Hay
Date
July 17, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.290110] ==================================================================
[   18.290165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   18.290217] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.290579] 
[   18.290656] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.290747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.290810] Hardware name: linux,dummy-virt (DT)
[   18.291018] Call trace:
[   18.291060]  show_stack+0x20/0x38 (C)
[   18.291120]  dump_stack_lvl+0x8c/0xd0
[   18.291257]  print_report+0x118/0x5d0
[   18.291328]  kasan_report+0xdc/0x128
[   18.291373]  kasan_check_range+0x100/0x1a8
[   18.291489]  __kasan_check_write+0x20/0x30
[   18.291535]  kasan_atomics_helper+0xe44/0x4858
[   18.291706]  kasan_atomics+0x198/0x2e0
[   18.291767]  kunit_try_run_case+0x170/0x3f0
[   18.291866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.292062]  kthread+0x328/0x630
[   18.292220]  ret_from_fork+0x10/0x20
[   18.292294] 
[   18.292315] Allocated by task 266:
[   18.292389]  kasan_save_stack+0x3c/0x68
[   18.292433]  kasan_save_track+0x20/0x40
[   18.292525]  kasan_save_alloc_info+0x40/0x58
[   18.292610]  __kasan_kmalloc+0xd4/0xd8
[   18.292791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.292866]  kasan_atomics+0xb8/0x2e0
[   18.292912]  kunit_try_run_case+0x170/0x3f0
[   18.293106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.293376]  kthread+0x328/0x630
[   18.293760]  ret_from_fork+0x10/0x20
[   18.294014] 
[   18.294197] The buggy address belongs to the object at fff00000c7941e80
[   18.294197]  which belongs to the cache kmalloc-64 of size 64
[   18.294312] The buggy address is located 0 bytes to the right of
[   18.294312]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.294615] 
[   18.294730] The buggy address belongs to the physical page:
[   18.294793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.294859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.295082] page_type: f5(slab)
[   18.295158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.295306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.295377] page dumped because: kasan: bad access detected
[   18.295414] 
[   18.295449] Memory state around the buggy address:
[   18.295483]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.295530]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.295576] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.295628]                                      ^
[   18.295663]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.295713]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.295755] ==================================================================
[   18.255795] ==================================================================
[   18.256113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   18.256220] Read of size 4 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.256275] 
[   18.256359] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.256479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.256609] Hardware name: linux,dummy-virt (DT)
[   18.256676] Call trace:
[   18.256701]  show_stack+0x20/0x38 (C)
[   18.256931]  dump_stack_lvl+0x8c/0xd0
[   18.257081]  print_report+0x118/0x5d0
[   18.257152]  kasan_report+0xdc/0x128
[   18.257202]  __asan_report_load4_noabort+0x20/0x30
[   18.257255]  kasan_atomics_helper+0x3dd8/0x4858
[   18.257305]  kasan_atomics+0x198/0x2e0
[   18.257350]  kunit_try_run_case+0x170/0x3f0
[   18.257409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.257464]  kthread+0x328/0x630
[   18.257507]  ret_from_fork+0x10/0x20
[   18.257556] 
[   18.257583] Allocated by task 266:
[   18.257614]  kasan_save_stack+0x3c/0x68
[   18.257693]  kasan_save_track+0x20/0x40
[   18.257733]  kasan_save_alloc_info+0x40/0x58
[   18.257774]  __kasan_kmalloc+0xd4/0xd8
[   18.257812]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.258274]  kasan_atomics+0xb8/0x2e0
[   18.258375]  kunit_try_run_case+0x170/0x3f0
[   18.258638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.258929]  kthread+0x328/0x630
[   18.259101]  ret_from_fork+0x10/0x20
[   18.259330] 
[   18.259557] The buggy address belongs to the object at fff00000c7941e80
[   18.259557]  which belongs to the cache kmalloc-64 of size 64
[   18.259786] The buggy address is located 0 bytes to the right of
[   18.259786]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.259859] 
[   18.259886] The buggy address belongs to the physical page:
[   18.259939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.260339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.260685] page_type: f5(slab)
[   18.261003] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.261212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.261453] page dumped because: kasan: bad access detected
[   18.261563] 
[   18.261700] Memory state around the buggy address:
[   18.261963]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.262034]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.262080] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.262471]                                      ^
[   18.262555]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262630]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.262844] ==================================================================
[   18.364403] ==================================================================
[   18.364466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   18.364518] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.364604] 
[   18.364690] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.365183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.365223] Hardware name: linux,dummy-virt (DT)
[   18.365261] Call trace:
[   18.365286]  show_stack+0x20/0x38 (C)
[   18.365336]  dump_stack_lvl+0x8c/0xd0
[   18.365386]  print_report+0x118/0x5d0
[   18.365433]  kasan_report+0xdc/0x128
[   18.365479]  kasan_check_range+0x100/0x1a8
[   18.365528]  __kasan_check_write+0x20/0x30
[   18.365572]  kasan_atomics_helper+0x11f8/0x4858
[   18.365621]  kasan_atomics+0x198/0x2e0
[   18.365670]  kunit_try_run_case+0x170/0x3f0
[   18.365721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.365774]  kthread+0x328/0x630
[   18.365815]  ret_from_fork+0x10/0x20
[   18.365864] 
[   18.365883] Allocated by task 266:
[   18.365913]  kasan_save_stack+0x3c/0x68
[   18.365953]  kasan_save_track+0x20/0x40
[   18.366139]  kasan_save_alloc_info+0x40/0x58
[   18.366209]  __kasan_kmalloc+0xd4/0xd8
[   18.366250]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.366661]  kasan_atomics+0xb8/0x2e0
[   18.368754]  kunit_try_run_case+0x170/0x3f0
[   18.368944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.369075]  kthread+0x328/0x630
[   18.369208]  ret_from_fork+0x10/0x20
[   18.369275] 
[   18.369299] The buggy address belongs to the object at fff00000c7941e80
[   18.369299]  which belongs to the cache kmalloc-64 of size 64
[   18.369375] The buggy address is located 0 bytes to the right of
[   18.369375]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.369443] 
[   18.369673] The buggy address belongs to the physical page:
[   18.369795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.369915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.370355] page_type: f5(slab)
[   18.370780] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.371144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.371233] page dumped because: kasan: bad access detected
[   18.371343] 
[   18.371364] Memory state around the buggy address:
[   18.371650]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.371798]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.372025] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.372192]                                      ^
[   18.372318]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.372366]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.372407] ==================================================================
[   18.305465] ==================================================================
[   18.305520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   18.305572] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.305848] 
[   18.306033] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.306229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.306345] Hardware name: linux,dummy-virt (DT)
[   18.306466] Call trace:
[   18.306493]  show_stack+0x20/0x38 (C)
[   18.306548]  dump_stack_lvl+0x8c/0xd0
[   18.306639]  print_report+0x118/0x5d0
[   18.306747]  kasan_report+0xdc/0x128
[   18.306837]  kasan_check_range+0x100/0x1a8
[   18.306891]  __kasan_check_write+0x20/0x30
[   18.306944]  kasan_atomics_helper+0xeb8/0x4858
[   18.307006]  kasan_atomics+0x198/0x2e0
[   18.307103]  kunit_try_run_case+0x170/0x3f0
[   18.307162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.307217]  kthread+0x328/0x630
[   18.307258]  ret_from_fork+0x10/0x20
[   18.307305] 
[   18.307334] Allocated by task 266:
[   18.307384]  kasan_save_stack+0x3c/0x68
[   18.307435]  kasan_save_track+0x20/0x40
[   18.307472]  kasan_save_alloc_info+0x40/0x58
[   18.307514]  __kasan_kmalloc+0xd4/0xd8
[   18.307551]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.307592]  kasan_atomics+0xb8/0x2e0
[   18.307630]  kunit_try_run_case+0x170/0x3f0
[   18.307668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.307714]  kthread+0x328/0x630
[   18.307758]  ret_from_fork+0x10/0x20
[   18.307796] 
[   18.307816] The buggy address belongs to the object at fff00000c7941e80
[   18.307816]  which belongs to the cache kmalloc-64 of size 64
[   18.307878] The buggy address is located 0 bytes to the right of
[   18.307878]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.307954] 
[   18.308264] The buggy address belongs to the physical page:
[   18.308488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.308560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.308612] page_type: f5(slab)
[   18.308747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.308817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.308889] page dumped because: kasan: bad access detected
[   18.309081] 
[   18.309102] Memory state around the buggy address:
[   18.309141]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.309261]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.309418] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.309707]                                      ^
[   18.309888]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.310079]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.310162] ==================================================================
[   18.319780] ==================================================================
[   18.319990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   18.320075] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.320145] 
[   18.320304] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.320393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.320604] Hardware name: linux,dummy-virt (DT)
[   18.320649] Call trace:
[   18.320674]  show_stack+0x20/0x38 (C)
[   18.320816]  dump_stack_lvl+0x8c/0xd0
[   18.321202]  print_report+0x118/0x5d0
[   18.321379]  kasan_report+0xdc/0x128
[   18.321449]  kasan_check_range+0x100/0x1a8
[   18.321500]  __kasan_check_write+0x20/0x30
[   18.321571]  kasan_atomics_helper+0xf88/0x4858
[   18.321624]  kasan_atomics+0x198/0x2e0
[   18.321922]  kunit_try_run_case+0x170/0x3f0
[   18.322241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.322400]  kthread+0x328/0x630
[   18.322563]  ret_from_fork+0x10/0x20
[   18.322681] 
[   18.322747] Allocated by task 266:
[   18.322905]  kasan_save_stack+0x3c/0x68
[   18.322971]  kasan_save_track+0x20/0x40
[   18.323024]  kasan_save_alloc_info+0x40/0x58
[   18.323217]  __kasan_kmalloc+0xd4/0xd8
[   18.323328]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.323397]  kasan_atomics+0xb8/0x2e0
[   18.323451]  kunit_try_run_case+0x170/0x3f0
[   18.323491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.323543]  kthread+0x328/0x630
[   18.323588]  ret_from_fork+0x10/0x20
[   18.323635] 
[   18.323666] The buggy address belongs to the object at fff00000c7941e80
[   18.323666]  which belongs to the cache kmalloc-64 of size 64
[   18.323732] The buggy address is located 0 bytes to the right of
[   18.323732]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.323799] 
[   18.323837] The buggy address belongs to the physical page:
[   18.323880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.323934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.324086] page_type: f5(slab)
[   18.324191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.324734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.324845] page dumped because: kasan: bad access detected
[   18.325193] 
[   18.325348] Memory state around the buggy address:
[   18.325417]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.325472]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.325517] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.325560]                                      ^
[   18.325594]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.325639]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.326093] ==================================================================
[   18.420540] ==================================================================
[   18.420792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   18.421004] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.421590] 
[   18.421665] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.421819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.421907] Hardware name: linux,dummy-virt (DT)
[   18.422040] Call trace:
[   18.422111]  show_stack+0x20/0x38 (C)
[   18.422252]  dump_stack_lvl+0x8c/0xd0
[   18.422299]  print_report+0x118/0x5d0
[   18.422565]  kasan_report+0xdc/0x128
[   18.422742]  kasan_check_range+0x100/0x1a8
[   18.422884]  __kasan_check_write+0x20/0x30
[   18.422973]  kasan_atomics_helper+0x154c/0x4858
[   18.423336]  kasan_atomics+0x198/0x2e0
[   18.423475]  kunit_try_run_case+0x170/0x3f0
[   18.423584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.423764]  kthread+0x328/0x630
[   18.423832]  ret_from_fork+0x10/0x20
[   18.424093] 
[   18.424140] Allocated by task 266:
[   18.424297]  kasan_save_stack+0x3c/0x68
[   18.424522]  kasan_save_track+0x20/0x40
[   18.424626]  kasan_save_alloc_info+0x40/0x58
[   18.424769]  __kasan_kmalloc+0xd4/0xd8
[   18.424927]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.425017]  kasan_atomics+0xb8/0x2e0
[   18.425155]  kunit_try_run_case+0x170/0x3f0
[   18.425243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.425294]  kthread+0x328/0x630
[   18.425455]  ret_from_fork+0x10/0x20
[   18.425698] 
[   18.426408] The buggy address belongs to the object at fff00000c7941e80
[   18.426408]  which belongs to the cache kmalloc-64 of size 64
[   18.426550] The buggy address is located 0 bytes to the right of
[   18.426550]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.426623] 
[   18.426872] The buggy address belongs to the physical page:
[   18.427007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.427119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.427321] page_type: f5(slab)
[   18.427497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.427610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.427657] page dumped because: kasan: bad access detected
[   18.427860] 
[   18.427989] Memory state around the buggy address:
[   18.428207]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.428337]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.429129] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.429188]                                      ^
[   18.430109]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.430556]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.430604] ==================================================================
[   18.401328] ==================================================================
[   18.401383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   18.401432] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.401484] 
[   18.401936] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.402057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.402095] Hardware name: linux,dummy-virt (DT)
[   18.402400] Call trace:
[   18.402439]  show_stack+0x20/0x38 (C)
[   18.402699]  dump_stack_lvl+0x8c/0xd0
[   18.402770]  print_report+0x118/0x5d0
[   18.402915]  kasan_report+0xdc/0x128
[   18.402988]  kasan_check_range+0x100/0x1a8
[   18.403041]  __kasan_check_write+0x20/0x30
[   18.403087]  kasan_atomics_helper+0x1414/0x4858
[   18.403499]  kasan_atomics+0x198/0x2e0
[   18.403613]  kunit_try_run_case+0x170/0x3f0
[   18.403666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.403720]  kthread+0x328/0x630
[   18.404020]  ret_from_fork+0x10/0x20
[   18.404098] 
[   18.404200] Allocated by task 266:
[   18.404234]  kasan_save_stack+0x3c/0x68
[   18.404302]  kasan_save_track+0x20/0x40
[   18.404596]  kasan_save_alloc_info+0x40/0x58
[   18.404812]  __kasan_kmalloc+0xd4/0xd8
[   18.404904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.405022]  kasan_atomics+0xb8/0x2e0
[   18.405257]  kunit_try_run_case+0x170/0x3f0
[   18.405453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.405934]  kthread+0x328/0x630
[   18.405991]  ret_from_fork+0x10/0x20
[   18.406028] 
[   18.406302] The buggy address belongs to the object at fff00000c7941e80
[   18.406302]  which belongs to the cache kmalloc-64 of size 64
[   18.406493] The buggy address is located 0 bytes to the right of
[   18.406493]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.406753] 
[   18.406933] The buggy address belongs to the physical page:
[   18.407080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.407277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.407519] page_type: f5(slab)
[   18.407597] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.407782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.408068] page dumped because: kasan: bad access detected
[   18.408197] 
[   18.408302] Memory state around the buggy address:
[   18.408391]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.408440]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.408492] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.408684]                                      ^
[   18.409282]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.409439]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.409595] ==================================================================
[   18.282231] ==================================================================
[   18.282333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   18.282390] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.282674] 
[   18.282759] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.282856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.282884] Hardware name: linux,dummy-virt (DT)
[   18.283015] Call trace:
[   18.283042]  show_stack+0x20/0x38 (C)
[   18.283096]  dump_stack_lvl+0x8c/0xd0
[   18.283230]  print_report+0x118/0x5d0
[   18.283305]  kasan_report+0xdc/0x128
[   18.283564]  __asan_report_load8_noabort+0x20/0x30
[   18.283654]  kasan_atomics_helper+0x3f58/0x4858
[   18.283776]  kasan_atomics+0x198/0x2e0
[   18.283864]  kunit_try_run_case+0x170/0x3f0
[   18.284180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.284307]  kthread+0x328/0x630
[   18.284384]  ret_from_fork+0x10/0x20
[   18.284436] 
[   18.284463] Allocated by task 266:
[   18.284492]  kasan_save_stack+0x3c/0x68
[   18.284535]  kasan_save_track+0x20/0x40
[   18.284572]  kasan_save_alloc_info+0x40/0x58
[   18.284614]  __kasan_kmalloc+0xd4/0xd8
[   18.284651]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.284847]  kasan_atomics+0xb8/0x2e0
[   18.284904]  kunit_try_run_case+0x170/0x3f0
[   18.285135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.285391]  kthread+0x328/0x630
[   18.285503]  ret_from_fork+0x10/0x20
[   18.285602] 
[   18.285737] The buggy address belongs to the object at fff00000c7941e80
[   18.285737]  which belongs to the cache kmalloc-64 of size 64
[   18.285832] The buggy address is located 0 bytes to the right of
[   18.285832]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.286022] 
[   18.286223] The buggy address belongs to the physical page:
[   18.286293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.286457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.286523] page_type: f5(slab)
[   18.286741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.286932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.287200] page dumped because: kasan: bad access detected
[   18.287383] 
[   18.287512] Memory state around the buggy address:
[   18.287825]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.287956]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.288211] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.288415]                                      ^
[   18.288536]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.288872]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.289054] ==================================================================
[   18.453035] ==================================================================
[   18.453108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   18.453313] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.453371] 
[   18.453408] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.453727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.453757] Hardware name: linux,dummy-virt (DT)
[   18.453789] Call trace:
[   18.453811]  show_stack+0x20/0x38 (C)
[   18.453866]  dump_stack_lvl+0x8c/0xd0
[   18.454122]  print_report+0x118/0x5d0
[   18.454365]  kasan_report+0xdc/0x128
[   18.454472]  kasan_check_range+0x100/0x1a8
[   18.454527]  __kasan_check_write+0x20/0x30
[   18.454596]  kasan_atomics_helper+0x16d0/0x4858
[   18.454644]  kasan_atomics+0x198/0x2e0
[   18.454690]  kunit_try_run_case+0x170/0x3f0
[   18.454737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.454826]  kthread+0x328/0x630
[   18.454999]  ret_from_fork+0x10/0x20
[   18.455045] 
[   18.455066] Allocated by task 266:
[   18.455094]  kasan_save_stack+0x3c/0x68
[   18.455137]  kasan_save_track+0x20/0x40
[   18.455175]  kasan_save_alloc_info+0x40/0x58
[   18.455218]  __kasan_kmalloc+0xd4/0xd8
[   18.455255]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.455296]  kasan_atomics+0xb8/0x2e0
[   18.455333]  kunit_try_run_case+0x170/0x3f0
[   18.455373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.455424]  kthread+0x328/0x630
[   18.455459]  ret_from_fork+0x10/0x20
[   18.455527] 
[   18.455548] The buggy address belongs to the object at fff00000c7941e80
[   18.455548]  which belongs to the cache kmalloc-64 of size 64
[   18.455608] The buggy address is located 0 bytes to the right of
[   18.455608]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.455958] 
[   18.455989] The buggy address belongs to the physical page:
[   18.456032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.456451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.456502] page_type: f5(slab)
[   18.456541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.456610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.456671] page dumped because: kasan: bad access detected
[   18.456749] 
[   18.456865] Memory state around the buggy address:
[   18.456901]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.456947]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.457249] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.457291]                                      ^
[   18.457348]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.457425]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.457533] ==================================================================
[   18.278183] ==================================================================
[   18.278363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   18.278454] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.278705] 
[   18.278767] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.278863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.278891] Hardware name: linux,dummy-virt (DT)
[   18.278991] Call trace:
[   18.279047]  show_stack+0x20/0x38 (C)
[   18.279233]  dump_stack_lvl+0x8c/0xd0
[   18.279311]  print_report+0x118/0x5d0
[   18.279361]  kasan_report+0xdc/0x128
[   18.279409]  kasan_check_range+0x100/0x1a8
[   18.279484]  __kasan_check_read+0x20/0x30
[   18.279532]  kasan_atomics_helper+0xdd4/0x4858
[   18.279579]  kasan_atomics+0x198/0x2e0
[   18.279625]  kunit_try_run_case+0x170/0x3f0
[   18.279671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.279724]  kthread+0x328/0x630
[   18.279768]  ret_from_fork+0x10/0x20
[   18.279815] 
[   18.279839] Allocated by task 266:
[   18.279871]  kasan_save_stack+0x3c/0x68
[   18.279914]  kasan_save_track+0x20/0x40
[   18.279954]  kasan_save_alloc_info+0x40/0x58
[   18.280010]  __kasan_kmalloc+0xd4/0xd8
[   18.280047]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.280088]  kasan_atomics+0xb8/0x2e0
[   18.280125]  kunit_try_run_case+0x170/0x3f0
[   18.280165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.280211]  kthread+0x328/0x630
[   18.280244]  ret_from_fork+0x10/0x20
[   18.280281] 
[   18.280303] The buggy address belongs to the object at fff00000c7941e80
[   18.280303]  which belongs to the cache kmalloc-64 of size 64
[   18.280363] The buggy address is located 0 bytes to the right of
[   18.280363]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.280430] 
[   18.280450] The buggy address belongs to the physical page:
[   18.280494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.280550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.280609] page_type: f5(slab)
[   18.280649] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.280710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.280754] page dumped because: kasan: bad access detected
[   18.280787] 
[   18.281237] Memory state around the buggy address:
[   18.281291]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.281339]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.281384] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.281426]                                      ^
[   18.281492]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.281698]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.281792] ==================================================================
[   18.270120] ==================================================================
[   18.270213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   18.270269] Read of size 4 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.270322] 
[   18.270587] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.270756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.270828] Hardware name: linux,dummy-virt (DT)
[   18.271032] Call trace:
[   18.271169]  show_stack+0x20/0x38 (C)
[   18.271224]  dump_stack_lvl+0x8c/0xd0
[   18.271276]  print_report+0x118/0x5d0
[   18.271344]  kasan_report+0xdc/0x128
[   18.271391]  __asan_report_load4_noabort+0x20/0x30
[   18.271450]  kasan_atomics_helper+0x3e04/0x4858
[   18.271500]  kasan_atomics+0x198/0x2e0
[   18.271547]  kunit_try_run_case+0x170/0x3f0
[   18.271804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.272094]  kthread+0x328/0x630
[   18.272211]  ret_from_fork+0x10/0x20
[   18.272263] 
[   18.272283] Allocated by task 266:
[   18.272340]  kasan_save_stack+0x3c/0x68
[   18.272447]  kasan_save_track+0x20/0x40
[   18.272492]  kasan_save_alloc_info+0x40/0x58
[   18.272549]  __kasan_kmalloc+0xd4/0xd8
[   18.272626]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.272669]  kasan_atomics+0xb8/0x2e0
[   18.272853]  kunit_try_run_case+0x170/0x3f0
[   18.273108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.273345]  kthread+0x328/0x630
[   18.273699]  ret_from_fork+0x10/0x20
[   18.274042] 
[   18.274141] The buggy address belongs to the object at fff00000c7941e80
[   18.274141]  which belongs to the cache kmalloc-64 of size 64
[   18.274286] The buggy address is located 0 bytes to the right of
[   18.274286]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.274517] 
[   18.274680] The buggy address belongs to the physical page:
[   18.274745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.274808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.275042] page_type: f5(slab)
[   18.275245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.275667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.275785] page dumped because: kasan: bad access detected
[   18.275966] 
[   18.276022] Memory state around the buggy address:
[   18.276118]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.276265]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.276450] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.276657]                                      ^
[   18.276885]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.277016]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.277155] ==================================================================
[   18.436467] ==================================================================
[   18.436523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   18.436578] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.436630] 
[   18.436662] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.436747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.436774] Hardware name: linux,dummy-virt (DT)
[   18.436807] Call trace:
[   18.436829]  show_stack+0x20/0x38 (C)
[   18.436879]  dump_stack_lvl+0x8c/0xd0
[   18.436926]  print_report+0x118/0x5d0
[   18.436973]  kasan_report+0xdc/0x128
[   18.437038]  kasan_check_range+0x100/0x1a8
[   18.437087]  __kasan_check_write+0x20/0x30
[   18.437133]  kasan_atomics_helper+0x15b4/0x4858
[   18.437181]  kasan_atomics+0x198/0x2e0
[   18.439070]  kunit_try_run_case+0x170/0x3f0
[   18.439130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.439184]  kthread+0x328/0x630
[   18.439228]  ret_from_fork+0x10/0x20
[   18.439276] 
[   18.439298] Allocated by task 266:
[   18.439327]  kasan_save_stack+0x3c/0x68
[   18.439371]  kasan_save_track+0x20/0x40
[   18.439410]  kasan_save_alloc_info+0x40/0x58
[   18.439459]  __kasan_kmalloc+0xd4/0xd8
[   18.439497]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.439539]  kasan_atomics+0xb8/0x2e0
[   18.439576]  kunit_try_run_case+0x170/0x3f0
[   18.439617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.439662]  kthread+0x328/0x630
[   18.439695]  ret_from_fork+0x10/0x20
[   18.439733] 
[   18.439754] The buggy address belongs to the object at fff00000c7941e80
[   18.439754]  which belongs to the cache kmalloc-64 of size 64
[   18.439817] The buggy address is located 0 bytes to the right of
[   18.439817]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.439884] 
[   18.439905] The buggy address belongs to the physical page:
[   18.439953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.440110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.440197] page_type: f5(slab)
[   18.440239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.440295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.440339] page dumped because: kasan: bad access detected
[   18.440374] 
[   18.440394] Memory state around the buggy address:
[   18.440428]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.440475]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.440532] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.440574]                                      ^
[   18.440610]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.440653]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.440694] ==================================================================
[   18.296659] ==================================================================
[   18.296820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   18.297026] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.297154] 
[   18.297268] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.297655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.297861] Hardware name: linux,dummy-virt (DT)
[   18.297964] Call trace:
[   18.298152]  show_stack+0x20/0x38 (C)
[   18.298364]  dump_stack_lvl+0x8c/0xd0
[   18.298513]  print_report+0x118/0x5d0
[   18.298699]  kasan_report+0xdc/0x128
[   18.298785]  __asan_report_store8_noabort+0x20/0x30
[   18.298850]  kasan_atomics_helper+0x3e5c/0x4858
[   18.299082]  kasan_atomics+0x198/0x2e0
[   18.299254]  kunit_try_run_case+0x170/0x3f0
[   18.299493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.299685]  kthread+0x328/0x630
[   18.299810]  ret_from_fork+0x10/0x20
[   18.300013] 
[   18.300073] Allocated by task 266:
[   18.300315]  kasan_save_stack+0x3c/0x68
[   18.300518]  kasan_save_track+0x20/0x40
[   18.300620]  kasan_save_alloc_info+0x40/0x58
[   18.300859]  __kasan_kmalloc+0xd4/0xd8
[   18.300966]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.301041]  kasan_atomics+0xb8/0x2e0
[   18.301093]  kunit_try_run_case+0x170/0x3f0
[   18.301132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.301233]  kthread+0x328/0x630
[   18.301269]  ret_from_fork+0x10/0x20
[   18.301307] 
[   18.301339] The buggy address belongs to the object at fff00000c7941e80
[   18.301339]  which belongs to the cache kmalloc-64 of size 64
[   18.301404] The buggy address is located 0 bytes to the right of
[   18.301404]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.301765] 
[   18.301839] The buggy address belongs to the physical page:
[   18.301966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.302090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.302320] page_type: f5(slab)
[   18.302429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.302578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.302628] page dumped because: kasan: bad access detected
[   18.302835] 
[   18.303050] Memory state around the buggy address:
[   18.303130]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.303408]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.303559] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.303603]                                      ^
[   18.303818]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.303909]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.304053] ==================================================================
[   18.342282] ==================================================================
[   18.342339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   18.342393] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.342445] 
[   18.342555] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.342666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.342695] Hardware name: linux,dummy-virt (DT)
[   18.342728] Call trace:
[   18.342757]  show_stack+0x20/0x38 (C)
[   18.342810]  dump_stack_lvl+0x8c/0xd0
[   18.342858]  print_report+0x118/0x5d0
[   18.342911]  kasan_report+0xdc/0x128
[   18.342956]  kasan_check_range+0x100/0x1a8
[   18.343027]  __kasan_check_write+0x20/0x30
[   18.343074]  kasan_atomics_helper+0x10c0/0x4858
[   18.343127]  kasan_atomics+0x198/0x2e0
[   18.343174]  kunit_try_run_case+0x170/0x3f0
[   18.343221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.343285]  kthread+0x328/0x630
[   18.343327]  ret_from_fork+0x10/0x20
[   18.343393] 
[   18.343425] Allocated by task 266:
[   18.343464]  kasan_save_stack+0x3c/0x68
[   18.343517]  kasan_save_track+0x20/0x40
[   18.343556]  kasan_save_alloc_info+0x40/0x58
[   18.343598]  __kasan_kmalloc+0xd4/0xd8
[   18.343640]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.343682]  kasan_atomics+0xb8/0x2e0
[   18.343719]  kunit_try_run_case+0x170/0x3f0
[   18.343767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.343812]  kthread+0x328/0x630
[   18.343845]  ret_from_fork+0x10/0x20
[   18.343884] 
[   18.343905] The buggy address belongs to the object at fff00000c7941e80
[   18.343905]  which belongs to the cache kmalloc-64 of size 64
[   18.343967] The buggy address is located 0 bytes to the right of
[   18.343967]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.344802] 
[   18.344882] The buggy address belongs to the physical page:
[   18.344927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.345002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.345053] page_type: f5(slab)
[   18.345092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.345404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.345766] page dumped because: kasan: bad access detected
[   18.345964] 
[   18.345994] Memory state around the buggy address:
[   18.346032]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.346385]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.346680] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.346859]                                      ^
[   18.347011]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.347058]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.347130] ==================================================================
[   18.381550] ==================================================================
[   18.381623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   18.381676] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.381974] 
[   18.382107] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.382258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.382296] Hardware name: linux,dummy-virt (DT)
[   18.382338] Call trace:
[   18.382368]  show_stack+0x20/0x38 (C)
[   18.382518]  dump_stack_lvl+0x8c/0xd0
[   18.382577]  print_report+0x118/0x5d0
[   18.382622]  kasan_report+0xdc/0x128
[   18.382916]  kasan_check_range+0x100/0x1a8
[   18.383086]  __kasan_check_write+0x20/0x30
[   18.383141]  kasan_atomics_helper+0x12d8/0x4858
[   18.383193]  kasan_atomics+0x198/0x2e0
[   18.383239]  kunit_try_run_case+0x170/0x3f0
[   18.383452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.383623]  kthread+0x328/0x630
[   18.383703]  ret_from_fork+0x10/0x20
[   18.383860] 
[   18.383898] Allocated by task 266:
[   18.384086]  kasan_save_stack+0x3c/0x68
[   18.384141]  kasan_save_track+0x20/0x40
[   18.384225]  kasan_save_alloc_info+0x40/0x58
[   18.384271]  __kasan_kmalloc+0xd4/0xd8
[   18.384335]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.384376]  kasan_atomics+0xb8/0x2e0
[   18.384414]  kunit_try_run_case+0x170/0x3f0
[   18.384467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.384514]  kthread+0x328/0x630
[   18.384547]  ret_from_fork+0x10/0x20
[   18.384584] 
[   18.384607] The buggy address belongs to the object at fff00000c7941e80
[   18.384607]  which belongs to the cache kmalloc-64 of size 64
[   18.384678] The buggy address is located 0 bytes to the right of
[   18.384678]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.384748] 
[   18.384769] The buggy address belongs to the physical page:
[   18.384803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.384858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.384917] page_type: f5(slab)
[   18.384958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.385024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.385069] page dumped because: kasan: bad access detected
[   18.385103] 
[   18.385134] Memory state around the buggy address:
[   18.385168]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.385214]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.385272] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.385314]                                      ^
[   18.385356]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.385401]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.385442] ==================================================================
[   18.417137] ==================================================================
[   18.417401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   18.417587] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.417686] 
[   18.417735] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.417853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.417881] Hardware name: linux,dummy-virt (DT)
[   18.417913] Call trace:
[   18.417935]  show_stack+0x20/0x38 (C)
[   18.418009]  dump_stack_lvl+0x8c/0xd0
[   18.418068]  print_report+0x118/0x5d0
[   18.418118]  kasan_report+0xdc/0x128
[   18.418163]  kasan_check_range+0x100/0x1a8
[   18.418224]  __kasan_check_write+0x20/0x30
[   18.418272]  kasan_atomics_helper+0x14e4/0x4858
[   18.418319]  kasan_atomics+0x198/0x2e0
[   18.418374]  kunit_try_run_case+0x170/0x3f0
[   18.418423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.418482]  kthread+0x328/0x630
[   18.418525]  ret_from_fork+0x10/0x20
[   18.418571] 
[   18.418598] Allocated by task 266:
[   18.418631]  kasan_save_stack+0x3c/0x68
[   18.418684]  kasan_save_track+0x20/0x40
[   18.418723]  kasan_save_alloc_info+0x40/0x58
[   18.418765]  __kasan_kmalloc+0xd4/0xd8
[   18.418802]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.418843]  kasan_atomics+0xb8/0x2e0
[   18.418885]  kunit_try_run_case+0x170/0x3f0
[   18.418926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.418969]  kthread+0x328/0x630
[   18.419012]  ret_from_fork+0x10/0x20
[   18.419062] 
[   18.419092] The buggy address belongs to the object at fff00000c7941e80
[   18.419092]  which belongs to the cache kmalloc-64 of size 64
[   18.419163] The buggy address is located 0 bytes to the right of
[   18.419163]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.419236] 
[   18.419258] The buggy address belongs to the physical page:
[   18.419292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.419347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.419396] page_type: f5(slab)
[   18.419440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.419502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.419551] page dumped because: kasan: bad access detected
[   18.419586] 
[   18.419606] Memory state around the buggy address:
[   18.419644]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.419691]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.419735] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.419784]                                      ^
[   18.419819]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.419862]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.419902] ==================================================================
[   18.462806] ==================================================================
[   18.462963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   18.463037] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.463245] 
[   18.463276] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.463360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.463677] Hardware name: linux,dummy-virt (DT)
[   18.463709] Call trace:
[   18.463733]  show_stack+0x20/0x38 (C)
[   18.463787]  dump_stack_lvl+0x8c/0xd0
[   18.463879]  print_report+0x118/0x5d0
[   18.463926]  kasan_report+0xdc/0x128
[   18.463975]  kasan_check_range+0x100/0x1a8
[   18.464035]  __kasan_check_write+0x20/0x30
[   18.464090]  kasan_atomics_helper+0x175c/0x4858
[   18.464140]  kasan_atomics+0x198/0x2e0
[   18.464185]  kunit_try_run_case+0x170/0x3f0
[   18.464233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.464287]  kthread+0x328/0x630
[   18.464417]  ret_from_fork+0x10/0x20
[   18.464520] 
[   18.464541] Allocated by task 266:
[   18.464571]  kasan_save_stack+0x3c/0x68
[   18.464614]  kasan_save_track+0x20/0x40
[   18.464662]  kasan_save_alloc_info+0x40/0x58
[   18.464704]  __kasan_kmalloc+0xd4/0xd8
[   18.464842]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.464885]  kasan_atomics+0xb8/0x2e0
[   18.464923]  kunit_try_run_case+0x170/0x3f0
[   18.464962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.465018]  kthread+0x328/0x630
[   18.465051]  ret_from_fork+0x10/0x20
[   18.465090] 
[   18.465111] The buggy address belongs to the object at fff00000c7941e80
[   18.465111]  which belongs to the cache kmalloc-64 of size 64
[   18.465171] The buggy address is located 0 bytes to the right of
[   18.465171]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.465261] 
[   18.465282] The buggy address belongs to the physical page:
[   18.465317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.465372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.465462] page_type: f5(slab)
[   18.465672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.465737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.465827] page dumped because: kasan: bad access detected
[   18.465923] 
[   18.465945] Memory state around the buggy address:
[   18.465987]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.466200]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.466297] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.466377]                                      ^
[   18.466545]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.466591]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.466713] ==================================================================
[   18.457791] ==================================================================
[   18.457839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   18.457890] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.457942] 
[   18.457971] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.458162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.458353] Hardware name: linux,dummy-virt (DT)
[   18.458387] Call trace:
[   18.458409]  show_stack+0x20/0x38 (C)
[   18.458460]  dump_stack_lvl+0x8c/0xd0
[   18.458507]  print_report+0x118/0x5d0
[   18.458605]  kasan_report+0xdc/0x128
[   18.458855]  __asan_report_load8_noabort+0x20/0x30
[   18.458940]  kasan_atomics_helper+0x3e10/0x4858
[   18.459169]  kasan_atomics+0x198/0x2e0
[   18.459288]  kunit_try_run_case+0x170/0x3f0
[   18.459338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.459394]  kthread+0x328/0x630
[   18.459444]  ret_from_fork+0x10/0x20
[   18.459495] 
[   18.459547] Allocated by task 266:
[   18.459623]  kasan_save_stack+0x3c/0x68
[   18.459693]  kasan_save_track+0x20/0x40
[   18.459764]  kasan_save_alloc_info+0x40/0x58
[   18.459806]  __kasan_kmalloc+0xd4/0xd8
[   18.459866]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.460891]  kasan_atomics+0xb8/0x2e0
[   18.460932]  kunit_try_run_case+0x170/0x3f0
[   18.460970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.461138]  kthread+0x328/0x630
[   18.461176]  ret_from_fork+0x10/0x20
[   18.461215] 
[   18.461315] The buggy address belongs to the object at fff00000c7941e80
[   18.461315]  which belongs to the cache kmalloc-64 of size 64
[   18.461404] The buggy address is located 0 bytes to the right of
[   18.461404]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.461529] 
[   18.461551] The buggy address belongs to the physical page:
[   18.461584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.461655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.461705] page_type: f5(slab)
[   18.461744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.461798] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.461842] page dumped because: kasan: bad access detected
[   18.461876] 
[   18.461896] Memory state around the buggy address:
[   18.461929]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.461976]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.462032] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.462073]                                      ^
[   18.462108]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.462216]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.462257] ==================================================================
[   18.327145] ==================================================================
[   18.327221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   18.327356] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.327411] 
[   18.327464] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.327552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.327582] Hardware name: linux,dummy-virt (DT)
[   18.327702] Call trace:
[   18.327728]  show_stack+0x20/0x38 (C)
[   18.327793]  dump_stack_lvl+0x8c/0xd0
[   18.327844]  print_report+0x118/0x5d0
[   18.327890]  kasan_report+0xdc/0x128
[   18.327936]  kasan_check_range+0x100/0x1a8
[   18.328238]  __kasan_check_write+0x20/0x30
[   18.328467]  kasan_atomics_helper+0xff0/0x4858
[   18.328646]  kasan_atomics+0x198/0x2e0
[   18.328721]  kunit_try_run_case+0x170/0x3f0
[   18.328861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.328955]  kthread+0x328/0x630
[   18.329176]  ret_from_fork+0x10/0x20
[   18.329257] 
[   18.329277] Allocated by task 266:
[   18.329516]  kasan_save_stack+0x3c/0x68
[   18.329701]  kasan_save_track+0x20/0x40
[   18.329771]  kasan_save_alloc_info+0x40/0x58
[   18.330034]  __kasan_kmalloc+0xd4/0xd8
[   18.330109]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.330272]  kasan_atomics+0xb8/0x2e0
[   18.330456]  kunit_try_run_case+0x170/0x3f0
[   18.330562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.330644]  kthread+0x328/0x630
[   18.330910]  ret_from_fork+0x10/0x20
[   18.331030] 
[   18.331101] The buggy address belongs to the object at fff00000c7941e80
[   18.331101]  which belongs to the cache kmalloc-64 of size 64
[   18.331426] The buggy address is located 0 bytes to the right of
[   18.331426]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.331545] 
[   18.331638] The buggy address belongs to the physical page:
[   18.331674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.331731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.331779] page_type: f5(slab)
[   18.331836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.331900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.331961] page dumped because: kasan: bad access detected
[   18.332015] 
[   18.332055] Memory state around the buggy address:
[   18.332096]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.332144]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.332190] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.332246]                                      ^
[   18.332283]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.332327]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.332368] ==================================================================
[   18.441302] ==================================================================
[   18.441353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   18.441414] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.441531] 
[   18.441562] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.441646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.441674] Hardware name: linux,dummy-virt (DT)
[   18.441707] Call trace:
[   18.441729]  show_stack+0x20/0x38 (C)
[   18.441780]  dump_stack_lvl+0x8c/0xd0
[   18.441827]  print_report+0x118/0x5d0
[   18.441875]  kasan_report+0xdc/0x128
[   18.441921]  __asan_report_load8_noabort+0x20/0x30
[   18.442058]  kasan_atomics_helper+0x3db0/0x4858
[   18.442112]  kasan_atomics+0x198/0x2e0
[   18.442158]  kunit_try_run_case+0x170/0x3f0
[   18.442207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.442262]  kthread+0x328/0x630
[   18.442304]  ret_from_fork+0x10/0x20
[   18.442362] 
[   18.442382] Allocated by task 266:
[   18.442412]  kasan_save_stack+0x3c/0x68
[   18.442453]  kasan_save_track+0x20/0x40
[   18.442492]  kasan_save_alloc_info+0x40/0x58
[   18.442533]  __kasan_kmalloc+0xd4/0xd8
[   18.442572]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.442632]  kasan_atomics+0xb8/0x2e0
[   18.442795]  kunit_try_run_case+0x170/0x3f0
[   18.442996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.443044]  kthread+0x328/0x630
[   18.443077]  ret_from_fork+0x10/0x20
[   18.443113] 
[   18.443134] The buggy address belongs to the object at fff00000c7941e80
[   18.443134]  which belongs to the cache kmalloc-64 of size 64
[   18.443196] The buggy address is located 0 bytes to the right of
[   18.443196]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.443270] 
[   18.443360] The buggy address belongs to the physical page:
[   18.443537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.443677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.443786] page_type: f5(slab)
[   18.443992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.444047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.444092] page dumped because: kasan: bad access detected
[   18.444125] 
[   18.444145] Memory state around the buggy address:
[   18.444178]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.444225]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.444270] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.444312]                                      ^
[   18.444347]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.444392]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.444434] ==================================================================
[   18.358148] ==================================================================
[   18.358209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   18.358340] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.358473] 
[   18.358563] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.358848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.359033] Hardware name: linux,dummy-virt (DT)
[   18.359093] Call trace:
[   18.359144]  show_stack+0x20/0x38 (C)
[   18.359205]  dump_stack_lvl+0x8c/0xd0
[   18.359429]  print_report+0x118/0x5d0
[   18.359544]  kasan_report+0xdc/0x128
[   18.359642]  kasan_check_range+0x100/0x1a8
[   18.359778]  __kasan_check_write+0x20/0x30
[   18.359907]  kasan_atomics_helper+0x1190/0x4858
[   18.359959]  kasan_atomics+0x198/0x2e0
[   18.360127]  kunit_try_run_case+0x170/0x3f0
[   18.360195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.360250]  kthread+0x328/0x630
[   18.360443]  ret_from_fork+0x10/0x20
[   18.360507] 
[   18.360579] Allocated by task 266:
[   18.360627]  kasan_save_stack+0x3c/0x68
[   18.360718]  kasan_save_track+0x20/0x40
[   18.360901]  kasan_save_alloc_info+0x40/0x58
[   18.360962]  __kasan_kmalloc+0xd4/0xd8
[   18.361090]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.361289]  kasan_atomics+0xb8/0x2e0
[   18.361466]  kunit_try_run_case+0x170/0x3f0
[   18.361532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.361688]  kthread+0x328/0x630
[   18.361725]  ret_from_fork+0x10/0x20
[   18.361896] 
[   18.362099] The buggy address belongs to the object at fff00000c7941e80
[   18.362099]  which belongs to the cache kmalloc-64 of size 64
[   18.362276] The buggy address is located 0 bytes to the right of
[   18.362276]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.362501] 
[   18.362745] The buggy address belongs to the physical page:
[   18.362783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.362840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.362902] page_type: f5(slab)
[   18.362942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.363031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.363096] page dumped because: kasan: bad access detected
[   18.363141] 
[   18.363170] Memory state around the buggy address:
[   18.363217]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.363275]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.363321] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.363372]                                      ^
[   18.363408]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.363466]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.363524] ==================================================================
[   18.264275] ==================================================================
[   18.264345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   18.264398] Write of size 4 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.264452] 
[   18.264483] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.264565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.264594] Hardware name: linux,dummy-virt (DT)
[   18.264626] Call trace:
[   18.264649]  show_stack+0x20/0x38 (C)
[   18.264696]  dump_stack_lvl+0x8c/0xd0
[   18.264744]  print_report+0x118/0x5d0
[   18.264793]  kasan_report+0xdc/0x128
[   18.264893]  kasan_check_range+0x100/0x1a8
[   18.264946]  __kasan_check_write+0x20/0x30
[   18.265004]  kasan_atomics_helper+0xd3c/0x4858
[   18.265052]  kasan_atomics+0x198/0x2e0
[   18.265097]  kunit_try_run_case+0x170/0x3f0
[   18.265145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.265214]  kthread+0x328/0x630
[   18.265257]  ret_from_fork+0x10/0x20
[   18.265314] 
[   18.265334] Allocated by task 266:
[   18.265364]  kasan_save_stack+0x3c/0x68
[   18.265407]  kasan_save_track+0x20/0x40
[   18.265454]  kasan_save_alloc_info+0x40/0x58
[   18.265496]  __kasan_kmalloc+0xd4/0xd8
[   18.265533]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.265589]  kasan_atomics+0xb8/0x2e0
[   18.265638]  kunit_try_run_case+0x170/0x3f0
[   18.265679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.265732]  kthread+0x328/0x630
[   18.265776]  ret_from_fork+0x10/0x20
[   18.265814] 
[   18.265843] The buggy address belongs to the object at fff00000c7941e80
[   18.265843]  which belongs to the cache kmalloc-64 of size 64
[   18.265913] The buggy address is located 0 bytes to the right of
[   18.265913]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.266284] 
[   18.266654] The buggy address belongs to the physical page:
[   18.266701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.266762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.266872] page_type: f5(slab)
[   18.267061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.267348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.267466] page dumped because: kasan: bad access detected
[   18.267592] 
[   18.267615] Memory state around the buggy address:
[   18.267652]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.268084]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.268208] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.268451]                                      ^
[   18.268654]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.268876]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.269129] ==================================================================
[   18.467028] ==================================================================
[   18.467075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   18.467125] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.467177] 
[   18.467206] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.467288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.467317] Hardware name: linux,dummy-virt (DT)
[   18.467349] Call trace:
[   18.467372]  show_stack+0x20/0x38 (C)
[   18.467456]  dump_stack_lvl+0x8c/0xd0
[   18.467612]  print_report+0x118/0x5d0
[   18.467659]  kasan_report+0xdc/0x128
[   18.467708]  __asan_report_load8_noabort+0x20/0x30
[   18.467762]  kasan_atomics_helper+0x3e20/0x4858
[   18.467812]  kasan_atomics+0x198/0x2e0
[   18.467860]  kunit_try_run_case+0x170/0x3f0
[   18.467909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.468021]  kthread+0x328/0x630
[   18.468143]  ret_from_fork+0x10/0x20
[   18.468215] 
[   18.468315] Allocated by task 266:
[   18.468349]  kasan_save_stack+0x3c/0x68
[   18.468391]  kasan_save_track+0x20/0x40
[   18.468438]  kasan_save_alloc_info+0x40/0x58
[   18.468881]  __kasan_kmalloc+0xd4/0xd8
[   18.469011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.469053]  kasan_atomics+0xb8/0x2e0
[   18.469103]  kunit_try_run_case+0x170/0x3f0
[   18.469183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.469316]  kthread+0x328/0x630
[   18.469528]  ret_from_fork+0x10/0x20
[   18.469575] 
[   18.469597] The buggy address belongs to the object at fff00000c7941e80
[   18.469597]  which belongs to the cache kmalloc-64 of size 64
[   18.469659] The buggy address is located 0 bytes to the right of
[   18.469659]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.469729] 
[   18.469749] The buggy address belongs to the physical page:
[   18.469784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.469840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.469892] page_type: f5(slab)
[   18.469929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.469994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.470038] page dumped because: kasan: bad access detected
[   18.470073] 
[   18.470133] Memory state around the buggy address:
[   18.470214]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.470290]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.470337] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.470482]                                      ^
[   18.470517]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.470562]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.470604] ==================================================================
[   18.373700] ==================================================================
[   18.373808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   18.373951] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.374018] 
[   18.374050] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.374373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.374418] Hardware name: linux,dummy-virt (DT)
[   18.374626] Call trace:
[   18.374652]  show_stack+0x20/0x38 (C)
[   18.374812]  dump_stack_lvl+0x8c/0xd0
[   18.374873]  print_report+0x118/0x5d0
[   18.375206]  kasan_report+0xdc/0x128
[   18.375316]  kasan_check_range+0x100/0x1a8
[   18.375367]  __kasan_check_write+0x20/0x30
[   18.375412]  kasan_atomics_helper+0x126c/0x4858
[   18.375649]  kasan_atomics+0x198/0x2e0
[   18.375856]  kunit_try_run_case+0x170/0x3f0
[   18.375940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.376129]  kthread+0x328/0x630
[   18.376180]  ret_from_fork+0x10/0x20
[   18.376236] 
[   18.376440] Allocated by task 266:
[   18.376485]  kasan_save_stack+0x3c/0x68
[   18.376586]  kasan_save_track+0x20/0x40
[   18.376641]  kasan_save_alloc_info+0x40/0x58
[   18.376684]  __kasan_kmalloc+0xd4/0xd8
[   18.376729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.376769]  kasan_atomics+0xb8/0x2e0
[   18.377153]  kunit_try_run_case+0x170/0x3f0
[   18.377359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.377411]  kthread+0x328/0x630
[   18.377471]  ret_from_fork+0x10/0x20
[   18.377516] 
[   18.377539] The buggy address belongs to the object at fff00000c7941e80
[   18.377539]  which belongs to the cache kmalloc-64 of size 64
[   18.377601] The buggy address is located 0 bytes to the right of
[   18.377601]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.377827] 
[   18.377946] The buggy address belongs to the physical page:
[   18.378155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.378299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.378469] page_type: f5(slab)
[   18.378542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.378615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.378863] page dumped because: kasan: bad access detected
[   18.378957] 
[   18.379003] Memory state around the buggy address:
[   18.379044]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.379097]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.379141] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.379183]                                      ^
[   18.379219]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.379264]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.379386] ==================================================================
[   18.449202] ==================================================================
[   18.449257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   18.449309] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.449362] 
[   18.449402] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.449486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.449515] Hardware name: linux,dummy-virt (DT)
[   18.449550] Call trace:
[   18.449577]  show_stack+0x20/0x38 (C)
[   18.449626]  dump_stack_lvl+0x8c/0xd0
[   18.449687]  print_report+0x118/0x5d0
[   18.449753]  kasan_report+0xdc/0x128
[   18.449800]  __asan_report_load8_noabort+0x20/0x30
[   18.450134]  kasan_atomics_helper+0x3df4/0x4858
[   18.450206]  kasan_atomics+0x198/0x2e0
[   18.450440]  kunit_try_run_case+0x170/0x3f0
[   18.450691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.450967]  kthread+0x328/0x630
[   18.451021]  ret_from_fork+0x10/0x20
[   18.451069] 
[   18.451089] Allocated by task 266:
[   18.451118]  kasan_save_stack+0x3c/0x68
[   18.451160]  kasan_save_track+0x20/0x40
[   18.451198]  kasan_save_alloc_info+0x40/0x58
[   18.451240]  __kasan_kmalloc+0xd4/0xd8
[   18.451277]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.451318]  kasan_atomics+0xb8/0x2e0
[   18.451363]  kunit_try_run_case+0x170/0x3f0
[   18.451404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.451454]  kthread+0x328/0x630
[   18.451489]  ret_from_fork+0x10/0x20
[   18.451525] 
[   18.451544] The buggy address belongs to the object at fff00000c7941e80
[   18.451544]  which belongs to the cache kmalloc-64 of size 64
[   18.451604] The buggy address is located 0 bytes to the right of
[   18.451604]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.451822] 
[   18.451844] The buggy address belongs to the physical page:
[   18.451884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.452005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.452055] page_type: f5(slab)
[   18.452094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.452147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.452192] page dumped because: kasan: bad access detected
[   18.452322] 
[   18.452371] Memory state around the buggy address:
[   18.452403]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.452450]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.452502] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.452636]                                      ^
[   18.452672]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.452719]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.452816] ==================================================================
[   18.395907] ==================================================================
[   18.396015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   18.396159] Read of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.396213] 
[   18.396283] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.396476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.396522] Hardware name: linux,dummy-virt (DT)
[   18.396611] Call trace:
[   18.396842]  show_stack+0x20/0x38 (C)
[   18.397164]  dump_stack_lvl+0x8c/0xd0
[   18.397449]  print_report+0x118/0x5d0
[   18.397514]  kasan_report+0xdc/0x128
[   18.397575]  __asan_report_load8_noabort+0x20/0x30
[   18.398023]  kasan_atomics_helper+0x3f04/0x4858
[   18.398131]  kasan_atomics+0x198/0x2e0
[   18.398346]  kunit_try_run_case+0x170/0x3f0
[   18.398459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.398530]  kthread+0x328/0x630
[   18.398572]  ret_from_fork+0x10/0x20
[   18.398648] 
[   18.398692] Allocated by task 266:
[   18.398734]  kasan_save_stack+0x3c/0x68
[   18.398786]  kasan_save_track+0x20/0x40
[   18.398826]  kasan_save_alloc_info+0x40/0x58
[   18.398876]  __kasan_kmalloc+0xd4/0xd8
[   18.398925]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.398974]  kasan_atomics+0xb8/0x2e0
[   18.399023]  kunit_try_run_case+0x170/0x3f0
[   18.399061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.399107]  kthread+0x328/0x630
[   18.399140]  ret_from_fork+0x10/0x20
[   18.399176] 
[   18.399198] The buggy address belongs to the object at fff00000c7941e80
[   18.399198]  which belongs to the cache kmalloc-64 of size 64
[   18.399259] The buggy address is located 0 bytes to the right of
[   18.399259]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.399328] 
[   18.399348] The buggy address belongs to the physical page:
[   18.399400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.399463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.399512] page_type: f5(slab)
[   18.399561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.399624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.399669] page dumped because: kasan: bad access detected
[   18.399704] 
[   18.399724] Memory state around the buggy address:
[   18.399767]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.399812]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.399872] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.399913]                                      ^
[   18.399953]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.400008]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.400048] ==================================================================
[   18.348056] ==================================================================
[   18.348141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   18.348195] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.348419] 
[   18.348497] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.348623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.348671] Hardware name: linux,dummy-virt (DT)
[   18.348705] Call trace:
[   18.348755]  show_stack+0x20/0x38 (C)
[   18.349041]  dump_stack_lvl+0x8c/0xd0
[   18.349211]  print_report+0x118/0x5d0
[   18.349265]  kasan_report+0xdc/0x128
[   18.349576]  kasan_check_range+0x100/0x1a8
[   18.349670]  __kasan_check_write+0x20/0x30
[   18.349949]  kasan_atomics_helper+0x1128/0x4858
[   18.350111]  kasan_atomics+0x198/0x2e0
[   18.350284]  kunit_try_run_case+0x170/0x3f0
[   18.350414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.350596]  kthread+0x328/0x630
[   18.350641]  ret_from_fork+0x10/0x20
[   18.350993] 
[   18.351037] Allocated by task 266:
[   18.351167]  kasan_save_stack+0x3c/0x68
[   18.351343]  kasan_save_track+0x20/0x40
[   18.351630]  kasan_save_alloc_info+0x40/0x58
[   18.351823]  __kasan_kmalloc+0xd4/0xd8
[   18.351922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.352005]  kasan_atomics+0xb8/0x2e0
[   18.352050]  kunit_try_run_case+0x170/0x3f0
[   18.352276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.352480]  kthread+0x328/0x630
[   18.352958]  ret_from_fork+0x10/0x20
[   18.353159] 
[   18.353259] The buggy address belongs to the object at fff00000c7941e80
[   18.353259]  which belongs to the cache kmalloc-64 of size 64
[   18.353492] The buggy address is located 0 bytes to the right of
[   18.353492]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.353631] 
[   18.353694] The buggy address belongs to the physical page:
[   18.353833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.353937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.354321] page_type: f5(slab)
[   18.354365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.354630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.355071] page dumped because: kasan: bad access detected
[   18.355255] 
[   18.355355] Memory state around the buggy address:
[   18.355521]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.355571]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.355776] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.356151]                                      ^
[   18.356274]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.356474]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.356534] ==================================================================
[   18.470849] ==================================================================
[   18.470899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   18.470948] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.471016] 
[   18.471047] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.471129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.471158] Hardware name: linux,dummy-virt (DT)
[   18.471190] Call trace:
[   18.471213]  show_stack+0x20/0x38 (C)
[   18.471261]  dump_stack_lvl+0x8c/0xd0
[   18.471308]  print_report+0x118/0x5d0
[   18.471364]  kasan_report+0xdc/0x128
[   18.471605]  kasan_check_range+0x100/0x1a8
[   18.471742]  __kasan_check_write+0x20/0x30
[   18.471841]  kasan_atomics_helper+0x17ec/0x4858
[   18.472008]  kasan_atomics+0x198/0x2e0
[   18.472054]  kunit_try_run_case+0x170/0x3f0
[   18.472101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.472154]  kthread+0x328/0x630
[   18.472198]  ret_from_fork+0x10/0x20
[   18.472244] 
[   18.472265] Allocated by task 266:
[   18.472292]  kasan_save_stack+0x3c/0x68
[   18.472334]  kasan_save_track+0x20/0x40
[   18.472373]  kasan_save_alloc_info+0x40/0x58
[   18.472415]  __kasan_kmalloc+0xd4/0xd8
[   18.472452]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.472538]  kasan_atomics+0xb8/0x2e0
[   18.473035]  kunit_try_run_case+0x170/0x3f0
[   18.473084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.473130]  kthread+0x328/0x630
[   18.473164]  ret_from_fork+0x10/0x20
[   18.473200] 
[   18.473223] The buggy address belongs to the object at fff00000c7941e80
[   18.473223]  which belongs to the cache kmalloc-64 of size 64
[   18.473283] The buggy address is located 0 bytes to the right of
[   18.473283]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.473351] 
[   18.473371] The buggy address belongs to the physical page:
[   18.473404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.473459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.473509] page_type: f5(slab)
[   18.473546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.473600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.473644] page dumped because: kasan: bad access detected
[   18.473678] 
[   18.473699] Memory state around the buggy address:
[   18.473732]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.473779]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.473824] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.473866]                                      ^
[   18.473899]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.473945]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.474048] ==================================================================
[   18.410385] ==================================================================
[   18.410567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   18.410621] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.410673] 
[   18.410801] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.411094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.411237] Hardware name: linux,dummy-virt (DT)
[   18.411273] Call trace:
[   18.411328]  show_stack+0x20/0x38 (C)
[   18.411410]  dump_stack_lvl+0x8c/0xd0
[   18.411469]  print_report+0x118/0x5d0
[   18.411668]  kasan_report+0xdc/0x128
[   18.411740]  kasan_check_range+0x100/0x1a8
[   18.411828]  __kasan_check_write+0x20/0x30
[   18.411915]  kasan_atomics_helper+0x147c/0x4858
[   18.412043]  kasan_atomics+0x198/0x2e0
[   18.412106]  kunit_try_run_case+0x170/0x3f0
[   18.412155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.412214]  kthread+0x328/0x630
[   18.412382]  ret_from_fork+0x10/0x20
[   18.412533] 
[   18.412578] Allocated by task 266:
[   18.412617]  kasan_save_stack+0x3c/0x68
[   18.412671]  kasan_save_track+0x20/0x40
[   18.412867]  kasan_save_alloc_info+0x40/0x58
[   18.413079]  __kasan_kmalloc+0xd4/0xd8
[   18.413272]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.413378]  kasan_atomics+0xb8/0x2e0
[   18.413512]  kunit_try_run_case+0x170/0x3f0
[   18.413555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.413725]  kthread+0x328/0x630
[   18.413897]  ret_from_fork+0x10/0x20
[   18.414048] 
[   18.414116] The buggy address belongs to the object at fff00000c7941e80
[   18.414116]  which belongs to the cache kmalloc-64 of size 64
[   18.414333] The buggy address is located 0 bytes to the right of
[   18.414333]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.414538] 
[   18.414618] The buggy address belongs to the physical page:
[   18.414690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.414747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.414797] page_type: f5(slab)
[   18.415031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.415157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.415257] page dumped because: kasan: bad access detected
[   18.415585] 
[   18.415655] Memory state around the buggy address:
[   18.415694]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.416006]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.416062] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.416265]                                      ^
[   18.416423]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.416480]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.416638] ==================================================================
[   18.444555] ==================================================================
[   18.444599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   18.444762] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.444856] 
[   18.444915] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.445019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.445049] Hardware name: linux,dummy-virt (DT)
[   18.445080] Call trace:
[   18.445105]  show_stack+0x20/0x38 (C)
[   18.445152]  dump_stack_lvl+0x8c/0xd0
[   18.445201]  print_report+0x118/0x5d0
[   18.445247]  kasan_report+0xdc/0x128
[   18.445294]  kasan_check_range+0x100/0x1a8
[   18.445344]  __kasan_check_write+0x20/0x30
[   18.445405]  kasan_atomics_helper+0x1644/0x4858
[   18.445455]  kasan_atomics+0x198/0x2e0
[   18.445514]  kunit_try_run_case+0x170/0x3f0
[   18.445562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.445664]  kthread+0x328/0x630
[   18.445821]  ret_from_fork+0x10/0x20
[   18.445877] 
[   18.445897] Allocated by task 266:
[   18.445927]  kasan_save_stack+0x3c/0x68
[   18.445967]  kasan_save_track+0x20/0x40
[   18.446021]  kasan_save_alloc_info+0x40/0x58
[   18.446062]  __kasan_kmalloc+0xd4/0xd8
[   18.446101]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.446141]  kasan_atomics+0xb8/0x2e0
[   18.446278]  kunit_try_run_case+0x170/0x3f0
[   18.446444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.446536]  kthread+0x328/0x630
[   18.446570]  ret_from_fork+0x10/0x20
[   18.446607] 
[   18.446629] The buggy address belongs to the object at fff00000c7941e80
[   18.446629]  which belongs to the cache kmalloc-64 of size 64
[   18.446690] The buggy address is located 0 bytes to the right of
[   18.446690]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.446768] 
[   18.446789] The buggy address belongs to the physical page:
[   18.446823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.446877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.446929] page_type: f5(slab)
[   18.446970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.447034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.447203] page dumped because: kasan: bad access detected
[   18.447273] 
[   18.447294] Memory state around the buggy address:
[   18.447327]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.447417]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.447483] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.447526]                                      ^
[   18.447569]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.447825]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.448461] ==================================================================
[   18.385608] ==================================================================
[   18.385702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   18.385752] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.385805] 
[   18.385836] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.386792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.387069] Hardware name: linux,dummy-virt (DT)
[   18.387122] Call trace:
[   18.387294]  show_stack+0x20/0x38 (C)
[   18.387600]  dump_stack_lvl+0x8c/0xd0
[   18.387711]  print_report+0x118/0x5d0
[   18.387848]  kasan_report+0xdc/0x128
[   18.388121]  kasan_check_range+0x100/0x1a8
[   18.388179]  __kasan_check_write+0x20/0x30
[   18.388408]  kasan_atomics_helper+0x1384/0x4858
[   18.388620]  kasan_atomics+0x198/0x2e0
[   18.389133]  kunit_try_run_case+0x170/0x3f0
[   18.389345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.389468]  kthread+0x328/0x630
[   18.389559]  ret_from_fork+0x10/0x20
[   18.389616] 
[   18.389794] Allocated by task 266:
[   18.389867]  kasan_save_stack+0x3c/0x68
[   18.389914]  kasan_save_track+0x20/0x40
[   18.389955]  kasan_save_alloc_info+0x40/0x58
[   18.390148]  __kasan_kmalloc+0xd4/0xd8
[   18.390483]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.390664]  kasan_atomics+0xb8/0x2e0
[   18.390905]  kunit_try_run_case+0x170/0x3f0
[   18.391027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.391426]  kthread+0x328/0x630
[   18.391585]  ret_from_fork+0x10/0x20
[   18.391684] 
[   18.391780] The buggy address belongs to the object at fff00000c7941e80
[   18.391780]  which belongs to the cache kmalloc-64 of size 64
[   18.392055] The buggy address is located 0 bytes to the right of
[   18.392055]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.392172] 
[   18.392194] The buggy address belongs to the physical page:
[   18.392229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.392582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.392853] page_type: f5(slab)
[   18.392900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.393072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.393171] page dumped because: kasan: bad access detected
[   18.393207] 
[   18.393227] Memory state around the buggy address:
[   18.393289]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.393336]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.393607] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.393834]                                      ^
[   18.394143]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.394327]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.394438] ==================================================================
[   18.332599] ==================================================================
[   18.332946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   18.333057] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.333119] 
[   18.333149] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.333234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.333280] Hardware name: linux,dummy-virt (DT)
[   18.333509] Call trace:
[   18.333644]  show_stack+0x20/0x38 (C)
[   18.333908]  dump_stack_lvl+0x8c/0xd0
[   18.334088]  print_report+0x118/0x5d0
[   18.334198]  kasan_report+0xdc/0x128
[   18.334245]  kasan_check_range+0x100/0x1a8
[   18.334308]  __kasan_check_write+0x20/0x30
[   18.334715]  kasan_atomics_helper+0x1058/0x4858
[   18.334847]  kasan_atomics+0x198/0x2e0
[   18.335141]  kunit_try_run_case+0x170/0x3f0
[   18.335256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.335391]  kthread+0x328/0x630
[   18.335591]  ret_from_fork+0x10/0x20
[   18.335746] 
[   18.335790] Allocated by task 266:
[   18.336003]  kasan_save_stack+0x3c/0x68
[   18.336098]  kasan_save_track+0x20/0x40
[   18.336172]  kasan_save_alloc_info+0x40/0x58
[   18.336325]  __kasan_kmalloc+0xd4/0xd8
[   18.336595]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.336814]  kasan_atomics+0xb8/0x2e0
[   18.336916]  kunit_try_run_case+0x170/0x3f0
[   18.337087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.337237]  kthread+0x328/0x630
[   18.337297]  ret_from_fork+0x10/0x20
[   18.337646] 
[   18.337799] The buggy address belongs to the object at fff00000c7941e80
[   18.337799]  which belongs to the cache kmalloc-64 of size 64
[   18.338019] The buggy address is located 0 bytes to the right of
[   18.338019]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.338185] 
[   18.338334] The buggy address belongs to the physical page:
[   18.338400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.338739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.338820] page_type: f5(slab)
[   18.338966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.339071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.339398] page dumped because: kasan: bad access detected
[   18.339481] 
[   18.339672] Memory state around the buggy address:
[   18.339713]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.339766]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.340065] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.340319]                                      ^
[   18.340648]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.340763]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.340805] ==================================================================
[   18.311207] ==================================================================
[   18.311388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   18.311452] Write of size 8 at addr fff00000c7941eb0 by task kunit_try_catch/266
[   18.311562] 
[   18.311621] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.312079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.312149] Hardware name: linux,dummy-virt (DT)
[   18.312193] Call trace:
[   18.312309]  show_stack+0x20/0x38 (C)
[   18.312384]  dump_stack_lvl+0x8c/0xd0
[   18.312573]  print_report+0x118/0x5d0
[   18.312627]  kasan_report+0xdc/0x128
[   18.312673]  kasan_check_range+0x100/0x1a8
[   18.312791]  __kasan_check_write+0x20/0x30
[   18.312856]  kasan_atomics_helper+0xf20/0x4858
[   18.312905]  kasan_atomics+0x198/0x2e0
[   18.312956]  kunit_try_run_case+0x170/0x3f0
[   18.313231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.313363]  kthread+0x328/0x630
[   18.313608]  ret_from_fork+0x10/0x20
[   18.313779] 
[   18.313882] Allocated by task 266:
[   18.313972]  kasan_save_stack+0x3c/0x68
[   18.314100]  kasan_save_track+0x20/0x40
[   18.314287]  kasan_save_alloc_info+0x40/0x58
[   18.314415]  __kasan_kmalloc+0xd4/0xd8
[   18.314461]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.314728]  kasan_atomics+0xb8/0x2e0
[   18.314863]  kunit_try_run_case+0x170/0x3f0
[   18.315139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.315266]  kthread+0x328/0x630
[   18.315337]  ret_from_fork+0x10/0x20
[   18.315416] 
[   18.315590] The buggy address belongs to the object at fff00000c7941e80
[   18.315590]  which belongs to the cache kmalloc-64 of size 64
[   18.315946] The buggy address is located 0 bytes to the right of
[   18.315946]  allocated 48-byte region [fff00000c7941e80, fff00000c7941eb0)
[   18.316083] 
[   18.316155] The buggy address belongs to the physical page:
[   18.316566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107941
[   18.316703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.316958] page_type: f5(slab)
[   18.317229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.317310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.317506] page dumped because: kasan: bad access detected
[   18.317629] 
[   18.317756] Memory state around the buggy address:
[   18.317816]  fff00000c7941d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.318031]  fff00000c7941e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.318132] >fff00000c7941e80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.318314]                                      ^
[   18.318401]  fff00000c7941f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.318458]  fff00000c7941f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.318534] ==================================================================

[   16.044415] ==================================================================
[   16.044761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   16.045075] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.045409] 
[   16.045533] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.045596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.045610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.045632] Call Trace:
[   16.045648]  <TASK>
[   16.045674]  dump_stack_lvl+0x73/0xb0
[   16.045703]  print_report+0xd1/0x610
[   16.045727]  ? __virt_addr_valid+0x1db/0x2d0
[   16.045760]  ? kasan_atomics_helper+0xe78/0x5450
[   16.045783]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.045809]  ? kasan_atomics_helper+0xe78/0x5450
[   16.045842]  kasan_report+0x141/0x180
[   16.045866]  ? kasan_atomics_helper+0xe78/0x5450
[   16.045894]  kasan_check_range+0x10c/0x1c0
[   16.045927]  __kasan_check_write+0x18/0x20
[   16.045949]  kasan_atomics_helper+0xe78/0x5450
[   16.045973]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.046008]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.046034]  ? trace_hardirqs_on+0x37/0xe0
[   16.046066]  ? kasan_atomics+0x152/0x310
[   16.046094]  kasan_atomics+0x1dc/0x310
[   16.046118]  ? __pfx_kasan_atomics+0x10/0x10
[   16.046154]  ? __pfx_kasan_atomics+0x10/0x10
[   16.046182]  kunit_try_run_case+0x1a5/0x480
[   16.046208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.046232]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.046258]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.046284]  ? __kthread_parkme+0x82/0x180
[   16.046306]  ? preempt_count_sub+0x50/0x80
[   16.046330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.046356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.046391]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.046429]  kthread+0x337/0x6f0
[   16.046450]  ? trace_preempt_on+0x20/0xc0
[   16.046483]  ? __pfx_kthread+0x10/0x10
[   16.046506]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.046529]  ? calculate_sigpending+0x7b/0xa0
[   16.046563]  ? __pfx_kthread+0x10/0x10
[   16.046586]  ret_from_fork+0x116/0x1d0
[   16.046606]  ? __pfx_kthread+0x10/0x10
[   16.046629]  ret_from_fork_asm+0x1a/0x30
[   16.046660]  </TASK>
[   16.046672] 
[   16.064248] Allocated by task 282:
[   16.064791]  kasan_save_stack+0x45/0x70
[   16.065300]  kasan_save_track+0x18/0x40
[   16.065695]  kasan_save_alloc_info+0x3b/0x50
[   16.066241]  __kasan_kmalloc+0xb7/0xc0
[   16.066444]  __kmalloc_cache_noprof+0x189/0x420
[   16.066860]  kasan_atomics+0x95/0x310
[   16.067321]  kunit_try_run_case+0x1a5/0x480
[   16.067777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.067967]  kthread+0x337/0x6f0
[   16.068101]  ret_from_fork+0x116/0x1d0
[   16.068240]  ret_from_fork_asm+0x1a/0x30
[   16.068383] 
[   16.068574] The buggy address belongs to the object at ffff888102a5fe80
[   16.068574]  which belongs to the cache kmalloc-64 of size 64
[   16.070096] The buggy address is located 0 bytes to the right of
[   16.070096]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.071468] 
[   16.071810] The buggy address belongs to the physical page:
[   16.072432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.072948] flags: 0x200000000000000(node=0|zone=2)
[   16.073123] page_type: f5(slab)
[   16.073247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.073837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.074701] page dumped because: kasan: bad access detected
[   16.075520] 
[   16.075861] Memory state around the buggy address:
[   16.076404]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.077048]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.077534] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.077770]                                      ^
[   16.077928]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.078144]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.078359] ==================================================================
[   15.983174] ==================================================================
[   15.983746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.984099] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.984574] 
[   15.984696] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.984755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.984768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.984792] Call Trace:
[   15.984816]  <TASK>
[   15.984831]  dump_stack_lvl+0x73/0xb0
[   15.984863]  print_report+0xd1/0x610
[   15.984886]  ? __virt_addr_valid+0x1db/0x2d0
[   15.984920]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.984944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.984980]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.985003]  kasan_report+0x141/0x180
[   15.985028]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.985056]  __asan_report_load4_noabort+0x18/0x20
[   15.985083]  kasan_atomics_helper+0x4a84/0x5450
[   15.985108]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.985133]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.985169]  ? trace_hardirqs_on+0x37/0xe0
[   15.985192]  ? kasan_atomics+0x152/0x310
[   15.985230]  kasan_atomics+0x1dc/0x310
[   15.985254]  ? __pfx_kasan_atomics+0x10/0x10
[   15.985280]  ? __pfx_kasan_atomics+0x10/0x10
[   15.985473]  kunit_try_run_case+0x1a5/0x480
[   15.985521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.985547]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.985594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.985620]  ? __kthread_parkme+0x82/0x180
[   15.985643]  ? preempt_count_sub+0x50/0x80
[   15.985668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.985694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.985721]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.985748]  kthread+0x337/0x6f0
[   15.985769]  ? trace_preempt_on+0x20/0xc0
[   15.985793]  ? __pfx_kthread+0x10/0x10
[   15.985815]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.985838]  ? calculate_sigpending+0x7b/0xa0
[   15.985863]  ? __pfx_kthread+0x10/0x10
[   15.985897]  ret_from_fork+0x116/0x1d0
[   15.985917]  ? __pfx_kthread+0x10/0x10
[   15.985940]  ret_from_fork_asm+0x1a/0x30
[   15.985983]  </TASK>
[   15.985995] 
[   15.994698] Allocated by task 282:
[   15.994930]  kasan_save_stack+0x45/0x70
[   15.995148]  kasan_save_track+0x18/0x40
[   15.995486]  kasan_save_alloc_info+0x3b/0x50
[   15.995666]  __kasan_kmalloc+0xb7/0xc0
[   15.995883]  __kmalloc_cache_noprof+0x189/0x420
[   15.996140]  kasan_atomics+0x95/0x310
[   15.996379]  kunit_try_run_case+0x1a5/0x480
[   15.996527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.996713]  kthread+0x337/0x6f0
[   15.996881]  ret_from_fork+0x116/0x1d0
[   15.997181]  ret_from_fork_asm+0x1a/0x30
[   15.997366] 
[   15.997439] The buggy address belongs to the object at ffff888102a5fe80
[   15.997439]  which belongs to the cache kmalloc-64 of size 64
[   15.998228] The buggy address is located 0 bytes to the right of
[   15.998228]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.998983] 
[   15.999060] The buggy address belongs to the physical page:
[   15.999443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.999826] flags: 0x200000000000000(node=0|zone=2)
[   16.000074] page_type: f5(slab)
[   16.000234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.000756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.001075] page dumped because: kasan: bad access detected
[   16.001439] 
[   16.001533] Memory state around the buggy address:
[   16.001761]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.002016]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.002244] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.002832]                                      ^
[   16.003076]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.003464]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.003755] ==================================================================
[   16.282990] ==================================================================
[   16.283796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   16.284356] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.285177] 
[   16.285413] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.285540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.285661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.285686] Call Trace:
[   16.285703]  <TASK>
[   16.285733]  dump_stack_lvl+0x73/0xb0
[   16.285765]  print_report+0xd1/0x610
[   16.285795]  ? __virt_addr_valid+0x1db/0x2d0
[   16.285820]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.285843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.285868]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.285892]  kasan_report+0x141/0x180
[   16.285915]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.285943]  __asan_report_load4_noabort+0x18/0x20
[   16.285970]  kasan_atomics_helper+0x49e8/0x5450
[   16.285994]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.286018]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.286045]  ? trace_hardirqs_on+0x37/0xe0
[   16.286069]  ? kasan_atomics+0x152/0x310
[   16.286097]  kasan_atomics+0x1dc/0x310
[   16.286120]  ? __pfx_kasan_atomics+0x10/0x10
[   16.286145]  ? __pfx_kasan_atomics+0x10/0x10
[   16.286173]  kunit_try_run_case+0x1a5/0x480
[   16.286199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.286224]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.286250]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.286276]  ? __kthread_parkme+0x82/0x180
[   16.286299]  ? preempt_count_sub+0x50/0x80
[   16.286324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.286350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.286377]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.286404]  kthread+0x337/0x6f0
[   16.286458]  ? trace_preempt_on+0x20/0xc0
[   16.286481]  ? __pfx_kthread+0x10/0x10
[   16.286503]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.286526]  ? calculate_sigpending+0x7b/0xa0
[   16.286562]  ? __pfx_kthread+0x10/0x10
[   16.286585]  ret_from_fork+0x116/0x1d0
[   16.286605]  ? __pfx_kthread+0x10/0x10
[   16.286627]  ret_from_fork_asm+0x1a/0x30
[   16.286659]  </TASK>
[   16.286669] 
[   16.299062] Allocated by task 282:
[   16.299421]  kasan_save_stack+0x45/0x70
[   16.299632]  kasan_save_track+0x18/0x40
[   16.299811]  kasan_save_alloc_info+0x3b/0x50
[   16.300005]  __kasan_kmalloc+0xb7/0xc0
[   16.300184]  __kmalloc_cache_noprof+0x189/0x420
[   16.300388]  kasan_atomics+0x95/0x310
[   16.301010]  kunit_try_run_case+0x1a5/0x480
[   16.301283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.301753]  kthread+0x337/0x6f0
[   16.302111]  ret_from_fork+0x116/0x1d0
[   16.302427]  ret_from_fork_asm+0x1a/0x30
[   16.302836] 
[   16.302942] The buggy address belongs to the object at ffff888102a5fe80
[   16.302942]  which belongs to the cache kmalloc-64 of size 64
[   16.303402] The buggy address is located 0 bytes to the right of
[   16.303402]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.304157] 
[   16.304249] The buggy address belongs to the physical page:
[   16.304803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.305273] flags: 0x200000000000000(node=0|zone=2)
[   16.305706] page_type: f5(slab)
[   16.306001] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.306261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.306766] page dumped because: kasan: bad access detected
[   16.307244] 
[   16.307352] Memory state around the buggy address:
[   16.307720]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.307947]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.308175] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.308390]                                      ^
[   16.308547]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.309228]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.309511] ==================================================================
[   16.918740] ==================================================================
[   16.919829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.920105] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.920324] 
[   16.920410] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.920455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.920469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.920491] Call Trace:
[   16.920506]  <TASK>
[   16.920521]  dump_stack_lvl+0x73/0xb0
[   16.920562]  print_report+0xd1/0x610
[   16.920586]  ? __virt_addr_valid+0x1db/0x2d0
[   16.920610]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.920632]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.920679]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.920716]  kasan_report+0x141/0x180
[   16.920753]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.920782]  __asan_report_load8_noabort+0x18/0x20
[   16.920809]  kasan_atomics_helper+0x4f98/0x5450
[   16.920833]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.920858]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.920883]  ? trace_hardirqs_on+0x37/0xe0
[   16.920907]  ? kasan_atomics+0x152/0x310
[   16.920935]  kasan_atomics+0x1dc/0x310
[   16.920959]  ? __pfx_kasan_atomics+0x10/0x10
[   16.920984]  ? __pfx_kasan_atomics+0x10/0x10
[   16.921012]  kunit_try_run_case+0x1a5/0x480
[   16.921052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.921091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.921117]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.921143]  ? __kthread_parkme+0x82/0x180
[   16.921166]  ? preempt_count_sub+0x50/0x80
[   16.921191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.921217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.921244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.921272]  kthread+0x337/0x6f0
[   16.921292]  ? trace_preempt_on+0x20/0xc0
[   16.921316]  ? __pfx_kthread+0x10/0x10
[   16.921339]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.921363]  ? calculate_sigpending+0x7b/0xa0
[   16.921388]  ? __pfx_kthread+0x10/0x10
[   16.921421]  ret_from_fork+0x116/0x1d0
[   16.921444]  ? __pfx_kthread+0x10/0x10
[   16.921465]  ret_from_fork_asm+0x1a/0x30
[   16.921497]  </TASK>
[   16.921508] 
[   16.928867] Allocated by task 282:
[   16.929041]  kasan_save_stack+0x45/0x70
[   16.929240]  kasan_save_track+0x18/0x40
[   16.929470]  kasan_save_alloc_info+0x3b/0x50
[   16.929674]  __kasan_kmalloc+0xb7/0xc0
[   16.929874]  __kmalloc_cache_noprof+0x189/0x420
[   16.930117]  kasan_atomics+0x95/0x310
[   16.930306]  kunit_try_run_case+0x1a5/0x480
[   16.930502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.930757]  kthread+0x337/0x6f0
[   16.930925]  ret_from_fork+0x116/0x1d0
[   16.931130]  ret_from_fork_asm+0x1a/0x30
[   16.931357] 
[   16.931483] The buggy address belongs to the object at ffff888102a5fe80
[   16.931483]  which belongs to the cache kmalloc-64 of size 64
[   16.932024] The buggy address is located 0 bytes to the right of
[   16.932024]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.932643] 
[   16.932740] The buggy address belongs to the physical page:
[   16.932987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.933320] flags: 0x200000000000000(node=0|zone=2)
[   16.933503] page_type: f5(slab)
[   16.933665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.934021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.934351] page dumped because: kasan: bad access detected
[   16.934587] 
[   16.934655] Memory state around the buggy address:
[   16.934837]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.935174]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.935540] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.935791]                                      ^
[   16.936028]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.936333]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.936673] ==================================================================
[   16.548421] ==================================================================
[   16.548825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.549189] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.549562] 
[   16.549756] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.549800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.549815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.549836] Call Trace:
[   16.549850]  <TASK>
[   16.549866]  dump_stack_lvl+0x73/0xb0
[   16.549894]  print_report+0xd1/0x610
[   16.549917]  ? __virt_addr_valid+0x1db/0x2d0
[   16.549941]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.549964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.549990]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.550035]  kasan_report+0x141/0x180
[   16.550059]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.550087]  kasan_check_range+0x10c/0x1c0
[   16.550113]  __kasan_check_write+0x18/0x20
[   16.550134]  kasan_atomics_helper+0x16e7/0x5450
[   16.550159]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.550183]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.550210]  ? trace_hardirqs_on+0x37/0xe0
[   16.550233]  ? kasan_atomics+0x152/0x310
[   16.550260]  kasan_atomics+0x1dc/0x310
[   16.550284]  ? __pfx_kasan_atomics+0x10/0x10
[   16.550309]  ? __pfx_kasan_atomics+0x10/0x10
[   16.550337]  kunit_try_run_case+0x1a5/0x480
[   16.550363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.550387]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.550413]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.550439]  ? __kthread_parkme+0x82/0x180
[   16.550460]  ? preempt_count_sub+0x50/0x80
[   16.550486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.550538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.550576]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.550603]  kthread+0x337/0x6f0
[   16.550624]  ? trace_preempt_on+0x20/0xc0
[   16.550649]  ? __pfx_kthread+0x10/0x10
[   16.550671]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.550694]  ? calculate_sigpending+0x7b/0xa0
[   16.550719]  ? __pfx_kthread+0x10/0x10
[   16.550742]  ret_from_fork+0x116/0x1d0
[   16.550762]  ? __pfx_kthread+0x10/0x10
[   16.550784]  ret_from_fork_asm+0x1a/0x30
[   16.550816]  </TASK>
[   16.550827] 
[   16.558583] Allocated by task 282:
[   16.558864]  kasan_save_stack+0x45/0x70
[   16.559053]  kasan_save_track+0x18/0x40
[   16.559229]  kasan_save_alloc_info+0x3b/0x50
[   16.559471]  __kasan_kmalloc+0xb7/0xc0
[   16.559626]  __kmalloc_cache_noprof+0x189/0x420
[   16.559845]  kasan_atomics+0x95/0x310
[   16.560034]  kunit_try_run_case+0x1a5/0x480
[   16.560259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.560523]  kthread+0x337/0x6f0
[   16.560676]  ret_from_fork+0x116/0x1d0
[   16.560886]  ret_from_fork_asm+0x1a/0x30
[   16.561052] 
[   16.561154] The buggy address belongs to the object at ffff888102a5fe80
[   16.561154]  which belongs to the cache kmalloc-64 of size 64
[   16.561618] The buggy address is located 0 bytes to the right of
[   16.561618]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.561975] 
[   16.562044] The buggy address belongs to the physical page:
[   16.562280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.562648] flags: 0x200000000000000(node=0|zone=2)
[   16.562879] page_type: f5(slab)
[   16.563067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.563517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.563744] page dumped because: kasan: bad access detected
[   16.563922] 
[   16.564019] Memory state around the buggy address:
[   16.564274]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.564629]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.565026] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.565262]                                      ^
[   16.565426]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.565783]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.566095] ==================================================================
[   15.882041] ==================================================================
[   15.882452] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.882690] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.883129] 
[   15.883224] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.883323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.883337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.883371] Call Trace:
[   15.883387]  <TASK>
[   15.883403]  dump_stack_lvl+0x73/0xb0
[   15.883453]  print_report+0xd1/0x610
[   15.883476]  ? __virt_addr_valid+0x1db/0x2d0
[   15.883507]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.883531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.883574]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.883598]  kasan_report+0x141/0x180
[   15.883621]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.883649]  kasan_check_range+0x10c/0x1c0
[   15.883674]  __kasan_check_write+0x18/0x20
[   15.883696]  kasan_atomics_helper+0xa2b/0x5450
[   15.883720]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.883745]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.883780]  ? trace_hardirqs_on+0x37/0xe0
[   15.883804]  ? kasan_atomics+0x152/0x310
[   15.883842]  kasan_atomics+0x1dc/0x310
[   15.883866]  ? __pfx_kasan_atomics+0x10/0x10
[   15.883892]  ? __pfx_kasan_atomics+0x10/0x10
[   15.883919]  kunit_try_run_case+0x1a5/0x480
[   15.883945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.883971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.883996]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.884022]  ? __kthread_parkme+0x82/0x180
[   15.884044]  ? preempt_count_sub+0x50/0x80
[   15.884077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.884104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.884130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.884157]  kthread+0x337/0x6f0
[   15.884177]  ? trace_preempt_on+0x20/0xc0
[   15.884201]  ? __pfx_kthread+0x10/0x10
[   15.884222]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.884426]  ? calculate_sigpending+0x7b/0xa0
[   15.884463]  ? __pfx_kthread+0x10/0x10
[   15.884486]  ret_from_fork+0x116/0x1d0
[   15.884520]  ? __pfx_kthread+0x10/0x10
[   15.884542]  ret_from_fork_asm+0x1a/0x30
[   15.884583]  </TASK>
[   15.884594] 
[   15.894235] Allocated by task 282:
[   15.894371]  kasan_save_stack+0x45/0x70
[   15.894518]  kasan_save_track+0x18/0x40
[   15.895023]  kasan_save_alloc_info+0x3b/0x50
[   15.895573]  __kasan_kmalloc+0xb7/0xc0
[   15.895933]  __kmalloc_cache_noprof+0x189/0x420
[   15.896527]  kasan_atomics+0x95/0x310
[   15.896998]  kunit_try_run_case+0x1a5/0x480
[   15.897447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.897999]  kthread+0x337/0x6f0
[   15.898512]  ret_from_fork+0x116/0x1d0
[   15.899084]  ret_from_fork_asm+0x1a/0x30
[   15.899597] 
[   15.899789] The buggy address belongs to the object at ffff888102a5fe80
[   15.899789]  which belongs to the cache kmalloc-64 of size 64
[   15.900912] The buggy address is located 0 bytes to the right of
[   15.900912]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.901959] 
[   15.902123] The buggy address belongs to the physical page:
[   15.902659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.902909] flags: 0x200000000000000(node=0|zone=2)
[   15.903076] page_type: f5(slab)
[   15.903199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.903989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.904897] page dumped because: kasan: bad access detected
[   15.905488] 
[   15.905664] Memory state around the buggy address:
[   15.906098]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.906880]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.907696] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.908102]                                      ^
[   15.908411]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.909124]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.909837] ==================================================================
[   16.079495] ==================================================================
[   16.080148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   16.080811] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.081505] 
[   16.081718] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.081766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.081779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.081815] Call Trace:
[   16.081832]  <TASK>
[   16.081848]  dump_stack_lvl+0x73/0xb0
[   16.081878]  print_report+0xd1/0x610
[   16.081901]  ? __virt_addr_valid+0x1db/0x2d0
[   16.081925]  ? kasan_atomics_helper+0xf10/0x5450
[   16.081957]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.081982]  ? kasan_atomics_helper+0xf10/0x5450
[   16.082005]  kasan_report+0x141/0x180
[   16.082039]  ? kasan_atomics_helper+0xf10/0x5450
[   16.082067]  kasan_check_range+0x10c/0x1c0
[   16.082092]  __kasan_check_write+0x18/0x20
[   16.082113]  kasan_atomics_helper+0xf10/0x5450
[   16.082137]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.082162]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.082188]  ? trace_hardirqs_on+0x37/0xe0
[   16.082211]  ? kasan_atomics+0x152/0x310
[   16.082239]  kasan_atomics+0x1dc/0x310
[   16.082262]  ? __pfx_kasan_atomics+0x10/0x10
[   16.082286]  ? __pfx_kasan_atomics+0x10/0x10
[   16.082315]  kunit_try_run_case+0x1a5/0x480
[   16.082339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.082364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.082389]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.082431]  ? __kthread_parkme+0x82/0x180
[   16.082454]  ? preempt_count_sub+0x50/0x80
[   16.082479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.082506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.082533]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.082569]  kthread+0x337/0x6f0
[   16.082589]  ? trace_preempt_on+0x20/0xc0
[   16.082613]  ? __pfx_kthread+0x10/0x10
[   16.082634]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.082657]  ? calculate_sigpending+0x7b/0xa0
[   16.082683]  ? __pfx_kthread+0x10/0x10
[   16.082705]  ret_from_fork+0x116/0x1d0
[   16.082726]  ? __pfx_kthread+0x10/0x10
[   16.082747]  ret_from_fork_asm+0x1a/0x30
[   16.082780]  </TASK>
[   16.082791] 
[   16.096577] Allocated by task 282:
[   16.096827]  kasan_save_stack+0x45/0x70
[   16.097124]  kasan_save_track+0x18/0x40
[   16.097263]  kasan_save_alloc_info+0x3b/0x50
[   16.097433]  __kasan_kmalloc+0xb7/0xc0
[   16.097807]  __kmalloc_cache_noprof+0x189/0x420
[   16.098233]  kasan_atomics+0x95/0x310
[   16.098683]  kunit_try_run_case+0x1a5/0x480
[   16.099075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.099600]  kthread+0x337/0x6f0
[   16.099833]  ret_from_fork+0x116/0x1d0
[   16.099969]  ret_from_fork_asm+0x1a/0x30
[   16.100116] 
[   16.100190] The buggy address belongs to the object at ffff888102a5fe80
[   16.100190]  which belongs to the cache kmalloc-64 of size 64
[   16.100806] The buggy address is located 0 bytes to the right of
[   16.100806]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.102128] 
[   16.102316] The buggy address belongs to the physical page:
[   16.102839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.103535] flags: 0x200000000000000(node=0|zone=2)
[   16.103984] page_type: f5(slab)
[   16.104298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.104914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.105145] page dumped because: kasan: bad access detected
[   16.105318] 
[   16.105391] Memory state around the buggy address:
[   16.105918]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.106434]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.107037] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.107259]                                      ^
[   16.107433]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.108082]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.108777] ==================================================================
[   15.611957] ==================================================================
[   15.612369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.612775] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.613061] 
[   15.613146] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.613189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.613202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.613223] Call Trace:
[   15.613240]  <TASK>
[   15.613256]  dump_stack_lvl+0x73/0xb0
[   15.613285]  print_report+0xd1/0x610
[   15.613309]  ? __virt_addr_valid+0x1db/0x2d0
[   15.613333]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.613356]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.613382]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.613406]  kasan_report+0x141/0x180
[   15.613505]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.613536]  __asan_report_load4_noabort+0x18/0x20
[   15.613577]  kasan_atomics_helper+0x4b54/0x5450
[   15.613602]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.613627]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.613654]  ? trace_hardirqs_on+0x37/0xe0
[   15.613678]  ? kasan_atomics+0x152/0x310
[   15.613706]  kasan_atomics+0x1dc/0x310
[   15.613729]  ? __pfx_kasan_atomics+0x10/0x10
[   15.613754]  ? __pfx_kasan_atomics+0x10/0x10
[   15.613783]  kunit_try_run_case+0x1a5/0x480
[   15.613810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.613834]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.613860]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.613886]  ? __kthread_parkme+0x82/0x180
[   15.613908]  ? preempt_count_sub+0x50/0x80
[   15.613934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.613961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.613988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.614016]  kthread+0x337/0x6f0
[   15.614038]  ? trace_preempt_on+0x20/0xc0
[   15.614063]  ? __pfx_kthread+0x10/0x10
[   15.614086]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.614110]  ? calculate_sigpending+0x7b/0xa0
[   15.614136]  ? __pfx_kthread+0x10/0x10
[   15.614159]  ret_from_fork+0x116/0x1d0
[   15.614179]  ? __pfx_kthread+0x10/0x10
[   15.614201]  ret_from_fork_asm+0x1a/0x30
[   15.614234]  </TASK>
[   15.614245] 
[   15.622124] Allocated by task 282:
[   15.622259]  kasan_save_stack+0x45/0x70
[   15.622679]  kasan_save_track+0x18/0x40
[   15.622894]  kasan_save_alloc_info+0x3b/0x50
[   15.623106]  __kasan_kmalloc+0xb7/0xc0
[   15.623395]  __kmalloc_cache_noprof+0x189/0x420
[   15.623628]  kasan_atomics+0x95/0x310
[   15.623768]  kunit_try_run_case+0x1a5/0x480
[   15.623918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.624103]  kthread+0x337/0x6f0
[   15.624226]  ret_from_fork+0x116/0x1d0
[   15.624419]  ret_from_fork_asm+0x1a/0x30
[   15.624630] 
[   15.624728] The buggy address belongs to the object at ffff888102a5fe80
[   15.624728]  which belongs to the cache kmalloc-64 of size 64
[   15.625261] The buggy address is located 0 bytes to the right of
[   15.625261]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.625897] 
[   15.625975] The buggy address belongs to the physical page:
[   15.626149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.626835] flags: 0x200000000000000(node=0|zone=2)
[   15.627378] page_type: f5(slab)
[   15.627562] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.627870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.628106] page dumped because: kasan: bad access detected
[   15.628302] 
[   15.628398] Memory state around the buggy address:
[   15.628635]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.628966]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.629355] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.629664]                                      ^
[   15.629883]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.630159]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.631407] ==================================================================
[   16.504358] ==================================================================
[   16.505008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   16.505702] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.506324] 
[   16.506534] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.506589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.506602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.506624] Call Trace:
[   16.506641]  <TASK>
[   16.506656]  dump_stack_lvl+0x73/0xb0
[   16.506685]  print_report+0xd1/0x610
[   16.506708]  ? __virt_addr_valid+0x1db/0x2d0
[   16.506732]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.506755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.506780]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.506803]  kasan_report+0x141/0x180
[   16.506826]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.506854]  kasan_check_range+0x10c/0x1c0
[   16.506879]  __kasan_check_write+0x18/0x20
[   16.506900]  kasan_atomics_helper+0x15b6/0x5450
[   16.506924]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.506949]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.506975]  ? trace_hardirqs_on+0x37/0xe0
[   16.506998]  ? kasan_atomics+0x152/0x310
[   16.507026]  kasan_atomics+0x1dc/0x310
[   16.507050]  ? __pfx_kasan_atomics+0x10/0x10
[   16.507075]  ? __pfx_kasan_atomics+0x10/0x10
[   16.507103]  kunit_try_run_case+0x1a5/0x480
[   16.507127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.507153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.507179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.507205]  ? __kthread_parkme+0x82/0x180
[   16.507227]  ? preempt_count_sub+0x50/0x80
[   16.507251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.507278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.507306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.507332]  kthread+0x337/0x6f0
[   16.507354]  ? trace_preempt_on+0x20/0xc0
[   16.507377]  ? __pfx_kthread+0x10/0x10
[   16.507406]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.507430]  ? calculate_sigpending+0x7b/0xa0
[   16.507455]  ? __pfx_kthread+0x10/0x10
[   16.507477]  ret_from_fork+0x116/0x1d0
[   16.507498]  ? __pfx_kthread+0x10/0x10
[   16.507520]  ret_from_fork_asm+0x1a/0x30
[   16.507560]  </TASK>
[   16.507571] 
[   16.519230] Allocated by task 282:
[   16.519578]  kasan_save_stack+0x45/0x70
[   16.519924]  kasan_save_track+0x18/0x40
[   16.520272]  kasan_save_alloc_info+0x3b/0x50
[   16.520746]  __kasan_kmalloc+0xb7/0xc0
[   16.521109]  __kmalloc_cache_noprof+0x189/0x420
[   16.521649]  kasan_atomics+0x95/0x310
[   16.522004]  kunit_try_run_case+0x1a5/0x480
[   16.522392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.522671]  kthread+0x337/0x6f0
[   16.522795]  ret_from_fork+0x116/0x1d0
[   16.522929]  ret_from_fork_asm+0x1a/0x30
[   16.523072] 
[   16.523145] The buggy address belongs to the object at ffff888102a5fe80
[   16.523145]  which belongs to the cache kmalloc-64 of size 64
[   16.523673] The buggy address is located 0 bytes to the right of
[   16.523673]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.524777] 
[   16.524950] The buggy address belongs to the physical page:
[   16.525448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.526140] flags: 0x200000000000000(node=0|zone=2)
[   16.526632] page_type: f5(slab)
[   16.526996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.527722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.528370] page dumped because: kasan: bad access detected
[   16.528686] 
[   16.528758] Memory state around the buggy address:
[   16.528913]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.529131]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.529345] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.529575]                                      ^
[   16.529841]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.530165]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.530440] ==================================================================
[   15.862445] ==================================================================
[   15.862795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.863092] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.863417] 
[   15.863500] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.863543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.863567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.863588] Call Trace:
[   15.863618]  <TASK>
[   15.863645]  dump_stack_lvl+0x73/0xb0
[   15.863674]  print_report+0xd1/0x610
[   15.863697]  ? __virt_addr_valid+0x1db/0x2d0
[   15.863792]  ? kasan_atomics_helper+0x992/0x5450
[   15.863817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.863842]  ? kasan_atomics_helper+0x992/0x5450
[   15.863865]  kasan_report+0x141/0x180
[   15.863899]  ? kasan_atomics_helper+0x992/0x5450
[   15.863926]  kasan_check_range+0x10c/0x1c0
[   15.863962]  __kasan_check_write+0x18/0x20
[   15.863983]  kasan_atomics_helper+0x992/0x5450
[   15.864007]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.864031]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.864064]  ? trace_hardirqs_on+0x37/0xe0
[   15.864091]  ? kasan_atomics+0x152/0x310
[   15.864120]  kasan_atomics+0x1dc/0x310
[   15.864144]  ? __pfx_kasan_atomics+0x10/0x10
[   15.864169]  ? __pfx_kasan_atomics+0x10/0x10
[   15.864207]  kunit_try_run_case+0x1a5/0x480
[   15.864234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.864293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.864319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.864345]  ? __kthread_parkme+0x82/0x180
[   15.864369]  ? preempt_count_sub+0x50/0x80
[   15.864396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.864591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.864624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.864652]  kthread+0x337/0x6f0
[   15.864673]  ? trace_preempt_on+0x20/0xc0
[   15.864817]  ? __pfx_kthread+0x10/0x10
[   15.864846]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.864871]  ? calculate_sigpending+0x7b/0xa0
[   15.864898]  ? __pfx_kthread+0x10/0x10
[   15.864921]  ret_from_fork+0x116/0x1d0
[   15.864943]  ? __pfx_kthread+0x10/0x10
[   15.864965]  ret_from_fork_asm+0x1a/0x30
[   15.864998]  </TASK>
[   15.865009] 
[   15.873058] Allocated by task 282:
[   15.873351]  kasan_save_stack+0x45/0x70
[   15.873755]  kasan_save_track+0x18/0x40
[   15.874035]  kasan_save_alloc_info+0x3b/0x50
[   15.874334]  __kasan_kmalloc+0xb7/0xc0
[   15.874600]  __kmalloc_cache_noprof+0x189/0x420
[   15.874793]  kasan_atomics+0x95/0x310
[   15.874929]  kunit_try_run_case+0x1a5/0x480
[   15.875078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.875259]  kthread+0x337/0x6f0
[   15.875382]  ret_from_fork+0x116/0x1d0
[   15.875520]  ret_from_fork_asm+0x1a/0x30
[   15.875671] 
[   15.875745] The buggy address belongs to the object at ffff888102a5fe80
[   15.875745]  which belongs to the cache kmalloc-64 of size 64
[   15.876107] The buggy address is located 0 bytes to the right of
[   15.876107]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.876865] 
[   15.876957] The buggy address belongs to the physical page:
[   15.877222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.877544] flags: 0x200000000000000(node=0|zone=2)
[   15.877724] page_type: f5(slab)
[   15.877846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.878082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.878589] page dumped because: kasan: bad access detected
[   15.878853] 
[   15.878946] Memory state around the buggy address:
[   15.879166]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.879451]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.879676] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.879889]                                      ^
[   15.880406]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.881063]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.881512] ==================================================================
[   16.109719] ==================================================================
[   16.110421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   16.110807] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.111639] 
[   16.111854] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.111901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.111924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.111946] Call Trace:
[   16.111963]  <TASK>
[   16.111980]  dump_stack_lvl+0x73/0xb0
[   16.112020]  print_report+0xd1/0x610
[   16.112043]  ? __virt_addr_valid+0x1db/0x2d0
[   16.112083]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.112115]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.112141]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.112176]  kasan_report+0x141/0x180
[   16.112199]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.112227]  kasan_check_range+0x10c/0x1c0
[   16.112252]  __kasan_check_write+0x18/0x20
[   16.112273]  kasan_atomics_helper+0xfa9/0x5450
[   16.112297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.112321]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.112348]  ? trace_hardirqs_on+0x37/0xe0
[   16.112372]  ? kasan_atomics+0x152/0x310
[   16.112400]  kasan_atomics+0x1dc/0x310
[   16.112436]  ? __pfx_kasan_atomics+0x10/0x10
[   16.112463]  ? __pfx_kasan_atomics+0x10/0x10
[   16.112491]  kunit_try_run_case+0x1a5/0x480
[   16.112518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.112542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.112579]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.112605]  ? __kthread_parkme+0x82/0x180
[   16.112627]  ? preempt_count_sub+0x50/0x80
[   16.112652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.112677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.112704]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.112732]  kthread+0x337/0x6f0
[   16.112753]  ? trace_preempt_on+0x20/0xc0
[   16.112775]  ? __pfx_kthread+0x10/0x10
[   16.112797]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.112819]  ? calculate_sigpending+0x7b/0xa0
[   16.112845]  ? __pfx_kthread+0x10/0x10
[   16.112867]  ret_from_fork+0x116/0x1d0
[   16.112888]  ? __pfx_kthread+0x10/0x10
[   16.112910]  ret_from_fork_asm+0x1a/0x30
[   16.112942]  </TASK>
[   16.112952] 
[   16.123680] Allocated by task 282:
[   16.124016]  kasan_save_stack+0x45/0x70
[   16.124403]  kasan_save_track+0x18/0x40
[   16.124780]  kasan_save_alloc_info+0x3b/0x50
[   16.125184]  __kasan_kmalloc+0xb7/0xc0
[   16.125580]  __kmalloc_cache_noprof+0x189/0x420
[   16.126008]  kasan_atomics+0x95/0x310
[   16.126363]  kunit_try_run_case+0x1a5/0x480
[   16.126792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.127286]  kthread+0x337/0x6f0
[   16.127659]  ret_from_fork+0x116/0x1d0
[   16.127942]  ret_from_fork_asm+0x1a/0x30
[   16.128091] 
[   16.128165] The buggy address belongs to the object at ffff888102a5fe80
[   16.128165]  which belongs to the cache kmalloc-64 of size 64
[   16.128659] The buggy address is located 0 bytes to the right of
[   16.128659]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.129788] 
[   16.129959] The buggy address belongs to the physical page:
[   16.130473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.131152] flags: 0x200000000000000(node=0|zone=2)
[   16.131651] page_type: f5(slab)
[   16.131963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.132475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.132717] page dumped because: kasan: bad access detected
[   16.132890] 
[   16.132960] Memory state around the buggy address:
[   16.133114]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.133330]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.133817] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.134456]                                      ^
[   16.134898]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.135520]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.135752] ==================================================================
[   16.230587] ==================================================================
[   16.230913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   16.232022] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.232499] 
[   16.232617] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.232847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.232860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.232884] Call Trace:
[   16.232898]  <TASK>
[   16.232912]  dump_stack_lvl+0x73/0xb0
[   16.232944]  print_report+0xd1/0x610
[   16.232967]  ? __virt_addr_valid+0x1db/0x2d0
[   16.232991]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.233014]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.233039]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.233063]  kasan_report+0x141/0x180
[   16.233086]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.233114]  __asan_report_load4_noabort+0x18/0x20
[   16.233140]  kasan_atomics_helper+0x4a02/0x5450
[   16.233165]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.233189]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.233215]  ? trace_hardirqs_on+0x37/0xe0
[   16.233238]  ? kasan_atomics+0x152/0x310
[   16.233266]  kasan_atomics+0x1dc/0x310
[   16.233290]  ? __pfx_kasan_atomics+0x10/0x10
[   16.233315]  ? __pfx_kasan_atomics+0x10/0x10
[   16.233343]  kunit_try_run_case+0x1a5/0x480
[   16.233369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.233420]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.233447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.233472]  ? __kthread_parkme+0x82/0x180
[   16.233494]  ? preempt_count_sub+0x50/0x80
[   16.233519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.233545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.233580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.233608]  kthread+0x337/0x6f0
[   16.233629]  ? trace_preempt_on+0x20/0xc0
[   16.233654]  ? __pfx_kthread+0x10/0x10
[   16.233677]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.233702]  ? calculate_sigpending+0x7b/0xa0
[   16.233729]  ? __pfx_kthread+0x10/0x10
[   16.233752]  ret_from_fork+0x116/0x1d0
[   16.233772]  ? __pfx_kthread+0x10/0x10
[   16.233795]  ret_from_fork_asm+0x1a/0x30
[   16.233827]  </TASK>
[   16.233838] 
[   16.244638] Allocated by task 282:
[   16.244904]  kasan_save_stack+0x45/0x70
[   16.245193]  kasan_save_track+0x18/0x40
[   16.245535]  kasan_save_alloc_info+0x3b/0x50
[   16.245858]  __kasan_kmalloc+0xb7/0xc0
[   16.246132]  __kmalloc_cache_noprof+0x189/0x420
[   16.246344]  kasan_atomics+0x95/0x310
[   16.246696]  kunit_try_run_case+0x1a5/0x480
[   16.246995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.247337]  kthread+0x337/0x6f0
[   16.247627]  ret_from_fork+0x116/0x1d0
[   16.247911]  ret_from_fork_asm+0x1a/0x30
[   16.248129] 
[   16.248230] The buggy address belongs to the object at ffff888102a5fe80
[   16.248230]  which belongs to the cache kmalloc-64 of size 64
[   16.249036] The buggy address is located 0 bytes to the right of
[   16.249036]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.249761] 
[   16.249964] The buggy address belongs to the physical page:
[   16.250260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.250747] flags: 0x200000000000000(node=0|zone=2)
[   16.251078] page_type: f5(slab)
[   16.251353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.251828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.252270] page dumped because: kasan: bad access detected
[   16.252634] 
[   16.252892] Memory state around the buggy address:
[   16.253127]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.253612]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.254016] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.254446]                                      ^
[   16.254642]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.254966]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.255262] ==================================================================
[   15.785596] ==================================================================
[   15.785840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.786074] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.786300] 
[   15.786387] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.786432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.786445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.786465] Call Trace:
[   15.786483]  <TASK>
[   15.786500]  dump_stack_lvl+0x73/0xb0
[   15.786526]  print_report+0xd1/0x610
[   15.786689]  ? __virt_addr_valid+0x1db/0x2d0
[   15.786737]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.787589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.787619]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.787644]  kasan_report+0x141/0x180
[   15.787694]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.787723]  kasan_check_range+0x10c/0x1c0
[   15.787748]  __kasan_check_write+0x18/0x20
[   15.787770]  kasan_atomics_helper+0x7c7/0x5450
[   15.787794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.787818]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.787846]  ? trace_hardirqs_on+0x37/0xe0
[   15.787871]  ? kasan_atomics+0x152/0x310
[   15.787899]  kasan_atomics+0x1dc/0x310
[   15.787923]  ? __pfx_kasan_atomics+0x10/0x10
[   15.787949]  ? __pfx_kasan_atomics+0x10/0x10
[   15.787977]  kunit_try_run_case+0x1a5/0x480
[   15.788003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.788028]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.788059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.788086]  ? __kthread_parkme+0x82/0x180
[   15.788108]  ? preempt_count_sub+0x50/0x80
[   15.788134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.788160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.788186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.788214]  kthread+0x337/0x6f0
[   15.788242]  ? trace_preempt_on+0x20/0xc0
[   15.788266]  ? __pfx_kthread+0x10/0x10
[   15.788288]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.788312]  ? calculate_sigpending+0x7b/0xa0
[   15.788339]  ? __pfx_kthread+0x10/0x10
[   15.788361]  ret_from_fork+0x116/0x1d0
[   15.788382]  ? __pfx_kthread+0x10/0x10
[   15.788403]  ret_from_fork_asm+0x1a/0x30
[   15.788436]  </TASK>
[   15.788447] 
[   15.804191] Allocated by task 282:
[   15.804441]  kasan_save_stack+0x45/0x70
[   15.804784]  kasan_save_track+0x18/0x40
[   15.804935]  kasan_save_alloc_info+0x3b/0x50
[   15.805090]  __kasan_kmalloc+0xb7/0xc0
[   15.805282]  __kmalloc_cache_noprof+0x189/0x420
[   15.805683]  kasan_atomics+0x95/0x310
[   15.805983]  kunit_try_run_case+0x1a5/0x480
[   15.806142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.806323]  kthread+0x337/0x6f0
[   15.806460]  ret_from_fork+0x116/0x1d0
[   15.806660]  ret_from_fork_asm+0x1a/0x30
[   15.807041] 
[   15.807200] The buggy address belongs to the object at ffff888102a5fe80
[   15.807200]  which belongs to the cache kmalloc-64 of size 64
[   15.808210] The buggy address is located 0 bytes to the right of
[   15.808210]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.808843] 
[   15.808955] The buggy address belongs to the physical page:
[   15.809145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.809432] flags: 0x200000000000000(node=0|zone=2)
[   15.809803] page_type: f5(slab)
[   15.809998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.810392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.810808] page dumped because: kasan: bad access detected
[   15.811038] 
[   15.811112] Memory state around the buggy address:
[   15.811530]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.811958]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.812372] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.812714]                                      ^
[   15.812933]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.813289]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.813608] ==================================================================
[   15.503634] ==================================================================
[   15.504952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.505211] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.506828] 
[   15.507206] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.507258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.507270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.507293] Call Trace:
[   15.507307]  <TASK>
[   15.507324]  dump_stack_lvl+0x73/0xb0
[   15.507358]  print_report+0xd1/0x610
[   15.507381]  ? __virt_addr_valid+0x1db/0x2d0
[   15.507406]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.507427]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.507452]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.507474]  kasan_report+0x141/0x180
[   15.507495]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.507522]  __asan_report_load4_noabort+0x18/0x20
[   15.507561]  kasan_atomics_helper+0x4bbc/0x5450
[   15.507750]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.507815]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.507844]  ? trace_hardirqs_on+0x37/0xe0
[   15.507869]  ? kasan_atomics+0x152/0x310
[   15.507896]  kasan_atomics+0x1dc/0x310
[   15.507919]  ? __pfx_kasan_atomics+0x10/0x10
[   15.507943]  ? __pfx_kasan_atomics+0x10/0x10
[   15.507970]  kunit_try_run_case+0x1a5/0x480
[   15.507996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.508021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.508046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.508075]  ? __kthread_parkme+0x82/0x180
[   15.508096]  ? preempt_count_sub+0x50/0x80
[   15.508121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.508146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.508171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.508198]  kthread+0x337/0x6f0
[   15.508217]  ? trace_preempt_on+0x20/0xc0
[   15.508260]  ? __pfx_kthread+0x10/0x10
[   15.508281]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.508304]  ? calculate_sigpending+0x7b/0xa0
[   15.508330]  ? __pfx_kthread+0x10/0x10
[   15.508351]  ret_from_fork+0x116/0x1d0
[   15.508371]  ? __pfx_kthread+0x10/0x10
[   15.508392]  ret_from_fork_asm+0x1a/0x30
[   15.508441]  </TASK>
[   15.508453] 
[   15.519788] Allocated by task 282:
[   15.520007]  kasan_save_stack+0x45/0x70
[   15.520282]  kasan_save_track+0x18/0x40
[   15.520498]  kasan_save_alloc_info+0x3b/0x50
[   15.520661]  __kasan_kmalloc+0xb7/0xc0
[   15.520851]  __kmalloc_cache_noprof+0x189/0x420
[   15.521076]  kasan_atomics+0x95/0x310
[   15.521369]  kunit_try_run_case+0x1a5/0x480
[   15.521620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.521901]  kthread+0x337/0x6f0
[   15.522048]  ret_from_fork+0x116/0x1d0
[   15.522180]  ret_from_fork_asm+0x1a/0x30
[   15.522531] 
[   15.522642] The buggy address belongs to the object at ffff888102a5fe80
[   15.522642]  which belongs to the cache kmalloc-64 of size 64
[   15.523121] The buggy address is located 0 bytes to the right of
[   15.523121]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.523762] 
[   15.523864] The buggy address belongs to the physical page:
[   15.524073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.524487] flags: 0x200000000000000(node=0|zone=2)
[   15.524677] page_type: f5(slab)
[   15.524867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.525205] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.525632] page dumped because: kasan: bad access detected
[   15.525916] 
[   15.526009] Memory state around the buggy address:
[   15.526205]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.526624]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.526898] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.527299]                                      ^
[   15.527492]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.527952]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.530265] ==================================================================
[   16.448963] ==================================================================
[   16.449691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   16.450353] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.451044] 
[   16.451235] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.451278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.451291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.451313] Call Trace:
[   16.451329]  <TASK>
[   16.451346]  dump_stack_lvl+0x73/0xb0
[   16.451375]  print_report+0xd1/0x610
[   16.451419]  ? __virt_addr_valid+0x1db/0x2d0
[   16.451463]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.451487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.451512]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.451535]  kasan_report+0x141/0x180
[   16.451567]  ? kasan_atomics_helper+0x50d4/0x5450
[   16.451595]  __asan_report_store8_noabort+0x1b/0x30
[   16.451622]  kasan_atomics_helper+0x50d4/0x5450
[   16.451646]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.451670]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.451697]  ? trace_hardirqs_on+0x37/0xe0
[   16.451721]  ? kasan_atomics+0x152/0x310
[   16.451749]  kasan_atomics+0x1dc/0x310
[   16.451773]  ? __pfx_kasan_atomics+0x10/0x10
[   16.451799]  ? __pfx_kasan_atomics+0x10/0x10
[   16.451826]  kunit_try_run_case+0x1a5/0x480
[   16.451853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.451877]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.451903]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.451928]  ? __kthread_parkme+0x82/0x180
[   16.451950]  ? preempt_count_sub+0x50/0x80
[   16.451976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.452001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.452028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.452055]  kthread+0x337/0x6f0
[   16.452082]  ? trace_preempt_on+0x20/0xc0
[   16.452104]  ? __pfx_kthread+0x10/0x10
[   16.452126]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.452149]  ? calculate_sigpending+0x7b/0xa0
[   16.452175]  ? __pfx_kthread+0x10/0x10
[   16.452197]  ret_from_fork+0x116/0x1d0
[   16.452218]  ? __pfx_kthread+0x10/0x10
[   16.452240]  ret_from_fork_asm+0x1a/0x30
[   16.452271]  </TASK>
[   16.452282] 
[   16.464100] Allocated by task 282:
[   16.464485]  kasan_save_stack+0x45/0x70
[   16.464862]  kasan_save_track+0x18/0x40
[   16.465088]  kasan_save_alloc_info+0x3b/0x50
[   16.465241]  __kasan_kmalloc+0xb7/0xc0
[   16.465376]  __kmalloc_cache_noprof+0x189/0x420
[   16.465856]  kasan_atomics+0x95/0x310
[   16.466210]  kunit_try_run_case+0x1a5/0x480
[   16.466631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.467108]  kthread+0x337/0x6f0
[   16.467289]  ret_from_fork+0x116/0x1d0
[   16.467486]  ret_from_fork_asm+0x1a/0x30
[   16.467869] 
[   16.468042] The buggy address belongs to the object at ffff888102a5fe80
[   16.468042]  which belongs to the cache kmalloc-64 of size 64
[   16.468874] The buggy address is located 0 bytes to the right of
[   16.468874]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.469242] 
[   16.469314] The buggy address belongs to the physical page:
[   16.469733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.470444] flags: 0x200000000000000(node=0|zone=2)
[   16.470893] page_type: f5(slab)
[   16.471196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.471887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.472195] page dumped because: kasan: bad access detected
[   16.472371] 
[   16.472450] Memory state around the buggy address:
[   16.472747]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.473385]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.474034] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.474675]                                      ^
[   16.475047]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.475266]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.475724] ==================================================================
[   16.628900] ==================================================================
[   16.629195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.629663] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.629992] 
[   16.630079] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.630123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.630137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.630158] Call Trace:
[   16.630173]  <TASK>
[   16.630187]  dump_stack_lvl+0x73/0xb0
[   16.630216]  print_report+0xd1/0x610
[   16.630239]  ? __virt_addr_valid+0x1db/0x2d0
[   16.630263]  ? kasan_atomics_helper+0x194a/0x5450
[   16.630286]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.630349]  ? kasan_atomics_helper+0x194a/0x5450
[   16.630420]  kasan_report+0x141/0x180
[   16.630446]  ? kasan_atomics_helper+0x194a/0x5450
[   16.630474]  kasan_check_range+0x10c/0x1c0
[   16.630499]  __kasan_check_write+0x18/0x20
[   16.630520]  kasan_atomics_helper+0x194a/0x5450
[   16.630544]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.630578]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.630604]  ? trace_hardirqs_on+0x37/0xe0
[   16.630628]  ? kasan_atomics+0x152/0x310
[   16.630655]  kasan_atomics+0x1dc/0x310
[   16.630715]  ? __pfx_kasan_atomics+0x10/0x10
[   16.630740]  ? __pfx_kasan_atomics+0x10/0x10
[   16.630768]  kunit_try_run_case+0x1a5/0x480
[   16.630794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.630850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.630876]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.630902]  ? __kthread_parkme+0x82/0x180
[   16.630924]  ? preempt_count_sub+0x50/0x80
[   16.630949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.631007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.631034]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.631062]  kthread+0x337/0x6f0
[   16.631082]  ? trace_preempt_on+0x20/0xc0
[   16.631135]  ? __pfx_kthread+0x10/0x10
[   16.631158]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.631181]  ? calculate_sigpending+0x7b/0xa0
[   16.631206]  ? __pfx_kthread+0x10/0x10
[   16.631228]  ret_from_fork+0x116/0x1d0
[   16.631248]  ? __pfx_kthread+0x10/0x10
[   16.631300]  ret_from_fork_asm+0x1a/0x30
[   16.631333]  </TASK>
[   16.631343] 
[   16.639144] Allocated by task 282:
[   16.639322]  kasan_save_stack+0x45/0x70
[   16.639573]  kasan_save_track+0x18/0x40
[   16.639775]  kasan_save_alloc_info+0x3b/0x50
[   16.639963]  __kasan_kmalloc+0xb7/0xc0
[   16.640167]  __kmalloc_cache_noprof+0x189/0x420
[   16.640443]  kasan_atomics+0x95/0x310
[   16.640652]  kunit_try_run_case+0x1a5/0x480
[   16.640877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.641145]  kthread+0x337/0x6f0
[   16.641324]  ret_from_fork+0x116/0x1d0
[   16.641577]  ret_from_fork_asm+0x1a/0x30
[   16.641789] 
[   16.641881] The buggy address belongs to the object at ffff888102a5fe80
[   16.641881]  which belongs to the cache kmalloc-64 of size 64
[   16.642390] The buggy address is located 0 bytes to the right of
[   16.642390]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.643151] 
[   16.643246] The buggy address belongs to the physical page:
[   16.643556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.643865] flags: 0x200000000000000(node=0|zone=2)
[   16.644022] page_type: f5(slab)
[   16.644167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.644578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.644942] page dumped because: kasan: bad access detected
[   16.645222] 
[   16.645312] Memory state around the buggy address:
[   16.645578]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.645882]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.646188] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.646570]                                      ^
[   16.646803]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.647125]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.647446] ==================================================================
[   15.632239] ==================================================================
[   15.632478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.632725] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.633703] 
[   15.633881] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.633926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.633938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.633960] Call Trace:
[   15.633975]  <TASK>
[   15.633991]  dump_stack_lvl+0x73/0xb0
[   15.634020]  print_report+0xd1/0x610
[   15.634043]  ? __virt_addr_valid+0x1db/0x2d0
[   15.634132]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.634174]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.634199]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.634222]  kasan_report+0x141/0x180
[   15.634246]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.634273]  kasan_check_range+0x10c/0x1c0
[   15.634305]  __kasan_check_write+0x18/0x20
[   15.634326]  kasan_atomics_helper+0x4a0/0x5450
[   15.634351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.634375]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.634401]  ? trace_hardirqs_on+0x37/0xe0
[   15.634424]  ? kasan_atomics+0x152/0x310
[   15.634452]  kasan_atomics+0x1dc/0x310
[   15.634476]  ? __pfx_kasan_atomics+0x10/0x10
[   15.634502]  ? __pfx_kasan_atomics+0x10/0x10
[   15.634530]  kunit_try_run_case+0x1a5/0x480
[   15.634565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.634770]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.634798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.634824]  ? __kthread_parkme+0x82/0x180
[   15.634846]  ? preempt_count_sub+0x50/0x80
[   15.634871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.634897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.634924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.634951]  kthread+0x337/0x6f0
[   15.634972]  ? trace_preempt_on+0x20/0xc0
[   15.634996]  ? __pfx_kthread+0x10/0x10
[   15.635018]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.635041]  ? calculate_sigpending+0x7b/0xa0
[   15.635067]  ? __pfx_kthread+0x10/0x10
[   15.635090]  ret_from_fork+0x116/0x1d0
[   15.635111]  ? __pfx_kthread+0x10/0x10
[   15.635133]  ret_from_fork_asm+0x1a/0x30
[   15.635166]  </TASK>
[   15.635178] 
[   15.650076] Allocated by task 282:
[   15.650517]  kasan_save_stack+0x45/0x70
[   15.651003]  kasan_save_track+0x18/0x40
[   15.651635]  kasan_save_alloc_info+0x3b/0x50
[   15.652091]  __kasan_kmalloc+0xb7/0xc0
[   15.652373]  __kmalloc_cache_noprof+0x189/0x420
[   15.652822]  kasan_atomics+0x95/0x310
[   15.652964]  kunit_try_run_case+0x1a5/0x480
[   15.653109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.653458]  kthread+0x337/0x6f0
[   15.653833]  ret_from_fork+0x116/0x1d0
[   15.654204]  ret_from_fork_asm+0x1a/0x30
[   15.654721] 
[   15.654895] The buggy address belongs to the object at ffff888102a5fe80
[   15.654895]  which belongs to the cache kmalloc-64 of size 64
[   15.656418] The buggy address is located 0 bytes to the right of
[   15.656418]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.657057] 
[   15.657133] The buggy address belongs to the physical page:
[   15.657557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.658387] flags: 0x200000000000000(node=0|zone=2)
[   15.658889] page_type: f5(slab)
[   15.659230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.659859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.660095] page dumped because: kasan: bad access detected
[   15.660389] 
[   15.660591] Memory state around the buggy address:
[   15.661171]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.662144]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.662892] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.663733]                                      ^
[   15.663899]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.664123]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.664642] ==================================================================
[   16.256749] ==================================================================
[   16.257079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   16.257593] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.257989] 
[   16.258114] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.258160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.258172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.258195] Call Trace:
[   16.258212]  <TASK>
[   16.258228]  dump_stack_lvl+0x73/0xb0
[   16.258258]  print_report+0xd1/0x610
[   16.258282]  ? __virt_addr_valid+0x1db/0x2d0
[   16.258306]  ? kasan_atomics_helper+0x1217/0x5450
[   16.258329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.258353]  ? kasan_atomics_helper+0x1217/0x5450
[   16.258377]  kasan_report+0x141/0x180
[   16.258593]  ? kasan_atomics_helper+0x1217/0x5450
[   16.258637]  kasan_check_range+0x10c/0x1c0
[   16.258664]  __kasan_check_write+0x18/0x20
[   16.258687]  kasan_atomics_helper+0x1217/0x5450
[   16.258713]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.258738]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.258765]  ? trace_hardirqs_on+0x37/0xe0
[   16.258791]  ? kasan_atomics+0x152/0x310
[   16.258819]  kasan_atomics+0x1dc/0x310
[   16.258843]  ? __pfx_kasan_atomics+0x10/0x10
[   16.258869]  ? __pfx_kasan_atomics+0x10/0x10
[   16.258898]  kunit_try_run_case+0x1a5/0x480
[   16.258924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.258949]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.258975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.259001]  ? __kthread_parkme+0x82/0x180
[   16.259023]  ? preempt_count_sub+0x50/0x80
[   16.259048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.259075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.259102]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.259129]  kthread+0x337/0x6f0
[   16.259149]  ? trace_preempt_on+0x20/0xc0
[   16.259173]  ? __pfx_kthread+0x10/0x10
[   16.259195]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.259218]  ? calculate_sigpending+0x7b/0xa0
[   16.259243]  ? __pfx_kthread+0x10/0x10
[   16.259266]  ret_from_fork+0x116/0x1d0
[   16.259287]  ? __pfx_kthread+0x10/0x10
[   16.259309]  ret_from_fork_asm+0x1a/0x30
[   16.259341]  </TASK>
[   16.259353] 
[   16.270599] Allocated by task 282:
[   16.270771]  kasan_save_stack+0x45/0x70
[   16.270959]  kasan_save_track+0x18/0x40
[   16.271138]  kasan_save_alloc_info+0x3b/0x50
[   16.271336]  __kasan_kmalloc+0xb7/0xc0
[   16.271989]  __kmalloc_cache_noprof+0x189/0x420
[   16.272293]  kasan_atomics+0x95/0x310
[   16.272752]  kunit_try_run_case+0x1a5/0x480
[   16.273035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.273490]  kthread+0x337/0x6f0
[   16.273919]  ret_from_fork+0x116/0x1d0
[   16.274123]  ret_from_fork_asm+0x1a/0x30
[   16.274310] 
[   16.274627] The buggy address belongs to the object at ffff888102a5fe80
[   16.274627]  which belongs to the cache kmalloc-64 of size 64
[   16.275135] The buggy address is located 0 bytes to the right of
[   16.275135]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.276092] 
[   16.276193] The buggy address belongs to the physical page:
[   16.276784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.277292] flags: 0x200000000000000(node=0|zone=2)
[   16.277698] page_type: f5(slab)
[   16.277862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.278158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.278725] page dumped because: kasan: bad access detected
[   16.279010] 
[   16.279105] Memory state around the buggy address:
[   16.279297]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.280068]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.280747] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.281067]                                      ^
[   16.281276]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.281890]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282337] ==================================================================
[   16.336936] ==================================================================
[   16.337328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   16.337798] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.338077] 
[   16.338181] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.338227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.338240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.338263] Call Trace:
[   16.338280]  <TASK>
[   16.338297]  dump_stack_lvl+0x73/0xb0
[   16.338326]  print_report+0xd1/0x610
[   16.338350]  ? __virt_addr_valid+0x1db/0x2d0
[   16.338374]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.338397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.338633]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.338659]  kasan_report+0x141/0x180
[   16.338697]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.338725]  __asan_report_load4_noabort+0x18/0x20
[   16.338932]  kasan_atomics_helper+0x49ce/0x5450
[   16.338963]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.338988]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.339015]  ? trace_hardirqs_on+0x37/0xe0
[   16.339040]  ? kasan_atomics+0x152/0x310
[   16.339068]  kasan_atomics+0x1dc/0x310
[   16.339092]  ? __pfx_kasan_atomics+0x10/0x10
[   16.339117]  ? __pfx_kasan_atomics+0x10/0x10
[   16.339146]  kunit_try_run_case+0x1a5/0x480
[   16.339171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.339196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.339221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.339247]  ? __kthread_parkme+0x82/0x180
[   16.339269]  ? preempt_count_sub+0x50/0x80
[   16.339295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.339322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.339349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.339378]  kthread+0x337/0x6f0
[   16.339400]  ? trace_preempt_on+0x20/0xc0
[   16.339434]  ? __pfx_kthread+0x10/0x10
[   16.339456]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.339480]  ? calculate_sigpending+0x7b/0xa0
[   16.339508]  ? __pfx_kthread+0x10/0x10
[   16.339532]  ret_from_fork+0x116/0x1d0
[   16.339564]  ? __pfx_kthread+0x10/0x10
[   16.339586]  ret_from_fork_asm+0x1a/0x30
[   16.339618]  </TASK>
[   16.339631] 
[   16.351514] Allocated by task 282:
[   16.351882]  kasan_save_stack+0x45/0x70
[   16.352092]  kasan_save_track+0x18/0x40
[   16.352274]  kasan_save_alloc_info+0x3b/0x50
[   16.352774]  __kasan_kmalloc+0xb7/0xc0
[   16.353013]  __kmalloc_cache_noprof+0x189/0x420
[   16.353362]  kasan_atomics+0x95/0x310
[   16.353761]  kunit_try_run_case+0x1a5/0x480
[   16.354107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.354356]  kthread+0x337/0x6f0
[   16.354765]  ret_from_fork+0x116/0x1d0
[   16.355083]  ret_from_fork_asm+0x1a/0x30
[   16.355284] 
[   16.355370] The buggy address belongs to the object at ffff888102a5fe80
[   16.355370]  which belongs to the cache kmalloc-64 of size 64
[   16.356089] The buggy address is located 0 bytes to the right of
[   16.356089]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.357117] 
[   16.357322] The buggy address belongs to the physical page:
[   16.357780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.358305] flags: 0x200000000000000(node=0|zone=2)
[   16.358747] page_type: f5(slab)
[   16.359110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.359603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.359898] page dumped because: kasan: bad access detected
[   16.360126] 
[   16.360213] Memory state around the buggy address:
[   16.360701]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.361144]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.361680] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.362121]                                      ^
[   16.362339]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.363188]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.363699] ==================================================================
[   16.890724] ==================================================================
[   16.891435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.892106] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.892621] 
[   16.892832] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.892877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.892890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.892931] Call Trace:
[   16.892947]  <TASK>
[   16.892962]  dump_stack_lvl+0x73/0xb0
[   16.892991]  print_report+0xd1/0x610
[   16.893013]  ? __virt_addr_valid+0x1db/0x2d0
[   16.893037]  ? kasan_atomics_helper+0x2006/0x5450
[   16.893060]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.893085]  ? kasan_atomics_helper+0x2006/0x5450
[   16.893108]  kasan_report+0x141/0x180
[   16.893131]  ? kasan_atomics_helper+0x2006/0x5450
[   16.893159]  kasan_check_range+0x10c/0x1c0
[   16.893184]  __kasan_check_write+0x18/0x20
[   16.893205]  kasan_atomics_helper+0x2006/0x5450
[   16.893229]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.893254]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.893280]  ? trace_hardirqs_on+0x37/0xe0
[   16.893303]  ? kasan_atomics+0x152/0x310
[   16.893331]  kasan_atomics+0x1dc/0x310
[   16.893355]  ? __pfx_kasan_atomics+0x10/0x10
[   16.893379]  ? __pfx_kasan_atomics+0x10/0x10
[   16.893408]  kunit_try_run_case+0x1a5/0x480
[   16.893434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.893458]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.893485]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.893510]  ? __kthread_parkme+0x82/0x180
[   16.893532]  ? preempt_count_sub+0x50/0x80
[   16.893567]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.893594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.893620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.893648]  kthread+0x337/0x6f0
[   16.893668]  ? trace_preempt_on+0x20/0xc0
[   16.893691]  ? __pfx_kthread+0x10/0x10
[   16.893713]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.893737]  ? calculate_sigpending+0x7b/0xa0
[   16.893764]  ? __pfx_kthread+0x10/0x10
[   16.893787]  ret_from_fork+0x116/0x1d0
[   16.893807]  ? __pfx_kthread+0x10/0x10
[   16.893829]  ret_from_fork_asm+0x1a/0x30
[   16.893860]  </TASK>
[   16.893871] 
[   16.905312] Allocated by task 282:
[   16.905527]  kasan_save_stack+0x45/0x70
[   16.905917]  kasan_save_track+0x18/0x40
[   16.906055]  kasan_save_alloc_info+0x3b/0x50
[   16.906200]  __kasan_kmalloc+0xb7/0xc0
[   16.906332]  __kmalloc_cache_noprof+0x189/0x420
[   16.906721]  kasan_atomics+0x95/0x310
[   16.907053]  kunit_try_run_case+0x1a5/0x480
[   16.907500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.908011]  kthread+0x337/0x6f0
[   16.908345]  ret_from_fork+0x116/0x1d0
[   16.908760]  ret_from_fork_asm+0x1a/0x30
[   16.909134] 
[   16.909312] The buggy address belongs to the object at ffff888102a5fe80
[   16.909312]  which belongs to the cache kmalloc-64 of size 64
[   16.909865] The buggy address is located 0 bytes to the right of
[   16.909865]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.910222] 
[   16.910292] The buggy address belongs to the physical page:
[   16.910492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.911223] flags: 0x200000000000000(node=0|zone=2)
[   16.911725] page_type: f5(slab)
[   16.912035] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.912766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.913434] page dumped because: kasan: bad access detected
[   16.913926] 
[   16.914095] Memory state around the buggy address:
[   16.914543]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.915056]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.915268] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.915642]                                      ^
[   16.916088]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.916752]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.917631] ==================================================================
[   15.737693] ==================================================================
[   15.738029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.738275] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.738614] 
[   15.738722] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.738767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.738779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.738836] Call Trace:
[   15.738852]  <TASK>
[   15.738866]  dump_stack_lvl+0x73/0xb0
[   15.738895]  print_report+0xd1/0x610
[   15.738918]  ? __virt_addr_valid+0x1db/0x2d0
[   15.738941]  ? kasan_atomics_helper+0x697/0x5450
[   15.738963]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.738988]  ? kasan_atomics_helper+0x697/0x5450
[   15.739012]  kasan_report+0x141/0x180
[   15.739034]  ? kasan_atomics_helper+0x697/0x5450
[   15.739062]  kasan_check_range+0x10c/0x1c0
[   15.739087]  __kasan_check_write+0x18/0x20
[   15.739108]  kasan_atomics_helper+0x697/0x5450
[   15.739133]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.739157]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.739183]  ? trace_hardirqs_on+0x37/0xe0
[   15.739206]  ? kasan_atomics+0x152/0x310
[   15.739233]  kasan_atomics+0x1dc/0x310
[   15.739257]  ? __pfx_kasan_atomics+0x10/0x10
[   15.739282]  ? __pfx_kasan_atomics+0x10/0x10
[   15.739310]  kunit_try_run_case+0x1a5/0x480
[   15.739336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.739360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.739386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.739412]  ? __kthread_parkme+0x82/0x180
[   15.739434]  ? preempt_count_sub+0x50/0x80
[   15.739458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.739484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.739511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.739538]  kthread+0x337/0x6f0
[   15.739569]  ? trace_preempt_on+0x20/0xc0
[   15.739592]  ? __pfx_kthread+0x10/0x10
[   15.739614]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.739637]  ? calculate_sigpending+0x7b/0xa0
[   15.739662]  ? __pfx_kthread+0x10/0x10
[   15.739685]  ret_from_fork+0x116/0x1d0
[   15.739705]  ? __pfx_kthread+0x10/0x10
[   15.739727]  ret_from_fork_asm+0x1a/0x30
[   15.739758]  </TASK>
[   15.739770] 
[   15.747861] Allocated by task 282:
[   15.748030]  kasan_save_stack+0x45/0x70
[   15.748188]  kasan_save_track+0x18/0x40
[   15.748337]  kasan_save_alloc_info+0x3b/0x50
[   15.748559]  __kasan_kmalloc+0xb7/0xc0
[   15.748748]  __kmalloc_cache_noprof+0x189/0x420
[   15.749295]  kasan_atomics+0x95/0x310
[   15.749576]  kunit_try_run_case+0x1a5/0x480
[   15.749729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.749988]  kthread+0x337/0x6f0
[   15.750156]  ret_from_fork+0x116/0x1d0
[   15.750482]  ret_from_fork_asm+0x1a/0x30
[   15.750656] 
[   15.750730] The buggy address belongs to the object at ffff888102a5fe80
[   15.750730]  which belongs to the cache kmalloc-64 of size 64
[   15.751119] The buggy address is located 0 bytes to the right of
[   15.751119]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.751666] 
[   15.751868] The buggy address belongs to the physical page:
[   15.752118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.752770] flags: 0x200000000000000(node=0|zone=2)
[   15.753015] page_type: f5(slab)
[   15.753153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.753389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.753821] page dumped because: kasan: bad access detected
[   15.754053] 
[   15.754152] Memory state around the buggy address:
[   15.754329]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.754547]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.755083] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.755518]                                      ^
[   15.755698]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.755917]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.756207] ==================================================================
[   16.530956] ==================================================================
[   16.531314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   16.531708] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.531965] 
[   16.532053] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.532100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.532113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.532135] Call Trace:
[   16.532150]  <TASK>
[   16.532165]  dump_stack_lvl+0x73/0xb0
[   16.532193]  print_report+0xd1/0x610
[   16.532217]  ? __virt_addr_valid+0x1db/0x2d0
[   16.532241]  ? kasan_atomics_helper+0x164f/0x5450
[   16.532264]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.532289]  ? kasan_atomics_helper+0x164f/0x5450
[   16.532313]  kasan_report+0x141/0x180
[   16.532336]  ? kasan_atomics_helper+0x164f/0x5450
[   16.532363]  kasan_check_range+0x10c/0x1c0
[   16.532388]  __kasan_check_write+0x18/0x20
[   16.532409]  kasan_atomics_helper+0x164f/0x5450
[   16.532443]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.532468]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.532495]  ? trace_hardirqs_on+0x37/0xe0
[   16.532518]  ? kasan_atomics+0x152/0x310
[   16.532546]  kasan_atomics+0x1dc/0x310
[   16.532581]  ? __pfx_kasan_atomics+0x10/0x10
[   16.532607]  ? __pfx_kasan_atomics+0x10/0x10
[   16.532635]  kunit_try_run_case+0x1a5/0x480
[   16.532661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.532685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.532711]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.532737]  ? __kthread_parkme+0x82/0x180
[   16.532760]  ? preempt_count_sub+0x50/0x80
[   16.532785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.532811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.532837]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.532864]  kthread+0x337/0x6f0
[   16.532884]  ? trace_preempt_on+0x20/0xc0
[   16.532907]  ? __pfx_kthread+0x10/0x10
[   16.532929]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.532952]  ? calculate_sigpending+0x7b/0xa0
[   16.532979]  ? __pfx_kthread+0x10/0x10
[   16.533001]  ret_from_fork+0x116/0x1d0
[   16.533021]  ? __pfx_kthread+0x10/0x10
[   16.533043]  ret_from_fork_asm+0x1a/0x30
[   16.533075]  </TASK>
[   16.533085] 
[   16.540528] Allocated by task 282:
[   16.540721]  kasan_save_stack+0x45/0x70
[   16.540946]  kasan_save_track+0x18/0x40
[   16.541163]  kasan_save_alloc_info+0x3b/0x50
[   16.541378]  __kasan_kmalloc+0xb7/0xc0
[   16.541611]  __kmalloc_cache_noprof+0x189/0x420
[   16.541867]  kasan_atomics+0x95/0x310
[   16.542059]  kunit_try_run_case+0x1a5/0x480
[   16.542246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.542544]  kthread+0x337/0x6f0
[   16.542704]  ret_from_fork+0x116/0x1d0
[   16.542839]  ret_from_fork_asm+0x1a/0x30
[   16.542981] 
[   16.543054] The buggy address belongs to the object at ffff888102a5fe80
[   16.543054]  which belongs to the cache kmalloc-64 of size 64
[   16.543564] The buggy address is located 0 bytes to the right of
[   16.543564]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.544119] 
[   16.544215] The buggy address belongs to the physical page:
[   16.544498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.544825] flags: 0x200000000000000(node=0|zone=2)
[   16.544991] page_type: f5(slab)
[   16.545112] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.545497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.545871] page dumped because: kasan: bad access detected
[   16.546121] 
[   16.546216] Memory state around the buggy address:
[   16.546448]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.546700]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.546917] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.547210]                                      ^
[   16.547443]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.547775]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.547993] ==================================================================
[   15.592738] ==================================================================
[   15.593059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.593385] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.593760] 
[   15.593849] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.593892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.593905] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.593927] Call Trace:
[   15.593941]  <TASK>
[   15.593956]  dump_stack_lvl+0x73/0xb0
[   15.593985]  print_report+0xd1/0x610
[   15.594008]  ? __virt_addr_valid+0x1db/0x2d0
[   15.594033]  ? kasan_atomics_helper+0x3df/0x5450
[   15.594056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.594081]  ? kasan_atomics_helper+0x3df/0x5450
[   15.594105]  kasan_report+0x141/0x180
[   15.594127]  ? kasan_atomics_helper+0x3df/0x5450
[   15.594155]  kasan_check_range+0x10c/0x1c0
[   15.594181]  __kasan_check_read+0x15/0x20
[   15.594202]  kasan_atomics_helper+0x3df/0x5450
[   15.594226]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.594387]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.594416]  ? trace_hardirqs_on+0x37/0xe0
[   15.594440]  ? kasan_atomics+0x152/0x310
[   15.594468]  kasan_atomics+0x1dc/0x310
[   15.594493]  ? __pfx_kasan_atomics+0x10/0x10
[   15.594518]  ? __pfx_kasan_atomics+0x10/0x10
[   15.594547]  kunit_try_run_case+0x1a5/0x480
[   15.594588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.594613]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.594639]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.594664]  ? __kthread_parkme+0x82/0x180
[   15.594686]  ? preempt_count_sub+0x50/0x80
[   15.594711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.594737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.594764]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.594792]  kthread+0x337/0x6f0
[   15.594813]  ? trace_preempt_on+0x20/0xc0
[   15.594836]  ? __pfx_kthread+0x10/0x10
[   15.594858]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.594882]  ? calculate_sigpending+0x7b/0xa0
[   15.594908]  ? __pfx_kthread+0x10/0x10
[   15.594931]  ret_from_fork+0x116/0x1d0
[   15.594951]  ? __pfx_kthread+0x10/0x10
[   15.594973]  ret_from_fork_asm+0x1a/0x30
[   15.595005]  </TASK>
[   15.595016] 
[   15.603512] Allocated by task 282:
[   15.603724]  kasan_save_stack+0x45/0x70
[   15.603929]  kasan_save_track+0x18/0x40
[   15.604128]  kasan_save_alloc_info+0x3b/0x50
[   15.604302]  __kasan_kmalloc+0xb7/0xc0
[   15.604439]  __kmalloc_cache_noprof+0x189/0x420
[   15.604632]  kasan_atomics+0x95/0x310
[   15.604825]  kunit_try_run_case+0x1a5/0x480
[   15.605034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.605291]  kthread+0x337/0x6f0
[   15.605471]  ret_from_fork+0x116/0x1d0
[   15.605711]  ret_from_fork_asm+0x1a/0x30
[   15.605861] 
[   15.605934] The buggy address belongs to the object at ffff888102a5fe80
[   15.605934]  which belongs to the cache kmalloc-64 of size 64
[   15.606412] The buggy address is located 0 bytes to the right of
[   15.606412]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.607157] 
[   15.607319] The buggy address belongs to the physical page:
[   15.607620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.607883] flags: 0x200000000000000(node=0|zone=2)
[   15.608047] page_type: f5(slab)
[   15.608173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.608494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.608845] page dumped because: kasan: bad access detected
[   15.609111] 
[   15.609259] Memory state around the buggy address:
[   15.609641]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.609907]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.610223] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.610678]                                      ^
[   15.610904]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.611169]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.611577] ==================================================================
[   15.716830] ==================================================================
[   15.717396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.717707] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.717987] 
[   15.718094] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.718137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.718151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.718174] Call Trace:
[   15.718188]  <TASK>
[   15.718203]  dump_stack_lvl+0x73/0xb0
[   15.718231]  print_report+0xd1/0x610
[   15.718253]  ? __virt_addr_valid+0x1db/0x2d0
[   15.718277]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.718299]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.718324]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.718347]  kasan_report+0x141/0x180
[   15.718371]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.718399]  kasan_check_range+0x10c/0x1c0
[   15.718424]  __kasan_check_write+0x18/0x20
[   15.718445]  kasan_atomics_helper+0x5fe/0x5450
[   15.718470]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.718493]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.718520]  ? trace_hardirqs_on+0x37/0xe0
[   15.718543]  ? kasan_atomics+0x152/0x310
[   15.718581]  kasan_atomics+0x1dc/0x310
[   15.718605]  ? __pfx_kasan_atomics+0x10/0x10
[   15.718630]  ? __pfx_kasan_atomics+0x10/0x10
[   15.718657]  kunit_try_run_case+0x1a5/0x480
[   15.718683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.718708]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.718913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.718949]  ? __kthread_parkme+0x82/0x180
[   15.718971]  ? preempt_count_sub+0x50/0x80
[   15.718997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.719023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.719050]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.719078]  kthread+0x337/0x6f0
[   15.719098]  ? trace_preempt_on+0x20/0xc0
[   15.719122]  ? __pfx_kthread+0x10/0x10
[   15.719144]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.719167]  ? calculate_sigpending+0x7b/0xa0
[   15.719192]  ? __pfx_kthread+0x10/0x10
[   15.719215]  ret_from_fork+0x116/0x1d0
[   15.719236]  ? __pfx_kthread+0x10/0x10
[   15.719257]  ret_from_fork_asm+0x1a/0x30
[   15.719289]  </TASK>
[   15.719300] 
[   15.728303] Allocated by task 282:
[   15.728780]  kasan_save_stack+0x45/0x70
[   15.728974]  kasan_save_track+0x18/0x40
[   15.729169]  kasan_save_alloc_info+0x3b/0x50
[   15.729329]  __kasan_kmalloc+0xb7/0xc0
[   15.729543]  __kmalloc_cache_noprof+0x189/0x420
[   15.729792]  kasan_atomics+0x95/0x310
[   15.729980]  kunit_try_run_case+0x1a5/0x480
[   15.730157]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.730679]  kthread+0x337/0x6f0
[   15.730828]  ret_from_fork+0x116/0x1d0
[   15.730970]  ret_from_fork_asm+0x1a/0x30
[   15.731173] 
[   15.731268] The buggy address belongs to the object at ffff888102a5fe80
[   15.731268]  which belongs to the cache kmalloc-64 of size 64
[   15.731957] The buggy address is located 0 bytes to the right of
[   15.731957]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.732391] 
[   15.732489] The buggy address belongs to the physical page:
[   15.732958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.733224] flags: 0x200000000000000(node=0|zone=2)
[   15.733623] page_type: f5(slab)
[   15.733767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.734055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.734650] page dumped because: kasan: bad access detected
[   15.734850] 
[   15.734922] Memory state around the buggy address:
[   15.735147]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.735646]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.735888] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.736207]                                      ^
[   15.736577]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.736821]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.737139] ==================================================================
[   16.993054] ==================================================================
[   16.993470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.993830] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.994160] 
[   16.994289] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.994333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.994345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.994366] Call Trace:
[   16.994382]  <TASK>
[   16.994435]  dump_stack_lvl+0x73/0xb0
[   16.994466]  print_report+0xd1/0x610
[   16.994489]  ? __virt_addr_valid+0x1db/0x2d0
[   16.994513]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.994535]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.994569]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.994609]  kasan_report+0x141/0x180
[   16.994633]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.994688]  __asan_report_load8_noabort+0x18/0x20
[   16.994728]  kasan_atomics_helper+0x4fa5/0x5450
[   16.994766]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.994804]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.994844]  ? trace_hardirqs_on+0x37/0xe0
[   16.994881]  ? kasan_atomics+0x152/0x310
[   16.994909]  kasan_atomics+0x1dc/0x310
[   16.994933]  ? __pfx_kasan_atomics+0x10/0x10
[   16.994958]  ? __pfx_kasan_atomics+0x10/0x10
[   16.994986]  kunit_try_run_case+0x1a5/0x480
[   16.995011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.995036]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.995062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.995087]  ? __kthread_parkme+0x82/0x180
[   16.995110]  ? preempt_count_sub+0x50/0x80
[   16.995135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.995161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.995188]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.995216]  kthread+0x337/0x6f0
[   16.995237]  ? trace_preempt_on+0x20/0xc0
[   16.995260]  ? __pfx_kthread+0x10/0x10
[   16.995282]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.995305]  ? calculate_sigpending+0x7b/0xa0
[   16.995331]  ? __pfx_kthread+0x10/0x10
[   16.995353]  ret_from_fork+0x116/0x1d0
[   16.995374]  ? __pfx_kthread+0x10/0x10
[   16.995420]  ret_from_fork_asm+0x1a/0x30
[   16.995452]  </TASK>
[   16.995464] 
[   17.003135] Allocated by task 282:
[   17.003315]  kasan_save_stack+0x45/0x70
[   17.003544]  kasan_save_track+0x18/0x40
[   17.003746]  kasan_save_alloc_info+0x3b/0x50
[   17.003959]  __kasan_kmalloc+0xb7/0xc0
[   17.004151]  __kmalloc_cache_noprof+0x189/0x420
[   17.004373]  kasan_atomics+0x95/0x310
[   17.004593]  kunit_try_run_case+0x1a5/0x480
[   17.004819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.004998]  kthread+0x337/0x6f0
[   17.005169]  ret_from_fork+0x116/0x1d0
[   17.005385]  ret_from_fork_asm+0x1a/0x30
[   17.005634] 
[   17.005752] The buggy address belongs to the object at ffff888102a5fe80
[   17.005752]  which belongs to the cache kmalloc-64 of size 64
[   17.006245] The buggy address is located 0 bytes to the right of
[   17.006245]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   17.006817] 
[   17.006920] The buggy address belongs to the physical page:
[   17.007123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   17.007499] flags: 0x200000000000000(node=0|zone=2)
[   17.007702] page_type: f5(slab)
[   17.007823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.008054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.008378] page dumped because: kasan: bad access detected
[   17.008688] 
[   17.008783] Memory state around the buggy address:
[   17.009002]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.009249]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.009490] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.009817]                                      ^
[   17.010056]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.010436]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.010769] ==================================================================
[   15.573841] ==================================================================
[   15.574145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.574644] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.574947] 
[   15.575035] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.575079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.575091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.575113] Call Trace:
[   15.575127]  <TASK>
[   15.575141]  dump_stack_lvl+0x73/0xb0
[   15.575169]  print_report+0xd1/0x610
[   15.575192]  ? __virt_addr_valid+0x1db/0x2d0
[   15.575215]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.575237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.575261]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.575284]  kasan_report+0x141/0x180
[   15.575306]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.575333]  __asan_report_store4_noabort+0x1b/0x30
[   15.575359]  kasan_atomics_helper+0x4b6e/0x5450
[   15.575383]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.575422]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.575447]  ? trace_hardirqs_on+0x37/0xe0
[   15.575471]  ? kasan_atomics+0x152/0x310
[   15.575617]  kasan_atomics+0x1dc/0x310
[   15.575644]  ? __pfx_kasan_atomics+0x10/0x10
[   15.575690]  ? __pfx_kasan_atomics+0x10/0x10
[   15.575719]  kunit_try_run_case+0x1a5/0x480
[   15.575745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.575771]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.575797]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.575823]  ? __kthread_parkme+0x82/0x180
[   15.575846]  ? preempt_count_sub+0x50/0x80
[   15.575872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.575898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.575924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.575952]  kthread+0x337/0x6f0
[   15.575972]  ? trace_preempt_on+0x20/0xc0
[   15.575996]  ? __pfx_kthread+0x10/0x10
[   15.576018]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.576042]  ? calculate_sigpending+0x7b/0xa0
[   15.576072]  ? __pfx_kthread+0x10/0x10
[   15.576095]  ret_from_fork+0x116/0x1d0
[   15.576114]  ? __pfx_kthread+0x10/0x10
[   15.576138]  ret_from_fork_asm+0x1a/0x30
[   15.576169]  </TASK>
[   15.576181] 
[   15.583736] Allocated by task 282:
[   15.583914]  kasan_save_stack+0x45/0x70
[   15.584091]  kasan_save_track+0x18/0x40
[   15.584229]  kasan_save_alloc_info+0x3b/0x50
[   15.584380]  __kasan_kmalloc+0xb7/0xc0
[   15.584544]  __kmalloc_cache_noprof+0x189/0x420
[   15.584931]  kasan_atomics+0x95/0x310
[   15.585123]  kunit_try_run_case+0x1a5/0x480
[   15.585334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.585563]  kthread+0x337/0x6f0
[   15.585686]  ret_from_fork+0x116/0x1d0
[   15.585900]  ret_from_fork_asm+0x1a/0x30
[   15.586159] 
[   15.586607] The buggy address belongs to the object at ffff888102a5fe80
[   15.586607]  which belongs to the cache kmalloc-64 of size 64
[   15.586992] The buggy address is located 0 bytes to the right of
[   15.586992]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.587778] 
[   15.587884] The buggy address belongs to the physical page:
[   15.588144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.588585] flags: 0x200000000000000(node=0|zone=2)
[   15.588753] page_type: f5(slab)
[   15.588875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.589215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.589609] page dumped because: kasan: bad access detected
[   15.590009] 
[   15.590097] Memory state around the buggy address:
[   15.590380]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.590735]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.590953] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.591353]                                      ^
[   15.591692]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.591976]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.592301] ==================================================================
[   16.422094] ==================================================================
[   16.422489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   16.423133] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.423367] 
[   16.423592] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.423638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.423651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.423674] Call Trace:
[   16.423691]  <TASK>
[   16.423708]  dump_stack_lvl+0x73/0xb0
[   16.423737]  print_report+0xd1/0x610
[   16.423760]  ? __virt_addr_valid+0x1db/0x2d0
[   16.423783]  ? kasan_atomics_helper+0x1467/0x5450
[   16.423806]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.423831]  ? kasan_atomics_helper+0x1467/0x5450
[   16.423855]  kasan_report+0x141/0x180
[   16.423879]  ? kasan_atomics_helper+0x1467/0x5450
[   16.423907]  kasan_check_range+0x10c/0x1c0
[   16.423932]  __kasan_check_write+0x18/0x20
[   16.423954]  kasan_atomics_helper+0x1467/0x5450
[   16.423980]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.424004]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.424031]  ? trace_hardirqs_on+0x37/0xe0
[   16.424054]  ? kasan_atomics+0x152/0x310
[   16.424088]  kasan_atomics+0x1dc/0x310
[   16.424111]  ? __pfx_kasan_atomics+0x10/0x10
[   16.424137]  ? __pfx_kasan_atomics+0x10/0x10
[   16.424165]  kunit_try_run_case+0x1a5/0x480
[   16.424191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.424216]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.424242]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.424268]  ? __kthread_parkme+0x82/0x180
[   16.424289]  ? preempt_count_sub+0x50/0x80
[   16.424314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.424340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.424366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.424401]  kthread+0x337/0x6f0
[   16.424423]  ? trace_preempt_on+0x20/0xc0
[   16.424447]  ? __pfx_kthread+0x10/0x10
[   16.424468]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.424492]  ? calculate_sigpending+0x7b/0xa0
[   16.424518]  ? __pfx_kthread+0x10/0x10
[   16.424540]  ret_from_fork+0x116/0x1d0
[   16.424604]  ? __pfx_kthread+0x10/0x10
[   16.424626]  ret_from_fork_asm+0x1a/0x30
[   16.424659]  </TASK>
[   16.424671] 
[   16.436531] Allocated by task 282:
[   16.436882]  kasan_save_stack+0x45/0x70
[   16.437246]  kasan_save_track+0x18/0x40
[   16.437644]  kasan_save_alloc_info+0x3b/0x50
[   16.438042]  __kasan_kmalloc+0xb7/0xc0
[   16.438414]  __kmalloc_cache_noprof+0x189/0x420
[   16.438848]  kasan_atomics+0x95/0x310
[   16.439066]  kunit_try_run_case+0x1a5/0x480
[   16.439216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.439420]  kthread+0x337/0x6f0
[   16.439767]  ret_from_fork+0x116/0x1d0
[   16.440122]  ret_from_fork_asm+0x1a/0x30
[   16.440512] 
[   16.440701] The buggy address belongs to the object at ffff888102a5fe80
[   16.440701]  which belongs to the cache kmalloc-64 of size 64
[   16.441640] The buggy address is located 0 bytes to the right of
[   16.441640]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.442021] 
[   16.442098] The buggy address belongs to the physical page:
[   16.442277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.442850] flags: 0x200000000000000(node=0|zone=2)
[   16.443310] page_type: f5(slab)
[   16.443656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.444316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.444993] page dumped because: kasan: bad access detected
[   16.445496] 
[   16.445663] Memory state around the buggy address:
[   16.446110]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.446595]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.446816] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.447031]                                      ^
[   16.447186]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.447426]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.448119] ==================================================================
[   16.004185] ==================================================================
[   16.004516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   16.004833] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.005117] 
[   16.005224] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.005267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.005279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.005301] Call Trace:
[   16.005316]  <TASK>
[   16.005331]  dump_stack_lvl+0x73/0xb0
[   16.005358]  print_report+0xd1/0x610
[   16.005380]  ? __virt_addr_valid+0x1db/0x2d0
[   16.005402]  ? kasan_atomics_helper+0xd47/0x5450
[   16.005423]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.005446]  ? kasan_atomics_helper+0xd47/0x5450
[   16.005468]  kasan_report+0x141/0x180
[   16.005490]  ? kasan_atomics_helper+0xd47/0x5450
[   16.005516]  kasan_check_range+0x10c/0x1c0
[   16.005540]  __kasan_check_write+0x18/0x20
[   16.005693]  kasan_atomics_helper+0xd47/0x5450
[   16.005731]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.005757]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.005794]  ? trace_hardirqs_on+0x37/0xe0
[   16.005819]  ? kasan_atomics+0x152/0x310
[   16.005846]  kasan_atomics+0x1dc/0x310
[   16.005870]  ? __pfx_kasan_atomics+0x10/0x10
[   16.005896]  ? __pfx_kasan_atomics+0x10/0x10
[   16.005924]  kunit_try_run_case+0x1a5/0x480
[   16.005949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.005975]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.006000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.006034]  ? __kthread_parkme+0x82/0x180
[   16.006059]  ? preempt_count_sub+0x50/0x80
[   16.006084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.006122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.006149]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.006177]  kthread+0x337/0x6f0
[   16.006206]  ? trace_preempt_on+0x20/0xc0
[   16.006230]  ? __pfx_kthread+0x10/0x10
[   16.006304]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.006328]  ? calculate_sigpending+0x7b/0xa0
[   16.006355]  ? __pfx_kthread+0x10/0x10
[   16.006377]  ret_from_fork+0x116/0x1d0
[   16.006399]  ? __pfx_kthread+0x10/0x10
[   16.006591]  ret_from_fork_asm+0x1a/0x30
[   16.006629]  </TASK>
[   16.006639] 
[   16.015685] Allocated by task 282:
[   16.015843]  kasan_save_stack+0x45/0x70
[   16.016065]  kasan_save_track+0x18/0x40
[   16.016310]  kasan_save_alloc_info+0x3b/0x50
[   16.016571]  __kasan_kmalloc+0xb7/0xc0
[   16.016767]  __kmalloc_cache_noprof+0x189/0x420
[   16.016984]  kasan_atomics+0x95/0x310
[   16.017180]  kunit_try_run_case+0x1a5/0x480
[   16.017490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.017752]  kthread+0x337/0x6f0
[   16.017880]  ret_from_fork+0x116/0x1d0
[   16.018016]  ret_from_fork_asm+0x1a/0x30
[   16.018202] 
[   16.018308] The buggy address belongs to the object at ffff888102a5fe80
[   16.018308]  which belongs to the cache kmalloc-64 of size 64
[   16.018981] The buggy address is located 0 bytes to the right of
[   16.018981]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.019618] 
[   16.019743] The buggy address belongs to the physical page:
[   16.020299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.020756] flags: 0x200000000000000(node=0|zone=2)
[   16.020955] page_type: f5(slab)
[   16.021076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.021629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.021919] page dumped because: kasan: bad access detected
[   16.022200] 
[   16.022402] Memory state around the buggy address:
[   16.022587]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.022819]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.023170] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.023860]                                      ^
[   16.024162]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.024398]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.024843] ==================================================================
[   15.814087] ==================================================================
[   15.814576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.814865] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.815202] 
[   15.815497] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.815570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.815584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.815607] Call Trace:
[   15.815624]  <TASK>
[   15.815639]  dump_stack_lvl+0x73/0xb0
[   15.815670]  print_report+0xd1/0x610
[   15.815694]  ? __virt_addr_valid+0x1db/0x2d0
[   15.815812]  ? kasan_atomics_helper+0x860/0x5450
[   15.815835]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.815860]  ? kasan_atomics_helper+0x860/0x5450
[   15.815883]  kasan_report+0x141/0x180
[   15.815907]  ? kasan_atomics_helper+0x860/0x5450
[   15.815935]  kasan_check_range+0x10c/0x1c0
[   15.815960]  __kasan_check_write+0x18/0x20
[   15.815981]  kasan_atomics_helper+0x860/0x5450
[   15.816014]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.816039]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.816081]  ? trace_hardirqs_on+0x37/0xe0
[   15.816105]  ? kasan_atomics+0x152/0x310
[   15.816132]  kasan_atomics+0x1dc/0x310
[   15.816156]  ? __pfx_kasan_atomics+0x10/0x10
[   15.816191]  ? __pfx_kasan_atomics+0x10/0x10
[   15.816219]  kunit_try_run_case+0x1a5/0x480
[   15.816255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.816280]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.816306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.816332]  ? __kthread_parkme+0x82/0x180
[   15.816355]  ? preempt_count_sub+0x50/0x80
[   15.816380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.816406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.816433]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.816460]  kthread+0x337/0x6f0
[   15.816481]  ? trace_preempt_on+0x20/0xc0
[   15.816505]  ? __pfx_kthread+0x10/0x10
[   15.816648]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.816672]  ? calculate_sigpending+0x7b/0xa0
[   15.816698]  ? __pfx_kthread+0x10/0x10
[   15.816722]  ret_from_fork+0x116/0x1d0
[   15.816744]  ? __pfx_kthread+0x10/0x10
[   15.816766]  ret_from_fork_asm+0x1a/0x30
[   15.816799]  </TASK>
[   15.816810] 
[   15.825670] Allocated by task 282:
[   15.825816]  kasan_save_stack+0x45/0x70
[   15.825969]  kasan_save_track+0x18/0x40
[   15.826973]  kasan_save_alloc_info+0x3b/0x50
[   15.827829]  __kasan_kmalloc+0xb7/0xc0
[   15.828047]  __kmalloc_cache_noprof+0x189/0x420
[   15.828313]  kasan_atomics+0x95/0x310
[   15.828513]  kunit_try_run_case+0x1a5/0x480
[   15.828764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.828943]  kthread+0x337/0x6f0
[   15.829065]  ret_from_fork+0x116/0x1d0
[   15.829202]  ret_from_fork_asm+0x1a/0x30
[   15.829342] 
[   15.829417] The buggy address belongs to the object at ffff888102a5fe80
[   15.829417]  which belongs to the cache kmalloc-64 of size 64
[   15.829815] The buggy address is located 0 bytes to the right of
[   15.829815]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.830704] 
[   15.830858] The buggy address belongs to the physical page:
[   15.831226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.831469] flags: 0x200000000000000(node=0|zone=2)
[   15.831645] page_type: f5(slab)
[   15.831767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.832003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.833273] page dumped because: kasan: bad access detected
[   15.833457] 
[   15.833529] Memory state around the buggy address:
[   15.833697]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.833913]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.834212] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.834570]                                      ^
[   15.834731]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.834950]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.835176] ==================================================================
[   16.310013] ==================================================================
[   16.310455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   16.311538] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.312092] 
[   16.312332] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.312482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.312499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.312523] Call Trace:
[   16.312540]  <TASK>
[   16.312603]  dump_stack_lvl+0x73/0xb0
[   16.312637]  print_report+0xd1/0x610
[   16.312662]  ? __virt_addr_valid+0x1db/0x2d0
[   16.312687]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.312711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.312736]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.312759]  kasan_report+0x141/0x180
[   16.312783]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.312811]  kasan_check_range+0x10c/0x1c0
[   16.312837]  __kasan_check_write+0x18/0x20
[   16.312857]  kasan_atomics_helper+0x12e6/0x5450
[   16.312883]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.312907]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.312933]  ? trace_hardirqs_on+0x37/0xe0
[   16.312957]  ? kasan_atomics+0x152/0x310
[   16.312984]  kasan_atomics+0x1dc/0x310
[   16.313142]  ? __pfx_kasan_atomics+0x10/0x10
[   16.313170]  ? __pfx_kasan_atomics+0x10/0x10
[   16.313211]  kunit_try_run_case+0x1a5/0x480
[   16.313238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.313263]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.313290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.313316]  ? __kthread_parkme+0x82/0x180
[   16.313339]  ? preempt_count_sub+0x50/0x80
[   16.313364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.313390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.313416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.313443]  kthread+0x337/0x6f0
[   16.313464]  ? trace_preempt_on+0x20/0xc0
[   16.313487]  ? __pfx_kthread+0x10/0x10
[   16.313509]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.313532]  ? calculate_sigpending+0x7b/0xa0
[   16.313567]  ? __pfx_kthread+0x10/0x10
[   16.313591]  ret_from_fork+0x116/0x1d0
[   16.313612]  ? __pfx_kthread+0x10/0x10
[   16.313634]  ret_from_fork_asm+0x1a/0x30
[   16.313666]  </TASK>
[   16.313678] 
[   16.324005] Allocated by task 282:
[   16.324384]  kasan_save_stack+0x45/0x70
[   16.324612]  kasan_save_track+0x18/0x40
[   16.324793]  kasan_save_alloc_info+0x3b/0x50
[   16.324994]  __kasan_kmalloc+0xb7/0xc0
[   16.325168]  __kmalloc_cache_noprof+0x189/0x420
[   16.325378]  kasan_atomics+0x95/0x310
[   16.325971]  kunit_try_run_case+0x1a5/0x480
[   16.326250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.326697]  kthread+0x337/0x6f0
[   16.327003]  ret_from_fork+0x116/0x1d0
[   16.327195]  ret_from_fork_asm+0x1a/0x30
[   16.327378] 
[   16.327807] The buggy address belongs to the object at ffff888102a5fe80
[   16.327807]  which belongs to the cache kmalloc-64 of size 64
[   16.328696] The buggy address is located 0 bytes to the right of
[   16.328696]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.329496] 
[   16.329603] The buggy address belongs to the physical page:
[   16.329830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.330152] flags: 0x200000000000000(node=0|zone=2)
[   16.330374] page_type: f5(slab)
[   16.330951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.331429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.331954] page dumped because: kasan: bad access detected
[   16.332208] 
[   16.332299] Memory state around the buggy address:
[   16.332876]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.333277]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.333964] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.334283]                                      ^
[   16.334796]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.335116]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.335588] ==================================================================
[   16.365162] ==================================================================
[   16.365850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   16.366101] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.366327] 
[   16.366423] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.366468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.366482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.366504] Call Trace:
[   16.366521]  <TASK>
[   16.366538]  dump_stack_lvl+0x73/0xb0
[   16.366576]  print_report+0xd1/0x610
[   16.366599]  ? __virt_addr_valid+0x1db/0x2d0
[   16.366624]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.366646]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.366671]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.366695]  kasan_report+0x141/0x180
[   16.366718]  ? kasan_atomics_helper+0x13b5/0x5450
[   16.366746]  kasan_check_range+0x10c/0x1c0
[   16.366771]  __kasan_check_read+0x15/0x20
[   16.366792]  kasan_atomics_helper+0x13b5/0x5450
[   16.366816]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.366840]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.366867]  ? trace_hardirqs_on+0x37/0xe0
[   16.366891]  ? kasan_atomics+0x152/0x310
[   16.366918]  kasan_atomics+0x1dc/0x310
[   16.366942]  ? __pfx_kasan_atomics+0x10/0x10
[   16.366967]  ? __pfx_kasan_atomics+0x10/0x10
[   16.366995]  kunit_try_run_case+0x1a5/0x480
[   16.367021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.367046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.367072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.367097]  ? __kthread_parkme+0x82/0x180
[   16.367119]  ? preempt_count_sub+0x50/0x80
[   16.367145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.367171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.367197]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.367224]  kthread+0x337/0x6f0
[   16.367244]  ? trace_preempt_on+0x20/0xc0
[   16.367268]  ? __pfx_kthread+0x10/0x10
[   16.367290]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.367313]  ? calculate_sigpending+0x7b/0xa0
[   16.367339]  ? __pfx_kthread+0x10/0x10
[   16.367361]  ret_from_fork+0x116/0x1d0
[   16.367381]  ? __pfx_kthread+0x10/0x10
[   16.367403]  ret_from_fork_asm+0x1a/0x30
[   16.367435]  </TASK>
[   16.367447] 
[   16.382445] Allocated by task 282:
[   16.382796]  kasan_save_stack+0x45/0x70
[   16.383166]  kasan_save_track+0x18/0x40
[   16.383567]  kasan_save_alloc_info+0x3b/0x50
[   16.383848]  __kasan_kmalloc+0xb7/0xc0
[   16.384126]  __kmalloc_cache_noprof+0x189/0x420
[   16.384286]  kasan_atomics+0x95/0x310
[   16.384496]  kunit_try_run_case+0x1a5/0x480
[   16.384903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.385383]  kthread+0x337/0x6f0
[   16.385722]  ret_from_fork+0x116/0x1d0
[   16.385938]  ret_from_fork_asm+0x1a/0x30
[   16.386081] 
[   16.386157] The buggy address belongs to the object at ffff888102a5fe80
[   16.386157]  which belongs to the cache kmalloc-64 of size 64
[   16.386830] The buggy address is located 0 bytes to the right of
[   16.386830]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.387935] 
[   16.388123] The buggy address belongs to the physical page:
[   16.388644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.389039] flags: 0x200000000000000(node=0|zone=2)
[   16.389467] page_type: f5(slab)
[   16.389603] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.389836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.390064] page dumped because: kasan: bad access detected
[   16.390237] 
[   16.390309] Memory state around the buggy address:
[   16.390699]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.391310]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.391958] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.392614]                                      ^
[   16.393040]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.393693]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.394303] ==================================================================
[   15.554619] ==================================================================
[   15.554915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.555218] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.555854] 
[   15.555955] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.555999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.556012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.556033] Call Trace:
[   15.556045]  <TASK>
[   15.556064]  dump_stack_lvl+0x73/0xb0
[   15.556092]  print_report+0xd1/0x610
[   15.556115]  ? __virt_addr_valid+0x1db/0x2d0
[   15.556138]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.556160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.556184]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.556207]  kasan_report+0x141/0x180
[   15.556229]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.556319]  __asan_report_load4_noabort+0x18/0x20
[   15.556346]  kasan_atomics_helper+0x4b88/0x5450
[   15.556370]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.556394]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.556418]  ? trace_hardirqs_on+0x37/0xe0
[   15.556441]  ? kasan_atomics+0x152/0x310
[   15.556468]  kasan_atomics+0x1dc/0x310
[   15.556491]  ? __pfx_kasan_atomics+0x10/0x10
[   15.556515]  ? __pfx_kasan_atomics+0x10/0x10
[   15.556542]  kunit_try_run_case+0x1a5/0x480
[   15.556580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.556605]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.556629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.556654]  ? __kthread_parkme+0x82/0x180
[   15.556687]  ? preempt_count_sub+0x50/0x80
[   15.556711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.556736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.556761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.556787]  kthread+0x337/0x6f0
[   15.556807]  ? trace_preempt_on+0x20/0xc0
[   15.556829]  ? __pfx_kthread+0x10/0x10
[   15.556850]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.556872]  ? calculate_sigpending+0x7b/0xa0
[   15.556896]  ? __pfx_kthread+0x10/0x10
[   15.556918]  ret_from_fork+0x116/0x1d0
[   15.556937]  ? __pfx_kthread+0x10/0x10
[   15.556957]  ret_from_fork_asm+0x1a/0x30
[   15.556987]  </TASK>
[   15.556998] 
[   15.564984] Allocated by task 282:
[   15.565158]  kasan_save_stack+0x45/0x70
[   15.565387]  kasan_save_track+0x18/0x40
[   15.565652]  kasan_save_alloc_info+0x3b/0x50
[   15.565866]  __kasan_kmalloc+0xb7/0xc0
[   15.566054]  __kmalloc_cache_noprof+0x189/0x420
[   15.566447]  kasan_atomics+0x95/0x310
[   15.566663]  kunit_try_run_case+0x1a5/0x480
[   15.566872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.567102]  kthread+0x337/0x6f0
[   15.567352]  ret_from_fork+0x116/0x1d0
[   15.567571]  ret_from_fork_asm+0x1a/0x30
[   15.567738] 
[   15.567836] The buggy address belongs to the object at ffff888102a5fe80
[   15.567836]  which belongs to the cache kmalloc-64 of size 64
[   15.568387] The buggy address is located 0 bytes to the right of
[   15.568387]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.568856] 
[   15.568926] The buggy address belongs to the physical page:
[   15.569099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.569392] flags: 0x200000000000000(node=0|zone=2)
[   15.569633] page_type: f5(slab)
[   15.569802] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.570369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.570642] page dumped because: kasan: bad access detected
[   15.570810] 
[   15.570879] Memory state around the buggy address:
[   15.571032]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.571247]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.571819] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.572152]                                      ^
[   15.572379]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.572826]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.573153] ==================================================================
[   15.961563] ==================================================================
[   15.961840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.962372] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.962728] 
[   15.963063] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.963112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.963125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.963148] Call Trace:
[   15.963160]  <TASK>
[   15.963175]  dump_stack_lvl+0x73/0xb0
[   15.963204]  print_report+0xd1/0x610
[   15.963228]  ? __virt_addr_valid+0x1db/0x2d0
[   15.963251]  ? kasan_atomics_helper+0xc70/0x5450
[   15.963274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.963299]  ? kasan_atomics_helper+0xc70/0x5450
[   15.963323]  kasan_report+0x141/0x180
[   15.963346]  ? kasan_atomics_helper+0xc70/0x5450
[   15.963374]  kasan_check_range+0x10c/0x1c0
[   15.963399]  __kasan_check_write+0x18/0x20
[   15.963421]  kasan_atomics_helper+0xc70/0x5450
[   15.963445]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.963471]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.963497]  ? trace_hardirqs_on+0x37/0xe0
[   15.963520]  ? kasan_atomics+0x152/0x310
[   15.963559]  kasan_atomics+0x1dc/0x310
[   15.963583]  ? __pfx_kasan_atomics+0x10/0x10
[   15.963609]  ? __pfx_kasan_atomics+0x10/0x10
[   15.963638]  kunit_try_run_case+0x1a5/0x480
[   15.963663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.963688]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.963714]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.963791]  ? __kthread_parkme+0x82/0x180
[   15.963813]  ? preempt_count_sub+0x50/0x80
[   15.963871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.963906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.963933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.963960]  kthread+0x337/0x6f0
[   15.963981]  ? trace_preempt_on+0x20/0xc0
[   15.964005]  ? __pfx_kthread+0x10/0x10
[   15.964028]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.964053]  ? calculate_sigpending+0x7b/0xa0
[   15.964088]  ? __pfx_kthread+0x10/0x10
[   15.964112]  ret_from_fork+0x116/0x1d0
[   15.964132]  ? __pfx_kthread+0x10/0x10
[   15.964155]  ret_from_fork_asm+0x1a/0x30
[   15.964187]  </TASK>
[   15.964199] 
[   15.973286] Allocated by task 282:
[   15.973600]  kasan_save_stack+0x45/0x70
[   15.973758]  kasan_save_track+0x18/0x40
[   15.974036]  kasan_save_alloc_info+0x3b/0x50
[   15.974250]  __kasan_kmalloc+0xb7/0xc0
[   15.974526]  __kmalloc_cache_noprof+0x189/0x420
[   15.974779]  kasan_atomics+0x95/0x310
[   15.974975]  kunit_try_run_case+0x1a5/0x480
[   15.975148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.975379]  kthread+0x337/0x6f0
[   15.975545]  ret_from_fork+0x116/0x1d0
[   15.975688]  ret_from_fork_asm+0x1a/0x30
[   15.975964] 
[   15.976084] The buggy address belongs to the object at ffff888102a5fe80
[   15.976084]  which belongs to the cache kmalloc-64 of size 64
[   15.976710] The buggy address is located 0 bytes to the right of
[   15.976710]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.977183] 
[   15.977410] The buggy address belongs to the physical page:
[   15.978003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.978335] flags: 0x200000000000000(node=0|zone=2)
[   15.978688] page_type: f5(slab)
[   15.978947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.979236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.979633] page dumped because: kasan: bad access detected
[   15.979940] 
[   15.980113] Memory state around the buggy address:
[   15.980455]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.980717]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.981050] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.981612]                                      ^
[   15.981852]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.982078]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.982665] ==================================================================
[   16.476778] ==================================================================
[   16.477594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   16.478112] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.478884] 
[   16.479130] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.479174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.479187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.479209] Call Trace:
[   16.479223]  <TASK>
[   16.479239]  dump_stack_lvl+0x73/0xb0
[   16.479267]  print_report+0xd1/0x610
[   16.479290]  ? __virt_addr_valid+0x1db/0x2d0
[   16.479313]  ? kasan_atomics_helper+0x151d/0x5450
[   16.479345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.479370]  ? kasan_atomics_helper+0x151d/0x5450
[   16.479394]  kasan_report+0x141/0x180
[   16.479416]  ? kasan_atomics_helper+0x151d/0x5450
[   16.479444]  kasan_check_range+0x10c/0x1c0
[   16.479469]  __kasan_check_write+0x18/0x20
[   16.479490]  kasan_atomics_helper+0x151d/0x5450
[   16.479514]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.479539]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.479574]  ? trace_hardirqs_on+0x37/0xe0
[   16.479597]  ? kasan_atomics+0x152/0x310
[   16.479624]  kasan_atomics+0x1dc/0x310
[   16.479648]  ? __pfx_kasan_atomics+0x10/0x10
[   16.479673]  ? __pfx_kasan_atomics+0x10/0x10
[   16.479701]  kunit_try_run_case+0x1a5/0x480
[   16.479726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.479751]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.479777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.479802]  ? __kthread_parkme+0x82/0x180
[   16.479825]  ? preempt_count_sub+0x50/0x80
[   16.479849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.479875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.479901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.479928]  kthread+0x337/0x6f0
[   16.479949]  ? trace_preempt_on+0x20/0xc0
[   16.479972]  ? __pfx_kthread+0x10/0x10
[   16.479994]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.480017]  ? calculate_sigpending+0x7b/0xa0
[   16.480042]  ? __pfx_kthread+0x10/0x10
[   16.480071]  ret_from_fork+0x116/0x1d0
[   16.480092]  ? __pfx_kthread+0x10/0x10
[   16.480114]  ret_from_fork_asm+0x1a/0x30
[   16.480146]  </TASK>
[   16.480157] 
[   16.491851] Allocated by task 282:
[   16.492173]  kasan_save_stack+0x45/0x70
[   16.492580]  kasan_save_track+0x18/0x40
[   16.492936]  kasan_save_alloc_info+0x3b/0x50
[   16.493191]  __kasan_kmalloc+0xb7/0xc0
[   16.493325]  __kmalloc_cache_noprof+0x189/0x420
[   16.493689]  kasan_atomics+0x95/0x310
[   16.494036]  kunit_try_run_case+0x1a5/0x480
[   16.494443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.494913]  kthread+0x337/0x6f0
[   16.495037]  ret_from_fork+0x116/0x1d0
[   16.495172]  ret_from_fork_asm+0x1a/0x30
[   16.495314] 
[   16.495387] The buggy address belongs to the object at ffff888102a5fe80
[   16.495387]  which belongs to the cache kmalloc-64 of size 64
[   16.496464] The buggy address is located 0 bytes to the right of
[   16.496464]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.497535] 
[   16.497703] The buggy address belongs to the physical page:
[   16.498068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.498315] flags: 0x200000000000000(node=0|zone=2)
[   16.498683] page_type: f5(slab)
[   16.498995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.499675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.500317] page dumped because: kasan: bad access detected
[   16.500595] 
[   16.500668] Memory state around the buggy address:
[   16.500826]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.501043]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.501259] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.501649]                                      ^
[   16.502057]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.502702]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.503298] ==================================================================
[   16.689674] ==================================================================
[   16.689998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.690703] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.690940] 
[   16.691026] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.691070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.691082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.691104] Call Trace:
[   16.691118]  <TASK>
[   16.691132]  dump_stack_lvl+0x73/0xb0
[   16.691161]  print_report+0xd1/0x610
[   16.691184]  ? __virt_addr_valid+0x1db/0x2d0
[   16.691208]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.691231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.691255]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.691280]  kasan_report+0x141/0x180
[   16.691303]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.691331]  kasan_check_range+0x10c/0x1c0
[   16.691356]  __kasan_check_write+0x18/0x20
[   16.691378]  kasan_atomics_helper+0x1b22/0x5450
[   16.691402]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.691426]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.691452]  ? trace_hardirqs_on+0x37/0xe0
[   16.691475]  ? kasan_atomics+0x152/0x310
[   16.691503]  kasan_atomics+0x1dc/0x310
[   16.691527]  ? __pfx_kasan_atomics+0x10/0x10
[   16.691564]  ? __pfx_kasan_atomics+0x10/0x10
[   16.691593]  kunit_try_run_case+0x1a5/0x480
[   16.691619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.691644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.691671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.691697]  ? __kthread_parkme+0x82/0x180
[   16.691719]  ? preempt_count_sub+0x50/0x80
[   16.691758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.691785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.691811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.691839]  kthread+0x337/0x6f0
[   16.691862]  ? trace_preempt_on+0x20/0xc0
[   16.691886]  ? __pfx_kthread+0x10/0x10
[   16.691908]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.691932]  ? calculate_sigpending+0x7b/0xa0
[   16.691958]  ? __pfx_kthread+0x10/0x10
[   16.691980]  ret_from_fork+0x116/0x1d0
[   16.692000]  ? __pfx_kthread+0x10/0x10
[   16.692021]  ret_from_fork_asm+0x1a/0x30
[   16.692053]  </TASK>
[   16.692069] 
[   16.699786] Allocated by task 282:
[   16.699980]  kasan_save_stack+0x45/0x70
[   16.700157]  kasan_save_track+0x18/0x40
[   16.700332]  kasan_save_alloc_info+0x3b/0x50
[   16.700559]  __kasan_kmalloc+0xb7/0xc0
[   16.700697]  __kmalloc_cache_noprof+0x189/0x420
[   16.700857]  kasan_atomics+0x95/0x310
[   16.701023]  kunit_try_run_case+0x1a5/0x480
[   16.701232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.701486]  kthread+0x337/0x6f0
[   16.701701]  ret_from_fork+0x116/0x1d0
[   16.701847]  ret_from_fork_asm+0x1a/0x30
[   16.701988] 
[   16.702061] The buggy address belongs to the object at ffff888102a5fe80
[   16.702061]  which belongs to the cache kmalloc-64 of size 64
[   16.702449] The buggy address is located 0 bytes to the right of
[   16.702449]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.702999] 
[   16.703109] The buggy address belongs to the physical page:
[   16.703357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.703895] flags: 0x200000000000000(node=0|zone=2)
[   16.704107] page_type: f5(slab)
[   16.704228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.704462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.704786] page dumped because: kasan: bad access detected
[   16.705159] 
[   16.705256] Memory state around the buggy address:
[   16.705480]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.705746]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.705962] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.706244]                                      ^
[   16.706459]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.706781]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.707192] ==================================================================
[   15.835824] ==================================================================
[   15.836081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.836322] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.836545] 
[   15.837746] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.837799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.837813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.837837] Call Trace:
[   15.837855]  <TASK>
[   15.837873]  dump_stack_lvl+0x73/0xb0
[   15.838151]  print_report+0xd1/0x610
[   15.838183]  ? __virt_addr_valid+0x1db/0x2d0
[   15.838208]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.838231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.838323]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.838348]  kasan_report+0x141/0x180
[   15.838372]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.838400]  kasan_check_range+0x10c/0x1c0
[   15.838436]  __kasan_check_write+0x18/0x20
[   15.838457]  kasan_atomics_helper+0x8f9/0x5450
[   15.838482]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.838506]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.838532]  ? trace_hardirqs_on+0x37/0xe0
[   15.838570]  ? kasan_atomics+0x152/0x310
[   15.838597]  kasan_atomics+0x1dc/0x310
[   15.838621]  ? __pfx_kasan_atomics+0x10/0x10
[   15.838645]  ? __pfx_kasan_atomics+0x10/0x10
[   15.838674]  kunit_try_run_case+0x1a5/0x480
[   15.838699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.838723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.838749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.838774]  ? __kthread_parkme+0x82/0x180
[   15.838796]  ? preempt_count_sub+0x50/0x80
[   15.838823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.838849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.838875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.838903]  kthread+0x337/0x6f0
[   15.838923]  ? trace_preempt_on+0x20/0xc0
[   15.838946]  ? __pfx_kthread+0x10/0x10
[   15.838968]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.838992]  ? calculate_sigpending+0x7b/0xa0
[   15.839017]  ? __pfx_kthread+0x10/0x10
[   15.839040]  ret_from_fork+0x116/0x1d0
[   15.839060]  ? __pfx_kthread+0x10/0x10
[   15.839082]  ret_from_fork_asm+0x1a/0x30
[   15.839115]  </TASK>
[   15.839126] 
[   15.851510] Allocated by task 282:
[   15.851670]  kasan_save_stack+0x45/0x70
[   15.852069]  kasan_save_track+0x18/0x40
[   15.852412]  kasan_save_alloc_info+0x3b/0x50
[   15.852724]  __kasan_kmalloc+0xb7/0xc0
[   15.853044]  __kmalloc_cache_noprof+0x189/0x420
[   15.853427]  kasan_atomics+0x95/0x310
[   15.853818]  kunit_try_run_case+0x1a5/0x480
[   15.854123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.854572]  kthread+0x337/0x6f0
[   15.854828]  ret_from_fork+0x116/0x1d0
[   15.855029]  ret_from_fork_asm+0x1a/0x30
[   15.855435] 
[   15.855638] The buggy address belongs to the object at ffff888102a5fe80
[   15.855638]  which belongs to the cache kmalloc-64 of size 64
[   15.856134] The buggy address is located 0 bytes to the right of
[   15.856134]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.856899] 
[   15.857005] The buggy address belongs to the physical page:
[   15.857302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.857754] flags: 0x200000000000000(node=0|zone=2)
[   15.857994] page_type: f5(slab)
[   15.858147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.858724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.859036] page dumped because: kasan: bad access detected
[   15.859374] 
[   15.859479] Memory state around the buggy address:
[   15.859683]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.860032]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.860629] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.860907]                                      ^
[   15.861165]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.861585]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.861869] ==================================================================
[   16.566563] ==================================================================
[   16.566890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.567209] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.567599] 
[   16.567699] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.567764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.567777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.567799] Call Trace:
[   16.567812]  <TASK>
[   16.567826]  dump_stack_lvl+0x73/0xb0
[   16.567855]  print_report+0xd1/0x610
[   16.567878]  ? __virt_addr_valid+0x1db/0x2d0
[   16.567921]  ? kasan_atomics_helper+0x177f/0x5450
[   16.567945]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.567971]  ? kasan_atomics_helper+0x177f/0x5450
[   16.567995]  kasan_report+0x141/0x180
[   16.568018]  ? kasan_atomics_helper+0x177f/0x5450
[   16.568046]  kasan_check_range+0x10c/0x1c0
[   16.568095]  __kasan_check_write+0x18/0x20
[   16.568117]  kasan_atomics_helper+0x177f/0x5450
[   16.568142]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.568167]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.568193]  ? trace_hardirqs_on+0x37/0xe0
[   16.568217]  ? kasan_atomics+0x152/0x310
[   16.568264]  kasan_atomics+0x1dc/0x310
[   16.568288]  ? __pfx_kasan_atomics+0x10/0x10
[   16.568314]  ? __pfx_kasan_atomics+0x10/0x10
[   16.568342]  kunit_try_run_case+0x1a5/0x480
[   16.568368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.568393]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.568446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.568471]  ? __kthread_parkme+0x82/0x180
[   16.568493]  ? preempt_count_sub+0x50/0x80
[   16.568518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.568543]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.568581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.568608]  kthread+0x337/0x6f0
[   16.568628]  ? trace_preempt_on+0x20/0xc0
[   16.568652]  ? __pfx_kthread+0x10/0x10
[   16.568674]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.568698]  ? calculate_sigpending+0x7b/0xa0
[   16.568723]  ? __pfx_kthread+0x10/0x10
[   16.568745]  ret_from_fork+0x116/0x1d0
[   16.568765]  ? __pfx_kthread+0x10/0x10
[   16.568787]  ret_from_fork_asm+0x1a/0x30
[   16.568819]  </TASK>
[   16.568830] 
[   16.582894] Allocated by task 282:
[   16.583042]  kasan_save_stack+0x45/0x70
[   16.583254]  kasan_save_track+0x18/0x40
[   16.583446]  kasan_save_alloc_info+0x3b/0x50
[   16.583734]  __kasan_kmalloc+0xb7/0xc0
[   16.583901]  __kmalloc_cache_noprof+0x189/0x420
[   16.584112]  kasan_atomics+0x95/0x310
[   16.584249]  kunit_try_run_case+0x1a5/0x480
[   16.584459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.584809]  kthread+0x337/0x6f0
[   16.584980]  ret_from_fork+0x116/0x1d0
[   16.585149]  ret_from_fork_asm+0x1a/0x30
[   16.585292] 
[   16.585366] The buggy address belongs to the object at ffff888102a5fe80
[   16.585366]  which belongs to the cache kmalloc-64 of size 64
[   16.585893] The buggy address is located 0 bytes to the right of
[   16.585893]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.586347] 
[   16.586435] The buggy address belongs to the physical page:
[   16.586705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.587078] flags: 0x200000000000000(node=0|zone=2)
[   16.587319] page_type: f5(slab)
[   16.587495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.587816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.588074] page dumped because: kasan: bad access detected
[   16.588328] 
[   16.588430] Memory state around the buggy address:
[   16.588645]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.588863]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.589109] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.589422]                                      ^
[   16.589686]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.589905]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.590121] ==================================================================
[   16.937489] ==================================================================
[   16.937801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.938077] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.938488] 
[   16.938601] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.938644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.938657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.938699] Call Trace:
[   16.938713]  <TASK>
[   16.938728]  dump_stack_lvl+0x73/0xb0
[   16.938755]  print_report+0xd1/0x610
[   16.938778]  ? __virt_addr_valid+0x1db/0x2d0
[   16.938802]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.938824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.938869]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.938893]  kasan_report+0x141/0x180
[   16.938916]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.938961]  kasan_check_range+0x10c/0x1c0
[   16.938986]  __kasan_check_write+0x18/0x20
[   16.939007]  kasan_atomics_helper+0x20c8/0x5450
[   16.939032]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.939057]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.939083]  ? trace_hardirqs_on+0x37/0xe0
[   16.939122]  ? kasan_atomics+0x152/0x310
[   16.939163]  kasan_atomics+0x1dc/0x310
[   16.939200]  ? __pfx_kasan_atomics+0x10/0x10
[   16.939225]  ? __pfx_kasan_atomics+0x10/0x10
[   16.939280]  kunit_try_run_case+0x1a5/0x480
[   16.939306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.939331]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.939356]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.939382]  ? __kthread_parkme+0x82/0x180
[   16.939425]  ? preempt_count_sub+0x50/0x80
[   16.939450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.939477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.939503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.939530]  kthread+0x337/0x6f0
[   16.939559]  ? trace_preempt_on+0x20/0xc0
[   16.939583]  ? __pfx_kthread+0x10/0x10
[   16.939605]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.939628]  ? calculate_sigpending+0x7b/0xa0
[   16.939653]  ? __pfx_kthread+0x10/0x10
[   16.939676]  ret_from_fork+0x116/0x1d0
[   16.939697]  ? __pfx_kthread+0x10/0x10
[   16.939719]  ret_from_fork_asm+0x1a/0x30
[   16.939750]  </TASK>
[   16.939760] 
[   16.947365] Allocated by task 282:
[   16.947612]  kasan_save_stack+0x45/0x70
[   16.947850]  kasan_save_track+0x18/0x40
[   16.948076]  kasan_save_alloc_info+0x3b/0x50
[   16.948335]  __kasan_kmalloc+0xb7/0xc0
[   16.948548]  __kmalloc_cache_noprof+0x189/0x420
[   16.948759]  kasan_atomics+0x95/0x310
[   16.948894]  kunit_try_run_case+0x1a5/0x480
[   16.949042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.949305]  kthread+0x337/0x6f0
[   16.949519]  ret_from_fork+0x116/0x1d0
[   16.949742]  ret_from_fork_asm+0x1a/0x30
[   16.949980] 
[   16.950080] The buggy address belongs to the object at ffff888102a5fe80
[   16.950080]  which belongs to the cache kmalloc-64 of size 64
[   16.950676] The buggy address is located 0 bytes to the right of
[   16.950676]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.951096] 
[   16.951172] The buggy address belongs to the physical page:
[   16.951435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.951798] flags: 0x200000000000000(node=0|zone=2)
[   16.952035] page_type: f5(slab)
[   16.952218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.952595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.952842] page dumped because: kasan: bad access detected
[   16.953013] 
[   16.953084] Memory state around the buggy address:
[   16.953261]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.953640]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.953972] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.954281]                                      ^
[   16.954546]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.954851]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.955166] ==================================================================
[   16.647997] ==================================================================
[   16.648655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.648954] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.649250] 
[   16.649365] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.649415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.649428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.649450] Call Trace:
[   16.649463]  <TASK>
[   16.649500]  dump_stack_lvl+0x73/0xb0
[   16.649528]  print_report+0xd1/0x610
[   16.649560]  ? __virt_addr_valid+0x1db/0x2d0
[   16.649583]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.649606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.649631]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.649654]  kasan_report+0x141/0x180
[   16.649678]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.649706]  kasan_check_range+0x10c/0x1c0
[   16.649731]  __kasan_check_write+0x18/0x20
[   16.649752]  kasan_atomics_helper+0x19e3/0x5450
[   16.649776]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.649801]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.649827]  ? trace_hardirqs_on+0x37/0xe0
[   16.649850]  ? kasan_atomics+0x152/0x310
[   16.649878]  kasan_atomics+0x1dc/0x310
[   16.649902]  ? __pfx_kasan_atomics+0x10/0x10
[   16.649927]  ? __pfx_kasan_atomics+0x10/0x10
[   16.649957]  kunit_try_run_case+0x1a5/0x480
[   16.649983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.650009]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.650034]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.650061]  ? __kthread_parkme+0x82/0x180
[   16.650082]  ? preempt_count_sub+0x50/0x80
[   16.650107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.650133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.650179]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.650207]  kthread+0x337/0x6f0
[   16.650228]  ? trace_preempt_on+0x20/0xc0
[   16.650252]  ? __pfx_kthread+0x10/0x10
[   16.650274]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.650297]  ? calculate_sigpending+0x7b/0xa0
[   16.650322]  ? __pfx_kthread+0x10/0x10
[   16.650345]  ret_from_fork+0x116/0x1d0
[   16.650365]  ? __pfx_kthread+0x10/0x10
[   16.650387]  ret_from_fork_asm+0x1a/0x30
[   16.650431]  </TASK>
[   16.650444] 
[   16.657908] Allocated by task 282:
[   16.658080]  kasan_save_stack+0x45/0x70
[   16.658275]  kasan_save_track+0x18/0x40
[   16.658474]  kasan_save_alloc_info+0x3b/0x50
[   16.658713]  __kasan_kmalloc+0xb7/0xc0
[   16.658875]  __kmalloc_cache_noprof+0x189/0x420
[   16.659036]  kasan_atomics+0x95/0x310
[   16.659242]  kunit_try_run_case+0x1a5/0x480
[   16.659485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.659680]  kthread+0x337/0x6f0
[   16.659802]  ret_from_fork+0x116/0x1d0
[   16.659937]  ret_from_fork_asm+0x1a/0x30
[   16.660085] 
[   16.660178] The buggy address belongs to the object at ffff888102a5fe80
[   16.660178]  which belongs to the cache kmalloc-64 of size 64
[   16.660708] The buggy address is located 0 bytes to the right of
[   16.660708]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.661273] 
[   16.661368] The buggy address belongs to the physical page:
[   16.661636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.661879] flags: 0x200000000000000(node=0|zone=2)
[   16.662064] page_type: f5(slab)
[   16.662230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.662866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.663354] page dumped because: kasan: bad access detected
[   16.663967] 
[   16.664046] Memory state around the buggy address:
[   16.664681]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.665063]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.665521] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.665941]                                      ^
[   16.666266]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.666649]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.667209] ==================================================================
[   16.182318] ==================================================================
[   16.182687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   16.183074] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.183479] 
[   16.183637] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.183692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.183705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.183726] Call Trace:
[   16.183769]  <TASK>
[   16.183786]  dump_stack_lvl+0x73/0xb0
[   16.183814]  print_report+0xd1/0x610
[   16.183848]  ? __virt_addr_valid+0x1db/0x2d0
[   16.183871]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.183894]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.183945]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.183969]  kasan_report+0x141/0x180
[   16.183992]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.184031]  __asan_report_load4_noabort+0x18/0x20
[   16.184081]  kasan_atomics_helper+0x4a1c/0x5450
[   16.184115]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.184140]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.184176]  ? trace_hardirqs_on+0x37/0xe0
[   16.184200]  ? kasan_atomics+0x152/0x310
[   16.184227]  kasan_atomics+0x1dc/0x310
[   16.184251]  ? __pfx_kasan_atomics+0x10/0x10
[   16.184276]  ? __pfx_kasan_atomics+0x10/0x10
[   16.184304]  kunit_try_run_case+0x1a5/0x480
[   16.184345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.184384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.184440]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.184466]  ? __kthread_parkme+0x82/0x180
[   16.184488]  ? preempt_count_sub+0x50/0x80
[   16.184524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.184558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.184586]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.184613]  kthread+0x337/0x6f0
[   16.184632]  ? trace_preempt_on+0x20/0xc0
[   16.184656]  ? __pfx_kthread+0x10/0x10
[   16.184677]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.184701]  ? calculate_sigpending+0x7b/0xa0
[   16.184727]  ? __pfx_kthread+0x10/0x10
[   16.184749]  ret_from_fork+0x116/0x1d0
[   16.184769]  ? __pfx_kthread+0x10/0x10
[   16.184790]  ret_from_fork_asm+0x1a/0x30
[   16.184822]  </TASK>
[   16.184833] 
[   16.192692] Allocated by task 282:
[   16.192907]  kasan_save_stack+0x45/0x70
[   16.193052]  kasan_save_track+0x18/0x40
[   16.193186]  kasan_save_alloc_info+0x3b/0x50
[   16.193449]  __kasan_kmalloc+0xb7/0xc0
[   16.193681]  __kmalloc_cache_noprof+0x189/0x420
[   16.193946]  kasan_atomics+0x95/0x310
[   16.194179]  kunit_try_run_case+0x1a5/0x480
[   16.194450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.194715]  kthread+0x337/0x6f0
[   16.194869]  ret_from_fork+0x116/0x1d0
[   16.195710]  ret_from_fork_asm+0x1a/0x30
[   16.196024] 
[   16.196149] The buggy address belongs to the object at ffff888102a5fe80
[   16.196149]  which belongs to the cache kmalloc-64 of size 64
[   16.197061] The buggy address is located 0 bytes to the right of
[   16.197061]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.197819] 
[   16.198149] The buggy address belongs to the physical page:
[   16.198391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.198899] flags: 0x200000000000000(node=0|zone=2)
[   16.199256] page_type: f5(slab)
[   16.199580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.199895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.200243] page dumped because: kasan: bad access detected
[   16.200760] 
[   16.200844] Memory state around the buggy address:
[   16.201308]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.201811]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.202271] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.202743]                                      ^
[   16.203097]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.203559]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.203943] ==================================================================
[   16.955827] ==================================================================
[   16.956218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.956631] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.956945] 
[   16.957075] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.957119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.957131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.957152] Call Trace:
[   16.957168]  <TASK>
[   16.957184]  dump_stack_lvl+0x73/0xb0
[   16.957212]  print_report+0xd1/0x610
[   16.957254]  ? __virt_addr_valid+0x1db/0x2d0
[   16.957278]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.957301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.957326]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.957350]  kasan_report+0x141/0x180
[   16.957372]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.957440]  __asan_report_load8_noabort+0x18/0x20
[   16.957467]  kasan_atomics_helper+0x4fb2/0x5450
[   16.957490]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.957515]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.957541]  ? trace_hardirqs_on+0x37/0xe0
[   16.957592]  ? kasan_atomics+0x152/0x310
[   16.957620]  kasan_atomics+0x1dc/0x310
[   16.957644]  ? __pfx_kasan_atomics+0x10/0x10
[   16.957669]  ? __pfx_kasan_atomics+0x10/0x10
[   16.957698]  kunit_try_run_case+0x1a5/0x480
[   16.957724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.957749]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.957776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.957803]  ? __kthread_parkme+0x82/0x180
[   16.957825]  ? preempt_count_sub+0x50/0x80
[   16.957851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.957877]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.957903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.957946]  kthread+0x337/0x6f0
[   16.957967]  ? trace_preempt_on+0x20/0xc0
[   16.958005]  ? __pfx_kthread+0x10/0x10
[   16.958026]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.958050]  ? calculate_sigpending+0x7b/0xa0
[   16.958076]  ? __pfx_kthread+0x10/0x10
[   16.958099]  ret_from_fork+0x116/0x1d0
[   16.958119]  ? __pfx_kthread+0x10/0x10
[   16.958140]  ret_from_fork_asm+0x1a/0x30
[   16.958172]  </TASK>
[   16.958183] 
[   16.965685] Allocated by task 282:
[   16.965862]  kasan_save_stack+0x45/0x70
[   16.966059]  kasan_save_track+0x18/0x40
[   16.966249]  kasan_save_alloc_info+0x3b/0x50
[   16.966462]  __kasan_kmalloc+0xb7/0xc0
[   16.966692]  __kmalloc_cache_noprof+0x189/0x420
[   16.966896]  kasan_atomics+0x95/0x310
[   16.967029]  kunit_try_run_case+0x1a5/0x480
[   16.967171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.967360]  kthread+0x337/0x6f0
[   16.967589]  ret_from_fork+0x116/0x1d0
[   16.967816]  ret_from_fork_asm+0x1a/0x30
[   16.968039] 
[   16.968173] The buggy address belongs to the object at ffff888102a5fe80
[   16.968173]  which belongs to the cache kmalloc-64 of size 64
[   16.968806] The buggy address is located 0 bytes to the right of
[   16.968806]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.969330] 
[   16.969482] The buggy address belongs to the physical page:
[   16.969768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.970113] flags: 0x200000000000000(node=0|zone=2)
[   16.970339] page_type: f5(slab)
[   16.970532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.970836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.971055] page dumped because: kasan: bad access detected
[   16.971220] 
[   16.971288] Memory state around the buggy address:
[   16.971506]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.971855]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.972221] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.972626]                                      ^
[   16.972864]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.973172]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.973534] ==================================================================
[   16.609381] ==================================================================
[   16.609827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.610179] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.610628] 
[   16.610739] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.610782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.610794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.610815] Call Trace:
[   16.610830]  <TASK>
[   16.610882]  dump_stack_lvl+0x73/0xb0
[   16.610912]  print_report+0xd1/0x610
[   16.610935]  ? __virt_addr_valid+0x1db/0x2d0
[   16.610959]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.611013]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.611040]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.611063]  kasan_report+0x141/0x180
[   16.611086]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.611114]  kasan_check_range+0x10c/0x1c0
[   16.611169]  __kasan_check_write+0x18/0x20
[   16.611191]  kasan_atomics_helper+0x18b1/0x5450
[   16.611215]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.611240]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.611267]  ? trace_hardirqs_on+0x37/0xe0
[   16.611325]  ? kasan_atomics+0x152/0x310
[   16.611353]  kasan_atomics+0x1dc/0x310
[   16.611377]  ? __pfx_kasan_atomics+0x10/0x10
[   16.611431]  ? __pfx_kasan_atomics+0x10/0x10
[   16.611460]  kunit_try_run_case+0x1a5/0x480
[   16.611487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.611513]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.611539]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.611603]  ? __kthread_parkme+0x82/0x180
[   16.611651]  ? preempt_count_sub+0x50/0x80
[   16.611723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.611750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.611822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.611850]  kthread+0x337/0x6f0
[   16.611871]  ? trace_preempt_on+0x20/0xc0
[   16.611895]  ? __pfx_kthread+0x10/0x10
[   16.611917]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.611939]  ? calculate_sigpending+0x7b/0xa0
[   16.611965]  ? __pfx_kthread+0x10/0x10
[   16.611988]  ret_from_fork+0x116/0x1d0
[   16.612007]  ? __pfx_kthread+0x10/0x10
[   16.612030]  ret_from_fork_asm+0x1a/0x30
[   16.612066]  </TASK>
[   16.612077] 
[   16.620252] Allocated by task 282:
[   16.620484]  kasan_save_stack+0x45/0x70
[   16.620699]  kasan_save_track+0x18/0x40
[   16.620896]  kasan_save_alloc_info+0x3b/0x50
[   16.621105]  __kasan_kmalloc+0xb7/0xc0
[   16.621253]  __kmalloc_cache_noprof+0x189/0x420
[   16.621497]  kasan_atomics+0x95/0x310
[   16.621733]  kunit_try_run_case+0x1a5/0x480
[   16.621949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.622212]  kthread+0x337/0x6f0
[   16.622412]  ret_from_fork+0x116/0x1d0
[   16.622626]  ret_from_fork_asm+0x1a/0x30
[   16.622785] 
[   16.622857] The buggy address belongs to the object at ffff888102a5fe80
[   16.622857]  which belongs to the cache kmalloc-64 of size 64
[   16.623255] The buggy address is located 0 bytes to the right of
[   16.623255]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.623845] 
[   16.623944] The buggy address belongs to the physical page:
[   16.624190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.624450] flags: 0x200000000000000(node=0|zone=2)
[   16.624650] page_type: f5(slab)
[   16.624885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.625289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.625642] page dumped because: kasan: bad access detected
[   16.625891] 
[   16.625988] Memory state around the buggy address:
[   16.626243]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.626588]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.626908] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.627216]                                      ^
[   16.627487]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.627809]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.628148] ==================================================================
[   15.697707] ==================================================================
[   15.697951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.698191] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.698474] 
[   15.698610] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.698655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.698668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.698689] Call Trace:
[   15.698707]  <TASK>
[   15.698725]  dump_stack_lvl+0x73/0xb0
[   15.698753]  print_report+0xd1/0x610
[   15.698776]  ? __virt_addr_valid+0x1db/0x2d0
[   15.698800]  ? kasan_atomics_helper+0x565/0x5450
[   15.698823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.698848]  ? kasan_atomics_helper+0x565/0x5450
[   15.698871]  kasan_report+0x141/0x180
[   15.698895]  ? kasan_atomics_helper+0x565/0x5450
[   15.698923]  kasan_check_range+0x10c/0x1c0
[   15.698948]  __kasan_check_write+0x18/0x20
[   15.698969]  kasan_atomics_helper+0x565/0x5450
[   15.698993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.699017]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.699045]  ? trace_hardirqs_on+0x37/0xe0
[   15.699070]  ? kasan_atomics+0x152/0x310
[   15.699098]  kasan_atomics+0x1dc/0x310
[   15.699122]  ? __pfx_kasan_atomics+0x10/0x10
[   15.699146]  ? __pfx_kasan_atomics+0x10/0x10
[   15.699175]  kunit_try_run_case+0x1a5/0x480
[   15.699201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.699226]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.699252]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.699277]  ? __kthread_parkme+0x82/0x180
[   15.699299]  ? preempt_count_sub+0x50/0x80
[   15.699325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.699352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.699378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.699405]  kthread+0x337/0x6f0
[   15.699425]  ? trace_preempt_on+0x20/0xc0
[   15.699449]  ? __pfx_kthread+0x10/0x10
[   15.699471]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.699494]  ? calculate_sigpending+0x7b/0xa0
[   15.699520]  ? __pfx_kthread+0x10/0x10
[   15.699543]  ret_from_fork+0x116/0x1d0
[   15.699574]  ? __pfx_kthread+0x10/0x10
[   15.699596]  ret_from_fork_asm+0x1a/0x30
[   15.699628]  </TASK>
[   15.699639] 
[   15.707637] Allocated by task 282:
[   15.707801]  kasan_save_stack+0x45/0x70
[   15.707948]  kasan_save_track+0x18/0x40
[   15.708089]  kasan_save_alloc_info+0x3b/0x50
[   15.708412]  __kasan_kmalloc+0xb7/0xc0
[   15.708640]  __kmalloc_cache_noprof+0x189/0x420
[   15.709151]  kasan_atomics+0x95/0x310
[   15.709496]  kunit_try_run_case+0x1a5/0x480
[   15.709666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.709861]  kthread+0x337/0x6f0
[   15.710031]  ret_from_fork+0x116/0x1d0
[   15.710221]  ret_from_fork_asm+0x1a/0x30
[   15.710471] 
[   15.710588] The buggy address belongs to the object at ffff888102a5fe80
[   15.710588]  which belongs to the cache kmalloc-64 of size 64
[   15.711064] The buggy address is located 0 bytes to the right of
[   15.711064]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.711524] 
[   15.711685] The buggy address belongs to the physical page:
[   15.711940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.712295] flags: 0x200000000000000(node=0|zone=2)
[   15.712471] page_type: f5(slab)
[   15.712605] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.712840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.713640] page dumped because: kasan: bad access detected
[   15.713941] 
[   15.714039] Memory state around the buggy address:
[   15.714442]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.714778]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.715059] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.715431]                                      ^
[   15.715650]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.715889]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.716111] ==================================================================
[   16.025362] ==================================================================
[   16.025928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   16.026391] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.026863] 
[   16.026995] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.027039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.027052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.027074] Call Trace:
[   16.027086]  <TASK>
[   16.027100]  dump_stack_lvl+0x73/0xb0
[   16.027131]  print_report+0xd1/0x610
[   16.027154]  ? __virt_addr_valid+0x1db/0x2d0
[   16.027178]  ? kasan_atomics_helper+0xde0/0x5450
[   16.027202]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.027228]  ? kasan_atomics_helper+0xde0/0x5450
[   16.027251]  kasan_report+0x141/0x180
[   16.027274]  ? kasan_atomics_helper+0xde0/0x5450
[   16.027302]  kasan_check_range+0x10c/0x1c0
[   16.027327]  __kasan_check_write+0x18/0x20
[   16.027359]  kasan_atomics_helper+0xde0/0x5450
[   16.027385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.027409]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.027448]  ? trace_hardirqs_on+0x37/0xe0
[   16.027473]  ? kasan_atomics+0x152/0x310
[   16.027501]  kasan_atomics+0x1dc/0x310
[   16.027525]  ? __pfx_kasan_atomics+0x10/0x10
[   16.027559]  ? __pfx_kasan_atomics+0x10/0x10
[   16.027587]  kunit_try_run_case+0x1a5/0x480
[   16.027614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.027639]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.027664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.027690]  ? __kthread_parkme+0x82/0x180
[   16.027724]  ? preempt_count_sub+0x50/0x80
[   16.027749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.027775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.027803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.027832]  kthread+0x337/0x6f0
[   16.027852]  ? trace_preempt_on+0x20/0xc0
[   16.027876]  ? __pfx_kthread+0x10/0x10
[   16.027898]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.027922]  ? calculate_sigpending+0x7b/0xa0
[   16.027947]  ? __pfx_kthread+0x10/0x10
[   16.027970]  ret_from_fork+0x116/0x1d0
[   16.027990]  ? __pfx_kthread+0x10/0x10
[   16.028013]  ret_from_fork_asm+0x1a/0x30
[   16.028045]  </TASK>
[   16.028063] 
[   16.036053] Allocated by task 282:
[   16.036242]  kasan_save_stack+0x45/0x70
[   16.036460]  kasan_save_track+0x18/0x40
[   16.036641]  kasan_save_alloc_info+0x3b/0x50
[   16.036861]  __kasan_kmalloc+0xb7/0xc0
[   16.037015]  __kmalloc_cache_noprof+0x189/0x420
[   16.037175]  kasan_atomics+0x95/0x310
[   16.037388]  kunit_try_run_case+0x1a5/0x480
[   16.037615]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.037953]  kthread+0x337/0x6f0
[   16.038075]  ret_from_fork+0x116/0x1d0
[   16.038438]  ret_from_fork_asm+0x1a/0x30
[   16.038654] 
[   16.038755] The buggy address belongs to the object at ffff888102a5fe80
[   16.038755]  which belongs to the cache kmalloc-64 of size 64
[   16.039232] The buggy address is located 0 bytes to the right of
[   16.039232]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.039773] 
[   16.039846] The buggy address belongs to the physical page:
[   16.040020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.040280] flags: 0x200000000000000(node=0|zone=2)
[   16.040519] page_type: f5(slab)
[   16.040713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.041057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.041392] page dumped because: kasan: bad access detected
[   16.041665] 
[   16.041782] Memory state around the buggy address:
[   16.041940]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.042157]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.042465] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.042810]                                      ^
[   16.043049]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.043370]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.043693] ==================================================================
[   16.205062] ==================================================================
[   16.205443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   16.205918] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.206542] 
[   16.206800] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.206968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.206983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.207018] Call Trace:
[   16.207036]  <TASK>
[   16.207052]  dump_stack_lvl+0x73/0xb0
[   16.207082]  print_report+0xd1/0x610
[   16.207106]  ? __virt_addr_valid+0x1db/0x2d0
[   16.207130]  ? kasan_atomics_helper+0x1148/0x5450
[   16.207153]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.207178]  ? kasan_atomics_helper+0x1148/0x5450
[   16.207202]  kasan_report+0x141/0x180
[   16.207225]  ? kasan_atomics_helper+0x1148/0x5450
[   16.207253]  kasan_check_range+0x10c/0x1c0
[   16.207278]  __kasan_check_write+0x18/0x20
[   16.207298]  kasan_atomics_helper+0x1148/0x5450
[   16.207323]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.207347]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.207373]  ? trace_hardirqs_on+0x37/0xe0
[   16.207420]  ? kasan_atomics+0x152/0x310
[   16.207448]  kasan_atomics+0x1dc/0x310
[   16.207472]  ? __pfx_kasan_atomics+0x10/0x10
[   16.207497]  ? __pfx_kasan_atomics+0x10/0x10
[   16.207526]  kunit_try_run_case+0x1a5/0x480
[   16.207563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.207588]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.207614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.207640]  ? __kthread_parkme+0x82/0x180
[   16.207662]  ? preempt_count_sub+0x50/0x80
[   16.207687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.207713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.207739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.207767]  kthread+0x337/0x6f0
[   16.207787]  ? trace_preempt_on+0x20/0xc0
[   16.207811]  ? __pfx_kthread+0x10/0x10
[   16.207833]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.207856]  ? calculate_sigpending+0x7b/0xa0
[   16.207882]  ? __pfx_kthread+0x10/0x10
[   16.207905]  ret_from_fork+0x116/0x1d0
[   16.207926]  ? __pfx_kthread+0x10/0x10
[   16.207948]  ret_from_fork_asm+0x1a/0x30
[   16.207980]  </TASK>
[   16.207991] 
[   16.218864] Allocated by task 282:
[   16.219242]  kasan_save_stack+0x45/0x70
[   16.219573]  kasan_save_track+0x18/0x40
[   16.219869]  kasan_save_alloc_info+0x3b/0x50
[   16.220184]  __kasan_kmalloc+0xb7/0xc0
[   16.220494]  __kmalloc_cache_noprof+0x189/0x420
[   16.220828]  kasan_atomics+0x95/0x310
[   16.221016]  kunit_try_run_case+0x1a5/0x480
[   16.221207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.221668]  kthread+0x337/0x6f0
[   16.221924]  ret_from_fork+0x116/0x1d0
[   16.222198]  ret_from_fork_asm+0x1a/0x30
[   16.222538] 
[   16.222761] The buggy address belongs to the object at ffff888102a5fe80
[   16.222761]  which belongs to the cache kmalloc-64 of size 64
[   16.223333] The buggy address is located 0 bytes to the right of
[   16.223333]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.224099] 
[   16.224345] The buggy address belongs to the physical page:
[   16.224651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.225089] flags: 0x200000000000000(node=0|zone=2)
[   16.225419] page_type: f5(slab)
[   16.225719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.226051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.226367] page dumped because: kasan: bad access detected
[   16.226854] 
[   16.227056] Memory state around the buggy address:
[   16.227347]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.227822]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.228251] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.228709]                                      ^
[   16.228926]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.229220]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.229769] ==================================================================
[   16.782522] ==================================================================
[   16.782861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.783325] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.783673] 
[   16.783787] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.783830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.783844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.783865] Call Trace:
[   16.783880]  <TASK>
[   16.783897]  dump_stack_lvl+0x73/0xb0
[   16.783924]  print_report+0xd1/0x610
[   16.783947]  ? __virt_addr_valid+0x1db/0x2d0
[   16.783971]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.783994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.784019]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.784042]  kasan_report+0x141/0x180
[   16.784070]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.784098]  kasan_check_range+0x10c/0x1c0
[   16.784123]  __kasan_check_write+0x18/0x20
[   16.784144]  kasan_atomics_helper+0x1e12/0x5450
[   16.784168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.784193]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.784219]  ? trace_hardirqs_on+0x37/0xe0
[   16.784241]  ? kasan_atomics+0x152/0x310
[   16.784269]  kasan_atomics+0x1dc/0x310
[   16.784293]  ? __pfx_kasan_atomics+0x10/0x10
[   16.784318]  ? __pfx_kasan_atomics+0x10/0x10
[   16.784346]  kunit_try_run_case+0x1a5/0x480
[   16.784373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.784398]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.784435]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.784460]  ? __kthread_parkme+0x82/0x180
[   16.784483]  ? preempt_count_sub+0x50/0x80
[   16.784508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.784534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.784570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.784597]  kthread+0x337/0x6f0
[   16.784618]  ? trace_preempt_on+0x20/0xc0
[   16.784642]  ? __pfx_kthread+0x10/0x10
[   16.784664]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.784687]  ? calculate_sigpending+0x7b/0xa0
[   16.784712]  ? __pfx_kthread+0x10/0x10
[   16.784735]  ret_from_fork+0x116/0x1d0
[   16.784756]  ? __pfx_kthread+0x10/0x10
[   16.784777]  ret_from_fork_asm+0x1a/0x30
[   16.784808]  </TASK>
[   16.784819] 
[   16.795178] Allocated by task 282:
[   16.795492]  kasan_save_stack+0x45/0x70
[   16.795859]  kasan_save_track+0x18/0x40
[   16.796216]  kasan_save_alloc_info+0x3b/0x50
[   16.796635]  __kasan_kmalloc+0xb7/0xc0
[   16.796990]  __kmalloc_cache_noprof+0x189/0x420
[   16.797392]  kasan_atomics+0x95/0x310
[   16.797751]  kunit_try_run_case+0x1a5/0x480
[   16.798131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.798627]  kthread+0x337/0x6f0
[   16.798927]  ret_from_fork+0x116/0x1d0
[   16.799271]  ret_from_fork_asm+0x1a/0x30
[   16.799668] 
[   16.799833] The buggy address belongs to the object at ffff888102a5fe80
[   16.799833]  which belongs to the cache kmalloc-64 of size 64
[   16.800877] The buggy address is located 0 bytes to the right of
[   16.800877]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.801940] 
[   16.802104] The buggy address belongs to the physical page:
[   16.802599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.803268] flags: 0x200000000000000(node=0|zone=2)
[   16.803769] page_type: f5(slab)
[   16.804077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.804916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.805318] page dumped because: kasan: bad access detected
[   16.805538] 
[   16.805709] Memory state around the buggy address:
[   16.806125]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.806818]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.807459] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.808068]                                      ^
[   16.808257]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.808505]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.809101] ==================================================================
[   16.810084] ==================================================================
[   16.811248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.812000] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.812361] 
[   16.812483] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.812528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.812542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.812574] Call Trace:
[   16.812589]  <TASK>
[   16.812604]  dump_stack_lvl+0x73/0xb0
[   16.812631]  print_report+0xd1/0x610
[   16.812654]  ? __virt_addr_valid+0x1db/0x2d0
[   16.812677]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.812700]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.812725]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.812749]  kasan_report+0x141/0x180
[   16.812772]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.812800]  kasan_check_range+0x10c/0x1c0
[   16.812825]  __kasan_check_write+0x18/0x20
[   16.812846]  kasan_atomics_helper+0x1eaa/0x5450
[   16.812870]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.812895]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.812920]  ? trace_hardirqs_on+0x37/0xe0
[   16.812944]  ? kasan_atomics+0x152/0x310
[   16.812971]  kasan_atomics+0x1dc/0x310
[   16.812995]  ? __pfx_kasan_atomics+0x10/0x10
[   16.813020]  ? __pfx_kasan_atomics+0x10/0x10
[   16.813048]  kunit_try_run_case+0x1a5/0x480
[   16.813073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.813098]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.813124]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.813149]  ? __kthread_parkme+0x82/0x180
[   16.813172]  ? preempt_count_sub+0x50/0x80
[   16.813196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.813223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.813249]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.813276]  kthread+0x337/0x6f0
[   16.813296]  ? trace_preempt_on+0x20/0xc0
[   16.813319]  ? __pfx_kthread+0x10/0x10
[   16.813401]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.813435]  ? calculate_sigpending+0x7b/0xa0
[   16.813460]  ? __pfx_kthread+0x10/0x10
[   16.813483]  ret_from_fork+0x116/0x1d0
[   16.813505]  ? __pfx_kthread+0x10/0x10
[   16.813526]  ret_from_fork_asm+0x1a/0x30
[   16.813568]  </TASK>
[   16.813579] 
[   16.822669] Allocated by task 282:
[   16.822816]  kasan_save_stack+0x45/0x70
[   16.823004]  kasan_save_track+0x18/0x40
[   16.823187]  kasan_save_alloc_info+0x3b/0x50
[   16.823378]  __kasan_kmalloc+0xb7/0xc0
[   16.823566]  __kmalloc_cache_noprof+0x189/0x420
[   16.823755]  kasan_atomics+0x95/0x310
[   16.823945]  kunit_try_run_case+0x1a5/0x480
[   16.824129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.824353]  kthread+0x337/0x6f0
[   16.824611]  ret_from_fork+0x116/0x1d0
[   16.824786]  ret_from_fork_asm+0x1a/0x30
[   16.824956] 
[   16.825057] The buggy address belongs to the object at ffff888102a5fe80
[   16.825057]  which belongs to the cache kmalloc-64 of size 64
[   16.825429] The buggy address is located 0 bytes to the right of
[   16.825429]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.825930] 
[   16.826025] The buggy address belongs to the physical page:
[   16.826394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.826714] flags: 0x200000000000000(node=0|zone=2)
[   16.826885] page_type: f5(slab)
[   16.827005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.827293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.827725] page dumped because: kasan: bad access detected
[   16.827972] 
[   16.828045] Memory state around the buggy address:
[   16.828267]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.828566]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.828840] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.829051]                                      ^
[   16.829220]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.831261]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.831493] ==================================================================
[   16.394899] ==================================================================
[   16.395681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   16.396226] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.396763] 
[   16.396961] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.397008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.397021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.397042] Call Trace:
[   16.397058]  <TASK>
[   16.397074]  dump_stack_lvl+0x73/0xb0
[   16.397103]  print_report+0xd1/0x610
[   16.397146]  ? __virt_addr_valid+0x1db/0x2d0
[   16.397170]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.397193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.397218]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.397242]  kasan_report+0x141/0x180
[   16.397265]  ? kasan_atomics_helper+0x4eae/0x5450
[   16.397294]  __asan_report_load8_noabort+0x18/0x20
[   16.397320]  kasan_atomics_helper+0x4eae/0x5450
[   16.397345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.397369]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.397416]  ? trace_hardirqs_on+0x37/0xe0
[   16.397441]  ? kasan_atomics+0x152/0x310
[   16.397469]  kasan_atomics+0x1dc/0x310
[   16.397492]  ? __pfx_kasan_atomics+0x10/0x10
[   16.397517]  ? __pfx_kasan_atomics+0x10/0x10
[   16.397545]  kunit_try_run_case+0x1a5/0x480
[   16.397581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.397605]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.397631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.397656]  ? __kthread_parkme+0x82/0x180
[   16.397678]  ? preempt_count_sub+0x50/0x80
[   16.397703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.397729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.397755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.397783]  kthread+0x337/0x6f0
[   16.397804]  ? trace_preempt_on+0x20/0xc0
[   16.397827]  ? __pfx_kthread+0x10/0x10
[   16.397849]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.397872]  ? calculate_sigpending+0x7b/0xa0
[   16.397898]  ? __pfx_kthread+0x10/0x10
[   16.397920]  ret_from_fork+0x116/0x1d0
[   16.397940]  ? __pfx_kthread+0x10/0x10
[   16.397961]  ret_from_fork_asm+0x1a/0x30
[   16.397993]  </TASK>
[   16.398004] 
[   16.409694] Allocated by task 282:
[   16.409831]  kasan_save_stack+0x45/0x70
[   16.409979]  kasan_save_track+0x18/0x40
[   16.410117]  kasan_save_alloc_info+0x3b/0x50
[   16.410267]  __kasan_kmalloc+0xb7/0xc0
[   16.410425]  __kmalloc_cache_noprof+0x189/0x420
[   16.410939]  kasan_atomics+0x95/0x310
[   16.411267]  kunit_try_run_case+0x1a5/0x480
[   16.411703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.412194]  kthread+0x337/0x6f0
[   16.412529]  ret_from_fork+0x116/0x1d0
[   16.412890]  ret_from_fork_asm+0x1a/0x30
[   16.413261] 
[   16.413459] The buggy address belongs to the object at ffff888102a5fe80
[   16.413459]  which belongs to the cache kmalloc-64 of size 64
[   16.414529] The buggy address is located 0 bytes to the right of
[   16.414529]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.414966] 
[   16.415040] The buggy address belongs to the physical page:
[   16.415212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.415642] flags: 0x200000000000000(node=0|zone=2)
[   16.416085] page_type: f5(slab)
[   16.416413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.417085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.417761] page dumped because: kasan: bad access detected
[   16.418244] 
[   16.418443] Memory state around the buggy address:
[   16.418704]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.418927]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.419149] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.419368]                                      ^
[   16.419917]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.420571]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.421185] ==================================================================
[   16.667841] ==================================================================
[   16.668915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.669581] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.669840] 
[   16.669929] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.670001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.670015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.670038] Call Trace:
[   16.670054]  <TASK>
[   16.670069]  dump_stack_lvl+0x73/0xb0
[   16.670117]  print_report+0xd1/0x610
[   16.670141]  ? __virt_addr_valid+0x1db/0x2d0
[   16.670164]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.670187]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.670212]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.670236]  kasan_report+0x141/0x180
[   16.670259]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.670287]  kasan_check_range+0x10c/0x1c0
[   16.670313]  __kasan_check_write+0x18/0x20
[   16.670333]  kasan_atomics_helper+0x1a7f/0x5450
[   16.670358]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.670382]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.670407]  ? trace_hardirqs_on+0x37/0xe0
[   16.670432]  ? kasan_atomics+0x152/0x310
[   16.670459]  kasan_atomics+0x1dc/0x310
[   16.670483]  ? __pfx_kasan_atomics+0x10/0x10
[   16.670508]  ? __pfx_kasan_atomics+0x10/0x10
[   16.670537]  kunit_try_run_case+0x1a5/0x480
[   16.670573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.670628]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.670654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.670679]  ? __kthread_parkme+0x82/0x180
[   16.670702]  ? preempt_count_sub+0x50/0x80
[   16.670728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.670756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.670784]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.670812]  kthread+0x337/0x6f0
[   16.670832]  ? trace_preempt_on+0x20/0xc0
[   16.670856]  ? __pfx_kthread+0x10/0x10
[   16.670878]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.670902]  ? calculate_sigpending+0x7b/0xa0
[   16.670927]  ? __pfx_kthread+0x10/0x10
[   16.670949]  ret_from_fork+0x116/0x1d0
[   16.670971]  ? __pfx_kthread+0x10/0x10
[   16.670993]  ret_from_fork_asm+0x1a/0x30
[   16.671026]  </TASK>
[   16.671037] 
[   16.682105] Allocated by task 282:
[   16.682283]  kasan_save_stack+0x45/0x70
[   16.682505]  kasan_save_track+0x18/0x40
[   16.682672]  kasan_save_alloc_info+0x3b/0x50
[   16.682847]  __kasan_kmalloc+0xb7/0xc0
[   16.682976]  __kmalloc_cache_noprof+0x189/0x420
[   16.683200]  kasan_atomics+0x95/0x310
[   16.683390]  kunit_try_run_case+0x1a5/0x480
[   16.683614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.683836]  kthread+0x337/0x6f0
[   16.684009]  ret_from_fork+0x116/0x1d0
[   16.684174]  ret_from_fork_asm+0x1a/0x30
[   16.684341] 
[   16.684424] The buggy address belongs to the object at ffff888102a5fe80
[   16.684424]  which belongs to the cache kmalloc-64 of size 64
[   16.684921] The buggy address is located 0 bytes to the right of
[   16.684921]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.685286] 
[   16.685359] The buggy address belongs to the physical page:
[   16.685561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.685910] flags: 0x200000000000000(node=0|zone=2)
[   16.686134] page_type: f5(slab)
[   16.686298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.686686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.686909] page dumped because: kasan: bad access detected
[   16.687122] 
[   16.687215] Memory state around the buggy address:
[   16.687459]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.687781]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.688080] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.688360]                                      ^
[   16.688584]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.688882]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.689152] ==================================================================
[   15.531075] ==================================================================
[   15.532778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.533027] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.533252] 
[   15.533338] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.533382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.533402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.533422] Call Trace:
[   15.533439]  <TASK>
[   15.533454]  dump_stack_lvl+0x73/0xb0
[   15.533482]  print_report+0xd1/0x610
[   15.533506]  ? __virt_addr_valid+0x1db/0x2d0
[   15.533529]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.533562]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.533587]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.533611]  kasan_report+0x141/0x180
[   15.533634]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.533661]  __asan_report_store4_noabort+0x1b/0x30
[   15.533687]  kasan_atomics_helper+0x4ba2/0x5450
[   15.533711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.533734]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.533758]  ? trace_hardirqs_on+0x37/0xe0
[   15.533781]  ? kasan_atomics+0x152/0x310
[   15.533807]  kasan_atomics+0x1dc/0x310
[   15.533829]  ? __pfx_kasan_atomics+0x10/0x10
[   15.533853]  ? __pfx_kasan_atomics+0x10/0x10
[   15.533881]  kunit_try_run_case+0x1a5/0x480
[   15.533906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.533929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.533954]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.533980]  ? __kthread_parkme+0x82/0x180
[   15.534001]  ? preempt_count_sub+0x50/0x80
[   15.534025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.534050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.534076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.534102]  kthread+0x337/0x6f0
[   15.534121]  ? trace_preempt_on+0x20/0xc0
[   15.534143]  ? __pfx_kthread+0x10/0x10
[   15.534164]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.534187]  ? calculate_sigpending+0x7b/0xa0
[   15.534211]  ? __pfx_kthread+0x10/0x10
[   15.534233]  ret_from_fork+0x116/0x1d0
[   15.534252]  ? __pfx_kthread+0x10/0x10
[   15.534272]  ret_from_fork_asm+0x1a/0x30
[   15.534303]  </TASK>
[   15.534313] 
[   15.545231] Allocated by task 282:
[   15.545400]  kasan_save_stack+0x45/0x70
[   15.545660]  kasan_save_track+0x18/0x40
[   15.545802]  kasan_save_alloc_info+0x3b/0x50
[   15.545952]  __kasan_kmalloc+0xb7/0xc0
[   15.546138]  __kmalloc_cache_noprof+0x189/0x420
[   15.546364]  kasan_atomics+0x95/0x310
[   15.546560]  kunit_try_run_case+0x1a5/0x480
[   15.547067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.547397]  kthread+0x337/0x6f0
[   15.547576]  ret_from_fork+0x116/0x1d0
[   15.547712]  ret_from_fork_asm+0x1a/0x30
[   15.547896] 
[   15.547997] The buggy address belongs to the object at ffff888102a5fe80
[   15.547997]  which belongs to the cache kmalloc-64 of size 64
[   15.548619] The buggy address is located 0 bytes to the right of
[   15.548619]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.549123] 
[   15.549195] The buggy address belongs to the physical page:
[   15.549626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.549901] flags: 0x200000000000000(node=0|zone=2)
[   15.550065] page_type: f5(slab)
[   15.550211] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.550542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.550920] page dumped because: kasan: bad access detected
[   15.551147] 
[   15.551216] Memory state around the buggy address:
[   15.551369]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.551756]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.552177] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.552762]                                      ^
[   15.552993]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.553314]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.553644] ==================================================================
[   16.162909] ==================================================================
[   16.163477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   16.163876] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.164318] 
[   16.164480] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.164526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.164539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.164571] Call Trace:
[   16.164587]  <TASK>
[   16.164601]  dump_stack_lvl+0x73/0xb0
[   16.164630]  print_report+0xd1/0x610
[   16.164653]  ? __virt_addr_valid+0x1db/0x2d0
[   16.164677]  ? kasan_atomics_helper+0x1079/0x5450
[   16.164699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.164725]  ? kasan_atomics_helper+0x1079/0x5450
[   16.164759]  kasan_report+0x141/0x180
[   16.164782]  ? kasan_atomics_helper+0x1079/0x5450
[   16.164810]  kasan_check_range+0x10c/0x1c0
[   16.164847]  __kasan_check_write+0x18/0x20
[   16.164868]  kasan_atomics_helper+0x1079/0x5450
[   16.164893]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.164917]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.164943]  ? trace_hardirqs_on+0x37/0xe0
[   16.164966]  ? kasan_atomics+0x152/0x310
[   16.164994]  kasan_atomics+0x1dc/0x310
[   16.165018]  ? __pfx_kasan_atomics+0x10/0x10
[   16.165043]  ? __pfx_kasan_atomics+0x10/0x10
[   16.165071]  kunit_try_run_case+0x1a5/0x480
[   16.165096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.165121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.165146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.165172]  ? __kthread_parkme+0x82/0x180
[   16.165194]  ? preempt_count_sub+0x50/0x80
[   16.165219]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.165245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.165280]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.165307]  kthread+0x337/0x6f0
[   16.165328]  ? trace_preempt_on+0x20/0xc0
[   16.165370]  ? __pfx_kthread+0x10/0x10
[   16.165392]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.165425]  ? calculate_sigpending+0x7b/0xa0
[   16.165461]  ? __pfx_kthread+0x10/0x10
[   16.165484]  ret_from_fork+0x116/0x1d0
[   16.165504]  ? __pfx_kthread+0x10/0x10
[   16.165526]  ret_from_fork_asm+0x1a/0x30
[   16.165568]  </TASK>
[   16.165579] 
[   16.173406] Allocated by task 282:
[   16.173606]  kasan_save_stack+0x45/0x70
[   16.173797]  kasan_save_track+0x18/0x40
[   16.173937]  kasan_save_alloc_info+0x3b/0x50
[   16.174168]  __kasan_kmalloc+0xb7/0xc0
[   16.174357]  __kmalloc_cache_noprof+0x189/0x420
[   16.174616]  kasan_atomics+0x95/0x310
[   16.174759]  kunit_try_run_case+0x1a5/0x480
[   16.174968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.175174]  kthread+0x337/0x6f0
[   16.175296]  ret_from_fork+0x116/0x1d0
[   16.175431]  ret_from_fork_asm+0x1a/0x30
[   16.175661] 
[   16.175778] The buggy address belongs to the object at ffff888102a5fe80
[   16.175778]  which belongs to the cache kmalloc-64 of size 64
[   16.176353] The buggy address is located 0 bytes to the right of
[   16.176353]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.176805] 
[   16.176878] The buggy address belongs to the physical page:
[   16.177045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.177346] flags: 0x200000000000000(node=0|zone=2)
[   16.177662] page_type: f5(slab)
[   16.177875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.178353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.178782] page dumped because: kasan: bad access detected
[   16.179051] 
[   16.179144] Memory state around the buggy address:
[   16.179339]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.179703]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.179953] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.180164]                                      ^
[   16.180360]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.180802]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.181146] ==================================================================
[   16.831965] ==================================================================
[   16.832380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.832770] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.833078] 
[   16.833174] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.833219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.833233] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.833255] Call Trace:
[   16.833271]  <TASK>
[   16.833285]  dump_stack_lvl+0x73/0xb0
[   16.833314]  print_report+0xd1/0x610
[   16.833339]  ? __virt_addr_valid+0x1db/0x2d0
[   16.833362]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.833385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.833440]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.833467]  kasan_report+0x141/0x180
[   16.833491]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.833520]  kasan_check_range+0x10c/0x1c0
[   16.833545]  __kasan_check_write+0x18/0x20
[   16.833612]  kasan_atomics_helper+0x1f43/0x5450
[   16.833635]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.833660]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.833686]  ? trace_hardirqs_on+0x37/0xe0
[   16.833711]  ? kasan_atomics+0x152/0x310
[   16.833739]  kasan_atomics+0x1dc/0x310
[   16.833763]  ? __pfx_kasan_atomics+0x10/0x10
[   16.833788]  ? __pfx_kasan_atomics+0x10/0x10
[   16.833816]  kunit_try_run_case+0x1a5/0x480
[   16.833842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.833867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.833892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.833918]  ? __kthread_parkme+0x82/0x180
[   16.833940]  ? preempt_count_sub+0x50/0x80
[   16.833965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.833991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.834017]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.834044]  kthread+0x337/0x6f0
[   16.834065]  ? trace_preempt_on+0x20/0xc0
[   16.834088]  ? __pfx_kthread+0x10/0x10
[   16.834109]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.834133]  ? calculate_sigpending+0x7b/0xa0
[   16.834159]  ? __pfx_kthread+0x10/0x10
[   16.834182]  ret_from_fork+0x116/0x1d0
[   16.834202]  ? __pfx_kthread+0x10/0x10
[   16.835278]  ret_from_fork_asm+0x1a/0x30
[   16.835321]  </TASK>
[   16.835338] 
[   16.847962] Allocated by task 282:
[   16.848103]  kasan_save_stack+0x45/0x70
[   16.848253]  kasan_save_track+0x18/0x40
[   16.848544]  kasan_save_alloc_info+0x3b/0x50
[   16.849201]  __kasan_kmalloc+0xb7/0xc0
[   16.849685]  __kmalloc_cache_noprof+0x189/0x420
[   16.850185]  kasan_atomics+0x95/0x310
[   16.850647]  kunit_try_run_case+0x1a5/0x480
[   16.851120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.851390]  kthread+0x337/0x6f0
[   16.851874]  ret_from_fork+0x116/0x1d0
[   16.852191]  ret_from_fork_asm+0x1a/0x30
[   16.852337] 
[   16.852477] The buggy address belongs to the object at ffff888102a5fe80
[   16.852477]  which belongs to the cache kmalloc-64 of size 64
[   16.853748] The buggy address is located 0 bytes to the right of
[   16.853748]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.854127] 
[   16.854202] The buggy address belongs to the physical page:
[   16.854378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.855419] flags: 0x200000000000000(node=0|zone=2)
[   16.855955] page_type: f5(slab)
[   16.856378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.857154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.857777] page dumped because: kasan: bad access detected
[   16.857959] 
[   16.858033] Memory state around the buggy address:
[   16.858192]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.858436]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.859108] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.859750]                                      ^
[   16.860190]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.860853]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.861486] ==================================================================
[   16.974144] ==================================================================
[   16.974567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.974890] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.975111] 
[   16.975192] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.975235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.975248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.975270] Call Trace:
[   16.975283]  <TASK>
[   16.975298]  dump_stack_lvl+0x73/0xb0
[   16.975324]  print_report+0xd1/0x610
[   16.975347]  ? __virt_addr_valid+0x1db/0x2d0
[   16.975370]  ? kasan_atomics_helper+0x218a/0x5450
[   16.975436]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.975461]  ? kasan_atomics_helper+0x218a/0x5450
[   16.975484]  kasan_report+0x141/0x180
[   16.975508]  ? kasan_atomics_helper+0x218a/0x5450
[   16.975536]  kasan_check_range+0x10c/0x1c0
[   16.975588]  __kasan_check_write+0x18/0x20
[   16.975623]  kasan_atomics_helper+0x218a/0x5450
[   16.975647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.975671]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.975697]  ? trace_hardirqs_on+0x37/0xe0
[   16.975721]  ? kasan_atomics+0x152/0x310
[   16.975748]  kasan_atomics+0x1dc/0x310
[   16.975773]  ? __pfx_kasan_atomics+0x10/0x10
[   16.975798]  ? __pfx_kasan_atomics+0x10/0x10
[   16.975826]  kunit_try_run_case+0x1a5/0x480
[   16.975852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.975876]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.975902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.975945]  ? __kthread_parkme+0x82/0x180
[   16.975967]  ? preempt_count_sub+0x50/0x80
[   16.975992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.976019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.976044]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.976078]  kthread+0x337/0x6f0
[   16.976098]  ? trace_preempt_on+0x20/0xc0
[   16.976136]  ? __pfx_kthread+0x10/0x10
[   16.976158]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.976182]  ? calculate_sigpending+0x7b/0xa0
[   16.976208]  ? __pfx_kthread+0x10/0x10
[   16.976231]  ret_from_fork+0x116/0x1d0
[   16.976251]  ? __pfx_kthread+0x10/0x10
[   16.976288]  ret_from_fork_asm+0x1a/0x30
[   16.976333]  </TASK>
[   16.976344] 
[   16.984188] Allocated by task 282:
[   16.984370]  kasan_save_stack+0x45/0x70
[   16.984649]  kasan_save_track+0x18/0x40
[   16.984861]  kasan_save_alloc_info+0x3b/0x50
[   16.985095]  __kasan_kmalloc+0xb7/0xc0
[   16.985288]  __kmalloc_cache_noprof+0x189/0x420
[   16.985534]  kasan_atomics+0x95/0x310
[   16.985686]  kunit_try_run_case+0x1a5/0x480
[   16.985895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.986164]  kthread+0x337/0x6f0
[   16.986583]  ret_from_fork+0x116/0x1d0
[   16.986737]  ret_from_fork_asm+0x1a/0x30
[   16.986965] 
[   16.987062] The buggy address belongs to the object at ffff888102a5fe80
[   16.987062]  which belongs to the cache kmalloc-64 of size 64
[   16.987622] The buggy address is located 0 bytes to the right of
[   16.987622]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.988143] 
[   16.988259] The buggy address belongs to the physical page:
[   16.988492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.988869] flags: 0x200000000000000(node=0|zone=2)
[   16.989092] page_type: f5(slab)
[   16.989273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.989646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.989985] page dumped because: kasan: bad access detected
[   16.990233] 
[   16.990311] Memory state around the buggy address:
[   16.990558]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.990876]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.991263] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.991641]                                      ^
[   16.991868]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.992189]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.992528] ==================================================================
[   16.590928] ==================================================================
[   16.591741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.592097] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.592400] 
[   16.592577] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.592623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.592636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.592659] Call Trace:
[   16.592676]  <TASK>
[   16.592692]  dump_stack_lvl+0x73/0xb0
[   16.592720]  print_report+0xd1/0x610
[   16.592744]  ? __virt_addr_valid+0x1db/0x2d0
[   16.592767]  ? kasan_atomics_helper+0x1818/0x5450
[   16.592791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.592816]  ? kasan_atomics_helper+0x1818/0x5450
[   16.592840]  kasan_report+0x141/0x180
[   16.592864]  ? kasan_atomics_helper+0x1818/0x5450
[   16.592892]  kasan_check_range+0x10c/0x1c0
[   16.592918]  __kasan_check_write+0x18/0x20
[   16.592939]  kasan_atomics_helper+0x1818/0x5450
[   16.592964]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.592989]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.593015]  ? trace_hardirqs_on+0x37/0xe0
[   16.593039]  ? kasan_atomics+0x152/0x310
[   16.593068]  kasan_atomics+0x1dc/0x310
[   16.593092]  ? __pfx_kasan_atomics+0x10/0x10
[   16.593117]  ? __pfx_kasan_atomics+0x10/0x10
[   16.593147]  kunit_try_run_case+0x1a5/0x480
[   16.593173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.593198]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.593224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.593250]  ? __kthread_parkme+0x82/0x180
[   16.593272]  ? preempt_count_sub+0x50/0x80
[   16.593297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.593323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.593350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.593378]  kthread+0x337/0x6f0
[   16.593398]  ? trace_preempt_on+0x20/0xc0
[   16.593421]  ? __pfx_kthread+0x10/0x10
[   16.593443]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.593466]  ? calculate_sigpending+0x7b/0xa0
[   16.593503]  ? __pfx_kthread+0x10/0x10
[   16.593525]  ret_from_fork+0x116/0x1d0
[   16.593547]  ? __pfx_kthread+0x10/0x10
[   16.593579]  ret_from_fork_asm+0x1a/0x30
[   16.593612]  </TASK>
[   16.593623] 
[   16.601137] Allocated by task 282:
[   16.601337]  kasan_save_stack+0x45/0x70
[   16.601618]  kasan_save_track+0x18/0x40
[   16.601849]  kasan_save_alloc_info+0x3b/0x50
[   16.602020]  __kasan_kmalloc+0xb7/0xc0
[   16.602150]  __kmalloc_cache_noprof+0x189/0x420
[   16.602303]  kasan_atomics+0x95/0x310
[   16.602463]  kunit_try_run_case+0x1a5/0x480
[   16.602652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.602909]  kthread+0x337/0x6f0
[   16.603142]  ret_from_fork+0x116/0x1d0
[   16.603337]  ret_from_fork_asm+0x1a/0x30
[   16.603667] 
[   16.603816] The buggy address belongs to the object at ffff888102a5fe80
[   16.603816]  which belongs to the cache kmalloc-64 of size 64
[   16.604377] The buggy address is located 0 bytes to the right of
[   16.604377]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.604914] 
[   16.604986] The buggy address belongs to the physical page:
[   16.605156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.605475] flags: 0x200000000000000(node=0|zone=2)
[   16.605782] page_type: f5(slab)
[   16.605954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.606290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.606637] page dumped because: kasan: bad access detected
[   16.606861] 
[   16.606950] Memory state around the buggy address:
[   16.607161]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.607372]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.607722] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.607994]                                      ^
[   16.608153]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.608362]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.608674] ==================================================================
[   15.939899] ==================================================================
[   15.940257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.940821] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.941086] 
[   15.941191] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.941235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.941248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.941270] Call Trace:
[   15.941288]  <TASK>
[   15.941305]  dump_stack_lvl+0x73/0xb0
[   15.941333]  print_report+0xd1/0x610
[   15.941425]  ? __virt_addr_valid+0x1db/0x2d0
[   15.941450]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.941474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.941498]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.941532]  kasan_report+0x141/0x180
[   15.941574]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.941602]  kasan_check_range+0x10c/0x1c0
[   15.941627]  __kasan_check_write+0x18/0x20
[   15.941648]  kasan_atomics_helper+0xb6a/0x5450
[   15.941673]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.941698]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.941724]  ? trace_hardirqs_on+0x37/0xe0
[   15.941749]  ? kasan_atomics+0x152/0x310
[   15.941777]  kasan_atomics+0x1dc/0x310
[   15.941811]  ? __pfx_kasan_atomics+0x10/0x10
[   15.941837]  ? __pfx_kasan_atomics+0x10/0x10
[   15.941876]  kunit_try_run_case+0x1a5/0x480
[   15.941903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.941928]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.941953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.941979]  ? __kthread_parkme+0x82/0x180
[   15.942002]  ? preempt_count_sub+0x50/0x80
[   15.942028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.942054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.942090]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.942118]  kthread+0x337/0x6f0
[   15.942138]  ? trace_preempt_on+0x20/0xc0
[   15.942173]  ? __pfx_kthread+0x10/0x10
[   15.942196]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.942219]  ? calculate_sigpending+0x7b/0xa0
[   15.942287]  ? __pfx_kthread+0x10/0x10
[   15.942311]  ret_from_fork+0x116/0x1d0
[   15.942332]  ? __pfx_kthread+0x10/0x10
[   15.942421]  ret_from_fork_asm+0x1a/0x30
[   15.942455]  </TASK>
[   15.942467] 
[   15.951576] Allocated by task 282:
[   15.951763]  kasan_save_stack+0x45/0x70
[   15.951953]  kasan_save_track+0x18/0x40
[   15.952162]  kasan_save_alloc_info+0x3b/0x50
[   15.952587]  __kasan_kmalloc+0xb7/0xc0
[   15.952789]  __kmalloc_cache_noprof+0x189/0x420
[   15.953073]  kasan_atomics+0x95/0x310
[   15.953214]  kunit_try_run_case+0x1a5/0x480
[   15.953364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.953543]  kthread+0x337/0x6f0
[   15.953942]  ret_from_fork+0x116/0x1d0
[   15.954175]  ret_from_fork_asm+0x1a/0x30
[   15.954647] 
[   15.954742] The buggy address belongs to the object at ffff888102a5fe80
[   15.954742]  which belongs to the cache kmalloc-64 of size 64
[   15.955197] The buggy address is located 0 bytes to the right of
[   15.955197]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.955796] 
[   15.955905] The buggy address belongs to the physical page:
[   15.956436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.956761] flags: 0x200000000000000(node=0|zone=2)
[   15.956929] page_type: f5(slab)
[   15.957095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.957568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.957836] page dumped because: kasan: bad access detected
[   15.958010] 
[   15.958108] Memory state around the buggy address:
[   15.958505]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.958913]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.959209] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.959709]                                      ^
[   15.959927]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.960295]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.960859] ==================================================================
[   16.729722] ==================================================================
[   16.729970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.730214] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.730658] 
[   16.730766] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.730808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.730820] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.730842] Call Trace:
[   16.730855]  <TASK>
[   16.730868]  dump_stack_lvl+0x73/0xb0
[   16.730897]  print_report+0xd1/0x610
[   16.730920]  ? __virt_addr_valid+0x1db/0x2d0
[   16.730943]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.730966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.730991]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.731014]  kasan_report+0x141/0x180
[   16.731038]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.731065]  __asan_report_load8_noabort+0x18/0x20
[   16.731092]  kasan_atomics_helper+0x4f30/0x5450
[   16.731126]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.731151]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.731176]  ? trace_hardirqs_on+0x37/0xe0
[   16.731199]  ? kasan_atomics+0x152/0x310
[   16.731227]  kasan_atomics+0x1dc/0x310
[   16.731251]  ? __pfx_kasan_atomics+0x10/0x10
[   16.731276]  ? __pfx_kasan_atomics+0x10/0x10
[   16.731304]  kunit_try_run_case+0x1a5/0x480
[   16.731329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.731354]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.731379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.731405]  ? __kthread_parkme+0x82/0x180
[   16.731439]  ? preempt_count_sub+0x50/0x80
[   16.731464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.731490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.731517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.731544]  kthread+0x337/0x6f0
[   16.731575]  ? trace_preempt_on+0x20/0xc0
[   16.731598]  ? __pfx_kthread+0x10/0x10
[   16.731620]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.731643]  ? calculate_sigpending+0x7b/0xa0
[   16.731668]  ? __pfx_kthread+0x10/0x10
[   16.731691]  ret_from_fork+0x116/0x1d0
[   16.731712]  ? __pfx_kthread+0x10/0x10
[   16.731733]  ret_from_fork_asm+0x1a/0x30
[   16.731764]  </TASK>
[   16.731775] 
[   16.739076] Allocated by task 282:
[   16.739245]  kasan_save_stack+0x45/0x70
[   16.739390]  kasan_save_track+0x18/0x40
[   16.739613]  kasan_save_alloc_info+0x3b/0x50
[   16.739832]  __kasan_kmalloc+0xb7/0xc0
[   16.740024]  __kmalloc_cache_noprof+0x189/0x420
[   16.740213]  kasan_atomics+0x95/0x310
[   16.740391]  kunit_try_run_case+0x1a5/0x480
[   16.740589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.740798]  kthread+0x337/0x6f0
[   16.740919]  ret_from_fork+0x116/0x1d0
[   16.741053]  ret_from_fork_asm+0x1a/0x30
[   16.741203] 
[   16.741297] The buggy address belongs to the object at ffff888102a5fe80
[   16.741297]  which belongs to the cache kmalloc-64 of size 64
[   16.741842] The buggy address is located 0 bytes to the right of
[   16.741842]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.742368] 
[   16.742495] The buggy address belongs to the physical page:
[   16.742712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.742954] flags: 0x200000000000000(node=0|zone=2)
[   16.743116] page_type: f5(slab)
[   16.743236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.743513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.743854] page dumped because: kasan: bad access detected
[   16.744110] 
[   16.744214] Memory state around the buggy address:
[   16.744433]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.744756]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.745167] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.745419]                                      ^
[   16.745655]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.745912]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.746125] ==================================================================
[   15.665682] ==================================================================
[   15.666619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.667568] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.668063] 
[   15.668154] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.668200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.668213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.668298] Call Trace:
[   15.668341]  <TASK>
[   15.668358]  dump_stack_lvl+0x73/0xb0
[   15.668416]  print_report+0xd1/0x610
[   15.668441]  ? __virt_addr_valid+0x1db/0x2d0
[   15.668478]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.668511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.668546]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.668581]  kasan_report+0x141/0x180
[   15.668604]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.668643]  __asan_report_store4_noabort+0x1b/0x30
[   15.668670]  kasan_atomics_helper+0x4b3a/0x5450
[   15.668694]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.668719]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.668745]  ? trace_hardirqs_on+0x37/0xe0
[   15.668769]  ? kasan_atomics+0x152/0x310
[   15.668797]  kasan_atomics+0x1dc/0x310
[   15.668821]  ? __pfx_kasan_atomics+0x10/0x10
[   15.668846]  ? __pfx_kasan_atomics+0x10/0x10
[   15.668874]  kunit_try_run_case+0x1a5/0x480
[   15.668902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.668926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.668952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.668978]  ? __kthread_parkme+0x82/0x180
[   15.669000]  ? preempt_count_sub+0x50/0x80
[   15.669025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.669051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.669077]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.669104]  kthread+0x337/0x6f0
[   15.669124]  ? trace_preempt_on+0x20/0xc0
[   15.669147]  ? __pfx_kthread+0x10/0x10
[   15.669169]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.669193]  ? calculate_sigpending+0x7b/0xa0
[   15.669218]  ? __pfx_kthread+0x10/0x10
[   15.669273]  ret_from_fork+0x116/0x1d0
[   15.669316]  ? __pfx_kthread+0x10/0x10
[   15.669341]  ret_from_fork_asm+0x1a/0x30
[   15.669374]  </TASK>
[   15.669387] 
[   15.682317] Allocated by task 282:
[   15.682691]  kasan_save_stack+0x45/0x70
[   15.683096]  kasan_save_track+0x18/0x40
[   15.683640]  kasan_save_alloc_info+0x3b/0x50
[   15.684076]  __kasan_kmalloc+0xb7/0xc0
[   15.684257]  __kmalloc_cache_noprof+0x189/0x420
[   15.684773]  kasan_atomics+0x95/0x310
[   15.685129]  kunit_try_run_case+0x1a5/0x480
[   15.685417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.685885]  kthread+0x337/0x6f0
[   15.686022]  ret_from_fork+0x116/0x1d0
[   15.686172]  ret_from_fork_asm+0x1a/0x30
[   15.686609] 
[   15.686774] The buggy address belongs to the object at ffff888102a5fe80
[   15.686774]  which belongs to the cache kmalloc-64 of size 64
[   15.687942] The buggy address is located 0 bytes to the right of
[   15.687942]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.689349] 
[   15.689465] The buggy address belongs to the physical page:
[   15.689999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.690679] flags: 0x200000000000000(node=0|zone=2)
[   15.691113] page_type: f5(slab)
[   15.691590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.691972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.692210] page dumped because: kasan: bad access detected
[   15.692802] 
[   15.692977] Memory state around the buggy address:
[   15.693423]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.694159]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.694890] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.695408]                                      ^
[   15.695914]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.696380]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.697068] ==================================================================
[   16.861956] ==================================================================
[   16.862813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.863517] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.864114] 
[   16.864202] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.864247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.864260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.864282] Call Trace:
[   16.864299]  <TASK>
[   16.864316]  dump_stack_lvl+0x73/0xb0
[   16.864344]  print_report+0xd1/0x610
[   16.864367]  ? __virt_addr_valid+0x1db/0x2d0
[   16.864391]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.864441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.864466]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.864512]  kasan_report+0x141/0x180
[   16.864535]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.864572]  __asan_report_load8_noabort+0x18/0x20
[   16.864599]  kasan_atomics_helper+0x4f71/0x5450
[   16.864623]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.864647]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.864673]  ? trace_hardirqs_on+0x37/0xe0
[   16.864696]  ? kasan_atomics+0x152/0x310
[   16.864724]  kasan_atomics+0x1dc/0x310
[   16.864748]  ? __pfx_kasan_atomics+0x10/0x10
[   16.864774]  ? __pfx_kasan_atomics+0x10/0x10
[   16.864802]  kunit_try_run_case+0x1a5/0x480
[   16.864828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.864852]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.864878]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.864904]  ? __kthread_parkme+0x82/0x180
[   16.864927]  ? preempt_count_sub+0x50/0x80
[   16.864952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.864978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.865004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.865032]  kthread+0x337/0x6f0
[   16.865052]  ? trace_preempt_on+0x20/0xc0
[   16.865076]  ? __pfx_kthread+0x10/0x10
[   16.865098]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.865121]  ? calculate_sigpending+0x7b/0xa0
[   16.865147]  ? __pfx_kthread+0x10/0x10
[   16.865172]  ret_from_fork+0x116/0x1d0
[   16.865194]  ? __pfx_kthread+0x10/0x10
[   16.865215]  ret_from_fork_asm+0x1a/0x30
[   16.865247]  </TASK>
[   16.865257] 
[   16.877457] Allocated by task 282:
[   16.877801]  kasan_save_stack+0x45/0x70
[   16.878166]  kasan_save_track+0x18/0x40
[   16.878543]  kasan_save_alloc_info+0x3b/0x50
[   16.878953]  __kasan_kmalloc+0xb7/0xc0
[   16.879133]  __kmalloc_cache_noprof+0x189/0x420
[   16.879571]  kasan_atomics+0x95/0x310
[   16.879882]  kunit_try_run_case+0x1a5/0x480
[   16.880034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.880215]  kthread+0x337/0x6f0
[   16.880336]  ret_from_fork+0x116/0x1d0
[   16.880708]  ret_from_fork_asm+0x1a/0x30
[   16.881072] 
[   16.881256] The buggy address belongs to the object at ffff888102a5fe80
[   16.881256]  which belongs to the cache kmalloc-64 of size 64
[   16.882320] The buggy address is located 0 bytes to the right of
[   16.882320]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.883265] 
[   16.883342] The buggy address belongs to the physical page:
[   16.883817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.884532] flags: 0x200000000000000(node=0|zone=2)
[   16.884771] page_type: f5(slab)
[   16.884895] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.885127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.885355] page dumped because: kasan: bad access detected
[   16.885873] 
[   16.886031] Memory state around the buggy address:
[   16.886504]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.887132]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.887811] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.888425]                                      ^
[   16.888949]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.889370]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.890015] ==================================================================
[   15.757409] ==================================================================
[   15.757732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.758046] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.758717] 
[   15.759369] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.759418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.759431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.759453] Call Trace:
[   15.759469]  <TASK>
[   15.759484]  dump_stack_lvl+0x73/0xb0
[   15.759515]  print_report+0xd1/0x610
[   15.759539]  ? __virt_addr_valid+0x1db/0x2d0
[   15.759574]  ? kasan_atomics_helper+0x72f/0x5450
[   15.759597]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.759622]  ? kasan_atomics_helper+0x72f/0x5450
[   15.759645]  kasan_report+0x141/0x180
[   15.759668]  ? kasan_atomics_helper+0x72f/0x5450
[   15.759696]  kasan_check_range+0x10c/0x1c0
[   15.759720]  __kasan_check_write+0x18/0x20
[   15.759743]  kasan_atomics_helper+0x72f/0x5450
[   15.759767]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.759791]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.759818]  ? trace_hardirqs_on+0x37/0xe0
[   15.759842]  ? kasan_atomics+0x152/0x310
[   15.759869]  kasan_atomics+0x1dc/0x310
[   15.759894]  ? __pfx_kasan_atomics+0x10/0x10
[   15.759919]  ? __pfx_kasan_atomics+0x10/0x10
[   15.759948]  kunit_try_run_case+0x1a5/0x480
[   15.759974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.759999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.760023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.760048]  ? __kthread_parkme+0x82/0x180
[   15.760074]  ? preempt_count_sub+0x50/0x80
[   15.760099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.760125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.760152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.760179]  kthread+0x337/0x6f0
[   15.760199]  ? trace_preempt_on+0x20/0xc0
[   15.760223]  ? __pfx_kthread+0x10/0x10
[   15.760367]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.760394]  ? calculate_sigpending+0x7b/0xa0
[   15.760420]  ? __pfx_kthread+0x10/0x10
[   15.760443]  ret_from_fork+0x116/0x1d0
[   15.760465]  ? __pfx_kthread+0x10/0x10
[   15.760523]  ret_from_fork_asm+0x1a/0x30
[   15.760567]  </TASK>
[   15.760580] 
[   15.771943] Allocated by task 282:
[   15.772126]  kasan_save_stack+0x45/0x70
[   15.773006]  kasan_save_track+0x18/0x40
[   15.773218]  kasan_save_alloc_info+0x3b/0x50
[   15.773678]  __kasan_kmalloc+0xb7/0xc0
[   15.773969]  __kmalloc_cache_noprof+0x189/0x420
[   15.774451]  kasan_atomics+0x95/0x310
[   15.774652]  kunit_try_run_case+0x1a5/0x480
[   15.774853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.775096]  kthread+0x337/0x6f0
[   15.775579]  ret_from_fork+0x116/0x1d0
[   15.775749]  ret_from_fork_asm+0x1a/0x30
[   15.775935] 
[   15.776027] The buggy address belongs to the object at ffff888102a5fe80
[   15.776027]  which belongs to the cache kmalloc-64 of size 64
[   15.777523] The buggy address is located 0 bytes to the right of
[   15.777523]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.778347] 
[   15.778597] The buggy address belongs to the physical page:
[   15.778847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.779171] flags: 0x200000000000000(node=0|zone=2)
[   15.779759] page_type: f5(slab)
[   15.780033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.780613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.780929] page dumped because: kasan: bad access detected
[   15.781155] 
[   15.781777] Memory state around the buggy address:
[   15.781974]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.782201]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.783177] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.783977]                                      ^
[   15.784613]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.784937]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.785158] ==================================================================
[   16.136722] ==================================================================
[   16.137310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   16.138039] Read of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.138520] 
[   16.138633] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.138678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.138691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.138724] Call Trace:
[   16.138738]  <TASK>
[   16.138753]  dump_stack_lvl+0x73/0xb0
[   16.138781]  print_report+0xd1/0x610
[   16.138814]  ? __virt_addr_valid+0x1db/0x2d0
[   16.138837]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.138861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.138897]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.138920]  kasan_report+0x141/0x180
[   16.138943]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.138980]  __asan_report_load4_noabort+0x18/0x20
[   16.139007]  kasan_atomics_helper+0x4a36/0x5450
[   16.139042]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.139066]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.139093]  ? trace_hardirqs_on+0x37/0xe0
[   16.139115]  ? kasan_atomics+0x152/0x310
[   16.139144]  kasan_atomics+0x1dc/0x310
[   16.139168]  ? __pfx_kasan_atomics+0x10/0x10
[   16.139193]  ? __pfx_kasan_atomics+0x10/0x10
[   16.139231]  kunit_try_run_case+0x1a5/0x480
[   16.139256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.139280]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.139316]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.139340]  ? __kthread_parkme+0x82/0x180
[   16.139363]  ? preempt_count_sub+0x50/0x80
[   16.139388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.139413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.139446]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.139474]  kthread+0x337/0x6f0
[   16.139494]  ? trace_preempt_on+0x20/0xc0
[   16.139517]  ? __pfx_kthread+0x10/0x10
[   16.139539]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.139571]  ? calculate_sigpending+0x7b/0xa0
[   16.139597]  ? __pfx_kthread+0x10/0x10
[   16.139620]  ret_from_fork+0x116/0x1d0
[   16.139640]  ? __pfx_kthread+0x10/0x10
[   16.139661]  ret_from_fork_asm+0x1a/0x30
[   16.139692]  </TASK>
[   16.139703] 
[   16.151809] Allocated by task 282:
[   16.152166]  kasan_save_stack+0x45/0x70
[   16.152435]  kasan_save_track+0x18/0x40
[   16.152721]  kasan_save_alloc_info+0x3b/0x50
[   16.152877]  __kasan_kmalloc+0xb7/0xc0
[   16.153010]  __kmalloc_cache_noprof+0x189/0x420
[   16.153168]  kasan_atomics+0x95/0x310
[   16.153302]  kunit_try_run_case+0x1a5/0x480
[   16.153485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.153986]  kthread+0x337/0x6f0
[   16.154300]  ret_from_fork+0x116/0x1d0
[   16.154715]  ret_from_fork_asm+0x1a/0x30
[   16.155083] 
[   16.155249] The buggy address belongs to the object at ffff888102a5fe80
[   16.155249]  which belongs to the cache kmalloc-64 of size 64
[   16.156330] The buggy address is located 0 bytes to the right of
[   16.156330]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.157436] 
[   16.157651] The buggy address belongs to the physical page:
[   16.158142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.158496] flags: 0x200000000000000(node=0|zone=2)
[   16.158960] page_type: f5(slab)
[   16.159283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.159719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.159949] page dumped because: kasan: bad access detected
[   16.160125] 
[   16.160196] Memory state around the buggy address:
[   16.160353]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.160625]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.161051] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.161363]                                      ^
[   16.161714]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.161946]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.162291] ==================================================================
[   16.764748] ==================================================================
[   16.765092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.765633] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.765912] 
[   16.765998] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.766041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.766054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.766076] Call Trace:
[   16.766090]  <TASK>
[   16.766104]  dump_stack_lvl+0x73/0xb0
[   16.766132]  print_report+0xd1/0x610
[   16.766155]  ? __virt_addr_valid+0x1db/0x2d0
[   16.766178]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.766201]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.766226]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.766250]  kasan_report+0x141/0x180
[   16.766273]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.766301]  kasan_check_range+0x10c/0x1c0
[   16.766326]  __kasan_check_write+0x18/0x20
[   16.766347]  kasan_atomics_helper+0x1d7a/0x5450
[   16.766371]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.766395]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.766421]  ? trace_hardirqs_on+0x37/0xe0
[   16.766445]  ? kasan_atomics+0x152/0x310
[   16.766473]  kasan_atomics+0x1dc/0x310
[   16.766497]  ? __pfx_kasan_atomics+0x10/0x10
[   16.766522]  ? __pfx_kasan_atomics+0x10/0x10
[   16.766561]  kunit_try_run_case+0x1a5/0x480
[   16.766587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.766611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.766637]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.766662]  ? __kthread_parkme+0x82/0x180
[   16.766685]  ? preempt_count_sub+0x50/0x80
[   16.766709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.766747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.766773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.766801]  kthread+0x337/0x6f0
[   16.766822]  ? trace_preempt_on+0x20/0xc0
[   16.766846]  ? __pfx_kthread+0x10/0x10
[   16.766867]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.766891]  ? calculate_sigpending+0x7b/0xa0
[   16.766917]  ? __pfx_kthread+0x10/0x10
[   16.766940]  ret_from_fork+0x116/0x1d0
[   16.766960]  ? __pfx_kthread+0x10/0x10
[   16.766982]  ret_from_fork_asm+0x1a/0x30
[   16.767014]  </TASK>
[   16.767024] 
[   16.774561] Allocated by task 282:
[   16.774739]  kasan_save_stack+0x45/0x70
[   16.774938]  kasan_save_track+0x18/0x40
[   16.775128]  kasan_save_alloc_info+0x3b/0x50
[   16.775320]  __kasan_kmalloc+0xb7/0xc0
[   16.775523]  __kmalloc_cache_noprof+0x189/0x420
[   16.775709]  kasan_atomics+0x95/0x310
[   16.775901]  kunit_try_run_case+0x1a5/0x480
[   16.776110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.776346]  kthread+0x337/0x6f0
[   16.776583]  ret_from_fork+0x116/0x1d0
[   16.776747]  ret_from_fork_asm+0x1a/0x30
[   16.776893] 
[   16.776965] The buggy address belongs to the object at ffff888102a5fe80
[   16.776965]  which belongs to the cache kmalloc-64 of size 64
[   16.777319] The buggy address is located 0 bytes to the right of
[   16.777319]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.777864] 
[   16.777963] The buggy address belongs to the physical page:
[   16.778206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.778575] flags: 0x200000000000000(node=0|zone=2)
[   16.778949] page_type: f5(slab)
[   16.779095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.779327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.779563] page dumped because: kasan: bad access detected
[   16.779735] 
[   16.779836] Memory state around the buggy address:
[   16.780064]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.780383]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.780725] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.781197]                                      ^
[   16.781362]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.781680]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.781986] ==================================================================
[   17.037142] ==================================================================
[   17.037695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   17.038027] Read of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   17.038337] 
[   17.038638] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   17.038687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.038921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.038948] Call Trace:
[   17.038966]  <TASK>
[   17.038982]  dump_stack_lvl+0x73/0xb0
[   17.039013]  print_report+0xd1/0x610
[   17.039037]  ? __virt_addr_valid+0x1db/0x2d0
[   17.039096]  ? kasan_atomics_helper+0x5115/0x5450
[   17.039121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.039147]  ? kasan_atomics_helper+0x5115/0x5450
[   17.039171]  kasan_report+0x141/0x180
[   17.039193]  ? kasan_atomics_helper+0x5115/0x5450
[   17.039221]  __asan_report_load8_noabort+0x18/0x20
[   17.039249]  kasan_atomics_helper+0x5115/0x5450
[   17.039273]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.039297]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.039323]  ? trace_hardirqs_on+0x37/0xe0
[   17.039347]  ? kasan_atomics+0x152/0x310
[   17.039375]  kasan_atomics+0x1dc/0x310
[   17.039421]  ? __pfx_kasan_atomics+0x10/0x10
[   17.039447]  ? __pfx_kasan_atomics+0x10/0x10
[   17.039475]  kunit_try_run_case+0x1a5/0x480
[   17.039502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.039527]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.039563]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.039589]  ? __kthread_parkme+0x82/0x180
[   17.039611]  ? preempt_count_sub+0x50/0x80
[   17.039637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.039663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.039689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.039717]  kthread+0x337/0x6f0
[   17.039737]  ? trace_preempt_on+0x20/0xc0
[   17.039761]  ? __pfx_kthread+0x10/0x10
[   17.039783]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.039805]  ? calculate_sigpending+0x7b/0xa0
[   17.039831]  ? __pfx_kthread+0x10/0x10
[   17.039854]  ret_from_fork+0x116/0x1d0
[   17.039874]  ? __pfx_kthread+0x10/0x10
[   17.039897]  ret_from_fork_asm+0x1a/0x30
[   17.039928]  </TASK>
[   17.039940] 
[   17.050544] Allocated by task 282:
[   17.050843]  kasan_save_stack+0x45/0x70
[   17.051035]  kasan_save_track+0x18/0x40
[   17.051214]  kasan_save_alloc_info+0x3b/0x50
[   17.051644]  __kasan_kmalloc+0xb7/0xc0
[   17.051934]  __kmalloc_cache_noprof+0x189/0x420
[   17.052368]  kasan_atomics+0x95/0x310
[   17.052649]  kunit_try_run_case+0x1a5/0x480
[   17.052966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.053213]  kthread+0x337/0x6f0
[   17.053368]  ret_from_fork+0x116/0x1d0
[   17.053852]  ret_from_fork_asm+0x1a/0x30
[   17.054128] 
[   17.054350] The buggy address belongs to the object at ffff888102a5fe80
[   17.054350]  which belongs to the cache kmalloc-64 of size 64
[   17.054874] The buggy address is located 0 bytes to the right of
[   17.054874]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   17.055371] 
[   17.055760] The buggy address belongs to the physical page:
[   17.056185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   17.056719] flags: 0x200000000000000(node=0|zone=2)
[   17.056950] page_type: f5(slab)
[   17.057107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.057673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.058193] page dumped because: kasan: bad access detected
[   17.058655] 
[   17.058882] Memory state around the buggy address:
[   17.059106]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.059632]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.060057] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.060562]                                      ^
[   17.061010]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.061315]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.061818] ==================================================================
[   16.711648] ==================================================================
[   16.711975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.712282] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.712914] 
[   16.713044] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.713090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.713103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.713125] Call Trace:
[   16.713143]  <TASK>
[   16.713160]  dump_stack_lvl+0x73/0xb0
[   16.713190]  print_report+0xd1/0x610
[   16.713213]  ? __virt_addr_valid+0x1db/0x2d0
[   16.713238]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.713276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.713301]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.713326]  kasan_report+0x141/0x180
[   16.713348]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.713376]  kasan_check_range+0x10c/0x1c0
[   16.713401]  __kasan_check_write+0x18/0x20
[   16.713431]  kasan_atomics_helper+0x1c18/0x5450
[   16.713456]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.713480]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.713506]  ? trace_hardirqs_on+0x37/0xe0
[   16.713529]  ? kasan_atomics+0x152/0x310
[   16.713569]  kasan_atomics+0x1dc/0x310
[   16.713593]  ? __pfx_kasan_atomics+0x10/0x10
[   16.713618]  ? __pfx_kasan_atomics+0x10/0x10
[   16.713647]  kunit_try_run_case+0x1a5/0x480
[   16.713672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.713697]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.713723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.713749]  ? __kthread_parkme+0x82/0x180
[   16.713771]  ? preempt_count_sub+0x50/0x80
[   16.713797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.713822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.713848]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.713876]  kthread+0x337/0x6f0
[   16.713896]  ? trace_preempt_on+0x20/0xc0
[   16.713919]  ? __pfx_kthread+0x10/0x10
[   16.713941]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.713965]  ? calculate_sigpending+0x7b/0xa0
[   16.713990]  ? __pfx_kthread+0x10/0x10
[   16.714013]  ret_from_fork+0x116/0x1d0
[   16.714033]  ? __pfx_kthread+0x10/0x10
[   16.714054]  ret_from_fork_asm+0x1a/0x30
[   16.714087]  </TASK>
[   16.714097] 
[   16.721630] Allocated by task 282:
[   16.721810]  kasan_save_stack+0x45/0x70
[   16.722012]  kasan_save_track+0x18/0x40
[   16.722207]  kasan_save_alloc_info+0x3b/0x50
[   16.722374]  __kasan_kmalloc+0xb7/0xc0
[   16.722661]  __kmalloc_cache_noprof+0x189/0x420
[   16.722853]  kasan_atomics+0x95/0x310
[   16.723016]  kunit_try_run_case+0x1a5/0x480
[   16.723217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.723492]  kthread+0x337/0x6f0
[   16.723658]  ret_from_fork+0x116/0x1d0
[   16.723823]  ret_from_fork_asm+0x1a/0x30
[   16.723965] 
[   16.724054] The buggy address belongs to the object at ffff888102a5fe80
[   16.724054]  which belongs to the cache kmalloc-64 of size 64
[   16.724636] The buggy address is located 0 bytes to the right of
[   16.724636]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.725001] 
[   16.725072] The buggy address belongs to the physical page:
[   16.725242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.725596] flags: 0x200000000000000(node=0|zone=2)
[   16.725824] page_type: f5(slab)
[   16.725988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.726393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.726682] page dumped because: kasan: bad access detected
[   16.726856] 
[   16.726926] Memory state around the buggy address:
[   16.727080]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.727300]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.727770] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.728091]                                      ^
[   16.728319]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.728950]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.729278] ==================================================================
[   15.910532] ==================================================================
[   15.911199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.911648] Write of size 4 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   15.912300] 
[   15.912489] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.912535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.912727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.912753] Call Trace:
[   15.912770]  <TASK>
[   15.912784]  dump_stack_lvl+0x73/0xb0
[   15.912831]  print_report+0xd1/0x610
[   15.912854]  ? __virt_addr_valid+0x1db/0x2d0
[   15.912878]  ? kasan_atomics_helper+0xac7/0x5450
[   15.912914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.912940]  ? kasan_atomics_helper+0xac7/0x5450
[   15.912964]  kasan_report+0x141/0x180
[   15.912987]  ? kasan_atomics_helper+0xac7/0x5450
[   15.913015]  kasan_check_range+0x10c/0x1c0
[   15.913040]  __kasan_check_write+0x18/0x20
[   15.913062]  kasan_atomics_helper+0xac7/0x5450
[   15.913087]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.913112]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.913138]  ? trace_hardirqs_on+0x37/0xe0
[   15.913162]  ? kasan_atomics+0x152/0x310
[   15.913189]  kasan_atomics+0x1dc/0x310
[   15.913214]  ? __pfx_kasan_atomics+0x10/0x10
[   15.913294]  ? __pfx_kasan_atomics+0x10/0x10
[   15.913327]  kunit_try_run_case+0x1a5/0x480
[   15.913353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.913378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.913404]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.913430]  ? __kthread_parkme+0x82/0x180
[   15.913453]  ? preempt_count_sub+0x50/0x80
[   15.913478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.913504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.913531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.913571]  kthread+0x337/0x6f0
[   15.913592]  ? trace_preempt_on+0x20/0xc0
[   15.913616]  ? __pfx_kthread+0x10/0x10
[   15.913638]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.913662]  ? calculate_sigpending+0x7b/0xa0
[   15.913688]  ? __pfx_kthread+0x10/0x10
[   15.913711]  ret_from_fork+0x116/0x1d0
[   15.913731]  ? __pfx_kthread+0x10/0x10
[   15.913753]  ret_from_fork_asm+0x1a/0x30
[   15.913785]  </TASK>
[   15.913797] 
[   15.928771] Allocated by task 282:
[   15.929020]  kasan_save_stack+0x45/0x70
[   15.929174]  kasan_save_track+0x18/0x40
[   15.929390]  kasan_save_alloc_info+0x3b/0x50
[   15.929860]  __kasan_kmalloc+0xb7/0xc0
[   15.930227]  __kmalloc_cache_noprof+0x189/0x420
[   15.930731]  kasan_atomics+0x95/0x310
[   15.931095]  kunit_try_run_case+0x1a5/0x480
[   15.931583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.932024]  kthread+0x337/0x6f0
[   15.932181]  ret_from_fork+0x116/0x1d0
[   15.932599]  ret_from_fork_asm+0x1a/0x30
[   15.933002] 
[   15.933187] The buggy address belongs to the object at ffff888102a5fe80
[   15.933187]  which belongs to the cache kmalloc-64 of size 64
[   15.933890] The buggy address is located 0 bytes to the right of
[   15.933890]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   15.934349] 
[   15.934463] The buggy address belongs to the physical page:
[   15.934731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   15.935116] flags: 0x200000000000000(node=0|zone=2)
[   15.935546] page_type: f5(slab)
[   15.935736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.936044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.936427] page dumped because: kasan: bad access detected
[   15.936820] 
[   15.936940] Memory state around the buggy address:
[   15.937138]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.937407]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.937886] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.938155]                                      ^
[   15.938481]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.939042]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.939356] ==================================================================
[   16.746642] ==================================================================
[   16.746983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.747427] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   16.747766] 
[   16.747879] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.747924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.747937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.747959] Call Trace:
[   16.747973]  <TASK>
[   16.747988]  dump_stack_lvl+0x73/0xb0
[   16.748015]  print_report+0xd1/0x610
[   16.748039]  ? __virt_addr_valid+0x1db/0x2d0
[   16.748066]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.748089]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.748114]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.748137]  kasan_report+0x141/0x180
[   16.748160]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.748188]  kasan_check_range+0x10c/0x1c0
[   16.748213]  __kasan_check_write+0x18/0x20
[   16.748234]  kasan_atomics_helper+0x1ce1/0x5450
[   16.748258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.748283]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.748308]  ? trace_hardirqs_on+0x37/0xe0
[   16.748332]  ? kasan_atomics+0x152/0x310
[   16.748359]  kasan_atomics+0x1dc/0x310
[   16.748383]  ? __pfx_kasan_atomics+0x10/0x10
[   16.748408]  ? __pfx_kasan_atomics+0x10/0x10
[   16.748447]  kunit_try_run_case+0x1a5/0x480
[   16.748472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.748497]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.748522]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.748548]  ? __kthread_parkme+0x82/0x180
[   16.748580]  ? preempt_count_sub+0x50/0x80
[   16.748605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.748631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.748658]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.748686]  kthread+0x337/0x6f0
[   16.748706]  ? trace_preempt_on+0x20/0xc0
[   16.748730]  ? __pfx_kthread+0x10/0x10
[   16.748751]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.748774]  ? calculate_sigpending+0x7b/0xa0
[   16.748800]  ? __pfx_kthread+0x10/0x10
[   16.748822]  ret_from_fork+0x116/0x1d0
[   16.748842]  ? __pfx_kthread+0x10/0x10
[   16.748865]  ret_from_fork_asm+0x1a/0x30
[   16.748896]  </TASK>
[   16.748907] 
[   16.756993] Allocated by task 282:
[   16.757164]  kasan_save_stack+0x45/0x70
[   16.757337]  kasan_save_track+0x18/0x40
[   16.757566]  kasan_save_alloc_info+0x3b/0x50
[   16.757719]  __kasan_kmalloc+0xb7/0xc0
[   16.757909]  __kmalloc_cache_noprof+0x189/0x420
[   16.758140]  kasan_atomics+0x95/0x310
[   16.758288]  kunit_try_run_case+0x1a5/0x480
[   16.758435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.758693]  kthread+0x337/0x6f0
[   16.758868]  ret_from_fork+0x116/0x1d0
[   16.759222]  ret_from_fork_asm+0x1a/0x30
[   16.759369] 
[   16.759486] The buggy address belongs to the object at ffff888102a5fe80
[   16.759486]  which belongs to the cache kmalloc-64 of size 64
[   16.760050] The buggy address is located 0 bytes to the right of
[   16.760050]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   16.760539] 
[   16.760646] The buggy address belongs to the physical page:
[   16.760898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   16.761184] flags: 0x200000000000000(node=0|zone=2)
[   16.761345] page_type: f5(slab)
[   16.761491] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.761845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.762126] page dumped because: kasan: bad access detected
[   16.762297] 
[   16.762414] Memory state around the buggy address:
[   16.762651]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.762975]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.763255] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.763560]                                      ^
[   16.763716]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.763932]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.764154] ==================================================================
[   17.011577] ==================================================================
[   17.011924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   17.012306] Write of size 8 at addr ffff888102a5feb0 by task kunit_try_catch/282
[   17.012666] 
[   17.012799] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   17.012844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.012856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.012879] Call Trace:
[   17.012893]  <TASK>
[   17.012909]  dump_stack_lvl+0x73/0xb0
[   17.012937]  print_report+0xd1/0x610
[   17.012982]  ? __virt_addr_valid+0x1db/0x2d0
[   17.013006]  ? kasan_atomics_helper+0x224c/0x5450
[   17.013028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.013054]  ? kasan_atomics_helper+0x224c/0x5450
[   17.013077]  kasan_report+0x141/0x180
[   17.013100]  ? kasan_atomics_helper+0x224c/0x5450
[   17.013145]  kasan_check_range+0x10c/0x1c0
[   17.013171]  __kasan_check_write+0x18/0x20
[   17.013192]  kasan_atomics_helper+0x224c/0x5450
[   17.013216]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.013241]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.013266]  ? trace_hardirqs_on+0x37/0xe0
[   17.013290]  ? kasan_atomics+0x152/0x310
[   17.013318]  kasan_atomics+0x1dc/0x310
[   17.013359]  ? __pfx_kasan_atomics+0x10/0x10
[   17.013384]  ? __pfx_kasan_atomics+0x10/0x10
[   17.013433]  kunit_try_run_case+0x1a5/0x480
[   17.013459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.013483]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.013527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.013561]  ? __kthread_parkme+0x82/0x180
[   17.013584]  ? preempt_count_sub+0x50/0x80
[   17.013609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.013652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.013692]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.013733]  kthread+0x337/0x6f0
[   17.013754]  ? trace_preempt_on+0x20/0xc0
[   17.013778]  ? __pfx_kthread+0x10/0x10
[   17.013800]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.013823]  ? calculate_sigpending+0x7b/0xa0
[   17.013849]  ? __pfx_kthread+0x10/0x10
[   17.013871]  ret_from_fork+0x116/0x1d0
[   17.013891]  ? __pfx_kthread+0x10/0x10
[   17.013913]  ret_from_fork_asm+0x1a/0x30
[   17.013944]  </TASK>
[   17.013955] 
[   17.024217] Allocated by task 282:
[   17.024388]  kasan_save_stack+0x45/0x70
[   17.024903]  kasan_save_track+0x18/0x40
[   17.025207]  kasan_save_alloc_info+0x3b/0x50
[   17.025567]  __kasan_kmalloc+0xb7/0xc0
[   17.025865]  __kmalloc_cache_noprof+0x189/0x420
[   17.026090]  kasan_atomics+0x95/0x310
[   17.026259]  kunit_try_run_case+0x1a5/0x480
[   17.026684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.027105]  kthread+0x337/0x6f0
[   17.027391]  ret_from_fork+0x116/0x1d0
[   17.027616]  ret_from_fork_asm+0x1a/0x30
[   17.027803] 
[   17.027891] The buggy address belongs to the object at ffff888102a5fe80
[   17.027891]  which belongs to the cache kmalloc-64 of size 64
[   17.028385] The buggy address is located 0 bytes to the right of
[   17.028385]  allocated 48-byte region [ffff888102a5fe80, ffff888102a5feb0)
[   17.029496] 
[   17.029617] The buggy address belongs to the physical page:
[   17.029852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   17.030174] flags: 0x200000000000000(node=0|zone=2)
[   17.030374] page_type: f5(slab)
[   17.030806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.031455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.031906] page dumped because: kasan: bad access detected
[   17.032333] 
[   17.032588] Memory state around the buggy address:
[   17.033046]  ffff888102a5fd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.033517]  ffff888102a5fe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.034006] >ffff888102a5fe80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.034492]                                      ^
[   17.034720]  ffff888102a5ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.035020]  ffff888102a5ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.035312] ==================================================================