Hay
Date
July 9, 2025, 12:11 a.m.

Environment
qemu-x86_64

[   16.137289] ==================================================================
[   16.137603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.137899] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.138224] 
[   16.138355] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.138399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.138411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.138432] Call Trace:
[   16.138449]  <TASK>
[   16.138467]  dump_stack_lvl+0x73/0xb0
[   16.138498]  print_report+0xd1/0x650
[   16.138522]  ? __virt_addr_valid+0x1db/0x2d0
[   16.138546]  ? kasan_atomics_helper+0x194a/0x5450
[   16.138569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.138593]  ? kasan_atomics_helper+0x194a/0x5450
[   16.138617]  kasan_report+0x141/0x180
[   16.138639]  ? kasan_atomics_helper+0x194a/0x5450
[   16.138666]  kasan_check_range+0x10c/0x1c0
[   16.138691]  __kasan_check_write+0x18/0x20
[   16.138720]  kasan_atomics_helper+0x194a/0x5450
[   16.138743]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.138768]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.138794]  ? kasan_atomics+0x152/0x310
[   16.138821]  kasan_atomics+0x1dc/0x310
[   16.138844]  ? __pfx_kasan_atomics+0x10/0x10
[   16.138870]  ? __pfx_read_tsc+0x10/0x10
[   16.138892]  ? ktime_get_ts64+0x86/0x230
[   16.138916]  kunit_try_run_case+0x1a5/0x480
[   16.138952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.138975]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.139001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.139026]  ? __kthread_parkme+0x82/0x180
[   16.139047]  ? preempt_count_sub+0x50/0x80
[   16.139072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.139098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.139123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.139149]  kthread+0x337/0x6f0
[   16.139168]  ? trace_preempt_on+0x20/0xc0
[   16.139193]  ? __pfx_kthread+0x10/0x10
[   16.139214]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.139237]  ? calculate_sigpending+0x7b/0xa0
[   16.139282]  ? __pfx_kthread+0x10/0x10
[   16.139304]  ret_from_fork+0x116/0x1d0
[   16.139323]  ? __pfx_kthread+0x10/0x10
[   16.139344]  ret_from_fork_asm+0x1a/0x30
[   16.139376]  </TASK>
[   16.139386] 
[   16.146451] Allocated by task 282:
[   16.146630]  kasan_save_stack+0x45/0x70
[   16.146834]  kasan_save_track+0x18/0x40
[   16.146983]  kasan_save_alloc_info+0x3b/0x50
[   16.147147]  __kasan_kmalloc+0xb7/0xc0
[   16.147360]  __kmalloc_cache_noprof+0x189/0x420
[   16.147585]  kasan_atomics+0x95/0x310
[   16.147772]  kunit_try_run_case+0x1a5/0x480
[   16.147966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.148177]  kthread+0x337/0x6f0
[   16.148372]  ret_from_fork+0x116/0x1d0
[   16.148540]  ret_from_fork_asm+0x1a/0x30
[   16.148708] 
[   16.148778] The buggy address belongs to the object at ffff888102ac2380
[   16.148778]  which belongs to the cache kmalloc-64 of size 64
[   16.149137] The buggy address is located 0 bytes to the right of
[   16.149137]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.149520] 
[   16.149593] The buggy address belongs to the physical page:
[   16.149763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.150125] flags: 0x200000000000000(node=0|zone=2)
[   16.150380] page_type: f5(slab)
[   16.150549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.150886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.151228] page dumped because: kasan: bad access detected
[   16.151499] 
[   16.151579] Memory state around the buggy address:
[   16.151787]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.152040]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.152270] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.152482]                                      ^
[   16.152635]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.152847]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.153157] ==================================================================
[   16.171856] ==================================================================
[   16.172199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.172466] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.172804] 
[   16.172918] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.172972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.172985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.173006] Call Trace:
[   16.173026]  <TASK>
[   16.173046]  dump_stack_lvl+0x73/0xb0
[   16.173077]  print_report+0xd1/0x650
[   16.173101]  ? __virt_addr_valid+0x1db/0x2d0
[   16.173125]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.173147]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.173171]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.173195]  kasan_report+0x141/0x180
[   16.173217]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.173244]  kasan_check_range+0x10c/0x1c0
[   16.173276]  __kasan_check_write+0x18/0x20
[   16.173297]  kasan_atomics_helper+0x1a7f/0x5450
[   16.173321]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.173344]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.173370]  ? kasan_atomics+0x152/0x310
[   16.173397]  kasan_atomics+0x1dc/0x310
[   16.173420]  ? __pfx_kasan_atomics+0x10/0x10
[   16.173445]  ? __pfx_read_tsc+0x10/0x10
[   16.173468]  ? ktime_get_ts64+0x86/0x230
[   16.173493]  kunit_try_run_case+0x1a5/0x480
[   16.173518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.173542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.173568]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.173592]  ? __kthread_parkme+0x82/0x180
[   16.173614]  ? preempt_count_sub+0x50/0x80
[   16.173639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.173664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.173690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.173716]  kthread+0x337/0x6f0
[   16.173736]  ? trace_preempt_on+0x20/0xc0
[   16.173762]  ? __pfx_kthread+0x10/0x10
[   16.173783]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.173806]  ? calculate_sigpending+0x7b/0xa0
[   16.173831]  ? __pfx_kthread+0x10/0x10
[   16.173853]  ret_from_fork+0x116/0x1d0
[   16.173873]  ? __pfx_kthread+0x10/0x10
[   16.173894]  ret_from_fork_asm+0x1a/0x30
[   16.173925]  </TASK>
[   16.173945] 
[   16.181138] Allocated by task 282:
[   16.181293]  kasan_save_stack+0x45/0x70
[   16.181439]  kasan_save_track+0x18/0x40
[   16.181574]  kasan_save_alloc_info+0x3b/0x50
[   16.181723]  __kasan_kmalloc+0xb7/0xc0
[   16.181855]  __kmalloc_cache_noprof+0x189/0x420
[   16.182022]  kasan_atomics+0x95/0x310
[   16.182283]  kunit_try_run_case+0x1a5/0x480
[   16.182619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.182875]  kthread+0x337/0x6f0
[   16.183050]  ret_from_fork+0x116/0x1d0
[   16.183236]  ret_from_fork_asm+0x1a/0x30
[   16.183448] 
[   16.183540] The buggy address belongs to the object at ffff888102ac2380
[   16.183540]  which belongs to the cache kmalloc-64 of size 64
[   16.184064] The buggy address is located 0 bytes to the right of
[   16.184064]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.184566] 
[   16.184639] The buggy address belongs to the physical page:
[   16.184809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.185057] flags: 0x200000000000000(node=0|zone=2)
[   16.185219] page_type: f5(slab)
[   16.185363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.185667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.186027] page dumped because: kasan: bad access detected
[   16.186307] 
[   16.186403] Memory state around the buggy address:
[   16.186632]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.186972]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.187316] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.187583]                                      ^
[   16.187742]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.188078]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.188375] ==================================================================
[   16.223045] ==================================================================
[   16.223353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.223594] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.223814] 
[   16.223904] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.223974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.223989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.224011] Call Trace:
[   16.224029]  <TASK>
[   16.224048]  dump_stack_lvl+0x73/0xb0
[   16.224080]  print_report+0xd1/0x650
[   16.224103]  ? __virt_addr_valid+0x1db/0x2d0
[   16.224128]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.224171]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.224205]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.224229]  kasan_report+0x141/0x180
[   16.224285]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.224334]  __asan_report_load8_noabort+0x18/0x20
[   16.224360]  kasan_atomics_helper+0x4f30/0x5450
[   16.224384]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.224408]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.224447]  ? kasan_atomics+0x152/0x310
[   16.224474]  kasan_atomics+0x1dc/0x310
[   16.224498]  ? __pfx_kasan_atomics+0x10/0x10
[   16.224524]  ? __pfx_read_tsc+0x10/0x10
[   16.224547]  ? ktime_get_ts64+0x86/0x230
[   16.224573]  kunit_try_run_case+0x1a5/0x480
[   16.224599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.224622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.224647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.224672]  ? __kthread_parkme+0x82/0x180
[   16.224694]  ? preempt_count_sub+0x50/0x80
[   16.224719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.224744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.224770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.224797]  kthread+0x337/0x6f0
[   16.224816]  ? trace_preempt_on+0x20/0xc0
[   16.224842]  ? __pfx_kthread+0x10/0x10
[   16.224863]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.224886]  ? calculate_sigpending+0x7b/0xa0
[   16.224911]  ? __pfx_kthread+0x10/0x10
[   16.224934]  ret_from_fork+0x116/0x1d0
[   16.224965]  ? __pfx_kthread+0x10/0x10
[   16.224987]  ret_from_fork_asm+0x1a/0x30
[   16.225019]  </TASK>
[   16.225031] 
[   16.232354] Allocated by task 282:
[   16.232539]  kasan_save_stack+0x45/0x70
[   16.232735]  kasan_save_track+0x18/0x40
[   16.232929]  kasan_save_alloc_info+0x3b/0x50
[   16.233147]  __kasan_kmalloc+0xb7/0xc0
[   16.233342]  __kmalloc_cache_noprof+0x189/0x420
[   16.233536]  kasan_atomics+0x95/0x310
[   16.233688]  kunit_try_run_case+0x1a5/0x480
[   16.233897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.234113]  kthread+0x337/0x6f0
[   16.234234]  ret_from_fork+0x116/0x1d0
[   16.234386]  ret_from_fork_asm+0x1a/0x30
[   16.234525] 
[   16.234594] The buggy address belongs to the object at ffff888102ac2380
[   16.234594]  which belongs to the cache kmalloc-64 of size 64
[   16.234957] The buggy address is located 0 bytes to the right of
[   16.234957]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.235529] 
[   16.235629] The buggy address belongs to the physical page:
[   16.235885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.236270] flags: 0x200000000000000(node=0|zone=2)
[   16.236512] page_type: f5(slab)
[   16.236686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.237043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.237372] page dumped because: kasan: bad access detected
[   16.237600] 
[   16.237687] Memory state around the buggy address:
[   16.237880]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.238164]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.238431] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.238643]                                      ^
[   16.238802]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.239060]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.239404] ==================================================================
[   15.849104] ==================================================================
[   15.849376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.849919] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.850210] 
[   15.850316] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.850358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.850370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.850392] Call Trace:
[   15.850410]  <TASK>
[   15.850429]  dump_stack_lvl+0x73/0xb0
[   15.850460]  print_report+0xd1/0x650
[   15.850484]  ? __virt_addr_valid+0x1db/0x2d0
[   15.850507]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.850530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.850566]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.850589]  kasan_report+0x141/0x180
[   15.850613]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.850653]  __asan_report_load4_noabort+0x18/0x20
[   15.850680]  kasan_atomics_helper+0x49e8/0x5450
[   15.850704]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.850731]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.850758]  ? kasan_atomics+0x152/0x310
[   15.850784]  kasan_atomics+0x1dc/0x310
[   15.850807]  ? __pfx_kasan_atomics+0x10/0x10
[   15.850833]  ? __pfx_read_tsc+0x10/0x10
[   15.850856]  ? ktime_get_ts64+0x86/0x230
[   15.850881]  kunit_try_run_case+0x1a5/0x480
[   15.850908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.850931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.850967]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.850992]  ? __kthread_parkme+0x82/0x180
[   15.851014]  ? preempt_count_sub+0x50/0x80
[   15.851039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.851064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.851089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.851115]  kthread+0x337/0x6f0
[   15.851134]  ? trace_preempt_on+0x20/0xc0
[   15.851160]  ? __pfx_kthread+0x10/0x10
[   15.851181]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.851204]  ? calculate_sigpending+0x7b/0xa0
[   15.851229]  ? __pfx_kthread+0x10/0x10
[   15.851251]  ret_from_fork+0x116/0x1d0
[   15.851282]  ? __pfx_kthread+0x10/0x10
[   15.851304]  ret_from_fork_asm+0x1a/0x30
[   15.851336]  </TASK>
[   15.851348] 
[   15.858998] Allocated by task 282:
[   15.859207]  kasan_save_stack+0x45/0x70
[   15.859411]  kasan_save_track+0x18/0x40
[   15.859548]  kasan_save_alloc_info+0x3b/0x50
[   15.859698]  __kasan_kmalloc+0xb7/0xc0
[   15.859875]  __kmalloc_cache_noprof+0x189/0x420
[   15.860135]  kasan_atomics+0x95/0x310
[   15.860392]  kunit_try_run_case+0x1a5/0x480
[   15.860628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.860909]  kthread+0x337/0x6f0
[   15.861053]  ret_from_fork+0x116/0x1d0
[   15.861236]  ret_from_fork_asm+0x1a/0x30
[   15.861458] 
[   15.861530] The buggy address belongs to the object at ffff888102ac2380
[   15.861530]  which belongs to the cache kmalloc-64 of size 64
[   15.861877] The buggy address is located 0 bytes to the right of
[   15.861877]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.862339] 
[   15.862434] The buggy address belongs to the physical page:
[   15.862683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.863095] flags: 0x200000000000000(node=0|zone=2)
[   15.863339] page_type: f5(slab)
[   15.863458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.863684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.863907] page dumped because: kasan: bad access detected
[   15.864158] 
[   15.864254] Memory state around the buggy address:
[   15.864490]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.864834]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.865174] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.865526]                                      ^
[   15.865755]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.866110]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.866489] ==================================================================
[   16.466565] ==================================================================
[   16.466871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.467301] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.467599] 
[   16.467685] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.467727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.467739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.467760] Call Trace:
[   16.467779]  <TASK>
[   16.467795]  dump_stack_lvl+0x73/0xb0
[   16.467825]  print_report+0xd1/0x650
[   16.467850]  ? __virt_addr_valid+0x1db/0x2d0
[   16.467873]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.467895]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.467920]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.467953]  kasan_report+0x141/0x180
[   16.467976]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.468004]  __asan_report_load8_noabort+0x18/0x20
[   16.468030]  kasan_atomics_helper+0x4fa5/0x5450
[   16.468054]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.468077]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.468104]  ? kasan_atomics+0x152/0x310
[   16.468131]  kasan_atomics+0x1dc/0x310
[   16.468155]  ? __pfx_kasan_atomics+0x10/0x10
[   16.468220]  ? __pfx_read_tsc+0x10/0x10
[   16.468244]  ? ktime_get_ts64+0x86/0x230
[   16.468289]  kunit_try_run_case+0x1a5/0x480
[   16.468315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.468371]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.468398]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.468423]  ? __kthread_parkme+0x82/0x180
[   16.468446]  ? preempt_count_sub+0x50/0x80
[   16.468471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.468497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.468553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.468581]  kthread+0x337/0x6f0
[   16.468601]  ? trace_preempt_on+0x20/0xc0
[   16.468626]  ? __pfx_kthread+0x10/0x10
[   16.468648]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.468671]  ? calculate_sigpending+0x7b/0xa0
[   16.468727]  ? __pfx_kthread+0x10/0x10
[   16.468750]  ret_from_fork+0x116/0x1d0
[   16.468769]  ? __pfx_kthread+0x10/0x10
[   16.468792]  ret_from_fork_asm+0x1a/0x30
[   16.468854]  </TASK>
[   16.468866] 
[   16.476927] Allocated by task 282:
[   16.477140]  kasan_save_stack+0x45/0x70
[   16.477401]  kasan_save_track+0x18/0x40
[   16.477616]  kasan_save_alloc_info+0x3b/0x50
[   16.478038]  __kasan_kmalloc+0xb7/0xc0
[   16.478231]  __kmalloc_cache_noprof+0x189/0x420
[   16.478473]  kasan_atomics+0x95/0x310
[   16.478661]  kunit_try_run_case+0x1a5/0x480
[   16.478875]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.479135]  kthread+0x337/0x6f0
[   16.479317]  ret_from_fork+0x116/0x1d0
[   16.479468]  ret_from_fork_asm+0x1a/0x30
[   16.479665] 
[   16.479759] The buggy address belongs to the object at ffff888102ac2380
[   16.479759]  which belongs to the cache kmalloc-64 of size 64
[   16.480618] The buggy address is located 0 bytes to the right of
[   16.480618]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.481175] 
[   16.481301] The buggy address belongs to the physical page:
[   16.481556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.481903] flags: 0x200000000000000(node=0|zone=2)
[   16.482075] page_type: f5(slab)
[   16.482197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.482562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.482950] page dumped because: kasan: bad access detected
[   16.483226] 
[   16.483337] Memory state around the buggy address:
[   16.483573]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.483827]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.484105] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.484500]                                      ^
[   16.484728]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.484978]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.485210] ==================================================================
[   15.351768] ==================================================================
[   15.352177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.352549] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.352887] 
[   15.353358] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.353411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.353436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.353458] Call Trace:
[   15.353477]  <TASK>
[   15.353496]  dump_stack_lvl+0x73/0xb0
[   15.353539]  print_report+0xd1/0x650
[   15.353563]  ? __virt_addr_valid+0x1db/0x2d0
[   15.353598]  ? kasan_atomics_helper+0x565/0x5450
[   15.353622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.353647]  ? kasan_atomics_helper+0x565/0x5450
[   15.353680]  kasan_report+0x141/0x180
[   15.353703]  ? kasan_atomics_helper+0x565/0x5450
[   15.353740]  kasan_check_range+0x10c/0x1c0
[   15.353765]  __kasan_check_write+0x18/0x20
[   15.353787]  kasan_atomics_helper+0x565/0x5450
[   15.353820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.353844]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.353871]  ? kasan_atomics+0x152/0x310
[   15.353910]  kasan_atomics+0x1dc/0x310
[   15.353954]  ? __pfx_kasan_atomics+0x10/0x10
[   15.353991]  ? __pfx_read_tsc+0x10/0x10
[   15.354015]  ? ktime_get_ts64+0x86/0x230
[   15.354041]  kunit_try_run_case+0x1a5/0x480
[   15.354078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.354126]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.354165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.354190]  ? __kthread_parkme+0x82/0x180
[   15.354213]  ? preempt_count_sub+0x50/0x80
[   15.354296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.354333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.354360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.354416]  kthread+0x337/0x6f0
[   15.354436]  ? trace_preempt_on+0x20/0xc0
[   15.354461]  ? __pfx_kthread+0x10/0x10
[   15.354494]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.354518]  ? calculate_sigpending+0x7b/0xa0
[   15.354544]  ? __pfx_kthread+0x10/0x10
[   15.354566]  ret_from_fork+0x116/0x1d0
[   15.354586]  ? __pfx_kthread+0x10/0x10
[   15.354608]  ret_from_fork_asm+0x1a/0x30
[   15.354640]  </TASK>
[   15.354651] 
[   15.362380] Allocated by task 282:
[   15.362610]  kasan_save_stack+0x45/0x70
[   15.362847]  kasan_save_track+0x18/0x40
[   15.363050]  kasan_save_alloc_info+0x3b/0x50
[   15.363418]  __kasan_kmalloc+0xb7/0xc0
[   15.363678]  __kmalloc_cache_noprof+0x189/0x420
[   15.363954]  kasan_atomics+0x95/0x310
[   15.364159]  kunit_try_run_case+0x1a5/0x480
[   15.364436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.364616]  kthread+0x337/0x6f0
[   15.364737]  ret_from_fork+0x116/0x1d0
[   15.364918]  ret_from_fork_asm+0x1a/0x30
[   15.365161] 
[   15.365295] The buggy address belongs to the object at ffff888102ac2380
[   15.365295]  which belongs to the cache kmalloc-64 of size 64
[   15.365860] The buggy address is located 0 bytes to the right of
[   15.365860]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.366389] 
[   15.366465] The buggy address belongs to the physical page:
[   15.366643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.366996] flags: 0x200000000000000(node=0|zone=2)
[   15.367311] page_type: f5(slab)
[   15.367487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.367892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.368377] page dumped because: kasan: bad access detected
[   15.368549] 
[   15.368618] Memory state around the buggy address:
[   15.368773]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.369103]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.369490] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.369920]                                      ^
[   15.370198]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.370534]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.370755] ==================================================================
[   16.396394] ==================================================================
[   16.396743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.397069] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.397486] 
[   16.397604] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.397649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.397662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.397683] Call Trace:
[   16.397703]  <TASK>
[   16.397720]  dump_stack_lvl+0x73/0xb0
[   16.397753]  print_report+0xd1/0x650
[   16.397801]  ? __virt_addr_valid+0x1db/0x2d0
[   16.397826]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.397849]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.397873]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.397896]  kasan_report+0x141/0x180
[   16.397919]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.397959]  __asan_report_load8_noabort+0x18/0x20
[   16.398006]  kasan_atomics_helper+0x4f98/0x5450
[   16.398029]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.398053]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.398080]  ? kasan_atomics+0x152/0x310
[   16.398107]  kasan_atomics+0x1dc/0x310
[   16.398130]  ? __pfx_kasan_atomics+0x10/0x10
[   16.398171]  ? __pfx_read_tsc+0x10/0x10
[   16.398194]  ? ktime_get_ts64+0x86/0x230
[   16.398219]  kunit_try_run_case+0x1a5/0x480
[   16.398245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.398276]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.398301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.398326]  ? __kthread_parkme+0x82/0x180
[   16.398348]  ? preempt_count_sub+0x50/0x80
[   16.398404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.398430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.398456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.398482]  kthread+0x337/0x6f0
[   16.398501]  ? trace_preempt_on+0x20/0xc0
[   16.398526]  ? __pfx_kthread+0x10/0x10
[   16.398548]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.398571]  ? calculate_sigpending+0x7b/0xa0
[   16.398596]  ? __pfx_kthread+0x10/0x10
[   16.398618]  ret_from_fork+0x116/0x1d0
[   16.398638]  ? __pfx_kthread+0x10/0x10
[   16.398659]  ret_from_fork_asm+0x1a/0x30
[   16.398691]  </TASK>
[   16.398703] 
[   16.405814] Allocated by task 282:
[   16.405990]  kasan_save_stack+0x45/0x70
[   16.406133]  kasan_save_track+0x18/0x40
[   16.406293]  kasan_save_alloc_info+0x3b/0x50
[   16.406526]  __kasan_kmalloc+0xb7/0xc0
[   16.406720]  __kmalloc_cache_noprof+0x189/0x420
[   16.406951]  kasan_atomics+0x95/0x310
[   16.407140]  kunit_try_run_case+0x1a5/0x480
[   16.407375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.407572]  kthread+0x337/0x6f0
[   16.407693]  ret_from_fork+0x116/0x1d0
[   16.407824]  ret_from_fork_asm+0x1a/0x30
[   16.407971] 
[   16.408069] The buggy address belongs to the object at ffff888102ac2380
[   16.408069]  which belongs to the cache kmalloc-64 of size 64
[   16.408614] The buggy address is located 0 bytes to the right of
[   16.408614]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.409086] 
[   16.409159] The buggy address belongs to the physical page:
[   16.409354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.409643] flags: 0x200000000000000(node=0|zone=2)
[   16.409900] page_type: f5(slab)
[   16.410099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.410486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.410834] page dumped because: kasan: bad access detected
[   16.411093] 
[   16.411178] Memory state around the buggy address:
[   16.411357]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.411601]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.411914] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.412280]                                      ^
[   16.412453]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.412668]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.412931] ==================================================================
[   16.343066] ==================================================================
[   16.343458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.343783] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.344228] 
[   16.344373] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.344420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.344454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.344476] Call Trace:
[   16.344496]  <TASK>
[   16.344517]  dump_stack_lvl+0x73/0xb0
[   16.344551]  print_report+0xd1/0x650
[   16.344575]  ? __virt_addr_valid+0x1db/0x2d0
[   16.344619]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.344643]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.344668]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.344691]  kasan_report+0x141/0x180
[   16.344714]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.344742]  kasan_check_range+0x10c/0x1c0
[   16.344766]  __kasan_check_write+0x18/0x20
[   16.344786]  kasan_atomics_helper+0x1f43/0x5450
[   16.344810]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.344850]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.344877]  ? kasan_atomics+0x152/0x310
[   16.344905]  kasan_atomics+0x1dc/0x310
[   16.344927]  ? __pfx_kasan_atomics+0x10/0x10
[   16.344965]  ? __pfx_read_tsc+0x10/0x10
[   16.344988]  ? ktime_get_ts64+0x86/0x230
[   16.345014]  kunit_try_run_case+0x1a5/0x480
[   16.345057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.345081]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.345108]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.345134]  ? __kthread_parkme+0x82/0x180
[   16.345158]  ? preempt_count_sub+0x50/0x80
[   16.345184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.345230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.345276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.345304]  kthread+0x337/0x6f0
[   16.345324]  ? trace_preempt_on+0x20/0xc0
[   16.345349]  ? __pfx_kthread+0x10/0x10
[   16.345370]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.345413]  ? calculate_sigpending+0x7b/0xa0
[   16.345439]  ? __pfx_kthread+0x10/0x10
[   16.345461]  ret_from_fork+0x116/0x1d0
[   16.345480]  ? __pfx_kthread+0x10/0x10
[   16.345503]  ret_from_fork_asm+0x1a/0x30
[   16.345534]  </TASK>
[   16.345546] 
[   16.352743] Allocated by task 282:
[   16.352959]  kasan_save_stack+0x45/0x70
[   16.353206]  kasan_save_track+0x18/0x40
[   16.353425]  kasan_save_alloc_info+0x3b/0x50
[   16.353641]  __kasan_kmalloc+0xb7/0xc0
[   16.353829]  __kmalloc_cache_noprof+0x189/0x420
[   16.354040]  kasan_atomics+0x95/0x310
[   16.354228]  kunit_try_run_case+0x1a5/0x480
[   16.354441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.354690]  kthread+0x337/0x6f0
[   16.354874]  ret_from_fork+0x116/0x1d0
[   16.355053]  ret_from_fork_asm+0x1a/0x30
[   16.355273] 
[   16.355388] The buggy address belongs to the object at ffff888102ac2380
[   16.355388]  which belongs to the cache kmalloc-64 of size 64
[   16.355866] The buggy address is located 0 bytes to the right of
[   16.355866]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.356241] 
[   16.356337] The buggy address belongs to the physical page:
[   16.356639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.357005] flags: 0x200000000000000(node=0|zone=2)
[   16.357242] page_type: f5(slab)
[   16.357450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.357786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.358149] page dumped because: kasan: bad access detected
[   16.358339] 
[   16.358409] Memory state around the buggy address:
[   16.358564]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.358830]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.359189] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.359564]                                      ^
[   16.359821]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360103]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.360415] ==================================================================
[   15.544611] ==================================================================
[   15.544863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.545144] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.545397] 
[   15.545489] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.545535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.545548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.545570] Call Trace:
[   15.545583]  <TASK>
[   15.545600]  dump_stack_lvl+0x73/0xb0
[   15.545632]  print_report+0xd1/0x650
[   15.545656]  ? __virt_addr_valid+0x1db/0x2d0
[   15.545681]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.545703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.545728]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.545751]  kasan_report+0x141/0x180
[   15.545774]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.545800]  kasan_check_range+0x10c/0x1c0
[   15.545825]  __kasan_check_write+0x18/0x20
[   15.545845]  kasan_atomics_helper+0xb6a/0x5450
[   15.545868]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.545892]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.545918]  ? kasan_atomics+0x152/0x310
[   15.545957]  kasan_atomics+0x1dc/0x310
[   15.545980]  ? __pfx_kasan_atomics+0x10/0x10
[   15.546006]  ? __pfx_read_tsc+0x10/0x10
[   15.546030]  ? ktime_get_ts64+0x86/0x230
[   15.546056]  kunit_try_run_case+0x1a5/0x480
[   15.546081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.546106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.546131]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.546157]  ? __kthread_parkme+0x82/0x180
[   15.546179]  ? preempt_count_sub+0x50/0x80
[   15.546205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.546232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.546280]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.546307]  kthread+0x337/0x6f0
[   15.546327]  ? trace_preempt_on+0x20/0xc0
[   15.546352]  ? __pfx_kthread+0x10/0x10
[   15.546374]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.546397]  ? calculate_sigpending+0x7b/0xa0
[   15.546422]  ? __pfx_kthread+0x10/0x10
[   15.546445]  ret_from_fork+0x116/0x1d0
[   15.546463]  ? __pfx_kthread+0x10/0x10
[   15.546486]  ret_from_fork_asm+0x1a/0x30
[   15.546520]  </TASK>
[   15.546532] 
[   15.553635] Allocated by task 282:
[   15.553835]  kasan_save_stack+0x45/0x70
[   15.554025]  kasan_save_track+0x18/0x40
[   15.554211]  kasan_save_alloc_info+0x3b/0x50
[   15.554385]  __kasan_kmalloc+0xb7/0xc0
[   15.554557]  __kmalloc_cache_noprof+0x189/0x420
[   15.554788]  kasan_atomics+0x95/0x310
[   15.554989]  kunit_try_run_case+0x1a5/0x480
[   15.555205]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.555450]  kthread+0x337/0x6f0
[   15.555596]  ret_from_fork+0x116/0x1d0
[   15.555776]  ret_from_fork_asm+0x1a/0x30
[   15.555965] 
[   15.556066] The buggy address belongs to the object at ffff888102ac2380
[   15.556066]  which belongs to the cache kmalloc-64 of size 64
[   15.556553] The buggy address is located 0 bytes to the right of
[   15.556553]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.556984] 
[   15.557057] The buggy address belongs to the physical page:
[   15.557230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.557489] flags: 0x200000000000000(node=0|zone=2)
[   15.557653] page_type: f5(slab)
[   15.557774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.558123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.558482] page dumped because: kasan: bad access detected
[   15.558734] 
[   15.558826] Memory state around the buggy address:
[   15.559056]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.559383]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.559598] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.559807]                                      ^
[   15.559969]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.560182]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.560476] ==================================================================
[   15.505772] ==================================================================
[   15.506420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.506956] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.507264] 
[   15.507382] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.507434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.507447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.507468] Call Trace:
[   15.507488]  <TASK>
[   15.507508]  dump_stack_lvl+0x73/0xb0
[   15.507540]  print_report+0xd1/0x650
[   15.507563]  ? __virt_addr_valid+0x1db/0x2d0
[   15.507587]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.507609]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.507634]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.507657]  kasan_report+0x141/0x180
[   15.507679]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.507707]  kasan_check_range+0x10c/0x1c0
[   15.507731]  __kasan_check_write+0x18/0x20
[   15.507751]  kasan_atomics_helper+0xa2b/0x5450
[   15.507775]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.507798]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.507824]  ? kasan_atomics+0x152/0x310
[   15.507852]  kasan_atomics+0x1dc/0x310
[   15.507875]  ? __pfx_kasan_atomics+0x10/0x10
[   15.507901]  ? __pfx_read_tsc+0x10/0x10
[   15.507923]  ? ktime_get_ts64+0x86/0x230
[   15.507960]  kunit_try_run_case+0x1a5/0x480
[   15.507985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.508010]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.508035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.508060]  ? __kthread_parkme+0x82/0x180
[   15.508082]  ? preempt_count_sub+0x50/0x80
[   15.508107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.508133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.508158]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.508184]  kthread+0x337/0x6f0
[   15.508204]  ? trace_preempt_on+0x20/0xc0
[   15.508228]  ? __pfx_kthread+0x10/0x10
[   15.508249]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.508282]  ? calculate_sigpending+0x7b/0xa0
[   15.508307]  ? __pfx_kthread+0x10/0x10
[   15.508330]  ret_from_fork+0x116/0x1d0
[   15.508350]  ? __pfx_kthread+0x10/0x10
[   15.508371]  ret_from_fork_asm+0x1a/0x30
[   15.508403]  </TASK>
[   15.508415] 
[   15.515884] Allocated by task 282:
[   15.516071]  kasan_save_stack+0x45/0x70
[   15.516269]  kasan_save_track+0x18/0x40
[   15.516422]  kasan_save_alloc_info+0x3b/0x50
[   15.516571]  __kasan_kmalloc+0xb7/0xc0
[   15.516704]  __kmalloc_cache_noprof+0x189/0x420
[   15.516860]  kasan_atomics+0x95/0x310
[   15.517125]  kunit_try_run_case+0x1a5/0x480
[   15.517422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.517679]  kthread+0x337/0x6f0
[   15.517852]  ret_from_fork+0x116/0x1d0
[   15.518055]  ret_from_fork_asm+0x1a/0x30
[   15.518252] 
[   15.518355] The buggy address belongs to the object at ffff888102ac2380
[   15.518355]  which belongs to the cache kmalloc-64 of size 64
[   15.518846] The buggy address is located 0 bytes to the right of
[   15.518846]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.519338] 
[   15.519435] The buggy address belongs to the physical page:
[   15.519666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.520006] flags: 0x200000000000000(node=0|zone=2)
[   15.520201] page_type: f5(slab)
[   15.520389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.520628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.520896] page dumped because: kasan: bad access detected
[   15.521171] 
[   15.521275] Memory state around the buggy address:
[   15.521506]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.521778]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.522074] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.522369]                                      ^
[   15.522537]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.522790]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.523126] ==================================================================
[   16.011330] ==================================================================
[   16.011884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   16.012270] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.012684] 
[   16.012775] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.012817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.012830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.012850] Call Trace:
[   16.012869]  <TASK>
[   16.012887]  dump_stack_lvl+0x73/0xb0
[   16.012918]  print_report+0xd1/0x650
[   16.012954]  ? __virt_addr_valid+0x1db/0x2d0
[   16.012977]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.013000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.013024]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.013046]  kasan_report+0x141/0x180
[   16.013068]  ? kasan_atomics_helper+0x15b6/0x5450
[   16.013096]  kasan_check_range+0x10c/0x1c0
[   16.013121]  __kasan_check_write+0x18/0x20
[   16.013142]  kasan_atomics_helper+0x15b6/0x5450
[   16.013166]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.013190]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.013217]  ? kasan_atomics+0x152/0x310
[   16.013244]  kasan_atomics+0x1dc/0x310
[   16.013276]  ? __pfx_kasan_atomics+0x10/0x10
[   16.013302]  ? __pfx_read_tsc+0x10/0x10
[   16.013324]  ? ktime_get_ts64+0x86/0x230
[   16.013349]  kunit_try_run_case+0x1a5/0x480
[   16.013375]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.013400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.013427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.013452]  ? __kthread_parkme+0x82/0x180
[   16.013474]  ? preempt_count_sub+0x50/0x80
[   16.013499]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.013525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.013550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.013577]  kthread+0x337/0x6f0
[   16.013596]  ? trace_preempt_on+0x20/0xc0
[   16.013621]  ? __pfx_kthread+0x10/0x10
[   16.013643]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.013666]  ? calculate_sigpending+0x7b/0xa0
[   16.013691]  ? __pfx_kthread+0x10/0x10
[   16.013713]  ret_from_fork+0x116/0x1d0
[   16.013733]  ? __pfx_kthread+0x10/0x10
[   16.013756]  ret_from_fork_asm+0x1a/0x30
[   16.013788]  </TASK>
[   16.013800] 
[   16.021085] Allocated by task 282:
[   16.021265]  kasan_save_stack+0x45/0x70
[   16.021568]  kasan_save_track+0x18/0x40
[   16.021757]  kasan_save_alloc_info+0x3b/0x50
[   16.021977]  __kasan_kmalloc+0xb7/0xc0
[   16.022162]  __kmalloc_cache_noprof+0x189/0x420
[   16.022529]  kasan_atomics+0x95/0x310
[   16.022715]  kunit_try_run_case+0x1a5/0x480
[   16.022861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.023107]  kthread+0x337/0x6f0
[   16.023287]  ret_from_fork+0x116/0x1d0
[   16.023479]  ret_from_fork_asm+0x1a/0x30
[   16.023656] 
[   16.023725] The buggy address belongs to the object at ffff888102ac2380
[   16.023725]  which belongs to the cache kmalloc-64 of size 64
[   16.024091] The buggy address is located 0 bytes to the right of
[   16.024091]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.024909] 
[   16.024999] The buggy address belongs to the physical page:
[   16.025229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.025589] flags: 0x200000000000000(node=0|zone=2)
[   16.025809] page_type: f5(slab)
[   16.025956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.026258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.026583] page dumped because: kasan: bad access detected
[   16.026803] 
[   16.026895] Memory state around the buggy address:
[   16.027103]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.027438]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.027725] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.027948]                                      ^
[   16.028100]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.028350]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.028663] ==================================================================
[   15.524047] ==================================================================
[   15.524685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.525059] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.525371] 
[   15.525462] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.525507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.525520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.525541] Call Trace:
[   15.525560]  <TASK>
[   15.525578]  dump_stack_lvl+0x73/0xb0
[   15.525609]  print_report+0xd1/0x650
[   15.525633]  ? __virt_addr_valid+0x1db/0x2d0
[   15.525656]  ? kasan_atomics_helper+0xac7/0x5450
[   15.525679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.525704]  ? kasan_atomics_helper+0xac7/0x5450
[   15.525726]  kasan_report+0x141/0x180
[   15.525750]  ? kasan_atomics_helper+0xac7/0x5450
[   15.525776]  kasan_check_range+0x10c/0x1c0
[   15.525800]  __kasan_check_write+0x18/0x20
[   15.525821]  kasan_atomics_helper+0xac7/0x5450
[   15.525844]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.525869]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.525895]  ? kasan_atomics+0x152/0x310
[   15.525922]  kasan_atomics+0x1dc/0x310
[   15.525956]  ? __pfx_kasan_atomics+0x10/0x10
[   15.525982]  ? __pfx_read_tsc+0x10/0x10
[   15.526004]  ? ktime_get_ts64+0x86/0x230
[   15.526031]  kunit_try_run_case+0x1a5/0x480
[   15.526056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.526080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.526106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.526130]  ? __kthread_parkme+0x82/0x180
[   15.526153]  ? preempt_count_sub+0x50/0x80
[   15.526178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.526203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.526228]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.526254]  kthread+0x337/0x6f0
[   15.526275]  ? trace_preempt_on+0x20/0xc0
[   15.526299]  ? __pfx_kthread+0x10/0x10
[   15.526320]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.526343]  ? calculate_sigpending+0x7b/0xa0
[   15.526368]  ? __pfx_kthread+0x10/0x10
[   15.526390]  ret_from_fork+0x116/0x1d0
[   15.526409]  ? __pfx_kthread+0x10/0x10
[   15.526430]  ret_from_fork_asm+0x1a/0x30
[   15.526463]  </TASK>
[   15.526475] 
[   15.535858] Allocated by task 282:
[   15.536021]  kasan_save_stack+0x45/0x70
[   15.536173]  kasan_save_track+0x18/0x40
[   15.536310]  kasan_save_alloc_info+0x3b/0x50
[   15.536461]  __kasan_kmalloc+0xb7/0xc0
[   15.536593]  __kmalloc_cache_noprof+0x189/0x420
[   15.536758]  kasan_atomics+0x95/0x310
[   15.536892]  kunit_try_run_case+0x1a5/0x480
[   15.537089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.537288]  kthread+0x337/0x6f0
[   15.537412]  ret_from_fork+0x116/0x1d0
[   15.537544]  ret_from_fork_asm+0x1a/0x30
[   15.537773] 
[   15.537871] The buggy address belongs to the object at ffff888102ac2380
[   15.537871]  which belongs to the cache kmalloc-64 of size 64
[   15.539127] The buggy address is located 0 bytes to the right of
[   15.539127]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.539912] 
[   15.540044] The buggy address belongs to the physical page:
[   15.540316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.540645] flags: 0x200000000000000(node=0|zone=2)
[   15.540881] page_type: f5(slab)
[   15.541132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.541394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.541622] page dumped because: kasan: bad access detected
[   15.541794] 
[   15.541865] Memory state around the buggy address:
[   15.542058]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.542301]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.542525] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.542745]                                      ^
[   15.542966]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.543317]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.543642] ==================================================================
[   16.103459] ==================================================================
[   16.103761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.104137] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.104456] 
[   16.104561] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.104605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.104618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.104639] Call Trace:
[   16.104660]  <TASK>
[   16.104680]  dump_stack_lvl+0x73/0xb0
[   16.104712]  print_report+0xd1/0x650
[   16.104737]  ? __virt_addr_valid+0x1db/0x2d0
[   16.104761]  ? kasan_atomics_helper+0x1818/0x5450
[   16.104784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.104807]  ? kasan_atomics_helper+0x1818/0x5450
[   16.104831]  kasan_report+0x141/0x180
[   16.104853]  ? kasan_atomics_helper+0x1818/0x5450
[   16.104880]  kasan_check_range+0x10c/0x1c0
[   16.104905]  __kasan_check_write+0x18/0x20
[   16.104925]  kasan_atomics_helper+0x1818/0x5450
[   16.104960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.104984]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.105010]  ? kasan_atomics+0x152/0x310
[   16.105037]  kasan_atomics+0x1dc/0x310
[   16.105061]  ? __pfx_kasan_atomics+0x10/0x10
[   16.105087]  ? __pfx_read_tsc+0x10/0x10
[   16.105110]  ? ktime_get_ts64+0x86/0x230
[   16.105135]  kunit_try_run_case+0x1a5/0x480
[   16.105160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.105185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.105210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.105235]  ? __kthread_parkme+0x82/0x180
[   16.105277]  ? preempt_count_sub+0x50/0x80
[   16.105303]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.105329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.105355]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.105381]  kthread+0x337/0x6f0
[   16.105402]  ? trace_preempt_on+0x20/0xc0
[   16.105427]  ? __pfx_kthread+0x10/0x10
[   16.105448]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.105470]  ? calculate_sigpending+0x7b/0xa0
[   16.105495]  ? __pfx_kthread+0x10/0x10
[   16.105518]  ret_from_fork+0x116/0x1d0
[   16.105537]  ? __pfx_kthread+0x10/0x10
[   16.105559]  ret_from_fork_asm+0x1a/0x30
[   16.105591]  </TASK>
[   16.105602] 
[   16.112628] Allocated by task 282:
[   16.112815]  kasan_save_stack+0x45/0x70
[   16.113024]  kasan_save_track+0x18/0x40
[   16.113213]  kasan_save_alloc_info+0x3b/0x50
[   16.113420]  __kasan_kmalloc+0xb7/0xc0
[   16.113561]  __kmalloc_cache_noprof+0x189/0x420
[   16.113717]  kasan_atomics+0x95/0x310
[   16.113880]  kunit_try_run_case+0x1a5/0x480
[   16.114123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.114400]  kthread+0x337/0x6f0
[   16.114573]  ret_from_fork+0x116/0x1d0
[   16.114764]  ret_from_fork_asm+0x1a/0x30
[   16.114978] 
[   16.115074] The buggy address belongs to the object at ffff888102ac2380
[   16.115074]  which belongs to the cache kmalloc-64 of size 64
[   16.115542] The buggy address is located 0 bytes to the right of
[   16.115542]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.115956] 
[   16.116029] The buggy address belongs to the physical page:
[   16.116200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.116515] flags: 0x200000000000000(node=0|zone=2)
[   16.116747] page_type: f5(slab)
[   16.116918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.117278] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.117580] page dumped because: kasan: bad access detected
[   16.117778] 
[   16.117846] Memory state around the buggy address:
[   16.118010]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.118249]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.118589] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.118903]                                      ^
[   16.119140]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.119488]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.119759] ==================================================================
[   16.189012] ==================================================================
[   16.189347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.189653] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.189970] 
[   16.190063] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.190106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.190120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.190141] Call Trace:
[   16.190159]  <TASK>
[   16.190178]  dump_stack_lvl+0x73/0xb0
[   16.190208]  print_report+0xd1/0x650
[   16.190232]  ? __virt_addr_valid+0x1db/0x2d0
[   16.190277]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.190301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.190326]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.190349]  kasan_report+0x141/0x180
[   16.190372]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.190399]  kasan_check_range+0x10c/0x1c0
[   16.190424]  __kasan_check_write+0x18/0x20
[   16.190444]  kasan_atomics_helper+0x1b22/0x5450
[   16.190468]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.190492]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.190519]  ? kasan_atomics+0x152/0x310
[   16.190546]  kasan_atomics+0x1dc/0x310
[   16.190569]  ? __pfx_kasan_atomics+0x10/0x10
[   16.190595]  ? __pfx_read_tsc+0x10/0x10
[   16.190617]  ? ktime_get_ts64+0x86/0x230
[   16.190643]  kunit_try_run_case+0x1a5/0x480
[   16.190669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.190692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.190727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.190752]  ? __kthread_parkme+0x82/0x180
[   16.190774]  ? preempt_count_sub+0x50/0x80
[   16.190799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.190823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.190849]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.190876]  kthread+0x337/0x6f0
[   16.190896]  ? trace_preempt_on+0x20/0xc0
[   16.190921]  ? __pfx_kthread+0x10/0x10
[   16.190953]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.190975]  ? calculate_sigpending+0x7b/0xa0
[   16.191001]  ? __pfx_kthread+0x10/0x10
[   16.191023]  ret_from_fork+0x116/0x1d0
[   16.191042]  ? __pfx_kthread+0x10/0x10
[   16.191063]  ret_from_fork_asm+0x1a/0x30
[   16.191095]  </TASK>
[   16.191107] 
[   16.198179] Allocated by task 282:
[   16.198382]  kasan_save_stack+0x45/0x70
[   16.198543]  kasan_save_track+0x18/0x40
[   16.198677]  kasan_save_alloc_info+0x3b/0x50
[   16.198829]  __kasan_kmalloc+0xb7/0xc0
[   16.198972]  __kmalloc_cache_noprof+0x189/0x420
[   16.199129]  kasan_atomics+0x95/0x310
[   16.199279]  kunit_try_run_case+0x1a5/0x480
[   16.199489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.199740]  kthread+0x337/0x6f0
[   16.199908]  ret_from_fork+0x116/0x1d0
[   16.200118]  ret_from_fork_asm+0x1a/0x30
[   16.200344] 
[   16.200443] The buggy address belongs to the object at ffff888102ac2380
[   16.200443]  which belongs to the cache kmalloc-64 of size 64
[   16.200996] The buggy address is located 0 bytes to the right of
[   16.200996]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.201566] 
[   16.201647] The buggy address belongs to the physical page:
[   16.201865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.202159] flags: 0x200000000000000(node=0|zone=2)
[   16.202366] page_type: f5(slab)
[   16.202538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.202887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.203238] page dumped because: kasan: bad access detected
[   16.203457] 
[   16.203537] Memory state around the buggy address:
[   16.203761]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.204069]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.204327] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.204539]                                      ^
[   16.204693]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.204911]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205232] ==================================================================
[   15.706444] ==================================================================
[   15.706909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.707279] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.707569] 
[   15.707659] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.707703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.707716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.707737] Call Trace:
[   15.707757]  <TASK>
[   15.707777]  dump_stack_lvl+0x73/0xb0
[   15.707808]  print_report+0xd1/0x650
[   15.707832]  ? __virt_addr_valid+0x1db/0x2d0
[   15.707855]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.707878]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.707902]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.707924]  kasan_report+0x141/0x180
[   15.707959]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.707986]  kasan_check_range+0x10c/0x1c0
[   15.708010]  __kasan_check_write+0x18/0x20
[   15.708040]  kasan_atomics_helper+0xfa9/0x5450
[   15.708065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.708088]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.708134]  ? kasan_atomics+0x152/0x310
[   15.708161]  kasan_atomics+0x1dc/0x310
[   15.708185]  ? __pfx_kasan_atomics+0x10/0x10
[   15.708221]  ? __pfx_read_tsc+0x10/0x10
[   15.708245]  ? ktime_get_ts64+0x86/0x230
[   15.708288]  kunit_try_run_case+0x1a5/0x480
[   15.708314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.708349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.708375]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.708400]  ? __kthread_parkme+0x82/0x180
[   15.708421]  ? preempt_count_sub+0x50/0x80
[   15.708447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.708472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.708498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.708524]  kthread+0x337/0x6f0
[   15.708543]  ? trace_preempt_on+0x20/0xc0
[   15.708568]  ? __pfx_kthread+0x10/0x10
[   15.708599]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.708622]  ? calculate_sigpending+0x7b/0xa0
[   15.708647]  ? __pfx_kthread+0x10/0x10
[   15.708680]  ret_from_fork+0x116/0x1d0
[   15.708699]  ? __pfx_kthread+0x10/0x10
[   15.708721]  ret_from_fork_asm+0x1a/0x30
[   15.708753]  </TASK>
[   15.708765] 
[   15.716563] Allocated by task 282:
[   15.716753]  kasan_save_stack+0x45/0x70
[   15.716969]  kasan_save_track+0x18/0x40
[   15.717161]  kasan_save_alloc_info+0x3b/0x50
[   15.717389]  __kasan_kmalloc+0xb7/0xc0
[   15.717577]  __kmalloc_cache_noprof+0x189/0x420
[   15.717736]  kasan_atomics+0x95/0x310
[   15.717870]  kunit_try_run_case+0x1a5/0x480
[   15.718029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.718296]  kthread+0x337/0x6f0
[   15.718464]  ret_from_fork+0x116/0x1d0
[   15.718650]  ret_from_fork_asm+0x1a/0x30
[   15.718854] 
[   15.719029] The buggy address belongs to the object at ffff888102ac2380
[   15.719029]  which belongs to the cache kmalloc-64 of size 64
[   15.719578] The buggy address is located 0 bytes to the right of
[   15.719578]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.719953] 
[   15.720050] The buggy address belongs to the physical page:
[   15.720301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.720685] flags: 0x200000000000000(node=0|zone=2)
[   15.721051] page_type: f5(slab)
[   15.721173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.721752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.722094] page dumped because: kasan: bad access detected
[   15.722384] 
[   15.722460] Memory state around the buggy address:
[   15.722661]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.722922]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.723283] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.723591]                                      ^
[   15.723796]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.724113]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.724429] ==================================================================
[   16.205888] ==================================================================
[   16.206292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.206577] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.206805] 
[   16.206893] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.206945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.206958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.206980] Call Trace:
[   16.206999]  <TASK>
[   16.207017]  dump_stack_lvl+0x73/0xb0
[   16.207048]  print_report+0xd1/0x650
[   16.207071]  ? __virt_addr_valid+0x1db/0x2d0
[   16.207095]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.207118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.207143]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.207166]  kasan_report+0x141/0x180
[   16.207189]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.207217]  kasan_check_range+0x10c/0x1c0
[   16.207241]  __kasan_check_write+0x18/0x20
[   16.207282]  kasan_atomics_helper+0x1c18/0x5450
[   16.207308]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.207332]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.207359]  ? kasan_atomics+0x152/0x310
[   16.207386]  kasan_atomics+0x1dc/0x310
[   16.207409]  ? __pfx_kasan_atomics+0x10/0x10
[   16.207435]  ? __pfx_read_tsc+0x10/0x10
[   16.207457]  ? ktime_get_ts64+0x86/0x230
[   16.207482]  kunit_try_run_case+0x1a5/0x480
[   16.207508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.207531]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.207557]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.207582]  ? __kthread_parkme+0x82/0x180
[   16.207604]  ? preempt_count_sub+0x50/0x80
[   16.207629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.207654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.207682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.207708]  kthread+0x337/0x6f0
[   16.207727]  ? trace_preempt_on+0x20/0xc0
[   16.207752]  ? __pfx_kthread+0x10/0x10
[   16.207773]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.207796]  ? calculate_sigpending+0x7b/0xa0
[   16.207821]  ? __pfx_kthread+0x10/0x10
[   16.207843]  ret_from_fork+0x116/0x1d0
[   16.207862]  ? __pfx_kthread+0x10/0x10
[   16.207883]  ret_from_fork_asm+0x1a/0x30
[   16.207915]  </TASK>
[   16.207926] 
[   16.215050] Allocated by task 282:
[   16.215234]  kasan_save_stack+0x45/0x70
[   16.215454]  kasan_save_track+0x18/0x40
[   16.215652]  kasan_save_alloc_info+0x3b/0x50
[   16.215869]  __kasan_kmalloc+0xb7/0xc0
[   16.216068]  __kmalloc_cache_noprof+0x189/0x420
[   16.216317]  kasan_atomics+0x95/0x310
[   16.216507]  kunit_try_run_case+0x1a5/0x480
[   16.216719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.216960]  kthread+0x337/0x6f0
[   16.217082]  ret_from_fork+0x116/0x1d0
[   16.217293]  ret_from_fork_asm+0x1a/0x30
[   16.217501] 
[   16.217599] The buggy address belongs to the object at ffff888102ac2380
[   16.217599]  which belongs to the cache kmalloc-64 of size 64
[   16.218087] The buggy address is located 0 bytes to the right of
[   16.218087]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.218556] 
[   16.218656] The buggy address belongs to the physical page:
[   16.218904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.219152] flags: 0x200000000000000(node=0|zone=2)
[   16.219339] page_type: f5(slab)
[   16.219463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.219691] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.219963] page dumped because: kasan: bad access detected
[   16.220209] 
[   16.220328] Memory state around the buggy address:
[   16.220551]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.220864]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.221187] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.221528]                                      ^
[   16.221752]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.222074]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.222401] ==================================================================
[   15.487259] ==================================================================
[   15.488001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.488251] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.488478] 
[   15.488565] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.488608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.488621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.488651] Call Trace:
[   15.488669]  <TASK>
[   15.488686]  dump_stack_lvl+0x73/0xb0
[   15.488716]  print_report+0xd1/0x650
[   15.488740]  ? __virt_addr_valid+0x1db/0x2d0
[   15.488764]  ? kasan_atomics_helper+0x992/0x5450
[   15.488787]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.488812]  ? kasan_atomics_helper+0x992/0x5450
[   15.488835]  kasan_report+0x141/0x180
[   15.488857]  ? kasan_atomics_helper+0x992/0x5450
[   15.488885]  kasan_check_range+0x10c/0x1c0
[   15.488909]  __kasan_check_write+0x18/0x20
[   15.488930]  kasan_atomics_helper+0x992/0x5450
[   15.488965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.488989]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.489016]  ? kasan_atomics+0x152/0x310
[   15.489043]  kasan_atomics+0x1dc/0x310
[   15.489067]  ? __pfx_kasan_atomics+0x10/0x10
[   15.489093]  ? __pfx_read_tsc+0x10/0x10
[   15.489115]  ? ktime_get_ts64+0x86/0x230
[   15.489140]  kunit_try_run_case+0x1a5/0x480
[   15.489165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.489188]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.489214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.489240]  ? __kthread_parkme+0x82/0x180
[   15.489264]  ? preempt_count_sub+0x50/0x80
[   15.489291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.489317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.489342]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.489369]  kthread+0x337/0x6f0
[   15.489389]  ? trace_preempt_on+0x20/0xc0
[   15.489414]  ? __pfx_kthread+0x10/0x10
[   15.489435]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.489458]  ? calculate_sigpending+0x7b/0xa0
[   15.489484]  ? __pfx_kthread+0x10/0x10
[   15.489508]  ret_from_fork+0x116/0x1d0
[   15.489527]  ? __pfx_kthread+0x10/0x10
[   15.489549]  ret_from_fork_asm+0x1a/0x30
[   15.489581]  </TASK>
[   15.489592] 
[   15.497439] Allocated by task 282:
[   15.497588]  kasan_save_stack+0x45/0x70
[   15.497740]  kasan_save_track+0x18/0x40
[   15.497874]  kasan_save_alloc_info+0x3b/0x50
[   15.498035]  __kasan_kmalloc+0xb7/0xc0
[   15.498214]  __kmalloc_cache_noprof+0x189/0x420
[   15.498575]  kasan_atomics+0x95/0x310
[   15.498770]  kunit_try_run_case+0x1a5/0x480
[   15.498985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.499240]  kthread+0x337/0x6f0
[   15.499419]  ret_from_fork+0x116/0x1d0
[   15.499606]  ret_from_fork_asm+0x1a/0x30
[   15.499800] 
[   15.499894] The buggy address belongs to the object at ffff888102ac2380
[   15.499894]  which belongs to the cache kmalloc-64 of size 64
[   15.500439] The buggy address is located 0 bytes to the right of
[   15.500439]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.500851] 
[   15.500924] The buggy address belongs to the physical page:
[   15.501105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.501552] flags: 0x200000000000000(node=0|zone=2)
[   15.501793] page_type: f5(slab)
[   15.501976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.502355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.502585] page dumped because: kasan: bad access detected
[   15.502761] 
[   15.502860] Memory state around the buggy address:
[   15.503094]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.503414]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.503770] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.503989]                                      ^
[   15.504142]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.504595]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.504911] ==================================================================
[   15.276339] ==================================================================
[   15.276718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.278205] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.278458] 
[   15.278557] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.278603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.278616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.278639] Call Trace:
[   15.278652]  <TASK>
[   15.278672]  dump_stack_lvl+0x73/0xb0
[   15.278709]  print_report+0xd1/0x650
[   15.278733]  ? __virt_addr_valid+0x1db/0x2d0
[   15.278758]  ? kasan_atomics_helper+0x3df/0x5450
[   15.278782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.278807]  ? kasan_atomics_helper+0x3df/0x5450
[   15.278830]  kasan_report+0x141/0x180
[   15.278853]  ? kasan_atomics_helper+0x3df/0x5450
[   15.278879]  kasan_check_range+0x10c/0x1c0
[   15.278904]  __kasan_check_read+0x15/0x20
[   15.278924]  kasan_atomics_helper+0x3df/0x5450
[   15.278964]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.278988]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.279015]  ? kasan_atomics+0x152/0x310
[   15.279041]  kasan_atomics+0x1dc/0x310
[   15.279065]  ? __pfx_kasan_atomics+0x10/0x10
[   15.279089]  ? __pfx_read_tsc+0x10/0x10
[   15.279112]  ? ktime_get_ts64+0x86/0x230
[   15.279137]  kunit_try_run_case+0x1a5/0x480
[   15.279163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.279187]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.279213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.279237]  ? __kthread_parkme+0x82/0x180
[   15.279259]  ? preempt_count_sub+0x50/0x80
[   15.279284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.279309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.279334]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.279360]  kthread+0x337/0x6f0
[   15.279380]  ? trace_preempt_on+0x20/0xc0
[   15.279405]  ? __pfx_kthread+0x10/0x10
[   15.279427]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.279450]  ? calculate_sigpending+0x7b/0xa0
[   15.279475]  ? __pfx_kthread+0x10/0x10
[   15.279497]  ret_from_fork+0x116/0x1d0
[   15.279795]  ? __pfx_kthread+0x10/0x10
[   15.279829]  ret_from_fork_asm+0x1a/0x30
[   15.279863]  </TASK>
[   15.279877] 
[   15.288871] Allocated by task 282:
[   15.289081]  kasan_save_stack+0x45/0x70
[   15.289297]  kasan_save_track+0x18/0x40
[   15.289438]  kasan_save_alloc_info+0x3b/0x50
[   15.289588]  __kasan_kmalloc+0xb7/0xc0
[   15.289734]  __kmalloc_cache_noprof+0x189/0x420
[   15.289966]  kasan_atomics+0x95/0x310
[   15.290160]  kunit_try_run_case+0x1a5/0x480
[   15.290395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.290646]  kthread+0x337/0x6f0
[   15.290817]  ret_from_fork+0x116/0x1d0
[   15.291018]  ret_from_fork_asm+0x1a/0x30
[   15.291163] 
[   15.291235] The buggy address belongs to the object at ffff888102ac2380
[   15.291235]  which belongs to the cache kmalloc-64 of size 64
[   15.291719] The buggy address is located 0 bytes to the right of
[   15.291719]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.292301] 
[   15.292402] The buggy address belongs to the physical page:
[   15.292623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.292923] flags: 0x200000000000000(node=0|zone=2)
[   15.293161] page_type: f5(slab)
[   15.293332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.293629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.293948] page dumped because: kasan: bad access detected
[   15.294168] 
[   15.294247] Memory state around the buggy address:
[   15.294452]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.294739]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.295057] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.295367]                                      ^
[   15.295588]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.295850]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.296150] ==================================================================
[   15.231782] ==================================================================
[   15.232493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.232771] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.233207] 
[   15.233326] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.233370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.233381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.233402] Call Trace:
[   15.233414]  <TASK>
[   15.233430]  dump_stack_lvl+0x73/0xb0
[   15.233462]  print_report+0xd1/0x650
[   15.233483]  ? __virt_addr_valid+0x1db/0x2d0
[   15.233506]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.233528]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.233551]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.233573]  kasan_report+0x141/0x180
[   15.233594]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.233620]  __asan_report_load4_noabort+0x18/0x20
[   15.233645]  kasan_atomics_helper+0x4b88/0x5450
[   15.233667]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.233689]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.233715]  ? kasan_atomics+0x152/0x310
[   15.233740]  kasan_atomics+0x1dc/0x310
[   15.233763]  ? __pfx_kasan_atomics+0x10/0x10
[   15.233787]  ? __pfx_read_tsc+0x10/0x10
[   15.233808]  ? ktime_get_ts64+0x86/0x230
[   15.233833]  kunit_try_run_case+0x1a5/0x480
[   15.233856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.233880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.233904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.233927]  ? __kthread_parkme+0x82/0x180
[   15.234005]  ? preempt_count_sub+0x50/0x80
[   15.234032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.234057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.234082]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.234107]  kthread+0x337/0x6f0
[   15.234126]  ? trace_preempt_on+0x20/0xc0
[   15.234150]  ? __pfx_kthread+0x10/0x10
[   15.234171]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.234193]  ? calculate_sigpending+0x7b/0xa0
[   15.234217]  ? __pfx_kthread+0x10/0x10
[   15.234238]  ret_from_fork+0x116/0x1d0
[   15.234256]  ? __pfx_kthread+0x10/0x10
[   15.234286]  ret_from_fork_asm+0x1a/0x30
[   15.234318]  </TASK>
[   15.234327] 
[   15.242284] Allocated by task 282:
[   15.242433]  kasan_save_stack+0x45/0x70
[   15.242581]  kasan_save_track+0x18/0x40
[   15.242718]  kasan_save_alloc_info+0x3b/0x50
[   15.242863]  __kasan_kmalloc+0xb7/0xc0
[   15.243278]  __kmalloc_cache_noprof+0x189/0x420
[   15.243617]  kasan_atomics+0x95/0x310
[   15.243805]  kunit_try_run_case+0x1a5/0x480
[   15.244022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.244750]  kthread+0x337/0x6f0
[   15.245158]  ret_from_fork+0x116/0x1d0
[   15.245370]  ret_from_fork_asm+0x1a/0x30
[   15.245567] 
[   15.245643] The buggy address belongs to the object at ffff888102ac2380
[   15.245643]  which belongs to the cache kmalloc-64 of size 64
[   15.246387] The buggy address is located 0 bytes to the right of
[   15.246387]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.246877] 
[   15.247035] The buggy address belongs to the physical page:
[   15.247230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.247605] flags: 0x200000000000000(node=0|zone=2)
[   15.247797] page_type: f5(slab)
[   15.248030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.248367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.248671] page dumped because: kasan: bad access detected
[   15.248881] 
[   15.249203] Memory state around the buggy address:
[   15.249449]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.249726]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.250016] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.250229]                                      ^
[   15.250614]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.251060]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.251285] ==================================================================
[   16.486134] ==================================================================
[   16.486558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.486901] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.487310] 
[   16.487431] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.487510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.487523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.487544] Call Trace:
[   16.487564]  <TASK>
[   16.487583]  dump_stack_lvl+0x73/0xb0
[   16.487648]  print_report+0xd1/0x650
[   16.487673]  ? __virt_addr_valid+0x1db/0x2d0
[   16.487696]  ? kasan_atomics_helper+0x224c/0x5450
[   16.487733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.487758]  ? kasan_atomics_helper+0x224c/0x5450
[   16.487781]  kasan_report+0x141/0x180
[   16.487804]  ? kasan_atomics_helper+0x224c/0x5450
[   16.487852]  kasan_check_range+0x10c/0x1c0
[   16.487877]  __kasan_check_write+0x18/0x20
[   16.487899]  kasan_atomics_helper+0x224c/0x5450
[   16.487923]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.487969]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.488031]  ? kasan_atomics+0x152/0x310
[   16.488058]  kasan_atomics+0x1dc/0x310
[   16.488082]  ? __pfx_kasan_atomics+0x10/0x10
[   16.488107]  ? __pfx_read_tsc+0x10/0x10
[   16.488129]  ? ktime_get_ts64+0x86/0x230
[   16.488154]  kunit_try_run_case+0x1a5/0x480
[   16.488210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.488235]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.488279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.488305]  ? __kthread_parkme+0x82/0x180
[   16.488357]  ? preempt_count_sub+0x50/0x80
[   16.488384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.488409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.488434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.488461]  kthread+0x337/0x6f0
[   16.488511]  ? trace_preempt_on+0x20/0xc0
[   16.488537]  ? __pfx_kthread+0x10/0x10
[   16.488559]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.488581]  ? calculate_sigpending+0x7b/0xa0
[   16.488606]  ? __pfx_kthread+0x10/0x10
[   16.488628]  ret_from_fork+0x116/0x1d0
[   16.488648]  ? __pfx_kthread+0x10/0x10
[   16.488669]  ret_from_fork_asm+0x1a/0x30
[   16.488701]  </TASK>
[   16.488712] 
[   16.496748] Allocated by task 282:
[   16.496915]  kasan_save_stack+0x45/0x70
[   16.497163]  kasan_save_track+0x18/0x40
[   16.497391]  kasan_save_alloc_info+0x3b/0x50
[   16.497609]  __kasan_kmalloc+0xb7/0xc0
[   16.497752]  __kmalloc_cache_noprof+0x189/0x420
[   16.498057]  kasan_atomics+0x95/0x310
[   16.498316]  kunit_try_run_case+0x1a5/0x480
[   16.498539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.498768]  kthread+0x337/0x6f0
[   16.499006]  ret_from_fork+0x116/0x1d0
[   16.499180]  ret_from_fork_asm+0x1a/0x30
[   16.499419] 
[   16.499495] The buggy address belongs to the object at ffff888102ac2380
[   16.499495]  which belongs to the cache kmalloc-64 of size 64
[   16.500280] The buggy address is located 0 bytes to the right of
[   16.500280]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.500716] 
[   16.500818] The buggy address belongs to the physical page:
[   16.501111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.501491] flags: 0x200000000000000(node=0|zone=2)
[   16.501726] page_type: f5(slab)
[   16.501888] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.502199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.502449] page dumped because: kasan: bad access detected
[   16.502703] 
[   16.502804] Memory state around the buggy address:
[   16.503074]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.503448]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.503757] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.504094]                                      ^
[   16.504351]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.504678]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.505001] ==================================================================
[   16.240054] ==================================================================
[   16.240438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.240783] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.241132] 
[   16.241224] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.241286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.241300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.241321] Call Trace:
[   16.241340]  <TASK>
[   16.241358]  dump_stack_lvl+0x73/0xb0
[   16.241388]  print_report+0xd1/0x650
[   16.241413]  ? __virt_addr_valid+0x1db/0x2d0
[   16.241438]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.241461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.241486]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.241509]  kasan_report+0x141/0x180
[   16.241532]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.241560]  kasan_check_range+0x10c/0x1c0
[   16.241585]  __kasan_check_write+0x18/0x20
[   16.241606]  kasan_atomics_helper+0x1ce1/0x5450
[   16.241630]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.241654]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.241681]  ? kasan_atomics+0x152/0x310
[   16.241708]  kasan_atomics+0x1dc/0x310
[   16.241731]  ? __pfx_kasan_atomics+0x10/0x10
[   16.241757]  ? __pfx_read_tsc+0x10/0x10
[   16.241779]  ? ktime_get_ts64+0x86/0x230
[   16.241804]  kunit_try_run_case+0x1a5/0x480
[   16.241829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.241854]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.241879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.241904]  ? __kthread_parkme+0x82/0x180
[   16.241926]  ? preempt_count_sub+0x50/0x80
[   16.241962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.241986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.242012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.242039]  kthread+0x337/0x6f0
[   16.242058]  ? trace_preempt_on+0x20/0xc0
[   16.242082]  ? __pfx_kthread+0x10/0x10
[   16.242103]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.242126]  ? calculate_sigpending+0x7b/0xa0
[   16.242151]  ? __pfx_kthread+0x10/0x10
[   16.242174]  ret_from_fork+0x116/0x1d0
[   16.242192]  ? __pfx_kthread+0x10/0x10
[   16.242213]  ret_from_fork_asm+0x1a/0x30
[   16.242246]  </TASK>
[   16.242275] 
[   16.252705] Allocated by task 282:
[   16.253267]  kasan_save_stack+0x45/0x70
[   16.253851]  kasan_save_track+0x18/0x40
[   16.254421]  kasan_save_alloc_info+0x3b/0x50
[   16.255035]  __kasan_kmalloc+0xb7/0xc0
[   16.255416]  __kmalloc_cache_noprof+0x189/0x420
[   16.255586]  kasan_atomics+0x95/0x310
[   16.255722]  kunit_try_run_case+0x1a5/0x480
[   16.255871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.256664]  kthread+0x337/0x6f0
[   16.257206]  ret_from_fork+0x116/0x1d0
[   16.257851]  ret_from_fork_asm+0x1a/0x30
[   16.258417] 
[   16.258589] The buggy address belongs to the object at ffff888102ac2380
[   16.258589]  which belongs to the cache kmalloc-64 of size 64
[   16.259755] The buggy address is located 0 bytes to the right of
[   16.259755]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.260335] 
[   16.260451] The buggy address belongs to the physical page:
[   16.260676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.261034] flags: 0x200000000000000(node=0|zone=2)
[   16.261284] page_type: f5(slab)
[   16.261452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.261736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.262623] page dumped because: kasan: bad access detected
[   16.262979] 
[   16.263083] Memory state around the buggy address:
[   16.263482]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.263987]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.264402] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.264750]                                      ^
[   16.265156]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.265603]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.266031] ==================================================================
[   15.668356] ==================================================================
[   15.668695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.668994] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.669310] 
[   15.669413] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.669469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.669482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.669503] Call Trace:
[   15.669522]  <TASK>
[   15.669542]  dump_stack_lvl+0x73/0xb0
[   15.669585]  print_report+0xd1/0x650
[   15.669611]  ? __virt_addr_valid+0x1db/0x2d0
[   15.669634]  ? kasan_atomics_helper+0xe78/0x5450
[   15.669669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.669693]  ? kasan_atomics_helper+0xe78/0x5450
[   15.669716]  kasan_report+0x141/0x180
[   15.669738]  ? kasan_atomics_helper+0xe78/0x5450
[   15.669765]  kasan_check_range+0x10c/0x1c0
[   15.669789]  __kasan_check_write+0x18/0x20
[   15.669809]  kasan_atomics_helper+0xe78/0x5450
[   15.669833]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.669865]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.669894]  ? kasan_atomics+0x152/0x310
[   15.669921]  kasan_atomics+0x1dc/0x310
[   15.669961]  ? __pfx_kasan_atomics+0x10/0x10
[   15.669987]  ? __pfx_read_tsc+0x10/0x10
[   15.670009]  ? ktime_get_ts64+0x86/0x230
[   15.670035]  kunit_try_run_case+0x1a5/0x480
[   15.670059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.670083]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.670109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.670134]  ? __kthread_parkme+0x82/0x180
[   15.670166]  ? preempt_count_sub+0x50/0x80
[   15.670191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.670227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.670253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.670288]  kthread+0x337/0x6f0
[   15.670308]  ? trace_preempt_on+0x20/0xc0
[   15.670333]  ? __pfx_kthread+0x10/0x10
[   15.670363]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.670386]  ? calculate_sigpending+0x7b/0xa0
[   15.670411]  ? __pfx_kthread+0x10/0x10
[   15.670446]  ret_from_fork+0x116/0x1d0
[   15.670465]  ? __pfx_kthread+0x10/0x10
[   15.670487]  ret_from_fork_asm+0x1a/0x30
[   15.670519]  </TASK>
[   15.670530] 
[   15.678121] Allocated by task 282:
[   15.678358]  kasan_save_stack+0x45/0x70
[   15.678555]  kasan_save_track+0x18/0x40
[   15.678747]  kasan_save_alloc_info+0x3b/0x50
[   15.678977]  __kasan_kmalloc+0xb7/0xc0
[   15.679111]  __kmalloc_cache_noprof+0x189/0x420
[   15.679290]  kasan_atomics+0x95/0x310
[   15.679480]  kunit_try_run_case+0x1a5/0x480
[   15.679704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.679985]  kthread+0x337/0x6f0
[   15.680111]  ret_from_fork+0x116/0x1d0
[   15.680244]  ret_from_fork_asm+0x1a/0x30
[   15.680383] 
[   15.680455] The buggy address belongs to the object at ffff888102ac2380
[   15.680455]  which belongs to the cache kmalloc-64 of size 64
[   15.681089] The buggy address is located 0 bytes to the right of
[   15.681089]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.681624] 
[   15.681696] The buggy address belongs to the physical page:
[   15.681867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.682112] flags: 0x200000000000000(node=0|zone=2)
[   15.682505] page_type: f5(slab)
[   15.682676] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.683051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.683292] page dumped because: kasan: bad access detected
[   15.683583] 
[   15.683690] Memory state around the buggy address:
[   15.683906]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.684130]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.684577] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.684921]                                      ^
[   15.685144]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.685492]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.685810] ==================================================================
[   16.293506] ==================================================================
[   16.294191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.294835] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.295490] 
[   16.295605] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.295652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.295666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.295688] Call Trace:
[   16.295708]  <TASK>
[   16.295727]  dump_stack_lvl+0x73/0xb0
[   16.295761]  print_report+0xd1/0x650
[   16.295911]  ? __virt_addr_valid+0x1db/0x2d0
[   16.295946]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.295971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.295995]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.296018]  kasan_report+0x141/0x180
[   16.296041]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.296068]  kasan_check_range+0x10c/0x1c0
[   16.296094]  __kasan_check_write+0x18/0x20
[   16.296114]  kasan_atomics_helper+0x1e12/0x5450
[   16.296138]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.296162]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.296188]  ? kasan_atomics+0x152/0x310
[   16.296216]  kasan_atomics+0x1dc/0x310
[   16.296239]  ? __pfx_kasan_atomics+0x10/0x10
[   16.296266]  ? __pfx_read_tsc+0x10/0x10
[   16.296288]  ? ktime_get_ts64+0x86/0x230
[   16.296314]  kunit_try_run_case+0x1a5/0x480
[   16.296339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.296363]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.296389]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.296415]  ? __kthread_parkme+0x82/0x180
[   16.296436]  ? preempt_count_sub+0x50/0x80
[   16.296461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.296487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.296513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.296540]  kthread+0x337/0x6f0
[   16.296560]  ? trace_preempt_on+0x20/0xc0
[   16.296584]  ? __pfx_kthread+0x10/0x10
[   16.296605]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.296627]  ? calculate_sigpending+0x7b/0xa0
[   16.296653]  ? __pfx_kthread+0x10/0x10
[   16.296675]  ret_from_fork+0x116/0x1d0
[   16.296694]  ? __pfx_kthread+0x10/0x10
[   16.296716]  ret_from_fork_asm+0x1a/0x30
[   16.296748]  </TASK>
[   16.296760] 
[   16.308497] Allocated by task 282:
[   16.308908]  kasan_save_stack+0x45/0x70
[   16.309242]  kasan_save_track+0x18/0x40
[   16.309549]  kasan_save_alloc_info+0x3b/0x50
[   16.309847]  __kasan_kmalloc+0xb7/0xc0
[   16.310125]  __kmalloc_cache_noprof+0x189/0x420
[   16.310451]  kasan_atomics+0x95/0x310
[   16.310742]  kunit_try_run_case+0x1a5/0x480
[   16.310958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.311197]  kthread+0x337/0x6f0
[   16.311600]  ret_from_fork+0x116/0x1d0
[   16.311893]  ret_from_fork_asm+0x1a/0x30
[   16.312202] 
[   16.312304] The buggy address belongs to the object at ffff888102ac2380
[   16.312304]  which belongs to the cache kmalloc-64 of size 64
[   16.313304] The buggy address is located 0 bytes to the right of
[   16.313304]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.313949] 
[   16.314198] The buggy address belongs to the physical page:
[   16.314524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.314931] flags: 0x200000000000000(node=0|zone=2)
[   16.315319] page_type: f5(slab)
[   16.315624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.316077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.316594] page dumped because: kasan: bad access detected
[   16.316926] 
[   16.317038] Memory state around the buggy address:
[   16.317264]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.317770]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.318185] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.318733]                                      ^
[   16.319058]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.319485]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.319848] ==================================================================
[   15.809341] ==================================================================
[   15.809724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.810108] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.810629] 
[   15.810760] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.810808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.810822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.810844] Call Trace:
[   15.810865]  <TASK>
[   15.810885]  dump_stack_lvl+0x73/0xb0
[   15.810920]  print_report+0xd1/0x650
[   15.810955]  ? __virt_addr_valid+0x1db/0x2d0
[   15.810980]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.811004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.811028]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.811094]  kasan_report+0x141/0x180
[   15.811120]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.811147]  __asan_report_load4_noabort+0x18/0x20
[   15.811223]  kasan_atomics_helper+0x4a02/0x5450
[   15.811248]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.811285]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.811311]  ? kasan_atomics+0x152/0x310
[   15.811339]  kasan_atomics+0x1dc/0x310
[   15.811431]  ? __pfx_kasan_atomics+0x10/0x10
[   15.811481]  ? __pfx_read_tsc+0x10/0x10
[   15.811505]  ? ktime_get_ts64+0x86/0x230
[   15.811530]  kunit_try_run_case+0x1a5/0x480
[   15.811556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.811580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.811606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.811631]  ? __kthread_parkme+0x82/0x180
[   15.811653]  ? preempt_count_sub+0x50/0x80
[   15.811678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.811703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.811729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.811756]  kthread+0x337/0x6f0
[   15.811775]  ? trace_preempt_on+0x20/0xc0
[   15.811800]  ? __pfx_kthread+0x10/0x10
[   15.811821]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.811844]  ? calculate_sigpending+0x7b/0xa0
[   15.811869]  ? __pfx_kthread+0x10/0x10
[   15.811892]  ret_from_fork+0x116/0x1d0
[   15.811912]  ? __pfx_kthread+0x10/0x10
[   15.811945]  ret_from_fork_asm+0x1a/0x30
[   15.811978]  </TASK>
[   15.811990] 
[   15.820396] Allocated by task 282:
[   15.820583]  kasan_save_stack+0x45/0x70
[   15.820892]  kasan_save_track+0x18/0x40
[   15.821168]  kasan_save_alloc_info+0x3b/0x50
[   15.821319]  __kasan_kmalloc+0xb7/0xc0
[   15.821447]  __kmalloc_cache_noprof+0x189/0x420
[   15.821792]  kasan_atomics+0x95/0x310
[   15.822205]  kunit_try_run_case+0x1a5/0x480
[   15.822458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.822743]  kthread+0x337/0x6f0
[   15.822901]  ret_from_fork+0x116/0x1d0
[   15.823089]  ret_from_fork_asm+0x1a/0x30
[   15.823288] 
[   15.823361] The buggy address belongs to the object at ffff888102ac2380
[   15.823361]  which belongs to the cache kmalloc-64 of size 64
[   15.823760] The buggy address is located 0 bytes to the right of
[   15.823760]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.824543] 
[   15.824645] The buggy address belongs to the physical page:
[   15.824829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.825103] flags: 0x200000000000000(node=0|zone=2)
[   15.825593] page_type: f5(slab)
[   15.825775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.826189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.826607] page dumped because: kasan: bad access detected
[   15.826943] 
[   15.827028] Memory state around the buggy address:
[   15.827319]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.827611]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.827913] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.828181]                                      ^
[   15.828468]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.828712]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.829038] ==================================================================
[   16.077890] ==================================================================
[   16.078611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   16.079292] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.079887] 
[   16.080080] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.080127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.080140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.080162] Call Trace:
[   16.080184]  <TASK>
[   16.080206]  dump_stack_lvl+0x73/0xb0
[   16.080239]  print_report+0xd1/0x650
[   16.080288]  ? __virt_addr_valid+0x1db/0x2d0
[   16.080313]  ? kasan_atomics_helper+0x177f/0x5450
[   16.080336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.080362]  ? kasan_atomics_helper+0x177f/0x5450
[   16.080385]  kasan_report+0x141/0x180
[   16.080408]  ? kasan_atomics_helper+0x177f/0x5450
[   16.080435]  kasan_check_range+0x10c/0x1c0
[   16.080460]  __kasan_check_write+0x18/0x20
[   16.080480]  kasan_atomics_helper+0x177f/0x5450
[   16.080504]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.080527]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.080554]  ? kasan_atomics+0x152/0x310
[   16.080581]  kasan_atomics+0x1dc/0x310
[   16.080604]  ? __pfx_kasan_atomics+0x10/0x10
[   16.080629]  ? __pfx_read_tsc+0x10/0x10
[   16.080651]  ? ktime_get_ts64+0x86/0x230
[   16.080676]  kunit_try_run_case+0x1a5/0x480
[   16.080702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.080725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.080752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.080777]  ? __kthread_parkme+0x82/0x180
[   16.080799]  ? preempt_count_sub+0x50/0x80
[   16.080824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.080850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.080875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.080903]  kthread+0x337/0x6f0
[   16.080923]  ? trace_preempt_on+0x20/0xc0
[   16.080961]  ? __pfx_kthread+0x10/0x10
[   16.080983]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.081007]  ? calculate_sigpending+0x7b/0xa0
[   16.081034]  ? __pfx_kthread+0x10/0x10
[   16.081059]  ret_from_fork+0x116/0x1d0
[   16.081080]  ? __pfx_kthread+0x10/0x10
[   16.081102]  ret_from_fork_asm+0x1a/0x30
[   16.081134]  </TASK>
[   16.081146] 
[   16.093431] Allocated by task 282:
[   16.093764]  kasan_save_stack+0x45/0x70
[   16.094131]  kasan_save_track+0x18/0x40
[   16.094498]  kasan_save_alloc_info+0x3b/0x50
[   16.094885]  __kasan_kmalloc+0xb7/0xc0
[   16.095244]  __kmalloc_cache_noprof+0x189/0x420
[   16.095673]  kasan_atomics+0x95/0x310
[   16.096025]  kunit_try_run_case+0x1a5/0x480
[   16.096432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.096902]  kthread+0x337/0x6f0
[   16.097207]  ret_from_fork+0x116/0x1d0
[   16.097579]  ret_from_fork_asm+0x1a/0x30
[   16.097933] 
[   16.098100] The buggy address belongs to the object at ffff888102ac2380
[   16.098100]  which belongs to the cache kmalloc-64 of size 64
[   16.098645] The buggy address is located 0 bytes to the right of
[   16.098645]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.099027] 
[   16.099129] The buggy address belongs to the physical page:
[   16.099375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.099670] flags: 0x200000000000000(node=0|zone=2)
[   16.099897] page_type: f5(slab)
[   16.100073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.100393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.100628] page dumped because: kasan: bad access detected
[   16.100882] 
[   16.100987] Memory state around the buggy address:
[   16.101168]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.101477]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.101764] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.102068]                                      ^
[   16.102241]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.102518]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.102810] ==================================================================
[   15.253077] ==================================================================
[   15.253467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.253707] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.254079] 
[   15.254204] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.254248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.254273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.254295] Call Trace:
[   15.254315]  <TASK>
[   15.254334]  dump_stack_lvl+0x73/0xb0
[   15.254367]  print_report+0xd1/0x650
[   15.254391]  ? __virt_addr_valid+0x1db/0x2d0
[   15.254415]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.254438]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.254462]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.254486]  kasan_report+0x141/0x180
[   15.254508]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.254535]  __asan_report_store4_noabort+0x1b/0x30
[   15.254562]  kasan_atomics_helper+0x4b6e/0x5450
[   15.254586]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.254610]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.254636]  ? kasan_atomics+0x152/0x310
[   15.254664]  kasan_atomics+0x1dc/0x310
[   15.254687]  ? __pfx_kasan_atomics+0x10/0x10
[   15.254719]  ? __pfx_read_tsc+0x10/0x10
[   15.254741]  ? ktime_get_ts64+0x86/0x230
[   15.254766]  kunit_try_run_case+0x1a5/0x480
[   15.254791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.254815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.254841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.254867]  ? __kthread_parkme+0x82/0x180
[   15.254890]  ? preempt_count_sub+0x50/0x80
[   15.254915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.254998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.255027]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.255054]  kthread+0x337/0x6f0
[   15.255074]  ? trace_preempt_on+0x20/0xc0
[   15.255099]  ? __pfx_kthread+0x10/0x10
[   15.255120]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.255144]  ? calculate_sigpending+0x7b/0xa0
[   15.255169]  ? __pfx_kthread+0x10/0x10
[   15.255192]  ret_from_fork+0x116/0x1d0
[   15.255212]  ? __pfx_kthread+0x10/0x10
[   15.255235]  ret_from_fork_asm+0x1a/0x30
[   15.255267]  </TASK>
[   15.255280] 
[   15.263535] Allocated by task 282:
[   15.263821]  kasan_save_stack+0x45/0x70
[   15.264236]  kasan_save_track+0x18/0x40
[   15.264462]  kasan_save_alloc_info+0x3b/0x50
[   15.264676]  __kasan_kmalloc+0xb7/0xc0
[   15.264848]  __kmalloc_cache_noprof+0x189/0x420
[   15.265017]  kasan_atomics+0x95/0x310
[   15.265151]  kunit_try_run_case+0x1a5/0x480
[   15.265454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.265753]  kthread+0x337/0x6f0
[   15.265925]  ret_from_fork+0x116/0x1d0
[   15.266158]  ret_from_fork_asm+0x1a/0x30
[   15.266327] 
[   15.266398] The buggy address belongs to the object at ffff888102ac2380
[   15.266398]  which belongs to the cache kmalloc-64 of size 64
[   15.266893] The buggy address is located 0 bytes to the right of
[   15.266893]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.267558] 
[   15.267660] The buggy address belongs to the physical page:
[   15.267840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.268353] flags: 0x200000000000000(node=0|zone=2)
[   15.268565] page_type: f5(slab)
[   15.268781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.269146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.269457] page dumped because: kasan: bad access detected
[   15.269629] 
[   15.269722] Memory state around the buggy address:
[   15.269955]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.270273]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.270551] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.270776]                                      ^
[   15.270942]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.271267]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.271589] ==================================================================
[   16.505799] ==================================================================
[   16.506177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.506549] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.506882] 
[   16.507014] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.507082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.507096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.507151] Call Trace:
[   16.507171]  <TASK>
[   16.507191]  dump_stack_lvl+0x73/0xb0
[   16.507225]  print_report+0xd1/0x650
[   16.507279]  ? __virt_addr_valid+0x1db/0x2d0
[   16.507320]  ? kasan_atomics_helper+0x5115/0x5450
[   16.507344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.507368]  ? kasan_atomics_helper+0x5115/0x5450
[   16.507391]  kasan_report+0x141/0x180
[   16.507449]  ? kasan_atomics_helper+0x5115/0x5450
[   16.507477]  __asan_report_load8_noabort+0x18/0x20
[   16.507503]  kasan_atomics_helper+0x5115/0x5450
[   16.507527]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.507550]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.507602]  ? kasan_atomics+0x152/0x310
[   16.507629]  kasan_atomics+0x1dc/0x310
[   16.507653]  ? __pfx_kasan_atomics+0x10/0x10
[   16.507678]  ? __pfx_read_tsc+0x10/0x10
[   16.507700]  ? ktime_get_ts64+0x86/0x230
[   16.507725]  kunit_try_run_case+0x1a5/0x480
[   16.507751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.507775]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.507801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.507826]  ? __kthread_parkme+0x82/0x180
[   16.507848]  ? preempt_count_sub+0x50/0x80
[   16.507873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.507899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.507924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.508004]  kthread+0x337/0x6f0
[   16.508026]  ? trace_preempt_on+0x20/0xc0
[   16.508051]  ? __pfx_kthread+0x10/0x10
[   16.508073]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.508096]  ? calculate_sigpending+0x7b/0xa0
[   16.508122]  ? __pfx_kthread+0x10/0x10
[   16.508143]  ret_from_fork+0x116/0x1d0
[   16.508163]  ? __pfx_kthread+0x10/0x10
[   16.508184]  ret_from_fork_asm+0x1a/0x30
[   16.508216]  </TASK>
[   16.508227] 
[   16.516075] Allocated by task 282:
[   16.516327]  kasan_save_stack+0x45/0x70
[   16.516538]  kasan_save_track+0x18/0x40
[   16.516726]  kasan_save_alloc_info+0x3b/0x50
[   16.516971]  __kasan_kmalloc+0xb7/0xc0
[   16.517173]  __kmalloc_cache_noprof+0x189/0x420
[   16.517432]  kasan_atomics+0x95/0x310
[   16.517675]  kunit_try_run_case+0x1a5/0x480
[   16.517861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.518152]  kthread+0x337/0x6f0
[   16.518324]  ret_from_fork+0x116/0x1d0
[   16.518520]  ret_from_fork_asm+0x1a/0x30
[   16.518728] 
[   16.518856] The buggy address belongs to the object at ffff888102ac2380
[   16.518856]  which belongs to the cache kmalloc-64 of size 64
[   16.519415] The buggy address is located 0 bytes to the right of
[   16.519415]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.519970] 
[   16.520061] The buggy address belongs to the physical page:
[   16.520394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.520654] flags: 0x200000000000000(node=0|zone=2)
[   16.520818] page_type: f5(slab)
[   16.520951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.521297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.521638] page dumped because: kasan: bad access detected
[   16.521894] 
[   16.522062] Memory state around the buggy address:
[   16.522305]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.522523]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.522745] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.522966]                                      ^
[   16.523228]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.523648]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.524066] ==================================================================
[   15.612954] ==================================================================
[   15.614042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.614732] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.615415] 
[   15.615617] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.615663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.615675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.615696] Call Trace:
[   15.615727]  <TASK>
[   15.615748]  dump_stack_lvl+0x73/0xb0
[   15.615791]  print_report+0xd1/0x650
[   15.615816]  ? __virt_addr_valid+0x1db/0x2d0
[   15.615839]  ? kasan_atomics_helper+0xd47/0x5450
[   15.615862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.615886]  ? kasan_atomics_helper+0xd47/0x5450
[   15.615909]  kasan_report+0x141/0x180
[   15.615931]  ? kasan_atomics_helper+0xd47/0x5450
[   15.615970]  kasan_check_range+0x10c/0x1c0
[   15.615995]  __kasan_check_write+0x18/0x20
[   15.616017]  kasan_atomics_helper+0xd47/0x5450
[   15.616041]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.616065]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.616091]  ? kasan_atomics+0x152/0x310
[   15.616119]  kasan_atomics+0x1dc/0x310
[   15.616142]  ? __pfx_kasan_atomics+0x10/0x10
[   15.616167]  ? __pfx_read_tsc+0x10/0x10
[   15.616190]  ? ktime_get_ts64+0x86/0x230
[   15.616215]  kunit_try_run_case+0x1a5/0x480
[   15.616241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.616286]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.616314]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.616338]  ? __kthread_parkme+0x82/0x180
[   15.616361]  ? preempt_count_sub+0x50/0x80
[   15.616387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.616412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.616438]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.616465]  kthread+0x337/0x6f0
[   15.616484]  ? trace_preempt_on+0x20/0xc0
[   15.616510]  ? __pfx_kthread+0x10/0x10
[   15.616531]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.616553]  ? calculate_sigpending+0x7b/0xa0
[   15.616580]  ? __pfx_kthread+0x10/0x10
[   15.616602]  ret_from_fork+0x116/0x1d0
[   15.616622]  ? __pfx_kthread+0x10/0x10
[   15.616643]  ret_from_fork_asm+0x1a/0x30
[   15.616675]  </TASK>
[   15.616687] 
[   15.629503] Allocated by task 282:
[   15.629862]  kasan_save_stack+0x45/0x70
[   15.630242]  kasan_save_track+0x18/0x40
[   15.630621]  kasan_save_alloc_info+0x3b/0x50
[   15.630782]  __kasan_kmalloc+0xb7/0xc0
[   15.630915]  __kmalloc_cache_noprof+0x189/0x420
[   15.631081]  kasan_atomics+0x95/0x310
[   15.631214]  kunit_try_run_case+0x1a5/0x480
[   15.631606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.632095]  kthread+0x337/0x6f0
[   15.632435]  ret_from_fork+0x116/0x1d0
[   15.632788]  ret_from_fork_asm+0x1a/0x30
[   15.633171] 
[   15.633352] The buggy address belongs to the object at ffff888102ac2380
[   15.633352]  which belongs to the cache kmalloc-64 of size 64
[   15.634431] The buggy address is located 0 bytes to the right of
[   15.634431]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.635198] 
[   15.635352] The buggy address belongs to the physical page:
[   15.635837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.636413] flags: 0x200000000000000(node=0|zone=2)
[   15.636577] page_type: f5(slab)
[   15.636698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.636927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.637628] page dumped because: kasan: bad access detected
[   15.638119] 
[   15.638295] Memory state around the buggy address:
[   15.638745]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.639374]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.639992] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.640563]                                      ^
[   15.640717]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.640929]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.641154] ==================================================================
[   16.320787] ==================================================================
[   16.321061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.321301] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.321524] 
[   16.321617] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.321662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.321676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.321697] Call Trace:
[   16.321717]  <TASK>
[   16.321737]  dump_stack_lvl+0x73/0xb0
[   16.321768]  print_report+0xd1/0x650
[   16.321792]  ? __virt_addr_valid+0x1db/0x2d0
[   16.321815]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.321837]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.321859]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.321881]  kasan_report+0x141/0x180
[   16.321903]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.321929]  kasan_check_range+0x10c/0x1c0
[   16.321964]  __kasan_check_write+0x18/0x20
[   16.321983]  kasan_atomics_helper+0x1eaa/0x5450
[   16.322006]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.322028]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.322054]  ? kasan_atomics+0x152/0x310
[   16.322081]  kasan_atomics+0x1dc/0x310
[   16.322103]  ? __pfx_kasan_atomics+0x10/0x10
[   16.322128]  ? __pfx_read_tsc+0x10/0x10
[   16.322149]  ? ktime_get_ts64+0x86/0x230
[   16.322173]  kunit_try_run_case+0x1a5/0x480
[   16.322198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.322221]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.322247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.322271]  ? __kthread_parkme+0x82/0x180
[   16.322292]  ? preempt_count_sub+0x50/0x80
[   16.322316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.322341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.322365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.322389]  kthread+0x337/0x6f0
[   16.322408]  ? trace_preempt_on+0x20/0xc0
[   16.322433]  ? __pfx_kthread+0x10/0x10
[   16.322454]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.322476]  ? calculate_sigpending+0x7b/0xa0
[   16.322500]  ? __pfx_kthread+0x10/0x10
[   16.322521]  ret_from_fork+0x116/0x1d0
[   16.322540]  ? __pfx_kthread+0x10/0x10
[   16.322561]  ret_from_fork_asm+0x1a/0x30
[   16.322593]  </TASK>
[   16.322604] 
[   16.331841] Allocated by task 282:
[   16.332004]  kasan_save_stack+0x45/0x70
[   16.332351]  kasan_save_track+0x18/0x40
[   16.332537]  kasan_save_alloc_info+0x3b/0x50
[   16.332888]  __kasan_kmalloc+0xb7/0xc0
[   16.333128]  __kmalloc_cache_noprof+0x189/0x420
[   16.333289]  kasan_atomics+0x95/0x310
[   16.333602]  kunit_try_run_case+0x1a5/0x480
[   16.333761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.333958]  kthread+0x337/0x6f0
[   16.334381]  ret_from_fork+0x116/0x1d0
[   16.334584]  ret_from_fork_asm+0x1a/0x30
[   16.334855] 
[   16.334962] The buggy address belongs to the object at ffff888102ac2380
[   16.334962]  which belongs to the cache kmalloc-64 of size 64
[   16.335668] The buggy address is located 0 bytes to the right of
[   16.335668]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.336850] 
[   16.336947] The buggy address belongs to the physical page:
[   16.337129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.337748] flags: 0x200000000000000(node=0|zone=2)
[   16.338186] page_type: f5(slab)
[   16.339090] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.339349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.339579] page dumped because: kasan: bad access detected
[   16.339752] 
[   16.339824] Memory state around the buggy address:
[   16.340062]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.340736]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.341360] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.341577]                                      ^
[   16.341733]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341959]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.342233] ==================================================================
[   15.886517] ==================================================================
[   15.887070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.887438] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.887778] 
[   15.887891] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.887956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.887969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.887991] Call Trace:
[   15.888009]  <TASK>
[   15.888028]  dump_stack_lvl+0x73/0xb0
[   15.888058]  print_report+0xd1/0x650
[   15.888082]  ? __virt_addr_valid+0x1db/0x2d0
[   15.888106]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.888129]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.888153]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.888187]  kasan_report+0x141/0x180
[   15.888209]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.888248]  __asan_report_load4_noabort+0x18/0x20
[   15.888275]  kasan_atomics_helper+0x49ce/0x5450
[   15.888300]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.888335]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.888361]  ? kasan_atomics+0x152/0x310
[   15.888388]  kasan_atomics+0x1dc/0x310
[   15.888423]  ? __pfx_kasan_atomics+0x10/0x10
[   15.888448]  ? __pfx_read_tsc+0x10/0x10
[   15.888483]  ? ktime_get_ts64+0x86/0x230
[   15.888518]  kunit_try_run_case+0x1a5/0x480
[   15.888543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.888577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.888603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.888628]  ? __kthread_parkme+0x82/0x180
[   15.888650]  ? preempt_count_sub+0x50/0x80
[   15.888674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.888708]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.888735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.888771]  kthread+0x337/0x6f0
[   15.888790]  ? trace_preempt_on+0x20/0xc0
[   15.888816]  ? __pfx_kthread+0x10/0x10
[   15.888837]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.888860]  ? calculate_sigpending+0x7b/0xa0
[   15.888884]  ? __pfx_kthread+0x10/0x10
[   15.888907]  ret_from_fork+0x116/0x1d0
[   15.888926]  ? __pfx_kthread+0x10/0x10
[   15.888957]  ret_from_fork_asm+0x1a/0x30
[   15.888988]  </TASK>
[   15.888999] 
[   15.896618] Allocated by task 282:
[   15.896792]  kasan_save_stack+0x45/0x70
[   15.897007]  kasan_save_track+0x18/0x40
[   15.897212]  kasan_save_alloc_info+0x3b/0x50
[   15.897460]  __kasan_kmalloc+0xb7/0xc0
[   15.897655]  __kmalloc_cache_noprof+0x189/0x420
[   15.897886]  kasan_atomics+0x95/0x310
[   15.898105]  kunit_try_run_case+0x1a5/0x480
[   15.898249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.898574]  kthread+0x337/0x6f0
[   15.898767]  ret_from_fork+0x116/0x1d0
[   15.898979]  ret_from_fork_asm+0x1a/0x30
[   15.899240] 
[   15.899410] The buggy address belongs to the object at ffff888102ac2380
[   15.899410]  which belongs to the cache kmalloc-64 of size 64
[   15.899918] The buggy address is located 0 bytes to the right of
[   15.899918]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.900502] 
[   15.900575] The buggy address belongs to the physical page:
[   15.900740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.900994] flags: 0x200000000000000(node=0|zone=2)
[   15.901223] page_type: f5(slab)
[   15.901385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.901737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.902084] page dumped because: kasan: bad access detected
[   15.902280] 
[   15.902376] Memory state around the buggy address:
[   15.902639]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.902876]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.903092] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.903457]                                      ^
[   15.903735]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.904161]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.904779] ==================================================================
[   15.415283] ==================================================================
[   15.415531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.415797] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.416127] 
[   15.416218] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.416291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.416304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.416326] Call Trace:
[   15.416345]  <TASK>
[   15.416366]  dump_stack_lvl+0x73/0xb0
[   15.416398]  print_report+0xd1/0x650
[   15.416422]  ? __virt_addr_valid+0x1db/0x2d0
[   15.416447]  ? kasan_atomics_helper+0x72f/0x5450
[   15.416469]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.416493]  ? kasan_atomics_helper+0x72f/0x5450
[   15.416516]  kasan_report+0x141/0x180
[   15.416539]  ? kasan_atomics_helper+0x72f/0x5450
[   15.416566]  kasan_check_range+0x10c/0x1c0
[   15.416590]  __kasan_check_write+0x18/0x20
[   15.416611]  kasan_atomics_helper+0x72f/0x5450
[   15.416635]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.416660]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.416687]  ? kasan_atomics+0x152/0x310
[   15.416714]  kasan_atomics+0x1dc/0x310
[   15.416737]  ? __pfx_kasan_atomics+0x10/0x10
[   15.416763]  ? __pfx_read_tsc+0x10/0x10
[   15.416785]  ? ktime_get_ts64+0x86/0x230
[   15.416810]  kunit_try_run_case+0x1a5/0x480
[   15.416836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.416860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.416886]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.416911]  ? __kthread_parkme+0x82/0x180
[   15.416944]  ? preempt_count_sub+0x50/0x80
[   15.416970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.416996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.417021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.417049]  kthread+0x337/0x6f0
[   15.417068]  ? trace_preempt_on+0x20/0xc0
[   15.417092]  ? __pfx_kthread+0x10/0x10
[   15.417114]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.417137]  ? calculate_sigpending+0x7b/0xa0
[   15.417162]  ? __pfx_kthread+0x10/0x10
[   15.417184]  ret_from_fork+0x116/0x1d0
[   15.417204]  ? __pfx_kthread+0x10/0x10
[   15.417225]  ret_from_fork_asm+0x1a/0x30
[   15.417257]  </TASK>
[   15.417269] 
[   15.424894] Allocated by task 282:
[   15.425076]  kasan_save_stack+0x45/0x70
[   15.425223]  kasan_save_track+0x18/0x40
[   15.425358]  kasan_save_alloc_info+0x3b/0x50
[   15.425592]  __kasan_kmalloc+0xb7/0xc0
[   15.425780]  __kmalloc_cache_noprof+0x189/0x420
[   15.426009]  kasan_atomics+0x95/0x310
[   15.426196]  kunit_try_run_case+0x1a5/0x480
[   15.426396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.426571]  kthread+0x337/0x6f0
[   15.426719]  ret_from_fork+0x116/0x1d0
[   15.426906]  ret_from_fork_asm+0x1a/0x30
[   15.427112] 
[   15.427206] The buggy address belongs to the object at ffff888102ac2380
[   15.427206]  which belongs to the cache kmalloc-64 of size 64
[   15.427725] The buggy address is located 0 bytes to the right of
[   15.427725]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.428100] 
[   15.428172] The buggy address belongs to the physical page:
[   15.428587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.428946] flags: 0x200000000000000(node=0|zone=2)
[   15.429176] page_type: f5(slab)
[   15.429315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.429545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.429769] page dumped because: kasan: bad access detected
[   15.429950] 
[   15.430074] Memory state around the buggy address:
[   15.430324]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.430645]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.430981] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.431305]                                      ^
[   15.431535]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.431889]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.432174] ==================================================================
[   15.905537] ==================================================================
[   15.905968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.906507] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.906831] 
[   15.906923] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.906976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.906990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.907011] Call Trace:
[   15.907028]  <TASK>
[   15.907047]  dump_stack_lvl+0x73/0xb0
[   15.907079]  print_report+0xd1/0x650
[   15.907102]  ? __virt_addr_valid+0x1db/0x2d0
[   15.907127]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.907171]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.907207]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.907247]  kasan_report+0x141/0x180
[   15.907291]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.907318]  kasan_check_range+0x10c/0x1c0
[   15.907342]  __kasan_check_read+0x15/0x20
[   15.907363]  kasan_atomics_helper+0x13b5/0x5450
[   15.907386]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.907410]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.907436]  ? kasan_atomics+0x152/0x310
[   15.907490]  kasan_atomics+0x1dc/0x310
[   15.907513]  ? __pfx_kasan_atomics+0x10/0x10
[   15.907538]  ? __pfx_read_tsc+0x10/0x10
[   15.907570]  ? ktime_get_ts64+0x86/0x230
[   15.907596]  kunit_try_run_case+0x1a5/0x480
[   15.907621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.907645]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.907671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.907695]  ? __kthread_parkme+0x82/0x180
[   15.907717]  ? preempt_count_sub+0x50/0x80
[   15.907759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.907793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.907819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.907857]  kthread+0x337/0x6f0
[   15.907877]  ? trace_preempt_on+0x20/0xc0
[   15.907918]  ? __pfx_kthread+0x10/0x10
[   15.907956]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.907979]  ? calculate_sigpending+0x7b/0xa0
[   15.908015]  ? __pfx_kthread+0x10/0x10
[   15.908037]  ret_from_fork+0x116/0x1d0
[   15.908056]  ? __pfx_kthread+0x10/0x10
[   15.908105]  ret_from_fork_asm+0x1a/0x30
[   15.908152]  </TASK>
[   15.908174] 
[   15.916754] Allocated by task 282:
[   15.916976]  kasan_save_stack+0x45/0x70
[   15.917196]  kasan_save_track+0x18/0x40
[   15.917440]  kasan_save_alloc_info+0x3b/0x50
[   15.917678]  __kasan_kmalloc+0xb7/0xc0
[   15.917896]  __kmalloc_cache_noprof+0x189/0x420
[   15.918112]  kasan_atomics+0x95/0x310
[   15.918327]  kunit_try_run_case+0x1a5/0x480
[   15.918621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.918842]  kthread+0x337/0x6f0
[   15.919005]  ret_from_fork+0x116/0x1d0
[   15.919215]  ret_from_fork_asm+0x1a/0x30
[   15.919408] 
[   15.919500] The buggy address belongs to the object at ffff888102ac2380
[   15.919500]  which belongs to the cache kmalloc-64 of size 64
[   15.920050] The buggy address is located 0 bytes to the right of
[   15.920050]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.920647] 
[   15.920749] The buggy address belongs to the physical page:
[   15.920990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.921252] flags: 0x200000000000000(node=0|zone=2)
[   15.921523] page_type: f5(slab)
[   15.921694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.921953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.922377] page dumped because: kasan: bad access detected
[   15.922638] 
[   15.922712] Memory state around the buggy address:
[   15.922918]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.923297]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.923678] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.923923]                                      ^
[   15.924199]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.924568]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.924897] ==================================================================
[   16.361488] ==================================================================
[   16.361793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.362085] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.362400] 
[   16.362517] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.362559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.362572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.362593] Call Trace:
[   16.362611]  <TASK>
[   16.362629]  dump_stack_lvl+0x73/0xb0
[   16.362659]  print_report+0xd1/0x650
[   16.362682]  ? __virt_addr_valid+0x1db/0x2d0
[   16.362711]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.362733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.362756]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.362778]  kasan_report+0x141/0x180
[   16.362800]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.362827]  __asan_report_load8_noabort+0x18/0x20
[   16.362851]  kasan_atomics_helper+0x4f71/0x5450
[   16.362874]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.362896]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.362921]  ? kasan_atomics+0x152/0x310
[   16.363011]  kasan_atomics+0x1dc/0x310
[   16.363036]  ? __pfx_kasan_atomics+0x10/0x10
[   16.363062]  ? __pfx_read_tsc+0x10/0x10
[   16.363086]  ? ktime_get_ts64+0x86/0x230
[   16.363112]  kunit_try_run_case+0x1a5/0x480
[   16.363138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.363162]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.363190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.363216]  ? __kthread_parkme+0x82/0x180
[   16.363238]  ? preempt_count_sub+0x50/0x80
[   16.363284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.363310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.363336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.363363]  kthread+0x337/0x6f0
[   16.363383]  ? trace_preempt_on+0x20/0xc0
[   16.363407]  ? __pfx_kthread+0x10/0x10
[   16.363429]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.363452]  ? calculate_sigpending+0x7b/0xa0
[   16.363478]  ? __pfx_kthread+0x10/0x10
[   16.363500]  ret_from_fork+0x116/0x1d0
[   16.363520]  ? __pfx_kthread+0x10/0x10
[   16.363541]  ret_from_fork_asm+0x1a/0x30
[   16.363573]  </TASK>
[   16.363584] 
[   16.370743] Allocated by task 282:
[   16.370878]  kasan_save_stack+0x45/0x70
[   16.371094]  kasan_save_track+0x18/0x40
[   16.371318]  kasan_save_alloc_info+0x3b/0x50
[   16.371552]  __kasan_kmalloc+0xb7/0xc0
[   16.371740]  __kmalloc_cache_noprof+0x189/0x420
[   16.371948]  kasan_atomics+0x95/0x310
[   16.372153]  kunit_try_run_case+0x1a5/0x480
[   16.372325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.372502]  kthread+0x337/0x6f0
[   16.372642]  ret_from_fork+0x116/0x1d0
[   16.372829]  ret_from_fork_asm+0x1a/0x30
[   16.373053] 
[   16.373147] The buggy address belongs to the object at ffff888102ac2380
[   16.373147]  which belongs to the cache kmalloc-64 of size 64
[   16.373702] The buggy address is located 0 bytes to the right of
[   16.373702]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.374100] 
[   16.374175] The buggy address belongs to the physical page:
[   16.374447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.374819] flags: 0x200000000000000(node=0|zone=2)
[   16.374992] page_type: f5(slab)
[   16.375115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.375417] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.375774] page dumped because: kasan: bad access detected
[   16.376041] 
[   16.376153] Memory state around the buggy address:
[   16.376403]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.376675]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.376990] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.377204]                                      ^
[   16.377457]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.377775]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.378104] ==================================================================
[   15.392778] ==================================================================
[   15.393410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.393763] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.394154] 
[   15.394273] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.394352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.394388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.394411] Call Trace:
[   15.394430]  <TASK>
[   15.394448]  dump_stack_lvl+0x73/0xb0
[   15.394480]  print_report+0xd1/0x650
[   15.394505]  ? __virt_addr_valid+0x1db/0x2d0
[   15.394530]  ? kasan_atomics_helper+0x697/0x5450
[   15.394553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.394579]  ? kasan_atomics_helper+0x697/0x5450
[   15.394633]  kasan_report+0x141/0x180
[   15.394668]  ? kasan_atomics_helper+0x697/0x5450
[   15.394714]  kasan_check_range+0x10c/0x1c0
[   15.394738]  __kasan_check_write+0x18/0x20
[   15.394759]  kasan_atomics_helper+0x697/0x5450
[   15.394784]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.394808]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.394835]  ? kasan_atomics+0x152/0x310
[   15.394863]  kasan_atomics+0x1dc/0x310
[   15.394886]  ? __pfx_kasan_atomics+0x10/0x10
[   15.394912]  ? __pfx_read_tsc+0x10/0x10
[   15.394943]  ? ktime_get_ts64+0x86/0x230
[   15.394968]  kunit_try_run_case+0x1a5/0x480
[   15.394994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.395018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.395043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.395068]  ? __kthread_parkme+0x82/0x180
[   15.395090]  ? preempt_count_sub+0x50/0x80
[   15.395116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.395142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.395167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.395193]  kthread+0x337/0x6f0
[   15.395213]  ? trace_preempt_on+0x20/0xc0
[   15.395237]  ? __pfx_kthread+0x10/0x10
[   15.395278]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.395301]  ? calculate_sigpending+0x7b/0xa0
[   15.395327]  ? __pfx_kthread+0x10/0x10
[   15.395349]  ret_from_fork+0x116/0x1d0
[   15.395368]  ? __pfx_kthread+0x10/0x10
[   15.395389]  ret_from_fork_asm+0x1a/0x30
[   15.395421]  </TASK>
[   15.395433] 
[   15.402837] Allocated by task 282:
[   15.403363]  kasan_save_stack+0x45/0x70
[   15.403738]  kasan_save_track+0x18/0x40
[   15.403922]  kasan_save_alloc_info+0x3b/0x50
[   15.404125]  __kasan_kmalloc+0xb7/0xc0
[   15.404643]  __kmalloc_cache_noprof+0x189/0x420
[   15.405021]  kasan_atomics+0x95/0x310
[   15.405458]  kunit_try_run_case+0x1a5/0x480
[   15.405888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.406374]  kthread+0x337/0x6f0
[   15.406737]  ret_from_fork+0x116/0x1d0
[   15.406920]  ret_from_fork_asm+0x1a/0x30
[   15.407118] 
[   15.407216] The buggy address belongs to the object at ffff888102ac2380
[   15.407216]  which belongs to the cache kmalloc-64 of size 64
[   15.408461] The buggy address is located 0 bytes to the right of
[   15.408461]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.409407] 
[   15.409656] The buggy address belongs to the physical page:
[   15.410131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.410756] flags: 0x200000000000000(node=0|zone=2)
[   15.411213] page_type: f5(slab)
[   15.411619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.412177] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.412768] page dumped because: kasan: bad access detected
[   15.413103] 
[   15.413189] Memory state around the buggy address:
[   15.413371]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.413594]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.413811] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.414044]                                      ^
[   15.414204]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.414459]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.414677] ==================================================================
[   15.765748] ==================================================================
[   15.766421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.766787] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.767154] 
[   15.767278] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.767322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.767334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.767354] Call Trace:
[   15.767373]  <TASK>
[   15.767391]  dump_stack_lvl+0x73/0xb0
[   15.767422]  print_report+0xd1/0x650
[   15.767446]  ? __virt_addr_valid+0x1db/0x2d0
[   15.767469]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.767492]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.767516]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.767538]  kasan_report+0x141/0x180
[   15.767561]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.767588]  __asan_report_load4_noabort+0x18/0x20
[   15.767614]  kasan_atomics_helper+0x4a1c/0x5450
[   15.767638]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.767662]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.767687]  ? kasan_atomics+0x152/0x310
[   15.767727]  kasan_atomics+0x1dc/0x310
[   15.767749]  ? __pfx_kasan_atomics+0x10/0x10
[   15.767775]  ? __pfx_read_tsc+0x10/0x10
[   15.767809]  ? ktime_get_ts64+0x86/0x230
[   15.767834]  kunit_try_run_case+0x1a5/0x480
[   15.767859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.767890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.767916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.767956]  ? __kthread_parkme+0x82/0x180
[   15.767977]  ? preempt_count_sub+0x50/0x80
[   15.768003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.768028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.768053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.768088]  kthread+0x337/0x6f0
[   15.768108]  ? trace_preempt_on+0x20/0xc0
[   15.768133]  ? __pfx_kthread+0x10/0x10
[   15.768164]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.768187]  ? calculate_sigpending+0x7b/0xa0
[   15.768212]  ? __pfx_kthread+0x10/0x10
[   15.768244]  ret_from_fork+0x116/0x1d0
[   15.768264]  ? __pfx_kthread+0x10/0x10
[   15.768285]  ret_from_fork_asm+0x1a/0x30
[   15.768338]  </TASK>
[   15.768350] 
[   15.775949] Allocated by task 282:
[   15.776124]  kasan_save_stack+0x45/0x70
[   15.776357]  kasan_save_track+0x18/0x40
[   15.776535]  kasan_save_alloc_info+0x3b/0x50
[   15.776752]  __kasan_kmalloc+0xb7/0xc0
[   15.776953]  __kmalloc_cache_noprof+0x189/0x420
[   15.777179]  kasan_atomics+0x95/0x310
[   15.777384]  kunit_try_run_case+0x1a5/0x480
[   15.777605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.777844]  kthread+0x337/0x6f0
[   15.778026]  ret_from_fork+0x116/0x1d0
[   15.778172]  ret_from_fork_asm+0x1a/0x30
[   15.778451] 
[   15.778548] The buggy address belongs to the object at ffff888102ac2380
[   15.778548]  which belongs to the cache kmalloc-64 of size 64
[   15.778969] The buggy address is located 0 bytes to the right of
[   15.778969]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.779315] 
[   15.779386] The buggy address belongs to the physical page:
[   15.779549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.779861] flags: 0x200000000000000(node=0|zone=2)
[   15.780211] page_type: f5(slab)
[   15.780398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.780730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.781074] page dumped because: kasan: bad access detected
[   15.781364] 
[   15.781435] Memory state around the buggy address:
[   15.781589]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.781802]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.782025] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.782234]                                      ^
[   15.782725]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.783056]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.783518] ==================================================================
[   16.267158] ==================================================================
[   16.267845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.268381] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.268950] 
[   16.269192] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.269243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.269392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.269420] Call Trace:
[   16.269442]  <TASK>
[   16.269464]  dump_stack_lvl+0x73/0xb0
[   16.269499]  print_report+0xd1/0x650
[   16.269524]  ? __virt_addr_valid+0x1db/0x2d0
[   16.269549]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.269573]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.269597]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.269620]  kasan_report+0x141/0x180
[   16.269643]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.269670]  kasan_check_range+0x10c/0x1c0
[   16.269695]  __kasan_check_write+0x18/0x20
[   16.269716]  kasan_atomics_helper+0x1d7a/0x5450
[   16.269740]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.269764]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.269791]  ? kasan_atomics+0x152/0x310
[   16.269819]  kasan_atomics+0x1dc/0x310
[   16.269842]  ? __pfx_kasan_atomics+0x10/0x10
[   16.269868]  ? __pfx_read_tsc+0x10/0x10
[   16.269890]  ? ktime_get_ts64+0x86/0x230
[   16.269915]  kunit_try_run_case+0x1a5/0x480
[   16.270007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.270034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.270061]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.270087]  ? __kthread_parkme+0x82/0x180
[   16.270109]  ? preempt_count_sub+0x50/0x80
[   16.270135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.270161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.270186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.270213]  kthread+0x337/0x6f0
[   16.270232]  ? trace_preempt_on+0x20/0xc0
[   16.270281]  ? __pfx_kthread+0x10/0x10
[   16.270304]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.270328]  ? calculate_sigpending+0x7b/0xa0
[   16.270353]  ? __pfx_kthread+0x10/0x10
[   16.270375]  ret_from_fork+0x116/0x1d0
[   16.270395]  ? __pfx_kthread+0x10/0x10
[   16.270417]  ret_from_fork_asm+0x1a/0x30
[   16.270449]  </TASK>
[   16.270460] 
[   16.281857] Allocated by task 282:
[   16.282162]  kasan_save_stack+0x45/0x70
[   16.282486]  kasan_save_track+0x18/0x40
[   16.282782]  kasan_save_alloc_info+0x3b/0x50
[   16.283114]  __kasan_kmalloc+0xb7/0xc0
[   16.283428]  __kmalloc_cache_noprof+0x189/0x420
[   16.283750]  kasan_atomics+0x95/0x310
[   16.284047]  kunit_try_run_case+0x1a5/0x480
[   16.284450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.284734]  kthread+0x337/0x6f0
[   16.284912]  ret_from_fork+0x116/0x1d0
[   16.285107]  ret_from_fork_asm+0x1a/0x30
[   16.285310] 
[   16.285406] The buggy address belongs to the object at ffff888102ac2380
[   16.285406]  which belongs to the cache kmalloc-64 of size 64
[   16.285877] The buggy address is located 0 bytes to the right of
[   16.285877]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.286380] 
[   16.286473] The buggy address belongs to the physical page:
[   16.286726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.287678] flags: 0x200000000000000(node=0|zone=2)
[   16.288016] page_type: f5(slab)
[   16.288222] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.288764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.289210] page dumped because: kasan: bad access detected
[   16.289589] 
[   16.289811] Memory state around the buggy address:
[   16.290129]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.290580]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.291014] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.291428]                                      ^
[   16.291735]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.292167]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.292559] ==================================================================
[   16.029356] ==================================================================
[   16.029714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   16.030054] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.030420] 
[   16.030516] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.030559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.030572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.030592] Call Trace:
[   16.030611]  <TASK>
[   16.030628]  dump_stack_lvl+0x73/0xb0
[   16.030658]  print_report+0xd1/0x650
[   16.030681]  ? __virt_addr_valid+0x1db/0x2d0
[   16.030710]  ? kasan_atomics_helper+0x164f/0x5450
[   16.030732]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.030756]  ? kasan_atomics_helper+0x164f/0x5450
[   16.030779]  kasan_report+0x141/0x180
[   16.030801]  ? kasan_atomics_helper+0x164f/0x5450
[   16.030828]  kasan_check_range+0x10c/0x1c0
[   16.030853]  __kasan_check_write+0x18/0x20
[   16.030873]  kasan_atomics_helper+0x164f/0x5450
[   16.030897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.030920]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.030958]  ? kasan_atomics+0x152/0x310
[   16.030985]  kasan_atomics+0x1dc/0x310
[   16.031009]  ? __pfx_kasan_atomics+0x10/0x10
[   16.031035]  ? __pfx_read_tsc+0x10/0x10
[   16.031057]  ? ktime_get_ts64+0x86/0x230
[   16.031082]  kunit_try_run_case+0x1a5/0x480
[   16.031108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.031131]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.031157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.031182]  ? __kthread_parkme+0x82/0x180
[   16.031204]  ? preempt_count_sub+0x50/0x80
[   16.031230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.031256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.031293]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.031319]  kthread+0x337/0x6f0
[   16.031339]  ? trace_preempt_on+0x20/0xc0
[   16.031364]  ? __pfx_kthread+0x10/0x10
[   16.031386]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.031408]  ? calculate_sigpending+0x7b/0xa0
[   16.031434]  ? __pfx_kthread+0x10/0x10
[   16.031456]  ret_from_fork+0x116/0x1d0
[   16.031475]  ? __pfx_kthread+0x10/0x10
[   16.031497]  ret_from_fork_asm+0x1a/0x30
[   16.031527]  </TASK>
[   16.031539] 
[   16.038720] Allocated by task 282:
[   16.038853]  kasan_save_stack+0x45/0x70
[   16.039009]  kasan_save_track+0x18/0x40
[   16.039145]  kasan_save_alloc_info+0x3b/0x50
[   16.039427]  __kasan_kmalloc+0xb7/0xc0
[   16.039620]  __kmalloc_cache_noprof+0x189/0x420
[   16.039847]  kasan_atomics+0x95/0x310
[   16.040048]  kunit_try_run_case+0x1a5/0x480
[   16.040256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.040579]  kthread+0x337/0x6f0
[   16.040726]  ret_from_fork+0x116/0x1d0
[   16.040859]  ret_from_fork_asm+0x1a/0x30
[   16.041314] 
[   16.041478] The buggy address belongs to the object at ffff888102ac2380
[   16.041478]  which belongs to the cache kmalloc-64 of size 64
[   16.043217] The buggy address is located 0 bytes to the right of
[   16.043217]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.043608] 
[   16.043687] The buggy address belongs to the physical page:
[   16.043861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.044208] flags: 0x200000000000000(node=0|zone=2)
[   16.044448] page_type: f5(slab)
[   16.044717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.045120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.045567] page dumped because: kasan: bad access detected
[   16.045823] 
[   16.045915] Memory state around the buggy address:
[   16.046220]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.046689]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.047022] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.047409]                                      ^
[   16.047642]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.047893]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.048369] ==================================================================
[   16.431687] ==================================================================
[   16.432189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.432501] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.432825] 
[   16.432968] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.433013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.433027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.433048] Call Trace:
[   16.433067]  <TASK>
[   16.433087]  dump_stack_lvl+0x73/0xb0
[   16.433118]  print_report+0xd1/0x650
[   16.433142]  ? __virt_addr_valid+0x1db/0x2d0
[   16.433167]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.433192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.433216]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.433239]  kasan_report+0x141/0x180
[   16.433283]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.433310]  __asan_report_load8_noabort+0x18/0x20
[   16.433336]  kasan_atomics_helper+0x4fb2/0x5450
[   16.433361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.433386]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.433413]  ? kasan_atomics+0x152/0x310
[   16.433440]  kasan_atomics+0x1dc/0x310
[   16.433463]  ? __pfx_kasan_atomics+0x10/0x10
[   16.433488]  ? __pfx_read_tsc+0x10/0x10
[   16.433511]  ? ktime_get_ts64+0x86/0x230
[   16.433559]  kunit_try_run_case+0x1a5/0x480
[   16.433585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.433609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.433635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.433660]  ? __kthread_parkme+0x82/0x180
[   16.433682]  ? preempt_count_sub+0x50/0x80
[   16.433728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.433753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.433779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.433805]  kthread+0x337/0x6f0
[   16.433825]  ? trace_preempt_on+0x20/0xc0
[   16.433850]  ? __pfx_kthread+0x10/0x10
[   16.433890]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.433914]  ? calculate_sigpending+0x7b/0xa0
[   16.433950]  ? __pfx_kthread+0x10/0x10
[   16.433973]  ret_from_fork+0x116/0x1d0
[   16.433992]  ? __pfx_kthread+0x10/0x10
[   16.434014]  ret_from_fork_asm+0x1a/0x30
[   16.434046]  </TASK>
[   16.434058] 
[   16.441151] Allocated by task 282:
[   16.441359]  kasan_save_stack+0x45/0x70
[   16.441565]  kasan_save_track+0x18/0x40
[   16.441759]  kasan_save_alloc_info+0x3b/0x50
[   16.441928]  __kasan_kmalloc+0xb7/0xc0
[   16.442072]  __kmalloc_cache_noprof+0x189/0x420
[   16.442318]  kasan_atomics+0x95/0x310
[   16.442510]  kunit_try_run_case+0x1a5/0x480
[   16.442752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.443012]  kthread+0x337/0x6f0
[   16.443172]  ret_from_fork+0x116/0x1d0
[   16.443336]  ret_from_fork_asm+0x1a/0x30
[   16.443481] 
[   16.443571] The buggy address belongs to the object at ffff888102ac2380
[   16.443571]  which belongs to the cache kmalloc-64 of size 64
[   16.444138] The buggy address is located 0 bytes to the right of
[   16.444138]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.444574] 
[   16.444648] The buggy address belongs to the physical page:
[   16.444901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.445304] flags: 0x200000000000000(node=0|zone=2)
[   16.445565] page_type: f5(slab)
[   16.445721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.445987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.446274] page dumped because: kasan: bad access detected
[   16.446522] 
[   16.446615] Memory state around the buggy address:
[   16.446845]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.447180]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.447432] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.447748]                                      ^
[   16.447946]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.448239]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.448567] ==================================================================
[   15.561347] ==================================================================
[   15.561700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.562068] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.562423] 
[   15.562539] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.562584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.562596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.562619] Call Trace:
[   15.562637]  <TASK>
[   15.562654]  dump_stack_lvl+0x73/0xb0
[   15.562685]  print_report+0xd1/0x650
[   15.562715]  ? __virt_addr_valid+0x1db/0x2d0
[   15.562739]  ? kasan_atomics_helper+0xc70/0x5450
[   15.562762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.562787]  ? kasan_atomics_helper+0xc70/0x5450
[   15.562810]  kasan_report+0x141/0x180
[   15.562832]  ? kasan_atomics_helper+0xc70/0x5450
[   15.562860]  kasan_check_range+0x10c/0x1c0
[   15.562884]  __kasan_check_write+0x18/0x20
[   15.562905]  kasan_atomics_helper+0xc70/0x5450
[   15.562930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.562963]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.562990]  ? kasan_atomics+0x152/0x310
[   15.563017]  kasan_atomics+0x1dc/0x310
[   15.563040]  ? __pfx_kasan_atomics+0x10/0x10
[   15.563065]  ? __pfx_read_tsc+0x10/0x10
[   15.563088]  ? ktime_get_ts64+0x86/0x230
[   15.563113]  kunit_try_run_case+0x1a5/0x480
[   15.563138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.563162]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.563188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.563213]  ? __kthread_parkme+0x82/0x180
[   15.563235]  ? preempt_count_sub+0x50/0x80
[   15.563281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.563307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.563333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.563360]  kthread+0x337/0x6f0
[   15.563379]  ? trace_preempt_on+0x20/0xc0
[   15.563404]  ? __pfx_kthread+0x10/0x10
[   15.563425]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.563448]  ? calculate_sigpending+0x7b/0xa0
[   15.563474]  ? __pfx_kthread+0x10/0x10
[   15.563495]  ret_from_fork+0x116/0x1d0
[   15.563514]  ? __pfx_kthread+0x10/0x10
[   15.563535]  ret_from_fork_asm+0x1a/0x30
[   15.563567]  </TASK>
[   15.563579] 
[   15.571579] Allocated by task 282:
[   15.571761]  kasan_save_stack+0x45/0x70
[   15.572923]  kasan_save_track+0x18/0x40
[   15.573219]  kasan_save_alloc_info+0x3b/0x50
[   15.573384]  __kasan_kmalloc+0xb7/0xc0
[   15.573523]  __kmalloc_cache_noprof+0x189/0x420
[   15.573678]  kasan_atomics+0x95/0x310
[   15.573813]  kunit_try_run_case+0x1a5/0x480
[   15.573973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.574149]  kthread+0x337/0x6f0
[   15.574268]  ret_from_fork+0x116/0x1d0
[   15.574555]  ret_from_fork_asm+0x1a/0x30
[   15.574701] 
[   15.574780] The buggy address belongs to the object at ffff888102ac2380
[   15.574780]  which belongs to the cache kmalloc-64 of size 64
[   15.575724] The buggy address is located 0 bytes to the right of
[   15.575724]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.576896] 
[   15.577118] The buggy address belongs to the physical page:
[   15.577456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.577696] flags: 0x200000000000000(node=0|zone=2)
[   15.577866] page_type: f5(slab)
[   15.578000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.578224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.579044] page dumped because: kasan: bad access detected
[   15.579579] 
[   15.579740] Memory state around the buggy address:
[   15.580205]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.580854]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.581504] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.582140]                                      ^
[   15.582593]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.583221]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.583692] ==================================================================
[   15.173512] ==================================================================
[   15.174798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   15.176152] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.177135] 
[   15.177633] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.177781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.177800] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.177824] Call Trace:
[   15.177838]  <TASK>
[   15.177859]  dump_stack_lvl+0x73/0xb0
[   15.177896]  print_report+0xd1/0x650
[   15.177921]  ? __virt_addr_valid+0x1db/0x2d0
[   15.177980]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.178003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.178026]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.178048]  kasan_report+0x141/0x180
[   15.178070]  ? kasan_atomics_helper+0x4bbc/0x5450
[   15.178096]  __asan_report_load4_noabort+0x18/0x20
[   15.178121]  kasan_atomics_helper+0x4bbc/0x5450
[   15.178144]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.178168]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.178195]  ? kasan_atomics+0x152/0x310
[   15.178220]  kasan_atomics+0x1dc/0x310
[   15.178243]  ? __pfx_kasan_atomics+0x10/0x10
[   15.178267]  ? __pfx_read_tsc+0x10/0x10
[   15.178290]  ? ktime_get_ts64+0x86/0x230
[   15.178316]  kunit_try_run_case+0x1a5/0x480
[   15.178342]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.178365]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.178390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.178414]  ? __kthread_parkme+0x82/0x180
[   15.178437]  ? preempt_count_sub+0x50/0x80
[   15.178462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.178487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.178512]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.178538]  kthread+0x337/0x6f0
[   15.178557]  ? trace_preempt_on+0x20/0xc0
[   15.178582]  ? __pfx_kthread+0x10/0x10
[   15.178603]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.178625]  ? calculate_sigpending+0x7b/0xa0
[   15.178650]  ? __pfx_kthread+0x10/0x10
[   15.178671]  ret_from_fork+0x116/0x1d0
[   15.178690]  ? __pfx_kthread+0x10/0x10
[   15.178715]  ret_from_fork_asm+0x1a/0x30
[   15.178748]  </TASK>
[   15.178760] 
[   15.194737] Allocated by task 282:
[   15.195214]  kasan_save_stack+0x45/0x70
[   15.195525]  kasan_save_track+0x18/0x40
[   15.195666]  kasan_save_alloc_info+0x3b/0x50
[   15.195810]  __kasan_kmalloc+0xb7/0xc0
[   15.195959]  __kmalloc_cache_noprof+0x189/0x420
[   15.196680]  kasan_atomics+0x95/0x310
[   15.197136]  kunit_try_run_case+0x1a5/0x480
[   15.197706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.198359]  kthread+0x337/0x6f0
[   15.198784]  ret_from_fork+0x116/0x1d0
[   15.199306]  ret_from_fork_asm+0x1a/0x30
[   15.199792] 
[   15.199966] The buggy address belongs to the object at ffff888102ac2380
[   15.199966]  which belongs to the cache kmalloc-64 of size 64
[   15.200666] The buggy address is located 0 bytes to the right of
[   15.200666]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.201668] 
[   15.201845] The buggy address belongs to the physical page:
[   15.202573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.203506] flags: 0x200000000000000(node=0|zone=2)
[   15.204192] page_type: f5(slab)
[   15.204516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.205095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.205781] page dumped because: kasan: bad access detected
[   15.206133] 
[   15.206479] Memory state around the buggy address:
[   15.207105]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.207692]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.207913] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.208801]                                      ^
[   15.209421]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.209874]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.210688] ==================================================================
[   15.945384] ==================================================================
[   15.946198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.946435] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.946750] 
[   15.946863] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.946905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.946917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.946949] Call Trace:
[   15.946968]  <TASK>
[   15.946987]  dump_stack_lvl+0x73/0xb0
[   15.947017]  print_report+0xd1/0x650
[   15.947040]  ? __virt_addr_valid+0x1db/0x2d0
[   15.947062]  ? kasan_atomics_helper+0x1467/0x5450
[   15.947084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.947107]  ? kasan_atomics_helper+0x1467/0x5450
[   15.947128]  kasan_report+0x141/0x180
[   15.947149]  ? kasan_atomics_helper+0x1467/0x5450
[   15.947175]  kasan_check_range+0x10c/0x1c0
[   15.947198]  __kasan_check_write+0x18/0x20
[   15.947218]  kasan_atomics_helper+0x1467/0x5450
[   15.947241]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.947264]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.947289]  ? kasan_atomics+0x152/0x310
[   15.947315]  kasan_atomics+0x1dc/0x310
[   15.947337]  ? __pfx_kasan_atomics+0x10/0x10
[   15.947362]  ? __pfx_read_tsc+0x10/0x10
[   15.947411]  ? ktime_get_ts64+0x86/0x230
[   15.947449]  kunit_try_run_case+0x1a5/0x480
[   15.947475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.947511]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.947537]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.947574]  ? __kthread_parkme+0x82/0x180
[   15.947597]  ? preempt_count_sub+0x50/0x80
[   15.948248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.948325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.948459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.948493]  kthread+0x337/0x6f0
[   15.948514]  ? trace_preempt_on+0x20/0xc0
[   15.948742]  ? __pfx_kthread+0x10/0x10
[   15.948766]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.948792]  ? calculate_sigpending+0x7b/0xa0
[   15.948821]  ? __pfx_kthread+0x10/0x10
[   15.948844]  ret_from_fork+0x116/0x1d0
[   15.948864]  ? __pfx_kthread+0x10/0x10
[   15.948886]  ret_from_fork_asm+0x1a/0x30
[   15.948919]  </TASK>
[   15.948932] 
[   15.961763] Allocated by task 282:
[   15.962132]  kasan_save_stack+0x45/0x70
[   15.962652]  kasan_save_track+0x18/0x40
[   15.962919]  kasan_save_alloc_info+0x3b/0x50
[   15.963448]  __kasan_kmalloc+0xb7/0xc0
[   15.963679]  __kmalloc_cache_noprof+0x189/0x420
[   15.963897]  kasan_atomics+0x95/0x310
[   15.964086]  kunit_try_run_case+0x1a5/0x480
[   15.964534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.964924]  kthread+0x337/0x6f0
[   15.965248]  ret_from_fork+0x116/0x1d0
[   15.965575]  ret_from_fork_asm+0x1a/0x30
[   15.965892] 
[   15.966001] The buggy address belongs to the object at ffff888102ac2380
[   15.966001]  which belongs to the cache kmalloc-64 of size 64
[   15.966960] The buggy address is located 0 bytes to the right of
[   15.966960]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.967730] 
[   15.967985] The buggy address belongs to the physical page:
[   15.968487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.968900] flags: 0x200000000000000(node=0|zone=2)
[   15.969138] page_type: f5(slab)
[   15.969577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.970044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.970627] page dumped because: kasan: bad access detected
[   15.970870] 
[   15.970974] Memory state around the buggy address:
[   15.971183]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.972088]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.972569] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.973052]                                      ^
[   15.973476]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.973966]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.974503] ==================================================================
[   15.211751] ==================================================================
[   15.212027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.212579] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.212873] 
[   15.213018] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.213064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.213076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.213097] Call Trace:
[   15.213116]  <TASK>
[   15.213418]  dump_stack_lvl+0x73/0xb0
[   15.213457]  print_report+0xd1/0x650
[   15.213481]  ? __virt_addr_valid+0x1db/0x2d0
[   15.213504]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.213526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.213548]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.213571]  kasan_report+0x141/0x180
[   15.213593]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.213618]  __asan_report_store4_noabort+0x1b/0x30
[   15.213644]  kasan_atomics_helper+0x4ba2/0x5450
[   15.213667]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.213689]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.213714]  ? kasan_atomics+0x152/0x310
[   15.213741]  kasan_atomics+0x1dc/0x310
[   15.213762]  ? __pfx_kasan_atomics+0x10/0x10
[   15.213786]  ? __pfx_read_tsc+0x10/0x10
[   15.213808]  ? ktime_get_ts64+0x86/0x230
[   15.213832]  kunit_try_run_case+0x1a5/0x480
[   15.213857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.213879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.213903]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.213927]  ? __kthread_parkme+0x82/0x180
[   15.214139]  ? preempt_count_sub+0x50/0x80
[   15.214167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.214192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.214219]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.214245]  kthread+0x337/0x6f0
[   15.214279]  ? trace_preempt_on+0x20/0xc0
[   15.214304]  ? __pfx_kthread+0x10/0x10
[   15.214325]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.214348]  ? calculate_sigpending+0x7b/0xa0
[   15.214373]  ? __pfx_kthread+0x10/0x10
[   15.214394]  ret_from_fork+0x116/0x1d0
[   15.214413]  ? __pfx_kthread+0x10/0x10
[   15.214433]  ret_from_fork_asm+0x1a/0x30
[   15.214464]  </TASK>
[   15.214475] 
[   15.222740] Allocated by task 282:
[   15.222903]  kasan_save_stack+0x45/0x70
[   15.223096]  kasan_save_track+0x18/0x40
[   15.223261]  kasan_save_alloc_info+0x3b/0x50
[   15.223524]  __kasan_kmalloc+0xb7/0xc0
[   15.223685]  __kmalloc_cache_noprof+0x189/0x420
[   15.223840]  kasan_atomics+0x95/0x310
[   15.223983]  kunit_try_run_case+0x1a5/0x480
[   15.224149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.224556]  kthread+0x337/0x6f0
[   15.224776]  ret_from_fork+0x116/0x1d0
[   15.224970]  ret_from_fork_asm+0x1a/0x30
[   15.225239] 
[   15.225418] The buggy address belongs to the object at ffff888102ac2380
[   15.225418]  which belongs to the cache kmalloc-64 of size 64
[   15.225894] The buggy address is located 0 bytes to the right of
[   15.225894]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.226626] 
[   15.226720] The buggy address belongs to the physical page:
[   15.227003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.227390] flags: 0x200000000000000(node=0|zone=2)
[   15.227581] page_type: f5(slab)
[   15.227701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.228025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.228464] page dumped because: kasan: bad access detected
[   15.228683] 
[   15.228761] Memory state around the buggy address:
[   15.228962]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.229351]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.229723] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.229948]                                      ^
[   15.230100]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.230310]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.230623] ==================================================================
[   15.686439] ==================================================================
[   15.686745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.687266] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.687587] 
[   15.687704] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.687758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.687771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.687803] Call Trace:
[   15.687822]  <TASK>
[   15.687843]  dump_stack_lvl+0x73/0xb0
[   15.687875]  print_report+0xd1/0x650
[   15.687900]  ? __virt_addr_valid+0x1db/0x2d0
[   15.687923]  ? kasan_atomics_helper+0xf10/0x5450
[   15.687957]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.687982]  ? kasan_atomics_helper+0xf10/0x5450
[   15.688004]  kasan_report+0x141/0x180
[   15.688027]  ? kasan_atomics_helper+0xf10/0x5450
[   15.688054]  kasan_check_range+0x10c/0x1c0
[   15.688078]  __kasan_check_write+0x18/0x20
[   15.688099]  kasan_atomics_helper+0xf10/0x5450
[   15.688123]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.688147]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.688173]  ? kasan_atomics+0x152/0x310
[   15.688200]  kasan_atomics+0x1dc/0x310
[   15.688226]  ? __pfx_kasan_atomics+0x10/0x10
[   15.688251]  ? __pfx_read_tsc+0x10/0x10
[   15.688301]  ? ktime_get_ts64+0x86/0x230
[   15.688329]  kunit_try_run_case+0x1a5/0x480
[   15.688354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.688388]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.688425]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.688450]  ? __kthread_parkme+0x82/0x180
[   15.688474]  ? preempt_count_sub+0x50/0x80
[   15.688511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.688540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.688568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.688594]  kthread+0x337/0x6f0
[   15.688614]  ? trace_preempt_on+0x20/0xc0
[   15.688639]  ? __pfx_kthread+0x10/0x10
[   15.688662]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.688684]  ? calculate_sigpending+0x7b/0xa0
[   15.688719]  ? __pfx_kthread+0x10/0x10
[   15.688742]  ret_from_fork+0x116/0x1d0
[   15.688762]  ? __pfx_kthread+0x10/0x10
[   15.688795]  ret_from_fork_asm+0x1a/0x30
[   15.688827]  </TASK>
[   15.688839] 
[   15.696864] Allocated by task 282:
[   15.697010]  kasan_save_stack+0x45/0x70
[   15.697162]  kasan_save_track+0x18/0x40
[   15.697317]  kasan_save_alloc_info+0x3b/0x50
[   15.697531]  __kasan_kmalloc+0xb7/0xc0
[   15.697750]  __kmalloc_cache_noprof+0x189/0x420
[   15.697979]  kasan_atomics+0x95/0x310
[   15.698167]  kunit_try_run_case+0x1a5/0x480
[   15.698374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.698549]  kthread+0x337/0x6f0
[   15.698671]  ret_from_fork+0x116/0x1d0
[   15.698813]  ret_from_fork_asm+0x1a/0x30
[   15.698962] 
[   15.699069] The buggy address belongs to the object at ffff888102ac2380
[   15.699069]  which belongs to the cache kmalloc-64 of size 64
[   15.700074] The buggy address is located 0 bytes to the right of
[   15.700074]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.700697] 
[   15.700818] The buggy address belongs to the physical page:
[   15.701018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.701423] flags: 0x200000000000000(node=0|zone=2)
[   15.701687] page_type: f5(slab)
[   15.701840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.702174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.702544] page dumped because: kasan: bad access detected
[   15.702800] 
[   15.702892] Memory state around the buggy address:
[   15.703118]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.703446]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.703742] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.704062]                                      ^
[   15.704284]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.704602]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.704914] ==================================================================
[   15.975276] ==================================================================
[   15.975545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.975858] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.976189] 
[   15.976410] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.976456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.976468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.976490] Call Trace:
[   15.976510]  <TASK>
[   15.976530]  dump_stack_lvl+0x73/0xb0
[   15.976562]  print_report+0xd1/0x650
[   15.976586]  ? __virt_addr_valid+0x1db/0x2d0
[   15.976611]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.976634]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.976659]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.976682]  kasan_report+0x141/0x180
[   15.976705]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.976733]  __asan_report_store8_noabort+0x1b/0x30
[   15.976760]  kasan_atomics_helper+0x50d4/0x5450
[   15.976785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.976809]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.976836]  ? kasan_atomics+0x152/0x310
[   15.976863]  kasan_atomics+0x1dc/0x310
[   15.976887]  ? __pfx_kasan_atomics+0x10/0x10
[   15.976912]  ? __pfx_read_tsc+0x10/0x10
[   15.976946]  ? ktime_get_ts64+0x86/0x230
[   15.976972]  kunit_try_run_case+0x1a5/0x480
[   15.976998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.977023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.977049]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.977074]  ? __kthread_parkme+0x82/0x180
[   15.977096]  ? preempt_count_sub+0x50/0x80
[   15.977121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.977147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.977173]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.977199]  kthread+0x337/0x6f0
[   15.977219]  ? trace_preempt_on+0x20/0xc0
[   15.977244]  ? __pfx_kthread+0x10/0x10
[   15.977266]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.977288]  ? calculate_sigpending+0x7b/0xa0
[   15.977314]  ? __pfx_kthread+0x10/0x10
[   15.977336]  ret_from_fork+0x116/0x1d0
[   15.977355]  ? __pfx_kthread+0x10/0x10
[   15.977377]  ret_from_fork_asm+0x1a/0x30
[   15.977409]  </TASK>
[   15.977420] 
[   15.984607] Allocated by task 282:
[   15.984778]  kasan_save_stack+0x45/0x70
[   15.984962]  kasan_save_track+0x18/0x40
[   15.985098]  kasan_save_alloc_info+0x3b/0x50
[   15.985248]  __kasan_kmalloc+0xb7/0xc0
[   15.985485]  __kmalloc_cache_noprof+0x189/0x420
[   15.985707]  kasan_atomics+0x95/0x310
[   15.986002]  kunit_try_run_case+0x1a5/0x480
[   15.986179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.986618]  kthread+0x337/0x6f0
[   15.986772]  ret_from_fork+0x116/0x1d0
[   15.986993]  ret_from_fork_asm+0x1a/0x30
[   15.987198] 
[   15.987279] The buggy address belongs to the object at ffff888102ac2380
[   15.987279]  which belongs to the cache kmalloc-64 of size 64
[   15.987747] The buggy address is located 0 bytes to the right of
[   15.987747]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.988196] 
[   15.988273] The buggy address belongs to the physical page:
[   15.988536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.988851] flags: 0x200000000000000(node=0|zone=2)
[   15.989065] page_type: f5(slab)
[   15.989233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.989461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.989686] page dumped because: kasan: bad access detected
[   15.989855] 
[   15.989925] Memory state around the buggy address:
[   15.990140]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.990518]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.990837] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.991147]                                      ^
[   15.991360]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.991645]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.991856] ==================================================================
[   16.120382] ==================================================================
[   16.120691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.120925] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.121412] 
[   16.121527] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.121572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.121587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.121611] Call Trace:
[   16.121631]  <TASK>
[   16.121650]  dump_stack_lvl+0x73/0xb0
[   16.121681]  print_report+0xd1/0x650
[   16.121706]  ? __virt_addr_valid+0x1db/0x2d0
[   16.121730]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.121753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.121777]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.121799]  kasan_report+0x141/0x180
[   16.121823]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.121851]  kasan_check_range+0x10c/0x1c0
[   16.121875]  __kasan_check_write+0x18/0x20
[   16.121896]  kasan_atomics_helper+0x18b1/0x5450
[   16.121919]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.121956]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.121982]  ? kasan_atomics+0x152/0x310
[   16.122009]  kasan_atomics+0x1dc/0x310
[   16.122033]  ? __pfx_kasan_atomics+0x10/0x10
[   16.122058]  ? __pfx_read_tsc+0x10/0x10
[   16.122080]  ? ktime_get_ts64+0x86/0x230
[   16.122104]  kunit_try_run_case+0x1a5/0x480
[   16.122130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.122154]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.122180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.122204]  ? __kthread_parkme+0x82/0x180
[   16.122226]  ? preempt_count_sub+0x50/0x80
[   16.122251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.122297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.122322]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.122349]  kthread+0x337/0x6f0
[   16.122369]  ? trace_preempt_on+0x20/0xc0
[   16.122393]  ? __pfx_kthread+0x10/0x10
[   16.122414]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.122436]  ? calculate_sigpending+0x7b/0xa0
[   16.122462]  ? __pfx_kthread+0x10/0x10
[   16.122484]  ret_from_fork+0x116/0x1d0
[   16.122503]  ? __pfx_kthread+0x10/0x10
[   16.122524]  ret_from_fork_asm+0x1a/0x30
[   16.122556]  </TASK>
[   16.122567] 
[   16.129568] Allocated by task 282:
[   16.129744]  kasan_save_stack+0x45/0x70
[   16.129953]  kasan_save_track+0x18/0x40
[   16.130143]  kasan_save_alloc_info+0x3b/0x50
[   16.130379]  __kasan_kmalloc+0xb7/0xc0
[   16.130548]  __kmalloc_cache_noprof+0x189/0x420
[   16.130731]  kasan_atomics+0x95/0x310
[   16.130918]  kunit_try_run_case+0x1a5/0x480
[   16.131102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.131303]  kthread+0x337/0x6f0
[   16.131426]  ret_from_fork+0x116/0x1d0
[   16.131615]  ret_from_fork_asm+0x1a/0x30
[   16.131808] 
[   16.131903] The buggy address belongs to the object at ffff888102ac2380
[   16.131903]  which belongs to the cache kmalloc-64 of size 64
[   16.132447] The buggy address is located 0 bytes to the right of
[   16.132447]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.132901] 
[   16.132982] The buggy address belongs to the physical page:
[   16.133153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.133418] flags: 0x200000000000000(node=0|zone=2)
[   16.133625] page_type: f5(slab)
[   16.133796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.134150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.134512] page dumped because: kasan: bad access detected
[   16.134763] 
[   16.134855] Memory state around the buggy address:
[   16.135018]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.135233]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.135500] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.135816]                                      ^
[   16.136045]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.136390]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.136709] ==================================================================
[   15.867358] ==================================================================
[   15.867716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.868644] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.868929] 
[   15.869082] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.869126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.869138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.869159] Call Trace:
[   15.869178]  <TASK>
[   15.869197]  dump_stack_lvl+0x73/0xb0
[   15.869230]  print_report+0xd1/0x650
[   15.869268]  ? __virt_addr_valid+0x1db/0x2d0
[   15.869292]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.869337]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.869363]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.869386]  kasan_report+0x141/0x180
[   15.869420]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.869457]  kasan_check_range+0x10c/0x1c0
[   15.869481]  __kasan_check_write+0x18/0x20
[   15.869501]  kasan_atomics_helper+0x12e6/0x5450
[   15.869536]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.869559]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.869586]  ? kasan_atomics+0x152/0x310
[   15.869622]  kasan_atomics+0x1dc/0x310
[   15.869645]  ? __pfx_kasan_atomics+0x10/0x10
[   15.869681]  ? __pfx_read_tsc+0x10/0x10
[   15.869704]  ? ktime_get_ts64+0x86/0x230
[   15.869729]  kunit_try_run_case+0x1a5/0x480
[   15.869764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.869787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.869813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.869850]  ? __kthread_parkme+0x82/0x180
[   15.869873]  ? preempt_count_sub+0x50/0x80
[   15.869899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.869955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.869982]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.870018]  kthread+0x337/0x6f0
[   15.870038]  ? trace_preempt_on+0x20/0xc0
[   15.870064]  ? __pfx_kthread+0x10/0x10
[   15.870086]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.870108]  ? calculate_sigpending+0x7b/0xa0
[   15.870143]  ? __pfx_kthread+0x10/0x10
[   15.870167]  ret_from_fork+0x116/0x1d0
[   15.870198]  ? __pfx_kthread+0x10/0x10
[   15.870219]  ret_from_fork_asm+0x1a/0x30
[   15.870250]  </TASK>
[   15.870261] 
[   15.877878] Allocated by task 282:
[   15.878019]  kasan_save_stack+0x45/0x70
[   15.878166]  kasan_save_track+0x18/0x40
[   15.878403]  kasan_save_alloc_info+0x3b/0x50
[   15.878613]  __kasan_kmalloc+0xb7/0xc0
[   15.878804]  __kmalloc_cache_noprof+0x189/0x420
[   15.879037]  kasan_atomics+0x95/0x310
[   15.879225]  kunit_try_run_case+0x1a5/0x480
[   15.879660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.879872]  kthread+0x337/0x6f0
[   15.880015]  ret_from_fork+0x116/0x1d0
[   15.880150]  ret_from_fork_asm+0x1a/0x30
[   15.880290] 
[   15.880361] The buggy address belongs to the object at ffff888102ac2380
[   15.880361]  which belongs to the cache kmalloc-64 of size 64
[   15.881028] The buggy address is located 0 bytes to the right of
[   15.881028]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.881539] 
[   15.881614] The buggy address belongs to the physical page:
[   15.881790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.882173] flags: 0x200000000000000(node=0|zone=2)
[   15.882510] page_type: f5(slab)
[   15.882684] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.883228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.883666] page dumped because: kasan: bad access detected
[   15.883838] 
[   15.883907] Memory state around the buggy address:
[   15.884072]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.884455]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.884803] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.885157]                                      ^
[   15.885376]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.885684]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.885982] ==================================================================
[   15.372192] ==================================================================
[   15.372985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.373649] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.374303] 
[   15.374516] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.374675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.374692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.374721] Call Trace:
[   15.374741]  <TASK>
[   15.374761]  dump_stack_lvl+0x73/0xb0
[   15.374795]  print_report+0xd1/0x650
[   15.374820]  ? __virt_addr_valid+0x1db/0x2d0
[   15.374844]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.374867]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.374892]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.374915]  kasan_report+0x141/0x180
[   15.374948]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.374977]  kasan_check_range+0x10c/0x1c0
[   15.375001]  __kasan_check_write+0x18/0x20
[   15.375022]  kasan_atomics_helper+0x5fe/0x5450
[   15.375046]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.375070]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.375097]  ? kasan_atomics+0x152/0x310
[   15.375125]  kasan_atomics+0x1dc/0x310
[   15.375149]  ? __pfx_kasan_atomics+0x10/0x10
[   15.375174]  ? __pfx_read_tsc+0x10/0x10
[   15.375196]  ? ktime_get_ts64+0x86/0x230
[   15.375222]  kunit_try_run_case+0x1a5/0x480
[   15.375248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.375279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.375305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.375330]  ? __kthread_parkme+0x82/0x180
[   15.375352]  ? preempt_count_sub+0x50/0x80
[   15.375378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.375403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.375430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.375456]  kthread+0x337/0x6f0
[   15.375476]  ? trace_preempt_on+0x20/0xc0
[   15.375500]  ? __pfx_kthread+0x10/0x10
[   15.375521]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.375544]  ? calculate_sigpending+0x7b/0xa0
[   15.375570]  ? __pfx_kthread+0x10/0x10
[   15.375592]  ret_from_fork+0x116/0x1d0
[   15.375611]  ? __pfx_kthread+0x10/0x10
[   15.375633]  ret_from_fork_asm+0x1a/0x30
[   15.375664]  </TASK>
[   15.375676] 
[   15.383558] Allocated by task 282:
[   15.383745]  kasan_save_stack+0x45/0x70
[   15.383961]  kasan_save_track+0x18/0x40
[   15.384136]  kasan_save_alloc_info+0x3b/0x50
[   15.384386]  __kasan_kmalloc+0xb7/0xc0
[   15.384522]  __kmalloc_cache_noprof+0x189/0x420
[   15.384678]  kasan_atomics+0x95/0x310
[   15.384836]  kunit_try_run_case+0x1a5/0x480
[   15.385091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.385432]  kthread+0x337/0x6f0
[   15.385604]  ret_from_fork+0x116/0x1d0
[   15.385825]  ret_from_fork_asm+0x1a/0x30
[   15.386047] 
[   15.386186] The buggy address belongs to the object at ffff888102ac2380
[   15.386186]  which belongs to the cache kmalloc-64 of size 64
[   15.386716] The buggy address is located 0 bytes to the right of
[   15.386716]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.387321] 
[   15.387455] The buggy address belongs to the physical page:
[   15.387728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.388117] flags: 0x200000000000000(node=0|zone=2)
[   15.388323] page_type: f5(slab)
[   15.388531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.388893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.389360] page dumped because: kasan: bad access detected
[   15.389626] 
[   15.389719] Memory state around the buggy address:
[   15.389995]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.390312]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.390545] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.390872]                                      ^
[   15.391151]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.391506]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.391760] ==================================================================
[   15.830099] ==================================================================
[   15.831009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.831353] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.831765] 
[   15.831882] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.831927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.831951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.831983] Call Trace:
[   15.832004]  <TASK>
[   15.832025]  dump_stack_lvl+0x73/0xb0
[   15.832070]  print_report+0xd1/0x650
[   15.832104]  ? __virt_addr_valid+0x1db/0x2d0
[   15.832130]  ? kasan_atomics_helper+0x1217/0x5450
[   15.832165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.832190]  ? kasan_atomics_helper+0x1217/0x5450
[   15.832214]  kasan_report+0x141/0x180
[   15.832236]  ? kasan_atomics_helper+0x1217/0x5450
[   15.832264]  kasan_check_range+0x10c/0x1c0
[   15.832301]  __kasan_check_write+0x18/0x20
[   15.832321]  kasan_atomics_helper+0x1217/0x5450
[   15.832345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.832370]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.832398]  ? kasan_atomics+0x152/0x310
[   15.832425]  kasan_atomics+0x1dc/0x310
[   15.832449]  ? __pfx_kasan_atomics+0x10/0x10
[   15.832475]  ? __pfx_read_tsc+0x10/0x10
[   15.832497]  ? ktime_get_ts64+0x86/0x230
[   15.832522]  kunit_try_run_case+0x1a5/0x480
[   15.832548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.832571]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.832607]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.832632]  ? __kthread_parkme+0x82/0x180
[   15.832653]  ? preempt_count_sub+0x50/0x80
[   15.832689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.832715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.832740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.832767]  kthread+0x337/0x6f0
[   15.832786]  ? trace_preempt_on+0x20/0xc0
[   15.832811]  ? __pfx_kthread+0x10/0x10
[   15.832833]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.832856]  ? calculate_sigpending+0x7b/0xa0
[   15.832881]  ? __pfx_kthread+0x10/0x10
[   15.832903]  ret_from_fork+0x116/0x1d0
[   15.832923]  ? __pfx_kthread+0x10/0x10
[   15.832953]  ret_from_fork_asm+0x1a/0x30
[   15.832987]  </TASK>
[   15.832999] 
[   15.840646] Allocated by task 282:
[   15.840828]  kasan_save_stack+0x45/0x70
[   15.841044]  kasan_save_track+0x18/0x40
[   15.841203]  kasan_save_alloc_info+0x3b/0x50
[   15.841555]  __kasan_kmalloc+0xb7/0xc0
[   15.841712]  __kmalloc_cache_noprof+0x189/0x420
[   15.841914]  kasan_atomics+0x95/0x310
[   15.842137]  kunit_try_run_case+0x1a5/0x480
[   15.842355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.842567]  kthread+0x337/0x6f0
[   15.842748]  ret_from_fork+0x116/0x1d0
[   15.842923]  ret_from_fork_asm+0x1a/0x30
[   15.843109] 
[   15.843214] The buggy address belongs to the object at ffff888102ac2380
[   15.843214]  which belongs to the cache kmalloc-64 of size 64
[   15.843719] The buggy address is located 0 bytes to the right of
[   15.843719]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.844215] 
[   15.844290] The buggy address belongs to the physical page:
[   15.844464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.844705] flags: 0x200000000000000(node=0|zone=2)
[   15.845014] page_type: f5(slab)
[   15.845186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.845708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.845944] page dumped because: kasan: bad access detected
[   15.846114] 
[   15.846182] Memory state around the buggy address:
[   15.846488]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.846811]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.847203] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.847644]                                      ^
[   15.847898]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.848255]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.848492] ==================================================================
[   15.992323] ==================================================================
[   15.992675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.993223] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.993805] 
[   15.993919] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.993975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.993987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.994008] Call Trace:
[   15.994026]  <TASK>
[   15.994043]  dump_stack_lvl+0x73/0xb0
[   15.994074]  print_report+0xd1/0x650
[   15.994098]  ? __virt_addr_valid+0x1db/0x2d0
[   15.994122]  ? kasan_atomics_helper+0x151d/0x5450
[   15.994145]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.994170]  ? kasan_atomics_helper+0x151d/0x5450
[   15.994193]  kasan_report+0x141/0x180
[   15.994216]  ? kasan_atomics_helper+0x151d/0x5450
[   15.994243]  kasan_check_range+0x10c/0x1c0
[   15.994283]  __kasan_check_write+0x18/0x20
[   15.994305]  kasan_atomics_helper+0x151d/0x5450
[   15.994332]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.994357]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.994384]  ? kasan_atomics+0x152/0x310
[   15.994412]  kasan_atomics+0x1dc/0x310
[   15.994436]  ? __pfx_kasan_atomics+0x10/0x10
[   15.994462]  ? __pfx_read_tsc+0x10/0x10
[   15.994484]  ? ktime_get_ts64+0x86/0x230
[   15.994509]  kunit_try_run_case+0x1a5/0x480
[   15.994535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.994561]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.994586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.994611]  ? __kthread_parkme+0x82/0x180
[   15.994633]  ? preempt_count_sub+0x50/0x80
[   15.994658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.994683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.994716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.994742]  kthread+0x337/0x6f0
[   15.994762]  ? trace_preempt_on+0x20/0xc0
[   15.994787]  ? __pfx_kthread+0x10/0x10
[   15.994808]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.994831]  ? calculate_sigpending+0x7b/0xa0
[   15.994857]  ? __pfx_kthread+0x10/0x10
[   15.994880]  ret_from_fork+0x116/0x1d0
[   15.994900]  ? __pfx_kthread+0x10/0x10
[   15.994922]  ret_from_fork_asm+0x1a/0x30
[   15.994966]  </TASK>
[   15.994977] 
[   16.002652] Allocated by task 282:
[   16.003330]  kasan_save_stack+0x45/0x70
[   16.003767]  kasan_save_track+0x18/0x40
[   16.003907]  kasan_save_alloc_info+0x3b/0x50
[   16.004070]  __kasan_kmalloc+0xb7/0xc0
[   16.004204]  __kmalloc_cache_noprof+0x189/0x420
[   16.004620]  kasan_atomics+0x95/0x310
[   16.004814]  kunit_try_run_case+0x1a5/0x480
[   16.005043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.005293]  kthread+0x337/0x6f0
[   16.005413]  ret_from_fork+0x116/0x1d0
[   16.005546]  ret_from_fork_asm+0x1a/0x30
[   16.005686] 
[   16.005757] The buggy address belongs to the object at ffff888102ac2380
[   16.005757]  which belongs to the cache kmalloc-64 of size 64
[   16.006532] The buggy address is located 0 bytes to the right of
[   16.006532]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.006972] 
[   16.007048] The buggy address belongs to the physical page:
[   16.007219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.007575] flags: 0x200000000000000(node=0|zone=2)
[   16.007812] page_type: f5(slab)
[   16.007998] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.008423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.008813] page dumped because: kasan: bad access detected
[   16.009058] 
[   16.009143] Memory state around the buggy address:
[   16.009362]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.009628]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.009908] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.010129]                                      ^
[   16.010284]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.010500]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.010772] ==================================================================
[   15.747372] ==================================================================
[   15.747734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.748050] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.748542] 
[   15.748674] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.748730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.748743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.748765] Call Trace:
[   15.748794]  <TASK>
[   15.748813]  dump_stack_lvl+0x73/0xb0
[   15.748846]  print_report+0xd1/0x650
[   15.748870]  ? __virt_addr_valid+0x1db/0x2d0
[   15.748893]  ? kasan_atomics_helper+0x1079/0x5450
[   15.748923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.748957]  ? kasan_atomics_helper+0x1079/0x5450
[   15.748980]  kasan_report+0x141/0x180
[   15.749014]  ? kasan_atomics_helper+0x1079/0x5450
[   15.749043]  kasan_check_range+0x10c/0x1c0
[   15.749077]  __kasan_check_write+0x18/0x20
[   15.749098]  kasan_atomics_helper+0x1079/0x5450
[   15.749122]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.749156]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.749182]  ? kasan_atomics+0x152/0x310
[   15.749210]  kasan_atomics+0x1dc/0x310
[   15.749233]  ? __pfx_kasan_atomics+0x10/0x10
[   15.749259]  ? __pfx_read_tsc+0x10/0x10
[   15.749281]  ? ktime_get_ts64+0x86/0x230
[   15.749318]  kunit_try_run_case+0x1a5/0x480
[   15.749343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749367]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.749393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.749427]  ? __kthread_parkme+0x82/0x180
[   15.749449]  ? preempt_count_sub+0x50/0x80
[   15.749474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.749510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.749536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.749562]  kthread+0x337/0x6f0
[   15.749582]  ? trace_preempt_on+0x20/0xc0
[   15.749616]  ? __pfx_kthread+0x10/0x10
[   15.749638]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.749660]  ? calculate_sigpending+0x7b/0xa0
[   15.749697]  ? __pfx_kthread+0x10/0x10
[   15.749719]  ret_from_fork+0x116/0x1d0
[   15.749739]  ? __pfx_kthread+0x10/0x10
[   15.749762]  ret_from_fork_asm+0x1a/0x30
[   15.749795]  </TASK>
[   15.749807] 
[   15.757587] Allocated by task 282:
[   15.757773]  kasan_save_stack+0x45/0x70
[   15.758004]  kasan_save_track+0x18/0x40
[   15.758164]  kasan_save_alloc_info+0x3b/0x50
[   15.758355]  __kasan_kmalloc+0xb7/0xc0
[   15.758566]  __kmalloc_cache_noprof+0x189/0x420
[   15.758757]  kasan_atomics+0x95/0x310
[   15.758961]  kunit_try_run_case+0x1a5/0x480
[   15.759105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.759455]  kthread+0x337/0x6f0
[   15.759627]  ret_from_fork+0x116/0x1d0
[   15.759763]  ret_from_fork_asm+0x1a/0x30
[   15.759971] 
[   15.760069] The buggy address belongs to the object at ffff888102ac2380
[   15.760069]  which belongs to the cache kmalloc-64 of size 64
[   15.760615] The buggy address is located 0 bytes to the right of
[   15.760615]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.761175] 
[   15.761283] The buggy address belongs to the physical page:
[   15.761511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.761862] flags: 0x200000000000000(node=0|zone=2)
[   15.762099] page_type: f5(slab)
[   15.762273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.762514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.762746] page dumped because: kasan: bad access detected
[   15.762917] 
[   15.762996] Memory state around the buggy address:
[   15.763212]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.763528]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.763847] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.764170]                                      ^
[   15.764558]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.764855]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765078] ==================================================================
[   16.153775] ==================================================================
[   16.154161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.154587] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.154950] 
[   16.155064] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.155107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.155120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.155141] Call Trace:
[   16.155159]  <TASK>
[   16.155176]  dump_stack_lvl+0x73/0xb0
[   16.155207]  print_report+0xd1/0x650
[   16.155231]  ? __virt_addr_valid+0x1db/0x2d0
[   16.155255]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.155277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.155302]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.155324]  kasan_report+0x141/0x180
[   16.155347]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.155374]  kasan_check_range+0x10c/0x1c0
[   16.155399]  __kasan_check_write+0x18/0x20
[   16.155419]  kasan_atomics_helper+0x19e3/0x5450
[   16.155442]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.155467]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.155492]  ? kasan_atomics+0x152/0x310
[   16.155520]  kasan_atomics+0x1dc/0x310
[   16.155543]  ? __pfx_kasan_atomics+0x10/0x10
[   16.155569]  ? __pfx_read_tsc+0x10/0x10
[   16.155590]  ? ktime_get_ts64+0x86/0x230
[   16.155615]  kunit_try_run_case+0x1a5/0x480
[   16.155640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.155664]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.155689]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.155714]  ? __kthread_parkme+0x82/0x180
[   16.155735]  ? preempt_count_sub+0x50/0x80
[   16.155760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.155785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.155811]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.155837]  kthread+0x337/0x6f0
[   16.155856]  ? trace_preempt_on+0x20/0xc0
[   16.155881]  ? __pfx_kthread+0x10/0x10
[   16.155902]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.155925]  ? calculate_sigpending+0x7b/0xa0
[   16.155961]  ? __pfx_kthread+0x10/0x10
[   16.155983]  ret_from_fork+0x116/0x1d0
[   16.156002]  ? __pfx_kthread+0x10/0x10
[   16.156024]  ret_from_fork_asm+0x1a/0x30
[   16.156055]  </TASK>
[   16.156066] 
[   16.164078] Allocated by task 282:
[   16.164302]  kasan_save_stack+0x45/0x70
[   16.164470]  kasan_save_track+0x18/0x40
[   16.164653]  kasan_save_alloc_info+0x3b/0x50
[   16.164840]  __kasan_kmalloc+0xb7/0xc0
[   16.165010]  __kmalloc_cache_noprof+0x189/0x420
[   16.165211]  kasan_atomics+0x95/0x310
[   16.165386]  kunit_try_run_case+0x1a5/0x480
[   16.165594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.165803]  kthread+0x337/0x6f0
[   16.165970]  ret_from_fork+0x116/0x1d0
[   16.166152]  ret_from_fork_asm+0x1a/0x30
[   16.166309] 
[   16.166380] The buggy address belongs to the object at ffff888102ac2380
[   16.166380]  which belongs to the cache kmalloc-64 of size 64
[   16.166736] The buggy address is located 0 bytes to the right of
[   16.166736]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.167200] 
[   16.167320] The buggy address belongs to the physical page:
[   16.167571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.167925] flags: 0x200000000000000(node=0|zone=2)
[   16.168176] page_type: f5(slab)
[   16.168369] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.168717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.169038] page dumped because: kasan: bad access detected
[   16.169210] 
[   16.169311] Memory state around the buggy address:
[   16.169469]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.169684]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.170014] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.170363]                                      ^
[   16.170590]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.170916]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.171248] ==================================================================
[   15.584392] ==================================================================
[   15.585093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.585792] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.586468] 
[   15.586658] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.586704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.586725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.586747] Call Trace:
[   15.586768]  <TASK>
[   15.586798]  dump_stack_lvl+0x73/0xb0
[   15.586831]  print_report+0xd1/0x650
[   15.586855]  ? __virt_addr_valid+0x1db/0x2d0
[   15.586891]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.586914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.586948]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.586972]  kasan_report+0x141/0x180
[   15.586995]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.587022]  __asan_report_load4_noabort+0x18/0x20
[   15.587048]  kasan_atomics_helper+0x4a84/0x5450
[   15.587072]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.587097]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.587124]  ? kasan_atomics+0x152/0x310
[   15.587151]  kasan_atomics+0x1dc/0x310
[   15.587174]  ? __pfx_kasan_atomics+0x10/0x10
[   15.587200]  ? __pfx_read_tsc+0x10/0x10
[   15.587224]  ? ktime_get_ts64+0x86/0x230
[   15.587270]  kunit_try_run_case+0x1a5/0x480
[   15.587300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.587324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.587350]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.587376]  ? __kthread_parkme+0x82/0x180
[   15.587399]  ? preempt_count_sub+0x50/0x80
[   15.587424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.587448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.587474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.587501]  kthread+0x337/0x6f0
[   15.587521]  ? trace_preempt_on+0x20/0xc0
[   15.587546]  ? __pfx_kthread+0x10/0x10
[   15.587567]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.587590]  ? calculate_sigpending+0x7b/0xa0
[   15.587615]  ? __pfx_kthread+0x10/0x10
[   15.587638]  ret_from_fork+0x116/0x1d0
[   15.587657]  ? __pfx_kthread+0x10/0x10
[   15.587678]  ret_from_fork_asm+0x1a/0x30
[   15.587710]  </TASK>
[   15.587722] 
[   15.600101] Allocated by task 282:
[   15.600493]  kasan_save_stack+0x45/0x70
[   15.600879]  kasan_save_track+0x18/0x40
[   15.601279]  kasan_save_alloc_info+0x3b/0x50
[   15.601543]  __kasan_kmalloc+0xb7/0xc0
[   15.601677]  __kmalloc_cache_noprof+0x189/0x420
[   15.601833]  kasan_atomics+0x95/0x310
[   15.602027]  kunit_try_run_case+0x1a5/0x480
[   15.602481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.602997]  kthread+0x337/0x6f0
[   15.603327]  ret_from_fork+0x116/0x1d0
[   15.603692]  ret_from_fork_asm+0x1a/0x30
[   15.604079] 
[   15.604234] The buggy address belongs to the object at ffff888102ac2380
[   15.604234]  which belongs to the cache kmalloc-64 of size 64
[   15.605248] The buggy address is located 0 bytes to the right of
[   15.605248]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.605913] 
[   15.605999] The buggy address belongs to the physical page:
[   15.606166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.606800] flags: 0x200000000000000(node=0|zone=2)
[   15.607277] page_type: f5(slab)
[   15.607593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.608277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.608942] page dumped because: kasan: bad access detected
[   15.609457] 
[   15.609612] Memory state around the buggy address:
[   15.609979]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.610478]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.610979] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.611460]                                      ^
[   15.611615]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.611829]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.612054] ==================================================================
[   15.333497] ==================================================================
[   15.333866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.334226] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.334566] 
[   15.334679] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.334731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.334744] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.334764] Call Trace:
[   15.334783]  <TASK>
[   15.334800]  dump_stack_lvl+0x73/0xb0
[   15.334831]  print_report+0xd1/0x650
[   15.334854]  ? __virt_addr_valid+0x1db/0x2d0
[   15.334877]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.334900]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.334923]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.335354]  kasan_report+0x141/0x180
[   15.335382]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.335411]  __asan_report_store4_noabort+0x1b/0x30
[   15.335439]  kasan_atomics_helper+0x4b3a/0x5450
[   15.335463]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.335488]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.335515]  ? kasan_atomics+0x152/0x310
[   15.335555]  kasan_atomics+0x1dc/0x310
[   15.335581]  ? __pfx_kasan_atomics+0x10/0x10
[   15.335610]  ? __pfx_read_tsc+0x10/0x10
[   15.335646]  ? ktime_get_ts64+0x86/0x230
[   15.335672]  kunit_try_run_case+0x1a5/0x480
[   15.335697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.335721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.335747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.335772]  ? __kthread_parkme+0x82/0x180
[   15.335795]  ? preempt_count_sub+0x50/0x80
[   15.335820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.335846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.335872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.335898]  kthread+0x337/0x6f0
[   15.335918]  ? trace_preempt_on+0x20/0xc0
[   15.335951]  ? __pfx_kthread+0x10/0x10
[   15.335972]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.335995]  ? calculate_sigpending+0x7b/0xa0
[   15.336021]  ? __pfx_kthread+0x10/0x10
[   15.336044]  ret_from_fork+0x116/0x1d0
[   15.336063]  ? __pfx_kthread+0x10/0x10
[   15.336084]  ret_from_fork_asm+0x1a/0x30
[   15.336116]  </TASK>
[   15.336137] 
[   15.343403] Allocated by task 282:
[   15.343588]  kasan_save_stack+0x45/0x70
[   15.343821]  kasan_save_track+0x18/0x40
[   15.344046]  kasan_save_alloc_info+0x3b/0x50
[   15.344312]  __kasan_kmalloc+0xb7/0xc0
[   15.344525]  __kmalloc_cache_noprof+0x189/0x420
[   15.344767]  kasan_atomics+0x95/0x310
[   15.344964]  kunit_try_run_case+0x1a5/0x480
[   15.345203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.345444]  kthread+0x337/0x6f0
[   15.345581]  ret_from_fork+0x116/0x1d0
[   15.345798]  ret_from_fork_asm+0x1a/0x30
[   15.346010] 
[   15.346099] The buggy address belongs to the object at ffff888102ac2380
[   15.346099]  which belongs to the cache kmalloc-64 of size 64
[   15.346594] The buggy address is located 0 bytes to the right of
[   15.346594]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.347140] 
[   15.347239] The buggy address belongs to the physical page:
[   15.347491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.347840] flags: 0x200000000000000(node=0|zone=2)
[   15.348033] page_type: f5(slab)
[   15.348156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.348404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.348631] page dumped because: kasan: bad access detected
[   15.348902] 
[   15.348999] Memory state around the buggy address:
[   15.349221]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.349563]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.349878] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.350203]                                      ^
[   15.350453]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.350759]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.350981] ==================================================================
[   16.378798] ==================================================================
[   16.379220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.379578] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.379875] 
[   16.379973] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.380015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.380027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.380049] Call Trace:
[   16.380091]  <TASK>
[   16.380108]  dump_stack_lvl+0x73/0xb0
[   16.380138]  print_report+0xd1/0x650
[   16.380162]  ? __virt_addr_valid+0x1db/0x2d0
[   16.380186]  ? kasan_atomics_helper+0x2006/0x5450
[   16.380209]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.380233]  ? kasan_atomics_helper+0x2006/0x5450
[   16.380275]  kasan_report+0x141/0x180
[   16.380298]  ? kasan_atomics_helper+0x2006/0x5450
[   16.380325]  kasan_check_range+0x10c/0x1c0
[   16.380350]  __kasan_check_write+0x18/0x20
[   16.380371]  kasan_atomics_helper+0x2006/0x5450
[   16.380409]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.380433]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.380476]  ? kasan_atomics+0x152/0x310
[   16.380504]  kasan_atomics+0x1dc/0x310
[   16.380527]  ? __pfx_kasan_atomics+0x10/0x10
[   16.380552]  ? __pfx_read_tsc+0x10/0x10
[   16.380574]  ? ktime_get_ts64+0x86/0x230
[   16.380599]  kunit_try_run_case+0x1a5/0x480
[   16.380647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.380672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.380698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.380733]  ? __kthread_parkme+0x82/0x180
[   16.380755]  ? preempt_count_sub+0x50/0x80
[   16.380780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.380806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.380832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.380859]  kthread+0x337/0x6f0
[   16.380909]  ? trace_preempt_on+0x20/0xc0
[   16.380934]  ? __pfx_kthread+0x10/0x10
[   16.380967]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.380991]  ? calculate_sigpending+0x7b/0xa0
[   16.381017]  ? __pfx_kthread+0x10/0x10
[   16.381039]  ret_from_fork+0x116/0x1d0
[   16.381059]  ? __pfx_kthread+0x10/0x10
[   16.381099]  ret_from_fork_asm+0x1a/0x30
[   16.381131]  </TASK>
[   16.381144] 
[   16.388387] Allocated by task 282:
[   16.388522]  kasan_save_stack+0x45/0x70
[   16.388666]  kasan_save_track+0x18/0x40
[   16.388849]  kasan_save_alloc_info+0x3b/0x50
[   16.389099]  __kasan_kmalloc+0xb7/0xc0
[   16.389337]  __kmalloc_cache_noprof+0x189/0x420
[   16.389596]  kasan_atomics+0x95/0x310
[   16.389790]  kunit_try_run_case+0x1a5/0x480
[   16.390008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.390282]  kthread+0x337/0x6f0
[   16.390452]  ret_from_fork+0x116/0x1d0
[   16.390589]  ret_from_fork_asm+0x1a/0x30
[   16.390734] 
[   16.390804] The buggy address belongs to the object at ffff888102ac2380
[   16.390804]  which belongs to the cache kmalloc-64 of size 64
[   16.391314] The buggy address is located 0 bytes to the right of
[   16.391314]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.391882] 
[   16.392005] The buggy address belongs to the physical page:
[   16.392230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.392476] flags: 0x200000000000000(node=0|zone=2)
[   16.392639] page_type: f5(slab)
[   16.392809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.393202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.393590] page dumped because: kasan: bad access detected
[   16.393839] 
[   16.393934] Memory state around the buggy address:
[   16.394188]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.394517]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.394800] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.395022]                                      ^
[   16.395178]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.395510]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.395824] ==================================================================
[   15.725304] ==================================================================
[   15.726057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.726412] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.726742] 
[   15.726833] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.726877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.726891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.726912] Call Trace:
[   15.726932]  <TASK>
[   15.726963]  dump_stack_lvl+0x73/0xb0
[   15.726992]  print_report+0xd1/0x650
[   15.727016]  ? __virt_addr_valid+0x1db/0x2d0
[   15.727040]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.727063]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.727087]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.727120]  kasan_report+0x141/0x180
[   15.727143]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.727170]  __asan_report_load4_noabort+0x18/0x20
[   15.727207]  kasan_atomics_helper+0x4a36/0x5450
[   15.727231]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.727254]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.727280]  ? kasan_atomics+0x152/0x310
[   15.727308]  kasan_atomics+0x1dc/0x310
[   15.727331]  ? __pfx_kasan_atomics+0x10/0x10
[   15.727356]  ? __pfx_read_tsc+0x10/0x10
[   15.727378]  ? ktime_get_ts64+0x86/0x230
[   15.727402]  kunit_try_run_case+0x1a5/0x480
[   15.727428]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.727452]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.727478]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.727503]  ? __kthread_parkme+0x82/0x180
[   15.727525]  ? preempt_count_sub+0x50/0x80
[   15.727550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.727586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.727612]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.727638]  kthread+0x337/0x6f0
[   15.727658]  ? trace_preempt_on+0x20/0xc0
[   15.727682]  ? __pfx_kthread+0x10/0x10
[   15.727704]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.727727]  ? calculate_sigpending+0x7b/0xa0
[   15.727762]  ? __pfx_kthread+0x10/0x10
[   15.727784]  ret_from_fork+0x116/0x1d0
[   15.727803]  ? __pfx_kthread+0x10/0x10
[   15.727835]  ret_from_fork_asm+0x1a/0x30
[   15.727867]  </TASK>
[   15.727879] 
[   15.735324] Allocated by task 282:
[   15.735498]  kasan_save_stack+0x45/0x70
[   15.735701]  kasan_save_track+0x18/0x40
[   15.735864]  kasan_save_alloc_info+0x3b/0x50
[   15.736074]  __kasan_kmalloc+0xb7/0xc0
[   15.736472]  __kmalloc_cache_noprof+0x189/0x420
[   15.736629]  kasan_atomics+0x95/0x310
[   15.736761]  kunit_try_run_case+0x1a5/0x480
[   15.736906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.737092]  kthread+0x337/0x6f0
[   15.737216]  ret_from_fork+0x116/0x1d0
[   15.737348]  ret_from_fork_asm+0x1a/0x30
[   15.737531] 
[   15.737697] The buggy address belongs to the object at ffff888102ac2380
[   15.737697]  which belongs to the cache kmalloc-64 of size 64
[   15.738695] The buggy address is located 0 bytes to the right of
[   15.738695]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.739969] 
[   15.740130] The buggy address belongs to the physical page:
[   15.740675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.741390] flags: 0x200000000000000(node=0|zone=2)
[   15.741831] page_type: f5(slab)
[   15.742149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.742894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.743698] page dumped because: kasan: bad access detected
[   15.744188] 
[   15.744354] Memory state around the buggy address:
[   15.744815]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.745324]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.745548] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.745769]                                      ^
[   15.745923]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746149]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.746548] ==================================================================
[   15.314452] ==================================================================
[   15.314698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.315534] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.315874] 
[   15.316160] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.316209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.316222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.316244] Call Trace:
[   15.316297]  <TASK>
[   15.316316]  dump_stack_lvl+0x73/0xb0
[   15.316362]  print_report+0xd1/0x650
[   15.316386]  ? __virt_addr_valid+0x1db/0x2d0
[   15.316420]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.316443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.316479]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.316502]  kasan_report+0x141/0x180
[   15.316524]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.316560]  kasan_check_range+0x10c/0x1c0
[   15.316584]  __kasan_check_write+0x18/0x20
[   15.316605]  kasan_atomics_helper+0x4a0/0x5450
[   15.316639]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.316664]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.316690]  ? kasan_atomics+0x152/0x310
[   15.316727]  kasan_atomics+0x1dc/0x310
[   15.316751]  ? __pfx_kasan_atomics+0x10/0x10
[   15.316776]  ? __pfx_read_tsc+0x10/0x10
[   15.316809]  ? ktime_get_ts64+0x86/0x230
[   15.316835]  kunit_try_run_case+0x1a5/0x480
[   15.316860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.316891]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.316917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.316957]  ? __kthread_parkme+0x82/0x180
[   15.316979]  ? preempt_count_sub+0x50/0x80
[   15.317005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.317031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.317056]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.317091]  kthread+0x337/0x6f0
[   15.317111]  ? trace_preempt_on+0x20/0xc0
[   15.317136]  ? __pfx_kthread+0x10/0x10
[   15.317167]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.317190]  ? calculate_sigpending+0x7b/0xa0
[   15.317215]  ? __pfx_kthread+0x10/0x10
[   15.317238]  ret_from_fork+0x116/0x1d0
[   15.317275]  ? __pfx_kthread+0x10/0x10
[   15.317297]  ret_from_fork_asm+0x1a/0x30
[   15.317329]  </TASK>
[   15.317341] 
[   15.325318] Allocated by task 282:
[   15.325491]  kasan_save_stack+0x45/0x70
[   15.325707]  kasan_save_track+0x18/0x40
[   15.325890]  kasan_save_alloc_info+0x3b/0x50
[   15.326051]  __kasan_kmalloc+0xb7/0xc0
[   15.326294]  __kmalloc_cache_noprof+0x189/0x420
[   15.326524]  kasan_atomics+0x95/0x310
[   15.326716]  kunit_try_run_case+0x1a5/0x480
[   15.326906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.327179]  kthread+0x337/0x6f0
[   15.327380]  ret_from_fork+0x116/0x1d0
[   15.327541]  ret_from_fork_asm+0x1a/0x30
[   15.327744] 
[   15.327850] The buggy address belongs to the object at ffff888102ac2380
[   15.327850]  which belongs to the cache kmalloc-64 of size 64
[   15.328340] The buggy address is located 0 bytes to the right of
[   15.328340]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.328841] 
[   15.328947] The buggy address belongs to the physical page:
[   15.329209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.329491] flags: 0x200000000000000(node=0|zone=2)
[   15.329659] page_type: f5(slab)
[   15.329784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.330023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.330375] page dumped because: kasan: bad access detected
[   15.330645] 
[   15.330746] Memory state around the buggy address:
[   15.330971]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.331308]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.331620] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.331841]                                      ^
[   15.332033]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.332384]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.332734] ==================================================================
[   16.049150] ==================================================================
[   16.049675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   16.050156] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.050446] 
[   16.050551] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.050595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.050630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.050652] Call Trace:
[   16.050671]  <TASK>
[   16.050693]  dump_stack_lvl+0x73/0xb0
[   16.050731]  print_report+0xd1/0x650
[   16.050755]  ? __virt_addr_valid+0x1db/0x2d0
[   16.050804]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.050827]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.050864]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.050888]  kasan_report+0x141/0x180
[   16.050911]  ? kasan_atomics_helper+0x16e7/0x5450
[   16.050950]  kasan_check_range+0x10c/0x1c0
[   16.050975]  __kasan_check_write+0x18/0x20
[   16.050995]  kasan_atomics_helper+0x16e7/0x5450
[   16.051019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.051043]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.051069]  ? kasan_atomics+0x152/0x310
[   16.051096]  kasan_atomics+0x1dc/0x310
[   16.051118]  ? __pfx_kasan_atomics+0x10/0x10
[   16.051144]  ? __pfx_read_tsc+0x10/0x10
[   16.051166]  ? ktime_get_ts64+0x86/0x230
[   16.051191]  kunit_try_run_case+0x1a5/0x480
[   16.051216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.051240]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.051266]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.051290]  ? __kthread_parkme+0x82/0x180
[   16.051313]  ? preempt_count_sub+0x50/0x80
[   16.051338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.051364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.051390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.051416]  kthread+0x337/0x6f0
[   16.051436]  ? trace_preempt_on+0x20/0xc0
[   16.051461]  ? __pfx_kthread+0x10/0x10
[   16.051482]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.051505]  ? calculate_sigpending+0x7b/0xa0
[   16.051531]  ? __pfx_kthread+0x10/0x10
[   16.051553]  ret_from_fork+0x116/0x1d0
[   16.051572]  ? __pfx_kthread+0x10/0x10
[   16.051593]  ret_from_fork_asm+0x1a/0x30
[   16.051625]  </TASK>
[   16.051636] 
[   16.062609] Allocated by task 282:
[   16.062763]  kasan_save_stack+0x45/0x70
[   16.062913]  kasan_save_track+0x18/0x40
[   16.063681]  kasan_save_alloc_info+0x3b/0x50
[   16.064369]  __kasan_kmalloc+0xb7/0xc0
[   16.065319]  __kmalloc_cache_noprof+0x189/0x420
[   16.065574]  kasan_atomics+0x95/0x310
[   16.065767]  kunit_try_run_case+0x1a5/0x480
[   16.066814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.067356]  kthread+0x337/0x6f0
[   16.067654]  ret_from_fork+0x116/0x1d0
[   16.068019]  ret_from_fork_asm+0x1a/0x30
[   16.068433] 
[   16.068594] The buggy address belongs to the object at ffff888102ac2380
[   16.068594]  which belongs to the cache kmalloc-64 of size 64
[   16.070439] The buggy address is located 0 bytes to the right of
[   16.070439]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.070821] 
[   16.070899] The buggy address belongs to the physical page:
[   16.071085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.071333] flags: 0x200000000000000(node=0|zone=2)
[   16.071499] page_type: f5(slab)
[   16.071622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.071854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.072416] page dumped because: kasan: bad access detected
[   16.072872] 
[   16.073039] Memory state around the buggy address:
[   16.073466]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.074064]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.074677] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.075293]                                      ^
[   16.075705]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.076329]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.076928] ==================================================================
[   15.469662] ==================================================================
[   15.469946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.470278] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.470623] 
[   15.470737] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.470782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.470795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.470816] Call Trace:
[   15.470836]  <TASK>
[   15.470854]  dump_stack_lvl+0x73/0xb0
[   15.470885]  print_report+0xd1/0x650
[   15.470909]  ? __virt_addr_valid+0x1db/0x2d0
[   15.470945]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.470967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.470992]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.471015]  kasan_report+0x141/0x180
[   15.471037]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.471065]  kasan_check_range+0x10c/0x1c0
[   15.471090]  __kasan_check_write+0x18/0x20
[   15.471110]  kasan_atomics_helper+0x8f9/0x5450
[   15.471134]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.471158]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.471185]  ? kasan_atomics+0x152/0x310
[   15.471212]  kasan_atomics+0x1dc/0x310
[   15.471235]  ? __pfx_kasan_atomics+0x10/0x10
[   15.471261]  ? __pfx_read_tsc+0x10/0x10
[   15.471283]  ? ktime_get_ts64+0x86/0x230
[   15.471309]  kunit_try_run_case+0x1a5/0x480
[   15.471334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.471358]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.471385]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.471410]  ? __kthread_parkme+0x82/0x180
[   15.471432]  ? preempt_count_sub+0x50/0x80
[   15.471457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.471483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.471509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.471535]  kthread+0x337/0x6f0
[   15.471555]  ? trace_preempt_on+0x20/0xc0
[   15.471580]  ? __pfx_kthread+0x10/0x10
[   15.471602]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.471625]  ? calculate_sigpending+0x7b/0xa0
[   15.471650]  ? __pfx_kthread+0x10/0x10
[   15.471673]  ret_from_fork+0x116/0x1d0
[   15.471692]  ? __pfx_kthread+0x10/0x10
[   15.471714]  ret_from_fork_asm+0x1a/0x30
[   15.471746]  </TASK>
[   15.471757] 
[   15.478955] Allocated by task 282:
[   15.479084]  kasan_save_stack+0x45/0x70
[   15.479228]  kasan_save_track+0x18/0x40
[   15.479418]  kasan_save_alloc_info+0x3b/0x50
[   15.479691]  __kasan_kmalloc+0xb7/0xc0
[   15.479878]  __kmalloc_cache_noprof+0x189/0x420
[   15.480110]  kasan_atomics+0x95/0x310
[   15.480256]  kunit_try_run_case+0x1a5/0x480
[   15.480402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.480576]  kthread+0x337/0x6f0
[   15.480696]  ret_from_fork+0x116/0x1d0
[   15.480883]  ret_from_fork_asm+0x1a/0x30
[   15.481091] 
[   15.481189] The buggy address belongs to the object at ffff888102ac2380
[   15.481189]  which belongs to the cache kmalloc-64 of size 64
[   15.481712] The buggy address is located 0 bytes to the right of
[   15.481712]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.482615] 
[   15.482720] The buggy address belongs to the physical page:
[   15.482929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.483222] flags: 0x200000000000000(node=0|zone=2)
[   15.483384] page_type: f5(slab)
[   15.483638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.483992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.484326] page dumped because: kasan: bad access detected
[   15.484521] 
[   15.484591] Memory state around the buggy address:
[   15.484747]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.484982]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.485299] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.485609]                                      ^
[   15.485871]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.486386]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.486649] ==================================================================
[   15.641957] ==================================================================
[   15.642648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.643473] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.644128] 
[   15.644320] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.644367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.644380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.644402] Call Trace:
[   15.644431]  <TASK>
[   15.644463]  dump_stack_lvl+0x73/0xb0
[   15.644506]  print_report+0xd1/0x650
[   15.644531]  ? __virt_addr_valid+0x1db/0x2d0
[   15.644554]  ? kasan_atomics_helper+0xde0/0x5450
[   15.644576]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.644601]  ? kasan_atomics_helper+0xde0/0x5450
[   15.644624]  kasan_report+0x141/0x180
[   15.644646]  ? kasan_atomics_helper+0xde0/0x5450
[   15.644673]  kasan_check_range+0x10c/0x1c0
[   15.644697]  __kasan_check_write+0x18/0x20
[   15.644718]  kasan_atomics_helper+0xde0/0x5450
[   15.644741]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.644765]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.644792]  ? kasan_atomics+0x152/0x310
[   15.644819]  kasan_atomics+0x1dc/0x310
[   15.644842]  ? __pfx_kasan_atomics+0x10/0x10
[   15.644867]  ? __pfx_read_tsc+0x10/0x10
[   15.644889]  ? ktime_get_ts64+0x86/0x230
[   15.644915]  kunit_try_run_case+0x1a5/0x480
[   15.644950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.644974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.645000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.645024]  ? __kthread_parkme+0x82/0x180
[   15.645046]  ? preempt_count_sub+0x50/0x80
[   15.645071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.645097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.645122]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.645149]  kthread+0x337/0x6f0
[   15.645169]  ? trace_preempt_on+0x20/0xc0
[   15.645195]  ? __pfx_kthread+0x10/0x10
[   15.645217]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.645240]  ? calculate_sigpending+0x7b/0xa0
[   15.645275]  ? __pfx_kthread+0x10/0x10
[   15.645298]  ret_from_fork+0x116/0x1d0
[   15.645317]  ? __pfx_kthread+0x10/0x10
[   15.645339]  ret_from_fork_asm+0x1a/0x30
[   15.645371]  </TASK>
[   15.645383] 
[   15.658047] Allocated by task 282:
[   15.658334]  kasan_save_stack+0x45/0x70
[   15.658495]  kasan_save_track+0x18/0x40
[   15.658828]  kasan_save_alloc_info+0x3b/0x50
[   15.659124]  __kasan_kmalloc+0xb7/0xc0
[   15.659435]  __kmalloc_cache_noprof+0x189/0x420
[   15.659758]  kasan_atomics+0x95/0x310
[   15.659912]  kunit_try_run_case+0x1a5/0x480
[   15.660203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.660689]  kthread+0x337/0x6f0
[   15.660877]  ret_from_fork+0x116/0x1d0
[   15.661155]  ret_from_fork_asm+0x1a/0x30
[   15.661401] 
[   15.661506] The buggy address belongs to the object at ffff888102ac2380
[   15.661506]  which belongs to the cache kmalloc-64 of size 64
[   15.662318] The buggy address is located 0 bytes to the right of
[   15.662318]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.662943] 
[   15.663026] The buggy address belongs to the physical page:
[   15.663426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.663767] flags: 0x200000000000000(node=0|zone=2)
[   15.663996] page_type: f5(slab)
[   15.664155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.664709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.665101] page dumped because: kasan: bad access detected
[   15.665419] 
[   15.665540] Memory state around the buggy address:
[   15.665782]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.666103]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.666428] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.666711]                                      ^
[   15.666945]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.667226]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.667551] ==================================================================
[   15.784415] ==================================================================
[   15.784806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.785241] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.785580] 
[   15.785718] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.785762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.785775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.785796] Call Trace:
[   15.785815]  <TASK>
[   15.785844]  dump_stack_lvl+0x73/0xb0
[   15.785876]  print_report+0xd1/0x650
[   15.785899]  ? __virt_addr_valid+0x1db/0x2d0
[   15.785945]  ? kasan_atomics_helper+0x1148/0x5450
[   15.785969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.785994]  ? kasan_atomics_helper+0x1148/0x5450
[   15.786029]  kasan_report+0x141/0x180
[   15.786055]  ? kasan_atomics_helper+0x1148/0x5450
[   15.786093]  kasan_check_range+0x10c/0x1c0
[   15.786117]  __kasan_check_write+0x18/0x20
[   15.786138]  kasan_atomics_helper+0x1148/0x5450
[   15.786162]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.786194]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.786221]  ? kasan_atomics+0x152/0x310
[   15.786249]  kasan_atomics+0x1dc/0x310
[   15.786295]  ? __pfx_kasan_atomics+0x10/0x10
[   15.786320]  ? __pfx_read_tsc+0x10/0x10
[   15.786342]  ? ktime_get_ts64+0x86/0x230
[   15.786368]  kunit_try_run_case+0x1a5/0x480
[   15.786402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.786426]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.786462]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.786488]  ? __kthread_parkme+0x82/0x180
[   15.786511]  ? preempt_count_sub+0x50/0x80
[   15.786544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.786570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.786596]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.786632]  kthread+0x337/0x6f0
[   15.786652]  ? trace_preempt_on+0x20/0xc0
[   15.786676]  ? __pfx_kthread+0x10/0x10
[   15.786711]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.786733]  ? calculate_sigpending+0x7b/0xa0
[   15.786758]  ? __pfx_kthread+0x10/0x10
[   15.786791]  ret_from_fork+0x116/0x1d0
[   15.786811]  ? __pfx_kthread+0x10/0x10
[   15.786832]  ret_from_fork_asm+0x1a/0x30
[   15.786872]  </TASK>
[   15.786884] 
[   15.794524] Allocated by task 282:
[   15.794708]  kasan_save_stack+0x45/0x70
[   15.794910]  kasan_save_track+0x18/0x40
[   15.795107]  kasan_save_alloc_info+0x3b/0x50
[   15.795257]  __kasan_kmalloc+0xb7/0xc0
[   15.795453]  __kmalloc_cache_noprof+0x189/0x420
[   15.795674]  kasan_atomics+0x95/0x310
[   15.795805]  kunit_try_run_case+0x1a5/0x480
[   15.795960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.796135]  kthread+0x337/0x6f0
[   15.796278]  ret_from_fork+0x116/0x1d0
[   15.796471]  ret_from_fork_asm+0x1a/0x30
[   15.796698] 
[   15.796795] The buggy address belongs to the object at ffff888102ac2380
[   15.796795]  which belongs to the cache kmalloc-64 of size 64
[   15.797395] The buggy address is located 0 bytes to the right of
[   15.797395]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.797911] 
[   15.798004] The buggy address belongs to the physical page:
[   15.798177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.798553] flags: 0x200000000000000(node=0|zone=2)
[   15.798758] page_type: f5(slab)
[   15.798928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.801432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.802367] page dumped because: kasan: bad access detected
[   15.802704] 
[   15.802809] Memory state around the buggy address:
[   15.805098]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.806053]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.806999] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.807233]                                      ^
[   15.807395]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.807605]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.807812] ==================================================================
[   15.451299] ==================================================================
[   15.451672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.452376] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.452715] 
[   15.452820] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.452864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.452877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.452899] Call Trace:
[   15.452918]  <TASK>
[   15.452951]  dump_stack_lvl+0x73/0xb0
[   15.452985]  print_report+0xd1/0x650
[   15.453010]  ? __virt_addr_valid+0x1db/0x2d0
[   15.453034]  ? kasan_atomics_helper+0x860/0x5450
[   15.453057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.453081]  ? kasan_atomics_helper+0x860/0x5450
[   15.453105]  kasan_report+0x141/0x180
[   15.453127]  ? kasan_atomics_helper+0x860/0x5450
[   15.453154]  kasan_check_range+0x10c/0x1c0
[   15.453179]  __kasan_check_write+0x18/0x20
[   15.453200]  kasan_atomics_helper+0x860/0x5450
[   15.453224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.453248]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.453290]  ? kasan_atomics+0x152/0x310
[   15.453317]  kasan_atomics+0x1dc/0x310
[   15.453341]  ? __pfx_kasan_atomics+0x10/0x10
[   15.453367]  ? __pfx_read_tsc+0x10/0x10
[   15.453389]  ? ktime_get_ts64+0x86/0x230
[   15.453414]  kunit_try_run_case+0x1a5/0x480
[   15.453440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.453464]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.453490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.453515]  ? __kthread_parkme+0x82/0x180
[   15.453538]  ? preempt_count_sub+0x50/0x80
[   15.453564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.453590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.453615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.453643]  kthread+0x337/0x6f0
[   15.453663]  ? trace_preempt_on+0x20/0xc0
[   15.453687]  ? __pfx_kthread+0x10/0x10
[   15.453709]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.453732]  ? calculate_sigpending+0x7b/0xa0
[   15.453757]  ? __pfx_kthread+0x10/0x10
[   15.453780]  ret_from_fork+0x116/0x1d0
[   15.453799]  ? __pfx_kthread+0x10/0x10
[   15.453821]  ret_from_fork_asm+0x1a/0x30
[   15.453853]  </TASK>
[   15.453865] 
[   15.461009] Allocated by task 282:
[   15.461192]  kasan_save_stack+0x45/0x70
[   15.461565]  kasan_save_track+0x18/0x40
[   15.461762]  kasan_save_alloc_info+0x3b/0x50
[   15.461987]  __kasan_kmalloc+0xb7/0xc0
[   15.462179]  __kmalloc_cache_noprof+0x189/0x420
[   15.462518]  kasan_atomics+0x95/0x310
[   15.462718]  kunit_try_run_case+0x1a5/0x480
[   15.462921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.463140]  kthread+0x337/0x6f0
[   15.463263]  ret_from_fork+0x116/0x1d0
[   15.463466]  ret_from_fork_asm+0x1a/0x30
[   15.463670] 
[   15.463766] The buggy address belongs to the object at ffff888102ac2380
[   15.463766]  which belongs to the cache kmalloc-64 of size 64
[   15.464229] The buggy address is located 0 bytes to the right of
[   15.464229]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.464642] 
[   15.464717] The buggy address belongs to the physical page:
[   15.464889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.465258] flags: 0x200000000000000(node=0|zone=2)
[   15.465504] page_type: f5(slab)
[   15.465675] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.466038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.466393] page dumped because: kasan: bad access detected
[   15.466606] 
[   15.466699] Memory state around the buggy address:
[   15.466909]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.467215]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.467481] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.467693]                                      ^
[   15.467915]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.468246]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.468579] ==================================================================
[   16.413695] ==================================================================
[   16.414100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.414477] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.414808] 
[   16.414899] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.414951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.414964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.415007] Call Trace:
[   16.415025]  <TASK>
[   16.415043]  dump_stack_lvl+0x73/0xb0
[   16.415074]  print_report+0xd1/0x650
[   16.415098]  ? __virt_addr_valid+0x1db/0x2d0
[   16.415122]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.415165]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.415190]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.415212]  kasan_report+0x141/0x180
[   16.415235]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.415282]  kasan_check_range+0x10c/0x1c0
[   16.415307]  __kasan_check_write+0x18/0x20
[   16.415327]  kasan_atomics_helper+0x20c8/0x5450
[   16.415351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.415375]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.415401]  ? kasan_atomics+0x152/0x310
[   16.415429]  kasan_atomics+0x1dc/0x310
[   16.415452]  ? __pfx_kasan_atomics+0x10/0x10
[   16.415502]  ? __pfx_read_tsc+0x10/0x10
[   16.415527]  ? ktime_get_ts64+0x86/0x230
[   16.415553]  kunit_try_run_case+0x1a5/0x480
[   16.415581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.415606]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.415632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.415657]  ? __kthread_parkme+0x82/0x180
[   16.415679]  ? preempt_count_sub+0x50/0x80
[   16.415704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.415730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.415756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.415783]  kthread+0x337/0x6f0
[   16.415803]  ? trace_preempt_on+0x20/0xc0
[   16.415829]  ? __pfx_kthread+0x10/0x10
[   16.415850]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.415873]  ? calculate_sigpending+0x7b/0xa0
[   16.415898]  ? __pfx_kthread+0x10/0x10
[   16.415922]  ret_from_fork+0x116/0x1d0
[   16.415950]  ? __pfx_kthread+0x10/0x10
[   16.415971]  ret_from_fork_asm+0x1a/0x30
[   16.416004]  </TASK>
[   16.416015] 
[   16.423541] Allocated by task 282:
[   16.423745]  kasan_save_stack+0x45/0x70
[   16.423962]  kasan_save_track+0x18/0x40
[   16.424144]  kasan_save_alloc_info+0x3b/0x50
[   16.424347]  __kasan_kmalloc+0xb7/0xc0
[   16.424493]  __kmalloc_cache_noprof+0x189/0x420
[   16.424716]  kasan_atomics+0x95/0x310
[   16.424848]  kunit_try_run_case+0x1a5/0x480
[   16.425093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.425373]  kthread+0x337/0x6f0
[   16.425546]  ret_from_fork+0x116/0x1d0
[   16.425737]  ret_from_fork_asm+0x1a/0x30
[   16.425879] 
[   16.425960] The buggy address belongs to the object at ffff888102ac2380
[   16.425960]  which belongs to the cache kmalloc-64 of size 64
[   16.426353] The buggy address is located 0 bytes to the right of
[   16.426353]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.426947] 
[   16.427072] The buggy address belongs to the physical page:
[   16.427381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.427754] flags: 0x200000000000000(node=0|zone=2)
[   16.428011] page_type: f5(slab)
[   16.428165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.428422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.428732] page dumped because: kasan: bad access detected
[   16.428989] 
[   16.429083] Memory state around the buggy address:
[   16.429352]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.429619]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.429833] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.430112]                                      ^
[   16.430368]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.430743]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.431043] ==================================================================
[   16.449105] ==================================================================
[   16.449485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.449862] Write of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   16.450164] 
[   16.450271] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.450313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.450325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.450347] Call Trace:
[   16.450365]  <TASK>
[   16.450381]  dump_stack_lvl+0x73/0xb0
[   16.450412]  print_report+0xd1/0x650
[   16.450435]  ? __virt_addr_valid+0x1db/0x2d0
[   16.450484]  ? kasan_atomics_helper+0x218a/0x5450
[   16.450507]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.450531]  ? kasan_atomics_helper+0x218a/0x5450
[   16.450554]  kasan_report+0x141/0x180
[   16.450594]  ? kasan_atomics_helper+0x218a/0x5450
[   16.450622]  kasan_check_range+0x10c/0x1c0
[   16.450647]  __kasan_check_write+0x18/0x20
[   16.450667]  kasan_atomics_helper+0x218a/0x5450
[   16.450691]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.450721]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.450748]  ? kasan_atomics+0x152/0x310
[   16.450775]  kasan_atomics+0x1dc/0x310
[   16.450798]  ? __pfx_kasan_atomics+0x10/0x10
[   16.450823]  ? __pfx_read_tsc+0x10/0x10
[   16.450865]  ? ktime_get_ts64+0x86/0x230
[   16.450890]  kunit_try_run_case+0x1a5/0x480
[   16.450915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.450948]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.450974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.450999]  ? __kthread_parkme+0x82/0x180
[   16.451021]  ? preempt_count_sub+0x50/0x80
[   16.451046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.451071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.451097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.451143]  kthread+0x337/0x6f0
[   16.451163]  ? trace_preempt_on+0x20/0xc0
[   16.451187]  ? __pfx_kthread+0x10/0x10
[   16.451209]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.451232]  ? calculate_sigpending+0x7b/0xa0
[   16.451276]  ? __pfx_kthread+0x10/0x10
[   16.451299]  ret_from_fork+0x116/0x1d0
[   16.451317]  ? __pfx_kthread+0x10/0x10
[   16.451339]  ret_from_fork_asm+0x1a/0x30
[   16.451370]  </TASK>
[   16.451382] 
[   16.458791] Allocated by task 282:
[   16.458921]  kasan_save_stack+0x45/0x70
[   16.459153]  kasan_save_track+0x18/0x40
[   16.459370]  kasan_save_alloc_info+0x3b/0x50
[   16.459600]  __kasan_kmalloc+0xb7/0xc0
[   16.459784]  __kmalloc_cache_noprof+0x189/0x420
[   16.459990]  kasan_atomics+0x95/0x310
[   16.460120]  kunit_try_run_case+0x1a5/0x480
[   16.460281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.460453]  kthread+0x337/0x6f0
[   16.460588]  ret_from_fork+0x116/0x1d0
[   16.460796]  ret_from_fork_asm+0x1a/0x30
[   16.461005] 
[   16.461122] The buggy address belongs to the object at ffff888102ac2380
[   16.461122]  which belongs to the cache kmalloc-64 of size 64
[   16.461697] The buggy address is located 0 bytes to the right of
[   16.461697]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   16.462242] 
[   16.462333] The buggy address belongs to the physical page:
[   16.462500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   16.462820] flags: 0x200000000000000(node=0|zone=2)
[   16.463125] page_type: f5(slab)
[   16.463328] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.463567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.463790] page dumped because: kasan: bad access detected
[   16.464047] 
[   16.464141] Memory state around the buggy address:
[   16.464457]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.464778]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.465125] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.465408]                                      ^
[   16.465621]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.465824]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.466105] ==================================================================
[   15.297395] ==================================================================
[   15.297720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.298000] Read of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.298228] 
[   15.298344] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.298389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.298402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.298423] Call Trace:
[   15.298443]  <TASK>
[   15.298463]  dump_stack_lvl+0x73/0xb0
[   15.298494]  print_report+0xd1/0x650
[   15.298519]  ? __virt_addr_valid+0x1db/0x2d0
[   15.298543]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.298566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.298590]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.298613]  kasan_report+0x141/0x180
[   15.298636]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.298663]  __asan_report_load4_noabort+0x18/0x20
[   15.298689]  kasan_atomics_helper+0x4b54/0x5450
[   15.298719]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.298744]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.298771]  ? kasan_atomics+0x152/0x310
[   15.298799]  kasan_atomics+0x1dc/0x310
[   15.298822]  ? __pfx_kasan_atomics+0x10/0x10
[   15.298849]  ? __pfx_read_tsc+0x10/0x10
[   15.298873]  ? ktime_get_ts64+0x86/0x230
[   15.298898]  kunit_try_run_case+0x1a5/0x480
[   15.298923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.298959]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.298985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.299010]  ? __kthread_parkme+0x82/0x180
[   15.299031]  ? preempt_count_sub+0x50/0x80
[   15.299056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.299082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.299107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.299134]  kthread+0x337/0x6f0
[   15.299154]  ? trace_preempt_on+0x20/0xc0
[   15.299178]  ? __pfx_kthread+0x10/0x10
[   15.299200]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.299223]  ? calculate_sigpending+0x7b/0xa0
[   15.299248]  ? __pfx_kthread+0x10/0x10
[   15.299293]  ret_from_fork+0x116/0x1d0
[   15.299313]  ? __pfx_kthread+0x10/0x10
[   15.299334]  ret_from_fork_asm+0x1a/0x30
[   15.299366]  </TASK>
[   15.299378] 
[   15.306699] Allocated by task 282:
[   15.306852]  kasan_save_stack+0x45/0x70
[   15.307067]  kasan_save_track+0x18/0x40
[   15.307268]  kasan_save_alloc_info+0x3b/0x50
[   15.307483]  __kasan_kmalloc+0xb7/0xc0
[   15.307637]  __kmalloc_cache_noprof+0x189/0x420
[   15.307854]  kasan_atomics+0x95/0x310
[   15.308000]  kunit_try_run_case+0x1a5/0x480
[   15.308148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.308348]  kthread+0x337/0x6f0
[   15.308469]  ret_from_fork+0x116/0x1d0
[   15.308627]  ret_from_fork_asm+0x1a/0x30
[   15.308822] 
[   15.308917] The buggy address belongs to the object at ffff888102ac2380
[   15.308917]  which belongs to the cache kmalloc-64 of size 64
[   15.309469] The buggy address is located 0 bytes to the right of
[   15.309469]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.309850] 
[   15.309923] The buggy address belongs to the physical page:
[   15.310127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.310488] flags: 0x200000000000000(node=0|zone=2)
[   15.310713] page_type: f5(slab)
[   15.310835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.311077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.311350] page dumped because: kasan: bad access detected
[   15.311623] 
[   15.311719] Memory state around the buggy address:
[   15.311950]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.312296]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.312638] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.312982]                                      ^
[   15.313211]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.313556]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.313870] ==================================================================
[   15.925647] ==================================================================
[   15.926194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.926606] Read of size 8 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.926916] 
[   15.927080] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.927125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.927138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.927160] Call Trace:
[   15.927179]  <TASK>
[   15.927200]  dump_stack_lvl+0x73/0xb0
[   15.927230]  print_report+0xd1/0x650
[   15.927254]  ? __virt_addr_valid+0x1db/0x2d0
[   15.927278]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.927301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.927326]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.927350]  kasan_report+0x141/0x180
[   15.927372]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.927399]  __asan_report_load8_noabort+0x18/0x20
[   15.927425]  kasan_atomics_helper+0x4eae/0x5450
[   15.927448]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.927472]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.927508]  ? kasan_atomics+0x152/0x310
[   15.927566]  kasan_atomics+0x1dc/0x310
[   15.927590]  ? __pfx_kasan_atomics+0x10/0x10
[   15.927615]  ? __pfx_read_tsc+0x10/0x10
[   15.927648]  ? ktime_get_ts64+0x86/0x230
[   15.927674]  kunit_try_run_case+0x1a5/0x480
[   15.927699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.927724]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.927749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.927774]  ? __kthread_parkme+0x82/0x180
[   15.927796]  ? preempt_count_sub+0x50/0x80
[   15.927820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.927872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.927898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.927924]  kthread+0x337/0x6f0
[   15.927960]  ? trace_preempt_on+0x20/0xc0
[   15.927985]  ? __pfx_kthread+0x10/0x10
[   15.928007]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.928056]  ? calculate_sigpending+0x7b/0xa0
[   15.928081]  ? __pfx_kthread+0x10/0x10
[   15.928104]  ret_from_fork+0x116/0x1d0
[   15.928134]  ? __pfx_kthread+0x10/0x10
[   15.928156]  ret_from_fork_asm+0x1a/0x30
[   15.928214]  </TASK>
[   15.928227] 
[   15.936027] Allocated by task 282:
[   15.936239]  kasan_save_stack+0x45/0x70
[   15.936431]  kasan_save_track+0x18/0x40
[   15.936650]  kasan_save_alloc_info+0x3b/0x50
[   15.936879]  __kasan_kmalloc+0xb7/0xc0
[   15.937091]  __kmalloc_cache_noprof+0x189/0x420
[   15.937345]  kasan_atomics+0x95/0x310
[   15.937569]  kunit_try_run_case+0x1a5/0x480
[   15.937798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.938098]  kthread+0x337/0x6f0
[   15.938315]  ret_from_fork+0x116/0x1d0
[   15.938561]  ret_from_fork_asm+0x1a/0x30
[   15.938790] 
[   15.938911] The buggy address belongs to the object at ffff888102ac2380
[   15.938911]  which belongs to the cache kmalloc-64 of size 64
[   15.939630] The buggy address is located 0 bytes to the right of
[   15.939630]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.940209] 
[   15.940369] The buggy address belongs to the physical page:
[   15.940539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.940838] flags: 0x200000000000000(node=0|zone=2)
[   15.941154] page_type: f5(slab)
[   15.941427] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.941681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.942038] page dumped because: kasan: bad access detected
[   15.942333] 
[   15.942450] Memory state around the buggy address:
[   15.942661]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.943000]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.943342] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.943680]                                      ^
[   15.943925]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.944247]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.944575] ==================================================================
[   15.432814] ==================================================================
[   15.433561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.433804] Write of size 4 at addr ffff888102ac23b0 by task kunit_try_catch/282
[   15.434367] 
[   15.434575] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   15.434619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.434631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.434654] Call Trace:
[   15.434672]  <TASK>
[   15.434690]  dump_stack_lvl+0x73/0xb0
[   15.434728]  print_report+0xd1/0x650
[   15.434752]  ? __virt_addr_valid+0x1db/0x2d0
[   15.434775]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.434799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.434823]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.434846]  kasan_report+0x141/0x180
[   15.434869]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.434896]  kasan_check_range+0x10c/0x1c0
[   15.434921]  __kasan_check_write+0x18/0x20
[   15.434954]  kasan_atomics_helper+0x7c7/0x5450
[   15.434979]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.435003]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.435030]  ? kasan_atomics+0x152/0x310
[   15.435057]  kasan_atomics+0x1dc/0x310
[   15.435080]  ? __pfx_kasan_atomics+0x10/0x10
[   15.435106]  ? __pfx_read_tsc+0x10/0x10
[   15.435129]  ? ktime_get_ts64+0x86/0x230
[   15.435154]  kunit_try_run_case+0x1a5/0x480
[   15.435179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.435204]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.435230]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.435255]  ? __kthread_parkme+0x82/0x180
[   15.435287]  ? preempt_count_sub+0x50/0x80
[   15.435313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.435339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.435365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.435392]  kthread+0x337/0x6f0
[   15.435412]  ? trace_preempt_on+0x20/0xc0
[   15.435437]  ? __pfx_kthread+0x10/0x10
[   15.435459]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.435482]  ? calculate_sigpending+0x7b/0xa0
[   15.435507]  ? __pfx_kthread+0x10/0x10
[   15.435530]  ret_from_fork+0x116/0x1d0
[   15.435549]  ? __pfx_kthread+0x10/0x10
[   15.435571]  ret_from_fork_asm+0x1a/0x30
[   15.435603]  </TASK>
[   15.435615] 
[   15.442796] Allocated by task 282:
[   15.442995]  kasan_save_stack+0x45/0x70
[   15.443182]  kasan_save_track+0x18/0x40
[   15.443447]  kasan_save_alloc_info+0x3b/0x50
[   15.443614]  __kasan_kmalloc+0xb7/0xc0
[   15.443792]  __kmalloc_cache_noprof+0x189/0x420
[   15.444008]  kasan_atomics+0x95/0x310
[   15.444159]  kunit_try_run_case+0x1a5/0x480
[   15.444390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.444647]  kthread+0x337/0x6f0
[   15.444781]  ret_from_fork+0x116/0x1d0
[   15.444976]  ret_from_fork_asm+0x1a/0x30
[   15.445147] 
[   15.445240] The buggy address belongs to the object at ffff888102ac2380
[   15.445240]  which belongs to the cache kmalloc-64 of size 64
[   15.445669] The buggy address is located 0 bytes to the right of
[   15.445669]  allocated 48-byte region [ffff888102ac2380, ffff888102ac23b0)
[   15.446046] 
[   15.446119] The buggy address belongs to the physical page:
[   15.446300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac2
[   15.446770] flags: 0x200000000000000(node=0|zone=2)
[   15.447011] page_type: f5(slab)
[   15.447179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.447446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.447672] page dumped because: kasan: bad access detected
[   15.447841] 
[   15.447910] Memory state around the buggy address:
[   15.448399]  ffff888102ac2280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.448720]  ffff888102ac2300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.449048] >ffff888102ac2380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.449501]                                      ^
[   15.449684]  ffff888102ac2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.449956]  ffff888102ac2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.450169] ==================================================================