]  ? calculate_sigpending+0x7b/0xa0
[   15.701451]  ? __pfx_kthread+0x10/0x10
[   15.701474]  ret_from_fork+0x116/0x1d0
[   15.701493]  ? __pfx_kthread+0x10/0x10
[   15.701526]  ret_from_fork_asm+0x1a/0x30
[   15.701560]  </TASK>
[   15.701572] 
[   15.714093] Allocated by task 283:
[   15.714477]  kasan_save_stack+0x45/0x70
[   15.714897]  kasan_save_track+0x18/0x40
[   15.715279]  kasan_save_alloc_info+0x3b/0x50
[   15.715464]  __kasan_kmalloc+0xb7/0xc0
[   15.715893]  __kmalloc_cache_noprof+0x189/0x420
[   15.716280]  kasan_atomics+0x95/0x310
[   15.716414]  kunit_try_run_case+0x1a5/0x480
[   15.716610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.717116]  kthread+0x337/0x6f0
[   15.717432]  ret_from_fork+0x116/0x1d0
[   15.717830]  ret_from_fork_asm+0x1a/0x30
[   15.718205] 
[   15.718377] The buggy address belongs to the object at ffff888102ba6080
[   15.718377]  which belongs to the cache kmalloc-64 of size 64
[   15.719165] The buggy address is located 0 bytes to the right of
[   15.719165]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.719541] 
[   15.719627] The buggy address belongs to the physical page:
[   15.719939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.720693] flags: 0x200000000000000(node=0|zone=2)
[   15.721033] page_type: f5(slab)
[   15.721158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.721387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.721876] page dumped because: kasan: bad access detected
[   15.722374] 
[   15.722536] Memory state around the buggy address:
[   15.723057]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.723732]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.724335] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.725039]                                      ^
[   15.725382]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.725657]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.726281] ==================================================================
[   16.348167] ==================================================================
[   16.348490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.348818] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.349152] 
[   16.349261] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.349312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.349324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.349345] Call Trace:
[   16.349358]  <TASK>
[   16.349384]  dump_stack_lvl+0x73/0xb0
[   16.349413]  print_report+0xd1/0x650
[   16.349435]  ? __virt_addr_valid+0x1db/0x2d0
[   16.349458]  ? kasan_atomics_helper+0x5115/0x5450
[   16.349480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.349504]  ? kasan_atomics_helper+0x5115/0x5450
[   16.349540]  kasan_report+0x141/0x180
[   16.349564]  ? kasan_atomics_helper+0x5115/0x5450
[   16.349592]  __asan_report_load8_noabort+0x18/0x20
[   16.349627]  kasan_atomics_helper+0x5115/0x5450
[   16.349651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.349684]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.349715]  ? kasan_atomics+0x152/0x310
[   16.349742]  kasan_atomics+0x1dc/0x310
[   16.349776]  ? __pfx_kasan_atomics+0x10/0x10
[   16.349802]  ? __pfx_read_tsc+0x10/0x10
[   16.349823]  ? ktime_get_ts64+0x86/0x230
[   16.349848]  kunit_try_run_case+0x1a5/0x480
[   16.349882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.349906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.349931]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.349967]  ? __kthread_parkme+0x82/0x180
[   16.349988]  ? preempt_count_sub+0x50/0x80
[   16.350014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.350039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.350064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.350091]  kthread+0x337/0x6f0
[   16.350111]  ? trace_preempt_on+0x20/0xc0
[   16.350135]  ? __pfx_kthread+0x10/0x10
[   16.350157]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.350180]  ? calculate_sigpending+0x7b/0xa0
[   16.350205]  ? __pfx_kthread+0x10/0x10
[   16.350227]  ret_from_fork+0x116/0x1d0
[   16.350246]  ? __pfx_kthread+0x10/0x10
[   16.350276]  ret_from_fork_asm+0x1a/0x30
[   16.350310]  </TASK>
[   16.350320] 
[   16.357697] Allocated by task 283:
[   16.357907]  kasan_save_stack+0x45/0x70
[   16.358206]  kasan_save_track+0x18/0x40
[   16.358435]  kasan_save_alloc_info+0x3b/0x50
[   16.358888]  __kasan_kmalloc+0xb7/0xc0
[   16.359068]  __kmalloc_cache_noprof+0x189/0x420
[   16.359249]  kasan_atomics+0x95/0x310
[   16.359448]  kunit_try_run_case+0x1a5/0x480
[   16.359665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.359941]  kthread+0x337/0x6f0
[   16.360064]  ret_from_fork+0x116/0x1d0
[   16.360197]  ret_from_fork_asm+0x1a/0x30
[   16.360359] 
[   16.360454] The buggy address belongs to the object at ffff888102ba6080
[   16.360454]  which belongs to the cache kmalloc-64 of size 64
[   16.361501] The buggy address is located 0 bytes to the right of
[   16.361501]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.361936] 
[   16.362009] The buggy address belongs to the physical page:
[   16.362180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.362653] flags: 0x200000000000000(node=0|zone=2)
[   16.362885] page_type: f5(slab)
[   16.363049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.363384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.363763] page dumped because: kasan: bad access detected
[   16.363935] 
[   16.364007] Memory state around the buggy address:
[   16.364162]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.364419]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.365052] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.365398]                                      ^
[   16.365634]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.365946]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.366250] ==================================================================
[   15.548765] ==================================================================
[   15.549274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.549834] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.550261] 
[   15.550390] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.550438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.550451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.550473] Call Trace:
[   15.550493]  <TASK>
[   15.550675]  dump_stack_lvl+0x73/0xb0
[   15.550712]  print_report+0xd1/0x650
[   15.550737]  ? __virt_addr_valid+0x1db/0x2d0
[   15.550762]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.550784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.550845]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.550868]  kasan_report+0x141/0x180
[   15.550892]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.550921]  __asan_report_load4_noabort+0x18/0x20
[   15.550947]  kasan_atomics_helper+0x4a1c/0x5450
[   15.550971]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.550994]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.551021]  ? kasan_atomics+0x152/0x310
[   15.551049]  kasan_atomics+0x1dc/0x310
[   15.551072]  ? __pfx_kasan_atomics+0x10/0x10
[   15.551097]  ? __pfx_read_tsc+0x10/0x10
[   15.551119]  ? ktime_get_ts64+0x86/0x230
[   15.551145]  kunit_try_run_case+0x1a5/0x480
[   15.551172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.551195]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.551222]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.551247]  ? __kthread_parkme+0x82/0x180
[   15.551269]  ? preempt_count_sub+0x50/0x80
[   15.551295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.551320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.551346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.551373]  kthread+0x337/0x6f0
[   15.551393]  ? trace_preempt_on+0x20/0xc0
[   15.551419]  ? __pfx_kthread+0x10/0x10
[   15.551441]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.551464]  ? calculate_sigpending+0x7b/0xa0
[   15.551491]  ? __pfx_kthread+0x10/0x10
[   15.551526]  ret_from_fork+0x116/0x1d0
[   15.551545]  ? __pfx_kthread+0x10/0x10
[   15.551568]  ret_from_fork_asm+0x1a/0x30
[   15.551613]  </TASK>
[   15.551624] 
[   15.558717] Allocated by task 283:
[   15.558898]  kasan_save_stack+0x45/0x70
[   15.559101]  kasan_save_track+0x18/0x40
[   15.559299]  kasan_save_alloc_info+0x3b/0x50
[   15.559515]  __kasan_kmalloc+0xb7/0xc0
[   15.559716]  __kmalloc_cache_noprof+0x189/0x420
[   15.559916]  kasan_atomics+0x95/0x310
[   15.560077]  kunit_try_run_case+0x1a5/0x480
[   15.560231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.560409]  kthread+0x337/0x6f0
[   15.560573]  ret_from_fork+0x116/0x1d0
[   15.560768]  ret_from_fork_asm+0x1a/0x30
[   15.561153] 
[   15.561313] The buggy address belongs to the object at ffff888102ba6080
[   15.561313]  which belongs to the cache kmalloc-64 of size 64
[   15.561828] The buggy address is located 0 bytes to the right of
[   15.561828]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.562298] 
[   15.562397] The buggy address belongs to the physical page:
[   15.562643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.562886] flags: 0x200000000000000(node=0|zone=2)
[   15.563109] page_type: f5(slab)
[   15.563277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.563618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.563841] page dumped because: kasan: bad access detected
[   15.564008] 
[   15.564137] Memory state around the buggy address:
[   15.564359]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.564908]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.565226] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.565440]                                      ^
[   15.565730]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.566035]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.566306] ==================================================================
[   15.754256] ==================================================================
[   15.754498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.754785] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.755103] 
[   15.755339] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.755389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.755403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.755425] Call Trace:
[   15.755444]  <TASK>
[   15.755464]  dump_stack_lvl+0x73/0xb0
[   15.755498]  print_report+0xd1/0x650
[   15.755522]  ? __virt_addr_valid+0x1db/0x2d0
[   15.755547]  ? kasan_atomics_helper+0x1467/0x5450
[   15.755570]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.755595]  ? kasan_atomics_helper+0x1467/0x5450
[   15.755644]  kasan_report+0x141/0x180
[   15.755667]  ? kasan_atomics_helper+0x1467/0x5450
[   15.755695]  kasan_check_range+0x10c/0x1c0
[   15.755721]  __kasan_check_write+0x18/0x20
[   15.755741]  kasan_atomics_helper+0x1467/0x5450
[   15.755765]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.755790]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.755816]  ? kasan_atomics+0x152/0x310
[   15.755844]  kasan_atomics+0x1dc/0x310
[   15.755867]  ? __pfx_kasan_atomics+0x10/0x10
[   15.755893]  ? __pfx_read_tsc+0x10/0x10
[   15.755915]  ? ktime_get_ts64+0x86/0x230
[   15.755942]  kunit_try_run_case+0x1a5/0x480
[   15.755967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.755991]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.756017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.756042]  ? __kthread_parkme+0x82/0x180
[   15.756065]  ? preempt_count_sub+0x50/0x80
[   15.756090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.756116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.756142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.756169]  kthread+0x337/0x6f0
[   15.756189]  ? trace_preempt_on+0x20/0xc0
[   15.756214]  ? __pfx_kthread+0x10/0x10
[   15.756236]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.756258]  ? calculate_sigpending+0x7b/0xa0
[   15.756284]  ? __pfx_kthread+0x10/0x10
[   15.756307]  ret_from_fork+0x116/0x1d0
[   15.756326]  ? __pfx_kthread+0x10/0x10
[   15.756347]  ret_from_fork_asm+0x1a/0x30
[   15.756380]  </TASK>
[   15.756391] 
[   15.763669] Allocated by task 283:
[   15.763848]  kasan_save_stack+0x45/0x70
[   15.764051]  kasan_save_track+0x18/0x40
[   15.764249]  kasan_save_alloc_info+0x3b/0x50
[   15.764468]  __kasan_kmalloc+0xb7/0xc0
[   15.764643]  __kmalloc_cache_noprof+0x189/0x420
[   15.764799]  kasan_atomics+0x95/0x310
[   15.765003]  kunit_try_run_case+0x1a5/0x480
[   15.765223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.765476]  kthread+0x337/0x6f0
[   15.765667]  ret_from_fork+0x116/0x1d0
[   15.765810]  ret_from_fork_asm+0x1a/0x30
[   15.765950] 
[   15.766020] The buggy address belongs to the object at ffff888102ba6080
[   15.766020]  which belongs to the cache kmalloc-64 of size 64
[   15.766422] The buggy address is located 0 bytes to the right of
[   15.766422]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.766976] 
[   15.767074] The buggy address belongs to the physical page:
[   15.767328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.767737] flags: 0x200000000000000(node=0|zone=2)
[   15.767958] page_type: f5(slab)
[   15.768114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.768380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.768614] page dumped because: kasan: bad access detected
[   15.768784] 
[   15.768870] Memory state around the buggy address:
[   15.769235]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.769554]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.769892] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.770305]                                      ^
[   15.770540]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.770817]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.771029] ==================================================================
[   15.995477] ==================================================================
[   15.995848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.996238] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.996591] 
[   15.996787] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.996845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.996858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.996880] Call Trace:
[   15.996901]  <TASK>
[   15.996921]  dump_stack_lvl+0x73/0xb0
[   15.996985]  print_report+0xd1/0x650
[   15.997009]  ? __virt_addr_valid+0x1db/0x2d0
[   15.997032]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.997066]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.997091]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.997140]  kasan_report+0x141/0x180
[   15.997163]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.997219]  kasan_check_range+0x10c/0x1c0
[   15.997243]  __kasan_check_write+0x18/0x20
[   15.997264]  kasan_atomics_helper+0x1b22/0x5450
[   15.997288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.997312]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.997339]  ? kasan_atomics+0x152/0x310
[   15.997392]  kasan_atomics+0x1dc/0x310
[   15.997415]  ? __pfx_kasan_atomics+0x10/0x10
[   15.997451]  ? __pfx_read_tsc+0x10/0x10
[   15.997475]  ? ktime_get_ts64+0x86/0x230
[   15.997501]  kunit_try_run_case+0x1a5/0x480
[   15.997527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.997551]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.997578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.997655]  ? __kthread_parkme+0x82/0x180
[   15.997678]  ? preempt_count_sub+0x50/0x80
[   15.997719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.997745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.997771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.997826]  kthread+0x337/0x6f0
[   15.997847]  ? trace_preempt_on+0x20/0xc0
[   15.997872]  ? __pfx_kthread+0x10/0x10
[   15.997906]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.997929]  ? calculate_sigpending+0x7b/0xa0
[   15.997955]  ? __pfx_kthread+0x10/0x10
[   15.997978]  ret_from_fork+0x116/0x1d0
[   15.997999]  ? __pfx_kthread+0x10/0x10
[   15.998020]  ret_from_fork_asm+0x1a/0x30
[   15.998054]  </TASK>
[   15.998065] 
[   16.008621] Allocated by task 283:
[   16.008898]  kasan_save_stack+0x45/0x70
[   16.009205]  kasan_save_track+0x18/0x40
[   16.009496]  kasan_save_alloc_info+0x3b/0x50
[   16.009834]  __kasan_kmalloc+0xb7/0xc0
[   16.010116]  __kmalloc_cache_noprof+0x189/0x420
[   16.010421]  kasan_atomics+0x95/0x310
[   16.010756]  kunit_try_run_case+0x1a5/0x480
[   16.010960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.011361]  kthread+0x337/0x6f0
[   16.011676]  ret_from_fork+0x116/0x1d0
[   16.011850]  ret_from_fork_asm+0x1a/0x30
[   16.012234] 
[   16.012371] The buggy address belongs to the object at ffff888102ba6080
[   16.012371]  which belongs to the cache kmalloc-64 of size 64
[   16.013161] The buggy address is located 0 bytes to the right of
[   16.013161]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.013993] 
[   16.014215] The buggy address belongs to the physical page:
[   16.014534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.015017] flags: 0x200000000000000(node=0|zone=2)
[   16.015333] page_type: f5(slab)
[   16.015617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.016048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.016476] page dumped because: kasan: bad access detected
[   16.016856] 
[   16.016989] Memory state around the buggy address:
[   16.017282]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.017878]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.018251] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.018752]                                      ^
[   16.019070]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.019485]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.019884] ==================================================================
[   15.567120] ==================================================================
[   15.567471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.567790] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.568012] 
[   15.568099] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.568142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.568155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.568176] Call Trace:
[   15.568195]  <TASK>
[   15.568212]  dump_stack_lvl+0x73/0xb0
[   15.568241]  print_report+0xd1/0x650
[   15.568263]  ? __virt_addr_valid+0x1db/0x2d0
[   15.568286]  ? kasan_atomics_helper+0x1148/0x5450
[   15.568308]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.568331]  ? kasan_atomics_helper+0x1148/0x5450
[   15.568372]  kasan_report+0x141/0x180
[   15.568396]  ? kasan_atomics_helper+0x1148/0x5450
[   15.568423]  kasan_check_range+0x10c/0x1c0
[   15.568449]  __kasan_check_write+0x18/0x20
[   15.568469]  kasan_atomics_helper+0x1148/0x5450
[   15.568493]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.568526]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.568553]  ? kasan_atomics+0x152/0x310
[   15.568580]  kasan_atomics+0x1dc/0x310
[   15.568615]  ? __pfx_kasan_atomics+0x10/0x10
[   15.568641]  ? __pfx_read_tsc+0x10/0x10
[   15.568663]  ? ktime_get_ts64+0x86/0x230
[   15.568689]  kunit_try_run_case+0x1a5/0x480
[   15.568715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.568739]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.568765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.568790]  ? __kthread_parkme+0x82/0x180
[   15.568812]  ? preempt_count_sub+0x50/0x80
[   15.568838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.568863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.568889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.568915]  kthread+0x337/0x6f0
[   15.568935]  ? trace_preempt_on+0x20/0xc0
[   15.568960]  ? __pfx_kthread+0x10/0x10
[   15.568981]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.569004]  ? calculate_sigpending+0x7b/0xa0
[   15.569029]  ? __pfx_kthread+0x10/0x10
[   15.569052]  ret_from_fork+0x116/0x1d0
[   15.569071]  ? __pfx_kthread+0x10/0x10
[   15.569092]  ret_from_fork_asm+0x1a/0x30
[   15.569126]  </TASK>
[   15.569136] 
[   15.576625] Allocated by task 283:
[   15.576819]  kasan_save_stack+0x45/0x70
[   15.576995]  kasan_save_track+0x18/0x40
[   15.577185]  kasan_save_alloc_info+0x3b/0x50
[   15.577335]  __kasan_kmalloc+0xb7/0xc0
[   15.577497]  __kmalloc_cache_noprof+0x189/0x420
[   15.577745]  kasan_atomics+0x95/0x310
[   15.577932]  kunit_try_run_case+0x1a5/0x480
[   15.578138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.578357]  kthread+0x337/0x6f0
[   15.578477]  ret_from_fork+0x116/0x1d0
[   15.578617]  ret_from_fork_asm+0x1a/0x30
[   15.578785] 
[   15.578881] The buggy address belongs to the object at ffff888102ba6080
[   15.578881]  which belongs to the cache kmalloc-64 of size 64
[   15.579412] The buggy address is located 0 bytes to the right of
[   15.579412]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.579928] 
[   15.580001] The buggy address belongs to the physical page:
[   15.580245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.580570] flags: 0x200000000000000(node=0|zone=2)
[   15.580814] page_type: f5(slab)
[   15.580951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.581253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.581476] page dumped because: kasan: bad access detected
[   15.581656] 
[   15.581728] Memory state around the buggy address:
[   15.581881]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.582187]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.582680] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.582989]                                      ^
[   15.583207]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.583641]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.583855] ==================================================================
[   14.954110] ==================================================================
[   14.954664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   14.955168] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   14.955402] 
[   14.955487] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.955528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.955540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.955560] Call Trace:
[   14.955572]  <TASK>
[   14.955587]  dump_stack_lvl+0x73/0xb0
[   14.955626]  print_report+0xd1/0x650
[   14.955649]  ? __virt_addr_valid+0x1db/0x2d0
[   14.955670]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.955692]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.955716]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.955738]  kasan_report+0x141/0x180
[   14.955760]  ? kasan_atomics_helper+0x4b88/0x5450
[   14.955787]  __asan_report_load4_noabort+0x18/0x20
[   14.955812]  kasan_atomics_helper+0x4b88/0x5450
[   14.955835]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.955858]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.955883]  ? kasan_atomics+0x152/0x310
[   14.955909]  kasan_atomics+0x1dc/0x310
[   14.955932]  ? __pfx_kasan_atomics+0x10/0x10
[   14.955956]  ? __pfx_read_tsc+0x10/0x10
[   14.955977]  ? ktime_get_ts64+0x86/0x230
[   14.956001]  kunit_try_run_case+0x1a5/0x480
[   14.956025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.956049]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.956220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.956247]  ? __kthread_parkme+0x82/0x180
[   14.956289]  ? preempt_count_sub+0x50/0x80
[   14.956316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.956343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.956369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.956396]  kthread+0x337/0x6f0
[   14.956417]  ? trace_preempt_on+0x20/0xc0
[   14.956442]  ? __pfx_kthread+0x10/0x10
[   14.956465]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.956488]  ? calculate_sigpending+0x7b/0xa0
[   14.956522]  ? __pfx_kthread+0x10/0x10
[   14.956545]  ret_from_fork+0x116/0x1d0
[   14.956574]  ? __pfx_kthread+0x10/0x10
[   14.956595]  ret_from_fork_asm+0x1a/0x30
[   14.956645]  </TASK>
[   14.956657] 
[   14.965696] Allocated by task 283:
[   14.965882]  kasan_save_stack+0x45/0x70
[   14.966163]  kasan_save_track+0x18/0x40
[   14.966336]  kasan_save_alloc_info+0x3b/0x50
[   14.966586]  __kasan_kmalloc+0xb7/0xc0
[   14.967518]  __kmalloc_cache_noprof+0x189/0x420
[   14.967725]  kasan_atomics+0x95/0x310
[   14.967884]  kunit_try_run_case+0x1a5/0x480
[   14.968205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.968448]  kthread+0x337/0x6f0
[   14.968651]  ret_from_fork+0x116/0x1d0
[   14.968856]  ret_from_fork_asm+0x1a/0x30
[   14.969101] 
[   14.969218] The buggy address belongs to the object at ffff888102ba6080
[   14.969218]  which belongs to the cache kmalloc-64 of size 64
[   14.969799] The buggy address is located 0 bytes to the right of
[   14.969799]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   14.970214] 
[   14.970286] The buggy address belongs to the physical page:
[   14.970458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   14.970707] flags: 0x200000000000000(node=0|zone=2)
[   14.970871] page_type: f5(slab)
[   14.970991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.971538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.971902] page dumped because: kasan: bad access detected
[   14.972158] 
[   14.972256] Memory state around the buggy address:
[   14.972431]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.972892]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.973115] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.973444]                                      ^
[   14.973793]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.974190]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.974502] ==================================================================
[   16.073425] ==================================================================
[   16.074075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.074316] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.074692] 
[   16.074809] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.074992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.075009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.075032] Call Trace:
[   16.075051]  <TASK>
[   16.075069]  dump_stack_lvl+0x73/0xb0
[   16.075183]  print_report+0xd1/0x650
[   16.075208]  ? __virt_addr_valid+0x1db/0x2d0
[   16.075233]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.075256]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.075280]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.075458]  kasan_report+0x141/0x180
[   16.075483]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.075523]  kasan_check_range+0x10c/0x1c0
[   16.075548]  __kasan_check_write+0x18/0x20
[   16.075569]  kasan_atomics_helper+0x1ce1/0x5450
[   16.075593]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.075630]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.075658]  ? kasan_atomics+0x152/0x310
[   16.075687]  kasan_atomics+0x1dc/0x310
[   16.075710]  ? __pfx_kasan_atomics+0x10/0x10
[   16.075735]  ? __pfx_read_tsc+0x10/0x10
[   16.075758]  ? ktime_get_ts64+0x86/0x230
[   16.075784]  kunit_try_run_case+0x1a5/0x480
[   16.075810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.075835]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.075861]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.075886]  ? __kthread_parkme+0x82/0x180
[   16.075908]  ? preempt_count_sub+0x50/0x80
[   16.075933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.075958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.075986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.076012]  kthread+0x337/0x6f0
[   16.076032]  ? trace_preempt_on+0x20/0xc0
[   16.076057]  ? __pfx_kthread+0x10/0x10
[   16.076078]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.076101]  ? calculate_sigpending+0x7b/0xa0
[   16.076127]  ? __pfx_kthread+0x10/0x10
[   16.076149]  ret_from_fork+0x116/0x1d0
[   16.076168]  ? __pfx_kthread+0x10/0x10
[   16.076189]  ret_from_fork_asm+0x1a/0x30
[   16.076222]  </TASK>
[   16.076233] 
[   16.086411] Allocated by task 283:
[   16.086546]  kasan_save_stack+0x45/0x70
[   16.087018]  kasan_save_track+0x18/0x40
[   16.087162]  kasan_save_alloc_info+0x3b/0x50
[   16.087493]  __kasan_kmalloc+0xb7/0xc0
[   16.087786]  __kmalloc_cache_noprof+0x189/0x420
[   16.087960]  kasan_atomics+0x95/0x310
[   16.088265]  kunit_try_run_case+0x1a5/0x480
[   16.088547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.088884]  kthread+0x337/0x6f0
[   16.089131]  ret_from_fork+0x116/0x1d0
[   16.089277]  ret_from_fork_asm+0x1a/0x30
[   16.089716] 
[   16.089901] The buggy address belongs to the object at ffff888102ba6080
[   16.089901]  which belongs to the cache kmalloc-64 of size 64
[   16.090399] The buggy address is located 0 bytes to the right of
[   16.090399]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.091152] 
[   16.091432] The buggy address belongs to the physical page:
[   16.091686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.092086] flags: 0x200000000000000(node=0|zone=2)
[   16.092393] page_type: f5(slab)
[   16.092557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.093054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.093490] page dumped because: kasan: bad access detected
[   16.093830] 
[   16.093908] Memory state around the buggy address:
[   16.094108]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.094588]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.094996] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.095303]                                      ^
[   16.095649]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.096012]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.096380] ==================================================================
[   16.209092] ==================================================================
[   16.209321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.209649] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.210279] 
[   16.210389] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.210431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.210444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.210465] Call Trace:
[   16.210480]  <TASK>
[   16.210495]  dump_stack_lvl+0x73/0xb0
[   16.210532]  print_report+0xd1/0x650
[   16.210555]  ? __virt_addr_valid+0x1db/0x2d0
[   16.210579]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.210612]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.210637]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.210662]  kasan_report+0x141/0x180
[   16.210685]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.210713]  __asan_report_load8_noabort+0x18/0x20
[   16.210739]  kasan_atomics_helper+0x4f98/0x5450
[   16.210763]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.210786]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.210814]  ? kasan_atomics+0x152/0x310
[   16.210842]  kasan_atomics+0x1dc/0x310
[   16.210865]  ? __pfx_kasan_atomics+0x10/0x10
[   16.210891]  ? __pfx_read_tsc+0x10/0x10
[   16.210912]  ? ktime_get_ts64+0x86/0x230
[   16.210938]  kunit_try_run_case+0x1a5/0x480
[   16.210963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.210986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.211013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.211038]  ? __kthread_parkme+0x82/0x180
[   16.211059]  ? preempt_count_sub+0x50/0x80
[   16.211084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.211109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.211135]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.211161]  kthread+0x337/0x6f0
[   16.211181]  ? trace_preempt_on+0x20/0xc0
[   16.211206]  ? __pfx_kthread+0x10/0x10
[   16.211227]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.211251]  ? calculate_sigpending+0x7b/0xa0
[   16.211276]  ? __pfx_kthread+0x10/0x10
[   16.211299]  ret_from_fork+0x116/0x1d0
[   16.211318]  ? __pfx_kthread+0x10/0x10
[   16.211339]  ret_from_fork_asm+0x1a/0x30
[   16.211372]  </TASK>
[   16.211382] 
[   16.218670] Allocated by task 283:
[   16.218850]  kasan_save_stack+0x45/0x70
[   16.219050]  kasan_save_track+0x18/0x40
[   16.219241]  kasan_save_alloc_info+0x3b/0x50
[   16.219451]  __kasan_kmalloc+0xb7/0xc0
[   16.219642]  __kmalloc_cache_noprof+0x189/0x420
[   16.219859]  kasan_atomics+0x95/0x310
[   16.220043]  kunit_try_run_case+0x1a5/0x480
[   16.220186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.220359]  kthread+0x337/0x6f0
[   16.220478]  ret_from_fork+0x116/0x1d0
[   16.220616]  ret_from_fork_asm+0x1a/0x30
[   16.220753] 
[   16.220821] The buggy address belongs to the object at ffff888102ba6080
[   16.220821]  which belongs to the cache kmalloc-64 of size 64
[   16.221840] The buggy address is located 0 bytes to the right of
[   16.221840]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.222392] 
[   16.222492] The buggy address belongs to the physical page:
[   16.222762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.223120] flags: 0x200000000000000(node=0|zone=2)
[   16.223282] page_type: f5(slab)
[   16.223399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.223634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.223858] page dumped because: kasan: bad access detected
[   16.224080] 
[   16.224231] Memory state around the buggy address:
[   16.224454]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.224993]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.225208] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.225419]                                      ^
[   16.225708]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.226036]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.226456] ==================================================================
[   16.278293] ==================================================================
[   16.279065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.279755] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.280409] 
[   16.280624] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.280676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.280689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.280711] Call Trace:
[   16.280727]  <TASK>
[   16.280744]  dump_stack_lvl+0x73/0xb0
[   16.280775]  print_report+0xd1/0x650
[   16.280798]  ? __virt_addr_valid+0x1db/0x2d0
[   16.280833]  ? kasan_atomics_helper+0x218a/0x5450
[   16.280856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.280881]  ? kasan_atomics_helper+0x218a/0x5450
[   16.280915]  kasan_report+0x141/0x180
[   16.280937]  ? kasan_atomics_helper+0x218a/0x5450
[   16.280966]  kasan_check_range+0x10c/0x1c0
[   16.280991]  __kasan_check_write+0x18/0x20
[   16.281011]  kasan_atomics_helper+0x218a/0x5450
[   16.281036]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.281061]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.281088]  ? kasan_atomics+0x152/0x310
[   16.281115]  kasan_atomics+0x1dc/0x310
[   16.281139]  ? __pfx_kasan_atomics+0x10/0x10
[   16.281165]  ? __pfx_read_tsc+0x10/0x10
[   16.281188]  ? ktime_get_ts64+0x86/0x230
[   16.281214]  kunit_try_run_case+0x1a5/0x480
[   16.281240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.281264]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.281289]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.281314]  ? __kthread_parkme+0x82/0x180
[   16.281336]  ? preempt_count_sub+0x50/0x80
[   16.281362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.281388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.281413]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.281440]  kthread+0x337/0x6f0
[   16.281459]  ? trace_preempt_on+0x20/0xc0
[   16.281484]  ? __pfx_kthread+0x10/0x10
[   16.281513]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.281535]  ? calculate_sigpending+0x7b/0xa0
[   16.281561]  ? __pfx_kthread+0x10/0x10
[   16.281583]  ret_from_fork+0x116/0x1d0
[   16.281610]  ? __pfx_kthread+0x10/0x10
[   16.281632]  ret_from_fork_asm+0x1a/0x30
[   16.281665]  </TASK>
[   16.281677] 
[   16.293127] Allocated by task 283:
[   16.293259]  kasan_save_stack+0x45/0x70
[   16.293406]  kasan_save_track+0x18/0x40
[   16.293590]  kasan_save_alloc_info+0x3b/0x50
[   16.293772]  __kasan_kmalloc+0xb7/0xc0
[   16.293906]  __kmalloc_cache_noprof+0x189/0x420
[   16.294131]  kasan_atomics+0x95/0x310
[   16.294317]  kunit_try_run_case+0x1a5/0x480
[   16.294529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.294815]  kthread+0x337/0x6f0
[   16.294949]  ret_from_fork+0x116/0x1d0
[   16.295162]  ret_from_fork_asm+0x1a/0x30
[   16.295300] 
[   16.295392] The buggy address belongs to the object at ffff888102ba6080
[   16.295392]  which belongs to the cache kmalloc-64 of size 64
[   16.296080] The buggy address is located 0 bytes to the right of
[   16.296080]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.296655] 
[   16.296752] The buggy address belongs to the physical page:
[   16.296947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.297204] flags: 0x200000000000000(node=0|zone=2)
[   16.297440] page_type: f5(slab)
[   16.297776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.298149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.298480] page dumped because: kasan: bad access detected
[   16.298705] 
[   16.298775] Memory state around the buggy address:
[   16.298959]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.299275]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.299587] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.299890]                                      ^
[   16.300118]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.300456]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.300807] ==================================================================
[   15.680101] ==================================================================
[   15.680566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.680839] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.681330] 
[   15.681445] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.681490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.681514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.681537] Call Trace:
[   15.681555]  <TASK>
[   15.681573]  dump_stack_lvl+0x73/0xb0
[   15.681614]  print_report+0xd1/0x650
[   15.681637]  ? __virt_addr_valid+0x1db/0x2d0
[   15.681662]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.681683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.681714]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.681737]  kasan_report+0x141/0x180
[   15.681760]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.681787]  __asan_report_load4_noabort+0x18/0x20
[   15.681813]  kasan_atomics_helper+0x49ce/0x5450
[   15.681837]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.681860]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.681887]  ? kasan_atomics+0x152/0x310
[   15.681915]  kasan_atomics+0x1dc/0x310
[   15.681938]  ? __pfx_kasan_atomics+0x10/0x10
[   15.681963]  ? __pfx_read_tsc+0x10/0x10
[   15.681985]  ? ktime_get_ts64+0x86/0x230
[   15.682011]  kunit_try_run_case+0x1a5/0x480
[   15.682037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.682060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.682087]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.682112]  ? __kthread_parkme+0x82/0x180
[   15.682134]  ? preempt_count_sub+0x50/0x80
[   15.682160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.682185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.682210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.682236]  kthread+0x337/0x6f0
[   15.682256]  ? trace_preempt_on+0x20/0xc0
[   15.682281]  ? __pfx_kthread+0x10/0x10
[   15.682303]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.682326]  ? calculate_sigpending+0x7b/0xa0
[   15.682351]  ? __pfx_kthread+0x10/0x10
[   15.682374]  ret_from_fork+0x116/0x1d0
[   15.682393]  ? __pfx_kthread+0x10/0x10
[   15.682415]  ret_from_fork_asm+0x1a/0x30
[   15.682449]  </TASK>
[   15.682460] 
[   15.689862] Allocated by task 283:
[   15.690043]  kasan_save_stack+0x45/0x70
[   15.690246]  kasan_save_track+0x18/0x40
[   15.690394]  kasan_save_alloc_info+0x3b/0x50
[   15.690620]  __kasan_kmalloc+0xb7/0xc0
[   15.690805]  __kmalloc_cache_noprof+0x189/0x420
[   15.690961]  kasan_atomics+0x95/0x310
[   15.691092]  kunit_try_run_case+0x1a5/0x480
[   15.691238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.691412]  kthread+0x337/0x6f0
[   15.691546]  ret_from_fork+0x116/0x1d0
[   15.691743]  ret_from_fork_asm+0x1a/0x30
[   15.691941] 
[   15.692033] The buggy address belongs to the object at ffff888102ba6080
[   15.692033]  which belongs to the cache kmalloc-64 of size 64
[   15.692553] The buggy address is located 0 bytes to the right of
[   15.692553]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.693065] 
[   15.693137] The buggy address belongs to the physical page:
[   15.693307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.693908] flags: 0x200000000000000(node=0|zone=2)
[   15.694146] page_type: f5(slab)
[   15.694306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.694642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.694949] page dumped because: kasan: bad access detected
[   15.695137] 
[   15.695205] Memory state around the buggy address:
[   15.695396]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.695883]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.696150] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.696419]                                      ^
[   15.696687]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.696966]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.697240] ==================================================================
[   15.969075] ==================================================================
[   15.969858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.970646] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.971290] 
[   15.971515] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.971565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.971585] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.971624] Call Trace:
[   15.971644]  <TASK>
[   15.971665]  dump_stack_lvl+0x73/0xb0
[   15.971698]  print_report+0xd1/0x650
[   15.971722]  ? __virt_addr_valid+0x1db/0x2d0
[   15.971747]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.971771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.971794]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.971818]  kasan_report+0x141/0x180
[   15.971841]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.971868]  kasan_check_range+0x10c/0x1c0
[   15.971894]  __kasan_check_write+0x18/0x20
[   15.971914]  kasan_atomics_helper+0x1a7f/0x5450
[   15.971938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.971962]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.971990]  ? kasan_atomics+0x152/0x310
[   15.972017]  kasan_atomics+0x1dc/0x310
[   15.972040]  ? __pfx_kasan_atomics+0x10/0x10
[   15.972065]  ? __pfx_read_tsc+0x10/0x10
[   15.972088]  ? ktime_get_ts64+0x86/0x230
[   15.972114]  kunit_try_run_case+0x1a5/0x480
[   15.972140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972164]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.972191]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.972215]  ? __kthread_parkme+0x82/0x180
[   15.972238]  ? preempt_count_sub+0x50/0x80
[   15.972264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.972315]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.972342]  kthread+0x337/0x6f0
[   15.972361]  ? trace_preempt_on+0x20/0xc0
[   15.972386]  ? __pfx_kthread+0x10/0x10
[   15.972408]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.972431]  ? calculate_sigpending+0x7b/0xa0
[   15.972457]  ? __pfx_kthread+0x10/0x10
[   15.972479]  ret_from_fork+0x116/0x1d0
[   15.972519]  ? __pfx_kthread+0x10/0x10
[   15.972542]  ret_from_fork_asm+0x1a/0x30
[   15.972575]  </TASK>
[   15.972586] 
[   15.984707] Allocated by task 283:
[   15.985089]  kasan_save_stack+0x45/0x70
[   15.985490]  kasan_save_track+0x18/0x40
[   15.985889]  kasan_save_alloc_info+0x3b/0x50
[   15.986174]  __kasan_kmalloc+0xb7/0xc0
[   15.986309]  __kmalloc_cache_noprof+0x189/0x420
[   15.986467]  kasan_atomics+0x95/0x310
[   15.986640]  kunit_try_run_case+0x1a5/0x480
[   15.987036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.987342]  kthread+0x337/0x6f0
[   15.987467]  ret_from_fork+0x116/0x1d0
[   15.987806]  ret_from_fork_asm+0x1a/0x30
[   15.988202] 
[   15.988380] The buggy address belongs to the object at ffff888102ba6080
[   15.988380]  which belongs to the cache kmalloc-64 of size 64
[   15.989421] The buggy address is located 0 bytes to the right of
[   15.989421]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.990100] 
[   15.990175] The buggy address belongs to the physical page:
[   15.990346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.990608] flags: 0x200000000000000(node=0|zone=2)
[   15.990894] page_type: f5(slab)
[   15.991082] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.991369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.991758] page dumped because: kasan: bad access detected
[   15.991973] 
[   15.992071] Memory state around the buggy address:
[   15.992369]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.992748]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.993039] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.993428]                                      ^
[   15.993722]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.994019]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.994351] ==================================================================
[   15.847325] ==================================================================
[   15.848140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.848475] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.848827] 
[   15.848943] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.848997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.849010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.849032] Call Trace:
[   15.849049]  <TASK>
[   15.849078]  dump_stack_lvl+0x73/0xb0
[   15.849110]  print_report+0xd1/0x650
[   15.849133]  ? __virt_addr_valid+0x1db/0x2d0
[   15.849169]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.849192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.849228]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.849251]  kasan_report+0x141/0x180
[   15.849274]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.849314]  kasan_check_range+0x10c/0x1c0
[   15.849339]  __kasan_check_write+0x18/0x20
[   15.849360]  kasan_atomics_helper+0x16e7/0x5450
[   15.849396]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.849420]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.849447]  ? kasan_atomics+0x152/0x310
[   15.849484]  kasan_atomics+0x1dc/0x310
[   15.849532]  ? __pfx_kasan_atomics+0x10/0x10
[   15.849558]  ? __pfx_read_tsc+0x10/0x10
[   15.849590]  ? ktime_get_ts64+0x86/0x230
[   15.849631]  kunit_try_run_case+0x1a5/0x480
[   15.849657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.849691]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.849721]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.849747]  ? __kthread_parkme+0x82/0x180
[   15.849769]  ? preempt_count_sub+0x50/0x80
[   15.849795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.849820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.849856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.849883]  kthread+0x337/0x6f0
[   15.849903]  ? trace_preempt_on+0x20/0xc0
[   15.849940]  ? __pfx_kthread+0x10/0x10
[   15.849961]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.849984]  ? calculate_sigpending+0x7b/0xa0
[   15.850010]  ? __pfx_kthread+0x10/0x10
[   15.850033]  ret_from_fork+0x116/0x1d0
[   15.850053]  ? __pfx_kthread+0x10/0x10
[   15.850074]  ret_from_fork_asm+0x1a/0x30
[   15.850108]  </TASK>
[   15.850119] 
[   15.857722] Allocated by task 283:
[   15.857852]  kasan_save_stack+0x45/0x70
[   15.857995]  kasan_save_track+0x18/0x40
[   15.858211]  kasan_save_alloc_info+0x3b/0x50
[   15.858424]  __kasan_kmalloc+0xb7/0xc0
[   15.858646]  __kmalloc_cache_noprof+0x189/0x420
[   15.858870]  kasan_atomics+0x95/0x310
[   15.859004]  kunit_try_run_case+0x1a5/0x480
[   15.859196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.859455]  kthread+0x337/0x6f0
[   15.859673]  ret_from_fork+0x116/0x1d0
[   15.859841]  ret_from_fork_asm+0x1a/0x30
[   15.860039] 
[   15.860120] The buggy address belongs to the object at ffff888102ba6080
[   15.860120]  which belongs to the cache kmalloc-64 of size 64
[   15.860682] The buggy address is located 0 bytes to the right of
[   15.860682]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.861064] 
[   15.861137] The buggy address belongs to the physical page:
[   15.861305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.861710] flags: 0x200000000000000(node=0|zone=2)
[   15.861942] page_type: f5(slab)
[   15.862107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.862441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.862798] page dumped because: kasan: bad access detected
[   15.863001] 
[   15.863116] Memory state around the buggy address:
[   15.863294]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.863533]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.863866] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.864204]                                      ^
[   15.864428]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.864768]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.865084] ==================================================================
[   15.037583] ==================================================================
[   15.037881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.038418] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.038784] 
[   15.038883] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.038966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.038982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.039004] Call Trace:
[   15.039034]  <TASK>
[   15.039050]  dump_stack_lvl+0x73/0xb0
[   15.039082]  print_report+0xd1/0x650
[   15.039117]  ? __virt_addr_valid+0x1db/0x2d0
[   15.039142]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.039164]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.039197]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.039220]  kasan_report+0x141/0x180
[   15.039244]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.039282]  kasan_check_range+0x10c/0x1c0
[   15.039307]  __kasan_check_write+0x18/0x20
[   15.039328]  kasan_atomics_helper+0x4a0/0x5450
[   15.039351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.039375]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.039403]  ? kasan_atomics+0x152/0x310
[   15.039430]  kasan_atomics+0x1dc/0x310
[   15.039454]  ? __pfx_kasan_atomics+0x10/0x10
[   15.039480]  ? __pfx_read_tsc+0x10/0x10
[   15.039502]  ? ktime_get_ts64+0x86/0x230
[   15.039528]  kunit_try_run_case+0x1a5/0x480
[   15.039561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.039586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.039627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.039652]  ? __kthread_parkme+0x82/0x180
[   15.039674]  ? preempt_count_sub+0x50/0x80
[   15.039700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.039726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.039751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.039778]  kthread+0x337/0x6f0
[   15.039798]  ? trace_preempt_on+0x20/0xc0
[   15.039823]  ? __pfx_kthread+0x10/0x10
[   15.039845]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.039868]  ? calculate_sigpending+0x7b/0xa0
[   15.039893]  ? __pfx_kthread+0x10/0x10
[   15.039916]  ret_from_fork+0x116/0x1d0
[   15.039985]  ? __pfx_kthread+0x10/0x10
[   15.040008]  ret_from_fork_asm+0x1a/0x30
[   15.040054]  </TASK>
[   15.040065] 
[   15.048511] Allocated by task 283:
[   15.048797]  kasan_save_stack+0x45/0x70
[   15.049062]  kasan_save_track+0x18/0x40
[   15.049270]  kasan_save_alloc_info+0x3b/0x50
[   15.049423]  __kasan_kmalloc+0xb7/0xc0
[   15.049656]  __kmalloc_cache_noprof+0x189/0x420
[   15.049908]  kasan_atomics+0x95/0x310
[   15.050153]  kunit_try_run_case+0x1a5/0x480
[   15.050346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.050647]  kthread+0x337/0x6f0
[   15.050817]  ret_from_fork+0x116/0x1d0
[   15.051094]  ret_from_fork_asm+0x1a/0x30
[   15.051302] 
[   15.051387] The buggy address belongs to the object at ffff888102ba6080
[   15.051387]  which belongs to the cache kmalloc-64 of size 64
[   15.051913] The buggy address is located 0 bytes to the right of
[   15.051913]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.052366] 
[   15.052442] The buggy address belongs to the physical page:
[   15.052721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.053073] flags: 0x200000000000000(node=0|zone=2)
[   15.053294] page_type: f5(slab)
[   15.053414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.053652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.054420] page dumped because: kasan: bad access detected
[   15.055619] 
[   15.055751] Memory state around the buggy address:
[   15.056111]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.056434]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.057185] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.057499]                                      ^
[   15.057730]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.058674]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059441] ==================================================================
[   15.901804] ==================================================================
[   15.902051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   15.902323] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.902680] 
[   15.902792] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.902833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.902845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.902865] Call Trace:
[   15.902882]  <TASK>
[   15.902897]  dump_stack_lvl+0x73/0xb0
[   15.902924]  print_report+0xd1/0x650
[   15.902946]  ? __virt_addr_valid+0x1db/0x2d0
[   15.902970]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.902991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.903013]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.903036]  kasan_report+0x141/0x180
[   15.903058]  ? kasan_atomics_helper+0x18b1/0x5450
[   15.903085]  kasan_check_range+0x10c/0x1c0
[   15.903109]  __kasan_check_write+0x18/0x20
[   15.903128]  kasan_atomics_helper+0x18b1/0x5450
[   15.903151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.903173]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.903198]  ? kasan_atomics+0x152/0x310
[   15.903226]  kasan_atomics+0x1dc/0x310
[   15.903248]  ? __pfx_kasan_atomics+0x10/0x10
[   15.903273]  ? __pfx_read_tsc+0x10/0x10
[   15.903294]  ? ktime_get_ts64+0x86/0x230
[   15.903319]  kunit_try_run_case+0x1a5/0x480
[   15.903344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.903366]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.903391]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.903415]  ? __kthread_parkme+0x82/0x180
[   15.903436]  ? preempt_count_sub+0x50/0x80
[   15.903461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.903486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.903510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.903534]  kthread+0x337/0x6f0
[   15.903554]  ? trace_preempt_on+0x20/0xc0
[   15.903579]  ? __pfx_kthread+0x10/0x10
[   15.903838]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.903872]  ? calculate_sigpending+0x7b/0xa0
[   15.903913]  ? __pfx_kthread+0x10/0x10
[   15.903937]  ret_from_fork+0x116/0x1d0
[   15.903957]  ? __pfx_kthread+0x10/0x10
[   15.903979]  ret_from_fork_asm+0x1a/0x30
[   15.904013]  </TASK>
[   15.904025] 
[   15.912046] Allocated by task 283:
[   15.912271]  kasan_save_stack+0x45/0x70
[   15.912422]  kasan_save_track+0x18/0x40
[   15.912621]  kasan_save_alloc_info+0x3b/0x50
[   15.912887]  __kasan_kmalloc+0xb7/0xc0
[   15.913155]  __kmalloc_cache_noprof+0x189/0x420
[   15.913470]  kasan_atomics+0x95/0x310
[   15.913713]  kunit_try_run_case+0x1a5/0x480
[   15.913972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.914194]  kthread+0x337/0x6f0
[   15.914316]  ret_from_fork+0x116/0x1d0
[   15.914479]  ret_from_fork_asm+0x1a/0x30
[   15.914756] 
[   15.914855] The buggy address belongs to the object at ffff888102ba6080
[   15.914855]  which belongs to the cache kmalloc-64 of size 64
[   15.915510] The buggy address is located 0 bytes to the right of
[   15.915510]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.915945] 
[   15.916045] The buggy address belongs to the physical page:
[   15.916349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.916690] flags: 0x200000000000000(node=0|zone=2)
[   15.916939] page_type: f5(slab)
[   15.917079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.917392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.917745] page dumped because: kasan: bad access detected
[   15.917995] 
[   15.918066] Memory state around the buggy address:
[   15.918222]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.918533]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.918909] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.919321]                                      ^
[   15.919618]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.919838]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.920203] ==================================================================
[   14.935141] ==================================================================
[   14.935426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   14.935826] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   14.936162] 
[   14.936274] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.936314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.936326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.936345] Call Trace:
[   14.936356]  <TASK>
[   14.936370]  dump_stack_lvl+0x73/0xb0
[   14.936398]  print_report+0xd1/0x650
[   14.936420]  ? __virt_addr_valid+0x1db/0x2d0
[   14.936442]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.936463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.936487]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.936509]  kasan_report+0x141/0x180
[   14.936531]  ? kasan_atomics_helper+0x4ba2/0x5450
[   14.936558]  __asan_report_store4_noabort+0x1b/0x30
[   14.936583]  kasan_atomics_helper+0x4ba2/0x5450
[   14.936634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.936657]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.936694]  ? kasan_atomics+0x152/0x310
[   14.936720]  kasan_atomics+0x1dc/0x310
[   14.936742]  ? __pfx_kasan_atomics+0x10/0x10
[   14.936766]  ? __pfx_read_tsc+0x10/0x10
[   14.936786]  ? ktime_get_ts64+0x86/0x230
[   14.936811]  kunit_try_run_case+0x1a5/0x480
[   14.936835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.936858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.936881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.936906]  ? __kthread_parkme+0x82/0x180
[   14.936926]  ? preempt_count_sub+0x50/0x80
[   14.936950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.936975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.937000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.937035]  kthread+0x337/0x6f0
[   14.937054]  ? trace_preempt_on+0x20/0xc0
[   14.937077]  ? __pfx_kthread+0x10/0x10
[   14.937115]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.937137]  ? calculate_sigpending+0x7b/0xa0
[   14.937161]  ? __pfx_kthread+0x10/0x10
[   14.937182]  ret_from_fork+0x116/0x1d0
[   14.937200]  ? __pfx_kthread+0x10/0x10
[   14.937221]  ret_from_fork_asm+0x1a/0x30
[   14.937254]  </TASK>
[   14.937264] 
[   14.945166] Allocated by task 283:
[   14.945296]  kasan_save_stack+0x45/0x70
[   14.945439]  kasan_save_track+0x18/0x40
[   14.945791]  kasan_save_alloc_info+0x3b/0x50
[   14.946123]  __kasan_kmalloc+0xb7/0xc0
[   14.946433]  __kmalloc_cache_noprof+0x189/0x420
[   14.946639]  kasan_atomics+0x95/0x310
[   14.946870]  kunit_try_run_case+0x1a5/0x480
[   14.947186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.947361]  kthread+0x337/0x6f0
[   14.947550]  ret_from_fork+0x116/0x1d0
[   14.947762]  ret_from_fork_asm+0x1a/0x30
[   14.947971] 
[   14.948097] The buggy address belongs to the object at ffff888102ba6080
[   14.948097]  which belongs to the cache kmalloc-64 of size 64
[   14.948616] The buggy address is located 0 bytes to the right of
[   14.948616]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   14.949097] 
[   14.949380] The buggy address belongs to the physical page:
[   14.949609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   14.949975] flags: 0x200000000000000(node=0|zone=2)
[   14.950242] page_type: f5(slab)
[   14.950370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.950729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.951086] page dumped because: kasan: bad access detected
[   14.951346] 
[   14.951443] Memory state around the buggy address:
[   14.951703]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.951916]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.952126] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.952336]                                      ^
[   14.952681]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.953283]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.953505] ==================================================================
[   15.921091] ==================================================================
[   15.921393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   15.921814] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.922135] 
[   15.922283] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.922339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.922352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.922374] Call Trace:
[   15.922390]  <TASK>
[   15.922438]  dump_stack_lvl+0x73/0xb0
[   15.922472]  print_report+0xd1/0x650
[   15.922520]  ? __virt_addr_valid+0x1db/0x2d0
[   15.922545]  ? kasan_atomics_helper+0x194a/0x5450
[   15.922568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.922592]  ? kasan_atomics_helper+0x194a/0x5450
[   15.922624]  kasan_report+0x141/0x180
[   15.922648]  ? kasan_atomics_helper+0x194a/0x5450
[   15.922675]  kasan_check_range+0x10c/0x1c0
[   15.922701]  __kasan_check_write+0x18/0x20
[   15.922753]  kasan_atomics_helper+0x194a/0x5450
[   15.922790]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.922825]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.922852]  ? kasan_atomics+0x152/0x310
[   15.922879]  kasan_atomics+0x1dc/0x310
[   15.922903]  ? __pfx_kasan_atomics+0x10/0x10
[   15.922928]  ? __pfx_read_tsc+0x10/0x10
[   15.922950]  ? ktime_get_ts64+0x86/0x230
[   15.922975]  kunit_try_run_case+0x1a5/0x480
[   15.923002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.923026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.923052]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.923078]  ? __kthread_parkme+0x82/0x180
[   15.923099]  ? preempt_count_sub+0x50/0x80
[   15.923124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.923149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.923176]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.923202]  kthread+0x337/0x6f0
[   15.923222]  ? trace_preempt_on+0x20/0xc0
[   15.923247]  ? __pfx_kthread+0x10/0x10
[   15.923269]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.923292]  ? calculate_sigpending+0x7b/0xa0
[   15.923318]  ? __pfx_kthread+0x10/0x10
[   15.923341]  ret_from_fork+0x116/0x1d0
[   15.923360]  ? __pfx_kthread+0x10/0x10
[   15.923382]  ret_from_fork_asm+0x1a/0x30
[   15.923415]  </TASK>
[   15.923427] 
[   15.931199] Allocated by task 283:
[   15.931368]  kasan_save_stack+0x45/0x70
[   15.931616]  kasan_save_track+0x18/0x40
[   15.931851]  kasan_save_alloc_info+0x3b/0x50
[   15.932069]  __kasan_kmalloc+0xb7/0xc0
[   15.932282]  __kmalloc_cache_noprof+0x189/0x420
[   15.932555]  kasan_atomics+0x95/0x310
[   15.932758]  kunit_try_run_case+0x1a5/0x480
[   15.932911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.933159]  kthread+0x337/0x6f0
[   15.933366]  ret_from_fork+0x116/0x1d0
[   15.933584]  ret_from_fork_asm+0x1a/0x30
[   15.933740] 
[   15.933886] The buggy address belongs to the object at ffff888102ba6080
[   15.933886]  which belongs to the cache kmalloc-64 of size 64
[   15.934394] The buggy address is located 0 bytes to the right of
[   15.934394]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.934849] 
[   15.934984] The buggy address belongs to the physical page:
[   15.935255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.935718] flags: 0x200000000000000(node=0|zone=2)
[   15.935949] page_type: f5(slab)
[   15.936107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.936339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.936767] page dumped because: kasan: bad access detected
[   15.937095] 
[   15.937179] Memory state around the buggy address:
[   15.937357]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.937731]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.937952] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.938289]                                      ^
[   15.938564]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.938944]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.939274] ==================================================================
[   15.615747] ==================================================================
[   15.616840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.617744] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.618413] 
[   15.618512] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.618559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.618572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.618595] Call Trace:
[   15.618628]  <TASK>
[   15.618647]  dump_stack_lvl+0x73/0xb0
[   15.618682]  print_report+0xd1/0x650
[   15.618705]  ? __virt_addr_valid+0x1db/0x2d0
[   15.618730]  ? kasan_atomics_helper+0x1217/0x5450
[   15.618753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.618777]  ? kasan_atomics_helper+0x1217/0x5450
[   15.618800]  kasan_report+0x141/0x180
[   15.618823]  ? kasan_atomics_helper+0x1217/0x5450
[   15.618851]  kasan_check_range+0x10c/0x1c0
[   15.618876]  __kasan_check_write+0x18/0x20
[   15.618895]  kasan_atomics_helper+0x1217/0x5450
[   15.618919]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.618943]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.618971]  ? kasan_atomics+0x152/0x310
[   15.618997]  kasan_atomics+0x1dc/0x310
[   15.619021]  ? __pfx_kasan_atomics+0x10/0x10
[   15.619046]  ? __pfx_read_tsc+0x10/0x10
[   15.619069]  ? ktime_get_ts64+0x86/0x230
[   15.619095]  kunit_try_run_case+0x1a5/0x480
[   15.619120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.619144]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.619170]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.619194]  ? __kthread_parkme+0x82/0x180
[   15.619217]  ? preempt_count_sub+0x50/0x80
[   15.619244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.619271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.619296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.619322]  kthread+0x337/0x6f0
[   15.619342]  ? trace_preempt_on+0x20/0xc0
[   15.619368]  ? __pfx_kthread+0x10/0x10
[   15.619390]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.619413]  ? calculate_sigpending+0x7b/0xa0
[   15.619439]  ? __pfx_kthread+0x10/0x10
[   15.619462]  ret_from_fork+0x116/0x1d0
[   15.619481]  ? __pfx_kthread+0x10/0x10
[   15.619665]  ret_from_fork_asm+0x1a/0x30
[   15.619714]  </TASK>
[   15.619727] 
[   15.634686] Allocated by task 283:
[   15.635067]  kasan_save_stack+0x45/0x70
[   15.635365]  kasan_save_track+0x18/0x40
[   15.635525]  kasan_save_alloc_info+0x3b/0x50
[   15.635959]  __kasan_kmalloc+0xb7/0xc0
[   15.636331]  __kmalloc_cache_noprof+0x189/0x420
[   15.636795]  kasan_atomics+0x95/0x310
[   15.637153]  kunit_try_run_case+0x1a5/0x480
[   15.637446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.637821]  kthread+0x337/0x6f0
[   15.638141]  ret_from_fork+0x116/0x1d0
[   15.638500]  ret_from_fork_asm+0x1a/0x30
[   15.638840] 
[   15.639062] The buggy address belongs to the object at ffff888102ba6080
[   15.639062]  which belongs to the cache kmalloc-64 of size 64
[   15.639792] The buggy address is located 0 bytes to the right of
[   15.639792]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.640155] 
[   15.640230] The buggy address belongs to the physical page:
[   15.640401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.640958] flags: 0x200000000000000(node=0|zone=2)
[   15.641323] page_type: f5(slab)
[   15.641709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.642144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.642609] page dumped because: kasan: bad access detected
[   15.642786] 
[   15.642855] Memory state around the buggy address:
[   15.643013]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.643231]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.643452] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.643718]                                      ^
[   15.643903]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.644249]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.644632] ==================================================================
[   16.020819] ==================================================================
[   16.021825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.022268] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.022969] 
[   16.023107] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.023155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.023167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.023189] Call Trace:
[   16.023209]  <TASK>
[   16.023231]  dump_stack_lvl+0x73/0xb0
[   16.023264]  print_report+0xd1/0x650
[   16.023286]  ? __virt_addr_valid+0x1db/0x2d0
[   16.023311]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.023333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.023358]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.023382]  kasan_report+0x141/0x180
[   16.023406]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.023434]  kasan_check_range+0x10c/0x1c0
[   16.023460]  __kasan_check_write+0x18/0x20
[   16.023480]  kasan_atomics_helper+0x1c18/0x5450
[   16.023528]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.023561]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.023590]  ? kasan_atomics+0x152/0x310
[   16.023634]  kasan_atomics+0x1dc/0x310
[   16.023658]  ? __pfx_kasan_atomics+0x10/0x10
[   16.023683]  ? __pfx_read_tsc+0x10/0x10
[   16.023705]  ? ktime_get_ts64+0x86/0x230
[   16.023731]  kunit_try_run_case+0x1a5/0x480
[   16.023757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.023781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.023807]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.023832]  ? __kthread_parkme+0x82/0x180
[   16.023853]  ? preempt_count_sub+0x50/0x80
[   16.023879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.023905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.023930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.023956]  kthread+0x337/0x6f0
[   16.023976]  ? trace_preempt_on+0x20/0xc0
[   16.024001]  ? __pfx_kthread+0x10/0x10
[   16.024023]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.024049]  ? calculate_sigpending+0x7b/0xa0
[   16.024075]  ? __pfx_kthread+0x10/0x10
[   16.024097]  ret_from_fork+0x116/0x1d0
[   16.024116]  ? __pfx_kthread+0x10/0x10
[   16.024138]  ret_from_fork_asm+0x1a/0x30
[   16.024173]  </TASK>
[   16.024185] 
[   16.035646] Allocated by task 283:
[   16.035851]  kasan_save_stack+0x45/0x70
[   16.036152]  kasan_save_track+0x18/0x40
[   16.036433]  kasan_save_alloc_info+0x3b/0x50
[   16.036744]  __kasan_kmalloc+0xb7/0xc0
[   16.037019]  __kmalloc_cache_noprof+0x189/0x420
[   16.037333]  kasan_atomics+0x95/0x310
[   16.037631]  kunit_try_run_case+0x1a5/0x480
[   16.037943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.038296]  kthread+0x337/0x6f0
[   16.038615]  ret_from_fork+0x116/0x1d0
[   16.038927]  ret_from_fork_asm+0x1a/0x30
[   16.039220] 
[   16.039351] The buggy address belongs to the object at ffff888102ba6080
[   16.039351]  which belongs to the cache kmalloc-64 of size 64
[   16.040214] The buggy address is located 0 bytes to the right of
[   16.040214]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.041102] 
[   16.041186] The buggy address belongs to the physical page:
[   16.041445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.041905] flags: 0x200000000000000(node=0|zone=2)
[   16.042371] page_type: f5(slab)
[   16.042562] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.042924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.043427] page dumped because: kasan: bad access detected
[   16.043756] 
[   16.043999] Memory state around the buggy address:
[   16.044312]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.044839]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.045250] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.045720]                                      ^
[   16.046041]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.046494]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.046994] ==================================================================
[   16.191516] ==================================================================
[   16.191888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.192198] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.192480] 
[   16.192684] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.192726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.192737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.192758] Call Trace:
[   16.192772]  <TASK>
[   16.192788]  dump_stack_lvl+0x73/0xb0
[   16.192841]  print_report+0xd1/0x650
[   16.192864]  ? __virt_addr_valid+0x1db/0x2d0
[   16.192887]  ? kasan_atomics_helper+0x2006/0x5450
[   16.192909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.192934]  ? kasan_atomics_helper+0x2006/0x5450
[   16.192957]  kasan_report+0x141/0x180
[   16.192981]  ? kasan_atomics_helper+0x2006/0x5450
[   16.193008]  kasan_check_range+0x10c/0x1c0
[   16.193034]  __kasan_check_write+0x18/0x20
[   16.193061]  kasan_atomics_helper+0x2006/0x5450
[   16.193085]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.193109]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.193135]  ? kasan_atomics+0x152/0x310
[   16.193162]  kasan_atomics+0x1dc/0x310
[   16.193185]  ? __pfx_kasan_atomics+0x10/0x10
[   16.193210]  ? __pfx_read_tsc+0x10/0x10
[   16.193232]  ? ktime_get_ts64+0x86/0x230
[   16.193257]  kunit_try_run_case+0x1a5/0x480
[   16.193282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.193306]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.193331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.193356]  ? __kthread_parkme+0x82/0x180
[   16.193378]  ? preempt_count_sub+0x50/0x80
[   16.193404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.193429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.193456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.193482]  kthread+0x337/0x6f0
[   16.193501]  ? trace_preempt_on+0x20/0xc0
[   16.193526]  ? __pfx_kthread+0x10/0x10
[   16.193548]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.193570]  ? calculate_sigpending+0x7b/0xa0
[   16.193596]  ? __pfx_kthread+0x10/0x10
[   16.193628]  ret_from_fork+0x116/0x1d0
[   16.193648]  ? __pfx_kthread+0x10/0x10
[   16.193669]  ret_from_fork_asm+0x1a/0x30
[   16.193702]  </TASK>
[   16.193717] 
[   16.200701] Allocated by task 283:
[   16.200878]  kasan_save_stack+0x45/0x70
[   16.201077]  kasan_save_track+0x18/0x40
[   16.201266]  kasan_save_alloc_info+0x3b/0x50
[   16.201475]  __kasan_kmalloc+0xb7/0xc0
[   16.201910]  __kmalloc_cache_noprof+0x189/0x420
[   16.202132]  kasan_atomics+0x95/0x310
[   16.202324]  kunit_try_run_case+0x1a5/0x480
[   16.202542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.202811]  kthread+0x337/0x6f0
[   16.202964]  ret_from_fork+0x116/0x1d0
[   16.203124]  ret_from_fork_asm+0x1a/0x30
[   16.203311] 
[   16.203388] The buggy address belongs to the object at ffff888102ba6080
[   16.203388]  which belongs to the cache kmalloc-64 of size 64
[   16.204246] The buggy address is located 0 bytes to the right of
[   16.204246]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.204782] 
[   16.204876] The buggy address belongs to the physical page:
[   16.205074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.205597] flags: 0x200000000000000(node=0|zone=2)
[   16.205825] page_type: f5(slab)
[   16.206014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.206328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.206698] page dumped because: kasan: bad access detected
[   16.206868] 
[   16.206937] Memory state around the buggy address:
[   16.207090]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.207303]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.207520] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.207852]                                      ^
[   16.208079]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.208403]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.208751] ==================================================================
[   15.645223] ==================================================================
[   15.645639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.645984] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.646287] 
[   15.646411] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.646472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.646488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.646512] Call Trace:
[   15.646534]  <TASK>
[   15.646557]  dump_stack_lvl+0x73/0xb0
[   15.646588]  print_report+0xd1/0x650
[   15.646623]  ? __virt_addr_valid+0x1db/0x2d0
[   15.646658]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.646681]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.646707]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.646732]  kasan_report+0x141/0x180
[   15.646755]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.646783]  __asan_report_load4_noabort+0x18/0x20
[   15.646810]  kasan_atomics_helper+0x49e8/0x5450
[   15.646834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.646857]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.646884]  ? kasan_atomics+0x152/0x310
[   15.646912]  kasan_atomics+0x1dc/0x310
[   15.646935]  ? __pfx_kasan_atomics+0x10/0x10
[   15.646960]  ? __pfx_read_tsc+0x10/0x10
[   15.646983]  ? ktime_get_ts64+0x86/0x230
[   15.647009]  kunit_try_run_case+0x1a5/0x480
[   15.647035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.647059]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.647086]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.647111]  ? __kthread_parkme+0x82/0x180
[   15.647133]  ? preempt_count_sub+0x50/0x80
[   15.647159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.647184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.647210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.647236]  kthread+0x337/0x6f0
[   15.647255]  ? trace_preempt_on+0x20/0xc0
[   15.647282]  ? __pfx_kthread+0x10/0x10
[   15.647305]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.647328]  ? calculate_sigpending+0x7b/0xa0
[   15.647354]  ? __pfx_kthread+0x10/0x10
[   15.647377]  ret_from_fork+0x116/0x1d0
[   15.647396]  ? __pfx_kthread+0x10/0x10
[   15.647418]  ret_from_fork_asm+0x1a/0x30
[   15.647452]  </TASK>
[   15.647463] 
[   15.654656] Allocated by task 283:
[   15.654784]  kasan_save_stack+0x45/0x70
[   15.654959]  kasan_save_track+0x18/0x40
[   15.655154]  kasan_save_alloc_info+0x3b/0x50
[   15.655367]  __kasan_kmalloc+0xb7/0xc0
[   15.655622]  __kmalloc_cache_noprof+0x189/0x420
[   15.655817]  kasan_atomics+0x95/0x310
[   15.655973]  kunit_try_run_case+0x1a5/0x480
[   15.656167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.656401]  kthread+0x337/0x6f0
[   15.656566]  ret_from_fork+0x116/0x1d0
[   15.656763]  ret_from_fork_asm+0x1a/0x30
[   15.656942] 
[   15.657012] The buggy address belongs to the object at ffff888102ba6080
[   15.657012]  which belongs to the cache kmalloc-64 of size 64
[   15.657507] The buggy address is located 0 bytes to the right of
[   15.657507]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.657982] 
[   15.658084] The buggy address belongs to the physical page:
[   15.658317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.658704] flags: 0x200000000000000(node=0|zone=2)
[   15.658925] page_type: f5(slab)
[   15.659083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.659365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.659743] page dumped because: kasan: bad access detected
[   15.659996] 
[   15.660080] Memory state around the buggy address:
[   15.660278]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.660559]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.660860] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.661138]                                      ^
[   15.661349]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.661610]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.661827] ==================================================================
[   14.996833] ==================================================================
[   14.997211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   14.997579] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   14.997920] 
[   14.998078] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.998137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.998150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.998173] Call Trace:
[   14.998190]  <TASK>
[   14.998207]  dump_stack_lvl+0x73/0xb0
[   14.998238]  print_report+0xd1/0x650
[   14.998261]  ? __virt_addr_valid+0x1db/0x2d0
[   14.998285]  ? kasan_atomics_helper+0x3df/0x5450
[   14.998308]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.998332]  ? kasan_atomics_helper+0x3df/0x5450
[   14.998355]  kasan_report+0x141/0x180
[   14.998378]  ? kasan_atomics_helper+0x3df/0x5450
[   14.998405]  kasan_check_range+0x10c/0x1c0
[   14.998430]  __kasan_check_read+0x15/0x20
[   14.998451]  kasan_atomics_helper+0x3df/0x5450
[   14.998474]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.998499]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.998527]  ? kasan_atomics+0x152/0x310
[   14.998556]  kasan_atomics+0x1dc/0x310
[   14.998581]  ? __pfx_kasan_atomics+0x10/0x10
[   14.998616]  ? __pfx_read_tsc+0x10/0x10
[   14.998639]  ? ktime_get_ts64+0x86/0x230
[   14.998665]  kunit_try_run_case+0x1a5/0x480
[   14.998692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.998716]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.998742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.998767]  ? __kthread_parkme+0x82/0x180
[   14.998789]  ? preempt_count_sub+0x50/0x80
[   14.998815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.998851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.998877]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.998904]  kthread+0x337/0x6f0
[   14.998935]  ? trace_preempt_on+0x20/0xc0
[   14.998960]  ? __pfx_kthread+0x10/0x10
[   14.998982]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.999005]  ? calculate_sigpending+0x7b/0xa0
[   14.999031]  ? __pfx_kthread+0x10/0x10
[   14.999053]  ret_from_fork+0x116/0x1d0
[   14.999073]  ? __pfx_kthread+0x10/0x10
[   14.999094]  ret_from_fork_asm+0x1a/0x30
[   14.999129]  </TASK>
[   14.999139] 
[   15.007572] Allocated by task 283:
[   15.007748]  kasan_save_stack+0x45/0x70
[   15.007895]  kasan_save_track+0x18/0x40
[   15.008092]  kasan_save_alloc_info+0x3b/0x50
[   15.008459]  __kasan_kmalloc+0xb7/0xc0
[   15.008632]  __kmalloc_cache_noprof+0x189/0x420
[   15.009062]  kasan_atomics+0x95/0x310
[   15.009408]  kunit_try_run_case+0x1a5/0x480
[   15.009714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.009969]  kthread+0x337/0x6f0
[   15.010178]  ret_from_fork+0x116/0x1d0
[   15.010391]  ret_from_fork_asm+0x1a/0x30
[   15.010532] 
[   15.010613] The buggy address belongs to the object at ffff888102ba6080
[   15.010613]  which belongs to the cache kmalloc-64 of size 64
[   15.011361] The buggy address is located 0 bytes to the right of
[   15.011361]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.011968] 
[   15.012079] The buggy address belongs to the physical page:
[   15.012300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.012538] flags: 0x200000000000000(node=0|zone=2)
[   15.012881] page_type: f5(slab)
[   15.013232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.013674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.013916] page dumped because: kasan: bad access detected
[   15.014384] 
[   15.014487] Memory state around the buggy address:
[   15.014735]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.014954]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.015221] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.015580]                                      ^
[   15.015846]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.016302]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.016621] ==================================================================
[   15.082248] ==================================================================
[   15.082578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.082923] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.083298] 
[   15.083416] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.083472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.083484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.083530] Call Trace:
[   15.083551]  <TASK>
[   15.083573]  dump_stack_lvl+0x73/0xb0
[   15.083616]  print_report+0xd1/0x650
[   15.083651]  ? __virt_addr_valid+0x1db/0x2d0
[   15.083676]  ? kasan_atomics_helper+0x565/0x5450
[   15.083700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.083735]  ? kasan_atomics_helper+0x565/0x5450
[   15.083758]  kasan_report+0x141/0x180
[   15.083782]  ? kasan_atomics_helper+0x565/0x5450
[   15.083818]  kasan_check_range+0x10c/0x1c0
[   15.083845]  __kasan_check_write+0x18/0x20
[   15.083866]  kasan_atomics_helper+0x565/0x5450
[   15.083900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.083924]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.084001]  ? kasan_atomics+0x152/0x310
[   15.084039]  kasan_atomics+0x1dc/0x310
[   15.084063]  ? __pfx_kasan_atomics+0x10/0x10
[   15.084100]  ? __pfx_read_tsc+0x10/0x10
[   15.084123]  ? ktime_get_ts64+0x86/0x230
[   15.084149]  kunit_try_run_case+0x1a5/0x480
[   15.084175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.084199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.084226]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.084260]  ? __kthread_parkme+0x82/0x180
[   15.084281]  ? preempt_count_sub+0x50/0x80
[   15.084307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.084343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.084368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.084395]  kthread+0x337/0x6f0
[   15.084414]  ? trace_preempt_on+0x20/0xc0
[   15.084440]  ? __pfx_kthread+0x10/0x10
[   15.084462]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.084484]  ? calculate_sigpending+0x7b/0xa0
[   15.084521]  ? __pfx_kthread+0x10/0x10
[   15.084544]  ret_from_fork+0x116/0x1d0
[   15.084564]  ? __pfx_kthread+0x10/0x10
[   15.084585]  ret_from_fork_asm+0x1a/0x30
[   15.084629]  </TASK>
[   15.084641] 
[   15.093322] Allocated by task 283:
[   15.093458]  kasan_save_stack+0x45/0x70
[   15.093617]  kasan_save_track+0x18/0x40
[   15.093878]  kasan_save_alloc_info+0x3b/0x50
[   15.094376]  __kasan_kmalloc+0xb7/0xc0
[   15.094673]  __kmalloc_cache_noprof+0x189/0x420
[   15.094914]  kasan_atomics+0x95/0x310
[   15.095164]  kunit_try_run_case+0x1a5/0x480
[   15.095404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.095717]  kthread+0x337/0x6f0
[   15.095860]  ret_from_fork+0x116/0x1d0
[   15.095995]  ret_from_fork_asm+0x1a/0x30
[   15.096136] 
[   15.096206] The buggy address belongs to the object at ffff888102ba6080
[   15.096206]  which belongs to the cache kmalloc-64 of size 64
[   15.096713] The buggy address is located 0 bytes to the right of
[   15.096713]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.097743] 
[   15.097824] The buggy address belongs to the physical page:
[   15.098171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.098568] flags: 0x200000000000000(node=0|zone=2)
[   15.098921] page_type: f5(slab)
[   15.099156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.099402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.099853] page dumped because: kasan: bad access detected
[   15.100191] 
[   15.100272] Memory state around the buggy address:
[   15.100428]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.100789]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.101199] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.101645]                                      ^
[   15.101851]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.102171]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.102384] ==================================================================
[   15.865801] ==================================================================
[   15.866192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.866546] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.866904] 
[   15.866996] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.867039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.867051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.867073] Call Trace:
[   15.867088]  <TASK>
[   15.867104]  dump_stack_lvl+0x73/0xb0
[   15.867134]  print_report+0xd1/0x650
[   15.867158]  ? __virt_addr_valid+0x1db/0x2d0
[   15.867194]  ? kasan_atomics_helper+0x177f/0x5450
[   15.867217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.867242]  ? kasan_atomics_helper+0x177f/0x5450
[   15.867276]  kasan_report+0x141/0x180
[   15.867299]  ? kasan_atomics_helper+0x177f/0x5450
[   15.867327]  kasan_check_range+0x10c/0x1c0
[   15.867352]  __kasan_check_write+0x18/0x20
[   15.867373]  kasan_atomics_helper+0x177f/0x5450
[   15.867398]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.867422]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.867449]  ? kasan_atomics+0x152/0x310
[   15.867477]  kasan_atomics+0x1dc/0x310
[   15.867519]  ? __pfx_kasan_atomics+0x10/0x10
[   15.867545]  ? __pfx_read_tsc+0x10/0x10
[   15.867568]  ? ktime_get_ts64+0x86/0x230
[   15.867594]  kunit_try_run_case+0x1a5/0x480
[   15.867630]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.867657]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.867693]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.867718]  ? __kthread_parkme+0x82/0x180
[   15.867740]  ? preempt_count_sub+0x50/0x80
[   15.867779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.867805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.867831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.867857]  kthread+0x337/0x6f0
[   15.867878]  ? trace_preempt_on+0x20/0xc0
[   15.867903]  ? __pfx_kthread+0x10/0x10
[   15.867925]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.867948]  ? calculate_sigpending+0x7b/0xa0
[   15.867974]  ? __pfx_kthread+0x10/0x10
[   15.867996]  ret_from_fork+0x116/0x1d0
[   15.868016]  ? __pfx_kthread+0x10/0x10
[   15.868037]  ret_from_fork_asm+0x1a/0x30
[   15.868071]  </TASK>
[   15.868082] 
[   15.875623] Allocated by task 283:
[   15.875833]  kasan_save_stack+0x45/0x70
[   15.875996]  kasan_save_track+0x18/0x40
[   15.876202]  kasan_save_alloc_info+0x3b/0x50
[   15.876412]  __kasan_kmalloc+0xb7/0xc0
[   15.876609]  __kmalloc_cache_noprof+0x189/0x420
[   15.876857]  kasan_atomics+0x95/0x310
[   15.877010]  kunit_try_run_case+0x1a5/0x480
[   15.877157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.877428]  kthread+0x337/0x6f0
[   15.877629]  ret_from_fork+0x116/0x1d0
[   15.877821]  ret_from_fork_asm+0x1a/0x30
[   15.877997] 
[   15.878082] The buggy address belongs to the object at ffff888102ba6080
[   15.878082]  which belongs to the cache kmalloc-64 of size 64
[   15.878614] The buggy address is located 0 bytes to the right of
[   15.878614]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.879132] 
[   15.879235] The buggy address belongs to the physical page:
[   15.879446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.879717] flags: 0x200000000000000(node=0|zone=2)
[   15.879880] page_type: f5(slab)
[   15.880000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.880353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.880718] page dumped because: kasan: bad access detected
[   15.880968] 
[   15.881065] Memory state around the buggy address:
[   15.881291]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.881611]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.881831] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.882044]                                      ^
[   15.882217]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.882579]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.882940] ==================================================================
[   16.138833] ==================================================================
[   16.139385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.139734] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.140038] 
[   16.140148] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.140190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.140203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.140225] Call Trace:
[   16.140240]  <TASK>
[   16.140256]  dump_stack_lvl+0x73/0xb0
[   16.140284]  print_report+0xd1/0x650
[   16.140308]  ? __virt_addr_valid+0x1db/0x2d0
[   16.140332]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.140355]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.140379]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.140403]  kasan_report+0x141/0x180
[   16.140426]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.140454]  kasan_check_range+0x10c/0x1c0
[   16.140481]  __kasan_check_write+0x18/0x20
[   16.140501]  kasan_atomics_helper+0x1eaa/0x5450
[   16.140537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.140561]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.140588]  ? kasan_atomics+0x152/0x310
[   16.140627]  kasan_atomics+0x1dc/0x310
[   16.140651]  ? __pfx_kasan_atomics+0x10/0x10
[   16.140677]  ? __pfx_read_tsc+0x10/0x10
[   16.140700]  ? ktime_get_ts64+0x86/0x230
[   16.140726]  kunit_try_run_case+0x1a5/0x480
[   16.140752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.140776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.140802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.140826]  ? __kthread_parkme+0x82/0x180
[   16.140848]  ? preempt_count_sub+0x50/0x80
[   16.140873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.140898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.140924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.140950]  kthread+0x337/0x6f0
[   16.140971]  ? trace_preempt_on+0x20/0xc0
[   16.140996]  ? __pfx_kthread+0x10/0x10
[   16.141017]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.141039]  ? calculate_sigpending+0x7b/0xa0
[   16.141065]  ? __pfx_kthread+0x10/0x10
[   16.141087]  ret_from_fork+0x116/0x1d0
[   16.141106]  ? __pfx_kthread+0x10/0x10
[   16.141127]  ret_from_fork_asm+0x1a/0x30
[   16.141160]  </TASK>
[   16.141171] 
[   16.149012] Allocated by task 283:
[   16.149172]  kasan_save_stack+0x45/0x70
[   16.149361]  kasan_save_track+0x18/0x40
[   16.149530]  kasan_save_alloc_info+0x3b/0x50
[   16.149764]  __kasan_kmalloc+0xb7/0xc0
[   16.149938]  __kmalloc_cache_noprof+0x189/0x420
[   16.150123]  kasan_atomics+0x95/0x310
[   16.150313]  kunit_try_run_case+0x1a5/0x480
[   16.150502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.150752]  kthread+0x337/0x6f0
[   16.150904]  ret_from_fork+0x116/0x1d0
[   16.151063]  ret_from_fork_asm+0x1a/0x30
[   16.151204] 
[   16.151290] The buggy address belongs to the object at ffff888102ba6080
[   16.151290]  which belongs to the cache kmalloc-64 of size 64
[   16.151903] The buggy address is located 0 bytes to the right of
[   16.151903]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.152382] 
[   16.152481] The buggy address belongs to the physical page:
[   16.152743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.153052] flags: 0x200000000000000(node=0|zone=2)
[   16.153228] page_type: f5(slab)
[   16.153374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.153758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.154008] page dumped because: kasan: bad access detected
[   16.154177] 
[   16.154246] Memory state around the buggy address:
[   16.154400]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.154691]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.155061] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.155371]                                      ^
[   16.155549]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.155772]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.155981] ==================================================================
[   15.584237] ==================================================================
[   15.584528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.584892] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.585224] 
[   15.585334] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.585374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.585386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.585407] Call Trace:
[   15.585424]  <TASK>
[   15.585440]  dump_stack_lvl+0x73/0xb0
[   15.585481]  print_report+0xd1/0x650
[   15.585504]  ? __virt_addr_valid+0x1db/0x2d0
[   15.585540]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.585563]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.585587]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.585620]  kasan_report+0x141/0x180
[   15.585643]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.585671]  __asan_report_load4_noabort+0x18/0x20
[   15.585697]  kasan_atomics_helper+0x4a02/0x5450
[   15.585727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.585753]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.585782]  ? kasan_atomics+0x152/0x310
[   15.585810]  kasan_atomics+0x1dc/0x310
[   15.585834]  ? __pfx_kasan_atomics+0x10/0x10
[   15.585859]  ? __pfx_read_tsc+0x10/0x10
[   15.585882]  ? ktime_get_ts64+0x86/0x230
[   15.585908]  kunit_try_run_case+0x1a5/0x480
[   15.585934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.585958]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.585985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.586010]  ? __kthread_parkme+0x82/0x180
[   15.586032]  ? preempt_count_sub+0x50/0x80
[   15.586058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.586083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.586109]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.586135]  kthread+0x337/0x6f0
[   15.586155]  ? trace_preempt_on+0x20/0xc0
[   15.586180]  ? __pfx_kthread+0x10/0x10
[   15.586201]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.586224]  ? calculate_sigpending+0x7b/0xa0
[   15.586249]  ? __pfx_kthread+0x10/0x10
[   15.586272]  ret_from_fork+0x116/0x1d0
[   15.586291]  ? __pfx_kthread+0x10/0x10
[   15.586312]  ret_from_fork_asm+0x1a/0x30
[   15.586346]  </TASK>
[   15.586357] 
[   15.597816] Allocated by task 283:
[   15.597958]  kasan_save_stack+0x45/0x70
[   15.598112]  kasan_save_track+0x18/0x40
[   15.598251]  kasan_save_alloc_info+0x3b/0x50
[   15.598401]  __kasan_kmalloc+0xb7/0xc0
[   15.599104]  __kmalloc_cache_noprof+0x189/0x420
[   15.599698]  kasan_atomics+0x95/0x310
[   15.600233]  kunit_try_run_case+0x1a5/0x480
[   15.600883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.601562]  kthread+0x337/0x6f0
[   15.602038]  ret_from_fork+0x116/0x1d0
[   15.602540]  ret_from_fork_asm+0x1a/0x30
[   15.603101] 
[   15.603407] The buggy address belongs to the object at ffff888102ba6080
[   15.603407]  which belongs to the cache kmalloc-64 of size 64
[   15.604447] The buggy address is located 0 bytes to the right of
[   15.604447]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.605431] 
[   15.605750] The buggy address belongs to the physical page:
[   15.606332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.607167] flags: 0x200000000000000(node=0|zone=2)
[   15.607342] page_type: f5(slab)
[   15.607463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.608493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.609345] page dumped because: kasan: bad access detected
[   15.609969] 
[   15.610051] Memory state around the buggy address:
[   15.610209]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.610430]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.611453] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.612349]                                      ^
[   15.613002]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.613937]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.614470] ==================================================================
[   16.047908] ==================================================================
[   16.048770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.049110] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.049721] 
[   16.049974] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.050024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.050037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.050168] Call Trace:
[   16.050193]  <TASK>
[   16.050213]  dump_stack_lvl+0x73/0xb0
[   16.050247]  print_report+0xd1/0x650
[   16.050270]  ? __virt_addr_valid+0x1db/0x2d0
[   16.050294]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.050317]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.050343]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.050366]  kasan_report+0x141/0x180
[   16.050389]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.050417]  __asan_report_load8_noabort+0x18/0x20
[   16.050443]  kasan_atomics_helper+0x4f30/0x5450
[   16.050467]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.050491]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.050528]  ? kasan_atomics+0x152/0x310
[   16.050557]  kasan_atomics+0x1dc/0x310
[   16.050580]  ? __pfx_kasan_atomics+0x10/0x10
[   16.050617]  ? __pfx_read_tsc+0x10/0x10
[   16.050640]  ? ktime_get_ts64+0x86/0x230
[   16.050667]  kunit_try_run_case+0x1a5/0x480
[   16.050694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.050720]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.050747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.050772]  ? __kthread_parkme+0x82/0x180
[   16.050794]  ? preempt_count_sub+0x50/0x80
[   16.050820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.050847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.050873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.050899]  kthread+0x337/0x6f0
[   16.050919]  ? trace_preempt_on+0x20/0xc0
[   16.050945]  ? __pfx_kthread+0x10/0x10
[   16.050967]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.050990]  ? calculate_sigpending+0x7b/0xa0
[   16.051016]  ? __pfx_kthread+0x10/0x10
[   16.051039]  ret_from_fork+0x116/0x1d0
[   16.051059]  ? __pfx_kthread+0x10/0x10
[   16.051080]  ret_from_fork_asm+0x1a/0x30
[   16.051113]  </TASK>
[   16.051125] 
[   16.062214] Allocated by task 283:
[   16.062348]  kasan_save_stack+0x45/0x70
[   16.062631]  kasan_save_track+0x18/0x40
[   16.063040]  kasan_save_alloc_info+0x3b/0x50
[   16.063264]  __kasan_kmalloc+0xb7/0xc0
[   16.063450]  __kmalloc_cache_noprof+0x189/0x420
[   16.063943]  kasan_atomics+0x95/0x310
[   16.064130]  kunit_try_run_case+0x1a5/0x480
[   16.064333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.064740]  kthread+0x337/0x6f0
[   16.065082]  ret_from_fork+0x116/0x1d0
[   16.065346]  ret_from_fork_asm+0x1a/0x30
[   16.065717] 
[   16.065916] The buggy address belongs to the object at ffff888102ba6080
[   16.065916]  which belongs to the cache kmalloc-64 of size 64
[   16.066534] The buggy address is located 0 bytes to the right of
[   16.066534]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.067335] 
[   16.067562] The buggy address belongs to the physical page:
[   16.067875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.068224] flags: 0x200000000000000(node=0|zone=2)
[   16.068459] page_type: f5(slab)
[   16.068835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.069241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.069667] page dumped because: kasan: bad access detected
[   16.069921] 
[   16.070148] Memory state around the buggy address:
[   16.070328]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.070783]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.071151] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.071555]                                      ^
[   16.071762]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.072131]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.072431] ==================================================================
[   14.975109] ==================================================================
[   14.975362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   14.975628] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   14.975853] 
[   14.975945] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.975992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.976332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.976366] Call Trace:
[   14.976389]  <TASK>
[   14.976411]  dump_stack_lvl+0x73/0xb0
[   14.976445]  print_report+0xd1/0x650
[   14.976470]  ? __virt_addr_valid+0x1db/0x2d0
[   14.976510]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.976542]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.976566]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.976613]  kasan_report+0x141/0x180
[   14.976636]  ? kasan_atomics_helper+0x4b6e/0x5450
[   14.976664]  __asan_report_store4_noabort+0x1b/0x30
[   14.976692]  kasan_atomics_helper+0x4b6e/0x5450
[   14.976716]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.976750]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.976777]  ? kasan_atomics+0x152/0x310
[   14.976815]  kasan_atomics+0x1dc/0x310
[   14.976839]  ? __pfx_kasan_atomics+0x10/0x10
[   14.976865]  ? __pfx_read_tsc+0x10/0x10
[   14.976897]  ? ktime_get_ts64+0x86/0x230
[   14.976923]  kunit_try_run_case+0x1a5/0x480
[   14.976950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.977359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.977399]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.977436]  ? __kthread_parkme+0x82/0x180
[   14.977460]  ? preempt_count_sub+0x50/0x80
[   14.977497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.977535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.977562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.977597]  kthread+0x337/0x6f0
[   14.977627]  ? trace_preempt_on+0x20/0xc0
[   14.977653]  ? __pfx_kthread+0x10/0x10
[   14.977687]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.977717]  ? calculate_sigpending+0x7b/0xa0
[   14.977753]  ? __pfx_kthread+0x10/0x10
[   14.977777]  ret_from_fork+0x116/0x1d0
[   14.977797]  ? __pfx_kthread+0x10/0x10
[   14.977819]  ret_from_fork_asm+0x1a/0x30
[   14.977854]  </TASK>
[   14.977866] 
[   14.987445] Allocated by task 283:
[   14.987589]  kasan_save_stack+0x45/0x70
[   14.987756]  kasan_save_track+0x18/0x40
[   14.987894]  kasan_save_alloc_info+0x3b/0x50
[   14.988167]  __kasan_kmalloc+0xb7/0xc0
[   14.988376]  __kmalloc_cache_noprof+0x189/0x420
[   14.988731]  kasan_atomics+0x95/0x310
[   14.988964]  kunit_try_run_case+0x1a5/0x480
[   14.989185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.989444]  kthread+0x337/0x6f0
[   14.989687]  ret_from_fork+0x116/0x1d0
[   14.989898]  ret_from_fork_asm+0x1a/0x30
[   14.990155] 
[   14.990252] The buggy address belongs to the object at ffff888102ba6080
[   14.990252]  which belongs to the cache kmalloc-64 of size 64
[   14.990888] The buggy address is located 0 bytes to the right of
[   14.990888]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   14.991312] 
[   14.991385] The buggy address belongs to the physical page:
[   14.991556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   14.991805] flags: 0x200000000000000(node=0|zone=2)
[   14.992295] page_type: f5(slab)
[   14.992494] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.992892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.993518] page dumped because: kasan: bad access detected
[   14.993839] 
[   14.994018] Memory state around the buggy address:
[   14.994242]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.994650]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.995020] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.995355]                                      ^
[   14.995588]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.995898]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.996275] ==================================================================
[   15.262577] ==================================================================
[   15.262912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.263231] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.263988] 
[   15.264360] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.264410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.264423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.264446] Call Trace:
[   15.264507]  <TASK>
[   15.264540]  dump_stack_lvl+0x73/0xb0
[   15.264574]  print_report+0xd1/0x650
[   15.264597]  ? __virt_addr_valid+0x1db/0x2d0
[   15.264634]  ? kasan_atomics_helper+0x992/0x5450
[   15.264656]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.264681]  ? kasan_atomics_helper+0x992/0x5450
[   15.264704]  kasan_report+0x141/0x180
[   15.264726]  ? kasan_atomics_helper+0x992/0x5450
[   15.264755]  kasan_check_range+0x10c/0x1c0
[   15.264780]  __kasan_check_write+0x18/0x20
[   15.264801]  kasan_atomics_helper+0x992/0x5450
[   15.264826]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.264849]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.264876]  ? kasan_atomics+0x152/0x310
[   15.264904]  kasan_atomics+0x1dc/0x310
[   15.264927]  ? __pfx_kasan_atomics+0x10/0x10
[   15.264952]  ? __pfx_read_tsc+0x10/0x10
[   15.264975]  ? ktime_get_ts64+0x86/0x230
[   15.265001]  kunit_try_run_case+0x1a5/0x480
[   15.265026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.265051]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.265077]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.265103]  ? __kthread_parkme+0x82/0x180
[   15.265125]  ? preempt_count_sub+0x50/0x80
[   15.265150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.265176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.265202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.265229]  kthread+0x337/0x6f0
[   15.265248]  ? trace_preempt_on+0x20/0xc0
[   15.265274]  ? __pfx_kthread+0x10/0x10
[   15.265295]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.265318]  ? calculate_sigpending+0x7b/0xa0
[   15.265344]  ? __pfx_kthread+0x10/0x10
[   15.265367]  ret_from_fork+0x116/0x1d0
[   15.265386]  ? __pfx_kthread+0x10/0x10
[   15.265407]  ret_from_fork_asm+0x1a/0x30
[   15.265441]  </TASK>
[   15.265453] 
[   15.276800] Allocated by task 283:
[   15.276983]  kasan_save_stack+0x45/0x70
[   15.277175]  kasan_save_track+0x18/0x40
[   15.277357]  kasan_save_alloc_info+0x3b/0x50
[   15.277893]  __kasan_kmalloc+0xb7/0xc0
[   15.278133]  __kmalloc_cache_noprof+0x189/0x420
[   15.278455]  kasan_atomics+0x95/0x310
[   15.278834]  kunit_try_run_case+0x1a5/0x480
[   15.279140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.279485]  kthread+0x337/0x6f0
[   15.279762]  ret_from_fork+0x116/0x1d0
[   15.279947]  ret_from_fork_asm+0x1a/0x30
[   15.280134] 
[   15.280224] The buggy address belongs to the object at ffff888102ba6080
[   15.280224]  which belongs to the cache kmalloc-64 of size 64
[   15.281275] The buggy address is located 0 bytes to the right of
[   15.281275]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.282177] 
[   15.282431] The buggy address belongs to the physical page:
[   15.282945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.283446] flags: 0x200000000000000(node=0|zone=2)
[   15.283855] page_type: f5(slab)
[   15.284146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.284476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.285139] page dumped because: kasan: bad access detected
[   15.285389] 
[   15.285483] Memory state around the buggy address:
[   15.285924]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.286235]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.286706] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.287194]                                      ^
[   15.287530]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.288003]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.288294] ==================================================================
[   15.370353] ==================================================================
[   15.370764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.371211] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.371671] 
[   15.371802] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.372060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.372074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.372096] Call Trace:
[   15.372113]  <TASK>
[   15.372131]  dump_stack_lvl+0x73/0xb0
[   15.372198]  print_report+0xd1/0x650
[   15.372222]  ? __virt_addr_valid+0x1db/0x2d0
[   15.372246]  ? kasan_atomics_helper+0xc70/0x5450
[   15.372269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.372294]  ? kasan_atomics_helper+0xc70/0x5450
[   15.372317]  kasan_report+0x141/0x180
[   15.372340]  ? kasan_atomics_helper+0xc70/0x5450
[   15.372367]  kasan_check_range+0x10c/0x1c0
[   15.372393]  __kasan_check_write+0x18/0x20
[   15.372413]  kasan_atomics_helper+0xc70/0x5450
[   15.372436]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.372460]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.372486]  ? kasan_atomics+0x152/0x310
[   15.372514]  kasan_atomics+0x1dc/0x310
[   15.372537]  ? __pfx_kasan_atomics+0x10/0x10
[   15.372563]  ? __pfx_read_tsc+0x10/0x10
[   15.372585]  ? ktime_get_ts64+0x86/0x230
[   15.372621]  kunit_try_run_case+0x1a5/0x480
[   15.372647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.372672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.372697]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.372721]  ? __kthread_parkme+0x82/0x180
[   15.372743]  ? preempt_count_sub+0x50/0x80
[   15.372768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.372793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.372819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.372845]  kthread+0x337/0x6f0
[   15.372866]  ? trace_preempt_on+0x20/0xc0
[   15.372891]  ? __pfx_kthread+0x10/0x10
[   15.372913]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.372935]  ? calculate_sigpending+0x7b/0xa0
[   15.372960]  ? __pfx_kthread+0x10/0x10
[   15.372983]  ret_from_fork+0x116/0x1d0
[   15.373003]  ? __pfx_kthread+0x10/0x10
[   15.373024]  ret_from_fork_asm+0x1a/0x30
[   15.373058]  </TASK>
[   15.373069] 
[   15.384237] Allocated by task 283:
[   15.384530]  kasan_save_stack+0x45/0x70
[   15.384921]  kasan_save_track+0x18/0x40
[   15.385219]  kasan_save_alloc_info+0x3b/0x50
[   15.385565]  __kasan_kmalloc+0xb7/0xc0
[   15.385899]  __kmalloc_cache_noprof+0x189/0x420
[   15.386116]  kasan_atomics+0x95/0x310
[   15.386295]  kunit_try_run_case+0x1a5/0x480
[   15.386489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.387022]  kthread+0x337/0x6f0
[   15.387311]  ret_from_fork+0x116/0x1d0
[   15.387719]  ret_from_fork_asm+0x1a/0x30
[   15.388025] 
[   15.388135] The buggy address belongs to the object at ffff888102ba6080
[   15.388135]  which belongs to the cache kmalloc-64 of size 64
[   15.388898] The buggy address is located 0 bytes to the right of
[   15.388898]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.389787] 
[   15.389892] The buggy address belongs to the physical page:
[   15.390289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.390950] flags: 0x200000000000000(node=0|zone=2)
[   15.391255] page_type: f5(slab)
[   15.391531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.392074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.392396] page dumped because: kasan: bad access detected
[   15.392855] 
[   15.393095] Memory state around the buggy address:
[   15.393434]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.393964]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.394263] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.394841]                                      ^
[   15.395147]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.395646]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.396134] ==================================================================
[   15.829287] ==================================================================
[   15.829664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.830035] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.830342] 
[   15.830470] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.830545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.830559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.830582] Call Trace:
[   15.830619]  <TASK>
[   15.830637]  dump_stack_lvl+0x73/0xb0
[   15.830668]  print_report+0xd1/0x650
[   15.830692]  ? __virt_addr_valid+0x1db/0x2d0
[   15.830726]  ? kasan_atomics_helper+0x164f/0x5450
[   15.830748]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.830773]  ? kasan_atomics_helper+0x164f/0x5450
[   15.830807]  kasan_report+0x141/0x180
[   15.830830]  ? kasan_atomics_helper+0x164f/0x5450
[   15.830858]  kasan_check_range+0x10c/0x1c0
[   15.830892]  __kasan_check_write+0x18/0x20
[   15.830913]  kasan_atomics_helper+0x164f/0x5450
[   15.830937]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.830972]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.831000]  ? kasan_atomics+0x152/0x310
[   15.831028]  kasan_atomics+0x1dc/0x310
[   15.831062]  ? __pfx_kasan_atomics+0x10/0x10
[   15.831087]  ? __pfx_read_tsc+0x10/0x10
[   15.831110]  ? ktime_get_ts64+0x86/0x230
[   15.831136]  kunit_try_run_case+0x1a5/0x480
[   15.831171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.831195]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.831227]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.831253]  ? __kthread_parkme+0x82/0x180
[   15.831275]  ? preempt_count_sub+0x50/0x80
[   15.831301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.831326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.831353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.831379]  kthread+0x337/0x6f0
[   15.831399]  ? trace_preempt_on+0x20/0xc0
[   15.831424]  ? __pfx_kthread+0x10/0x10
[   15.831446]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.831468]  ? calculate_sigpending+0x7b/0xa0
[   15.831516]  ? __pfx_kthread+0x10/0x10
[   15.831539]  ret_from_fork+0x116/0x1d0
[   15.831559]  ? __pfx_kthread+0x10/0x10
[   15.831581]  ret_from_fork_asm+0x1a/0x30
[   15.831624]  </TASK>
[   15.831635] 
[   15.839147] Allocated by task 283:
[   15.839300]  kasan_save_stack+0x45/0x70
[   15.839446]  kasan_save_track+0x18/0x40
[   15.839616]  kasan_save_alloc_info+0x3b/0x50
[   15.839847]  __kasan_kmalloc+0xb7/0xc0
[   15.840034]  __kmalloc_cache_noprof+0x189/0x420
[   15.840258]  kasan_atomics+0x95/0x310
[   15.840446]  kunit_try_run_case+0x1a5/0x480
[   15.840687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.840923]  kthread+0x337/0x6f0
[   15.841045]  ret_from_fork+0x116/0x1d0
[   15.841219]  ret_from_fork_asm+0x1a/0x30
[   15.841429] 
[   15.841569] The buggy address belongs to the object at ffff888102ba6080
[   15.841569]  which belongs to the cache kmalloc-64 of size 64
[   15.842078] The buggy address is located 0 bytes to the right of
[   15.842078]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.842657] 
[   15.842760] The buggy address belongs to the physical page:
[   15.842980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.843318] flags: 0x200000000000000(node=0|zone=2)
[   15.843552] page_type: f5(slab)
[   15.843688] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.843917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.844147] page dumped because: kasan: bad access detected
[   15.844409] 
[   15.844538] Memory state around the buggy address:
[   15.844768]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.845081]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.845392] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.845733]                                      ^
[   15.845924]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.846219]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.846433] ==================================================================
[   15.397414] ==================================================================
[   15.397761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.398420] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.399110] 
[   15.399223] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.399365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.399381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.399404] Call Trace:
[   15.399422]  <TASK>
[   15.399441]  dump_stack_lvl+0x73/0xb0
[   15.399473]  print_report+0xd1/0x650
[   15.399514]  ? __virt_addr_valid+0x1db/0x2d0
[   15.399539]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.399562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.399587]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.399619]  kasan_report+0x141/0x180
[   15.399643]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.399670]  __asan_report_load4_noabort+0x18/0x20
[   15.399696]  kasan_atomics_helper+0x4a84/0x5450
[   15.399719]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.399743]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.399770]  ? kasan_atomics+0x152/0x310
[   15.399797]  kasan_atomics+0x1dc/0x310
[   15.399820]  ? __pfx_kasan_atomics+0x10/0x10
[   15.399845]  ? __pfx_read_tsc+0x10/0x10
[   15.399867]  ? ktime_get_ts64+0x86/0x230
[   15.399893]  kunit_try_run_case+0x1a5/0x480
[   15.399917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.399942]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.399968]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.399992]  ? __kthread_parkme+0x82/0x180
[   15.400014]  ? preempt_count_sub+0x50/0x80
[   15.400038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.400065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.400090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.400117]  kthread+0x337/0x6f0
[   15.400137]  ? trace_preempt_on+0x20/0xc0
[   15.400163]  ? __pfx_kthread+0x10/0x10
[   15.400185]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.400208]  ? calculate_sigpending+0x7b/0xa0
[   15.400234]  ? __pfx_kthread+0x10/0x10
[   15.400257]  ret_from_fork+0x116/0x1d0
[   15.400276]  ? __pfx_kthread+0x10/0x10
[   15.400298]  ret_from_fork_asm+0x1a/0x30
[   15.400331]  </TASK>
[   15.400342] 
[   15.407274] Allocated by task 283:
[   15.407461]  kasan_save_stack+0x45/0x70
[   15.407682]  kasan_save_track+0x18/0x40
[   15.407881]  kasan_save_alloc_info+0x3b/0x50
[   15.408327]  __kasan_kmalloc+0xb7/0xc0
[   15.408520]  __kmalloc_cache_noprof+0x189/0x420
[   15.408721]  kasan_atomics+0x95/0x310
[   15.408915]  kunit_try_run_case+0x1a5/0x480
[   15.409096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.409275]  kthread+0x337/0x6f0
[   15.409393]  ret_from_fork+0x116/0x1d0
[   15.409661]  ret_from_fork_asm+0x1a/0x30
[   15.409864] 
[   15.409956] The buggy address belongs to the object at ffff888102ba6080
[   15.409956]  which belongs to the cache kmalloc-64 of size 64
[   15.410420] The buggy address is located 0 bytes to the right of
[   15.410420]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.410895] 
[   15.411058] The buggy address belongs to the physical page:
[   15.411278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.411510] flags: 0x200000000000000(node=0|zone=2)
[   15.411960] page_type: f5(slab)
[   15.412143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.412408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.412974] page dumped because: kasan: bad access detected
[   15.413194] 
[   15.413288] Memory state around the buggy address:
[   15.413490]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.413781]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.414020] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.414232]                                      ^
[   15.414384]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.414662]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.414982] ==================================================================
[   15.811246] ==================================================================
[   15.811556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.811978] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.812317] 
[   15.812434] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.812480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.812513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.812536] Call Trace:
[   15.812554]  <TASK>
[   15.812575]  dump_stack_lvl+0x73/0xb0
[   15.812614]  print_report+0xd1/0x650
[   15.812648]  ? __virt_addr_valid+0x1db/0x2d0
[   15.812673]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.812695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.812731]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.812754]  kasan_report+0x141/0x180
[   15.812777]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.812805]  kasan_check_range+0x10c/0x1c0
[   15.812830]  __kasan_check_write+0x18/0x20
[   15.812851]  kasan_atomics_helper+0x15b6/0x5450
[   15.812875]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.812899]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.812937]  ? kasan_atomics+0x152/0x310
[   15.812964]  kasan_atomics+0x1dc/0x310
[   15.812998]  ? __pfx_kasan_atomics+0x10/0x10
[   15.813024]  ? __pfx_read_tsc+0x10/0x10
[   15.813046]  ? ktime_get_ts64+0x86/0x230
[   15.813073]  kunit_try_run_case+0x1a5/0x480
[   15.813098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.813122]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.813148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.813173]  ? __kthread_parkme+0x82/0x180
[   15.813195]  ? preempt_count_sub+0x50/0x80
[   15.813230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.813256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.813282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.813319]  kthread+0x337/0x6f0
[   15.813339]  ? trace_preempt_on+0x20/0xc0
[   15.813364]  ? __pfx_kthread+0x10/0x10
[   15.813387]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.813410]  ? calculate_sigpending+0x7b/0xa0
[   15.813435]  ? __pfx_kthread+0x10/0x10
[   15.813458]  ret_from_fork+0x116/0x1d0
[   15.813477]  ? __pfx_kthread+0x10/0x10
[   15.813518]  ret_from_fork_asm+0x1a/0x30
[   15.813551]  </TASK>
[   15.813562] 
[   15.821162] Allocated by task 283:
[   15.821347]  kasan_save_stack+0x45/0x70
[   15.821567]  kasan_save_track+0x18/0x40
[   15.821775]  kasan_save_alloc_info+0x3b/0x50
[   15.821929]  __kasan_kmalloc+0xb7/0xc0
[   15.822063]  __kmalloc_cache_noprof+0x189/0x420
[   15.822309]  kasan_atomics+0x95/0x310
[   15.822515]  kunit_try_run_case+0x1a5/0x480
[   15.822733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.822987]  kthread+0x337/0x6f0
[   15.823149]  ret_from_fork+0x116/0x1d0
[   15.823282]  ret_from_fork_asm+0x1a/0x30
[   15.823448] 
[   15.823568] The buggy address belongs to the object at ffff888102ba6080
[   15.823568]  which belongs to the cache kmalloc-64 of size 64
[   15.824107] The buggy address is located 0 bytes to the right of
[   15.824107]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.824477] 
[   15.824569] The buggy address belongs to the physical page:
[   15.824830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.825242] flags: 0x200000000000000(node=0|zone=2)
[   15.825535] page_type: f5(slab)
[   15.825713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.826054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.826314] page dumped because: kasan: bad access detected
[   15.826509] 
[   15.826584] Memory state around the buggy address:
[   15.826824]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.827170]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.827534] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.827855]                                      ^
[   15.828025]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.828240]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.828526] ==================================================================
[   15.103245] ==================================================================
[   15.103952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.104194] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.104461] 
[   15.104568] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.104619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.104631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.104653] Call Trace:
[   15.104671]  <TASK>
[   15.104687]  dump_stack_lvl+0x73/0xb0
[   15.104717]  print_report+0xd1/0x650
[   15.104740]  ? __virt_addr_valid+0x1db/0x2d0
[   15.104831]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.104857]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.104883]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.104917]  kasan_report+0x141/0x180
[   15.104977]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.105005]  kasan_check_range+0x10c/0x1c0
[   15.105030]  __kasan_check_write+0x18/0x20
[   15.105051]  kasan_atomics_helper+0x5fe/0x5450
[   15.105076]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.105109]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.105137]  ? kasan_atomics+0x152/0x310
[   15.105163]  kasan_atomics+0x1dc/0x310
[   15.105198]  ? __pfx_kasan_atomics+0x10/0x10
[   15.105224]  ? __pfx_read_tsc+0x10/0x10
[   15.105246]  ? ktime_get_ts64+0x86/0x230
[   15.105281]  kunit_try_run_case+0x1a5/0x480
[   15.105306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.105340]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.105366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.105392]  ? __kthread_parkme+0x82/0x180
[   15.105413]  ? preempt_count_sub+0x50/0x80
[   15.105438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.105464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.105490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.105516]  kthread+0x337/0x6f0
[   15.105536]  ? trace_preempt_on+0x20/0xc0
[   15.105561]  ? __pfx_kthread+0x10/0x10
[   15.105583]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.105615]  ? calculate_sigpending+0x7b/0xa0
[   15.105651]  ? __pfx_kthread+0x10/0x10
[   15.105673]  ret_from_fork+0x116/0x1d0
[   15.105694]  ? __pfx_kthread+0x10/0x10
[   15.105729]  ret_from_fork_asm+0x1a/0x30
[   15.105763]  </TASK>
[   15.105774] 
[   15.114278] Allocated by task 283:
[   15.114566]  kasan_save_stack+0x45/0x70
[   15.114842]  kasan_save_track+0x18/0x40
[   15.115154]  kasan_save_alloc_info+0x3b/0x50
[   15.115312]  __kasan_kmalloc+0xb7/0xc0
[   15.115497]  __kmalloc_cache_noprof+0x189/0x420
[   15.115747]  kasan_atomics+0x95/0x310
[   15.115979]  kunit_try_run_case+0x1a5/0x480
[   15.116234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.116475]  kthread+0x337/0x6f0
[   15.116680]  ret_from_fork+0x116/0x1d0
[   15.116877]  ret_from_fork_asm+0x1a/0x30
[   15.117139] 
[   15.117224] The buggy address belongs to the object at ffff888102ba6080
[   15.117224]  which belongs to the cache kmalloc-64 of size 64
[   15.117693] The buggy address is located 0 bytes to the right of
[   15.117693]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.118060] 
[   15.118151] The buggy address belongs to the physical page:
[   15.118455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.119379] flags: 0x200000000000000(node=0|zone=2)
[   15.119707] page_type: f5(slab)
[   15.119871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.120203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.120435] page dumped because: kasan: bad access detected
[   15.120639] 
[   15.120736] Memory state around the buggy address:
[   15.120979]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.121350]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.121779] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.122126]                                      ^
[   15.122286]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.122743]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.123103] ==================================================================
[   15.940059] ==================================================================
[   15.940414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   15.940795] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.941202] 
[   15.941372] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.941440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.941453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.941476] Call Trace:
[   15.941517]  <TASK>
[   15.941534]  dump_stack_lvl+0x73/0xb0
[   15.941563]  print_report+0xd1/0x650
[   15.941586]  ? __virt_addr_valid+0x1db/0x2d0
[   15.941623]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.941645]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.941670]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.941694]  kasan_report+0x141/0x180
[   15.941720]  ? kasan_atomics_helper+0x19e3/0x5450
[   15.941748]  kasan_check_range+0x10c/0x1c0
[   15.941804]  __kasan_check_write+0x18/0x20
[   15.941824]  kasan_atomics_helper+0x19e3/0x5450
[   15.941849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.941883]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.941910]  ? kasan_atomics+0x152/0x310
[   15.941937]  kasan_atomics+0x1dc/0x310
[   15.941960]  ? __pfx_kasan_atomics+0x10/0x10
[   15.941986]  ? __pfx_read_tsc+0x10/0x10
[   15.942008]  ? ktime_get_ts64+0x86/0x230
[   15.942034]  kunit_try_run_case+0x1a5/0x480
[   15.942058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.942083]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.942107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.942133]  ? __kthread_parkme+0x82/0x180
[   15.942155]  ? preempt_count_sub+0x50/0x80
[   15.942181]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.942207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.942233]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.942259]  kthread+0x337/0x6f0
[   15.942279]  ? trace_preempt_on+0x20/0xc0
[   15.942304]  ? __pfx_kthread+0x10/0x10
[   15.942326]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.942349]  ? calculate_sigpending+0x7b/0xa0
[   15.942374]  ? __pfx_kthread+0x10/0x10
[   15.942397]  ret_from_fork+0x116/0x1d0
[   15.942417]  ? __pfx_kthread+0x10/0x10
[   15.942439]  ret_from_fork_asm+0x1a/0x30
[   15.942471]  </TASK>
[   15.942483] 
[   15.954834] Allocated by task 283:
[   15.955197]  kasan_save_stack+0x45/0x70
[   15.955626]  kasan_save_track+0x18/0x40
[   15.956012]  kasan_save_alloc_info+0x3b/0x50
[   15.956438]  __kasan_kmalloc+0xb7/0xc0
[   15.956710]  __kmalloc_cache_noprof+0x189/0x420
[   15.956871]  kasan_atomics+0x95/0x310
[   15.957005]  kunit_try_run_case+0x1a5/0x480
[   15.957152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.957329]  kthread+0x337/0x6f0
[   15.957452]  ret_from_fork+0x116/0x1d0
[   15.957848]  ret_from_fork_asm+0x1a/0x30
[   15.958209] 
[   15.958448] The buggy address belongs to the object at ffff888102ba6080
[   15.958448]  which belongs to the cache kmalloc-64 of size 64
[   15.959562] The buggy address is located 0 bytes to the right of
[   15.959562]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.960706] 
[   15.960906] The buggy address belongs to the physical page:
[   15.961405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.962134] flags: 0x200000000000000(node=0|zone=2)
[   15.962623] page_type: f5(slab)
[   15.962810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.963042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.963270] page dumped because: kasan: bad access detected
[   15.963441] 
[   15.963581] Memory state around the buggy address:
[   15.964040]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.964695]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.965320] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.965976]                                      ^
[   15.966424]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.967090]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.967697] ==================================================================
[   15.469971] ==================================================================
[   15.470369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.470738] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.471017] 
[   15.471150] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.471195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.471207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.471230] Call Trace:
[   15.471250]  <TASK>
[   15.471271]  dump_stack_lvl+0x73/0xb0
[   15.471301]  print_report+0xd1/0x650
[   15.471325]  ? __virt_addr_valid+0x1db/0x2d0
[   15.471350]  ? kasan_atomics_helper+0xf10/0x5450
[   15.471373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.471397]  ? kasan_atomics_helper+0xf10/0x5450
[   15.471420]  kasan_report+0x141/0x180
[   15.471443]  ? kasan_atomics_helper+0xf10/0x5450
[   15.471470]  kasan_check_range+0x10c/0x1c0
[   15.471495]  __kasan_check_write+0x18/0x20
[   15.471547]  kasan_atomics_helper+0xf10/0x5450
[   15.471572]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.471596]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.471634]  ? kasan_atomics+0x152/0x310
[   15.471661]  kasan_atomics+0x1dc/0x310
[   15.471685]  ? __pfx_kasan_atomics+0x10/0x10
[   15.471710]  ? __pfx_read_tsc+0x10/0x10
[   15.471732]  ? ktime_get_ts64+0x86/0x230
[   15.471760]  kunit_try_run_case+0x1a5/0x480
[   15.471787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.471811]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.471837]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.471863]  ? __kthread_parkme+0x82/0x180
[   15.471885]  ? preempt_count_sub+0x50/0x80
[   15.471911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.471937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.471964]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.471990]  kthread+0x337/0x6f0
[   15.472009]  ? trace_preempt_on+0x20/0xc0
[   15.472034]  ? __pfx_kthread+0x10/0x10
[   15.472075]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.472098]  ? calculate_sigpending+0x7b/0xa0
[   15.472124]  ? __pfx_kthread+0x10/0x10
[   15.472147]  ret_from_fork+0x116/0x1d0
[   15.472166]  ? __pfx_kthread+0x10/0x10
[   15.472187]  ret_from_fork_asm+0x1a/0x30
[   15.472221]  </TASK>
[   15.472232] 
[   15.479774] Allocated by task 283:
[   15.479915]  kasan_save_stack+0x45/0x70
[   15.480063]  kasan_save_track+0x18/0x40
[   15.480310]  kasan_save_alloc_info+0x3b/0x50
[   15.480544]  __kasan_kmalloc+0xb7/0xc0
[   15.480750]  __kmalloc_cache_noprof+0x189/0x420
[   15.481225]  kasan_atomics+0x95/0x310
[   15.481441]  kunit_try_run_case+0x1a5/0x480
[   15.481727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.481978]  kthread+0x337/0x6f0
[   15.482135]  ret_from_fork+0x116/0x1d0
[   15.482269]  ret_from_fork_asm+0x1a/0x30
[   15.482453] 
[   15.482621] The buggy address belongs to the object at ffff888102ba6080
[   15.482621]  which belongs to the cache kmalloc-64 of size 64
[   15.483132] The buggy address is located 0 bytes to the right of
[   15.483132]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.483729] 
[   15.483814] The buggy address belongs to the physical page:
[   15.483985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.484221] flags: 0x200000000000000(node=0|zone=2)
[   15.484385] page_type: f5(slab)
[   15.484506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.484842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.485177] page dumped because: kasan: bad access detected
[   15.485427] 
[   15.485521] Memory state around the buggy address:
[   15.485729]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.485945]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.486158] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.486368]                                      ^
[   15.486567]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.486897]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.487245] ==================================================================
[   15.529781] ==================================================================
[   15.530366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.530724] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.531022] 
[   15.531120] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.531165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.531178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.531201] Call Trace:
[   15.531221]  <TASK>
[   15.531241]  dump_stack_lvl+0x73/0xb0
[   15.531271]  print_report+0xd1/0x650
[   15.531294]  ? __virt_addr_valid+0x1db/0x2d0
[   15.531318]  ? kasan_atomics_helper+0x1079/0x5450
[   15.531341]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.531365]  ? kasan_atomics_helper+0x1079/0x5450
[   15.531389]  kasan_report+0x141/0x180
[   15.531412]  ? kasan_atomics_helper+0x1079/0x5450
[   15.531439]  kasan_check_range+0x10c/0x1c0
[   15.531464]  __kasan_check_write+0x18/0x20
[   15.531486]  kasan_atomics_helper+0x1079/0x5450
[   15.531522]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.531546]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.531573]  ? kasan_atomics+0x152/0x310
[   15.531611]  kasan_atomics+0x1dc/0x310
[   15.531635]  ? __pfx_kasan_atomics+0x10/0x10
[   15.531660]  ? __pfx_read_tsc+0x10/0x10
[   15.531683]  ? ktime_get_ts64+0x86/0x230
[   15.531709]  kunit_try_run_case+0x1a5/0x480
[   15.531735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.531759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.531785]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.531810]  ? __kthread_parkme+0x82/0x180
[   15.531831]  ? preempt_count_sub+0x50/0x80
[   15.531857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.531883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.531909]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.531935]  kthread+0x337/0x6f0
[   15.531955]  ? trace_preempt_on+0x20/0xc0
[   15.531980]  ? __pfx_kthread+0x10/0x10
[   15.532002]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.532024]  ? calculate_sigpending+0x7b/0xa0
[   15.532051]  ? __pfx_kthread+0x10/0x10
[   15.532075]  ret_from_fork+0x116/0x1d0
[   15.532096]  ? __pfx_kthread+0x10/0x10
[   15.532118]  ret_from_fork_asm+0x1a/0x30
[   15.532153]  </TASK>
[   15.532164] 
[   15.539429] Allocated by task 283:
[   15.539732]  kasan_save_stack+0x45/0x70
[   15.539929]  kasan_save_track+0x18/0x40
[   15.540106]  kasan_save_alloc_info+0x3b/0x50
[   15.540305]  __kasan_kmalloc+0xb7/0xc0
[   15.540484]  __kmalloc_cache_noprof+0x189/0x420
[   15.540687]  kasan_atomics+0x95/0x310
[   15.540821]  kunit_try_run_case+0x1a5/0x480
[   15.540969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.541226]  kthread+0x337/0x6f0
[   15.541398]  ret_from_fork+0x116/0x1d0
[   15.541589]  ret_from_fork_asm+0x1a/0x30
[   15.541801] 
[   15.541883] The buggy address belongs to the object at ffff888102ba6080
[   15.541883]  which belongs to the cache kmalloc-64 of size 64
[   15.542283] The buggy address is located 0 bytes to the right of
[   15.542283]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.542655] 
[   15.542728] The buggy address belongs to the physical page:
[   15.542963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.543309] flags: 0x200000000000000(node=0|zone=2)
[   15.543613] page_type: f5(slab)
[   15.543784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.544119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.544402] page dumped because: kasan: bad access detected
[   15.544698] 
[   15.544792] Memory state around the buggy address:
[   15.545016]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.545244]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.545495] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.545799]                                      ^
[   15.546003]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.546287]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.547209] ==================================================================
[   15.123735] ==================================================================
[   15.124229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.124510] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.124857] 
[   15.124972] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.125015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.125028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.125051] Call Trace:
[   15.125065]  <TASK>
[   15.125082]  dump_stack_lvl+0x73/0xb0
[   15.125113]  print_report+0xd1/0x650
[   15.125136]  ? __virt_addr_valid+0x1db/0x2d0
[   15.125161]  ? kasan_atomics_helper+0x697/0x5450
[   15.125232]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.125259]  ? kasan_atomics_helper+0x697/0x5450
[   15.125282]  kasan_report+0x141/0x180
[   15.125318]  ? kasan_atomics_helper+0x697/0x5450
[   15.125346]  kasan_check_range+0x10c/0x1c0
[   15.125371]  __kasan_check_write+0x18/0x20
[   15.125404]  kasan_atomics_helper+0x697/0x5450
[   15.125428]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.125452]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.125487]  ? kasan_atomics+0x152/0x310
[   15.125515]  kasan_atomics+0x1dc/0x310
[   15.125538]  ? __pfx_kasan_atomics+0x10/0x10
[   15.125584]  ? __pfx_read_tsc+0x10/0x10
[   15.125616]  ? ktime_get_ts64+0x86/0x230
[   15.125644]  kunit_try_run_case+0x1a5/0x480
[   15.125669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.125701]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.125731]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.125766]  ? __kthread_parkme+0x82/0x180
[   15.125787]  ? preempt_count_sub+0x50/0x80
[   15.125813]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.125838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.125864]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.125890]  kthread+0x337/0x6f0
[   15.125909]  ? trace_preempt_on+0x20/0xc0
[   15.125970]  ? __pfx_kthread+0x10/0x10
[   15.125992]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.126016]  ? calculate_sigpending+0x7b/0xa0
[   15.126042]  ? __pfx_kthread+0x10/0x10
[   15.126065]  ret_from_fork+0x116/0x1d0
[   15.126094]  ? __pfx_kthread+0x10/0x10
[   15.126116]  ret_from_fork_asm+0x1a/0x30
[   15.126149]  </TASK>
[   15.126172] 
[   15.134313] Allocated by task 283:
[   15.134529]  kasan_save_stack+0x45/0x70
[   15.134727]  kasan_save_track+0x18/0x40
[   15.134941]  kasan_save_alloc_info+0x3b/0x50
[   15.135210]  __kasan_kmalloc+0xb7/0xc0
[   15.135402]  __kmalloc_cache_noprof+0x189/0x420
[   15.135637]  kasan_atomics+0x95/0x310
[   15.135772]  kunit_try_run_case+0x1a5/0x480
[   15.136223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.136499]  kthread+0x337/0x6f0
[   15.136690]  ret_from_fork+0x116/0x1d0
[   15.136884]  ret_from_fork_asm+0x1a/0x30
[   15.137147] 
[   15.137251] The buggy address belongs to the object at ffff888102ba6080
[   15.137251]  which belongs to the cache kmalloc-64 of size 64
[   15.137781] The buggy address is located 0 bytes to the right of
[   15.137781]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.138391] 
[   15.138489] The buggy address belongs to the physical page:
[   15.138755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.139161] flags: 0x200000000000000(node=0|zone=2)
[   15.139431] page_type: f5(slab)
[   15.139664] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.140093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.140374] page dumped because: kasan: bad access detected
[   15.140725] 
[   15.140811] Memory state around the buggy address:
[   15.140980]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.141198]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.141412] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.141893]                                      ^
[   15.142255]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.142792]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.143112] ==================================================================
[   15.451596] ==================================================================
[   15.451861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.452318] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.452541] 
[   15.452641] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.452686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.452699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.452722] Call Trace:
[   15.452742]  <TASK>
[   15.452762]  dump_stack_lvl+0x73/0xb0
[   15.452792]  print_report+0xd1/0x650
[   15.452814]  ? __virt_addr_valid+0x1db/0x2d0
[   15.452838]  ? kasan_atomics_helper+0xe78/0x5450
[   15.452861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.452885]  ? kasan_atomics_helper+0xe78/0x5450
[   15.452908]  kasan_report+0x141/0x180
[   15.452930]  ? kasan_atomics_helper+0xe78/0x5450
[   15.452958]  kasan_check_range+0x10c/0x1c0
[   15.452983]  __kasan_check_write+0x18/0x20
[   15.453003]  kasan_atomics_helper+0xe78/0x5450
[   15.453027]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.453051]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.453088]  ? kasan_atomics+0x152/0x310
[   15.453115]  kasan_atomics+0x1dc/0x310
[   15.453139]  ? __pfx_kasan_atomics+0x10/0x10
[   15.453165]  ? __pfx_read_tsc+0x10/0x10
[   15.453187]  ? ktime_get_ts64+0x86/0x230
[   15.453214]  kunit_try_run_case+0x1a5/0x480
[   15.453239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.453265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.453291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.453316]  ? __kthread_parkme+0x82/0x180
[   15.453338]  ? preempt_count_sub+0x50/0x80
[   15.453364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.453389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.453415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.453441]  kthread+0x337/0x6f0
[   15.453461]  ? trace_preempt_on+0x20/0xc0
[   15.453487]  ? __pfx_kthread+0x10/0x10
[   15.453515]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.453538]  ? calculate_sigpending+0x7b/0xa0
[   15.453564]  ? __pfx_kthread+0x10/0x10
[   15.453586]  ret_from_fork+0x116/0x1d0
[   15.453616]  ? __pfx_kthread+0x10/0x10
[   15.453638]  ret_from_fork_asm+0x1a/0x30
[   15.453671]  </TASK>
[   15.453683] 
[   15.461514] Allocated by task 283:
[   15.461720]  kasan_save_stack+0x45/0x70
[   15.461899]  kasan_save_track+0x18/0x40
[   15.462035]  kasan_save_alloc_info+0x3b/0x50
[   15.462185]  __kasan_kmalloc+0xb7/0xc0
[   15.462316]  __kmalloc_cache_noprof+0x189/0x420
[   15.462473]  kasan_atomics+0x95/0x310
[   15.462693]  kunit_try_run_case+0x1a5/0x480
[   15.462904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.463158]  kthread+0x337/0x6f0
[   15.463327]  ret_from_fork+0x116/0x1d0
[   15.463518]  ret_from_fork_asm+0x1a/0x30
[   15.463733] 
[   15.463828] The buggy address belongs to the object at ffff888102ba6080
[   15.463828]  which belongs to the cache kmalloc-64 of size 64
[   15.464322] The buggy address is located 0 bytes to the right of
[   15.464322]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.465127] 
[   15.465211] The buggy address belongs to the physical page:
[   15.465436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.465834] flags: 0x200000000000000(node=0|zone=2)
[   15.466063] page_type: f5(slab)
[   15.466248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.466478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.466864] page dumped because: kasan: bad access detected
[   15.467115] 
[   15.467192] Memory state around the buggy address:
[   15.467408]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.467664]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.468246] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.468513]                                      ^
[   15.468746]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.468961]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.469248] ==================================================================
[   16.301368] ==================================================================
[   16.302189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.302698] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.303022] 
[   16.303235] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.303315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.303328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.303360] Call Trace:
[   16.303376]  <TASK>
[   16.303393]  dump_stack_lvl+0x73/0xb0
[   16.303422]  print_report+0xd1/0x650
[   16.303446]  ? __virt_addr_valid+0x1db/0x2d0
[   16.303469]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.303492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.303516]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.303567]  kasan_report+0x141/0x180
[   16.303589]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.303635]  __asan_report_load8_noabort+0x18/0x20
[   16.303662]  kasan_atomics_helper+0x4fa5/0x5450
[   16.303686]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.303710]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.303736]  ? kasan_atomics+0x152/0x310
[   16.303763]  kasan_atomics+0x1dc/0x310
[   16.303787]  ? __pfx_kasan_atomics+0x10/0x10
[   16.303812]  ? __pfx_read_tsc+0x10/0x10
[   16.303834]  ? ktime_get_ts64+0x86/0x230
[   16.303858]  kunit_try_run_case+0x1a5/0x480
[   16.303883]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.303907]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.303962]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.303988]  ? __kthread_parkme+0x82/0x180
[   16.304032]  ? preempt_count_sub+0x50/0x80
[   16.304058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.304083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.304109]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.304136]  kthread+0x337/0x6f0
[   16.304155]  ? trace_preempt_on+0x20/0xc0
[   16.304180]  ? __pfx_kthread+0x10/0x10
[   16.304201]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.304224]  ? calculate_sigpending+0x7b/0xa0
[   16.304250]  ? __pfx_kthread+0x10/0x10
[   16.304273]  ret_from_fork+0x116/0x1d0
[   16.304292]  ? __pfx_kthread+0x10/0x10
[   16.304314]  ret_from_fork_asm+0x1a/0x30
[   16.304346]  </TASK>
[   16.304356] 
[   16.317198] Allocated by task 283:
[   16.317550]  kasan_save_stack+0x45/0x70
[   16.318088]  kasan_save_track+0x18/0x40
[   16.318568]  kasan_save_alloc_info+0x3b/0x50
[   16.319001]  __kasan_kmalloc+0xb7/0xc0
[   16.319301]  __kmalloc_cache_noprof+0x189/0x420
[   16.319621]  kasan_atomics+0x95/0x310
[   16.319759]  kunit_try_run_case+0x1a5/0x480
[   16.319910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.320089]  kthread+0x337/0x6f0
[   16.320210]  ret_from_fork+0x116/0x1d0
[   16.320342]  ret_from_fork_asm+0x1a/0x30
[   16.320482] 
[   16.320657] The buggy address belongs to the object at ffff888102ba6080
[   16.320657]  which belongs to the cache kmalloc-64 of size 64
[   16.321842] The buggy address is located 0 bytes to the right of
[   16.321842]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.323025] 
[   16.323214] The buggy address belongs to the physical page:
[   16.323789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.324475] flags: 0x200000000000000(node=0|zone=2)
[   16.324953] page_type: f5(slab)
[   16.325281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.325992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.326636] page dumped because: kasan: bad access detected
[   16.326811] 
[   16.326879] Memory state around the buggy address:
[   16.327035]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.327252]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.327472] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.327710]                                      ^
[   16.327965]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.328332]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.328697] ==================================================================
[   15.175457] ==================================================================
[   15.176427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.177204] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.177682] 
[   15.177952] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.178161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.178178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.178201] Call Trace:
[   15.178220]  <TASK>
[   15.178240]  dump_stack_lvl+0x73/0xb0
[   15.178273]  print_report+0xd1/0x650
[   15.178297]  ? __virt_addr_valid+0x1db/0x2d0
[   15.178321]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.178343]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.178368]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.178391]  kasan_report+0x141/0x180
[   15.178413]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.178441]  kasan_check_range+0x10c/0x1c0
[   15.178466]  __kasan_check_write+0x18/0x20
[   15.178488]  kasan_atomics_helper+0x7c7/0x5450
[   15.178646]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.178675]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.178715]  ? kasan_atomics+0x152/0x310
[   15.178742]  kasan_atomics+0x1dc/0x310
[   15.178803]  ? __pfx_kasan_atomics+0x10/0x10
[   15.178832]  ? __pfx_read_tsc+0x10/0x10
[   15.178854]  ? ktime_get_ts64+0x86/0x230
[   15.178880]  kunit_try_run_case+0x1a5/0x480
[   15.178904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.178945]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.178971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.178996]  ? __kthread_parkme+0x82/0x180
[   15.179017]  ? preempt_count_sub+0x50/0x80
[   15.179043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.179069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.179094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.179121]  kthread+0x337/0x6f0
[   15.179141]  ? trace_preempt_on+0x20/0xc0
[   15.179166]  ? __pfx_kthread+0x10/0x10
[   15.179187]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.179210]  ? calculate_sigpending+0x7b/0xa0
[   15.179236]  ? __pfx_kthread+0x10/0x10
[   15.179258]  ret_from_fork+0x116/0x1d0
[   15.179277]  ? __pfx_kthread+0x10/0x10
[   15.179299]  ret_from_fork_asm+0x1a/0x30
[   15.179332]  </TASK>
[   15.179342] 
[   15.191777] Allocated by task 283:
[   15.192094]  kasan_save_stack+0x45/0x70
[   15.192367]  kasan_save_track+0x18/0x40
[   15.192717]  kasan_save_alloc_info+0x3b/0x50
[   15.193094]  __kasan_kmalloc+0xb7/0xc0
[   15.193281]  __kmalloc_cache_noprof+0x189/0x420
[   15.193495]  kasan_atomics+0x95/0x310
[   15.193947]  kunit_try_run_case+0x1a5/0x480
[   15.194163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.194401]  kthread+0x337/0x6f0
[   15.194849]  ret_from_fork+0x116/0x1d0
[   15.195115]  ret_from_fork_asm+0x1a/0x30
[   15.195440] 
[   15.195679] The buggy address belongs to the object at ffff888102ba6080
[   15.195679]  which belongs to the cache kmalloc-64 of size 64
[   15.196768] The buggy address is located 0 bytes to the right of
[   15.196768]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.197956] 
[   15.198271] The buggy address belongs to the physical page:
[   15.198741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.199329] flags: 0x200000000000000(node=0|zone=2)
[   15.199830] page_type: f5(slab)
[   15.200150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.200737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.201288] page dumped because: kasan: bad access detected
[   15.201966] 
[   15.202057] Memory state around the buggy address:
[   15.202283]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.202888]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.203426] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.204025]                                      ^
[   15.204238]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.204781]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.205225] ==================================================================
[   15.343404] ==================================================================
[   15.344083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.344409] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.345109] 
[   15.345213] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.345470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.345485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.345509] Call Trace:
[   15.345530]  <TASK>
[   15.345558]  dump_stack_lvl+0x73/0xb0
[   15.345648]  print_report+0xd1/0x650
[   15.345673]  ? __virt_addr_valid+0x1db/0x2d0
[   15.345697]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.345724]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.345749]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.345771]  kasan_report+0x141/0x180
[   15.345795]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.345822]  kasan_check_range+0x10c/0x1c0
[   15.345846]  __kasan_check_write+0x18/0x20
[   15.345867]  kasan_atomics_helper+0xb6a/0x5450
[   15.345890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.345914]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.345942]  ? kasan_atomics+0x152/0x310
[   15.345969]  kasan_atomics+0x1dc/0x310
[   15.345992]  ? __pfx_kasan_atomics+0x10/0x10
[   15.346018]  ? __pfx_read_tsc+0x10/0x10
[   15.346039]  ? ktime_get_ts64+0x86/0x230
[   15.346066]  kunit_try_run_case+0x1a5/0x480
[   15.346092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.346116]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.346143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.346168]  ? __kthread_parkme+0x82/0x180
[   15.346190]  ? preempt_count_sub+0x50/0x80
[   15.346215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.346241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.346266]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.346293]  kthread+0x337/0x6f0
[   15.346312]  ? trace_preempt_on+0x20/0xc0
[   15.346338]  ? __pfx_kthread+0x10/0x10
[   15.346359]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.346382]  ? calculate_sigpending+0x7b/0xa0
[   15.346409]  ? __pfx_kthread+0x10/0x10
[   15.346432]  ret_from_fork+0x116/0x1d0
[   15.346451]  ? __pfx_kthread+0x10/0x10
[   15.346472]  ret_from_fork_asm+0x1a/0x30
[   15.346506]  </TASK>
[   15.346517] 
[   15.357070] Allocated by task 283:
[   15.357505]  kasan_save_stack+0x45/0x70
[   15.357805]  kasan_save_track+0x18/0x40
[   15.358179]  kasan_save_alloc_info+0x3b/0x50
[   15.358500]  __kasan_kmalloc+0xb7/0xc0
[   15.358895]  __kmalloc_cache_noprof+0x189/0x420
[   15.359216]  kasan_atomics+0x95/0x310
[   15.359582]  kunit_try_run_case+0x1a5/0x480
[   15.359917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.360350]  kthread+0x337/0x6f0
[   15.360654]  ret_from_fork+0x116/0x1d0
[   15.360849]  ret_from_fork_asm+0x1a/0x30
[   15.361038] 
[   15.361125] The buggy address belongs to the object at ffff888102ba6080
[   15.361125]  which belongs to the cache kmalloc-64 of size 64
[   15.361887] The buggy address is located 0 bytes to the right of
[   15.361887]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.362933] 
[   15.363024] The buggy address belongs to the physical page:
[   15.363422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.363889] flags: 0x200000000000000(node=0|zone=2)
[   15.364114] page_type: f5(slab)
[   15.364268] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.364868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.365365] page dumped because: kasan: bad access detected
[   15.365837] 
[   15.365943] Memory state around the buggy address:
[   15.366346]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.366846]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.367274] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.367838]                                      ^
[   15.368125]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.368788]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.369223] ==================================================================
[   15.433694] ==================================================================
[   15.433933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.434665] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.435002] 
[   15.435115] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.435159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.435172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.435194] Call Trace:
[   15.435211]  <TASK>
[   15.435227]  dump_stack_lvl+0x73/0xb0
[   15.435257]  print_report+0xd1/0x650
[   15.435281]  ? __virt_addr_valid+0x1db/0x2d0
[   15.435305]  ? kasan_atomics_helper+0xde0/0x5450
[   15.435328]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.435352]  ? kasan_atomics_helper+0xde0/0x5450
[   15.435375]  kasan_report+0x141/0x180
[   15.435398]  ? kasan_atomics_helper+0xde0/0x5450
[   15.435426]  kasan_check_range+0x10c/0x1c0
[   15.435451]  __kasan_check_write+0x18/0x20
[   15.435472]  kasan_atomics_helper+0xde0/0x5450
[   15.435496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.435533]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.435562]  ? kasan_atomics+0x152/0x310
[   15.435591]  kasan_atomics+0x1dc/0x310
[   15.435626]  ? __pfx_kasan_atomics+0x10/0x10
[   15.435651]  ? __pfx_read_tsc+0x10/0x10
[   15.435674]  ? ktime_get_ts64+0x86/0x230
[   15.435700]  kunit_try_run_case+0x1a5/0x480
[   15.435725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.435750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.435777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.435802]  ? __kthread_parkme+0x82/0x180
[   15.435824]  ? preempt_count_sub+0x50/0x80
[   15.435849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.435875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.435900]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.435926]  kthread+0x337/0x6f0
[   15.435946]  ? trace_preempt_on+0x20/0xc0
[   15.435972]  ? __pfx_kthread+0x10/0x10
[   15.435993]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.436015]  ? calculate_sigpending+0x7b/0xa0
[   15.436041]  ? __pfx_kthread+0x10/0x10
[   15.436064]  ret_from_fork+0x116/0x1d0
[   15.436083]  ? __pfx_kthread+0x10/0x10
[   15.436105]  ret_from_fork_asm+0x1a/0x30
[   15.436137]  </TASK>
[   15.436147] 
[   15.443621] Allocated by task 283:
[   15.443794]  kasan_save_stack+0x45/0x70
[   15.443997]  kasan_save_track+0x18/0x40
[   15.444191]  kasan_save_alloc_info+0x3b/0x50
[   15.444404]  __kasan_kmalloc+0xb7/0xc0
[   15.444711]  __kmalloc_cache_noprof+0x189/0x420
[   15.444885]  kasan_atomics+0x95/0x310
[   15.445018]  kunit_try_run_case+0x1a5/0x480
[   15.445164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.445339]  kthread+0x337/0x6f0
[   15.445462]  ret_from_fork+0x116/0x1d0
[   15.445610]  ret_from_fork_asm+0x1a/0x30
[   15.445816] 
[   15.445911] The buggy address belongs to the object at ffff888102ba6080
[   15.445911]  which belongs to the cache kmalloc-64 of size 64
[   15.446431] The buggy address is located 0 bytes to the right of
[   15.446431]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.446855] 
[   15.446953] The buggy address belongs to the physical page:
[   15.447207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.447516] flags: 0x200000000000000(node=0|zone=2)
[   15.447757] page_type: f5(slab)
[   15.447878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.448107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.448341] page dumped because: kasan: bad access detected
[   15.448590] 
[   15.448694] Memory state around the buggy address:
[   15.448919]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.449245]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.449673] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.449999]                                      ^
[   15.450231]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.450591]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.450893] ==================================================================
[   15.771811] ==================================================================
[   15.772282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.772719] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.773016] 
[   15.773131] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.773177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.773190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.773213] Call Trace:
[   15.773232]  <TASK>
[   15.773253]  dump_stack_lvl+0x73/0xb0
[   15.773284]  print_report+0xd1/0x650
[   15.773308]  ? __virt_addr_valid+0x1db/0x2d0
[   15.773332]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.773355]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.773379]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.773402]  kasan_report+0x141/0x180
[   15.773425]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.773453]  __asan_report_store8_noabort+0x1b/0x30
[   15.773479]  kasan_atomics_helper+0x50d4/0x5450
[   15.773513]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.773537]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.773564]  ? kasan_atomics+0x152/0x310
[   15.773592]  kasan_atomics+0x1dc/0x310
[   15.773627]  ? __pfx_kasan_atomics+0x10/0x10
[   15.773653]  ? __pfx_read_tsc+0x10/0x10
[   15.773675]  ? ktime_get_ts64+0x86/0x230
[   15.773702]  kunit_try_run_case+0x1a5/0x480
[   15.773732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.773755]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.773782]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.773806]  ? __kthread_parkme+0x82/0x180
[   15.773828]  ? preempt_count_sub+0x50/0x80
[   15.773854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.773878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.773904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.773930]  kthread+0x337/0x6f0
[   15.773950]  ? trace_preempt_on+0x20/0xc0
[   15.773975]  ? __pfx_kthread+0x10/0x10
[   15.773997]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.774019]  ? calculate_sigpending+0x7b/0xa0
[   15.774045]  ? __pfx_kthread+0x10/0x10
[   15.774067]  ret_from_fork+0x116/0x1d0
[   15.774086]  ? __pfx_kthread+0x10/0x10
[   15.774108]  ret_from_fork_asm+0x1a/0x30
[   15.774141]  </TASK>
[   15.774153] 
[   15.781716] Allocated by task 283:
[   15.781929]  kasan_save_stack+0x45/0x70
[   15.782143]  kasan_save_track+0x18/0x40
[   15.782323]  kasan_save_alloc_info+0x3b/0x50
[   15.782571]  __kasan_kmalloc+0xb7/0xc0
[   15.782825]  __kmalloc_cache_noprof+0x189/0x420
[   15.783077]  kasan_atomics+0x95/0x310
[   15.783274]  kunit_try_run_case+0x1a5/0x480
[   15.783481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.783743]  kthread+0x337/0x6f0
[   15.783923]  ret_from_fork+0x116/0x1d0
[   15.784111]  ret_from_fork_asm+0x1a/0x30
[   15.784332] 
[   15.784402] The buggy address belongs to the object at ffff888102ba6080
[   15.784402]  which belongs to the cache kmalloc-64 of size 64
[   15.784758] The buggy address is located 0 bytes to the right of
[   15.784758]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.785559] 
[   15.785663] The buggy address belongs to the physical page:
[   15.785923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.786319] flags: 0x200000000000000(node=0|zone=2)
[   15.786594] page_type: f5(slab)
[   15.786796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.787177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.787523] page dumped because: kasan: bad access detected
[   15.787783] 
[   15.787877] Memory state around the buggy address:
[   15.788102]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.788417]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.788834] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.789064]                                      ^
[   15.789218]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.789430]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.789758] ==================================================================
[   15.316633] ==================================================================
[   15.317031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.317466] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.318030] 
[   15.318143] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.318185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.318198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.318220] Call Trace:
[   15.318236]  <TASK>
[   15.318253]  dump_stack_lvl+0x73/0xb0
[   15.318284]  print_report+0xd1/0x650
[   15.318307]  ? __virt_addr_valid+0x1db/0x2d0
[   15.318330]  ? kasan_atomics_helper+0xac7/0x5450
[   15.318352]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.318376]  ? kasan_atomics_helper+0xac7/0x5450
[   15.318398]  kasan_report+0x141/0x180
[   15.318422]  ? kasan_atomics_helper+0xac7/0x5450
[   15.318449]  kasan_check_range+0x10c/0x1c0
[   15.318473]  __kasan_check_write+0x18/0x20
[   15.318493]  kasan_atomics_helper+0xac7/0x5450
[   15.318683]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.318708]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.318735]  ? kasan_atomics+0x152/0x310
[   15.318762]  kasan_atomics+0x1dc/0x310
[   15.318786]  ? __pfx_kasan_atomics+0x10/0x10
[   15.318842]  ? __pfx_read_tsc+0x10/0x10
[   15.318864]  ? ktime_get_ts64+0x86/0x230
[   15.318889]  kunit_try_run_case+0x1a5/0x480
[   15.318915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.318939]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.318965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.318990]  ? __kthread_parkme+0x82/0x180
[   15.319013]  ? preempt_count_sub+0x50/0x80
[   15.319038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.319064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.319090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.319116]  kthread+0x337/0x6f0
[   15.319136]  ? trace_preempt_on+0x20/0xc0
[   15.319162]  ? __pfx_kthread+0x10/0x10
[   15.319184]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.319207]  ? calculate_sigpending+0x7b/0xa0
[   15.319232]  ? __pfx_kthread+0x10/0x10
[   15.319255]  ret_from_fork+0x116/0x1d0
[   15.319273]  ? __pfx_kthread+0x10/0x10
[   15.319296]  ret_from_fork_asm+0x1a/0x30
[   15.319329]  </TASK>
[   15.319340] 
[   15.330215] Allocated by task 283:
[   15.330397]  kasan_save_stack+0x45/0x70
[   15.330995]  kasan_save_track+0x18/0x40
[   15.331254]  kasan_save_alloc_info+0x3b/0x50
[   15.331697]  __kasan_kmalloc+0xb7/0xc0
[   15.331941]  __kmalloc_cache_noprof+0x189/0x420
[   15.332269]  kasan_atomics+0x95/0x310
[   15.332667]  kunit_try_run_case+0x1a5/0x480
[   15.332878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.333113]  kthread+0x337/0x6f0
[   15.333273]  ret_from_fork+0x116/0x1d0
[   15.333447]  ret_from_fork_asm+0x1a/0x30
[   15.333900] 
[   15.334128] The buggy address belongs to the object at ffff888102ba6080
[   15.334128]  which belongs to the cache kmalloc-64 of size 64
[   15.335009] The buggy address is located 0 bytes to the right of
[   15.335009]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.335849] 
[   15.335957] The buggy address belongs to the physical page:
[   15.336189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.336808] flags: 0x200000000000000(node=0|zone=2)
[   15.337082] page_type: f5(slab)
[   15.337384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.337919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.338533] page dumped because: kasan: bad access detected
[   15.338859] 
[   15.339068] Memory state around the buggy address:
[   15.339388]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.339918]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.340393] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.341148]                                      ^
[   15.341442]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.341938]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.342420] ==================================================================
[   16.120397] ==================================================================
[   16.120783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.121528] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.122084] 
[   16.122180] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.122227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.122239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.122261] Call Trace:
[   16.122280]  <TASK>
[   16.122297]  dump_stack_lvl+0x73/0xb0
[   16.122330]  print_report+0xd1/0x650
[   16.122354]  ? __virt_addr_valid+0x1db/0x2d0
[   16.122378]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.122401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.122425]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.122449]  kasan_report+0x141/0x180
[   16.122472]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.122500]  kasan_check_range+0x10c/0x1c0
[   16.122527]  __kasan_check_write+0x18/0x20
[   16.122548]  kasan_atomics_helper+0x1e12/0x5450
[   16.122574]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.122598]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.122637]  ? kasan_atomics+0x152/0x310
[   16.122664]  kasan_atomics+0x1dc/0x310
[   16.122687]  ? __pfx_kasan_atomics+0x10/0x10
[   16.122712]  ? __pfx_read_tsc+0x10/0x10
[   16.122734]  ? ktime_get_ts64+0x86/0x230
[   16.122760]  kunit_try_run_case+0x1a5/0x480
[   16.122784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.122808]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.122834]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.122859]  ? __kthread_parkme+0x82/0x180
[   16.122880]  ? preempt_count_sub+0x50/0x80
[   16.122905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.122931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.122956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.122982]  kthread+0x337/0x6f0
[   16.123002]  ? trace_preempt_on+0x20/0xc0
[   16.123027]  ? __pfx_kthread+0x10/0x10
[   16.123049]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.123071]  ? calculate_sigpending+0x7b/0xa0
[   16.123096]  ? __pfx_kthread+0x10/0x10
[   16.123119]  ret_from_fork+0x116/0x1d0
[   16.123138]  ? __pfx_kthread+0x10/0x10
[   16.123160]  ret_from_fork_asm+0x1a/0x30
[   16.123192]  </TASK>
[   16.123203] 
[   16.130623] Allocated by task 283:
[   16.130807]  kasan_save_stack+0x45/0x70
[   16.130989]  kasan_save_track+0x18/0x40
[   16.131126]  kasan_save_alloc_info+0x3b/0x50
[   16.131337]  __kasan_kmalloc+0xb7/0xc0
[   16.131526]  __kmalloc_cache_noprof+0x189/0x420
[   16.131745]  kasan_atomics+0x95/0x310
[   16.131918]  kunit_try_run_case+0x1a5/0x480
[   16.132066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.132243]  kthread+0x337/0x6f0
[   16.132411]  ret_from_fork+0x116/0x1d0
[   16.132595]  ret_from_fork_asm+0x1a/0x30
[   16.132805] 
[   16.132897] The buggy address belongs to the object at ffff888102ba6080
[   16.132897]  which belongs to the cache kmalloc-64 of size 64
[   16.133561] The buggy address is located 0 bytes to the right of
[   16.133561]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.133938] 
[   16.134011] The buggy address belongs to the physical page:
[   16.134306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.134851] flags: 0x200000000000000(node=0|zone=2)
[   16.135100] page_type: f5(slab)
[   16.135272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.135507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.135744] page dumped because: kasan: bad access detected
[   16.136205] 
[   16.136299] Memory state around the buggy address:
[   16.136544]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.136815]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.137116] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.137328]                                      ^
[   16.137482]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.137969]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.138294] ==================================================================
[   15.415656] ==================================================================
[   15.416073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.416363] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.416765] 
[   15.416880] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.416924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.416937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.416960] Call Trace:
[   15.416977]  <TASK>
[   15.416994]  dump_stack_lvl+0x73/0xb0
[   15.417024]  print_report+0xd1/0x650
[   15.417047]  ? __virt_addr_valid+0x1db/0x2d0
[   15.417072]  ? kasan_atomics_helper+0xd47/0x5450
[   15.417094]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.417118]  ? kasan_atomics_helper+0xd47/0x5450
[   15.417141]  kasan_report+0x141/0x180
[   15.417164]  ? kasan_atomics_helper+0xd47/0x5450
[   15.417192]  kasan_check_range+0x10c/0x1c0
[   15.417216]  __kasan_check_write+0x18/0x20
[   15.417236]  kasan_atomics_helper+0xd47/0x5450
[   15.417260]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.417283]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.417310]  ? kasan_atomics+0x152/0x310
[   15.417337]  kasan_atomics+0x1dc/0x310
[   15.417361]  ? __pfx_kasan_atomics+0x10/0x10
[   15.417385]  ? __pfx_read_tsc+0x10/0x10
[   15.417408]  ? ktime_get_ts64+0x86/0x230
[   15.417434]  kunit_try_run_case+0x1a5/0x480
[   15.417459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.417483]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.417520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.417546]  ? __kthread_parkme+0x82/0x180
[   15.417567]  ? preempt_count_sub+0x50/0x80
[   15.417593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.417631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.417656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.417682]  kthread+0x337/0x6f0
[   15.417702]  ? trace_preempt_on+0x20/0xc0
[   15.417731]  ? __pfx_kthread+0x10/0x10
[   15.417752]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.417774]  ? calculate_sigpending+0x7b/0xa0
[   15.417800]  ? __pfx_kthread+0x10/0x10
[   15.417822]  ret_from_fork+0x116/0x1d0
[   15.417842]  ? __pfx_kthread+0x10/0x10
[   15.417863]  ret_from_fork_asm+0x1a/0x30
[   15.417896]  </TASK>
[   15.417906] 
[   15.425498] Allocated by task 283:
[   15.425683]  kasan_save_stack+0x45/0x70
[   15.426093]  kasan_save_track+0x18/0x40
[   15.426233]  kasan_save_alloc_info+0x3b/0x50
[   15.426382]  __kasan_kmalloc+0xb7/0xc0
[   15.426517]  __kmalloc_cache_noprof+0x189/0x420
[   15.426755]  kasan_atomics+0x95/0x310
[   15.426960]  kunit_try_run_case+0x1a5/0x480
[   15.427173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.427438]  kthread+0x337/0x6f0
[   15.427741]  ret_from_fork+0x116/0x1d0
[   15.427885]  ret_from_fork_asm+0x1a/0x30
[   15.428024] 
[   15.428094] The buggy address belongs to the object at ffff888102ba6080
[   15.428094]  which belongs to the cache kmalloc-64 of size 64
[   15.428575] The buggy address is located 0 bytes to the right of
[   15.428575]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.429215] 
[   15.429289] The buggy address belongs to the physical page:
[   15.429459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.430002] flags: 0x200000000000000(node=0|zone=2)
[   15.430225] page_type: f5(slab)
[   15.430345] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.430571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.431052] page dumped because: kasan: bad access detected
[   15.431304] 
[   15.431401] Memory state around the buggy address:
[   15.431704]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.431966]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.432179] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.432389]                                      ^
[   15.432587]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.432911]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.433225] ==================================================================
[   15.883539] ==================================================================
[   15.883895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   15.884243] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.884543] 
[   15.884802] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.884860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.884872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.884905] Call Trace:
[   15.884920]  <TASK>
[   15.884935]  dump_stack_lvl+0x73/0xb0
[   15.884965]  print_report+0xd1/0x650
[   15.884997]  ? __virt_addr_valid+0x1db/0x2d0
[   15.885022]  ? kasan_atomics_helper+0x1818/0x5450
[   15.885045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.885079]  ? kasan_atomics_helper+0x1818/0x5450
[   15.885102]  kasan_report+0x141/0x180
[   15.885125]  ? kasan_atomics_helper+0x1818/0x5450
[   15.885153]  kasan_check_range+0x10c/0x1c0
[   15.885178]  __kasan_check_write+0x18/0x20
[   15.885200]  kasan_atomics_helper+0x1818/0x5450
[   15.885224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.885249]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.885276]  ? kasan_atomics+0x152/0x310
[   15.885305]  kasan_atomics+0x1dc/0x310
[   15.885329]  ? __pfx_kasan_atomics+0x10/0x10
[   15.885355]  ? __pfx_read_tsc+0x10/0x10
[   15.885377]  ? ktime_get_ts64+0x86/0x230
[   15.885412]  kunit_try_run_case+0x1a5/0x480
[   15.885438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.885472]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.885516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.885542]  ? __kthread_parkme+0x82/0x180
[   15.885563]  ? preempt_count_sub+0x50/0x80
[   15.885589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.885625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.885651]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.885677]  kthread+0x337/0x6f0
[   15.885697]  ? trace_preempt_on+0x20/0xc0
[   15.885725]  ? __pfx_kthread+0x10/0x10
[   15.885747]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.885770]  ? calculate_sigpending+0x7b/0xa0
[   15.885796]  ? __pfx_kthread+0x10/0x10
[   15.885819]  ret_from_fork+0x116/0x1d0
[   15.885848]  ? __pfx_kthread+0x10/0x10
[   15.885869]  ret_from_fork_asm+0x1a/0x30
[   15.885915]  </TASK>
[   15.885925] 
[   15.893508] Allocated by task 283:
[   15.893670]  kasan_save_stack+0x45/0x70
[   15.893822]  kasan_save_track+0x18/0x40
[   15.893960]  kasan_save_alloc_info+0x3b/0x50
[   15.894138]  __kasan_kmalloc+0xb7/0xc0
[   15.894337]  __kmalloc_cache_noprof+0x189/0x420
[   15.894613]  kasan_atomics+0x95/0x310
[   15.894806]  kunit_try_run_case+0x1a5/0x480
[   15.895020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.895275]  kthread+0x337/0x6f0
[   15.895445]  ret_from_fork+0x116/0x1d0
[   15.895670]  ret_from_fork_asm+0x1a/0x30
[   15.895826] 
[   15.895946] The buggy address belongs to the object at ffff888102ba6080
[   15.895946]  which belongs to the cache kmalloc-64 of size 64
[   15.896406] The buggy address is located 0 bytes to the right of
[   15.896406]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.896978] 
[   15.897097] The buggy address belongs to the physical page:
[   15.897368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.897677] flags: 0x200000000000000(node=0|zone=2)
[   15.897883] page_type: f5(slab)
[   15.898030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.898439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.898828] page dumped because: kasan: bad access detected
[   15.899078] 
[   15.899170] Memory state around the buggy address:
[   15.899368]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.899620]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.899838] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.900138]                                      ^
[   15.900409]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.900791]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.901180] ==================================================================
[   15.205915] ==================================================================
[   15.206564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.206906] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.207633] 
[   15.207755] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.207802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.207815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.207839] Call Trace:
[   15.207859]  <TASK>
[   15.207878]  dump_stack_lvl+0x73/0xb0
[   15.207912]  print_report+0xd1/0x650
[   15.208093]  ? __virt_addr_valid+0x1db/0x2d0
[   15.208119]  ? kasan_atomics_helper+0x860/0x5450
[   15.208143]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.208168]  ? kasan_atomics_helper+0x860/0x5450
[   15.208192]  kasan_report+0x141/0x180
[   15.208257]  ? kasan_atomics_helper+0x860/0x5450
[   15.208285]  kasan_check_range+0x10c/0x1c0
[   15.208311]  __kasan_check_write+0x18/0x20
[   15.208332]  kasan_atomics_helper+0x860/0x5450
[   15.208357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.208381]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.208409]  ? kasan_atomics+0x152/0x310
[   15.208437]  kasan_atomics+0x1dc/0x310
[   15.208460]  ? __pfx_kasan_atomics+0x10/0x10
[   15.208485]  ? __pfx_read_tsc+0x10/0x10
[   15.208522]  ? ktime_get_ts64+0x86/0x230
[   15.208548]  kunit_try_run_case+0x1a5/0x480
[   15.208574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.208610]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.208637]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.208662]  ? __kthread_parkme+0x82/0x180
[   15.208684]  ? preempt_count_sub+0x50/0x80
[   15.208711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.208736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.208762]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.208788]  kthread+0x337/0x6f0
[   15.208808]  ? trace_preempt_on+0x20/0xc0
[   15.208833]  ? __pfx_kthread+0x10/0x10
[   15.208854]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.208877]  ? calculate_sigpending+0x7b/0xa0
[   15.208902]  ? __pfx_kthread+0x10/0x10
[   15.208936]  ret_from_fork+0x116/0x1d0
[   15.208955]  ? __pfx_kthread+0x10/0x10
[   15.208977]  ret_from_fork_asm+0x1a/0x30
[   15.209010]  </TASK>
[   15.209022] 
[   15.220896] Allocated by task 283:
[   15.221285]  kasan_save_stack+0x45/0x70
[   15.221488]  kasan_save_track+0x18/0x40
[   15.221860]  kasan_save_alloc_info+0x3b/0x50
[   15.222370]  __kasan_kmalloc+0xb7/0xc0
[   15.222611]  __kmalloc_cache_noprof+0x189/0x420
[   15.223293]  kasan_atomics+0x95/0x310
[   15.223509]  kunit_try_run_case+0x1a5/0x480
[   15.223726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.224288]  kthread+0x337/0x6f0
[   15.224562]  ret_from_fork+0x116/0x1d0
[   15.225034]  ret_from_fork_asm+0x1a/0x30
[   15.225362] 
[   15.225457] The buggy address belongs to the object at ffff888102ba6080
[   15.225457]  which belongs to the cache kmalloc-64 of size 64
[   15.226464] The buggy address is located 0 bytes to the right of
[   15.226464]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.227213] 
[   15.227328] The buggy address belongs to the physical page:
[   15.227851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.228756] flags: 0x200000000000000(node=0|zone=2)
[   15.229174] page_type: f5(slab)
[   15.229354] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.229910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.230427] page dumped because: kasan: bad access detected
[   15.230849] 
[   15.231113] Memory state around the buggy address:
[   15.231314]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.231821]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.232514] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.232829]                                      ^
[   15.233226]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.233916]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.234236] ==================================================================
[   15.017157] ==================================================================
[   15.017523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.017860] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.018297] 
[   15.018424] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.018468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.018493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.018514] Call Trace:
[   15.018538]  <TASK>
[   15.018554]  dump_stack_lvl+0x73/0xb0
[   15.018585]  print_report+0xd1/0x650
[   15.018624]  ? __virt_addr_valid+0x1db/0x2d0
[   15.018649]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.018672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.018697]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.018720]  kasan_report+0x141/0x180
[   15.018742]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.018771]  __asan_report_load4_noabort+0x18/0x20
[   15.018806]  kasan_atomics_helper+0x4b54/0x5450
[   15.018830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.018865]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.018892]  ? kasan_atomics+0x152/0x310
[   15.018919]  kasan_atomics+0x1dc/0x310
[   15.019002]  ? __pfx_kasan_atomics+0x10/0x10
[   15.019028]  ? __pfx_read_tsc+0x10/0x10
[   15.019061]  ? ktime_get_ts64+0x86/0x230
[   15.019088]  kunit_try_run_case+0x1a5/0x480
[   15.019113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.019146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.019172]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.019197]  ? __kthread_parkme+0x82/0x180
[   15.019229]  ? preempt_count_sub+0x50/0x80
[   15.019255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.019280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.019315]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.019341]  kthread+0x337/0x6f0
[   15.019362]  ? trace_preempt_on+0x20/0xc0
[   15.019397]  ? __pfx_kthread+0x10/0x10
[   15.019419]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.019443]  ? calculate_sigpending+0x7b/0xa0
[   15.019478]  ? __pfx_kthread+0x10/0x10
[   15.019501]  ret_from_fork+0x116/0x1d0
[   15.019520]  ? __pfx_kthread+0x10/0x10
[   15.019553]  ret_from_fork_asm+0x1a/0x30
[   15.019596]  </TASK>
[   15.019616] 
[   15.028112] Allocated by task 283:
[   15.028316]  kasan_save_stack+0x45/0x70
[   15.028540]  kasan_save_track+0x18/0x40
[   15.028733]  kasan_save_alloc_info+0x3b/0x50
[   15.028998]  __kasan_kmalloc+0xb7/0xc0
[   15.029198]  __kmalloc_cache_noprof+0x189/0x420
[   15.029410]  kasan_atomics+0x95/0x310
[   15.029658]  kunit_try_run_case+0x1a5/0x480
[   15.029810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.029985]  kthread+0x337/0x6f0
[   15.030104]  ret_from_fork+0x116/0x1d0
[   15.030234]  ret_from_fork_asm+0x1a/0x30
[   15.030440] 
[   15.030657] The buggy address belongs to the object at ffff888102ba6080
[   15.030657]  which belongs to the cache kmalloc-64 of size 64
[   15.031438] The buggy address is located 0 bytes to the right of
[   15.031438]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.032177] 
[   15.032309] The buggy address belongs to the physical page:
[   15.032562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.032838] flags: 0x200000000000000(node=0|zone=2)
[   15.033183] page_type: f5(slab)
[   15.033361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.033776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.034005] page dumped because: kasan: bad access detected
[   15.034174] 
[   15.034243] Memory state around the buggy address:
[   15.034399]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.035186]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.035517] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.035863]                                      ^
[   15.036341]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.036750]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.037088] ==================================================================
[   15.289657] ==================================================================
[   15.290177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.291028] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.291705] 
[   15.291820] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.291965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.291981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.292005] Call Trace:
[   15.292024]  <TASK>
[   15.292041]  dump_stack_lvl+0x73/0xb0
[   15.292113]  print_report+0xd1/0x650
[   15.292141]  ? __virt_addr_valid+0x1db/0x2d0
[   15.292166]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.292188]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.292214]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.292237]  kasan_report+0x141/0x180
[   15.292260]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.292287]  kasan_check_range+0x10c/0x1c0
[   15.292313]  __kasan_check_write+0x18/0x20
[   15.292333]  kasan_atomics_helper+0xa2b/0x5450
[   15.292357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.292381]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.292408]  ? kasan_atomics+0x152/0x310
[   15.292436]  kasan_atomics+0x1dc/0x310
[   15.292459]  ? __pfx_kasan_atomics+0x10/0x10
[   15.292484]  ? __pfx_read_tsc+0x10/0x10
[   15.292514]  ? ktime_get_ts64+0x86/0x230
[   15.292541]  kunit_try_run_case+0x1a5/0x480
[   15.292566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.292591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.292629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.292654]  ? __kthread_parkme+0x82/0x180
[   15.292675]  ? preempt_count_sub+0x50/0x80
[   15.292701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.292727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.292753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.292780]  kthread+0x337/0x6f0
[   15.292800]  ? trace_preempt_on+0x20/0xc0
[   15.292825]  ? __pfx_kthread+0x10/0x10
[   15.292846]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.292869]  ? calculate_sigpending+0x7b/0xa0
[   15.292895]  ? __pfx_kthread+0x10/0x10
[   15.292918]  ret_from_fork+0x116/0x1d0
[   15.292937]  ? __pfx_kthread+0x10/0x10
[   15.292959]  ret_from_fork_asm+0x1a/0x30
[   15.292993]  </TASK>
[   15.293003] 
[   15.303952] Allocated by task 283:
[   15.304259]  kasan_save_stack+0x45/0x70
[   15.304455]  kasan_save_track+0x18/0x40
[   15.304873]  kasan_save_alloc_info+0x3b/0x50
[   15.305193]  __kasan_kmalloc+0xb7/0xc0
[   15.305574]  __kmalloc_cache_noprof+0x189/0x420
[   15.305806]  kasan_atomics+0x95/0x310
[   15.305984]  kunit_try_run_case+0x1a5/0x480
[   15.306178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.306416]  kthread+0x337/0x6f0
[   15.306847]  ret_from_fork+0x116/0x1d0
[   15.307275]  ret_from_fork_asm+0x1a/0x30
[   15.307579] 
[   15.307815] The buggy address belongs to the object at ffff888102ba6080
[   15.307815]  which belongs to the cache kmalloc-64 of size 64
[   15.308558] The buggy address is located 0 bytes to the right of
[   15.308558]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.309236] 
[   15.309335] The buggy address belongs to the physical page:
[   15.309876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.310334] flags: 0x200000000000000(node=0|zone=2)
[   15.310810] page_type: f5(slab)
[   15.311120] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.311769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.312171] page dumped because: kasan: bad access detected
[   15.312407] 
[   15.312705] Memory state around the buggy address:
[   15.312971]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.313450]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.313785] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.314079]                                      ^
[   15.314288]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.314949]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.315375] ==================================================================
[   15.790587] ==================================================================
[   15.791021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.791399] Write of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.792016] 
[   15.792119] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.792162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.792175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.792198] Call Trace:
[   15.792215]  <TASK>
[   15.792233]  dump_stack_lvl+0x73/0xb0
[   15.792264]  print_report+0xd1/0x650
[   15.792288]  ? __virt_addr_valid+0x1db/0x2d0
[   15.792313]  ? kasan_atomics_helper+0x151d/0x5450
[   15.792336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.792360]  ? kasan_atomics_helper+0x151d/0x5450
[   15.792383]  kasan_report+0x141/0x180
[   15.792406]  ? kasan_atomics_helper+0x151d/0x5450
[   15.792434]  kasan_check_range+0x10c/0x1c0
[   15.792459]  __kasan_check_write+0x18/0x20
[   15.792480]  kasan_atomics_helper+0x151d/0x5450
[   15.792504]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.792528]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.792555]  ? kasan_atomics+0x152/0x310
[   15.792582]  kasan_atomics+0x1dc/0x310
[   15.792616]  ? __pfx_kasan_atomics+0x10/0x10
[   15.792641]  ? __pfx_read_tsc+0x10/0x10
[   15.792664]  ? ktime_get_ts64+0x86/0x230
[   15.792689]  kunit_try_run_case+0x1a5/0x480
[   15.792727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.792751]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.792799]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.792824]  ? __kthread_parkme+0x82/0x180
[   15.792847]  ? preempt_count_sub+0x50/0x80
[   15.792888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.792914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.792954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.792980]  kthread+0x337/0x6f0
[   15.793000]  ? trace_preempt_on+0x20/0xc0
[   15.793025]  ? __pfx_kthread+0x10/0x10
[   15.793047]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.793070]  ? calculate_sigpending+0x7b/0xa0
[   15.793095]  ? __pfx_kthread+0x10/0x10
[   15.793117]  ret_from_fork+0x116/0x1d0
[   15.793136]  ? __pfx_kthread+0x10/0x10
[   15.793158]  ret_from_fork_asm+0x1a/0x30
[   15.793191]  </TASK>
[   15.793202] 
[   15.802568] Allocated by task 283:
[   15.802723]  kasan_save_stack+0x45/0x70
[   15.802979]  kasan_save_track+0x18/0x40
[   15.803174]  kasan_save_alloc_info+0x3b/0x50
[   15.803386]  __kasan_kmalloc+0xb7/0xc0
[   15.803568]  __kmalloc_cache_noprof+0x189/0x420
[   15.803772]  kasan_atomics+0x95/0x310
[   15.803998]  kunit_try_run_case+0x1a5/0x480
[   15.804238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.804521]  kthread+0x337/0x6f0
[   15.804684]  ret_from_fork+0x116/0x1d0
[   15.804892]  ret_from_fork_asm+0x1a/0x30
[   15.805083] 
[   15.805182] The buggy address belongs to the object at ffff888102ba6080
[   15.805182]  which belongs to the cache kmalloc-64 of size 64
[   15.805628] The buggy address is located 0 bytes to the right of
[   15.805628]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.806152] 
[   15.806248] The buggy address belongs to the physical page:
[   15.806528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.806876] flags: 0x200000000000000(node=0|zone=2)
[   15.807113] page_type: f5(slab)
[   15.807269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.807573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.807814] page dumped because: kasan: bad access detected
[   15.808073] 
[   15.808191] Memory state around the buggy address:
[   15.808443]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.808820]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.809145] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.809423]                                      ^
[   15.809660]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.809979]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.810296] ==================================================================
[   15.488225] ==================================================================
[   15.488588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.488973] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.489329] 
[   15.489443] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.489488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.489501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.489525] Call Trace:
[   15.489545]  <TASK>
[   15.489565]  dump_stack_lvl+0x73/0xb0
[   15.489596]  print_report+0xd1/0x650
[   15.489632]  ? __virt_addr_valid+0x1db/0x2d0
[   15.489656]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.489679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.489707]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.489730]  kasan_report+0x141/0x180
[   15.489754]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.489782]  kasan_check_range+0x10c/0x1c0
[   15.489806]  __kasan_check_write+0x18/0x20
[   15.489827]  kasan_atomics_helper+0xfa9/0x5450
[   15.489852]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.489876]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.489937]  ? kasan_atomics+0x152/0x310
[   15.489965]  kasan_atomics+0x1dc/0x310
[   15.489990]  ? __pfx_kasan_atomics+0x10/0x10
[   15.490015]  ? __pfx_read_tsc+0x10/0x10
[   15.490038]  ? ktime_get_ts64+0x86/0x230
[   15.490064]  kunit_try_run_case+0x1a5/0x480
[   15.490090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.490114]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.490140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.490166]  ? __kthread_parkme+0x82/0x180
[   15.490188]  ? preempt_count_sub+0x50/0x80
[   15.490214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.490239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.490265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.490292]  kthread+0x337/0x6f0
[   15.490311]  ? trace_preempt_on+0x20/0xc0
[   15.490337]  ? __pfx_kthread+0x10/0x10
[   15.490358]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.490381]  ? calculate_sigpending+0x7b/0xa0
[   15.490407]  ? __pfx_kthread+0x10/0x10
[   15.490429]  ret_from_fork+0x116/0x1d0
[   15.490449]  ? __pfx_kthread+0x10/0x10
[   15.490470]  ret_from_fork_asm+0x1a/0x30
[   15.490504]  </TASK>
[   15.490522] 
[   15.498399] Allocated by task 283:
[   15.498616]  kasan_save_stack+0x45/0x70
[   15.498821]  kasan_save_track+0x18/0x40
[   15.499031]  kasan_save_alloc_info+0x3b/0x50
[   15.499230]  __kasan_kmalloc+0xb7/0xc0
[   15.499363]  __kmalloc_cache_noprof+0x189/0x420
[   15.499626]  kasan_atomics+0x95/0x310
[   15.499816]  kunit_try_run_case+0x1a5/0x480
[   15.500041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.500237]  kthread+0x337/0x6f0
[   15.500359]  ret_from_fork+0x116/0x1d0
[   15.500492]  ret_from_fork_asm+0x1a/0x30
[   15.500713] 
[   15.500809] The buggy address belongs to the object at ffff888102ba6080
[   15.500809]  which belongs to the cache kmalloc-64 of size 64
[   15.501328] The buggy address is located 0 bytes to the right of
[   15.501328]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.502045] 
[   15.502168] The buggy address belongs to the physical page:
[   15.502415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.502743] flags: 0x200000000000000(node=0|zone=2)
[   15.502909] page_type: f5(slab)
[   15.503034] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.503311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.503658] page dumped because: kasan: bad access detected
[   15.503931] 
[   15.504024] Memory state around the buggy address:
[   15.504450]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.504722]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.504936] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.505144]                                      ^
[   15.505336]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.505847]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.506188] ==================================================================
[   15.235379] ==================================================================
[   15.235854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.236572] Write of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.237308] 
[   15.237531] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.237584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.237597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.237634] Call Trace:
[   15.237649]  <TASK>
[   15.237709]  dump_stack_lvl+0x73/0xb0
[   15.237748]  print_report+0xd1/0x650
[   15.237772]  ? __virt_addr_valid+0x1db/0x2d0
[   15.237797]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.237819]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.237844]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.237868]  kasan_report+0x141/0x180
[   15.237891]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.237919]  kasan_check_range+0x10c/0x1c0
[   15.237943]  __kasan_check_write+0x18/0x20
[   15.237963]  kasan_atomics_helper+0x8f9/0x5450
[   15.237988]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.238011]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.238039]  ? kasan_atomics+0x152/0x310
[   15.238066]  kasan_atomics+0x1dc/0x310
[   15.238090]  ? __pfx_kasan_atomics+0x10/0x10
[   15.238115]  ? __pfx_read_tsc+0x10/0x10
[   15.238137]  ? ktime_get_ts64+0x86/0x230
[   15.238163]  kunit_try_run_case+0x1a5/0x480
[   15.238191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.238214]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.238241]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.238266]  ? __kthread_parkme+0x82/0x180
[   15.238288]  ? preempt_count_sub+0x50/0x80
[   15.238314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.238340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.238364]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.238391]  kthread+0x337/0x6f0
[   15.238411]  ? trace_preempt_on+0x20/0xc0
[   15.238436]  ? __pfx_kthread+0x10/0x10
[   15.238458]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.238479]  ? calculate_sigpending+0x7b/0xa0
[   15.238515]  ? __pfx_kthread+0x10/0x10
[   15.238537]  ret_from_fork+0x116/0x1d0
[   15.238556]  ? __pfx_kthread+0x10/0x10
[   15.238578]  ret_from_fork_asm+0x1a/0x30
[   15.238621]  </TASK>
[   15.238632] 
[   15.249288] Allocated by task 283:
[   15.249671]  kasan_save_stack+0x45/0x70
[   15.249871]  kasan_save_track+0x18/0x40
[   15.250059]  kasan_save_alloc_info+0x3b/0x50
[   15.250264]  __kasan_kmalloc+0xb7/0xc0
[   15.250447]  __kmalloc_cache_noprof+0x189/0x420
[   15.251130]  kasan_atomics+0x95/0x310
[   15.251334]  kunit_try_run_case+0x1a5/0x480
[   15.251725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.252133]  kthread+0x337/0x6f0
[   15.252430]  ret_from_fork+0x116/0x1d0
[   15.252887]  ret_from_fork_asm+0x1a/0x30
[   15.253138] 
[   15.253387] The buggy address belongs to the object at ffff888102ba6080
[   15.253387]  which belongs to the cache kmalloc-64 of size 64
[   15.254316] The buggy address is located 0 bytes to the right of
[   15.254316]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.255290] 
[   15.255389] The buggy address belongs to the physical page:
[   15.255860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.256404] flags: 0x200000000000000(node=0|zone=2)
[   15.256764] page_type: f5(slab)
[   15.256930] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.257248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.257854] page dumped because: kasan: bad access detected
[   15.258153] 
[   15.258375] Memory state around the buggy address:
[   15.258855]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.259298]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.259822] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.260130]                                      ^
[   15.260336]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.260889]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.261364] ==================================================================
[   15.507156] ==================================================================
[   15.507478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.508148] Read of size 4 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   15.508376] 
[   15.508502] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.508549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.508562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.508585] Call Trace:
[   15.508616]  <TASK>
[   15.508635]  dump_stack_lvl+0x73/0xb0
[   15.508667]  print_report+0xd1/0x650
[   15.508690]  ? __virt_addr_valid+0x1db/0x2d0
[   15.508713]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.508734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.508757]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.508778]  kasan_report+0x141/0x180
[   15.508800]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.508827]  __asan_report_load4_noabort+0x18/0x20
[   15.508852]  kasan_atomics_helper+0x4a36/0x5450
[   15.508874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.508897]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.508948]  ? kasan_atomics+0x152/0x310
[   15.508974]  kasan_atomics+0x1dc/0x310
[   15.509009]  ? __pfx_kasan_atomics+0x10/0x10
[   15.509034]  ? __pfx_read_tsc+0x10/0x10
[   15.509072]  ? ktime_get_ts64+0x86/0x230
[   15.509110]  kunit_try_run_case+0x1a5/0x480
[   15.509135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.509159]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.509186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.509211]  ? __kthread_parkme+0x82/0x180
[   15.509233]  ? preempt_count_sub+0x50/0x80
[   15.509259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.509284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.509310]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.509337]  kthread+0x337/0x6f0
[   15.509357]  ? trace_preempt_on+0x20/0xc0
[   15.509383]  ? __pfx_kthread+0x10/0x10
[   15.509404]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.509444]  ? calculate_sigpending+0x7b/0xa0
[   15.509470]  ? __pfx_kthread+0x10/0x10
[   15.509493]  ret_from_fork+0x116/0x1d0
[   15.509513]  ? __pfx_kthread+0x10/0x10
[   15.509544]  ret_from_fork_asm+0x1a/0x30
[   15.509578]  </TASK>
[   15.509590] 
[   15.518918] Allocated by task 283:
[   15.519065]  kasan_save_stack+0x45/0x70
[   15.519277]  kasan_save_track+0x18/0x40
[   15.519483]  kasan_save_alloc_info+0x3b/0x50
[   15.519971]  __kasan_kmalloc+0xb7/0xc0
[   15.520140]  __kmalloc_cache_noprof+0x189/0x420
[   15.520495]  kasan_atomics+0x95/0x310
[   15.520876]  kunit_try_run_case+0x1a5/0x480
[   15.521159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.521518]  kthread+0x337/0x6f0
[   15.521694]  ret_from_fork+0x116/0x1d0
[   15.521978]  ret_from_fork_asm+0x1a/0x30
[   15.522139] 
[   15.522240] The buggy address belongs to the object at ffff888102ba6080
[   15.522240]  which belongs to the cache kmalloc-64 of size 64
[   15.523055] The buggy address is located 0 bytes to the right of
[   15.523055]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   15.523849] 
[   15.523938] The buggy address belongs to the physical page:
[   15.524304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   15.524741] flags: 0x200000000000000(node=0|zone=2)
[   15.525036] page_type: f5(slab)
[   15.525216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.525726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.526070] page dumped because: kasan: bad access detected
[   15.526306] 
[   15.526388] Memory state around the buggy address:
[   15.526824]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.527082]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.527483] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.527965]                                      ^
[   15.528127]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.528540]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.528934] ==================================================================
[   16.244592] ==================================================================
[   16.244963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.245307] Read of size 8 at addr ffff888102ba60b0 by task kunit_try_catch/283
[   16.245680] 
[   16.245774] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.245820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.245832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.245855] Call Trace:
[   16.245873]  <TASK>
[   16.245888]  dump_stack_lvl+0x73/0xb0
[   16.245919]  print_report+0xd1/0x650
[   16.245944]  ? __virt_addr_valid+0x1db/0x2d0
[   16.245969]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.245995]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.246021]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.246047]  kasan_report+0x141/0x180
[   16.246070]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.246099]  __asan_report_load8_noabort+0x18/0x20
[   16.246125]  kasan_atomics_helper+0x4fb2/0x5450
[   16.246149]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.246173]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.246199]  ? kasan_atomics+0x152/0x310
[   16.246227]  kasan_atomics+0x1dc/0x310
[   16.246250]  ? __pfx_kasan_atomics+0x10/0x10
[   16.246276]  ? __pfx_read_tsc+0x10/0x10
[   16.246297]  ? ktime_get_ts64+0x86/0x230
[   16.246322]  kunit_try_run_case+0x1a5/0x480
[   16.246347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.246371]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.246397]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.246422]  ? __kthread_parkme+0x82/0x180
[   16.246443]  ? preempt_count_sub+0x50/0x80
[   16.246468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.246494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.247370]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.247443]  kthread+0x337/0x6f0
[   16.247466]  ? trace_preempt_on+0x20/0xc0
[   16.247523]  ? __pfx_kthread+0x10/0x10
[   16.247546]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.247570]  ? calculate_sigpending+0x7b/0xa0
[   16.247597]  ? __pfx_kthread+0x10/0x10
[   16.247632]  ret_from_fork+0x116/0x1d0
[   16.247652]  ? __pfx_kthread+0x10/0x10
[   16.247675]  ret_from_fork_asm+0x1a/0x30
[   16.247709]  </TASK>
[   16.247721] 
[   16.264506] Allocated by task 283:
[   16.264654]  kasan_save_stack+0x45/0x70
[   16.264808]  kasan_save_track+0x18/0x40
[   16.264946]  kasan_save_alloc_info+0x3b/0x50
[   16.265096]  __kasan_kmalloc+0xb7/0xc0
[   16.265228]  __kmalloc_cache_noprof+0x189/0x420
[   16.265386]  kasan_atomics+0x95/0x310
[   16.265519]  kunit_try_run_case+0x1a5/0x480
[   16.265807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.266264]  kthread+0x337/0x6f0
[   16.266586]  ret_from_fork+0x116/0x1d0
[   16.266923]  ret_from_fork_asm+0x1a/0x30
[   16.267327] 
[   16.267485] The buggy address belongs to the object at ffff888102ba6080
[   16.267485]  which belongs to the cache kmalloc-64 of size 64
[   16.268828] The buggy address is located 0 bytes to the right of
[   16.268828]  allocated 48-byte region [ffff888102ba6080, ffff888102ba60b0)
[   16.269961] 
[   16.270132] The buggy address belongs to the physical page:
[   16.270651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ba6
[   16.271459] flags: 0x200000000000000(node=0|zone=2)
[   16.272032] page_type: f5(slab)
[   16.272377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.273108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.273939] page dumped because: kasan: bad access detected
[   16.274454] 
[   16.274596] Memory state around the buggy address:
[   16.274999]  ffff888102ba5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.275476]  ffff888102ba6000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.275926] >ffff888102ba6080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.276138]                                      ^
[   16.276290]  ffff888102ba6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.276525]  ffff888102ba6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.277141] ==================================================================