Hay
Date
July 16, 2025, 3:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.430475] ==================================================================
[   19.430529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.430579] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.430631] 
[   19.430663] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.434977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.435044] Hardware name: linux,dummy-virt (DT)
[   19.435078] Call trace:
[   19.435102]  show_stack+0x20/0x38 (C)
[   19.435159]  dump_stack_lvl+0x8c/0xd0
[   19.435212]  print_report+0x118/0x5d0
[   19.435262]  kasan_report+0xdc/0x128
[   19.435310]  __asan_report_load8_noabort+0x20/0x30
[   19.435362]  kasan_atomics_helper+0x3e10/0x4858
[   19.435413]  kasan_atomics+0x198/0x2e0
[   19.435460]  kunit_try_run_case+0x170/0x3f0
[   19.435508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.435563]  kthread+0x328/0x630
[   19.435606]  ret_from_fork+0x10/0x20
[   19.435655] 
[   19.435674] Allocated by task 265:
[   19.435705]  kasan_save_stack+0x3c/0x68
[   19.436091]  kasan_save_track+0x20/0x40
[   19.436132]  kasan_save_alloc_info+0x40/0x58
[   19.436173]  __kasan_kmalloc+0xd4/0xd8
[   19.436212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.436253]  kasan_atomics+0xb8/0x2e0
[   19.436289]  kunit_try_run_case+0x170/0x3f0
[   19.436330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.436374]  kthread+0x328/0x630
[   19.436410]  ret_from_fork+0x10/0x20
[   19.436446] 
[   19.436467] The buggy address belongs to the object at fff00000c595e380
[   19.436467]  which belongs to the cache kmalloc-64 of size 64
[   19.436530] The buggy address is located 0 bytes to the right of
[   19.436530]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.436600] 
[   19.436622] The buggy address belongs to the physical page:
[   19.436656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.436725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.436777] page_type: f5(slab)
[   19.436818] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.436871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.436920] page dumped because: kasan: bad access detected
[   19.436959] 
[   19.436978] Memory state around the buggy address:
[   19.437014]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.437060]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.437106] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.437148]                                      ^
[   19.437183]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.437229]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.437269] ==================================================================
[   19.273596] ==================================================================
[   19.273838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   19.273913] Write of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.274060] 
[   19.274185] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.274280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.274308] Hardware name: linux,dummy-virt (DT)
[   19.274911] Call trace:
[   19.274957]  show_stack+0x20/0x38 (C)
[   19.275019]  dump_stack_lvl+0x8c/0xd0
[   19.275104]  print_report+0x118/0x5d0
[   19.275180]  kasan_report+0xdc/0x128
[   19.275309]  kasan_check_range+0x100/0x1a8
[   19.275409]  __kasan_check_write+0x20/0x30
[   19.275493]  kasan_atomics_helper+0xca0/0x4858
[   19.275604]  kasan_atomics+0x198/0x2e0
[   19.275678]  kunit_try_run_case+0x170/0x3f0
[   19.275740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.276148]  kthread+0x328/0x630
[   19.276848]  ret_from_fork+0x10/0x20
[   19.276949] 
[   19.277018] Allocated by task 265:
[   19.277097]  kasan_save_stack+0x3c/0x68
[   19.277275]  kasan_save_track+0x20/0x40
[   19.277317]  kasan_save_alloc_info+0x40/0x58
[   19.277547]  __kasan_kmalloc+0xd4/0xd8
[   19.277608]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.277913]  kasan_atomics+0xb8/0x2e0
[   19.278002]  kunit_try_run_case+0x170/0x3f0
[   19.278045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.278101]  kthread+0x328/0x630
[   19.278144]  ret_from_fork+0x10/0x20
[   19.278185] 
[   19.278213] The buggy address belongs to the object at fff00000c595e380
[   19.278213]  which belongs to the cache kmalloc-64 of size 64
[   19.278279] The buggy address is located 0 bytes to the right of
[   19.278279]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.278356] 
[   19.278380] The buggy address belongs to the physical page:
[   19.278414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.278489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.278552] page_type: f5(slab)
[   19.278591] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.278654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.278697] page dumped because: kasan: bad access detected
[   19.278742] 
[   19.278761] Memory state around the buggy address:
[   19.278795]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.278840]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.278886] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.278927]                                      ^
[   19.278960]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.279004]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.279157] ==================================================================
[   19.327420] ==================================================================
[   19.327553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.327602] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.327655] 
[   19.327840] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.327974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.328004] Hardware name: linux,dummy-virt (DT)
[   19.328036] Call trace:
[   19.328060]  show_stack+0x20/0x38 (C)
[   19.328110]  dump_stack_lvl+0x8c/0xd0
[   19.328158]  print_report+0x118/0x5d0
[   19.328204]  kasan_report+0xdc/0x128
[   19.328251]  kasan_check_range+0x100/0x1a8
[   19.328394]  __kasan_check_write+0x20/0x30
[   19.328440]  kasan_atomics_helper+0xf88/0x4858
[   19.328594]  kasan_atomics+0x198/0x2e0
[   19.328672]  kunit_try_run_case+0x170/0x3f0
[   19.328735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.328800]  kthread+0x328/0x630
[   19.328970]  ret_from_fork+0x10/0x20
[   19.329108] 
[   19.329177] Allocated by task 265:
[   19.329215]  kasan_save_stack+0x3c/0x68
[   19.329279]  kasan_save_track+0x20/0x40
[   19.329330]  kasan_save_alloc_info+0x40/0x58
[   19.329373]  __kasan_kmalloc+0xd4/0xd8
[   19.329430]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.329493]  kasan_atomics+0xb8/0x2e0
[   19.329577]  kunit_try_run_case+0x170/0x3f0
[   19.329618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.329663]  kthread+0x328/0x630
[   19.329698]  ret_from_fork+0x10/0x20
[   19.329765] 
[   19.329890] The buggy address belongs to the object at fff00000c595e380
[   19.329890]  which belongs to the cache kmalloc-64 of size 64
[   19.330110] The buggy address is located 0 bytes to the right of
[   19.330110]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.330212] 
[   19.330327] The buggy address belongs to the physical page:
[   19.330370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.330682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.330755] page_type: f5(slab)
[   19.330839] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.330895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.330939] page dumped because: kasan: bad access detected
[   19.331085] 
[   19.331227] Memory state around the buggy address:
[   19.331285]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.331435]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.331585] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.331917]                                      ^
[   19.331988]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.332093]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.332209] ==================================================================
[   19.333116] ==================================================================
[   19.333198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.333254] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.333306] 
[   19.333493] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.333738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.333778] Hardware name: linux,dummy-virt (DT)
[   19.333810] Call trace:
[   19.333942]  show_stack+0x20/0x38 (C)
[   19.334088]  dump_stack_lvl+0x8c/0xd0
[   19.334188]  print_report+0x118/0x5d0
[   19.334375]  kasan_report+0xdc/0x128
[   19.334422]  kasan_check_range+0x100/0x1a8
[   19.334584]  __kasan_check_write+0x20/0x30
[   19.334656]  kasan_atomics_helper+0xff0/0x4858
[   19.334769]  kasan_atomics+0x198/0x2e0
[   19.334844]  kunit_try_run_case+0x170/0x3f0
[   19.334910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.334977]  kthread+0x328/0x630
[   19.335021]  ret_from_fork+0x10/0x20
[   19.335078] 
[   19.335116] Allocated by task 265:
[   19.335148]  kasan_save_stack+0x3c/0x68
[   19.335237]  kasan_save_track+0x20/0x40
[   19.335291]  kasan_save_alloc_info+0x40/0x58
[   19.335333]  __kasan_kmalloc+0xd4/0xd8
[   19.335460]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.335501]  kasan_atomics+0xb8/0x2e0
[   19.335786]  kunit_try_run_case+0x170/0x3f0
[   19.335893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.336019]  kthread+0x328/0x630
[   19.336143]  ret_from_fork+0x10/0x20
[   19.336491] 
[   19.336532] The buggy address belongs to the object at fff00000c595e380
[   19.336532]  which belongs to the cache kmalloc-64 of size 64
[   19.336600] The buggy address is located 0 bytes to the right of
[   19.336600]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.336703] 
[   19.336735] The buggy address belongs to the physical page:
[   19.336782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.337118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.337275] page_type: f5(slab)
[   19.337321] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.337408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.337537] page dumped because: kasan: bad access detected
[   19.337626] 
[   19.338515] Memory state around the buggy address:
[   19.338558]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.338606]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.338652] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.338693]                                      ^
[   19.338738]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.338783]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.338825] ==================================================================
[   19.449557] ==================================================================
[   19.449616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.449786] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.449981] 
[   19.450017] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.450112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.450294] Hardware name: linux,dummy-virt (DT)
[   19.450338] Call trace:
[   19.450363]  show_stack+0x20/0x38 (C)
[   19.450582]  dump_stack_lvl+0x8c/0xd0
[   19.450667]  print_report+0x118/0x5d0
[   19.450731]  kasan_report+0xdc/0x128
[   19.450852]  kasan_check_range+0x100/0x1a8
[   19.450906]  __kasan_check_write+0x20/0x30
[   19.450976]  kasan_atomics_helper+0x17ec/0x4858
[   19.451339]  kasan_atomics+0x198/0x2e0
[   19.451414]  kunit_try_run_case+0x170/0x3f0
[   19.451577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.451651]  kthread+0x328/0x630
[   19.451701]  ret_from_fork+0x10/0x20
[   19.451759] 
[   19.451779] Allocated by task 265:
[   19.451945]  kasan_save_stack+0x3c/0x68
[   19.452190]  kasan_save_track+0x20/0x40
[   19.452306]  kasan_save_alloc_info+0x40/0x58
[   19.452384]  __kasan_kmalloc+0xd4/0xd8
[   19.452611]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.452656]  kasan_atomics+0xb8/0x2e0
[   19.452748]  kunit_try_run_case+0x170/0x3f0
[   19.452863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.452988]  kthread+0x328/0x630
[   19.453066]  ret_from_fork+0x10/0x20
[   19.453217] 
[   19.453239] The buggy address belongs to the object at fff00000c595e380
[   19.453239]  which belongs to the cache kmalloc-64 of size 64
[   19.453440] The buggy address is located 0 bytes to the right of
[   19.453440]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.453540] 
[   19.453561] The buggy address belongs to the physical page:
[   19.453603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.453693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.453992] page_type: f5(slab)
[   19.454074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.454192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.454291] page dumped because: kasan: bad access detected
[   19.454377] 
[   19.454397] Memory state around the buggy address:
[   19.454432]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.454478]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.454858] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.455048]                                      ^
[   19.455111]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.455173]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.455318] ==================================================================
[   19.394626] ==================================================================
[   19.394750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.394815] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.395123] 
[   19.395242] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.395441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.395539] Hardware name: linux,dummy-virt (DT)
[   19.395676] Call trace:
[   19.395766]  show_stack+0x20/0x38 (C)
[   19.395843]  dump_stack_lvl+0x8c/0xd0
[   19.395892]  print_report+0x118/0x5d0
[   19.395961]  kasan_report+0xdc/0x128
[   19.396009]  kasan_check_range+0x100/0x1a8
[   19.396057]  __kasan_check_write+0x20/0x30
[   19.396253]  kasan_atomics_helper+0x154c/0x4858
[   19.396304]  kasan_atomics+0x198/0x2e0
[   19.396349]  kunit_try_run_case+0x170/0x3f0
[   19.396432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.396583]  kthread+0x328/0x630
[   19.396765]  ret_from_fork+0x10/0x20
[   19.397063] 
[   19.397085] Allocated by task 265:
[   19.397113]  kasan_save_stack+0x3c/0x68
[   19.397164]  kasan_save_track+0x20/0x40
[   19.397270]  kasan_save_alloc_info+0x40/0x58
[   19.397365]  __kasan_kmalloc+0xd4/0xd8
[   19.397523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.397611]  kasan_atomics+0xb8/0x2e0
[   19.397918]  kunit_try_run_case+0x170/0x3f0
[   19.397963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.398008]  kthread+0x328/0x630
[   19.398043]  ret_from_fork+0x10/0x20
[   19.398081] 
[   19.398102] The buggy address belongs to the object at fff00000c595e380
[   19.398102]  which belongs to the cache kmalloc-64 of size 64
[   19.398164] The buggy address is located 0 bytes to the right of
[   19.398164]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.398231] 
[   19.398254] The buggy address belongs to the physical page:
[   19.398287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.398344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.398394] page_type: f5(slab)
[   19.398433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.398487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.398530] page dumped because: kasan: bad access detected
[   19.398565] 
[   19.398585] Memory state around the buggy address:
[   19.398618]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.398664]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.398720] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.398761]                                      ^
[   19.398795]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.398840]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.398880] ==================================================================
[   19.181108] ==================================================================
[   19.181168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.181226] Read of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.181279] 
[   19.181313] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.182192]  kthread+0x328/0x630
[   19.182864]  kasan_save_track+0x20/0x40
[   19.184738] 
[   19.184903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.187567]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.189701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.189746] Hardware name: linux,dummy-virt (DT)
[   19.189824] Call trace:
[   19.189850]  show_stack+0x20/0x38 (C)
[   19.189937]  dump_stack_lvl+0x8c/0xd0
[   19.190289]  print_report+0x118/0x5d0
[   19.190413]  kasan_report+0xdc/0x128
[   19.190519]  kasan_check_range+0x100/0x1a8
[   19.190608]  __kasan_check_write+0x20/0x30
[   19.190658]  kasan_atomics_helper+0x934/0x4858
[   19.190858]  kasan_atomics+0x198/0x2e0
[   19.190919]  kunit_try_run_case+0x170/0x3f0
[   19.191281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.191388]  kthread+0x328/0x630
[   19.191593]  ret_from_fork+0x10/0x20
[   19.191795] 
[   19.191888] Allocated by task 265:
[   19.191967]  kasan_save_stack+0x3c/0x68
[   19.192090]  kasan_save_track+0x20/0x40
[   19.192319]  kasan_save_alloc_info+0x40/0x58
[   19.192518]  __kasan_kmalloc+0xd4/0xd8
[   19.192623]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.192704]  kasan_atomics+0xb8/0x2e0
[   19.192872]  kunit_try_run_case+0x170/0x3f0
[   19.192961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.193152]  kthread+0x328/0x630
[   19.193186]  ret_from_fork+0x10/0x20
[   19.193581] 
[   19.193730] The buggy address belongs to the object at fff00000c595e380
[   19.193730]  which belongs to the cache kmalloc-64 of size 64
[   19.193799] The buggy address is located 0 bytes to the right of
[   19.193799]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.193933] 
[   19.193985] The buggy address belongs to the physical page:
[   19.194047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.194121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.194173] page_type: f5(slab)
[   19.194213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.194268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.195760] ==================================================================
[   19.263012] ==================================================================
[   19.263076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   19.263129] Read of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.263502] 
[   19.263921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.263952] Hardware name: linux,dummy-virt (DT)
[   19.263985] Call trace:
[   19.264018]  show_stack+0x20/0x38 (C)
[   19.264224]  dump_stack_lvl+0x8c/0xd0
[   19.264435]  print_report+0x118/0x5d0
[   19.264679]  kasan_report+0xdc/0x128
[   19.265107]  __asan_report_load4_noabort+0x20/0x30
[   19.265276]  kasan_atomics_helper+0x3de4/0x4858
[   19.266030]  kthread+0x328/0x630
[   19.266595] 
[   19.267328]  kasan_save_alloc_info+0x40/0x58
[   19.267524]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.268036]  kunit_try_run_case+0x170/0x3f0
[   19.268081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.268128]  kthread+0x328/0x630
[   19.268163]  ret_from_fork+0x10/0x20
[   19.268371] 
[   19.268801] The buggy address belongs to the object at fff00000c595e380
[   19.268801]  which belongs to the cache kmalloc-64 of size 64
[   19.269009] The buggy address is located 0 bytes to the right of
[   19.269009]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.269219] 
[   19.269574] The buggy address belongs to the physical page:
[   19.269869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.270046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.270416] page_type: f5(slab)
[   19.270487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.270756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.271052] page dumped because: kasan: bad access detected
[   19.271136] 
[   19.271363] Memory state around the buggy address:
[   19.271531]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.271683]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.271803] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.271902]                                      ^
[   19.272064]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.272111]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.272158] ==================================================================
[   19.374010] ==================================================================
[   19.374146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.374200] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.374251] 
[   19.374303] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.374394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.374422] Hardware name: linux,dummy-virt (DT)
[   19.374454] Call trace:
[   19.374477]  show_stack+0x20/0x38 (C)
[   19.374526]  dump_stack_lvl+0x8c/0xd0
[   19.374574]  print_report+0x118/0x5d0
[   19.374622]  kasan_report+0xdc/0x128
[   19.374668]  kasan_check_range+0x100/0x1a8
[   19.374739]  __kasan_check_write+0x20/0x30
[   19.374785]  kasan_atomics_helper+0x1384/0x4858
[   19.374835]  kasan_atomics+0x198/0x2e0
[   19.374881]  kunit_try_run_case+0x170/0x3f0
[   19.374929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.374984]  kthread+0x328/0x630
[   19.375027]  ret_from_fork+0x10/0x20
[   19.375074] 
[   19.375102] Allocated by task 265:
[   19.375131]  kasan_save_stack+0x3c/0x68
[   19.375173]  kasan_save_track+0x20/0x40
[   19.375213]  kasan_save_alloc_info+0x40/0x58
[   19.375254]  __kasan_kmalloc+0xd4/0xd8
[   19.375293]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.375334]  kasan_atomics+0xb8/0x2e0
[   19.375382]  kunit_try_run_case+0x170/0x3f0
[   19.375424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.375476]  kthread+0x328/0x630
[   19.375519]  ret_from_fork+0x10/0x20
[   19.375557] 
[   19.375585] The buggy address belongs to the object at fff00000c595e380
[   19.375585]  which belongs to the cache kmalloc-64 of size 64
[   19.375646] The buggy address is located 0 bytes to the right of
[   19.375646]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.375725] 
[   19.375746] The buggy address belongs to the physical page:
[   19.375779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.375834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.375883] page_type: f5(slab)
[   19.375922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.375976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.376048] page dumped because: kasan: bad access detected
[   19.376099] 
[   19.376118] Memory state around the buggy address:
[   19.376152]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.376368]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.376459] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.376599]                                      ^
[   19.376829]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.376891]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.376935] ==================================================================
[   19.355415] ==================================================================
[   19.355579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.355966] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.356025] 
[   19.356057] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.356143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.356172] Hardware name: linux,dummy-virt (DT)
[   19.356203] Call trace:
[   19.356225]  show_stack+0x20/0x38 (C)
[   19.356277]  dump_stack_lvl+0x8c/0xd0
[   19.356326]  print_report+0x118/0x5d0
[   19.356375]  kasan_report+0xdc/0x128
[   19.356423]  kasan_check_range+0x100/0x1a8
[   19.356471]  __kasan_check_write+0x20/0x30
[   19.356517]  kasan_atomics_helper+0x1190/0x4858
[   19.356567]  kasan_atomics+0x198/0x2e0
[   19.356612]  kunit_try_run_case+0x170/0x3f0
[   19.356661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.356727]  kthread+0x328/0x630
[   19.356770]  ret_from_fork+0x10/0x20
[   19.356818] 
[   19.356984] Allocated by task 265:
[   19.357017]  kasan_save_stack+0x3c/0x68
[   19.357150]  kasan_save_track+0x20/0x40
[   19.357309]  kasan_save_alloc_info+0x40/0x58
[   19.357396]  __kasan_kmalloc+0xd4/0xd8
[   19.357434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.357476]  kasan_atomics+0xb8/0x2e0
[   19.357680]  kunit_try_run_case+0x170/0x3f0
[   19.357742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.357799]  kthread+0x328/0x630
[   19.357834]  ret_from_fork+0x10/0x20
[   19.357870] 
[   19.357897] The buggy address belongs to the object at fff00000c595e380
[   19.357897]  which belongs to the cache kmalloc-64 of size 64
[   19.357961] The buggy address is located 0 bytes to the right of
[   19.357961]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.358031] 
[   19.358062] The buggy address belongs to the physical page:
[   19.358094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.358150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.358200] page_type: f5(slab)
[   19.358239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.358293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.358352] page dumped because: kasan: bad access detected
[   19.358388] 
[   19.358407] Memory state around the buggy address:
[   19.358441]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.358496]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.358543] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.358585]                                      ^
[   19.358620]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.358664]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.359950] ==================================================================
[   19.377114] ==================================================================
[   19.377163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.377210] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.377263] 
[   19.377291] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.377536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.377594] Hardware name: linux,dummy-virt (DT)
[   19.377631] Call trace:
[   19.377656]  show_stack+0x20/0x38 (C)
[   19.377707]  dump_stack_lvl+0x8c/0xd0
[   19.377814]  print_report+0x118/0x5d0
[   19.377918]  kasan_report+0xdc/0x128
[   19.377968]  __asan_report_load8_noabort+0x20/0x30
[   19.378021]  kasan_atomics_helper+0x3f04/0x4858
[   19.378199]  kasan_atomics+0x198/0x2e0
[   19.378249]  kunit_try_run_case+0x170/0x3f0
[   19.378297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.378377]  kthread+0x328/0x630
[   19.378422]  ret_from_fork+0x10/0x20
[   19.378488] 
[   19.378534] Allocated by task 265:
[   19.378599]  kasan_save_stack+0x3c/0x68
[   19.378646]  kasan_save_track+0x20/0x40
[   19.378736]  kasan_save_alloc_info+0x40/0x58
[   19.378807]  __kasan_kmalloc+0xd4/0xd8
[   19.378873]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.378941]  kasan_atomics+0xb8/0x2e0
[   19.379036]  kunit_try_run_case+0x170/0x3f0
[   19.379083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.379147]  kthread+0x328/0x630
[   19.379209]  ret_from_fork+0x10/0x20
[   19.379255] 
[   19.379275] The buggy address belongs to the object at fff00000c595e380
[   19.379275]  which belongs to the cache kmalloc-64 of size 64
[   19.379338] The buggy address is located 0 bytes to the right of
[   19.379338]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.379408] 
[   19.379428] The buggy address belongs to the physical page:
[   19.379461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.379518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.379570] page_type: f5(slab)
[   19.379828] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.379918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.380004] page dumped because: kasan: bad access detected
[   19.380119] 
[   19.380201] Memory state around the buggy address:
[   19.380528]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.380633]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.380758] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.380873]                                      ^
[   19.380909]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.380957]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.381159] ==================================================================
[   19.424301] ==================================================================
[   19.424403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.424457] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.424727] 
[   19.424779] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.424869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.425053] Hardware name: linux,dummy-virt (DT)
[   19.425132] Call trace:
[   19.425157]  show_stack+0x20/0x38 (C)
[   19.425269]  dump_stack_lvl+0x8c/0xd0
[   19.425354]  print_report+0x118/0x5d0
[   19.425412]  kasan_report+0xdc/0x128
[   19.425737]  kasan_check_range+0x100/0x1a8
[   19.425812]  __kasan_check_write+0x20/0x30
[   19.426009]  kasan_atomics_helper+0x16d0/0x4858
[   19.426217]  kasan_atomics+0x198/0x2e0
[   19.426288]  kunit_try_run_case+0x170/0x3f0
[   19.426423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.426486]  kthread+0x328/0x630
[   19.426532]  ret_from_fork+0x10/0x20
[   19.426621] 
[   19.426643] Allocated by task 265:
[   19.426672]  kasan_save_stack+0x3c/0x68
[   19.426730]  kasan_save_track+0x20/0x40
[   19.426870]  kasan_save_alloc_info+0x40/0x58
[   19.426926]  __kasan_kmalloc+0xd4/0xd8
[   19.427100]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.427161]  kasan_atomics+0xb8/0x2e0
[   19.427521]  kunit_try_run_case+0x170/0x3f0
[   19.427651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.427725]  kthread+0x328/0x630
[   19.427760]  ret_from_fork+0x10/0x20
[   19.427803] 
[   19.427825] The buggy address belongs to the object at fff00000c595e380
[   19.427825]  which belongs to the cache kmalloc-64 of size 64
[   19.427892] The buggy address is located 0 bytes to the right of
[   19.427892]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.428467] 
[   19.428683] The buggy address belongs to the physical page:
[   19.428782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.429076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.429156] page_type: f5(slab)
[   19.429208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.429276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.429322] page dumped because: kasan: bad access detected
[   19.429368] 
[   19.429388] Memory state around the buggy address:
[   19.429839]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.429893]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.429963] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.430015]                                      ^
[   19.430051]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.430098]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.430141] ==================================================================
[   19.399852] ==================================================================
[   19.399905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.399953] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.400005] 
[   19.400036] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.400266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.400313] Hardware name: linux,dummy-virt (DT)
[   19.400366] Call trace:
[   19.400411]  show_stack+0x20/0x38 (C)
[   19.400518]  dump_stack_lvl+0x8c/0xd0
[   19.400574]  print_report+0x118/0x5d0
[   19.400659]  kasan_report+0xdc/0x128
[   19.400707]  kasan_check_range+0x100/0x1a8
[   19.400908]  __kasan_check_write+0x20/0x30
[   19.401058]  kasan_atomics_helper+0x15b4/0x4858
[   19.401132]  kasan_atomics+0x198/0x2e0
[   19.401198]  kunit_try_run_case+0x170/0x3f0
[   19.401253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.401375]  kthread+0x328/0x630
[   19.401417]  ret_from_fork+0x10/0x20
[   19.401494] 
[   19.401539] Allocated by task 265:
[   19.401577]  kasan_save_stack+0x3c/0x68
[   19.401642]  kasan_save_track+0x20/0x40
[   19.401688]  kasan_save_alloc_info+0x40/0x58
[   19.401742]  __kasan_kmalloc+0xd4/0xd8
[   19.401789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.401906]  kasan_atomics+0xb8/0x2e0
[   19.401953]  kunit_try_run_case+0x170/0x3f0
[   19.401996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.402042]  kthread+0x328/0x630
[   19.402077]  ret_from_fork+0x10/0x20
[   19.402115] 
[   19.402281] The buggy address belongs to the object at fff00000c595e380
[   19.402281]  which belongs to the cache kmalloc-64 of size 64
[   19.402345] The buggy address is located 0 bytes to the right of
[   19.402345]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.402512] 
[   19.402592] The buggy address belongs to the physical page:
[   19.402627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.402682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.402754] page_type: f5(slab)
[   19.402794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.402848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.402892] page dumped because: kasan: bad access detected
[   19.402927] 
[   19.402986] Memory state around the buggy address:
[   19.403137]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.403185]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.403238] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.403280]                                      ^
[   19.403314]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.403359]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.403635] ==================================================================
[   19.415087] ==================================================================
[   19.415147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.415208] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.415639] 
[   19.415772] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.415910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.415993] Hardware name: linux,dummy-virt (DT)
[   19.416076] Call trace:
[   19.416139]  show_stack+0x20/0x38 (C)
[   19.416205]  dump_stack_lvl+0x8c/0xd0
[   19.416523]  print_report+0x118/0x5d0
[   19.416903]  kasan_report+0xdc/0x128
[   19.417036]  __asan_report_load8_noabort+0x20/0x30
[   19.417180]  kasan_atomics_helper+0x3df4/0x4858
[   19.417393]  kasan_atomics+0x198/0x2e0
[   19.417656]  kunit_try_run_case+0x170/0x3f0
[   19.417858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.417949]  kthread+0x328/0x630
[   19.418012]  ret_from_fork+0x10/0x20
[   19.418063] 
[   19.418083] Allocated by task 265:
[   19.418115]  kasan_save_stack+0x3c/0x68
[   19.418181]  kasan_save_track+0x20/0x40
[   19.418229]  kasan_save_alloc_info+0x40/0x58
[   19.418273]  __kasan_kmalloc+0xd4/0xd8
[   19.418310]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.418352]  kasan_atomics+0xb8/0x2e0
[   19.418390]  kunit_try_run_case+0x170/0x3f0
[   19.418445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.418492]  kthread+0x328/0x630
[   19.418525]  ret_from_fork+0x10/0x20
[   19.418562] 
[   19.418582] The buggy address belongs to the object at fff00000c595e380
[   19.418582]  which belongs to the cache kmalloc-64 of size 64
[   19.418646] The buggy address is located 0 bytes to the right of
[   19.418646]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.418739] 
[   19.419263] The buggy address belongs to the physical page:
[   19.419762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.419836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.419889] page_type: f5(slab)
[   19.420236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.420969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.421051] page dumped because: kasan: bad access detected
[   19.421103] 
[   19.421159] Memory state around the buggy address:
[   19.421367]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.421765]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.421823] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.422017]                                      ^
[   19.422254]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.422642]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.422789] ==================================================================
[   19.368888] ==================================================================
[   19.368943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.368990] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.369254] 
[   19.369303] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.369426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.369492] Hardware name: linux,dummy-virt (DT)
[   19.369534] Call trace:
[   19.369558]  show_stack+0x20/0x38 (C)
[   19.369608]  dump_stack_lvl+0x8c/0xd0
[   19.369661]  print_report+0x118/0x5d0
[   19.369840]  kasan_report+0xdc/0x128
[   19.369908]  kasan_check_range+0x100/0x1a8
[   19.369996]  __kasan_check_write+0x20/0x30
[   19.370107]  kasan_atomics_helper+0x12d8/0x4858
[   19.370185]  kasan_atomics+0x198/0x2e0
[   19.370249]  kunit_try_run_case+0x170/0x3f0
[   19.370314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.370484]  kthread+0x328/0x630
[   19.370564]  ret_from_fork+0x10/0x20
[   19.370638] 
[   19.370719] Allocated by task 265:
[   19.370787]  kasan_save_stack+0x3c/0x68
[   19.370829]  kasan_save_track+0x20/0x40
[   19.370924]  kasan_save_alloc_info+0x40/0x58
[   19.370966]  __kasan_kmalloc+0xd4/0xd8
[   19.371045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.371089]  kasan_atomics+0xb8/0x2e0
[   19.371125]  kunit_try_run_case+0x170/0x3f0
[   19.371166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.371407]  kthread+0x328/0x630
[   19.371513]  ret_from_fork+0x10/0x20
[   19.371626] 
[   19.371765] The buggy address belongs to the object at fff00000c595e380
[   19.371765]  which belongs to the cache kmalloc-64 of size 64
[   19.371997] The buggy address is located 0 bytes to the right of
[   19.371997]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.372067] 
[   19.372088] The buggy address belongs to the physical page:
[   19.372129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.372243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.372313] page_type: f5(slab)
[   19.372350] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.372404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.372448] page dumped because: kasan: bad access detected
[   19.372483] 
[   19.372640] Memory state around the buggy address:
[   19.372674]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.372729]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.372776] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.372899]                                      ^
[   19.373113]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.373304]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.373348] ==================================================================
[   19.364939] ==================================================================
[   19.364995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.365063] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.365141] 
[   19.365272] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.365424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.365453] Hardware name: linux,dummy-virt (DT)
[   19.365499] Call trace:
[   19.365523]  show_stack+0x20/0x38 (C)
[   19.365573]  dump_stack_lvl+0x8c/0xd0
[   19.365627]  print_report+0x118/0x5d0
[   19.365821]  kasan_report+0xdc/0x128
[   19.366028]  kasan_check_range+0x100/0x1a8
[   19.366083]  __kasan_check_write+0x20/0x30
[   19.366149]  kasan_atomics_helper+0x126c/0x4858
[   19.366200]  kasan_atomics+0x198/0x2e0
[   19.366385]  kunit_try_run_case+0x170/0x3f0
[   19.366474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.366546]  kthread+0x328/0x630
[   19.366608]  ret_from_fork+0x10/0x20
[   19.366675] 
[   19.366979] Allocated by task 265:
[   19.367034]  kasan_save_stack+0x3c/0x68
[   19.367076]  kasan_save_track+0x20/0x40
[   19.367157]  kasan_save_alloc_info+0x40/0x58
[   19.367200]  __kasan_kmalloc+0xd4/0xd8
[   19.367239]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.367289]  kasan_atomics+0xb8/0x2e0
[   19.367326]  kunit_try_run_case+0x170/0x3f0
[   19.367367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.367413]  kthread+0x328/0x630
[   19.367446]  ret_from_fork+0x10/0x20
[   19.367484] 
[   19.367504] The buggy address belongs to the object at fff00000c595e380
[   19.367504]  which belongs to the cache kmalloc-64 of size 64
[   19.367567] The buggy address is located 0 bytes to the right of
[   19.367567]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.367800] 
[   19.367875] The buggy address belongs to the physical page:
[   19.367955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.368081] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.368172] page_type: f5(slab)
[   19.368212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.368267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.368312] page dumped because: kasan: bad access detected
[   19.368363] 
[   19.368382] Memory state around the buggy address:
[   19.368416]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.368462]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.368509] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.368551]                                      ^
[   19.368586]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.368635]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.368693] ==================================================================
[   19.279723] ==================================================================
[   19.279779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.279830] Read of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.280086] 
[   19.280171] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.280299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.280347] Hardware name: linux,dummy-virt (DT)
[   19.280381] Call trace:
[   19.280431]  show_stack+0x20/0x38 (C)
[   19.280483]  dump_stack_lvl+0x8c/0xd0
[   19.280546]  print_report+0x118/0x5d0
[   19.280631]  kasan_report+0xdc/0x128
[   19.280681]  __asan_report_load4_noabort+0x20/0x30
[   19.280810]  kasan_atomics_helper+0x3dd8/0x4858
[   19.280871]  kasan_atomics+0x198/0x2e0
[   19.281024]  kunit_try_run_case+0x170/0x3f0
[   19.281155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.281219]  kthread+0x328/0x630
[   19.281262]  ret_from_fork+0x10/0x20
[   19.281313] 
[   19.281353] Allocated by task 265:
[   19.281410]  kasan_save_stack+0x3c/0x68
[   19.281454]  kasan_save_track+0x20/0x40
[   19.281510]  kasan_save_alloc_info+0x40/0x58
[   19.281567]  __kasan_kmalloc+0xd4/0xd8
[   19.281607]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.281648]  kasan_atomics+0xb8/0x2e0
[   19.281698]  kunit_try_run_case+0x170/0x3f0
[   19.281836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.281882]  kthread+0x328/0x630
[   19.282080]  ret_from_fork+0x10/0x20
[   19.282149] 
[   19.282189] The buggy address belongs to the object at fff00000c595e380
[   19.282189]  which belongs to the cache kmalloc-64 of size 64
[   19.282285] The buggy address is located 0 bytes to the right of
[   19.282285]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.282354] 
[   19.282456] The buggy address belongs to the physical page:
[   19.282498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.282648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.282791] page_type: f5(slab)
[   19.282845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.282896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.283046] page dumped because: kasan: bad access detected
[   19.283089] 
[   19.283223] Memory state around the buggy address:
[   19.283328]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.283422]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.283520] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.283725]                                      ^
[   19.283862]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.283965]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.284045] ==================================================================
[   19.386738] ==================================================================
[   19.386820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.386876] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.386957] 
[   19.387006] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.387090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.387127] Hardware name: linux,dummy-virt (DT)
[   19.387239] Call trace:
[   19.387303]  show_stack+0x20/0x38 (C)
[   19.387442]  dump_stack_lvl+0x8c/0xd0
[   19.387493]  print_report+0x118/0x5d0
[   19.387602]  kasan_report+0xdc/0x128
[   19.387658]  kasan_check_range+0x100/0x1a8
[   19.387707]  __kasan_check_write+0x20/0x30
[   19.387766]  kasan_atomics_helper+0x147c/0x4858
[   19.387817]  kasan_atomics+0x198/0x2e0
[   19.387863]  kunit_try_run_case+0x170/0x3f0
[   19.387923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.387977]  kthread+0x328/0x630
[   19.388028]  ret_from_fork+0x10/0x20
[   19.388077] 
[   19.388320] Allocated by task 265:
[   19.388349]  kasan_save_stack+0x3c/0x68
[   19.388391]  kasan_save_track+0x20/0x40
[   19.388429]  kasan_save_alloc_info+0x40/0x58
[   19.388472]  __kasan_kmalloc+0xd4/0xd8
[   19.388509]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.388551]  kasan_atomics+0xb8/0x2e0
[   19.388589]  kunit_try_run_case+0x170/0x3f0
[   19.388663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.388785]  kthread+0x328/0x630
[   19.388821]  ret_from_fork+0x10/0x20
[   19.388914] 
[   19.389004] The buggy address belongs to the object at fff00000c595e380
[   19.389004]  which belongs to the cache kmalloc-64 of size 64
[   19.389199] The buggy address is located 0 bytes to the right of
[   19.389199]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.389416] 
[   19.389506] The buggy address belongs to the physical page:
[   19.389580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.389674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.389771] page_type: f5(slab)
[   19.389843] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.389940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.390030] page dumped because: kasan: bad access detected
[   19.390140] 
[   19.390220] Memory state around the buggy address:
[   19.390344]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.390497]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.390645] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.390686]                                      ^
[   19.390729]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.390774]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.390813] ==================================================================
[   19.312431] ==================================================================
[   19.312504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.312556] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.312743] 
[   19.312788] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.312873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.312901] Hardware name: linux,dummy-virt (DT)
[   19.312940] Call trace:
[   19.313085]  show_stack+0x20/0x38 (C)
[   19.313168]  dump_stack_lvl+0x8c/0xd0
[   19.313218]  print_report+0x118/0x5d0
[   19.313268]  kasan_report+0xdc/0x128
[   19.313353]  __asan_report_store8_noabort+0x20/0x30
[   19.313436]  kasan_atomics_helper+0x3e5c/0x4858
[   19.313506]  kasan_atomics+0x198/0x2e0
[   19.313559]  kunit_try_run_case+0x170/0x3f0
[   19.313610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.313663]  kthread+0x328/0x630
[   19.313718]  ret_from_fork+0x10/0x20
[   19.313767] 
[   19.313922] Allocated by task 265:
[   19.313964]  kasan_save_stack+0x3c/0x68
[   19.314007]  kasan_save_track+0x20/0x40
[   19.314237]  kasan_save_alloc_info+0x40/0x58
[   19.314322]  __kasan_kmalloc+0xd4/0xd8
[   19.314542]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.314614]  kasan_atomics+0xb8/0x2e0
[   19.314654]  kunit_try_run_case+0x170/0x3f0
[   19.314703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.314759]  kthread+0x328/0x630
[   19.314794]  ret_from_fork+0x10/0x20
[   19.314833] 
[   19.314853] The buggy address belongs to the object at fff00000c595e380
[   19.314853]  which belongs to the cache kmalloc-64 of size 64
[   19.314926] The buggy address is located 0 bytes to the right of
[   19.314926]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.314995] 
[   19.315017] The buggy address belongs to the physical page:
[   19.315052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.315109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.315159] page_type: f5(slab)
[   19.315199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.315252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.315296] page dumped because: kasan: bad access detected
[   19.315344] 
[   19.315364] Memory state around the buggy address:
[   19.315398]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.315444]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.315489] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.315541]                                      ^
[   19.315577]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.315857]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.315899] ==================================================================
[   19.343214] ==================================================================
[   19.343427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.343634] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.343857] 
[   19.344066] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.344201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.344329] Hardware name: linux,dummy-virt (DT)
[   19.344399] Call trace:
[   19.344424]  show_stack+0x20/0x38 (C)
[   19.344474]  dump_stack_lvl+0x8c/0xd0
[   19.344878]  print_report+0x118/0x5d0
[   19.345044]  kasan_report+0xdc/0x128
[   19.345141]  kasan_check_range+0x100/0x1a8
[   19.345394]  __kasan_check_write+0x20/0x30
[   19.345463]  kasan_atomics_helper+0x10c0/0x4858
[   19.345797]  kasan_atomics+0x198/0x2e0
[   19.345883]  kunit_try_run_case+0x170/0x3f0
[   19.345957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.346126]  kthread+0x328/0x630
[   19.346214]  ret_from_fork+0x10/0x20
[   19.346385] 
[   19.346426] Allocated by task 265:
[   19.346458]  kasan_save_stack+0x3c/0x68
[   19.346535]  kasan_save_track+0x20/0x40
[   19.346913]  kasan_save_alloc_info+0x40/0x58
[   19.347019]  __kasan_kmalloc+0xd4/0xd8
[   19.347235]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.347422]  kasan_atomics+0xb8/0x2e0
[   19.347500]  kunit_try_run_case+0x170/0x3f0
[   19.347644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.347734]  kthread+0x328/0x630
[   19.347919]  ret_from_fork+0x10/0x20
[   19.348168] 
[   19.348356] The buggy address belongs to the object at fff00000c595e380
[   19.348356]  which belongs to the cache kmalloc-64 of size 64
[   19.348485] The buggy address is located 0 bytes to the right of
[   19.348485]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.348575] 
[   19.348596] The buggy address belongs to the physical page:
[   19.348630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.348795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.348845] page_type: f5(slab)
[   19.348924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.348988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.349176] page dumped because: kasan: bad access detected
[   19.349299] 
[   19.349358] Memory state around the buggy address:
[   19.349437]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.349522]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.349796] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.349899]                                      ^
[   19.349965]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.350036]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.350076] ==================================================================
[   19.437511] ==================================================================
[   19.437559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.437608] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.437659] 
[   19.437691] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.438897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.439242] Hardware name: linux,dummy-virt (DT)
[   19.439353] Call trace:
[   19.440450]  show_stack+0x20/0x38 (C)
[   19.440776]  dump_stack_lvl+0x8c/0xd0
[   19.440923]  print_report+0x118/0x5d0
[   19.440986]  kasan_report+0xdc/0x128
[   19.441035]  kasan_check_range+0x100/0x1a8
[   19.441085]  __kasan_check_write+0x20/0x30
[   19.441130]  kasan_atomics_helper+0x175c/0x4858
[   19.441180]  kasan_atomics+0x198/0x2e0
[   19.441228]  kunit_try_run_case+0x170/0x3f0
[   19.441275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.441335]  kthread+0x328/0x630
[   19.441379]  ret_from_fork+0x10/0x20
[   19.441427] 
[   19.441448] Allocated by task 265:
[   19.441495]  kasan_save_stack+0x3c/0x68
[   19.441540]  kasan_save_track+0x20/0x40
[   19.441581]  kasan_save_alloc_info+0x40/0x58
[   19.441622]  __kasan_kmalloc+0xd4/0xd8
[   19.441662]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.441704]  kasan_atomics+0xb8/0x2e0
[   19.441771]  kunit_try_run_case+0x170/0x3f0
[   19.441812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.441866]  kthread+0x328/0x630
[   19.441902]  ret_from_fork+0x10/0x20
[   19.441939] 
[   19.441969] The buggy address belongs to the object at fff00000c595e380
[   19.441969]  which belongs to the cache kmalloc-64 of size 64
[   19.442031] The buggy address is located 0 bytes to the right of
[   19.442031]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.442100] 
[   19.442122] The buggy address belongs to the physical page:
[   19.442164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.442220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.442281] page_type: f5(slab)
[   19.442343] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.442397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.442442] page dumped because: kasan: bad access detected
[   19.442493] 
[   19.442513] Memory state around the buggy address:
[   19.442548]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.442603]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.442659] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.442700]                                      ^
[   19.443213]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.443310]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.443359] ==================================================================
[   19.306854] ==================================================================
[   19.306927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.307016] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.307079] 
[   19.307114] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.307235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.307269] Hardware name: linux,dummy-virt (DT)
[   19.307364] Call trace:
[   19.307396]  show_stack+0x20/0x38 (C)
[   19.307560]  dump_stack_lvl+0x8c/0xd0
[   19.307740]  print_report+0x118/0x5d0
[   19.307932]  kasan_report+0xdc/0x128
[   19.308131]  kasan_check_range+0x100/0x1a8
[   19.308309]  __kasan_check_write+0x20/0x30
[   19.308413]  kasan_atomics_helper+0xe44/0x4858
[   19.308492]  kasan_atomics+0x198/0x2e0
[   19.308578]  kunit_try_run_case+0x170/0x3f0
[   19.308678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.308792]  kthread+0x328/0x630
[   19.308835]  ret_from_fork+0x10/0x20
[   19.309129] 
[   19.309157] Allocated by task 265:
[   19.309187]  kasan_save_stack+0x3c/0x68
[   19.309271]  kasan_save_track+0x20/0x40
[   19.309383]  kasan_save_alloc_info+0x40/0x58
[   19.309480]  __kasan_kmalloc+0xd4/0xd8
[   19.309573]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.309648]  kasan_atomics+0xb8/0x2e0
[   19.309697]  kunit_try_run_case+0x170/0x3f0
[   19.309747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.309967]  kthread+0x328/0x630
[   19.310072]  ret_from_fork+0x10/0x20
[   19.310158] 
[   19.310216] The buggy address belongs to the object at fff00000c595e380
[   19.310216]  which belongs to the cache kmalloc-64 of size 64
[   19.310350] The buggy address is located 0 bytes to the right of
[   19.310350]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.310419] 
[   19.310458] The buggy address belongs to the physical page:
[   19.310734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.310828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.310882] page_type: f5(slab)
[   19.310923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.310987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.311046] page dumped because: kasan: bad access detected
[   19.311082] 
[   19.311101] Memory state around the buggy address:
[   19.311134]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.311180]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.311225] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.311267]                                      ^
[   19.311300]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.311346]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.311388] ==================================================================
[   19.360366] ==================================================================
[   19.360420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.360469] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.360521] 
[   19.360552] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.360636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.360664] Hardware name: linux,dummy-virt (DT)
[   19.360696] Call trace:
[   19.360734]  show_stack+0x20/0x38 (C)
[   19.360813]  dump_stack_lvl+0x8c/0xd0
[   19.360879]  print_report+0x118/0x5d0
[   19.360960]  kasan_report+0xdc/0x128
[   19.361007]  kasan_check_range+0x100/0x1a8
[   19.361072]  __kasan_check_write+0x20/0x30
[   19.361170]  kasan_atomics_helper+0x11f8/0x4858
[   19.361268]  kasan_atomics+0x198/0x2e0
[   19.361337]  kunit_try_run_case+0x170/0x3f0
[   19.361413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.361501]  kthread+0x328/0x630
[   19.361625]  ret_from_fork+0x10/0x20
[   19.361780] 
[   19.361829] Allocated by task 265:
[   19.361888]  kasan_save_stack+0x3c/0x68
[   19.361932]  kasan_save_track+0x20/0x40
[   19.361999]  kasan_save_alloc_info+0x40/0x58
[   19.362042]  __kasan_kmalloc+0xd4/0xd8
[   19.362081]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.362139]  kasan_atomics+0xb8/0x2e0
[   19.362195]  kunit_try_run_case+0x170/0x3f0
[   19.362237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.362282]  kthread+0x328/0x630
[   19.362316]  ret_from_fork+0x10/0x20
[   19.362394] 
[   19.362475] The buggy address belongs to the object at fff00000c595e380
[   19.362475]  which belongs to the cache kmalloc-64 of size 64
[   19.362559] The buggy address is located 0 bytes to the right of
[   19.362559]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.362628] 
[   19.362649] The buggy address belongs to the physical page:
[   19.362683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.362748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.362799] page_type: f5(slab)
[   19.362836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.363102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.363149] page dumped because: kasan: bad access detected
[   19.363184] 
[   19.363222] Memory state around the buggy address:
[   19.363333]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.363401]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.363502] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.363670]                                      ^
[   19.363707]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.363760]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.363842] ==================================================================
[   19.443534] ==================================================================
[   19.443581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.443630] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.443683] 
[   19.443732] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.443839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.443869] Hardware name: linux,dummy-virt (DT)
[   19.443902] Call trace:
[   19.443924]  show_stack+0x20/0x38 (C)
[   19.443973]  dump_stack_lvl+0x8c/0xd0
[   19.444023]  print_report+0x118/0x5d0
[   19.444072]  kasan_report+0xdc/0x128
[   19.444379]  __asan_report_load8_noabort+0x20/0x30
[   19.444534]  kasan_atomics_helper+0x3e20/0x4858
[   19.444598]  kasan_atomics+0x198/0x2e0
[   19.445007]  kunit_try_run_case+0x170/0x3f0
[   19.445125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.445210]  kthread+0x328/0x630
[   19.445399]  ret_from_fork+0x10/0x20
[   19.445656] 
[   19.445684] Allocated by task 265:
[   19.445782]  kasan_save_stack+0x3c/0x68
[   19.445839]  kasan_save_track+0x20/0x40
[   19.445955]  kasan_save_alloc_info+0x40/0x58
[   19.446061]  __kasan_kmalloc+0xd4/0xd8
[   19.446138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.446181]  kasan_atomics+0xb8/0x2e0
[   19.446227]  kunit_try_run_case+0x170/0x3f0
[   19.446265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.446313]  kthread+0x328/0x630
[   19.446346]  ret_from_fork+0x10/0x20
[   19.446616] 
[   19.446793] The buggy address belongs to the object at fff00000c595e380
[   19.446793]  which belongs to the cache kmalloc-64 of size 64
[   19.447020] The buggy address is located 0 bytes to the right of
[   19.447020]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.447100] 
[   19.447171] The buggy address belongs to the physical page:
[   19.447240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.447392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.447472] page_type: f5(slab)
[   19.447695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.447765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.447982] page dumped because: kasan: bad access detected
[   19.448025] 
[   19.448045] Memory state around the buggy address:
[   19.448138]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.448258]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.448344] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.448651]                                      ^
[   19.448727]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.448774]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.448974] ==================================================================
[   19.321158] ==================================================================
[   19.321510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.321645] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.321700] 
[   19.321765] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.321878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.321935] Hardware name: linux,dummy-virt (DT)
[   19.322003] Call trace:
[   19.322048]  show_stack+0x20/0x38 (C)
[   19.322097]  dump_stack_lvl+0x8c/0xd0
[   19.322164]  print_report+0x118/0x5d0
[   19.322220]  kasan_report+0xdc/0x128
[   19.322268]  kasan_check_range+0x100/0x1a8
[   19.322316]  __kasan_check_write+0x20/0x30
[   19.322462]  kasan_atomics_helper+0xf20/0x4858
[   19.322680]  kasan_atomics+0x198/0x2e0
[   19.322751]  kunit_try_run_case+0x170/0x3f0
[   19.322827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.322890]  kthread+0x328/0x630
[   19.323058]  ret_from_fork+0x10/0x20
[   19.323134] 
[   19.323201] Allocated by task 265:
[   19.323319]  kasan_save_stack+0x3c/0x68
[   19.323421]  kasan_save_track+0x20/0x40
[   19.323546]  kasan_save_alloc_info+0x40/0x58
[   19.323669]  __kasan_kmalloc+0xd4/0xd8
[   19.323756]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.323901]  kasan_atomics+0xb8/0x2e0
[   19.323968]  kunit_try_run_case+0x170/0x3f0
[   19.324008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.324194]  kthread+0x328/0x630
[   19.324230]  ret_from_fork+0x10/0x20
[   19.324268] 
[   19.324289] The buggy address belongs to the object at fff00000c595e380
[   19.324289]  which belongs to the cache kmalloc-64 of size 64
[   19.324489] The buggy address is located 0 bytes to the right of
[   19.324489]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.324596] 
[   19.324665] The buggy address belongs to the physical page:
[   19.325087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.325247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.325333] page_type: f5(slab)
[   19.325376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.325430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.325474] page dumped because: kasan: bad access detected
[   19.325850] 
[   19.325918] Memory state around the buggy address:
[   19.326030]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.326217]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.326401] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.326524]                                      ^
[   19.326597]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.326672]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.326723] ==================================================================
[   19.285096] ==================================================================
[   19.285164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.285241] Write of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.285294] 
[   19.285329] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.285414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.285441] Hardware name: linux,dummy-virt (DT)
[   19.285474] Call trace:
[   19.285497]  show_stack+0x20/0x38 (C)
[   19.285545]  dump_stack_lvl+0x8c/0xd0
[   19.285734]  print_report+0x118/0x5d0
[   19.285965]  kasan_report+0xdc/0x128
[   19.286025]  kasan_check_range+0x100/0x1a8
[   19.286076]  __kasan_check_write+0x20/0x30
[   19.286122]  kasan_atomics_helper+0xd3c/0x4858
[   19.286181]  kasan_atomics+0x198/0x2e0
[   19.286227]  kunit_try_run_case+0x170/0x3f0
[   19.286274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.286337]  kthread+0x328/0x630
[   19.286380]  ret_from_fork+0x10/0x20
[   19.286429] 
[   19.286459] Allocated by task 265:
[   19.286489]  kasan_save_stack+0x3c/0x68
[   19.286533]  kasan_save_track+0x20/0x40
[   19.286573]  kasan_save_alloc_info+0x40/0x58
[   19.286624]  __kasan_kmalloc+0xd4/0xd8
[   19.286665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.287009]  kasan_atomics+0xb8/0x2e0
[   19.287330]  kunit_try_run_case+0x170/0x3f0
[   19.287429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.287515]  kthread+0x328/0x630
[   19.287587]  ret_from_fork+0x10/0x20
[   19.287628] 
[   19.287651] The buggy address belongs to the object at fff00000c595e380
[   19.287651]  which belongs to the cache kmalloc-64 of size 64
[   19.287827] The buggy address is located 0 bytes to the right of
[   19.287827]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.287902] 
[   19.287924] The buggy address belongs to the physical page:
[   19.288094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.288187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.288303] page_type: f5(slab)
[   19.288474] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.288684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.288825] page dumped because: kasan: bad access detected
[   19.288950] 
[   19.289019] Memory state around the buggy address:
[   19.289057]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.289104]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.289427] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.289529]                                      ^
[   19.289595]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.289652]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.289979] ==================================================================
[   19.316037] ==================================================================
[   19.316081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.316124] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.316185] 
[   19.316217] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.316300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.316328] Hardware name: linux,dummy-virt (DT)
[   19.316371] Call trace:
[   19.316394]  show_stack+0x20/0x38 (C)
[   19.316441]  dump_stack_lvl+0x8c/0xd0
[   19.316489]  print_report+0x118/0x5d0
[   19.316545]  kasan_report+0xdc/0x128
[   19.316592]  kasan_check_range+0x100/0x1a8
[   19.316648]  __kasan_check_write+0x20/0x30
[   19.316693]  kasan_atomics_helper+0xeb8/0x4858
[   19.316754]  kasan_atomics+0x198/0x2e0
[   19.316798]  kunit_try_run_case+0x170/0x3f0
[   19.316846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.316900]  kthread+0x328/0x630
[   19.316945]  ret_from_fork+0x10/0x20
[   19.316992] 
[   19.317013] Allocated by task 265:
[   19.317041]  kasan_save_stack+0x3c/0x68
[   19.317096]  kasan_save_track+0x20/0x40
[   19.317571]  kasan_save_alloc_info+0x40/0x58
[   19.317628]  __kasan_kmalloc+0xd4/0xd8
[   19.317670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.317750]  kasan_atomics+0xb8/0x2e0
[   19.317828]  kunit_try_run_case+0x170/0x3f0
[   19.317874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.317921]  kthread+0x328/0x630
[   19.317957]  ret_from_fork+0x10/0x20
[   19.318097] 
[   19.318187] The buggy address belongs to the object at fff00000c595e380
[   19.318187]  which belongs to the cache kmalloc-64 of size 64
[   19.318329] The buggy address is located 0 bytes to the right of
[   19.318329]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.318443] 
[   19.318641] The buggy address belongs to the physical page:
[   19.318962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.319057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.319109] page_type: f5(slab)
[   19.319240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.319388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.319529] page dumped because: kasan: bad access detected
[   19.319672] 
[   19.319739] Memory state around the buggy address:
[   19.319950]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.320023]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.320226] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.320325]                                      ^
[   19.320364]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.320422]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.320469] ==================================================================
[   19.381596] ==================================================================
[   19.381753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.381808] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.381859] 
[   19.381910] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.382031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.382089] Hardware name: linux,dummy-virt (DT)
[   19.382123] Call trace:
[   19.382174]  show_stack+0x20/0x38 (C)
[   19.382254]  dump_stack_lvl+0x8c/0xd0
[   19.382320]  print_report+0x118/0x5d0
[   19.382386]  kasan_report+0xdc/0x128
[   19.382449]  kasan_check_range+0x100/0x1a8
[   19.382499]  __kasan_check_write+0x20/0x30
[   19.382544]  kasan_atomics_helper+0x1414/0x4858
[   19.382620]  kasan_atomics+0x198/0x2e0
[   19.382667]  kunit_try_run_case+0x170/0x3f0
[   19.382819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.382876]  kthread+0x328/0x630
[   19.382919]  ret_from_fork+0x10/0x20
[   19.382993] 
[   19.383032] Allocated by task 265:
[   19.383078]  kasan_save_stack+0x3c/0x68
[   19.383121]  kasan_save_track+0x20/0x40
[   19.383180]  kasan_save_alloc_info+0x40/0x58
[   19.383254]  __kasan_kmalloc+0xd4/0xd8
[   19.383350]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.383436]  kasan_atomics+0xb8/0x2e0
[   19.383558]  kunit_try_run_case+0x170/0x3f0
[   19.383637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.383832]  kthread+0x328/0x630
[   19.383895]  ret_from_fork+0x10/0x20
[   19.383934] 
[   19.383966] The buggy address belongs to the object at fff00000c595e380
[   19.383966]  which belongs to the cache kmalloc-64 of size 64
[   19.384034] The buggy address is located 0 bytes to the right of
[   19.384034]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.384103] 
[   19.384124] The buggy address belongs to the physical page:
[   19.384157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.384213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.384445] page_type: f5(slab)
[   19.384534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.384644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.384838] page dumped because: kasan: bad access detected
[   19.384906] 
[   19.385005] Memory state around the buggy address:
[   19.385307]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.385400]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.385519] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.385673]                                      ^
[   19.385797]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.385861]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.385900] ==================================================================
[   19.351200] ==================================================================
[   19.351305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.351406] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.351550] 
[   19.351617] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.351758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.351810] Hardware name: linux,dummy-virt (DT)
[   19.351843] Call trace:
[   19.351868]  show_stack+0x20/0x38 (C)
[   19.351925]  dump_stack_lvl+0x8c/0xd0
[   19.351973]  print_report+0x118/0x5d0
[   19.352340]  kasan_report+0xdc/0x128
[   19.352445]  kasan_check_range+0x100/0x1a8
[   19.352544]  __kasan_check_write+0x20/0x30
[   19.352653]  kasan_atomics_helper+0x1128/0x4858
[   19.352938]  kasan_atomics+0x198/0x2e0
[   19.353054]  kunit_try_run_case+0x170/0x3f0
[   19.353142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.353250]  kthread+0x328/0x630
[   19.353352]  ret_from_fork+0x10/0x20
[   19.353504] 
[   19.353568] Allocated by task 265:
[   19.353599]  kasan_save_stack+0x3c/0x68
[   19.353640]  kasan_save_track+0x20/0x40
[   19.353680]  kasan_save_alloc_info+0x40/0x58
[   19.353738]  __kasan_kmalloc+0xd4/0xd8
[   19.353777]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.353824]  kasan_atomics+0xb8/0x2e0
[   19.353881]  kunit_try_run_case+0x170/0x3f0
[   19.353921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.353967]  kthread+0x328/0x630
[   19.354004]  ret_from_fork+0x10/0x20
[   19.354042] 
[   19.354071] The buggy address belongs to the object at fff00000c595e380
[   19.354071]  which belongs to the cache kmalloc-64 of size 64
[   19.354142] The buggy address is located 0 bytes to the right of
[   19.354142]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.354219] 
[   19.354249] The buggy address belongs to the physical page:
[   19.354284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.354349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.354408] page_type: f5(slab)
[   19.354457] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.354510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.354556] page dumped because: kasan: bad access detected
[   19.354591] 
[   19.354611] Memory state around the buggy address:
[   19.354644]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.354699]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.354756] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.354798]                                      ^
[   19.354833]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.354878]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.354919] ==================================================================
[   19.290684] ==================================================================
[   19.290827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.291066] Read of size 4 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.291134] 
[   19.291183] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.291271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.291580] Hardware name: linux,dummy-virt (DT)
[   19.291677] Call trace:
[   19.291757]  show_stack+0x20/0x38 (C)
[   19.291829]  dump_stack_lvl+0x8c/0xd0
[   19.291949]  print_report+0x118/0x5d0
[   19.292112]  kasan_report+0xdc/0x128
[   19.292208]  __asan_report_load4_noabort+0x20/0x30
[   19.292310]  kasan_atomics_helper+0x3e04/0x4858
[   19.292391]  kasan_atomics+0x198/0x2e0
[   19.292447]  kunit_try_run_case+0x170/0x3f0
[   19.292503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.292813]  kthread+0x328/0x630
[   19.292905]  ret_from_fork+0x10/0x20
[   19.293062] 
[   19.293121] Allocated by task 265:
[   19.293197]  kasan_save_stack+0x3c/0x68
[   19.293342]  kasan_save_track+0x20/0x40
[   19.293529]  kasan_save_alloc_info+0x40/0x58
[   19.293646]  __kasan_kmalloc+0xd4/0xd8
[   19.293783]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.293829]  kasan_atomics+0xb8/0x2e0
[   19.293878]  kunit_try_run_case+0x170/0x3f0
[   19.293941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.293987]  kthread+0x328/0x630
[   19.294032]  ret_from_fork+0x10/0x20
[   19.294078] 
[   19.294114] The buggy address belongs to the object at fff00000c595e380
[   19.294114]  which belongs to the cache kmalloc-64 of size 64
[   19.294179] The buggy address is located 0 bytes to the right of
[   19.294179]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.294248] 
[   19.294270] The buggy address belongs to the physical page:
[   19.294305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.294361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.294413] page_type: f5(slab)
[   19.294452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.294518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.294562] page dumped because: kasan: bad access detected
[   19.294595] 
[   19.294614] Memory state around the buggy address:
[   19.294646]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.294692]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.294749] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.294791]                                      ^
[   19.294826]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.294871]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.294912] ==================================================================
[   19.295736] ==================================================================
[   19.295818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.296051] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.296147] 
[   19.296183] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.296269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.296298] Hardware name: linux,dummy-virt (DT)
[   19.296331] Call trace:
[   19.296353]  show_stack+0x20/0x38 (C)
[   19.296402]  dump_stack_lvl+0x8c/0xd0
[   19.296450]  print_report+0x118/0x5d0
[   19.296498]  kasan_report+0xdc/0x128
[   19.296762]  kasan_check_range+0x100/0x1a8
[   19.296824]  __kasan_check_read+0x20/0x30
[   19.296885]  kasan_atomics_helper+0xdd4/0x4858
[   19.296968]  kasan_atomics+0x198/0x2e0
[   19.297016]  kunit_try_run_case+0x170/0x3f0
[   19.297079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.297164]  kthread+0x328/0x630
[   19.297271]  ret_from_fork+0x10/0x20
[   19.297501] 
[   19.297590] Allocated by task 265:
[   19.297625]  kasan_save_stack+0x3c/0x68
[   19.297672]  kasan_save_track+0x20/0x40
[   19.297763]  kasan_save_alloc_info+0x40/0x58
[   19.297808]  __kasan_kmalloc+0xd4/0xd8
[   19.297875]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.297939]  kasan_atomics+0xb8/0x2e0
[   19.297977]  kunit_try_run_case+0x170/0x3f0
[   19.298036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.298112]  kthread+0x328/0x630
[   19.298148]  ret_from_fork+0x10/0x20
[   19.298187] 
[   19.298207] The buggy address belongs to the object at fff00000c595e380
[   19.298207]  which belongs to the cache kmalloc-64 of size 64
[   19.298450] The buggy address is located 0 bytes to the right of
[   19.298450]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.298529] 
[   19.298550] The buggy address belongs to the physical page:
[   19.298585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.298833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.299275] page_type: f5(slab)
[   19.299447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.299557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.299602] page dumped because: kasan: bad access detected
[   19.299637] 
[   19.299657] Memory state around the buggy address:
[   19.299758]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.299806]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.299852] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.299893]                                      ^
[   19.299928]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.299972]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.300013] ==================================================================
[   19.300362] ==================================================================
[   19.300414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.300464] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.300515] 
[   19.300546] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.300627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.300656] Hardware name: linux,dummy-virt (DT)
[   19.300689] Call trace:
[   19.300726]  show_stack+0x20/0x38 (C)
[   19.300775]  dump_stack_lvl+0x8c/0xd0
[   19.300828]  print_report+0x118/0x5d0
[   19.300876]  kasan_report+0xdc/0x128
[   19.300928]  __asan_report_load8_noabort+0x20/0x30
[   19.301107]  kasan_atomics_helper+0x3f58/0x4858
[   19.301235]  kasan_atomics+0x198/0x2e0
[   19.301321]  kunit_try_run_case+0x170/0x3f0
[   19.301770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.301901]  kthread+0x328/0x630
[   19.301996]  ret_from_fork+0x10/0x20
[   19.302259] 
[   19.302388] Allocated by task 265:
[   19.302577]  kasan_save_stack+0x3c/0x68
[   19.302665]  kasan_save_track+0x20/0x40
[   19.302811]  kasan_save_alloc_info+0x40/0x58
[   19.302891]  __kasan_kmalloc+0xd4/0xd8
[   19.302930]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.302972]  kasan_atomics+0xb8/0x2e0
[   19.303346]  kunit_try_run_case+0x170/0x3f0
[   19.303784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.303985]  kthread+0x328/0x630
[   19.304065]  ret_from_fork+0x10/0x20
[   19.304251] 
[   19.304291] The buggy address belongs to the object at fff00000c595e380
[   19.304291]  which belongs to the cache kmalloc-64 of size 64
[   19.304371] The buggy address is located 0 bytes to the right of
[   19.304371]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.304447] 
[   19.304470] The buggy address belongs to the physical page:
[   19.304560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.304635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.304730] page_type: f5(slab)
[   19.304772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.304840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.304896] page dumped because: kasan: bad access detected
[   19.305113] 
[   19.305209] Memory state around the buggy address:
[   19.305296]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.305344]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.305390] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.305431]                                      ^
[   19.305466]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.305510]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.305695] ==================================================================
[   19.404184] ==================================================================
[   19.404276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.404454] Read of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.404509] 
[   19.404539] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.404620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.404650] Hardware name: linux,dummy-virt (DT)
[   19.404680] Call trace:
[   19.404704]  show_stack+0x20/0x38 (C)
[   19.404765]  dump_stack_lvl+0x8c/0xd0
[   19.404814]  print_report+0x118/0x5d0
[   19.405046]  kasan_report+0xdc/0x128
[   19.405133]  __asan_report_load8_noabort+0x20/0x30
[   19.405217]  kasan_atomics_helper+0x3db0/0x4858
[   19.405268]  kasan_atomics+0x198/0x2e0
[   19.405362]  kunit_try_run_case+0x170/0x3f0
[   19.405411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.405466]  kthread+0x328/0x630
[   19.405510]  ret_from_fork+0x10/0x20
[   19.405558] 
[   19.405578] Allocated by task 265:
[   19.405617]  kasan_save_stack+0x3c/0x68
[   19.405659]  kasan_save_track+0x20/0x40
[   19.405703]  kasan_save_alloc_info+0x40/0x58
[   19.405756]  __kasan_kmalloc+0xd4/0xd8
[   19.405795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.405836]  kasan_atomics+0xb8/0x2e0
[   19.405873]  kunit_try_run_case+0x170/0x3f0
[   19.405913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.405959]  kthread+0x328/0x630
[   19.405992]  ret_from_fork+0x10/0x20
[   19.406029] 
[   19.406049] The buggy address belongs to the object at fff00000c595e380
[   19.406049]  which belongs to the cache kmalloc-64 of size 64
[   19.406110] The buggy address is located 0 bytes to the right of
[   19.406110]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.406179] 
[   19.406210] The buggy address belongs to the physical page:
[   19.406242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.406308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.406361] page_type: f5(slab)
[   19.406407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.406467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.406512] page dumped because: kasan: bad access detected
[   19.406550] 
[   19.406569] Memory state around the buggy address:
[   19.406602]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.406652]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.406698] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.406749]                                      ^
[   19.406784]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.406827]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.406867] ==================================================================
[   19.339017] ==================================================================
[   19.339066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.339114] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.339165] 
[   19.339197] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.339755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.339788] Hardware name: linux,dummy-virt (DT)
[   19.339821] Call trace:
[   19.339846]  show_stack+0x20/0x38 (C)
[   19.339896]  dump_stack_lvl+0x8c/0xd0
[   19.339946]  print_report+0x118/0x5d0
[   19.339992]  kasan_report+0xdc/0x128
[   19.340041]  kasan_check_range+0x100/0x1a8
[   19.340091]  __kasan_check_write+0x20/0x30
[   19.340137]  kasan_atomics_helper+0x1058/0x4858
[   19.340187]  kasan_atomics+0x198/0x2e0
[   19.340232]  kunit_try_run_case+0x170/0x3f0
[   19.340281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.340335]  kthread+0x328/0x630
[   19.340376]  ret_from_fork+0x10/0x20
[   19.340424] 
[   19.340445] Allocated by task 265:
[   19.340473]  kasan_save_stack+0x3c/0x68
[   19.340516]  kasan_save_track+0x20/0x40
[   19.340556]  kasan_save_alloc_info+0x40/0x58
[   19.340597]  __kasan_kmalloc+0xd4/0xd8
[   19.340639]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.340683]  kasan_atomics+0xb8/0x2e0
[   19.340732]  kunit_try_run_case+0x170/0x3f0
[   19.341140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.341200]  kthread+0x328/0x630
[   19.341393]  ret_from_fork+0x10/0x20
[   19.341504] 
[   19.341527] The buggy address belongs to the object at fff00000c595e380
[   19.341527]  which belongs to the cache kmalloc-64 of size 64
[   19.341592] The buggy address is located 0 bytes to the right of
[   19.341592]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.341660] 
[   19.341696] The buggy address belongs to the physical page:
[   19.341738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.341808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.341868] page_type: f5(slab)
[   19.341921] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.341976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.342020] page dumped because: kasan: bad access detected
[   19.342076] 
[   19.342105] Memory state around the buggy address:
[   19.342147]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.342194]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.342240] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.342282]                                      ^
[   19.342325]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.342385]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.342425] ==================================================================
[   19.406987] ==================================================================
[   19.407029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.407408] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.407463] 
[   19.407507] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.407601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.407629] Hardware name: linux,dummy-virt (DT)
[   19.407662] Call trace:
[   19.407685]  show_stack+0x20/0x38 (C)
[   19.407765]  dump_stack_lvl+0x8c/0xd0
[   19.407922]  print_report+0x118/0x5d0
[   19.408261]  kasan_report+0xdc/0x128
[   19.408400]  kasan_check_range+0x100/0x1a8
[   19.408508]  __kasan_check_write+0x20/0x30
[   19.408615]  kasan_atomics_helper+0x1644/0x4858
[   19.408742]  kasan_atomics+0x198/0x2e0
[   19.408895]  kunit_try_run_case+0x170/0x3f0
[   19.408986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.409128]  kthread+0x328/0x630
[   19.409237]  ret_from_fork+0x10/0x20
[   19.409413] 
[   19.409480] Allocated by task 265:
[   19.409520]  kasan_save_stack+0x3c/0x68
[   19.409561]  kasan_save_track+0x20/0x40
[   19.410226]  kasan_save_alloc_info+0x40/0x58
[   19.410276]  __kasan_kmalloc+0xd4/0xd8
[   19.410317]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.410359]  kasan_atomics+0xb8/0x2e0
[   19.410395]  kunit_try_run_case+0x170/0x3f0
[   19.410436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.410482]  kthread+0x328/0x630
[   19.410515]  ret_from_fork+0x10/0x20
[   19.410553] 
[   19.410574] The buggy address belongs to the object at fff00000c595e380
[   19.410574]  which belongs to the cache kmalloc-64 of size 64
[   19.410636] The buggy address is located 0 bytes to the right of
[   19.410636]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.410705] 
[   19.410763] The buggy address belongs to the physical page:
[   19.410837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.410945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.410997] page_type: f5(slab)
[   19.411042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.412089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.412648] page dumped because: kasan: bad access detected
[   19.412977] 
[   19.413028] Memory state around the buggy address:
[   19.413069]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.413118]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.413172] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.413231]                                      ^
[   19.413277]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.413332]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.413374] ==================================================================
[   19.391703] ==================================================================
[   19.392009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.392059] Write of size 8 at addr fff00000c595e3b0 by task kunit_try_catch/265
[   19.392345] 
[   19.392381] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.392493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.392523] Hardware name: linux,dummy-virt (DT)
[   19.392566] Call trace:
[   19.392592]  show_stack+0x20/0x38 (C)
[   19.392649]  dump_stack_lvl+0x8c/0xd0
[   19.392700]  print_report+0x118/0x5d0
[   19.392758]  kasan_report+0xdc/0x128
[   19.392805]  kasan_check_range+0x100/0x1a8
[   19.392861]  __kasan_check_write+0x20/0x30
[   19.392909]  kasan_atomics_helper+0x14e4/0x4858
[   19.392963]  kasan_atomics+0x198/0x2e0
[   19.393009]  kunit_try_run_case+0x170/0x3f0
[   19.393057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.393112]  kthread+0x328/0x630
[   19.393154]  ret_from_fork+0x10/0x20
[   19.393212] 
[   19.393241] Allocated by task 265:
[   19.393278]  kasan_save_stack+0x3c/0x68
[   19.393336]  kasan_save_track+0x20/0x40
[   19.393376]  kasan_save_alloc_info+0x40/0x58
[   19.393420]  __kasan_kmalloc+0xd4/0xd8
[   19.393458]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.393500]  kasan_atomics+0xb8/0x2e0
[   19.393538]  kunit_try_run_case+0x170/0x3f0
[   19.393578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.393623]  kthread+0x328/0x630
[   19.393663]  ret_from_fork+0x10/0x20
[   19.393702] 
[   19.393731] The buggy address belongs to the object at fff00000c595e380
[   19.393731]  which belongs to the cache kmalloc-64 of size 64
[   19.393792] The buggy address is located 0 bytes to the right of
[   19.393792]  allocated 48-byte region [fff00000c595e380, fff00000c595e3b0)
[   19.393860] 
[   19.393882] The buggy address belongs to the physical page:
[   19.393916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595e
[   19.393971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.394020] page_type: f5(slab)
[   19.394059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.394136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.394182] page dumped because: kasan: bad access detected
[   19.394216] 
[   19.394235] Memory state around the buggy address:
[   19.394269]  fff00000c595e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.394316]  fff00000c595e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.394362] >fff00000c595e380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.394404]                                      ^
[   19.394438]  fff00000c595e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.394484]  fff00000c595e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.394522] ==================================================================

[   15.669639] ==================================================================
[   15.669960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   15.671952] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.672457] 
[   15.672555] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.672606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.672621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.672645] Call Trace:
[   15.672663]  <TASK>
[   15.672680]  dump_stack_lvl+0x73/0xb0
[   15.672714]  print_report+0xd1/0x610
[   15.672739]  ? __virt_addr_valid+0x1db/0x2d0
[   15.672779]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.672805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.672833]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.672857]  kasan_report+0x141/0x180
[   15.672881]  ? kasan_atomics_helper+0x4a1c/0x5450
[   15.672910]  __asan_report_load4_noabort+0x18/0x20
[   15.672937]  kasan_atomics_helper+0x4a1c/0x5450
[   15.672962]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.672987]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.673014]  ? kasan_atomics+0x152/0x310
[   15.673043]  kasan_atomics+0x1dc/0x310
[   15.673066]  ? __pfx_kasan_atomics+0x10/0x10
[   15.673093]  ? __pfx_read_tsc+0x10/0x10
[   15.673116]  ? ktime_get_ts64+0x86/0x230
[   15.673143]  kunit_try_run_case+0x1a5/0x480
[   15.673171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.673196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.673224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.673250]  ? __kthread_parkme+0x82/0x180
[   15.673273]  ? preempt_count_sub+0x50/0x80
[   15.673299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.673327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.673354]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.673381]  kthread+0x337/0x6f0
[   15.673402]  ? trace_preempt_on+0x20/0xc0
[   15.673427]  ? __pfx_kthread+0x10/0x10
[   15.673450]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.673473]  ? calculate_sigpending+0x7b/0xa0
[   15.673500]  ? __pfx_kthread+0x10/0x10
[   15.673523]  ret_from_fork+0x116/0x1d0
[   15.673544]  ? __pfx_kthread+0x10/0x10
[   15.673566]  ret_from_fork_asm+0x1a/0x30
[   15.673600]  </TASK>
[   15.673611] 
[   15.687650] Allocated by task 282:
[   15.687872]  kasan_save_stack+0x45/0x70
[   15.688085]  kasan_save_track+0x18/0x40
[   15.688270]  kasan_save_alloc_info+0x3b/0x50
[   15.688458]  __kasan_kmalloc+0xb7/0xc0
[   15.689008]  __kmalloc_cache_noprof+0x189/0x420
[   15.689338]  kasan_atomics+0x95/0x310
[   15.689606]  kunit_try_run_case+0x1a5/0x480
[   15.689900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.690241]  kthread+0x337/0x6f0
[   15.690483]  ret_from_fork+0x116/0x1d0
[   15.690705]  ret_from_fork_asm+0x1a/0x30
[   15.691010] 
[   15.691276] The buggy address belongs to the object at ffff888103082e00
[   15.691276]  which belongs to the cache kmalloc-64 of size 64
[   15.691916] The buggy address is located 0 bytes to the right of
[   15.691916]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.692642] 
[   15.692781] The buggy address belongs to the physical page:
[   15.693168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.693659] flags: 0x200000000000000(node=0|zone=2)
[   15.693908] page_type: f5(slab)
[   15.694228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.694713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.695059] page dumped because: kasan: bad access detected
[   15.695401] 
[   15.695640] Memory state around the buggy address:
[   15.695918]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.696261]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.696769] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.697162]                                      ^
[   15.697408]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698010]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.698403] ==================================================================
[   16.465927] ==================================================================
[   16.466270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   16.466630] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.467008] 
[   16.467113] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.467159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.467484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.467584] Call Trace:
[   16.467605]  <TASK>
[   16.467635]  dump_stack_lvl+0x73/0xb0
[   16.467682]  print_report+0xd1/0x610
[   16.467721]  ? __virt_addr_valid+0x1db/0x2d0
[   16.467787]  ? kasan_atomics_helper+0x218a/0x5450
[   16.467970]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.468080]  ? kasan_atomics_helper+0x218a/0x5450
[   16.468166]  kasan_report+0x141/0x180
[   16.468286]  ? kasan_atomics_helper+0x218a/0x5450
[   16.468628]  kasan_check_range+0x10c/0x1c0
[   16.468671]  __kasan_check_write+0x18/0x20
[   16.468707]  kasan_atomics_helper+0x218a/0x5450
[   16.468733]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.468782]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.468811]  ? kasan_atomics+0x152/0x310
[   16.468852]  kasan_atomics+0x1dc/0x310
[   16.468877]  ? __pfx_kasan_atomics+0x10/0x10
[   16.468903]  ? __pfx_read_tsc+0x10/0x10
[   16.468926]  ? ktime_get_ts64+0x86/0x230
[   16.468953]  kunit_try_run_case+0x1a5/0x480
[   16.468979]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.469004]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.469031]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.469058]  ? __kthread_parkme+0x82/0x180
[   16.469081]  ? preempt_count_sub+0x50/0x80
[   16.469106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.469133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.469160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.469188]  kthread+0x337/0x6f0
[   16.469209]  ? trace_preempt_on+0x20/0xc0
[   16.469234]  ? __pfx_kthread+0x10/0x10
[   16.469256]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.469280]  ? calculate_sigpending+0x7b/0xa0
[   16.469306]  ? __pfx_kthread+0x10/0x10
[   16.469329]  ret_from_fork+0x116/0x1d0
[   16.469349]  ? __pfx_kthread+0x10/0x10
[   16.469371]  ret_from_fork_asm+0x1a/0x30
[   16.469404]  </TASK>
[   16.469416] 
[   16.480752] Allocated by task 282:
[   16.481121]  kasan_save_stack+0x45/0x70
[   16.481344]  kasan_save_track+0x18/0x40
[   16.481713]  kasan_save_alloc_info+0x3b/0x50
[   16.481963]  __kasan_kmalloc+0xb7/0xc0
[   16.482268]  __kmalloc_cache_noprof+0x189/0x420
[   16.482635]  kasan_atomics+0x95/0x310
[   16.482922]  kunit_try_run_case+0x1a5/0x480
[   16.483149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.483402]  kthread+0x337/0x6f0
[   16.483753]  ret_from_fork+0x116/0x1d0
[   16.484024]  ret_from_fork_asm+0x1a/0x30
[   16.484296] 
[   16.484541] The buggy address belongs to the object at ffff888103082e00
[   16.484541]  which belongs to the cache kmalloc-64 of size 64
[   16.485207] The buggy address is located 0 bytes to the right of
[   16.485207]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.485891] 
[   16.486123] The buggy address belongs to the physical page:
[   16.486372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.486987] flags: 0x200000000000000(node=0|zone=2)
[   16.487212] page_type: f5(slab)
[   16.487599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.488062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.488371] page dumped because: kasan: bad access detected
[   16.488805] 
[   16.488965] Memory state around the buggy address:
[   16.489342]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.489834]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.490171] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.490644]                                      ^
[   16.490984]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.491277]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.491736] ==================================================================
[   16.444459] ==================================================================
[   16.445214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   16.445659] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.445996] 
[   16.446361] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.446428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.446454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.446477] Call Trace:
[   16.446494]  <TASK>
[   16.446511]  dump_stack_lvl+0x73/0xb0
[   16.446543]  print_report+0xd1/0x610
[   16.446568]  ? __virt_addr_valid+0x1db/0x2d0
[   16.446593]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.446617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.446643]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.446668]  kasan_report+0x141/0x180
[   16.446692]  ? kasan_atomics_helper+0x4fb2/0x5450
[   16.446721]  __asan_report_load8_noabort+0x18/0x20
[   16.446749]  kasan_atomics_helper+0x4fb2/0x5450
[   16.446784]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.446810]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.446837]  ? kasan_atomics+0x152/0x310
[   16.446865]  kasan_atomics+0x1dc/0x310
[   16.446890]  ? __pfx_kasan_atomics+0x10/0x10
[   16.446915]  ? __pfx_read_tsc+0x10/0x10
[   16.446938]  ? ktime_get_ts64+0x86/0x230
[   16.446965]  kunit_try_run_case+0x1a5/0x480
[   16.446992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.447018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.447044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.447070]  ? __kthread_parkme+0x82/0x180
[   16.447092]  ? preempt_count_sub+0x50/0x80
[   16.447118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.447145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.447172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.447204]  kthread+0x337/0x6f0
[   16.447225]  ? trace_preempt_on+0x20/0xc0
[   16.447250]  ? __pfx_kthread+0x10/0x10
[   16.447273]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.447297]  ? calculate_sigpending+0x7b/0xa0
[   16.447323]  ? __pfx_kthread+0x10/0x10
[   16.447346]  ret_from_fork+0x116/0x1d0
[   16.447366]  ? __pfx_kthread+0x10/0x10
[   16.447388]  ret_from_fork_asm+0x1a/0x30
[   16.447421]  </TASK>
[   16.447431] 
[   16.456113] Allocated by task 282:
[   16.456252]  kasan_save_stack+0x45/0x70
[   16.456439]  kasan_save_track+0x18/0x40
[   16.456603]  kasan_save_alloc_info+0x3b/0x50
[   16.456837]  __kasan_kmalloc+0xb7/0xc0
[   16.456976]  __kmalloc_cache_noprof+0x189/0x420
[   16.457133]  kasan_atomics+0x95/0x310
[   16.457269]  kunit_try_run_case+0x1a5/0x480
[   16.457464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.457760]  kthread+0x337/0x6f0
[   16.457890]  ret_from_fork+0x116/0x1d0
[   16.458025]  ret_from_fork_asm+0x1a/0x30
[   16.458216] 
[   16.458313] The buggy address belongs to the object at ffff888103082e00
[   16.458313]  which belongs to the cache kmalloc-64 of size 64
[   16.460090] The buggy address is located 0 bytes to the right of
[   16.460090]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.460837] 
[   16.460946] The buggy address belongs to the physical page:
[   16.461232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.461489] flags: 0x200000000000000(node=0|zone=2)
[   16.461887] page_type: f5(slab)
[   16.462128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.462362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.462797] page dumped because: kasan: bad access detected
[   16.462985] 
[   16.463057] Memory state around the buggy address:
[   16.463216]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.463429]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.463784] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.464120]                                      ^
[   16.464555]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.465151]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.465375] ==================================================================
[   16.121475] ==================================================================
[   16.121862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   16.122187] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.122537] 
[   16.122646] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.122690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.122704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.122726] Call Trace:
[   16.122739]  <TASK>
[   16.122753]  dump_stack_lvl+0x73/0xb0
[   16.122794]  print_report+0xd1/0x610
[   16.122818]  ? __virt_addr_valid+0x1db/0x2d0
[   16.122843]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.122866]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.122892]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.122917]  kasan_report+0x141/0x180
[   16.122941]  ? kasan_atomics_helper+0x1a7f/0x5450
[   16.122969]  kasan_check_range+0x10c/0x1c0
[   16.122996]  __kasan_check_write+0x18/0x20
[   16.123018]  kasan_atomics_helper+0x1a7f/0x5450
[   16.123043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.123069]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.123098]  ? kasan_atomics+0x152/0x310
[   16.123127]  kasan_atomics+0x1dc/0x310
[   16.123152]  ? __pfx_kasan_atomics+0x10/0x10
[   16.123185]  ? __pfx_read_tsc+0x10/0x10
[   16.123208]  ? ktime_get_ts64+0x86/0x230
[   16.123234]  kunit_try_run_case+0x1a5/0x480
[   16.123260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.123285]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.123312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.123338]  ? __kthread_parkme+0x82/0x180
[   16.123361]  ? preempt_count_sub+0x50/0x80
[   16.123387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.123414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.123440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.123467]  kthread+0x337/0x6f0
[   16.123489]  ? trace_preempt_on+0x20/0xc0
[   16.123514]  ? __pfx_kthread+0x10/0x10
[   16.123536]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.123559]  ? calculate_sigpending+0x7b/0xa0
[   16.123585]  ? __pfx_kthread+0x10/0x10
[   16.123609]  ret_from_fork+0x116/0x1d0
[   16.123629]  ? __pfx_kthread+0x10/0x10
[   16.123651]  ret_from_fork_asm+0x1a/0x30
[   16.123683]  </TASK>
[   16.123694] 
[   16.132411] Allocated by task 282:
[   16.132607]  kasan_save_stack+0x45/0x70
[   16.132822]  kasan_save_track+0x18/0x40
[   16.132986]  kasan_save_alloc_info+0x3b/0x50
[   16.133157]  __kasan_kmalloc+0xb7/0xc0
[   16.133330]  __kmalloc_cache_noprof+0x189/0x420
[   16.133528]  kasan_atomics+0x95/0x310
[   16.133695]  kunit_try_run_case+0x1a5/0x480
[   16.134751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.135576]  kthread+0x337/0x6f0
[   16.136168]  ret_from_fork+0x116/0x1d0
[   16.136772]  ret_from_fork_asm+0x1a/0x30
[   16.137364] 
[   16.137796] The buggy address belongs to the object at ffff888103082e00
[   16.137796]  which belongs to the cache kmalloc-64 of size 64
[   16.139485] The buggy address is located 0 bytes to the right of
[   16.139485]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.141172] 
[   16.141531] The buggy address belongs to the physical page:
[   16.142234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.143182] flags: 0x200000000000000(node=0|zone=2)
[   16.143884] page_type: f5(slab)
[   16.144361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.145300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.146236] page dumped because: kasan: bad access detected
[   16.146649] 
[   16.146856] Memory state around the buggy address:
[   16.147025]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.147257]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.147541] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.148400]                                      ^
[   16.148933]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.149667]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.150356] ==================================================================
[   15.564656] ==================================================================
[   15.565337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   15.566010] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.566302] 
[   15.566388] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.566459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.566473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.566495] Call Trace:
[   15.566512]  <TASK>
[   15.566529]  dump_stack_lvl+0x73/0xb0
[   15.566560]  print_report+0xd1/0x610
[   15.566585]  ? __virt_addr_valid+0x1db/0x2d0
[   15.566611]  ? kasan_atomics_helper+0xf10/0x5450
[   15.566635]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.566660]  ? kasan_atomics_helper+0xf10/0x5450
[   15.566685]  kasan_report+0x141/0x180
[   15.566709]  ? kasan_atomics_helper+0xf10/0x5450
[   15.566737]  kasan_check_range+0x10c/0x1c0
[   15.566772]  __kasan_check_write+0x18/0x20
[   15.566794]  kasan_atomics_helper+0xf10/0x5450
[   15.566819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.566843]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.566872]  ? kasan_atomics+0x152/0x310
[   15.566899]  kasan_atomics+0x1dc/0x310
[   15.566924]  ? __pfx_kasan_atomics+0x10/0x10
[   15.566950]  ? __pfx_read_tsc+0x10/0x10
[   15.566973]  ? ktime_get_ts64+0x86/0x230
[   15.567000]  kunit_try_run_case+0x1a5/0x480
[   15.567026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.567052]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.567080]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.567106]  ? __kthread_parkme+0x82/0x180
[   15.567128]  ? preempt_count_sub+0x50/0x80
[   15.567155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.567185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.567212]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.567241]  kthread+0x337/0x6f0
[   15.567262]  ? trace_preempt_on+0x20/0xc0
[   15.567288]  ? __pfx_kthread+0x10/0x10
[   15.567311]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.567334]  ? calculate_sigpending+0x7b/0xa0
[   15.567363]  ? __pfx_kthread+0x10/0x10
[   15.567389]  ret_from_fork+0x116/0x1d0
[   15.567410]  ? __pfx_kthread+0x10/0x10
[   15.567452]  ret_from_fork_asm+0x1a/0x30
[   15.567485]  </TASK>
[   15.567496] 
[   15.579665] Allocated by task 282:
[   15.579995]  kasan_save_stack+0x45/0x70
[   15.580353]  kasan_save_track+0x18/0x40
[   15.580722]  kasan_save_alloc_info+0x3b/0x50
[   15.580941]  __kasan_kmalloc+0xb7/0xc0
[   15.581077]  __kmalloc_cache_noprof+0x189/0x420
[   15.581236]  kasan_atomics+0x95/0x310
[   15.581372]  kunit_try_run_case+0x1a5/0x480
[   15.581730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.582206]  kthread+0x337/0x6f0
[   15.582523]  ret_from_fork+0x116/0x1d0
[   15.582863]  ret_from_fork_asm+0x1a/0x30
[   15.583237] 
[   15.583393] The buggy address belongs to the object at ffff888103082e00
[   15.583393]  which belongs to the cache kmalloc-64 of size 64
[   15.584464] The buggy address is located 0 bytes to the right of
[   15.584464]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.584927] 
[   15.585001] The buggy address belongs to the physical page:
[   15.585178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.585445] flags: 0x200000000000000(node=0|zone=2)
[   15.585871] page_type: f5(slab)
[   15.586158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.586838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.587508] page dumped because: kasan: bad access detected
[   15.587984] 
[   15.588142] Memory state around the buggy address:
[   15.588576]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.589192]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.589815] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.590091]                                      ^
[   15.590250]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.590561]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.591165] ==================================================================
[   15.536398] ==================================================================
[   15.537087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   15.537726] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.538348] 
[   15.538531] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.538578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.538590] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.538612] Call Trace:
[   15.538627]  <TASK>
[   15.538643]  dump_stack_lvl+0x73/0xb0
[   15.538674]  print_report+0xd1/0x610
[   15.538699]  ? __virt_addr_valid+0x1db/0x2d0
[   15.538724]  ? kasan_atomics_helper+0xe78/0x5450
[   15.538749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.538792]  ? kasan_atomics_helper+0xe78/0x5450
[   15.538816]  kasan_report+0x141/0x180
[   15.538841]  ? kasan_atomics_helper+0xe78/0x5450
[   15.538870]  kasan_check_range+0x10c/0x1c0
[   15.538896]  __kasan_check_write+0x18/0x20
[   15.538917]  kasan_atomics_helper+0xe78/0x5450
[   15.538942]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.538967]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.538995]  ? kasan_atomics+0x152/0x310
[   15.539024]  kasan_atomics+0x1dc/0x310
[   15.539048]  ? __pfx_kasan_atomics+0x10/0x10
[   15.539074]  ? __pfx_read_tsc+0x10/0x10
[   15.539096]  ? ktime_get_ts64+0x86/0x230
[   15.539124]  kunit_try_run_case+0x1a5/0x480
[   15.539151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.539177]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.539211]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.539238]  ? __kthread_parkme+0x82/0x180
[   15.539261]  ? preempt_count_sub+0x50/0x80
[   15.539287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.539314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.539341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.539370]  kthread+0x337/0x6f0
[   15.539392]  ? trace_preempt_on+0x20/0xc0
[   15.539416]  ? __pfx_kthread+0x10/0x10
[   15.539457]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.539480]  ? calculate_sigpending+0x7b/0xa0
[   15.539507]  ? __pfx_kthread+0x10/0x10
[   15.539531]  ret_from_fork+0x116/0x1d0
[   15.539551]  ? __pfx_kthread+0x10/0x10
[   15.539573]  ret_from_fork_asm+0x1a/0x30
[   15.539605]  </TASK>
[   15.539616] 
[   15.552139] Allocated by task 282:
[   15.552482]  kasan_save_stack+0x45/0x70
[   15.552817]  kasan_save_track+0x18/0x40
[   15.552959]  kasan_save_alloc_info+0x3b/0x50
[   15.553112]  __kasan_kmalloc+0xb7/0xc0
[   15.553248]  __kmalloc_cache_noprof+0x189/0x420
[   15.553410]  kasan_atomics+0x95/0x310
[   15.553769]  kunit_try_run_case+0x1a5/0x480
[   15.554132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.554616]  kthread+0x337/0x6f0
[   15.554916]  ret_from_fork+0x116/0x1d0
[   15.555262]  ret_from_fork_asm+0x1a/0x30
[   15.555632] 
[   15.555804] The buggy address belongs to the object at ffff888103082e00
[   15.555804]  which belongs to the cache kmalloc-64 of size 64
[   15.556850] The buggy address is located 0 bytes to the right of
[   15.556850]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.557292] 
[   15.557367] The buggy address belongs to the physical page:
[   15.557812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.558485] flags: 0x200000000000000(node=0|zone=2)
[   15.558914] page_type: f5(slab)
[   15.559203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.559807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.560039] page dumped because: kasan: bad access detected
[   15.560214] 
[   15.560286] Memory state around the buggy address:
[   15.560481]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.561089]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.561705] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.562301]                                      ^
[   15.562740]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.563348]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.563959] ==================================================================
[   15.593042] ==================================================================
[   15.594089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   15.594992] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.595234] 
[   15.595325] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.595373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.595386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.595411] Call Trace:
[   15.595429]  <TASK>
[   15.595446]  dump_stack_lvl+0x73/0xb0
[   15.595479]  print_report+0xd1/0x610
[   15.595504]  ? __virt_addr_valid+0x1db/0x2d0
[   15.595530]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.595553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.595578]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.595602]  kasan_report+0x141/0x180
[   15.595626]  ? kasan_atomics_helper+0xfa9/0x5450
[   15.595655]  kasan_check_range+0x10c/0x1c0
[   15.595680]  __kasan_check_write+0x18/0x20
[   15.595701]  kasan_atomics_helper+0xfa9/0x5450
[   15.595868]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.595901]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.595930]  ? kasan_atomics+0x152/0x310
[   15.595960]  kasan_atomics+0x1dc/0x310
[   15.595984]  ? __pfx_kasan_atomics+0x10/0x10
[   15.596011]  ? __pfx_read_tsc+0x10/0x10
[   15.596034]  ? ktime_get_ts64+0x86/0x230
[   15.596061]  kunit_try_run_case+0x1a5/0x480
[   15.596088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.596113]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.596140]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.596166]  ? __kthread_parkme+0x82/0x180
[   15.596188]  ? preempt_count_sub+0x50/0x80
[   15.596214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.596242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.596269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.596296]  kthread+0x337/0x6f0
[   15.596317]  ? trace_preempt_on+0x20/0xc0
[   15.596343]  ? __pfx_kthread+0x10/0x10
[   15.596365]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.596388]  ? calculate_sigpending+0x7b/0xa0
[   15.596415]  ? __pfx_kthread+0x10/0x10
[   15.596438]  ret_from_fork+0x116/0x1d0
[   15.596787]  ? __pfx_kthread+0x10/0x10
[   15.596811]  ret_from_fork_asm+0x1a/0x30
[   15.596845]  </TASK>
[   15.596856] 
[   15.609518] Allocated by task 282:
[   15.609901]  kasan_save_stack+0x45/0x70
[   15.610287]  kasan_save_track+0x18/0x40
[   15.610657]  kasan_save_alloc_info+0x3b/0x50
[   15.611069]  __kasan_kmalloc+0xb7/0xc0
[   15.611462]  __kmalloc_cache_noprof+0x189/0x420
[   15.611893]  kasan_atomics+0x95/0x310
[   15.612243]  kunit_try_run_case+0x1a5/0x480
[   15.612710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.613289]  kthread+0x337/0x6f0
[   15.613659]  ret_from_fork+0x116/0x1d0
[   15.613855]  ret_from_fork_asm+0x1a/0x30
[   15.613995] 
[   15.614069] The buggy address belongs to the object at ffff888103082e00
[   15.614069]  which belongs to the cache kmalloc-64 of size 64
[   15.614413] The buggy address is located 0 bytes to the right of
[   15.614413]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.614898] 
[   15.614982] The buggy address belongs to the physical page:
[   15.615199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.615549] flags: 0x200000000000000(node=0|zone=2)
[   15.615782] page_type: f5(slab)
[   15.615927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.616270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.616500] page dumped because: kasan: bad access detected
[   15.616731] 
[   15.616838] Memory state around the buggy address:
[   15.617091]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.617587]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.618388] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.618689]                                      ^
[   15.618932]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.619421]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.619842] ==================================================================
[   15.620542] ==================================================================
[   15.620953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   15.621530] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.622101] 
[   15.622225] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.622273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.622286] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.622308] Call Trace:
[   15.622324]  <TASK>
[   15.622340]  dump_stack_lvl+0x73/0xb0
[   15.622371]  print_report+0xd1/0x610
[   15.622395]  ? __virt_addr_valid+0x1db/0x2d0
[   15.622420]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.622653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.622684]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.622710]  kasan_report+0x141/0x180
[   15.622735]  ? kasan_atomics_helper+0x4a36/0x5450
[   15.622778]  __asan_report_load4_noabort+0x18/0x20
[   15.622806]  kasan_atomics_helper+0x4a36/0x5450
[   15.622831]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.622855]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.622885]  ? kasan_atomics+0x152/0x310
[   15.622914]  kasan_atomics+0x1dc/0x310
[   15.622938]  ? __pfx_kasan_atomics+0x10/0x10
[   15.622965]  ? __pfx_read_tsc+0x10/0x10
[   15.622987]  ? ktime_get_ts64+0x86/0x230
[   15.623014]  kunit_try_run_case+0x1a5/0x480
[   15.623042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.623068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.623094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.623120]  ? __kthread_parkme+0x82/0x180
[   15.623143]  ? preempt_count_sub+0x50/0x80
[   15.623169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.623203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.623230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.623258]  kthread+0x337/0x6f0
[   15.623279]  ? trace_preempt_on+0x20/0xc0
[   15.623304]  ? __pfx_kthread+0x10/0x10
[   15.623326]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.623350]  ? calculate_sigpending+0x7b/0xa0
[   15.623376]  ? __pfx_kthread+0x10/0x10
[   15.623400]  ret_from_fork+0x116/0x1d0
[   15.623420]  ? __pfx_kthread+0x10/0x10
[   15.623455]  ret_from_fork_asm+0x1a/0x30
[   15.623488]  </TASK>
[   15.623499] 
[   15.634252] Allocated by task 282:
[   15.634788]  kasan_save_stack+0x45/0x70
[   15.634997]  kasan_save_track+0x18/0x40
[   15.635268]  kasan_save_alloc_info+0x3b/0x50
[   15.635593]  __kasan_kmalloc+0xb7/0xc0
[   15.635899]  __kmalloc_cache_noprof+0x189/0x420
[   15.636216]  kasan_atomics+0x95/0x310
[   15.636504]  kunit_try_run_case+0x1a5/0x480
[   15.636804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.637151]  kthread+0x337/0x6f0
[   15.637458]  ret_from_fork+0x116/0x1d0
[   15.637641]  ret_from_fork_asm+0x1a/0x30
[   15.637943] 
[   15.638049] The buggy address belongs to the object at ffff888103082e00
[   15.638049]  which belongs to the cache kmalloc-64 of size 64
[   15.638850] The buggy address is located 0 bytes to the right of
[   15.638850]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.639509] 
[   15.639605] The buggy address belongs to the physical page:
[   15.639957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.640355] flags: 0x200000000000000(node=0|zone=2)
[   15.640735] page_type: f5(slab)
[   15.640912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.641248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.641744] page dumped because: kasan: bad access detected
[   15.642099] 
[   15.642202] Memory state around the buggy address:
[   15.642623]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.643023]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.643418] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.643788]                                      ^
[   15.644116]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.644501]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.644914] ==================================================================
[   15.299298] ==================================================================
[   15.299850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   15.300196] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.300656] 
[   15.300750] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.300924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.301070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.301094] Call Trace:
[   15.301111]  <TASK>
[   15.301126]  dump_stack_lvl+0x73/0xb0
[   15.301160]  print_report+0xd1/0x610
[   15.301185]  ? __virt_addr_valid+0x1db/0x2d0
[   15.301210]  ? kasan_atomics_helper+0x860/0x5450
[   15.301234]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.301260]  ? kasan_atomics_helper+0x860/0x5450
[   15.301284]  kasan_report+0x141/0x180
[   15.301308]  ? kasan_atomics_helper+0x860/0x5450
[   15.301336]  kasan_check_range+0x10c/0x1c0
[   15.301362]  __kasan_check_write+0x18/0x20
[   15.301384]  kasan_atomics_helper+0x860/0x5450
[   15.301409]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.301460]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.301489]  ? kasan_atomics+0x152/0x310
[   15.301518]  kasan_atomics+0x1dc/0x310
[   15.301541]  ? __pfx_kasan_atomics+0x10/0x10
[   15.301570]  ? __pfx_read_tsc+0x10/0x10
[   15.301593]  ? ktime_get_ts64+0x86/0x230
[   15.301619]  kunit_try_run_case+0x1a5/0x480
[   15.301646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.301672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.301700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.301726]  ? __kthread_parkme+0x82/0x180
[   15.301749]  ? preempt_count_sub+0x50/0x80
[   15.301788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.301815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.301842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.301870]  kthread+0x337/0x6f0
[   15.301891]  ? trace_preempt_on+0x20/0xc0
[   15.301916]  ? __pfx_kthread+0x10/0x10
[   15.301939]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.301962]  ? calculate_sigpending+0x7b/0xa0
[   15.301989]  ? __pfx_kthread+0x10/0x10
[   15.302012]  ret_from_fork+0x116/0x1d0
[   15.302032]  ? __pfx_kthread+0x10/0x10
[   15.302055]  ret_from_fork_asm+0x1a/0x30
[   15.302088]  </TASK>
[   15.302099] 
[   15.311811] Allocated by task 282:
[   15.312116]  kasan_save_stack+0x45/0x70
[   15.312386]  kasan_save_track+0x18/0x40
[   15.312559]  kasan_save_alloc_info+0x3b/0x50
[   15.312895]  __kasan_kmalloc+0xb7/0xc0
[   15.313094]  __kmalloc_cache_noprof+0x189/0x420
[   15.313404]  kasan_atomics+0x95/0x310
[   15.313606]  kunit_try_run_case+0x1a5/0x480
[   15.313978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.314297]  kthread+0x337/0x6f0
[   15.314495]  ret_from_fork+0x116/0x1d0
[   15.314804]  ret_from_fork_asm+0x1a/0x30
[   15.315014] 
[   15.315240] The buggy address belongs to the object at ffff888103082e00
[   15.315240]  which belongs to the cache kmalloc-64 of size 64
[   15.315959] The buggy address is located 0 bytes to the right of
[   15.315959]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.316729] 
[   15.316831] The buggy address belongs to the physical page:
[   15.317148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.317640] flags: 0x200000000000000(node=0|zone=2)
[   15.317889] page_type: f5(slab)
[   15.318043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.318371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.318935] page dumped because: kasan: bad access detected
[   15.319137] 
[   15.319245] Memory state around the buggy address:
[   15.319647]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.320045]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.320413] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.320788]                                      ^
[   15.320996]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.321404]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.321791] ==================================================================
[   15.970079] ==================================================================
[   15.970306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   15.970805] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.971354] 
[   15.971461] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.971505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.971518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.971540] Call Trace:
[   15.971555]  <TASK>
[   15.971580]  dump_stack_lvl+0x73/0xb0
[   15.971612]  print_report+0xd1/0x610
[   15.971636]  ? __virt_addr_valid+0x1db/0x2d0
[   15.971660]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.971683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.971708]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.971733]  kasan_report+0x141/0x180
[   15.971756]  ? kasan_atomics_helper+0x16e7/0x5450
[   15.971796]  kasan_check_range+0x10c/0x1c0
[   15.971822]  __kasan_check_write+0x18/0x20
[   15.971843]  kasan_atomics_helper+0x16e7/0x5450
[   15.971868]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.971893]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.971920]  ? kasan_atomics+0x152/0x310
[   15.971948]  kasan_atomics+0x1dc/0x310
[   15.971973]  ? __pfx_kasan_atomics+0x10/0x10
[   15.971999]  ? __pfx_read_tsc+0x10/0x10
[   15.972021]  ? ktime_get_ts64+0x86/0x230
[   15.972047]  kunit_try_run_case+0x1a5/0x480
[   15.972073]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972098]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.972124]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.972150]  ? __kthread_parkme+0x82/0x180
[   15.972172]  ? preempt_count_sub+0x50/0x80
[   15.972198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.972224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.972251]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.972279]  kthread+0x337/0x6f0
[   15.972300]  ? trace_preempt_on+0x20/0xc0
[   15.972325]  ? __pfx_kthread+0x10/0x10
[   15.972347]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.972370]  ? calculate_sigpending+0x7b/0xa0
[   15.972396]  ? __pfx_kthread+0x10/0x10
[   15.972418]  ret_from_fork+0x116/0x1d0
[   15.972450]  ? __pfx_kthread+0x10/0x10
[   15.972472]  ret_from_fork_asm+0x1a/0x30
[   15.972504]  </TASK>
[   15.972515] 
[   15.979641] Allocated by task 282:
[   15.979827]  kasan_save_stack+0x45/0x70
[   15.980031]  kasan_save_track+0x18/0x40
[   15.980225]  kasan_save_alloc_info+0x3b/0x50
[   15.980450]  __kasan_kmalloc+0xb7/0xc0
[   15.980639]  __kmalloc_cache_noprof+0x189/0x420
[   15.980877]  kasan_atomics+0x95/0x310
[   15.981050]  kunit_try_run_case+0x1a5/0x480
[   15.981217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.981450]  kthread+0x337/0x6f0
[   15.981602]  ret_from_fork+0x116/0x1d0
[   15.981734]  ret_from_fork_asm+0x1a/0x30
[   15.981944] 
[   15.982039] The buggy address belongs to the object at ffff888103082e00
[   15.982039]  which belongs to the cache kmalloc-64 of size 64
[   15.982555] The buggy address is located 0 bytes to the right of
[   15.982555]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.982998] 
[   15.983070] The buggy address belongs to the physical page:
[   15.983246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.983483] flags: 0x200000000000000(node=0|zone=2)
[   15.983655] page_type: f5(slab)
[   15.985002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.985890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.986811] page dumped because: kasan: bad access detected
[   15.987573] 
[   15.987900] Memory state around the buggy address:
[   15.988456]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.989229]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.989474] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.989692]                                      ^
[   15.989864]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.990087]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.990303] ==================================================================
[   15.276081] ==================================================================
[   15.276662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   15.277123] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.277598] 
[   15.277711] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.277757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.277782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.277804] Call Trace:
[   15.277820]  <TASK>
[   15.277834]  dump_stack_lvl+0x73/0xb0
[   15.277865]  print_report+0xd1/0x610
[   15.277891]  ? __virt_addr_valid+0x1db/0x2d0
[   15.277917]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.277941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.277967]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.277991]  kasan_report+0x141/0x180
[   15.278015]  ? kasan_atomics_helper+0x7c7/0x5450
[   15.278043]  kasan_check_range+0x10c/0x1c0
[   15.278068]  __kasan_check_write+0x18/0x20
[   15.278090]  kasan_atomics_helper+0x7c7/0x5450
[   15.278115]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.278140]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.278169]  ? kasan_atomics+0x152/0x310
[   15.278197]  kasan_atomics+0x1dc/0x310
[   15.278222]  ? __pfx_kasan_atomics+0x10/0x10
[   15.278249]  ? __pfx_read_tsc+0x10/0x10
[   15.278271]  ? ktime_get_ts64+0x86/0x230
[   15.278298]  kunit_try_run_case+0x1a5/0x480
[   15.278325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.278351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.278379]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.278406]  ? __kthread_parkme+0x82/0x180
[   15.278529]  ? preempt_count_sub+0x50/0x80
[   15.278560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.278587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.278615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.278643]  kthread+0x337/0x6f0
[   15.278664]  ? trace_preempt_on+0x20/0xc0
[   15.278690]  ? __pfx_kthread+0x10/0x10
[   15.278714]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.278738]  ? calculate_sigpending+0x7b/0xa0
[   15.278775]  ? __pfx_kthread+0x10/0x10
[   15.278799]  ret_from_fork+0x116/0x1d0
[   15.278820]  ? __pfx_kthread+0x10/0x10
[   15.278843]  ret_from_fork_asm+0x1a/0x30
[   15.278876]  </TASK>
[   15.278887] 
[   15.288678] Allocated by task 282:
[   15.289023]  kasan_save_stack+0x45/0x70
[   15.289338]  kasan_save_track+0x18/0x40
[   15.289559]  kasan_save_alloc_info+0x3b/0x50
[   15.289932]  __kasan_kmalloc+0xb7/0xc0
[   15.290135]  __kmalloc_cache_noprof+0x189/0x420
[   15.290417]  kasan_atomics+0x95/0x310
[   15.290602]  kunit_try_run_case+0x1a5/0x480
[   15.290926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.291191]  kthread+0x337/0x6f0
[   15.291349]  ret_from_fork+0x116/0x1d0
[   15.291696]  ret_from_fork_asm+0x1a/0x30
[   15.291916] 
[   15.292009] The buggy address belongs to the object at ffff888103082e00
[   15.292009]  which belongs to the cache kmalloc-64 of size 64
[   15.292747] The buggy address is located 0 bytes to the right of
[   15.292747]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.293331] 
[   15.293541] The buggy address belongs to the physical page:
[   15.293909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.294331] flags: 0x200000000000000(node=0|zone=2)
[   15.294643] page_type: f5(slab)
[   15.294816] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.295149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.295487] page dumped because: kasan: bad access detected
[   15.295724] 
[   15.296071] Memory state around the buggy address:
[   15.296268]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.296724]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.297136] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.297443]                                      ^
[   15.297787]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.298152]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.298549] ==================================================================
[   16.368394] ==================================================================
[   16.368719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   16.369180] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.369883] 
[   16.370114] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.370283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.370302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.370325] Call Trace:
[   16.370342]  <TASK>
[   16.370357]  dump_stack_lvl+0x73/0xb0
[   16.370390]  print_report+0xd1/0x610
[   16.370414]  ? __virt_addr_valid+0x1db/0x2d0
[   16.370447]  ? kasan_atomics_helper+0x2006/0x5450
[   16.370472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.370497]  ? kasan_atomics_helper+0x2006/0x5450
[   16.370522]  kasan_report+0x141/0x180
[   16.370546]  ? kasan_atomics_helper+0x2006/0x5450
[   16.370576]  kasan_check_range+0x10c/0x1c0
[   16.370603]  __kasan_check_write+0x18/0x20
[   16.370624]  kasan_atomics_helper+0x2006/0x5450
[   16.370649]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.370674]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.370702]  ? kasan_atomics+0x152/0x310
[   16.370730]  kasan_atomics+0x1dc/0x310
[   16.370755]  ? __pfx_kasan_atomics+0x10/0x10
[   16.370796]  ? __pfx_read_tsc+0x10/0x10
[   16.370819]  ? ktime_get_ts64+0x86/0x230
[   16.370845]  kunit_try_run_case+0x1a5/0x480
[   16.370872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.370897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.370924]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.370950]  ? __kthread_parkme+0x82/0x180
[   16.370972]  ? preempt_count_sub+0x50/0x80
[   16.370997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.371024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.371052]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.371079]  kthread+0x337/0x6f0
[   16.371100]  ? trace_preempt_on+0x20/0xc0
[   16.371125]  ? __pfx_kthread+0x10/0x10
[   16.371148]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.371171]  ? calculate_sigpending+0x7b/0xa0
[   16.371205]  ? __pfx_kthread+0x10/0x10
[   16.371228]  ret_from_fork+0x116/0x1d0
[   16.371249]  ? __pfx_kthread+0x10/0x10
[   16.371271]  ret_from_fork_asm+0x1a/0x30
[   16.371304]  </TASK>
[   16.371316] 
[   16.382508] Allocated by task 282:
[   16.382717]  kasan_save_stack+0x45/0x70
[   16.383035]  kasan_save_track+0x18/0x40
[   16.383220]  kasan_save_alloc_info+0x3b/0x50
[   16.383413]  __kasan_kmalloc+0xb7/0xc0
[   16.383807]  __kmalloc_cache_noprof+0x189/0x420
[   16.384162]  kasan_atomics+0x95/0x310
[   16.384442]  kunit_try_run_case+0x1a5/0x480
[   16.384753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.385120]  kthread+0x337/0x6f0
[   16.385368]  ret_from_fork+0x116/0x1d0
[   16.385719]  ret_from_fork_asm+0x1a/0x30
[   16.386044] 
[   16.386232] The buggy address belongs to the object at ffff888103082e00
[   16.386232]  which belongs to the cache kmalloc-64 of size 64
[   16.387025] The buggy address is located 0 bytes to the right of
[   16.387025]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.387792] 
[   16.387983] The buggy address belongs to the physical page:
[   16.388282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.388820] flags: 0x200000000000000(node=0|zone=2)
[   16.389137] page_type: f5(slab)
[   16.389388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.389986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.390411] page dumped because: kasan: bad access detected
[   16.390733] 
[   16.390946] Memory state around the buggy address:
[   16.391163]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.391443]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.392037] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.392417]                                      ^
[   16.392796]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.393173]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.393603] ==================================================================
[   15.699526] ==================================================================
[   15.699842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   15.700245] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.700563] 
[   15.700755] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.700815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.700829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.700853] Call Trace:
[   15.700880]  <TASK>
[   15.700897]  dump_stack_lvl+0x73/0xb0
[   15.700929]  print_report+0xd1/0x610
[   15.700954]  ? __virt_addr_valid+0x1db/0x2d0
[   15.700979]  ? kasan_atomics_helper+0x1148/0x5450
[   15.701003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.701030]  ? kasan_atomics_helper+0x1148/0x5450
[   15.701055]  kasan_report+0x141/0x180
[   15.701079]  ? kasan_atomics_helper+0x1148/0x5450
[   15.701108]  kasan_check_range+0x10c/0x1c0
[   15.701135]  __kasan_check_write+0x18/0x20
[   15.701157]  kasan_atomics_helper+0x1148/0x5450
[   15.701182]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.701208]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.701246]  ? kasan_atomics+0x152/0x310
[   15.701275]  kasan_atomics+0x1dc/0x310
[   15.701299]  ? __pfx_kasan_atomics+0x10/0x10
[   15.701326]  ? __pfx_read_tsc+0x10/0x10
[   15.701349]  ? ktime_get_ts64+0x86/0x230
[   15.701375]  kunit_try_run_case+0x1a5/0x480
[   15.701403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.701451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.701487]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.701514]  ? __kthread_parkme+0x82/0x180
[   15.701538]  ? preempt_count_sub+0x50/0x80
[   15.701563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.701591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.701636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.701664]  kthread+0x337/0x6f0
[   15.701685]  ? trace_preempt_on+0x20/0xc0
[   15.701710]  ? __pfx_kthread+0x10/0x10
[   15.701733]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.701757]  ? calculate_sigpending+0x7b/0xa0
[   15.701794]  ? __pfx_kthread+0x10/0x10
[   15.701818]  ret_from_fork+0x116/0x1d0
[   15.701838]  ? __pfx_kthread+0x10/0x10
[   15.701879]  ret_from_fork_asm+0x1a/0x30
[   15.701911]  </TASK>
[   15.701923] 
[   15.710015] Allocated by task 282:
[   15.710199]  kasan_save_stack+0x45/0x70
[   15.710404]  kasan_save_track+0x18/0x40
[   15.710599]  kasan_save_alloc_info+0x3b/0x50
[   15.710807]  __kasan_kmalloc+0xb7/0xc0
[   15.710946]  __kmalloc_cache_noprof+0x189/0x420
[   15.711174]  kasan_atomics+0x95/0x310
[   15.711371]  kunit_try_run_case+0x1a5/0x480
[   15.711720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.711967]  kthread+0x337/0x6f0
[   15.712133]  ret_from_fork+0x116/0x1d0
[   15.712318]  ret_from_fork_asm+0x1a/0x30
[   15.712555] 
[   15.712694] The buggy address belongs to the object at ffff888103082e00
[   15.712694]  which belongs to the cache kmalloc-64 of size 64
[   15.713291] The buggy address is located 0 bytes to the right of
[   15.713291]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.713865] 
[   15.713963] The buggy address belongs to the physical page:
[   15.714328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.714671] flags: 0x200000000000000(node=0|zone=2)
[   15.714884] page_type: f5(slab)
[   15.715007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.715350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.715838] page dumped because: kasan: bad access detected
[   15.716081] 
[   15.716197] Memory state around the buggy address:
[   15.716422]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.716712]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.717011] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.717313]                                      ^
[   15.717586]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.717903]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.718200] ==================================================================
[   16.518870] ==================================================================
[   16.519382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   16.519865] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.520284] 
[   16.520393] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.520440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.520453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.520477] Call Trace:
[   16.520493]  <TASK>
[   16.520508]  dump_stack_lvl+0x73/0xb0
[   16.520542]  print_report+0xd1/0x610
[   16.520568]  ? __virt_addr_valid+0x1db/0x2d0
[   16.520593]  ? kasan_atomics_helper+0x224c/0x5450
[   16.520621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.520648]  ? kasan_atomics_helper+0x224c/0x5450
[   16.520673]  kasan_report+0x141/0x180
[   16.520698]  ? kasan_atomics_helper+0x224c/0x5450
[   16.520728]  kasan_check_range+0x10c/0x1c0
[   16.520755]  __kasan_check_write+0x18/0x20
[   16.520789]  kasan_atomics_helper+0x224c/0x5450
[   16.520814]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.520840]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.520867]  ? kasan_atomics+0x152/0x310
[   16.520896]  kasan_atomics+0x1dc/0x310
[   16.520920]  ? __pfx_kasan_atomics+0x10/0x10
[   16.520946]  ? __pfx_read_tsc+0x10/0x10
[   16.520969]  ? ktime_get_ts64+0x86/0x230
[   16.520996]  kunit_try_run_case+0x1a5/0x480
[   16.521022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.521048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.521075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.521101]  ? __kthread_parkme+0x82/0x180
[   16.521124]  ? preempt_count_sub+0x50/0x80
[   16.521150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.521176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.521204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.521232]  kthread+0x337/0x6f0
[   16.521252]  ? trace_preempt_on+0x20/0xc0
[   16.521278]  ? __pfx_kthread+0x10/0x10
[   16.521301]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.521324]  ? calculate_sigpending+0x7b/0xa0
[   16.521350]  ? __pfx_kthread+0x10/0x10
[   16.521374]  ret_from_fork+0x116/0x1d0
[   16.521394]  ? __pfx_kthread+0x10/0x10
[   16.521416]  ret_from_fork_asm+0x1a/0x30
[   16.521706]  </TASK>
[   16.521723] 
[   16.532163] Allocated by task 282:
[   16.532343]  kasan_save_stack+0x45/0x70
[   16.532533]  kasan_save_track+0x18/0x40
[   16.532714]  kasan_save_alloc_info+0x3b/0x50
[   16.533773]  __kasan_kmalloc+0xb7/0xc0
[   16.534160]  __kmalloc_cache_noprof+0x189/0x420
[   16.534615]  kasan_atomics+0x95/0x310
[   16.534999]  kunit_try_run_case+0x1a5/0x480
[   16.535421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.535953]  kthread+0x337/0x6f0
[   16.536295]  ret_from_fork+0x116/0x1d0
[   16.536692]  ret_from_fork_asm+0x1a/0x30
[   16.537081] 
[   16.537283] The buggy address belongs to the object at ffff888103082e00
[   16.537283]  which belongs to the cache kmalloc-64 of size 64
[   16.538055] The buggy address is located 0 bytes to the right of
[   16.538055]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.538458] 
[   16.538673] The buggy address belongs to the physical page:
[   16.539238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.539989] flags: 0x200000000000000(node=0|zone=2)
[   16.540548] page_type: f5(slab)
[   16.540854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.541447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.542195] page dumped because: kasan: bad access detected
[   16.542376] 
[   16.542456] Memory state around the buggy address:
[   16.542616]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.542851]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.543161] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.543440]                                      ^
[   16.543647]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.544047]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.544268] ==================================================================
[   15.508053] ==================================================================
[   15.508383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   15.509028] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.509345] 
[   15.509675] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.509957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.509976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.510013] Call Trace:
[   15.510031]  <TASK>
[   15.510050]  dump_stack_lvl+0x73/0xb0
[   15.510086]  print_report+0xd1/0x610
[   15.510111]  ? __virt_addr_valid+0x1db/0x2d0
[   15.510139]  ? kasan_atomics_helper+0xde0/0x5450
[   15.510167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.510195]  ? kasan_atomics_helper+0xde0/0x5450
[   15.510218]  kasan_report+0x141/0x180
[   15.510243]  ? kasan_atomics_helper+0xde0/0x5450
[   15.510272]  kasan_check_range+0x10c/0x1c0
[   15.510300]  __kasan_check_write+0x18/0x20
[   15.510322]  kasan_atomics_helper+0xde0/0x5450
[   15.510346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.510371]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.510400]  ? kasan_atomics+0x152/0x310
[   15.510428]  kasan_atomics+0x1dc/0x310
[   15.510468]  ? __pfx_kasan_atomics+0x10/0x10
[   15.510494]  ? __pfx_read_tsc+0x10/0x10
[   15.510517]  ? ktime_get_ts64+0x86/0x230
[   15.510545]  kunit_try_run_case+0x1a5/0x480
[   15.510573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.510598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.510626]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.510652]  ? __kthread_parkme+0x82/0x180
[   15.510675]  ? preempt_count_sub+0x50/0x80
[   15.510701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.510728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.510755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.510794]  kthread+0x337/0x6f0
[   15.510814]  ? trace_preempt_on+0x20/0xc0
[   15.510841]  ? __pfx_kthread+0x10/0x10
[   15.510862]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.510887]  ? calculate_sigpending+0x7b/0xa0
[   15.510914]  ? __pfx_kthread+0x10/0x10
[   15.510936]  ret_from_fork+0x116/0x1d0
[   15.510956]  ? __pfx_kthread+0x10/0x10
[   15.510979]  ret_from_fork_asm+0x1a/0x30
[   15.511012]  </TASK>
[   15.511024] 
[   15.522377] Allocated by task 282:
[   15.522574]  kasan_save_stack+0x45/0x70
[   15.522752]  kasan_save_track+0x18/0x40
[   15.523812]  kasan_save_alloc_info+0x3b/0x50
[   15.524279]  __kasan_kmalloc+0xb7/0xc0
[   15.524719]  __kmalloc_cache_noprof+0x189/0x420
[   15.525212]  kasan_atomics+0x95/0x310
[   15.525653]  kunit_try_run_case+0x1a5/0x480
[   15.526146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.526720]  kthread+0x337/0x6f0
[   15.527031]  ret_from_fork+0x116/0x1d0
[   15.527389]  ret_from_fork_asm+0x1a/0x30
[   15.527795] 
[   15.527957] The buggy address belongs to the object at ffff888103082e00
[   15.527957]  which belongs to the cache kmalloc-64 of size 64
[   15.528492] The buggy address is located 0 bytes to the right of
[   15.528492]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.529580] 
[   15.529722] The buggy address belongs to the physical page:
[   15.529907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.530152] flags: 0x200000000000000(node=0|zone=2)
[   15.530318] page_type: f5(slab)
[   15.530466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.531120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.531783] page dumped because: kasan: bad access detected
[   15.532251] 
[   15.532407] Memory state around the buggy address:
[   15.532844]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.533483]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.534076] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.534388]                                      ^
[   15.534826]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.535357]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.535906] ==================================================================
[   15.033608] ==================================================================
[   15.033903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   15.034644] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.034936] 
[   15.035113] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.035158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.035169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.035193] Call Trace:
[   15.035206]  <TASK>
[   15.035219]  dump_stack_lvl+0x73/0xb0
[   15.035247]  print_report+0xd1/0x610
[   15.035271]  ? __virt_addr_valid+0x1db/0x2d0
[   15.035295]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.035317]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.035343]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.035366]  kasan_report+0x141/0x180
[   15.035401]  ? kasan_atomics_helper+0x4b88/0x5450
[   15.035429]  __asan_report_load4_noabort+0x18/0x20
[   15.035478]  kasan_atomics_helper+0x4b88/0x5450
[   15.035502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.035526]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.035553]  ? kasan_atomics+0x152/0x310
[   15.035581]  kasan_atomics+0x1dc/0x310
[   15.035604]  ? __pfx_kasan_atomics+0x10/0x10
[   15.035629]  ? __pfx_read_tsc+0x10/0x10
[   15.035652]  ? ktime_get_ts64+0x86/0x230
[   15.035677]  kunit_try_run_case+0x1a5/0x480
[   15.035702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.035727]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.035753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.035789]  ? __kthread_parkme+0x82/0x180
[   15.035810]  ? preempt_count_sub+0x50/0x80
[   15.035836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.035861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.035887]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.035914]  kthread+0x337/0x6f0
[   15.035934]  ? trace_preempt_on+0x20/0xc0
[   15.035968]  ? __pfx_kthread+0x10/0x10
[   15.035999]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.036022]  ? calculate_sigpending+0x7b/0xa0
[   15.036059]  ? __pfx_kthread+0x10/0x10
[   15.036082]  ret_from_fork+0x116/0x1d0
[   15.036102]  ? __pfx_kthread+0x10/0x10
[   15.036122]  ret_from_fork_asm+0x1a/0x30
[   15.036163]  </TASK>
[   15.036173] 
[   15.044665] Allocated by task 282:
[   15.044812]  kasan_save_stack+0x45/0x70
[   15.044955]  kasan_save_track+0x18/0x40
[   15.045200]  kasan_save_alloc_info+0x3b/0x50
[   15.045434]  __kasan_kmalloc+0xb7/0xc0
[   15.045620]  __kmalloc_cache_noprof+0x189/0x420
[   15.045787]  kasan_atomics+0x95/0x310
[   15.045959]  kunit_try_run_case+0x1a5/0x480
[   15.046391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.046604]  kthread+0x337/0x6f0
[   15.046803]  ret_from_fork+0x116/0x1d0
[   15.046961]  ret_from_fork_asm+0x1a/0x30
[   15.047213] 
[   15.047289] The buggy address belongs to the object at ffff888103082e00
[   15.047289]  which belongs to the cache kmalloc-64 of size 64
[   15.047878] The buggy address is located 0 bytes to the right of
[   15.047878]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.048478] 
[   15.048664] The buggy address belongs to the physical page:
[   15.048902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.049338] flags: 0x200000000000000(node=0|zone=2)
[   15.049591] page_type: f5(slab)
[   15.049727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.050112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.050424] page dumped because: kasan: bad access detected
[   15.050673] 
[   15.050783] Memory state around the buggy address:
[   15.050941]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.051161]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.051382] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.051596]                                      ^
[   15.051754]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.052117]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.052451] ==================================================================
[   15.384592] ==================================================================
[   15.384960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   15.385324] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.385951] 
[   15.386061] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.386105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.386118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.386140] Call Trace:
[   15.386156]  <TASK>
[   15.386171]  dump_stack_lvl+0x73/0xb0
[   15.386202]  print_report+0xd1/0x610
[   15.386227]  ? __virt_addr_valid+0x1db/0x2d0
[   15.386252]  ? kasan_atomics_helper+0xac7/0x5450
[   15.386275]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.386301]  ? kasan_atomics_helper+0xac7/0x5450
[   15.386325]  kasan_report+0x141/0x180
[   15.386349]  ? kasan_atomics_helper+0xac7/0x5450
[   15.386378]  kasan_check_range+0x10c/0x1c0
[   15.386404]  __kasan_check_write+0x18/0x20
[   15.386426]  kasan_atomics_helper+0xac7/0x5450
[   15.386462]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.386488]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.386516]  ? kasan_atomics+0x152/0x310
[   15.386544]  kasan_atomics+0x1dc/0x310
[   15.386568]  ? __pfx_kasan_atomics+0x10/0x10
[   15.386594]  ? __pfx_read_tsc+0x10/0x10
[   15.386617]  ? ktime_get_ts64+0x86/0x230
[   15.386643]  kunit_try_run_case+0x1a5/0x480
[   15.386671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.386696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.386723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.386750]  ? __kthread_parkme+0x82/0x180
[   15.386784]  ? preempt_count_sub+0x50/0x80
[   15.386810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.386837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.386864]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.386892]  kthread+0x337/0x6f0
[   15.386913]  ? trace_preempt_on+0x20/0xc0
[   15.386939]  ? __pfx_kthread+0x10/0x10
[   15.386962]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.386985]  ? calculate_sigpending+0x7b/0xa0
[   15.387012]  ? __pfx_kthread+0x10/0x10
[   15.387035]  ret_from_fork+0x116/0x1d0
[   15.387055]  ? __pfx_kthread+0x10/0x10
[   15.387077]  ret_from_fork_asm+0x1a/0x30
[   15.387109]  </TASK>
[   15.387120] 
[   15.394560] Allocated by task 282:
[   15.394688]  kasan_save_stack+0x45/0x70
[   15.394846]  kasan_save_track+0x18/0x40
[   15.394985]  kasan_save_alloc_info+0x3b/0x50
[   15.395139]  __kasan_kmalloc+0xb7/0xc0
[   15.395334]  __kmalloc_cache_noprof+0x189/0x420
[   15.395654]  kasan_atomics+0x95/0x310
[   15.395882]  kunit_try_run_case+0x1a5/0x480
[   15.396267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.396539]  kthread+0x337/0x6f0
[   15.396717]  ret_from_fork+0x116/0x1d0
[   15.396926]  ret_from_fork_asm+0x1a/0x30
[   15.397187] 
[   15.397284] The buggy address belongs to the object at ffff888103082e00
[   15.397284]  which belongs to the cache kmalloc-64 of size 64
[   15.397672] The buggy address is located 0 bytes to the right of
[   15.397672]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.398474] 
[   15.398578] The buggy address belongs to the physical page:
[   15.398841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.399169] flags: 0x200000000000000(node=0|zone=2)
[   15.399343] page_type: f5(slab)
[   15.399466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.399707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.400008] page dumped because: kasan: bad access detected
[   15.400267] 
[   15.400368] Memory state around the buggy address:
[   15.400595]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.400930]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.401256] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.401505]                                      ^
[   15.401662]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.402220]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.402535] ==================================================================
[   15.775843] ==================================================================
[   15.776540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   15.776899] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.777152] 
[   15.777234] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.777277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.777289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.777311] Call Trace:
[   15.777326]  <TASK>
[   15.777340]  dump_stack_lvl+0x73/0xb0
[   15.777368]  print_report+0xd1/0x610
[   15.777392]  ? __virt_addr_valid+0x1db/0x2d0
[   15.777417]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.777441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.777466]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.777517]  kasan_report+0x141/0x180
[   15.777555]  ? kasan_atomics_helper+0x12e6/0x5450
[   15.777597]  kasan_check_range+0x10c/0x1c0
[   15.777636]  __kasan_check_write+0x18/0x20
[   15.777671]  kasan_atomics_helper+0x12e6/0x5450
[   15.777710]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.777735]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.777772]  ? kasan_atomics+0x152/0x310
[   15.777800]  kasan_atomics+0x1dc/0x310
[   15.777825]  ? __pfx_kasan_atomics+0x10/0x10
[   15.777867]  ? __pfx_read_tsc+0x10/0x10
[   15.777891]  ? ktime_get_ts64+0x86/0x230
[   15.777917]  kunit_try_run_case+0x1a5/0x480
[   15.777944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.777969]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.777995]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.778021]  ? __kthread_parkme+0x82/0x180
[   15.778061]  ? preempt_count_sub+0x50/0x80
[   15.778087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.778114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.778140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.778169]  kthread+0x337/0x6f0
[   15.778190]  ? trace_preempt_on+0x20/0xc0
[   15.778215]  ? __pfx_kthread+0x10/0x10
[   15.778236]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.778260]  ? calculate_sigpending+0x7b/0xa0
[   15.778286]  ? __pfx_kthread+0x10/0x10
[   15.778309]  ret_from_fork+0x116/0x1d0
[   15.778329]  ? __pfx_kthread+0x10/0x10
[   15.778351]  ret_from_fork_asm+0x1a/0x30
[   15.778383]  </TASK>
[   15.778394] 
[   15.786604] Allocated by task 282:
[   15.786775]  kasan_save_stack+0x45/0x70
[   15.786993]  kasan_save_track+0x18/0x40
[   15.787226]  kasan_save_alloc_info+0x3b/0x50
[   15.787432]  __kasan_kmalloc+0xb7/0xc0
[   15.787636]  __kmalloc_cache_noprof+0x189/0x420
[   15.787817]  kasan_atomics+0x95/0x310
[   15.788008]  kunit_try_run_case+0x1a5/0x480
[   15.788230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.788498]  kthread+0x337/0x6f0
[   15.788669]  ret_from_fork+0x116/0x1d0
[   15.788844]  ret_from_fork_asm+0x1a/0x30
[   15.789038] 
[   15.789157] The buggy address belongs to the object at ffff888103082e00
[   15.789157]  which belongs to the cache kmalloc-64 of size 64
[   15.789691] The buggy address is located 0 bytes to the right of
[   15.789691]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.790169] 
[   15.790271] The buggy address belongs to the physical page:
[   15.790557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.790862] flags: 0x200000000000000(node=0|zone=2)
[   15.791094] page_type: f5(slab)
[   15.791257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.791636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.792006] page dumped because: kasan: bad access detected
[   15.792183] 
[   15.792275] Memory state around the buggy address:
[   15.792507]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.792846]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.793162] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.793404]                                      ^
[   15.793556]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.793781]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.794179] ==================================================================
[   15.794846] ==================================================================
[   15.795469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   15.795974] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.796768] 
[   15.796915] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.796965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.796979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.797001] Call Trace:
[   15.797017]  <TASK>
[   15.797034]  dump_stack_lvl+0x73/0xb0
[   15.797086]  print_report+0xd1/0x610
[   15.797113]  ? __virt_addr_valid+0x1db/0x2d0
[   15.797137]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.797161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.797187]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.797212]  kasan_report+0x141/0x180
[   15.797236]  ? kasan_atomics_helper+0x49ce/0x5450
[   15.797283]  __asan_report_load4_noabort+0x18/0x20
[   15.797310]  kasan_atomics_helper+0x49ce/0x5450
[   15.797336]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.797361]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.797388]  ? kasan_atomics+0x152/0x310
[   15.797434]  kasan_atomics+0x1dc/0x310
[   15.797469]  ? __pfx_kasan_atomics+0x10/0x10
[   15.797495]  ? __pfx_read_tsc+0x10/0x10
[   15.797517]  ? ktime_get_ts64+0x86/0x230
[   15.797543]  kunit_try_run_case+0x1a5/0x480
[   15.797571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.797596]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.797640]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.797667]  ? __kthread_parkme+0x82/0x180
[   15.797689]  ? preempt_count_sub+0x50/0x80
[   15.797715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.797742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.797779]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.797824]  kthread+0x337/0x6f0
[   15.797858]  ? trace_preempt_on+0x20/0xc0
[   15.797884]  ? __pfx_kthread+0x10/0x10
[   15.797919]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.797956]  ? calculate_sigpending+0x7b/0xa0
[   15.797982]  ? __pfx_kthread+0x10/0x10
[   15.798006]  ret_from_fork+0x116/0x1d0
[   15.798026]  ? __pfx_kthread+0x10/0x10
[   15.798048]  ret_from_fork_asm+0x1a/0x30
[   15.798080]  </TASK>
[   15.798092] 
[   15.810258] Allocated by task 282:
[   15.810602]  kasan_save_stack+0x45/0x70
[   15.810988]  kasan_save_track+0x18/0x40
[   15.811356]  kasan_save_alloc_info+0x3b/0x50
[   15.811658]  __kasan_kmalloc+0xb7/0xc0
[   15.811806]  __kmalloc_cache_noprof+0x189/0x420
[   15.811962]  kasan_atomics+0x95/0x310
[   15.812096]  kunit_try_run_case+0x1a5/0x480
[   15.812240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.812415]  kthread+0x337/0x6f0
[   15.812808]  ret_from_fork+0x116/0x1d0
[   15.813141]  ret_from_fork_asm+0x1a/0x30
[   15.813577] 
[   15.813777] The buggy address belongs to the object at ffff888103082e00
[   15.813777]  which belongs to the cache kmalloc-64 of size 64
[   15.814856] The buggy address is located 0 bytes to the right of
[   15.814856]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.816035] 
[   15.816201] The buggy address belongs to the physical page:
[   15.816800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.817508] flags: 0x200000000000000(node=0|zone=2)
[   15.817950] page_type: f5(slab)
[   15.818236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.818874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.819103] page dumped because: kasan: bad access detected
[   15.819287] 
[   15.819358] Memory state around the buggy address:
[   15.819641]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.820238]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.820922] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.821556]                                      ^
[   15.822060]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.822779]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.823401] ==================================================================
[   15.645493] ==================================================================
[   15.645728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   15.646732] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.647070] 
[   15.647330] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.647381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.647396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.647418] Call Trace:
[   15.647434]  <TASK>
[   15.647462]  dump_stack_lvl+0x73/0xb0
[   15.647495]  print_report+0xd1/0x610
[   15.647520]  ? __virt_addr_valid+0x1db/0x2d0
[   15.647544]  ? kasan_atomics_helper+0x1079/0x5450
[   15.647568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.647593]  ? kasan_atomics_helper+0x1079/0x5450
[   15.647618]  kasan_report+0x141/0x180
[   15.647642]  ? kasan_atomics_helper+0x1079/0x5450
[   15.647670]  kasan_check_range+0x10c/0x1c0
[   15.647695]  __kasan_check_write+0x18/0x20
[   15.647717]  kasan_atomics_helper+0x1079/0x5450
[   15.647741]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.647778]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.647807]  ? kasan_atomics+0x152/0x310
[   15.647836]  kasan_atomics+0x1dc/0x310
[   15.647860]  ? __pfx_kasan_atomics+0x10/0x10
[   15.647890]  ? __pfx_read_tsc+0x10/0x10
[   15.647914]  ? ktime_get_ts64+0x86/0x230
[   15.647941]  kunit_try_run_case+0x1a5/0x480
[   15.647967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.647995]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.648022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.648052]  ? __kthread_parkme+0x82/0x180
[   15.648078]  ? preempt_count_sub+0x50/0x80
[   15.648105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.648132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.648160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.648188]  kthread+0x337/0x6f0
[   15.648209]  ? trace_preempt_on+0x20/0xc0
[   15.648236]  ? __pfx_kthread+0x10/0x10
[   15.648258]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.648283]  ? calculate_sigpending+0x7b/0xa0
[   15.648310]  ? __pfx_kthread+0x10/0x10
[   15.648333]  ret_from_fork+0x116/0x1d0
[   15.648353]  ? __pfx_kthread+0x10/0x10
[   15.648376]  ret_from_fork_asm+0x1a/0x30
[   15.648409]  </TASK>
[   15.648420] 
[   15.658693] Allocated by task 282:
[   15.658886]  kasan_save_stack+0x45/0x70
[   15.659084]  kasan_save_track+0x18/0x40
[   15.659271]  kasan_save_alloc_info+0x3b/0x50
[   15.659775]  __kasan_kmalloc+0xb7/0xc0
[   15.660072]  __kmalloc_cache_noprof+0x189/0x420
[   15.660387]  kasan_atomics+0x95/0x310
[   15.660585]  kunit_try_run_case+0x1a5/0x480
[   15.660965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.661302]  kthread+0x337/0x6f0
[   15.661568]  ret_from_fork+0x116/0x1d0
[   15.661869]  ret_from_fork_asm+0x1a/0x30
[   15.662030] 
[   15.662267] The buggy address belongs to the object at ffff888103082e00
[   15.662267]  which belongs to the cache kmalloc-64 of size 64
[   15.662885] The buggy address is located 0 bytes to the right of
[   15.662885]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.663397] 
[   15.663795] The buggy address belongs to the physical page:
[   15.664036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.664433] flags: 0x200000000000000(node=0|zone=2)
[   15.664823] page_type: f5(slab)
[   15.665175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.665526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.665935] page dumped because: kasan: bad access detected
[   15.666261] 
[   15.666341] Memory state around the buggy address:
[   15.666804]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.667186]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.667647] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.668043]                                      ^
[   15.668269]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.668733]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.669118] ==================================================================
[   16.085932] ==================================================================
[   16.086256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   16.086735] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.086990] 
[   16.087078] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.087124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.087137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.087159] Call Trace:
[   16.087175]  <TASK>
[   16.087195]  dump_stack_lvl+0x73/0xb0
[   16.087225]  print_report+0xd1/0x610
[   16.087250]  ? __virt_addr_valid+0x1db/0x2d0
[   16.087275]  ? kasan_atomics_helper+0x194a/0x5450
[   16.087299]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.087325]  ? kasan_atomics_helper+0x194a/0x5450
[   16.087349]  kasan_report+0x141/0x180
[   16.087373]  ? kasan_atomics_helper+0x194a/0x5450
[   16.087402]  kasan_check_range+0x10c/0x1c0
[   16.087428]  __kasan_check_write+0x18/0x20
[   16.087461]  kasan_atomics_helper+0x194a/0x5450
[   16.087486]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.087511]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.087539]  ? kasan_atomics+0x152/0x310
[   16.087567]  kasan_atomics+0x1dc/0x310
[   16.087591]  ? __pfx_kasan_atomics+0x10/0x10
[   16.087618]  ? __pfx_read_tsc+0x10/0x10
[   16.087641]  ? ktime_get_ts64+0x86/0x230
[   16.087668]  kunit_try_run_case+0x1a5/0x480
[   16.087695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.087721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.087748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.087785]  ? __kthread_parkme+0x82/0x180
[   16.087807]  ? preempt_count_sub+0x50/0x80
[   16.087834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.087860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.087888]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.087916]  kthread+0x337/0x6f0
[   16.087936]  ? trace_preempt_on+0x20/0xc0
[   16.087961]  ? __pfx_kthread+0x10/0x10
[   16.087983]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.088007]  ? calculate_sigpending+0x7b/0xa0
[   16.088033]  ? __pfx_kthread+0x10/0x10
[   16.088057]  ret_from_fork+0x116/0x1d0
[   16.088076]  ? __pfx_kthread+0x10/0x10
[   16.088099]  ret_from_fork_asm+0x1a/0x30
[   16.088131]  </TASK>
[   16.088142] 
[   16.095726] Allocated by task 282:
[   16.095919]  kasan_save_stack+0x45/0x70
[   16.096127]  kasan_save_track+0x18/0x40
[   16.096313]  kasan_save_alloc_info+0x3b/0x50
[   16.096475]  __kasan_kmalloc+0xb7/0xc0
[   16.096662]  __kmalloc_cache_noprof+0x189/0x420
[   16.096899]  kasan_atomics+0x95/0x310
[   16.097053]  kunit_try_run_case+0x1a5/0x480
[   16.097203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.097428]  kthread+0x337/0x6f0
[   16.097617]  ret_from_fork+0x116/0x1d0
[   16.097821]  ret_from_fork_asm+0x1a/0x30
[   16.098021] 
[   16.098121] The buggy address belongs to the object at ffff888103082e00
[   16.098121]  which belongs to the cache kmalloc-64 of size 64
[   16.098626] The buggy address is located 0 bytes to the right of
[   16.098626]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.099007] 
[   16.099092] The buggy address belongs to the physical page:
[   16.099350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.099706] flags: 0x200000000000000(node=0|zone=2)
[   16.099949] page_type: f5(slab)
[   16.100099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.100334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.100906] page dumped because: kasan: bad access detected
[   16.101165] 
[   16.101272] Memory state around the buggy address:
[   16.101489]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.101715]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.102042] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.102362]                                      ^
[   16.102595]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.102904]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.103201] ==================================================================
[   16.180267] ==================================================================
[   16.180924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   16.181388] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.181930] 
[   16.182170] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.182231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.182245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.182269] Call Trace:
[   16.182287]  <TASK>
[   16.182305]  dump_stack_lvl+0x73/0xb0
[   16.182337]  print_report+0xd1/0x610
[   16.182363]  ? __virt_addr_valid+0x1db/0x2d0
[   16.182389]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.182413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.182438]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.182568]  kasan_report+0x141/0x180
[   16.182595]  ? kasan_atomics_helper+0x1c18/0x5450
[   16.182624]  kasan_check_range+0x10c/0x1c0
[   16.182650]  __kasan_check_write+0x18/0x20
[   16.182672]  kasan_atomics_helper+0x1c18/0x5450
[   16.182731]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.182757]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.182796]  ? kasan_atomics+0x152/0x310
[   16.182825]  kasan_atomics+0x1dc/0x310
[   16.182852]  ? __pfx_kasan_atomics+0x10/0x10
[   16.182879]  ? __pfx_read_tsc+0x10/0x10
[   16.182902]  ? ktime_get_ts64+0x86/0x230
[   16.182929]  kunit_try_run_case+0x1a5/0x480
[   16.182955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.182980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.183008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.183034]  ? __kthread_parkme+0x82/0x180
[   16.183057]  ? preempt_count_sub+0x50/0x80
[   16.183083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.183110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.183138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.183165]  kthread+0x337/0x6f0
[   16.183193]  ? trace_preempt_on+0x20/0xc0
[   16.183219]  ? __pfx_kthread+0x10/0x10
[   16.183241]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.183264]  ? calculate_sigpending+0x7b/0xa0
[   16.183291]  ? __pfx_kthread+0x10/0x10
[   16.183314]  ret_from_fork+0x116/0x1d0
[   16.183334]  ? __pfx_kthread+0x10/0x10
[   16.183357]  ret_from_fork_asm+0x1a/0x30
[   16.183389]  </TASK>
[   16.183401] 
[   16.192916] Allocated by task 282:
[   16.193058]  kasan_save_stack+0x45/0x70
[   16.193206]  kasan_save_track+0x18/0x40
[   16.193345]  kasan_save_alloc_info+0x3b/0x50
[   16.193497]  __kasan_kmalloc+0xb7/0xc0
[   16.194159]  __kmalloc_cache_noprof+0x189/0x420
[   16.194605]  kasan_atomics+0x95/0x310
[   16.195066]  kunit_try_run_case+0x1a5/0x480
[   16.195368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.195819]  kthread+0x337/0x6f0
[   16.196239]  ret_from_fork+0x116/0x1d0
[   16.196516]  ret_from_fork_asm+0x1a/0x30
[   16.196733] 
[   16.196845] The buggy address belongs to the object at ffff888103082e00
[   16.196845]  which belongs to the cache kmalloc-64 of size 64
[   16.197384] The buggy address is located 0 bytes to the right of
[   16.197384]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.198737] 
[   16.198937] The buggy address belongs to the physical page:
[   16.199411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.200505] flags: 0x200000000000000(node=0|zone=2)
[   16.200996] page_type: f5(slab)
[   16.201125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.201355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.201845] page dumped because: kasan: bad access detected
[   16.202017] 
[   16.202089] Memory state around the buggy address:
[   16.202242]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.202793]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.203896] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.204673]                                      ^
[   16.205059]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205283]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.205522] ==================================================================
[   15.053067] ==================================================================
[   15.053888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   15.054444] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.054992] 
[   15.055104] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.055149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.055162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.055189] Call Trace:
[   15.055205]  <TASK>
[   15.055220]  dump_stack_lvl+0x73/0xb0
[   15.055251]  print_report+0xd1/0x610
[   15.055275]  ? __virt_addr_valid+0x1db/0x2d0
[   15.055301]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.055325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.055351]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.055375]  kasan_report+0x141/0x180
[   15.055399]  ? kasan_atomics_helper+0x4b6e/0x5450
[   15.055428]  __asan_report_store4_noabort+0x1b/0x30
[   15.055466]  kasan_atomics_helper+0x4b6e/0x5450
[   15.055492]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.055517]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.055545]  ? kasan_atomics+0x152/0x310
[   15.055574]  kasan_atomics+0x1dc/0x310
[   15.055608]  ? __pfx_kasan_atomics+0x10/0x10
[   15.055635]  ? __pfx_read_tsc+0x10/0x10
[   15.055672]  ? ktime_get_ts64+0x86/0x230
[   15.055698]  kunit_try_run_case+0x1a5/0x480
[   15.055737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.055772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.055799]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.055825]  ? __kthread_parkme+0x82/0x180
[   15.055849]  ? preempt_count_sub+0x50/0x80
[   15.055875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.055901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.055929]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.055966]  kthread+0x337/0x6f0
[   15.055998]  ? trace_preempt_on+0x20/0xc0
[   15.056036]  ? __pfx_kthread+0x10/0x10
[   15.056068]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.056092]  ? calculate_sigpending+0x7b/0xa0
[   15.056119]  ? __pfx_kthread+0x10/0x10
[   15.056154]  ret_from_fork+0x116/0x1d0
[   15.056174]  ? __pfx_kthread+0x10/0x10
[   15.056197]  ret_from_fork_asm+0x1a/0x30
[   15.056230]  </TASK>
[   15.056241] 
[   15.065403] Allocated by task 282:
[   15.065606]  kasan_save_stack+0x45/0x70
[   15.065755]  kasan_save_track+0x18/0x40
[   15.065906]  kasan_save_alloc_info+0x3b/0x50
[   15.066059]  __kasan_kmalloc+0xb7/0xc0
[   15.066195]  __kmalloc_cache_noprof+0x189/0x420
[   15.066357]  kasan_atomics+0x95/0x310
[   15.066501]  kunit_try_run_case+0x1a5/0x480
[   15.066656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.066908]  kthread+0x337/0x6f0
[   15.067138]  ret_from_fork+0x116/0x1d0
[   15.067335]  ret_from_fork_asm+0x1a/0x30
[   15.067652] 
[   15.067751] The buggy address belongs to the object at ffff888103082e00
[   15.067751]  which belongs to the cache kmalloc-64 of size 64
[   15.068736] The buggy address is located 0 bytes to the right of
[   15.068736]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.069352] 
[   15.069449] The buggy address belongs to the physical page:
[   15.069626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.069879] flags: 0x200000000000000(node=0|zone=2)
[   15.070046] page_type: f5(slab)
[   15.070169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.070403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.070635] page dumped because: kasan: bad access detected
[   15.070946] 
[   15.071044] Memory state around the buggy address:
[   15.071279]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.071815]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.072154] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.072485]                                      ^
[   15.072715]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.073171]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.073486] ==================================================================
[   16.544789] ==================================================================
[   16.545236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   16.545571] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.545955] 
[   16.546112] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.546170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.546185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.546234] Call Trace:
[   16.546249]  <TASK>
[   16.546265]  dump_stack_lvl+0x73/0xb0
[   16.546308]  print_report+0xd1/0x610
[   16.546333]  ? __virt_addr_valid+0x1db/0x2d0
[   16.546358]  ? kasan_atomics_helper+0x5115/0x5450
[   16.546382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.546407]  ? kasan_atomics_helper+0x5115/0x5450
[   16.546451]  kasan_report+0x141/0x180
[   16.546476]  ? kasan_atomics_helper+0x5115/0x5450
[   16.546535]  __asan_report_load8_noabort+0x18/0x20
[   16.546563]  kasan_atomics_helper+0x5115/0x5450
[   16.546625]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.546650]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.546690]  ? kasan_atomics+0x152/0x310
[   16.546718]  kasan_atomics+0x1dc/0x310
[   16.546743]  ? __pfx_kasan_atomics+0x10/0x10
[   16.546778]  ? __pfx_read_tsc+0x10/0x10
[   16.546801]  ? ktime_get_ts64+0x86/0x230
[   16.546827]  kunit_try_run_case+0x1a5/0x480
[   16.546884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.546910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.546948]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.546975]  ? __kthread_parkme+0x82/0x180
[   16.547026]  ? preempt_count_sub+0x50/0x80
[   16.547052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.547080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.547118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.547146]  kthread+0x337/0x6f0
[   16.547167]  ? trace_preempt_on+0x20/0xc0
[   16.547196]  ? __pfx_kthread+0x10/0x10
[   16.547219]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.547243]  ? calculate_sigpending+0x7b/0xa0
[   16.547269]  ? __pfx_kthread+0x10/0x10
[   16.547293]  ret_from_fork+0x116/0x1d0
[   16.547313]  ? __pfx_kthread+0x10/0x10
[   16.547335]  ret_from_fork_asm+0x1a/0x30
[   16.547368]  </TASK>
[   16.547380] 
[   16.555449] Allocated by task 282:
[   16.555609]  kasan_save_stack+0x45/0x70
[   16.555820]  kasan_save_track+0x18/0x40
[   16.555998]  kasan_save_alloc_info+0x3b/0x50
[   16.556170]  __kasan_kmalloc+0xb7/0xc0
[   16.556492]  __kmalloc_cache_noprof+0x189/0x420
[   16.556784]  kasan_atomics+0x95/0x310
[   16.556980]  kunit_try_run_case+0x1a5/0x480
[   16.557141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.557406]  kthread+0x337/0x6f0
[   16.557635]  ret_from_fork+0x116/0x1d0
[   16.557830]  ret_from_fork_asm+0x1a/0x30
[   16.558058] 
[   16.558139] The buggy address belongs to the object at ffff888103082e00
[   16.558139]  which belongs to the cache kmalloc-64 of size 64
[   16.558742] The buggy address is located 0 bytes to the right of
[   16.558742]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.559185] 
[   16.559284] The buggy address belongs to the physical page:
[   16.559618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.559986] flags: 0x200000000000000(node=0|zone=2)
[   16.560243] page_type: f5(slab)
[   16.560386] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.560746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.561031] page dumped because: kasan: bad access detected
[   16.561331] 
[   16.561471] Memory state around the buggy address:
[   16.561669]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.561984]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.562396] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.562712]                                      ^
[   16.562918]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.563247]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.563628] ==================================================================
[   15.114922] ==================================================================
[   15.115715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   15.116629] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.117576] 
[   15.117815] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.117865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.117879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.117904] Call Trace:
[   15.117919]  <TASK>
[   15.117937]  dump_stack_lvl+0x73/0xb0
[   15.117969]  print_report+0xd1/0x610
[   15.117994]  ? __virt_addr_valid+0x1db/0x2d0
[   15.118019]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.118083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.118111]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.118135]  kasan_report+0x141/0x180
[   15.118192]  ? kasan_atomics_helper+0x4a0/0x5450
[   15.118221]  kasan_check_range+0x10c/0x1c0
[   15.118247]  __kasan_check_write+0x18/0x20
[   15.118270]  kasan_atomics_helper+0x4a0/0x5450
[   15.118295]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.118320]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.118348]  ? kasan_atomics+0x152/0x310
[   15.118377]  kasan_atomics+0x1dc/0x310
[   15.118402]  ? __pfx_kasan_atomics+0x10/0x10
[   15.118427]  ? __pfx_read_tsc+0x10/0x10
[   15.118461]  ? ktime_get_ts64+0x86/0x230
[   15.118487]  kunit_try_run_case+0x1a5/0x480
[   15.118514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.118538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.118565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.118592]  ? __kthread_parkme+0x82/0x180
[   15.118615]  ? preempt_count_sub+0x50/0x80
[   15.118640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.118667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.118693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.118722]  kthread+0x337/0x6f0
[   15.118743]  ? trace_preempt_on+0x20/0xc0
[   15.118778]  ? __pfx_kthread+0x10/0x10
[   15.118801]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.118824]  ? calculate_sigpending+0x7b/0xa0
[   15.118850]  ? __pfx_kthread+0x10/0x10
[   15.118873]  ret_from_fork+0x116/0x1d0
[   15.118893]  ? __pfx_kthread+0x10/0x10
[   15.118915]  ret_from_fork_asm+0x1a/0x30
[   15.118949]  </TASK>
[   15.118960] 
[   15.133893] Allocated by task 282:
[   15.134107]  kasan_save_stack+0x45/0x70
[   15.134638]  kasan_save_track+0x18/0x40
[   15.135123]  kasan_save_alloc_info+0x3b/0x50
[   15.135872]  __kasan_kmalloc+0xb7/0xc0
[   15.136318]  __kmalloc_cache_noprof+0x189/0x420
[   15.136844]  kasan_atomics+0x95/0x310
[   15.137304]  kunit_try_run_case+0x1a5/0x480
[   15.137794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.138371]  kthread+0x337/0x6f0
[   15.138661]  ret_from_fork+0x116/0x1d0
[   15.139211]  ret_from_fork_asm+0x1a/0x30
[   15.139412] 
[   15.139615] The buggy address belongs to the object at ffff888103082e00
[   15.139615]  which belongs to the cache kmalloc-64 of size 64
[   15.140722] The buggy address is located 0 bytes to the right of
[   15.140722]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.141413] 
[   15.141602] The buggy address belongs to the physical page:
[   15.142147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.142841] flags: 0x200000000000000(node=0|zone=2)
[   15.143206] page_type: f5(slab)
[   15.143618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.144486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.145086] page dumped because: kasan: bad access detected
[   15.145434] 
[   15.145509] Memory state around the buggy address:
[   15.145692]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.147395]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.147722] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.147959]                                      ^
[   15.148128]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.148352]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.148572] ==================================================================
[   15.737813] ==================================================================
[   15.738304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   15.738963] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.739299] 
[   15.739432] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.739493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.739507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.739530] Call Trace:
[   15.739547]  <TASK>
[   15.739580]  dump_stack_lvl+0x73/0xb0
[   15.739612]  print_report+0xd1/0x610
[   15.739655]  ? __virt_addr_valid+0x1db/0x2d0
[   15.739680]  ? kasan_atomics_helper+0x1217/0x5450
[   15.739704]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.739730]  ? kasan_atomics_helper+0x1217/0x5450
[   15.739754]  kasan_report+0x141/0x180
[   15.739789]  ? kasan_atomics_helper+0x1217/0x5450
[   15.739817]  kasan_check_range+0x10c/0x1c0
[   15.739843]  __kasan_check_write+0x18/0x20
[   15.739865]  kasan_atomics_helper+0x1217/0x5450
[   15.739890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.739916]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.739944]  ? kasan_atomics+0x152/0x310
[   15.739972]  kasan_atomics+0x1dc/0x310
[   15.739996]  ? __pfx_kasan_atomics+0x10/0x10
[   15.740023]  ? __pfx_read_tsc+0x10/0x10
[   15.740045]  ? ktime_get_ts64+0x86/0x230
[   15.740071]  kunit_try_run_case+0x1a5/0x480
[   15.740099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.740124]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.740151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.740178]  ? __kthread_parkme+0x82/0x180
[   15.740201]  ? preempt_count_sub+0x50/0x80
[   15.740226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.740252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.740298]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.740325]  kthread+0x337/0x6f0
[   15.740347]  ? trace_preempt_on+0x20/0xc0
[   15.740371]  ? __pfx_kthread+0x10/0x10
[   15.740410]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.740433]  ? calculate_sigpending+0x7b/0xa0
[   15.740473]  ? __pfx_kthread+0x10/0x10
[   15.740507]  ret_from_fork+0x116/0x1d0
[   15.740528]  ? __pfx_kthread+0x10/0x10
[   15.740550]  ret_from_fork_asm+0x1a/0x30
[   15.740583]  </TASK>
[   15.740594] 
[   15.748501] Allocated by task 282:
[   15.748703]  kasan_save_stack+0x45/0x70
[   15.748943]  kasan_save_track+0x18/0x40
[   15.749179]  kasan_save_alloc_info+0x3b/0x50
[   15.749415]  __kasan_kmalloc+0xb7/0xc0
[   15.749668]  __kmalloc_cache_noprof+0x189/0x420
[   15.749978]  kasan_atomics+0x95/0x310
[   15.750149]  kunit_try_run_case+0x1a5/0x480
[   15.750295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.750487]  kthread+0x337/0x6f0
[   15.750654]  ret_from_fork+0x116/0x1d0
[   15.750851]  ret_from_fork_asm+0x1a/0x30
[   15.751207] 
[   15.751278] The buggy address belongs to the object at ffff888103082e00
[   15.751278]  which belongs to the cache kmalloc-64 of size 64
[   15.752029] The buggy address is located 0 bytes to the right of
[   15.752029]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.752802] 
[   15.752888] The buggy address belongs to the physical page:
[   15.753081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.753318] flags: 0x200000000000000(node=0|zone=2)
[   15.753478] page_type: f5(slab)
[   15.753597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.753909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.754268] page dumped because: kasan: bad access detected
[   15.754538] 
[   15.754651] Memory state around the buggy address:
[   15.754914]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.755289]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.755651] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.755978]                                      ^
[   15.756151]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.756363]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.756731] ==================================================================
[   16.237981] ==================================================================
[   16.238854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   16.239360] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.239965] 
[   16.240158] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.240204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.240218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.240241] Call Trace:
[   16.240258]  <TASK>
[   16.240276]  dump_stack_lvl+0x73/0xb0
[   16.240306]  print_report+0xd1/0x610
[   16.240349]  ? __virt_addr_valid+0x1db/0x2d0
[   16.240374]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.240398]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.240424]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.240448]  kasan_report+0x141/0x180
[   16.240483]  ? kasan_atomics_helper+0x1ce1/0x5450
[   16.240511]  kasan_check_range+0x10c/0x1c0
[   16.240537]  __kasan_check_write+0x18/0x20
[   16.240558]  kasan_atomics_helper+0x1ce1/0x5450
[   16.240583]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.240608]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.240636]  ? kasan_atomics+0x152/0x310
[   16.240663]  kasan_atomics+0x1dc/0x310
[   16.240687]  ? __pfx_kasan_atomics+0x10/0x10
[   16.240715]  ? __pfx_read_tsc+0x10/0x10
[   16.240737]  ? ktime_get_ts64+0x86/0x230
[   16.240775]  kunit_try_run_case+0x1a5/0x480
[   16.240803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.240829]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.240859]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.240887]  ? __kthread_parkme+0x82/0x180
[   16.240910]  ? preempt_count_sub+0x50/0x80
[   16.240936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.240963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.240990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.241018]  kthread+0x337/0x6f0
[   16.241040]  ? trace_preempt_on+0x20/0xc0
[   16.241066]  ? __pfx_kthread+0x10/0x10
[   16.241089]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.241112]  ? calculate_sigpending+0x7b/0xa0
[   16.241138]  ? __pfx_kthread+0x10/0x10
[   16.241161]  ret_from_fork+0x116/0x1d0
[   16.241181]  ? __pfx_kthread+0x10/0x10
[   16.241203]  ret_from_fork_asm+0x1a/0x30
[   16.241235]  </TASK>
[   16.241247] 
[   16.248596] Allocated by task 282:
[   16.248803]  kasan_save_stack+0x45/0x70
[   16.248989]  kasan_save_track+0x18/0x40
[   16.249172]  kasan_save_alloc_info+0x3b/0x50
[   16.249384]  __kasan_kmalloc+0xb7/0xc0
[   16.249628]  __kmalloc_cache_noprof+0x189/0x420
[   16.249847]  kasan_atomics+0x95/0x310
[   16.250058]  kunit_try_run_case+0x1a5/0x480
[   16.250264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.250611]  kthread+0x337/0x6f0
[   16.250786]  ret_from_fork+0x116/0x1d0
[   16.250956]  ret_from_fork_asm+0x1a/0x30
[   16.251192] 
[   16.251319] The buggy address belongs to the object at ffff888103082e00
[   16.251319]  which belongs to the cache kmalloc-64 of size 64
[   16.251887] The buggy address is located 0 bytes to the right of
[   16.251887]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.252426] 
[   16.252549] The buggy address belongs to the physical page:
[   16.252859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.253091] flags: 0x200000000000000(node=0|zone=2)
[   16.253249] page_type: f5(slab)
[   16.253367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.253888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.254229] page dumped because: kasan: bad access detected
[   16.254498] 
[   16.254624] Memory state around the buggy address:
[   16.254895]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.255266]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.255635] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.255986]                                      ^
[   16.256201]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.256565]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.256802] ==================================================================
[   15.718834] ==================================================================
[   15.719192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   15.719550] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.719863] 
[   15.719993] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.720052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.720079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.720100] Call Trace:
[   15.720117]  <TASK>
[   15.720133]  dump_stack_lvl+0x73/0xb0
[   15.720164]  print_report+0xd1/0x610
[   15.720188]  ? __virt_addr_valid+0x1db/0x2d0
[   15.720214]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.720238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.720264]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.720289]  kasan_report+0x141/0x180
[   15.720313]  ? kasan_atomics_helper+0x4a02/0x5450
[   15.720342]  __asan_report_load4_noabort+0x18/0x20
[   15.720369]  kasan_atomics_helper+0x4a02/0x5450
[   15.720412]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.720446]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.720474]  ? kasan_atomics+0x152/0x310
[   15.720502]  kasan_atomics+0x1dc/0x310
[   15.720526]  ? __pfx_kasan_atomics+0x10/0x10
[   15.720552]  ? __pfx_read_tsc+0x10/0x10
[   15.720575]  ? ktime_get_ts64+0x86/0x230
[   15.720617]  kunit_try_run_case+0x1a5/0x480
[   15.720658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.720696]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.720736]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.720799]  ? __kthread_parkme+0x82/0x180
[   15.720835]  ? preempt_count_sub+0x50/0x80
[   15.720887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.720916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.720942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.720971]  kthread+0x337/0x6f0
[   15.720992]  ? trace_preempt_on+0x20/0xc0
[   15.721016]  ? __pfx_kthread+0x10/0x10
[   15.721039]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.721063]  ? calculate_sigpending+0x7b/0xa0
[   15.721089]  ? __pfx_kthread+0x10/0x10
[   15.721113]  ret_from_fork+0x116/0x1d0
[   15.721133]  ? __pfx_kthread+0x10/0x10
[   15.721155]  ret_from_fork_asm+0x1a/0x30
[   15.721188]  </TASK>
[   15.721200] 
[   15.729214] Allocated by task 282:
[   15.729340]  kasan_save_stack+0x45/0x70
[   15.729582]  kasan_save_track+0x18/0x40
[   15.729790]  kasan_save_alloc_info+0x3b/0x50
[   15.730026]  __kasan_kmalloc+0xb7/0xc0
[   15.730220]  __kmalloc_cache_noprof+0x189/0x420
[   15.730504]  kasan_atomics+0x95/0x310
[   15.730736]  kunit_try_run_case+0x1a5/0x480
[   15.730982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.731246]  kthread+0x337/0x6f0
[   15.731403]  ret_from_fork+0x116/0x1d0
[   15.731666]  ret_from_fork_asm+0x1a/0x30
[   15.731880] 
[   15.731986] The buggy address belongs to the object at ffff888103082e00
[   15.731986]  which belongs to the cache kmalloc-64 of size 64
[   15.732372] The buggy address is located 0 bytes to the right of
[   15.732372]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.733158] 
[   15.733261] The buggy address belongs to the physical page:
[   15.733574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.733958] flags: 0x200000000000000(node=0|zone=2)
[   15.734187] page_type: f5(slab)
[   15.734337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.734565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.734809] page dumped because: kasan: bad access detected
[   15.735084] 
[   15.735207] Memory state around the buggy address:
[   15.735459]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.736014]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.736349] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.736665]                                      ^
[   15.736899]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.737133]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.737342] ==================================================================
[   16.342740] ==================================================================
[   16.343104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   16.343589] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.344168] 
[   16.344390] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.344442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.344567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.344592] Call Trace:
[   16.344609]  <TASK>
[   16.344626]  dump_stack_lvl+0x73/0xb0
[   16.344660]  print_report+0xd1/0x610
[   16.344685]  ? __virt_addr_valid+0x1db/0x2d0
[   16.344711]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.344735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.344773]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.344797]  kasan_report+0x141/0x180
[   16.344821]  ? kasan_atomics_helper+0x4f71/0x5450
[   16.344851]  __asan_report_load8_noabort+0x18/0x20
[   16.344879]  kasan_atomics_helper+0x4f71/0x5450
[   16.344904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.344929]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.344957]  ? kasan_atomics+0x152/0x310
[   16.344986]  kasan_atomics+0x1dc/0x310
[   16.345011]  ? __pfx_kasan_atomics+0x10/0x10
[   16.345038]  ? __pfx_read_tsc+0x10/0x10
[   16.345062]  ? ktime_get_ts64+0x86/0x230
[   16.345088]  kunit_try_run_case+0x1a5/0x480
[   16.345115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.345140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.345167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.345194]  ? __kthread_parkme+0x82/0x180
[   16.345216]  ? preempt_count_sub+0x50/0x80
[   16.345242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.345269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.345296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.345324]  kthread+0x337/0x6f0
[   16.345345]  ? trace_preempt_on+0x20/0xc0
[   16.345371]  ? __pfx_kthread+0x10/0x10
[   16.345394]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.345418]  ? calculate_sigpending+0x7b/0xa0
[   16.345457]  ? __pfx_kthread+0x10/0x10
[   16.345481]  ret_from_fork+0x116/0x1d0
[   16.345501]  ? __pfx_kthread+0x10/0x10
[   16.345524]  ret_from_fork_asm+0x1a/0x30
[   16.345557]  </TASK>
[   16.345568] 
[   16.356295] Allocated by task 282:
[   16.356798]  kasan_save_stack+0x45/0x70
[   16.357119]  kasan_save_track+0x18/0x40
[   16.357330]  kasan_save_alloc_info+0x3b/0x50
[   16.357673]  __kasan_kmalloc+0xb7/0xc0
[   16.357950]  __kmalloc_cache_noprof+0x189/0x420
[   16.358237]  kasan_atomics+0x95/0x310
[   16.358559]  kunit_try_run_case+0x1a5/0x480
[   16.358870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.359219]  kthread+0x337/0x6f0
[   16.359388]  ret_from_fork+0x116/0x1d0
[   16.359724]  ret_from_fork_asm+0x1a/0x30
[   16.360011] 
[   16.360118] The buggy address belongs to the object at ffff888103082e00
[   16.360118]  which belongs to the cache kmalloc-64 of size 64
[   16.360901] The buggy address is located 0 bytes to the right of
[   16.360901]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.361578] 
[   16.361797] The buggy address belongs to the physical page:
[   16.362045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.362353] flags: 0x200000000000000(node=0|zone=2)
[   16.362803] page_type: f5(slab)
[   16.363066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.363472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.363908] page dumped because: kasan: bad access detected
[   16.364236] 
[   16.364446] Memory state around the buggy address:
[   16.364746]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.365083]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.365359] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.366067]                                      ^
[   16.366282]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.366784]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.367210] ==================================================================
[   15.013540] ==================================================================
[   15.013890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   15.014322] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.014806] 
[   15.015000] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.015047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.015059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.015082] Call Trace:
[   15.015127]  <TASK>
[   15.015143]  dump_stack_lvl+0x73/0xb0
[   15.015175]  print_report+0xd1/0x610
[   15.015216]  ? __virt_addr_valid+0x1db/0x2d0
[   15.015241]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.015264]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.015289]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.015313]  kasan_report+0x141/0x180
[   15.015336]  ? kasan_atomics_helper+0x4ba2/0x5450
[   15.015363]  __asan_report_store4_noabort+0x1b/0x30
[   15.015390]  kasan_atomics_helper+0x4ba2/0x5450
[   15.015414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.015437]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.015464]  ? kasan_atomics+0x152/0x310
[   15.015491]  kasan_atomics+0x1dc/0x310
[   15.015515]  ? __pfx_kasan_atomics+0x10/0x10
[   15.015542]  ? __pfx_read_tsc+0x10/0x10
[   15.015564]  ? ktime_get_ts64+0x86/0x230
[   15.015590]  kunit_try_run_case+0x1a5/0x480
[   15.015616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.015640]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.015667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.015692]  ? __kthread_parkme+0x82/0x180
[   15.015714]  ? preempt_count_sub+0x50/0x80
[   15.015739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.015776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.015803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.015840]  kthread+0x337/0x6f0
[   15.015860]  ? trace_preempt_on+0x20/0xc0
[   15.015885]  ? __pfx_kthread+0x10/0x10
[   15.015918]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.015942]  ? calculate_sigpending+0x7b/0xa0
[   15.015969]  ? __pfx_kthread+0x10/0x10
[   15.016003]  ret_from_fork+0x116/0x1d0
[   15.016033]  ? __pfx_kthread+0x10/0x10
[   15.016055]  ret_from_fork_asm+0x1a/0x30
[   15.016086]  </TASK>
[   15.016096] 
[   15.024368] Allocated by task 282:
[   15.024543]  kasan_save_stack+0x45/0x70
[   15.024738]  kasan_save_track+0x18/0x40
[   15.024887]  kasan_save_alloc_info+0x3b/0x50
[   15.025038]  __kasan_kmalloc+0xb7/0xc0
[   15.025173]  __kmalloc_cache_noprof+0x189/0x420
[   15.025563]  kasan_atomics+0x95/0x310
[   15.025770]  kunit_try_run_case+0x1a5/0x480
[   15.026006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.026262]  kthread+0x337/0x6f0
[   15.026554]  ret_from_fork+0x116/0x1d0
[   15.026770]  ret_from_fork_asm+0x1a/0x30
[   15.026994] 
[   15.027162] The buggy address belongs to the object at ffff888103082e00
[   15.027162]  which belongs to the cache kmalloc-64 of size 64
[   15.027706] The buggy address is located 0 bytes to the right of
[   15.027706]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.028401] 
[   15.028475] The buggy address belongs to the physical page:
[   15.028834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.029267] flags: 0x200000000000000(node=0|zone=2)
[   15.029427] page_type: f5(slab)
[   15.029543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.029776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.029994] page dumped because: kasan: bad access detected
[   15.030501] 
[   15.030596] Memory state around the buggy address:
[   15.030826]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.031455]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.031834] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.032043]                                      ^
[   15.032195]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.032404]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.033120] ==================================================================
[   16.206883] ==================================================================
[   16.208305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   16.209229] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.209579] 
[   16.209985] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.210036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.210050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.210072] Call Trace:
[   16.210086]  <TASK>
[   16.210103]  dump_stack_lvl+0x73/0xb0
[   16.210160]  print_report+0xd1/0x610
[   16.210185]  ? __virt_addr_valid+0x1db/0x2d0
[   16.210210]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.210234]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.210260]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.210284]  kasan_report+0x141/0x180
[   16.210308]  ? kasan_atomics_helper+0x4f30/0x5450
[   16.210436]  __asan_report_load8_noabort+0x18/0x20
[   16.210479]  kasan_atomics_helper+0x4f30/0x5450
[   16.210505]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.210531]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.210561]  ? kasan_atomics+0x152/0x310
[   16.210589]  kasan_atomics+0x1dc/0x310
[   16.210614]  ? __pfx_kasan_atomics+0x10/0x10
[   16.210640]  ? __pfx_read_tsc+0x10/0x10
[   16.210663]  ? ktime_get_ts64+0x86/0x230
[   16.210690]  kunit_try_run_case+0x1a5/0x480
[   16.210717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.210743]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.210781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.210807]  ? __kthread_parkme+0x82/0x180
[   16.210831]  ? preempt_count_sub+0x50/0x80
[   16.210857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.210883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.210911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.210939]  kthread+0x337/0x6f0
[   16.210960]  ? trace_preempt_on+0x20/0xc0
[   16.210985]  ? __pfx_kthread+0x10/0x10
[   16.211007]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.211030]  ? calculate_sigpending+0x7b/0xa0
[   16.211056]  ? __pfx_kthread+0x10/0x10
[   16.211079]  ret_from_fork+0x116/0x1d0
[   16.211099]  ? __pfx_kthread+0x10/0x10
[   16.211121]  ret_from_fork_asm+0x1a/0x30
[   16.211154]  </TASK>
[   16.211166] 
[   16.224970] Allocated by task 282:
[   16.225331]  kasan_save_stack+0x45/0x70
[   16.225708]  kasan_save_track+0x18/0x40
[   16.226178]  kasan_save_alloc_info+0x3b/0x50
[   16.226606]  __kasan_kmalloc+0xb7/0xc0
[   16.226843]  __kmalloc_cache_noprof+0x189/0x420
[   16.227001]  kasan_atomics+0x95/0x310
[   16.227136]  kunit_try_run_case+0x1a5/0x480
[   16.227287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.227546]  kthread+0x337/0x6f0
[   16.228205]  ret_from_fork+0x116/0x1d0
[   16.228693]  ret_from_fork_asm+0x1a/0x30
[   16.229161] 
[   16.229347] The buggy address belongs to the object at ffff888103082e00
[   16.229347]  which belongs to the cache kmalloc-64 of size 64
[   16.230754] The buggy address is located 0 bytes to the right of
[   16.230754]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.231160] 
[   16.231242] The buggy address belongs to the physical page:
[   16.231414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.231888] flags: 0x200000000000000(node=0|zone=2)
[   16.232319] page_type: f5(slab)
[   16.232486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.233073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.233298] page dumped because: kasan: bad access detected
[   16.233485] 
[   16.233659] Memory state around the buggy address:
[   16.234122]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.234809]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.235434] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.236028]                                      ^
[   16.236186]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.236406]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.237052] ==================================================================
[   16.029261] ==================================================================
[   16.030044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   16.030753] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.031146] 
[   16.031244] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.031292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.031305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.031329] Call Trace:
[   16.031346]  <TASK>
[   16.031364]  dump_stack_lvl+0x73/0xb0
[   16.031396]  print_report+0xd1/0x610
[   16.031421]  ? __virt_addr_valid+0x1db/0x2d0
[   16.031455]  ? kasan_atomics_helper+0x1818/0x5450
[   16.031478]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.031504]  ? kasan_atomics_helper+0x1818/0x5450
[   16.031529]  kasan_report+0x141/0x180
[   16.031553]  ? kasan_atomics_helper+0x1818/0x5450
[   16.031582]  kasan_check_range+0x10c/0x1c0
[   16.031608]  __kasan_check_write+0x18/0x20
[   16.031630]  kasan_atomics_helper+0x1818/0x5450
[   16.031655]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.031681]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.031708]  ? kasan_atomics+0x152/0x310
[   16.031737]  kasan_atomics+0x1dc/0x310
[   16.031771]  ? __pfx_kasan_atomics+0x10/0x10
[   16.031798]  ? __pfx_read_tsc+0x10/0x10
[   16.031822]  ? ktime_get_ts64+0x86/0x230
[   16.031848]  kunit_try_run_case+0x1a5/0x480
[   16.031874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.031900]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.031926]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.031953]  ? __kthread_parkme+0x82/0x180
[   16.031976]  ? preempt_count_sub+0x50/0x80
[   16.032002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.032028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.032055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.032083]  kthread+0x337/0x6f0
[   16.032103]  ? trace_preempt_on+0x20/0xc0
[   16.032129]  ? __pfx_kthread+0x10/0x10
[   16.032151]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.032175]  ? calculate_sigpending+0x7b/0xa0
[   16.032201]  ? __pfx_kthread+0x10/0x10
[   16.032224]  ret_from_fork+0x116/0x1d0
[   16.032245]  ? __pfx_kthread+0x10/0x10
[   16.032267]  ret_from_fork_asm+0x1a/0x30
[   16.032299]  </TASK>
[   16.032310] 
[   16.044678] Allocated by task 282:
[   16.045008]  kasan_save_stack+0x45/0x70
[   16.045356]  kasan_save_track+0x18/0x40
[   16.045809]  kasan_save_alloc_info+0x3b/0x50
[   16.046201]  __kasan_kmalloc+0xb7/0xc0
[   16.046601]  __kmalloc_cache_noprof+0x189/0x420
[   16.047005]  kasan_atomics+0x95/0x310
[   16.047352]  kunit_try_run_case+0x1a5/0x480
[   16.047757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.048242]  kthread+0x337/0x6f0
[   16.048708]  ret_from_fork+0x116/0x1d0
[   16.049059]  ret_from_fork_asm+0x1a/0x30
[   16.049405] 
[   16.049593] The buggy address belongs to the object at ffff888103082e00
[   16.049593]  which belongs to the cache kmalloc-64 of size 64
[   16.050690] The buggy address is located 0 bytes to the right of
[   16.050690]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.051174] 
[   16.051253] The buggy address belongs to the physical page:
[   16.051430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.052134] flags: 0x200000000000000(node=0|zone=2)
[   16.052610] page_type: f5(slab)
[   16.052917] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.053598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.054241] page dumped because: kasan: bad access detected
[   16.054747] 
[   16.054918] Memory state around the buggy address:
[   16.055129]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.055354]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.055857] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.056453]                                      ^
[   16.056895]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.057493]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.058022] ==================================================================
[   16.297054] ==================================================================
[   16.297562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   16.297972] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.298532] 
[   16.298620] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.298665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.298678] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.298700] Call Trace:
[   16.298713]  <TASK>
[   16.298729]  dump_stack_lvl+0x73/0xb0
[   16.298757]  print_report+0xd1/0x610
[   16.298794]  ? __virt_addr_valid+0x1db/0x2d0
[   16.298856]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.298906]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.298932]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.298956]  kasan_report+0x141/0x180
[   16.298980]  ? kasan_atomics_helper+0x1eaa/0x5450
[   16.299009]  kasan_check_range+0x10c/0x1c0
[   16.299034]  __kasan_check_write+0x18/0x20
[   16.299087]  kasan_atomics_helper+0x1eaa/0x5450
[   16.299112]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.299138]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.299166]  ? kasan_atomics+0x152/0x310
[   16.299227]  kasan_atomics+0x1dc/0x310
[   16.299253]  ? __pfx_kasan_atomics+0x10/0x10
[   16.299279]  ? __pfx_read_tsc+0x10/0x10
[   16.299301]  ? ktime_get_ts64+0x86/0x230
[   16.299327]  kunit_try_run_case+0x1a5/0x480
[   16.299353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.299379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.299406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.299432]  ? __kthread_parkme+0x82/0x180
[   16.299493]  ? preempt_count_sub+0x50/0x80
[   16.299543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.299571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.299598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.299626]  kthread+0x337/0x6f0
[   16.299648]  ? trace_preempt_on+0x20/0xc0
[   16.299673]  ? __pfx_kthread+0x10/0x10
[   16.299695]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.299720]  ? calculate_sigpending+0x7b/0xa0
[   16.299746]  ? __pfx_kthread+0x10/0x10
[   16.299783]  ret_from_fork+0x116/0x1d0
[   16.299804]  ? __pfx_kthread+0x10/0x10
[   16.299827]  ret_from_fork_asm+0x1a/0x30
[   16.299860]  </TASK>
[   16.299872] 
[   16.308352] Allocated by task 282:
[   16.308594]  kasan_save_stack+0x45/0x70
[   16.308835]  kasan_save_track+0x18/0x40
[   16.308976]  kasan_save_alloc_info+0x3b/0x50
[   16.309135]  __kasan_kmalloc+0xb7/0xc0
[   16.309313]  __kmalloc_cache_noprof+0x189/0x420
[   16.309685]  kasan_atomics+0x95/0x310
[   16.309888]  kunit_try_run_case+0x1a5/0x480
[   16.310059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.310309]  kthread+0x337/0x6f0
[   16.310489]  ret_from_fork+0x116/0x1d0
[   16.310715]  ret_from_fork_asm+0x1a/0x30
[   16.310927] 
[   16.311028] The buggy address belongs to the object at ffff888103082e00
[   16.311028]  which belongs to the cache kmalloc-64 of size 64
[   16.311620] The buggy address is located 0 bytes to the right of
[   16.311620]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.312185] 
[   16.312314] The buggy address belongs to the physical page:
[   16.312630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.313026] flags: 0x200000000000000(node=0|zone=2)
[   16.313281] page_type: f5(slab)
[   16.313455] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.313829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.314190] page dumped because: kasan: bad access detected
[   16.314396] 
[   16.314537] Memory state around the buggy address:
[   16.314832]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.315201]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.315504] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.315912]                                      ^
[   16.316151]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.316421]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.316800] ==================================================================
[   16.276230] ==================================================================
[   16.276474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   16.276836] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.277324] 
[   16.277412] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.277456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.277469] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.277491] Call Trace:
[   16.277506]  <TASK>
[   16.277522]  dump_stack_lvl+0x73/0xb0
[   16.277552]  print_report+0xd1/0x610
[   16.277576]  ? __virt_addr_valid+0x1db/0x2d0
[   16.277601]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.277625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.277651]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.277675]  kasan_report+0x141/0x180
[   16.277699]  ? kasan_atomics_helper+0x1e12/0x5450
[   16.277727]  kasan_check_range+0x10c/0x1c0
[   16.277753]  __kasan_check_write+0x18/0x20
[   16.277788]  kasan_atomics_helper+0x1e12/0x5450
[   16.277813]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.277837]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.277865]  ? kasan_atomics+0x152/0x310
[   16.277892]  kasan_atomics+0x1dc/0x310
[   16.277916]  ? __pfx_kasan_atomics+0x10/0x10
[   16.277943]  ? __pfx_read_tsc+0x10/0x10
[   16.277965]  ? ktime_get_ts64+0x86/0x230
[   16.277991]  kunit_try_run_case+0x1a5/0x480
[   16.278018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.278043]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.278069]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.278096]  ? __kthread_parkme+0x82/0x180
[   16.278118]  ? preempt_count_sub+0x50/0x80
[   16.278144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.278172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.278198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.278227]  kthread+0x337/0x6f0
[   16.278247]  ? trace_preempt_on+0x20/0xc0
[   16.278272]  ? __pfx_kthread+0x10/0x10
[   16.278294]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.278318]  ? calculate_sigpending+0x7b/0xa0
[   16.278382]  ? __pfx_kthread+0x10/0x10
[   16.278407]  ret_from_fork+0x116/0x1d0
[   16.278453]  ? __pfx_kthread+0x10/0x10
[   16.278499]  ret_from_fork_asm+0x1a/0x30
[   16.278532]  </TASK>
[   16.278543] 
[   16.287490] Allocated by task 282:
[   16.287699]  kasan_save_stack+0x45/0x70
[   16.287930]  kasan_save_track+0x18/0x40
[   16.288115]  kasan_save_alloc_info+0x3b/0x50
[   16.288352]  __kasan_kmalloc+0xb7/0xc0
[   16.288610]  __kmalloc_cache_noprof+0x189/0x420
[   16.288856]  kasan_atomics+0x95/0x310
[   16.289047]  kunit_try_run_case+0x1a5/0x480
[   16.289253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.289553]  kthread+0x337/0x6f0
[   16.289725]  ret_from_fork+0x116/0x1d0
[   16.289889]  ret_from_fork_asm+0x1a/0x30
[   16.290119] 
[   16.290245] The buggy address belongs to the object at ffff888103082e00
[   16.290245]  which belongs to the cache kmalloc-64 of size 64
[   16.290803] The buggy address is located 0 bytes to the right of
[   16.290803]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.291339] 
[   16.291493] The buggy address belongs to the physical page:
[   16.291751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.292009] flags: 0x200000000000000(node=0|zone=2)
[   16.292170] page_type: f5(slab)
[   16.292289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.292551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.292929] page dumped because: kasan: bad access detected
[   16.293175] 
[   16.293267] Memory state around the buggy address:
[   16.293539]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.293869]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.294183] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.294392]                                      ^
[   16.294543]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.295055]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.295415] ==================================================================
[   16.151437] ==================================================================
[   16.151703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   16.151962] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.152263] 
[   16.152375] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.152420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.152434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.152468] Call Trace:
[   16.152485]  <TASK>
[   16.152501]  dump_stack_lvl+0x73/0xb0
[   16.152532]  print_report+0xd1/0x610
[   16.152557]  ? __virt_addr_valid+0x1db/0x2d0
[   16.152582]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.152606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.152631]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.152656]  kasan_report+0x141/0x180
[   16.152681]  ? kasan_atomics_helper+0x1b22/0x5450
[   16.152713]  kasan_check_range+0x10c/0x1c0
[   16.152742]  __kasan_check_write+0x18/0x20
[   16.152775]  kasan_atomics_helper+0x1b22/0x5450
[   16.152801]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.152827]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.152855]  ? kasan_atomics+0x152/0x310
[   16.152884]  kasan_atomics+0x1dc/0x310
[   16.152913]  ? __pfx_kasan_atomics+0x10/0x10
[   16.152941]  ? __pfx_read_tsc+0x10/0x10
[   16.152966]  ? ktime_get_ts64+0x86/0x230
[   16.152993]  kunit_try_run_case+0x1a5/0x480
[   16.153020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.153045]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.153073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.153099]  ? __kthread_parkme+0x82/0x180
[   16.153124]  ? preempt_count_sub+0x50/0x80
[   16.153149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.153177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.153203]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.153230]  kthread+0x337/0x6f0
[   16.153251]  ? trace_preempt_on+0x20/0xc0
[   16.153275]  ? __pfx_kthread+0x10/0x10
[   16.153298]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.153322]  ? calculate_sigpending+0x7b/0xa0
[   16.153349]  ? __pfx_kthread+0x10/0x10
[   16.153371]  ret_from_fork+0x116/0x1d0
[   16.153392]  ? __pfx_kthread+0x10/0x10
[   16.153415]  ret_from_fork_asm+0x1a/0x30
[   16.153462]  </TASK>
[   16.153474] 
[   16.166822] Allocated by task 282:
[   16.167275]  kasan_save_stack+0x45/0x70
[   16.167718]  kasan_save_track+0x18/0x40
[   16.167879]  kasan_save_alloc_info+0x3b/0x50
[   16.168035]  __kasan_kmalloc+0xb7/0xc0
[   16.168174]  __kmalloc_cache_noprof+0x189/0x420
[   16.168334]  kasan_atomics+0x95/0x310
[   16.168749]  kunit_try_run_case+0x1a5/0x480
[   16.169232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.169693]  kthread+0x337/0x6f0
[   16.169989]  ret_from_fork+0x116/0x1d0
[   16.170319]  ret_from_fork_asm+0x1a/0x30
[   16.170752] 
[   16.170995] The buggy address belongs to the object at ffff888103082e00
[   16.170995]  which belongs to the cache kmalloc-64 of size 64
[   16.171720] The buggy address is located 0 bytes to the right of
[   16.171720]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.172473] 
[   16.172702] The buggy address belongs to the physical page:
[   16.172964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.173296] flags: 0x200000000000000(node=0|zone=2)
[   16.173836] page_type: f5(slab)
[   16.174104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.174742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.175215] page dumped because: kasan: bad access detected
[   16.175602] 
[   16.175699] Memory state around the buggy address:
[   16.175929]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.176236]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.176909] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.177353]                                      ^
[   16.177864]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.178326]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.178859] ==================================================================
[   16.492602] ==================================================================
[   16.492947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   16.493577] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.494104] 
[   16.494215] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.494390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.494405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.494428] Call Trace:
[   16.494457]  <TASK>
[   16.494474]  dump_stack_lvl+0x73/0xb0
[   16.494509]  print_report+0xd1/0x610
[   16.494534]  ? __virt_addr_valid+0x1db/0x2d0
[   16.494558]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.494582]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.494608]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.494631]  kasan_report+0x141/0x180
[   16.494657]  ? kasan_atomics_helper+0x4fa5/0x5450
[   16.494686]  __asan_report_load8_noabort+0x18/0x20
[   16.494714]  kasan_atomics_helper+0x4fa5/0x5450
[   16.494739]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.494777]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.494805]  ? kasan_atomics+0x152/0x310
[   16.494832]  kasan_atomics+0x1dc/0x310
[   16.494857]  ? __pfx_kasan_atomics+0x10/0x10
[   16.494884]  ? __pfx_read_tsc+0x10/0x10
[   16.494907]  ? ktime_get_ts64+0x86/0x230
[   16.494934]  kunit_try_run_case+0x1a5/0x480
[   16.494961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.494987]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.495013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.495040]  ? __kthread_parkme+0x82/0x180
[   16.495062]  ? preempt_count_sub+0x50/0x80
[   16.495088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.495115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.495143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.495170]  kthread+0x337/0x6f0
[   16.495195]  ? trace_preempt_on+0x20/0xc0
[   16.495220]  ? __pfx_kthread+0x10/0x10
[   16.495242]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.495265]  ? calculate_sigpending+0x7b/0xa0
[   16.495291]  ? __pfx_kthread+0x10/0x10
[   16.495315]  ret_from_fork+0x116/0x1d0
[   16.495335]  ? __pfx_kthread+0x10/0x10
[   16.495357]  ret_from_fork_asm+0x1a/0x30
[   16.495390]  </TASK>
[   16.495402] 
[   16.506029] Allocated by task 282:
[   16.506338]  kasan_save_stack+0x45/0x70
[   16.506677]  kasan_save_track+0x18/0x40
[   16.506897]  kasan_save_alloc_info+0x3b/0x50
[   16.507098]  __kasan_kmalloc+0xb7/0xc0
[   16.507277]  __kmalloc_cache_noprof+0x189/0x420
[   16.507868]  kasan_atomics+0x95/0x310
[   16.508095]  kunit_try_run_case+0x1a5/0x480
[   16.508294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.508708]  kthread+0x337/0x6f0
[   16.509018]  ret_from_fork+0x116/0x1d0
[   16.509352]  ret_from_fork_asm+0x1a/0x30
[   16.509652] 
[   16.509908] The buggy address belongs to the object at ffff888103082e00
[   16.509908]  which belongs to the cache kmalloc-64 of size 64
[   16.510738] The buggy address is located 0 bytes to the right of
[   16.510738]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.511403] 
[   16.511833] The buggy address belongs to the physical page:
[   16.512134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.512686] flags: 0x200000000000000(node=0|zone=2)
[   16.513128] page_type: f5(slab)
[   16.513309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.513984] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.514410] page dumped because: kasan: bad access detected
[   16.514799] 
[   16.514900] Memory state around the buggy address:
[   16.515115]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.515418]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.515998] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.516596]                                      ^
[   16.516830]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.517136]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.517423] ==================================================================
[   16.317346] ==================================================================
[   16.317617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   16.318094] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.318601] 
[   16.318721] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.318816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.318830] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.318852] Call Trace:
[   16.318867]  <TASK>
[   16.318881]  dump_stack_lvl+0x73/0xb0
[   16.318948]  print_report+0xd1/0x610
[   16.319000]  ? __virt_addr_valid+0x1db/0x2d0
[   16.319025]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.319049]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.319076]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.319101]  kasan_report+0x141/0x180
[   16.319126]  ? kasan_atomics_helper+0x1f43/0x5450
[   16.319159]  kasan_check_range+0x10c/0x1c0
[   16.319193]  __kasan_check_write+0x18/0x20
[   16.319215]  kasan_atomics_helper+0x1f43/0x5450
[   16.319243]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.319269]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.319296]  ? kasan_atomics+0x152/0x310
[   16.319325]  kasan_atomics+0x1dc/0x310
[   16.319350]  ? __pfx_kasan_atomics+0x10/0x10
[   16.319377]  ? __pfx_read_tsc+0x10/0x10
[   16.319401]  ? ktime_get_ts64+0x86/0x230
[   16.319427]  kunit_try_run_case+0x1a5/0x480
[   16.319454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.319479]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.319506]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.319532]  ? __kthread_parkme+0x82/0x180
[   16.319555]  ? preempt_count_sub+0x50/0x80
[   16.319581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.319608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.319635]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.319699]  kthread+0x337/0x6f0
[   16.319745]  ? trace_preempt_on+0x20/0xc0
[   16.319969]  ? __pfx_kthread+0x10/0x10
[   16.320024]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.320049]  ? calculate_sigpending+0x7b/0xa0
[   16.320076]  ? __pfx_kthread+0x10/0x10
[   16.320099]  ret_from_fork+0x116/0x1d0
[   16.320120]  ? __pfx_kthread+0x10/0x10
[   16.320143]  ret_from_fork_asm+0x1a/0x30
[   16.320176]  </TASK>
[   16.320188] 
[   16.331063] Allocated by task 282:
[   16.331416]  kasan_save_stack+0x45/0x70
[   16.331638]  kasan_save_track+0x18/0x40
[   16.331827]  kasan_save_alloc_info+0x3b/0x50
[   16.332029]  __kasan_kmalloc+0xb7/0xc0
[   16.332200]  __kmalloc_cache_noprof+0x189/0x420
[   16.332404]  kasan_atomics+0x95/0x310
[   16.332919]  kunit_try_run_case+0x1a5/0x480
[   16.333194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.333511]  kthread+0x337/0x6f0
[   16.333811]  ret_from_fork+0x116/0x1d0
[   16.334100]  ret_from_fork_asm+0x1a/0x30
[   16.334397] 
[   16.334550] The buggy address belongs to the object at ffff888103082e00
[   16.334550]  which belongs to the cache kmalloc-64 of size 64
[   16.335330] The buggy address is located 0 bytes to the right of
[   16.335330]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.336031] 
[   16.336233] The buggy address belongs to the physical page:
[   16.336626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.336984] flags: 0x200000000000000(node=0|zone=2)
[   16.337203] page_type: f5(slab)
[   16.337367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.337972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.338367] page dumped because: kasan: bad access detected
[   16.338796] 
[   16.338909] Memory state around the buggy address:
[   16.339306]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.339723]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.340156] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.340565]                                      ^
[   16.340889]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341307]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.341713] ==================================================================
[   15.367072] ==================================================================
[   15.367388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   15.367883] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.368178] 
[   15.368294] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.368341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.368354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.368377] Call Trace:
[   15.368392]  <TASK>
[   15.368408]  dump_stack_lvl+0x73/0xb0
[   15.368441]  print_report+0xd1/0x610
[   15.368465]  ? __virt_addr_valid+0x1db/0x2d0
[   15.368491]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.368515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.368540]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.368565]  kasan_report+0x141/0x180
[   15.368589]  ? kasan_atomics_helper+0xa2b/0x5450
[   15.368617]  kasan_check_range+0x10c/0x1c0
[   15.368643]  __kasan_check_write+0x18/0x20
[   15.368664]  kasan_atomics_helper+0xa2b/0x5450
[   15.368690]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.368716]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.368745]  ? kasan_atomics+0x152/0x310
[   15.368786]  kasan_atomics+0x1dc/0x310
[   15.368811]  ? __pfx_kasan_atomics+0x10/0x10
[   15.368838]  ? __pfx_read_tsc+0x10/0x10
[   15.368861]  ? ktime_get_ts64+0x86/0x230
[   15.368888]  kunit_try_run_case+0x1a5/0x480
[   15.368914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.368939]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.368967]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.368994]  ? __kthread_parkme+0x82/0x180
[   15.369017]  ? preempt_count_sub+0x50/0x80
[   15.369044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.369071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.369098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.369126]  kthread+0x337/0x6f0
[   15.369147]  ? trace_preempt_on+0x20/0xc0
[   15.369173]  ? __pfx_kthread+0x10/0x10
[   15.369195]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.369219]  ? calculate_sigpending+0x7b/0xa0
[   15.369245]  ? __pfx_kthread+0x10/0x10
[   15.369268]  ret_from_fork+0x116/0x1d0
[   15.369289]  ? __pfx_kthread+0x10/0x10
[   15.369312]  ret_from_fork_asm+0x1a/0x30
[   15.369345]  </TASK>
[   15.369356] 
[   15.376894] Allocated by task 282:
[   15.377060]  kasan_save_stack+0x45/0x70
[   15.377212]  kasan_save_track+0x18/0x40
[   15.377354]  kasan_save_alloc_info+0x3b/0x50
[   15.377524]  __kasan_kmalloc+0xb7/0xc0
[   15.377721]  __kmalloc_cache_noprof+0x189/0x420
[   15.377959]  kasan_atomics+0x95/0x310
[   15.378154]  kunit_try_run_case+0x1a5/0x480
[   15.378372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.378630]  kthread+0x337/0x6f0
[   15.378811]  ret_from_fork+0x116/0x1d0
[   15.379025]  ret_from_fork_asm+0x1a/0x30
[   15.379202] 
[   15.379277] The buggy address belongs to the object at ffff888103082e00
[   15.379277]  which belongs to the cache kmalloc-64 of size 64
[   15.379789] The buggy address is located 0 bytes to the right of
[   15.379789]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.380297] 
[   15.380397] The buggy address belongs to the physical page:
[   15.380621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.380967] flags: 0x200000000000000(node=0|zone=2)
[   15.381204] page_type: f5(slab)
[   15.381376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.381696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.381964] page dumped because: kasan: bad access detected
[   15.382139] 
[   15.382211] Memory state around the buggy address:
[   15.382369]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.382646]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.382972] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.383421]                                      ^
[   15.383633]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.383864]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.384080] ==================================================================
[   15.149899] ==================================================================
[   15.151992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   15.153785] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.155138] 
[   15.155477] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.155531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.155546] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.155570] Call Trace:
[   15.155592]  <TASK>
[   15.155611]  dump_stack_lvl+0x73/0xb0
[   15.156006]  print_report+0xd1/0x610
[   15.156034]  ? __virt_addr_valid+0x1db/0x2d0
[   15.156073]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.156099]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.156163]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.156188]  kasan_report+0x141/0x180
[   15.156213]  ? kasan_atomics_helper+0x4b3a/0x5450
[   15.156242]  __asan_report_store4_noabort+0x1b/0x30
[   15.156271]  kasan_atomics_helper+0x4b3a/0x5450
[   15.156297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.156322]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.156351]  ? kasan_atomics+0x152/0x310
[   15.156380]  kasan_atomics+0x1dc/0x310
[   15.156406]  ? __pfx_kasan_atomics+0x10/0x10
[   15.156432]  ? __pfx_read_tsc+0x10/0x10
[   15.156466]  ? ktime_get_ts64+0x86/0x230
[   15.156493]  kunit_try_run_case+0x1a5/0x480
[   15.156521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.156546]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.156574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.156600]  ? __kthread_parkme+0x82/0x180
[   15.156624]  ? preempt_count_sub+0x50/0x80
[   15.156651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.156678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.156705]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.156733]  kthread+0x337/0x6f0
[   15.156754]  ? trace_preempt_on+0x20/0xc0
[   15.156799]  ? __pfx_kthread+0x10/0x10
[   15.156822]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.156845]  ? calculate_sigpending+0x7b/0xa0
[   15.156873]  ? __pfx_kthread+0x10/0x10
[   15.156898]  ret_from_fork+0x116/0x1d0
[   15.156919]  ? __pfx_kthread+0x10/0x10
[   15.156941]  ret_from_fork_asm+0x1a/0x30
[   15.156974]  </TASK>
[   15.156986] 
[   15.172552] Allocated by task 282:
[   15.172749]  kasan_save_stack+0x45/0x70
[   15.173356]  kasan_save_track+0x18/0x40
[   15.173667]  kasan_save_alloc_info+0x3b/0x50
[   15.174104]  __kasan_kmalloc+0xb7/0xc0
[   15.174443]  __kmalloc_cache_noprof+0x189/0x420
[   15.174823]  kasan_atomics+0x95/0x310
[   15.175305]  kunit_try_run_case+0x1a5/0x480
[   15.175630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.176162]  kthread+0x337/0x6f0
[   15.176305]  ret_from_fork+0x116/0x1d0
[   15.176727]  ret_from_fork_asm+0x1a/0x30
[   15.176947] 
[   15.177275] The buggy address belongs to the object at ffff888103082e00
[   15.177275]  which belongs to the cache kmalloc-64 of size 64
[   15.177945] The buggy address is located 0 bytes to the right of
[   15.177945]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.179337] 
[   15.179457] The buggy address belongs to the physical page:
[   15.179661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.180296] flags: 0x200000000000000(node=0|zone=2)
[   15.180860] page_type: f5(slab)
[   15.181132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.181426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.181823] page dumped because: kasan: bad access detected
[   15.182211] 
[   15.182316] Memory state around the buggy address:
[   15.182859]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.183376]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.184028] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.184567]                                      ^
[   15.184769]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.185306]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.185918] ==================================================================
[   15.450959] ==================================================================
[   15.451279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   15.451922] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.452402] 
[   15.452585] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.452634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.452648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.452670] Call Trace:
[   15.452685]  <TASK>
[   15.452700]  dump_stack_lvl+0x73/0xb0
[   15.452733]  print_report+0xd1/0x610
[   15.452772]  ? __virt_addr_valid+0x1db/0x2d0
[   15.452797]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.453110]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.453137]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.453162]  kasan_report+0x141/0x180
[   15.453187]  ? kasan_atomics_helper+0x4a84/0x5450
[   15.453217]  __asan_report_load4_noabort+0x18/0x20
[   15.453244]  kasan_atomics_helper+0x4a84/0x5450
[   15.453270]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.453296]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.453325]  ? kasan_atomics+0x152/0x310
[   15.453354]  kasan_atomics+0x1dc/0x310
[   15.453378]  ? __pfx_kasan_atomics+0x10/0x10
[   15.453405]  ? __pfx_read_tsc+0x10/0x10
[   15.453428]  ? ktime_get_ts64+0x86/0x230
[   15.453466]  kunit_try_run_case+0x1a5/0x480
[   15.453493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.453520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.453547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.453574]  ? __kthread_parkme+0x82/0x180
[   15.453597]  ? preempt_count_sub+0x50/0x80
[   15.453624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.453652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.453680]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.453708]  kthread+0x337/0x6f0
[   15.453729]  ? trace_preempt_on+0x20/0xc0
[   15.453755]  ? __pfx_kthread+0x10/0x10
[   15.453791]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.453814]  ? calculate_sigpending+0x7b/0xa0
[   15.453841]  ? __pfx_kthread+0x10/0x10
[   15.453864]  ret_from_fork+0x116/0x1d0
[   15.453884]  ? __pfx_kthread+0x10/0x10
[   15.453907]  ret_from_fork_asm+0x1a/0x30
[   15.453940]  </TASK>
[   15.453951] 
[   15.463455] Allocated by task 282:
[   15.463632]  kasan_save_stack+0x45/0x70
[   15.464004]  kasan_save_track+0x18/0x40
[   15.464206]  kasan_save_alloc_info+0x3b/0x50
[   15.464404]  __kasan_kmalloc+0xb7/0xc0
[   15.464720]  __kmalloc_cache_noprof+0x189/0x420
[   15.464940]  kasan_atomics+0x95/0x310
[   15.465136]  kunit_try_run_case+0x1a5/0x480
[   15.465333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.465770]  kthread+0x337/0x6f0
[   15.466009]  ret_from_fork+0x116/0x1d0
[   15.466199]  ret_from_fork_asm+0x1a/0x30
[   15.466509] 
[   15.466613] The buggy address belongs to the object at ffff888103082e00
[   15.466613]  which belongs to the cache kmalloc-64 of size 64
[   15.467217] The buggy address is located 0 bytes to the right of
[   15.467217]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.467902] 
[   15.468003] The buggy address belongs to the physical page:
[   15.468197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.468756] flags: 0x200000000000000(node=0|zone=2)
[   15.469009] page_type: f5(slab)
[   15.469167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.469656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.470039] page dumped because: kasan: bad access detected
[   15.470354] 
[   15.470450] Memory state around the buggy address:
[   15.470838]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.471195]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.471570] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.471828]                                      ^
[   15.472136]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.472611]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.472919] ==================================================================
[   14.989907] ==================================================================
[   14.991715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   14.992159] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   14.992502] 
[   14.992658] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.992706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.992749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.992789] Call Trace:
[   14.992801]  <TASK>
[   14.992818]  dump_stack_lvl+0x73/0xb0
[   14.992850]  print_report+0xd1/0x610
[   14.992874]  ? __virt_addr_valid+0x1db/0x2d0
[   14.992899]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.992922]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.992947]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.992970]  kasan_report+0x141/0x180
[   14.993009]  ? kasan_atomics_helper+0x4bbc/0x5450
[   14.993037]  __asan_report_load4_noabort+0x18/0x20
[   14.993063]  kasan_atomics_helper+0x4bbc/0x5450
[   14.993087]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.993138]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.993167]  ? kasan_atomics+0x152/0x310
[   14.993207]  kasan_atomics+0x1dc/0x310
[   14.993231]  ? __pfx_kasan_atomics+0x10/0x10
[   14.993257]  ? __pfx_read_tsc+0x10/0x10
[   14.993279]  ? ktime_get_ts64+0x86/0x230
[   14.993306]  kunit_try_run_case+0x1a5/0x480
[   14.993333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993358]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.993384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.993409]  ? __kthread_parkme+0x82/0x180
[   14.993432]  ? preempt_count_sub+0x50/0x80
[   14.993467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.993494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.993520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.993546]  kthread+0x337/0x6f0
[   14.993566]  ? trace_preempt_on+0x20/0xc0
[   14.993591]  ? __pfx_kthread+0x10/0x10
[   14.993612]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.993635]  ? calculate_sigpending+0x7b/0xa0
[   14.993661]  ? __pfx_kthread+0x10/0x10
[   14.993684]  ret_from_fork+0x116/0x1d0
[   14.993704]  ? __pfx_kthread+0x10/0x10
[   14.993725]  ret_from_fork_asm+0x1a/0x30
[   14.993767]  </TASK>
[   14.993778] 
[   15.002540] Allocated by task 282:
[   15.002728]  kasan_save_stack+0x45/0x70
[   15.002995]  kasan_save_track+0x18/0x40
[   15.003251]  kasan_save_alloc_info+0x3b/0x50
[   15.003461]  __kasan_kmalloc+0xb7/0xc0
[   15.003598]  __kmalloc_cache_noprof+0x189/0x420
[   15.003770]  kasan_atomics+0x95/0x310
[   15.004145]  kunit_try_run_case+0x1a5/0x480
[   15.004374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.004772]  kthread+0x337/0x6f0
[   15.005031]  ret_from_fork+0x116/0x1d0
[   15.005282]  ret_from_fork_asm+0x1a/0x30
[   15.005431] 
[   15.005505] The buggy address belongs to the object at ffff888103082e00
[   15.005505]  which belongs to the cache kmalloc-64 of size 64
[   15.006336] The buggy address is located 0 bytes to the right of
[   15.006336]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.006872] 
[   15.007047] The buggy address belongs to the physical page:
[   15.007362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.007756] flags: 0x200000000000000(node=0|zone=2)
[   15.007940] page_type: f5(slab)
[   15.008066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.008706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.009078] page dumped because: kasan: bad access detected
[   15.009411] 
[   15.009565] Memory state around the buggy address:
[   15.009814]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.010250]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.010541] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.010882]                                      ^
[   15.011271]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.011623]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.011968] ==================================================================
[   16.394363] ==================================================================
[   16.394961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   16.395405] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.395814] 
[   16.396032] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.396275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.396290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.396312] Call Trace:
[   16.396328]  <TASK>
[   16.396343]  dump_stack_lvl+0x73/0xb0
[   16.396375]  print_report+0xd1/0x610
[   16.396399]  ? __virt_addr_valid+0x1db/0x2d0
[   16.396423]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.396463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.396489]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.396513]  kasan_report+0x141/0x180
[   16.396537]  ? kasan_atomics_helper+0x4f98/0x5450
[   16.396566]  __asan_report_load8_noabort+0x18/0x20
[   16.396593]  kasan_atomics_helper+0x4f98/0x5450
[   16.396618]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.396643]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.396671]  ? kasan_atomics+0x152/0x310
[   16.396700]  kasan_atomics+0x1dc/0x310
[   16.396724]  ? __pfx_kasan_atomics+0x10/0x10
[   16.396751]  ? __pfx_read_tsc+0x10/0x10
[   16.396786]  ? ktime_get_ts64+0x86/0x230
[   16.396812]  kunit_try_run_case+0x1a5/0x480
[   16.396840]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.396865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.396892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.396918]  ? __kthread_parkme+0x82/0x180
[   16.396940]  ? preempt_count_sub+0x50/0x80
[   16.396966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.396993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.397020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.397048]  kthread+0x337/0x6f0
[   16.397068]  ? trace_preempt_on+0x20/0xc0
[   16.397094]  ? __pfx_kthread+0x10/0x10
[   16.397116]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.397139]  ? calculate_sigpending+0x7b/0xa0
[   16.397166]  ? __pfx_kthread+0x10/0x10
[   16.397188]  ret_from_fork+0x116/0x1d0
[   16.397209]  ? __pfx_kthread+0x10/0x10
[   16.397231]  ret_from_fork_asm+0x1a/0x30
[   16.397263]  </TASK>
[   16.397275] 
[   16.407525] Allocated by task 282:
[   16.408039]  kasan_save_stack+0x45/0x70
[   16.408319]  kasan_save_track+0x18/0x40
[   16.408595]  kasan_save_alloc_info+0x3b/0x50
[   16.408920]  __kasan_kmalloc+0xb7/0xc0
[   16.409114]  __kmalloc_cache_noprof+0x189/0x420
[   16.409492]  kasan_atomics+0x95/0x310
[   16.409706]  kunit_try_run_case+0x1a5/0x480
[   16.410069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.410397]  kthread+0x337/0x6f0
[   16.410698]  ret_from_fork+0x116/0x1d0
[   16.410860]  ret_from_fork_asm+0x1a/0x30
[   16.411211] 
[   16.411295] The buggy address belongs to the object at ffff888103082e00
[   16.411295]  which belongs to the cache kmalloc-64 of size 64
[   16.412058] The buggy address is located 0 bytes to the right of
[   16.412058]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.412759] 
[   16.413010] The buggy address belongs to the physical page:
[   16.413243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.413620] flags: 0x200000000000000(node=0|zone=2)
[   16.413881] page_type: f5(slab)
[   16.414261] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.414785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.415099] page dumped because: kasan: bad access detected
[   16.415456] 
[   16.415641] Memory state around the buggy address:
[   16.415978]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.416367]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.416844] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.417191]                                      ^
[   16.417425]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.417872]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.418240] ==================================================================
[   15.212443] ==================================================================
[   15.212737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   15.213479] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.213841] 
[   15.214135] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.214185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.214199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.214222] Call Trace:
[   15.214239]  <TASK>
[   15.214255]  dump_stack_lvl+0x73/0xb0
[   15.214288]  print_report+0xd1/0x610
[   15.214314]  ? __virt_addr_valid+0x1db/0x2d0
[   15.214466]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.214490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.214516]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.214540]  kasan_report+0x141/0x180
[   15.214565]  ? kasan_atomics_helper+0x5fe/0x5450
[   15.214593]  kasan_check_range+0x10c/0x1c0
[   15.214619]  __kasan_check_write+0x18/0x20
[   15.214641]  kasan_atomics_helper+0x5fe/0x5450
[   15.214665]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.214690]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.214717]  ? kasan_atomics+0x152/0x310
[   15.214746]  kasan_atomics+0x1dc/0x310
[   15.214783]  ? __pfx_kasan_atomics+0x10/0x10
[   15.214810]  ? __pfx_read_tsc+0x10/0x10
[   15.214833]  ? ktime_get_ts64+0x86/0x230
[   15.214859]  kunit_try_run_case+0x1a5/0x480
[   15.214887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.214914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.214941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.214969]  ? __kthread_parkme+0x82/0x180
[   15.214995]  ? preempt_count_sub+0x50/0x80
[   15.215021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.215048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.215075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.215104]  kthread+0x337/0x6f0
[   15.215125]  ? trace_preempt_on+0x20/0xc0
[   15.215151]  ? __pfx_kthread+0x10/0x10
[   15.215174]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.215201]  ? calculate_sigpending+0x7b/0xa0
[   15.215228]  ? __pfx_kthread+0x10/0x10
[   15.215251]  ret_from_fork+0x116/0x1d0
[   15.215272]  ? __pfx_kthread+0x10/0x10
[   15.215294]  ret_from_fork_asm+0x1a/0x30
[   15.215327]  </TASK>
[   15.215338] 
[   15.226475] Allocated by task 282:
[   15.226754]  kasan_save_stack+0x45/0x70
[   15.226968]  kasan_save_track+0x18/0x40
[   15.227467]  kasan_save_alloc_info+0x3b/0x50
[   15.227632]  __kasan_kmalloc+0xb7/0xc0
[   15.227965]  __kmalloc_cache_noprof+0x189/0x420
[   15.228371]  kasan_atomics+0x95/0x310
[   15.228550]  kunit_try_run_case+0x1a5/0x480
[   15.228915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.229379]  kthread+0x337/0x6f0
[   15.229581]  ret_from_fork+0x116/0x1d0
[   15.229771]  ret_from_fork_asm+0x1a/0x30
[   15.229953] 
[   15.230309] The buggy address belongs to the object at ffff888103082e00
[   15.230309]  which belongs to the cache kmalloc-64 of size 64
[   15.230943] The buggy address is located 0 bytes to the right of
[   15.230943]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.231681] 
[   15.231807] The buggy address belongs to the physical page:
[   15.232186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.232743] flags: 0x200000000000000(node=0|zone=2)
[   15.233085] page_type: f5(slab)
[   15.233277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.233819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.234276] page dumped because: kasan: bad access detected
[   15.234649] 
[   15.234832] Memory state around the buggy address:
[   15.235191]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.235552]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.235837] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.236277]                                      ^
[   15.236449]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.237006]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.237385] ==================================================================
[   15.952776] ==================================================================
[   15.953087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   15.953412] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.953712] 
[   15.953808] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.953851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.953864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.953886] Call Trace:
[   15.953899]  <TASK>
[   15.953913]  dump_stack_lvl+0x73/0xb0
[   15.953942]  print_report+0xd1/0x610
[   15.953967]  ? __virt_addr_valid+0x1db/0x2d0
[   15.953992]  ? kasan_atomics_helper+0x164f/0x5450
[   15.954015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.954040]  ? kasan_atomics_helper+0x164f/0x5450
[   15.954064]  kasan_report+0x141/0x180
[   15.954087]  ? kasan_atomics_helper+0x164f/0x5450
[   15.954116]  kasan_check_range+0x10c/0x1c0
[   15.954141]  __kasan_check_write+0x18/0x20
[   15.954163]  kasan_atomics_helper+0x164f/0x5450
[   15.954187]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.954211]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.954239]  ? kasan_atomics+0x152/0x310
[   15.954267]  kasan_atomics+0x1dc/0x310
[   15.954291]  ? __pfx_kasan_atomics+0x10/0x10
[   15.954317]  ? __pfx_read_tsc+0x10/0x10
[   15.954339]  ? ktime_get_ts64+0x86/0x230
[   15.954365]  kunit_try_run_case+0x1a5/0x480
[   15.954392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.954417]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.954444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.954469]  ? __kthread_parkme+0x82/0x180
[   15.954492]  ? preempt_count_sub+0x50/0x80
[   15.954518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.954546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.954574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.954612]  kthread+0x337/0x6f0
[   15.954634]  ? trace_preempt_on+0x20/0xc0
[   15.954659]  ? __pfx_kthread+0x10/0x10
[   15.954681]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.954706]  ? calculate_sigpending+0x7b/0xa0
[   15.954733]  ? __pfx_kthread+0x10/0x10
[   15.954756]  ret_from_fork+0x116/0x1d0
[   15.954788]  ? __pfx_kthread+0x10/0x10
[   15.954810]  ret_from_fork_asm+0x1a/0x30
[   15.954843]  </TASK>
[   15.954854] 
[   15.962521] Allocated by task 282:
[   15.962677]  kasan_save_stack+0x45/0x70
[   15.962882]  kasan_save_track+0x18/0x40
[   15.963060]  kasan_save_alloc_info+0x3b/0x50
[   15.963278]  __kasan_kmalloc+0xb7/0xc0
[   15.963414]  __kmalloc_cache_noprof+0x189/0x420
[   15.963673]  kasan_atomics+0x95/0x310
[   15.963831]  kunit_try_run_case+0x1a5/0x480
[   15.964039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.964221]  kthread+0x337/0x6f0
[   15.964386]  ret_from_fork+0x116/0x1d0
[   15.964519]  ret_from_fork_asm+0x1a/0x30
[   15.964662] 
[   15.964756] The buggy address belongs to the object at ffff888103082e00
[   15.964756]  which belongs to the cache kmalloc-64 of size 64
[   15.965274] The buggy address is located 0 bytes to the right of
[   15.965274]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.965948] 
[   15.966044] The buggy address belongs to the physical page:
[   15.966242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.966577] flags: 0x200000000000000(node=0|zone=2)
[   15.966740] page_type: f5(slab)
[   15.966894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.967242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.967607] page dumped because: kasan: bad access detected
[   15.967821] 
[   15.967892] Memory state around the buggy address:
[   15.968043]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.968255]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.968465] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.968737]                                      ^
[   15.968965]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.969275]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.969617] ==================================================================
[   15.348023] ==================================================================
[   15.348370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   15.348962] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.349260] 
[   15.349377] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.349423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.349437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.349472] Call Trace:
[   15.349490]  <TASK>
[   15.349507]  dump_stack_lvl+0x73/0xb0
[   15.349541]  print_report+0xd1/0x610
[   15.349566]  ? __virt_addr_valid+0x1db/0x2d0
[   15.349593]  ? kasan_atomics_helper+0x992/0x5450
[   15.349617]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.349642]  ? kasan_atomics_helper+0x992/0x5450
[   15.349667]  kasan_report+0x141/0x180
[   15.349690]  ? kasan_atomics_helper+0x992/0x5450
[   15.349718]  kasan_check_range+0x10c/0x1c0
[   15.349744]  __kasan_check_write+0x18/0x20
[   15.349778]  kasan_atomics_helper+0x992/0x5450
[   15.349803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.349829]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.349857]  ? kasan_atomics+0x152/0x310
[   15.349886]  kasan_atomics+0x1dc/0x310
[   15.349911]  ? __pfx_kasan_atomics+0x10/0x10
[   15.349938]  ? __pfx_read_tsc+0x10/0x10
[   15.349961]  ? ktime_get_ts64+0x86/0x230
[   15.349988]  kunit_try_run_case+0x1a5/0x480
[   15.350015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.350040]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.350069]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.350095]  ? __kthread_parkme+0x82/0x180
[   15.350118]  ? preempt_count_sub+0x50/0x80
[   15.350144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.350171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.350198]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.350225]  kthread+0x337/0x6f0
[   15.350246]  ? trace_preempt_on+0x20/0xc0
[   15.350271]  ? __pfx_kthread+0x10/0x10
[   15.350293]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.350317]  ? calculate_sigpending+0x7b/0xa0
[   15.350343]  ? __pfx_kthread+0x10/0x10
[   15.350366]  ret_from_fork+0x116/0x1d0
[   15.350386]  ? __pfx_kthread+0x10/0x10
[   15.350409]  ret_from_fork_asm+0x1a/0x30
[   15.350440]  </TASK>
[   15.350452] 
[   15.358089] Allocated by task 282:
[   15.358251]  kasan_save_stack+0x45/0x70
[   15.358463]  kasan_save_track+0x18/0x40
[   15.358609]  kasan_save_alloc_info+0x3b/0x50
[   15.358824]  __kasan_kmalloc+0xb7/0xc0
[   15.358993]  __kmalloc_cache_noprof+0x189/0x420
[   15.359153]  kasan_atomics+0x95/0x310
[   15.359350]  kunit_try_run_case+0x1a5/0x480
[   15.360313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.360708]  kthread+0x337/0x6f0
[   15.360875]  ret_from_fork+0x116/0x1d0
[   15.361077]  ret_from_fork_asm+0x1a/0x30
[   15.361245] 
[   15.361344] The buggy address belongs to the object at ffff888103082e00
[   15.361344]  which belongs to the cache kmalloc-64 of size 64
[   15.361908] The buggy address is located 0 bytes to the right of
[   15.361908]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.362308] 
[   15.362384] The buggy address belongs to the physical page:
[   15.362563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.362922] flags: 0x200000000000000(node=0|zone=2)
[   15.363171] page_type: f5(slab)
[   15.363346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.363585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.363827] page dumped because: kasan: bad access detected
[   15.364007] 
[   15.364096] Memory state around the buggy address:
[   15.364326]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.364935]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.365265] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.365690]                                      ^
[   15.365903]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.366155]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.366420] ==================================================================
[   15.474187] ==================================================================
[   15.474595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   15.475134] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.476145] 
[   15.476515] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.476567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.476582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.476606] Call Trace:
[   15.476624]  <TASK>
[   15.476640]  dump_stack_lvl+0x73/0xb0
[   15.476674]  print_report+0xd1/0x610
[   15.476699]  ? __virt_addr_valid+0x1db/0x2d0
[   15.476724]  ? kasan_atomics_helper+0xd47/0x5450
[   15.476749]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.476785]  ? kasan_atomics_helper+0xd47/0x5450
[   15.476809]  kasan_report+0x141/0x180
[   15.476833]  ? kasan_atomics_helper+0xd47/0x5450
[   15.476861]  kasan_check_range+0x10c/0x1c0
[   15.476887]  __kasan_check_write+0x18/0x20
[   15.476909]  kasan_atomics_helper+0xd47/0x5450
[   15.476934]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.476959]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.476987]  ? kasan_atomics+0x152/0x310
[   15.477015]  kasan_atomics+0x1dc/0x310
[   15.477041]  ? __pfx_kasan_atomics+0x10/0x10
[   15.477069]  ? __pfx_read_tsc+0x10/0x10
[   15.477092]  ? ktime_get_ts64+0x86/0x230
[   15.477119]  kunit_try_run_case+0x1a5/0x480
[   15.477145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.477170]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.477198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.477225]  ? __kthread_parkme+0x82/0x180
[   15.477247]  ? preempt_count_sub+0x50/0x80
[   15.477273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.477301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.477328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.477356]  kthread+0x337/0x6f0
[   15.477377]  ? trace_preempt_on+0x20/0xc0
[   15.477403]  ? __pfx_kthread+0x10/0x10
[   15.477425]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.477597]  ? calculate_sigpending+0x7b/0xa0
[   15.477631]  ? __pfx_kthread+0x10/0x10
[   15.477696]  ret_from_fork+0x116/0x1d0
[   15.477719]  ? __pfx_kthread+0x10/0x10
[   15.477741]  ret_from_fork_asm+0x1a/0x30
[   15.477783]  </TASK>
[   15.477797] 
[   15.493149] Allocated by task 282:
[   15.493304]  kasan_save_stack+0x45/0x70
[   15.493802]  kasan_save_track+0x18/0x40
[   15.494181]  kasan_save_alloc_info+0x3b/0x50
[   15.494550]  __kasan_kmalloc+0xb7/0xc0
[   15.494744]  __kmalloc_cache_noprof+0x189/0x420
[   15.494959]  kasan_atomics+0x95/0x310
[   15.495138]  kunit_try_run_case+0x1a5/0x480
[   15.495325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.496028]  kthread+0x337/0x6f0
[   15.496235]  ret_from_fork+0x116/0x1d0
[   15.496774]  ret_from_fork_asm+0x1a/0x30
[   15.497293] 
[   15.497417] The buggy address belongs to the object at ffff888103082e00
[   15.497417]  which belongs to the cache kmalloc-64 of size 64
[   15.498175] The buggy address is located 0 bytes to the right of
[   15.498175]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.499117] 
[   15.499245] The buggy address belongs to the physical page:
[   15.499621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.500441] flags: 0x200000000000000(node=0|zone=2)
[   15.500884] page_type: f5(slab)
[   15.501051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.501368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.502262] page dumped because: kasan: bad access detected
[   15.502881] 
[   15.503155] Memory state around the buggy address:
[   15.503724]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.504135]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.504684] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.505142]                                      ^
[   15.505368]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.506182]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.506841] ==================================================================
[   15.931833] ==================================================================
[   15.933076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   15.933446] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.934421] 
[   15.934520] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.934568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.934582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.934606] Call Trace:
[   15.934621]  <TASK>
[   15.934638]  dump_stack_lvl+0x73/0xb0
[   15.934672]  print_report+0xd1/0x610
[   15.934697]  ? __virt_addr_valid+0x1db/0x2d0
[   15.934722]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.934745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.934787]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.934812]  kasan_report+0x141/0x180
[   15.934835]  ? kasan_atomics_helper+0x15b6/0x5450
[   15.934863]  kasan_check_range+0x10c/0x1c0
[   15.934889]  __kasan_check_write+0x18/0x20
[   15.934910]  kasan_atomics_helper+0x15b6/0x5450
[   15.934934]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.934958]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.934985]  ? kasan_atomics+0x152/0x310
[   15.935015]  kasan_atomics+0x1dc/0x310
[   15.935038]  ? __pfx_kasan_atomics+0x10/0x10
[   15.935067]  ? __pfx_read_tsc+0x10/0x10
[   15.935093]  ? ktime_get_ts64+0x86/0x230
[   15.935122]  kunit_try_run_case+0x1a5/0x480
[   15.935149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.935174]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.935207]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.935233]  ? __kthread_parkme+0x82/0x180
[   15.935255]  ? preempt_count_sub+0x50/0x80
[   15.935281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.935309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.935336]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.935364]  kthread+0x337/0x6f0
[   15.935385]  ? trace_preempt_on+0x20/0xc0
[   15.935410]  ? __pfx_kthread+0x10/0x10
[   15.935433]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.935456]  ? calculate_sigpending+0x7b/0xa0
[   15.935483]  ? __pfx_kthread+0x10/0x10
[   15.935506]  ret_from_fork+0x116/0x1d0
[   15.935528]  ? __pfx_kthread+0x10/0x10
[   15.935552]  ret_from_fork_asm+0x1a/0x30
[   15.935585]  </TASK>
[   15.935596] 
[   15.944397] Allocated by task 282:
[   15.944535]  kasan_save_stack+0x45/0x70
[   15.944702]  kasan_save_track+0x18/0x40
[   15.944926]  kasan_save_alloc_info+0x3b/0x50
[   15.945141]  __kasan_kmalloc+0xb7/0xc0
[   15.945329]  __kmalloc_cache_noprof+0x189/0x420
[   15.945618]  kasan_atomics+0x95/0x310
[   15.945804]  kunit_try_run_case+0x1a5/0x480
[   15.945982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.946162]  kthread+0x337/0x6f0
[   15.946286]  ret_from_fork+0x116/0x1d0
[   15.946471]  ret_from_fork_asm+0x1a/0x30
[   15.946669] 
[   15.946779] The buggy address belongs to the object at ffff888103082e00
[   15.946779]  which belongs to the cache kmalloc-64 of size 64
[   15.947317] The buggy address is located 0 bytes to the right of
[   15.947317]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.947921] 
[   15.948020] The buggy address belongs to the physical page:
[   15.948263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.948631] flags: 0x200000000000000(node=0|zone=2)
[   15.948808] page_type: f5(slab)
[   15.948933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.949186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.949519] page dumped because: kasan: bad access detected
[   15.949967] 
[   15.950071] Memory state around the buggy address:
[   15.950298]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.950628]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.950859] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.951092]                                      ^
[   15.951324]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.951834]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.952137] ==================================================================
[   15.842863] ==================================================================
[   15.843252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   15.843533] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.843883] 
[   15.843994] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.844039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.844051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.844074] Call Trace:
[   15.844088]  <TASK>
[   15.844102]  dump_stack_lvl+0x73/0xb0
[   15.844132]  print_report+0xd1/0x610
[   15.844157]  ? __virt_addr_valid+0x1db/0x2d0
[   15.844183]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.844207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.844233]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.844257]  kasan_report+0x141/0x180
[   15.844282]  ? kasan_atomics_helper+0x4eae/0x5450
[   15.844311]  __asan_report_load8_noabort+0x18/0x20
[   15.844340]  kasan_atomics_helper+0x4eae/0x5450
[   15.844365]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.844390]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.844417]  ? kasan_atomics+0x152/0x310
[   15.844454]  kasan_atomics+0x1dc/0x310
[   15.844479]  ? __pfx_kasan_atomics+0x10/0x10
[   15.844505]  ? __pfx_read_tsc+0x10/0x10
[   15.844528]  ? ktime_get_ts64+0x86/0x230
[   15.844554]  kunit_try_run_case+0x1a5/0x480
[   15.844581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.844607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.844633]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.844660]  ? __kthread_parkme+0x82/0x180
[   15.844682]  ? preempt_count_sub+0x50/0x80
[   15.844707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.844736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.844775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.844803]  kthread+0x337/0x6f0
[   15.844824]  ? trace_preempt_on+0x20/0xc0
[   15.844849]  ? __pfx_kthread+0x10/0x10
[   15.844871]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.844894]  ? calculate_sigpending+0x7b/0xa0
[   15.844921]  ? __pfx_kthread+0x10/0x10
[   15.844944]  ret_from_fork+0x116/0x1d0
[   15.844964]  ? __pfx_kthread+0x10/0x10
[   15.844987]  ret_from_fork_asm+0x1a/0x30
[   15.845018]  </TASK>
[   15.845029] 
[   15.852270] Allocated by task 282:
[   15.852431]  kasan_save_stack+0x45/0x70
[   15.852641]  kasan_save_track+0x18/0x40
[   15.852809]  kasan_save_alloc_info+0x3b/0x50
[   15.853031]  __kasan_kmalloc+0xb7/0xc0
[   15.853184]  __kmalloc_cache_noprof+0x189/0x420
[   15.853389]  kasan_atomics+0x95/0x310
[   15.853572]  kunit_try_run_case+0x1a5/0x480
[   15.853791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.854028]  kthread+0x337/0x6f0
[   15.854177]  ret_from_fork+0x116/0x1d0
[   15.854326]  ret_from_fork_asm+0x1a/0x30
[   15.854590] 
[   15.854775] The buggy address belongs to the object at ffff888103082e00
[   15.854775]  which belongs to the cache kmalloc-64 of size 64
[   15.855203] The buggy address is located 0 bytes to the right of
[   15.855203]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.855571] 
[   15.855643] The buggy address belongs to the physical page:
[   15.855850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.856284] flags: 0x200000000000000(node=0|zone=2)
[   15.856515] page_type: f5(slab)
[   15.856658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.856900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.857129] page dumped because: kasan: bad access detected
[   15.857302] 
[   15.857390] Memory state around the buggy address:
[   15.857832]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.858151]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.858471] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.858960]                                      ^
[   15.859166]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.859387]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.859602] ==================================================================
[   15.991612] ==================================================================
[   15.992369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   15.993336] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.994150] 
[   15.994458] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.994515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.994529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.994553] Call Trace:
[   15.994570]  <TASK>
[   15.994587]  dump_stack_lvl+0x73/0xb0
[   15.994621]  print_report+0xd1/0x610
[   15.994646]  ? __virt_addr_valid+0x1db/0x2d0
[   15.994672]  ? kasan_atomics_helper+0x177f/0x5450
[   15.994696]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.994722]  ? kasan_atomics_helper+0x177f/0x5450
[   15.994747]  kasan_report+0x141/0x180
[   15.994783]  ? kasan_atomics_helper+0x177f/0x5450
[   15.994812]  kasan_check_range+0x10c/0x1c0
[   15.994838]  __kasan_check_write+0x18/0x20
[   15.994859]  kasan_atomics_helper+0x177f/0x5450
[   15.994884]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.994909]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.994936]  ? kasan_atomics+0x152/0x310
[   15.994965]  kasan_atomics+0x1dc/0x310
[   15.994989]  ? __pfx_kasan_atomics+0x10/0x10
[   15.995015]  ? __pfx_read_tsc+0x10/0x10
[   15.995037]  ? ktime_get_ts64+0x86/0x230
[   15.995064]  kunit_try_run_case+0x1a5/0x480
[   15.995091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.995116]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.995143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.995169]  ? __kthread_parkme+0x82/0x180
[   15.995198]  ? preempt_count_sub+0x50/0x80
[   15.995223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.995252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.995279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.995307]  kthread+0x337/0x6f0
[   15.995328]  ? trace_preempt_on+0x20/0xc0
[   15.995352]  ? __pfx_kthread+0x10/0x10
[   15.995374]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.995398]  ? calculate_sigpending+0x7b/0xa0
[   15.995431]  ? __pfx_kthread+0x10/0x10
[   15.995453]  ret_from_fork+0x116/0x1d0
[   15.995474]  ? __pfx_kthread+0x10/0x10
[   15.995496]  ret_from_fork_asm+0x1a/0x30
[   15.995529]  </TASK>
[   15.995540] 
[   16.011871] Allocated by task 282:
[   16.012258]  kasan_save_stack+0x45/0x70
[   16.012778]  kasan_save_track+0x18/0x40
[   16.013194]  kasan_save_alloc_info+0x3b/0x50
[   16.013359]  __kasan_kmalloc+0xb7/0xc0
[   16.013879]  __kmalloc_cache_noprof+0x189/0x420
[   16.014484]  kasan_atomics+0x95/0x310
[   16.014961]  kunit_try_run_case+0x1a5/0x480
[   16.015123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.015311]  kthread+0x337/0x6f0
[   16.015664]  ret_from_fork+0x116/0x1d0
[   16.016192]  ret_from_fork_asm+0x1a/0x30
[   16.016757] 
[   16.017063] The buggy address belongs to the object at ffff888103082e00
[   16.017063]  which belongs to the cache kmalloc-64 of size 64
[   16.018227] The buggy address is located 0 bytes to the right of
[   16.018227]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.019364] 
[   16.019700] The buggy address belongs to the physical page:
[   16.020201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.020673] flags: 0x200000000000000(node=0|zone=2)
[   16.021256] page_type: f5(slab)
[   16.021757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.022293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.022948] page dumped because: kasan: bad access detected
[   16.023638] 
[   16.023957] Memory state around the buggy address:
[   16.024158]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.024384]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.025375] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.026253]                                      ^
[   16.026676]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.027173]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.027400] ==================================================================
[   16.257217] ==================================================================
[   16.257445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   16.257966] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.258365] 
[   16.258476] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.258538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.258566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.258603] Call Trace:
[   16.258617]  <TASK>
[   16.258644]  dump_stack_lvl+0x73/0xb0
[   16.258675]  print_report+0xd1/0x610
[   16.258714]  ? __virt_addr_valid+0x1db/0x2d0
[   16.258752]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.258786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.258824]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.258860]  kasan_report+0x141/0x180
[   16.258883]  ? kasan_atomics_helper+0x1d7a/0x5450
[   16.258923]  kasan_check_range+0x10c/0x1c0
[   16.258949]  __kasan_check_write+0x18/0x20
[   16.258971]  kasan_atomics_helper+0x1d7a/0x5450
[   16.258997]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.259022]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.259050]  ? kasan_atomics+0x152/0x310
[   16.259080]  kasan_atomics+0x1dc/0x310
[   16.259106]  ? __pfx_kasan_atomics+0x10/0x10
[   16.259133]  ? __pfx_read_tsc+0x10/0x10
[   16.259157]  ? ktime_get_ts64+0x86/0x230
[   16.259188]  kunit_try_run_case+0x1a5/0x480
[   16.259214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.259240]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.259268]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.259295]  ? __kthread_parkme+0x82/0x180
[   16.259318]  ? preempt_count_sub+0x50/0x80
[   16.259344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.259371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.259398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.259426]  kthread+0x337/0x6f0
[   16.259457]  ? trace_preempt_on+0x20/0xc0
[   16.259483]  ? __pfx_kthread+0x10/0x10
[   16.259507]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.259531]  ? calculate_sigpending+0x7b/0xa0
[   16.259558]  ? __pfx_kthread+0x10/0x10
[   16.259582]  ret_from_fork+0x116/0x1d0
[   16.259603]  ? __pfx_kthread+0x10/0x10
[   16.259625]  ret_from_fork_asm+0x1a/0x30
[   16.259657]  </TASK>
[   16.259668] 
[   16.267604] Allocated by task 282:
[   16.267812]  kasan_save_stack+0x45/0x70
[   16.268045]  kasan_save_track+0x18/0x40
[   16.268255]  kasan_save_alloc_info+0x3b/0x50
[   16.268506]  __kasan_kmalloc+0xb7/0xc0
[   16.268706]  __kmalloc_cache_noprof+0x189/0x420
[   16.268924]  kasan_atomics+0x95/0x310
[   16.269076]  kunit_try_run_case+0x1a5/0x480
[   16.269278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.269642]  kthread+0x337/0x6f0
[   16.269775]  ret_from_fork+0x116/0x1d0
[   16.269908]  ret_from_fork_asm+0x1a/0x30
[   16.270111] 
[   16.270243] The buggy address belongs to the object at ffff888103082e00
[   16.270243]  which belongs to the cache kmalloc-64 of size 64
[   16.270966] The buggy address is located 0 bytes to the right of
[   16.270966]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.271510] 
[   16.271636] The buggy address belongs to the physical page:
[   16.271891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.272271] flags: 0x200000000000000(node=0|zone=2)
[   16.272583] page_type: f5(slab)
[   16.272776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.273083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.273458] page dumped because: kasan: bad access detected
[   16.273710] 
[   16.273815] Memory state around the buggy address:
[   16.274063]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.274378]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.274703] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.275038]                                      ^
[   16.275296]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.275614]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.275835] ==================================================================
[   15.094220] ==================================================================
[   15.094657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   15.094910] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.095136] 
[   15.095228] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.095271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.095284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.095306] Call Trace:
[   15.095323]  <TASK>
[   15.095338]  dump_stack_lvl+0x73/0xb0
[   15.095366]  print_report+0xd1/0x610
[   15.095390]  ? __virt_addr_valid+0x1db/0x2d0
[   15.095413]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.095436]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.095459]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.095482]  kasan_report+0x141/0x180
[   15.095505]  ? kasan_atomics_helper+0x4b54/0x5450
[   15.095532]  __asan_report_load4_noabort+0x18/0x20
[   15.095558]  kasan_atomics_helper+0x4b54/0x5450
[   15.095581]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.095604]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.095630]  ? kasan_atomics+0x152/0x310
[   15.095658]  kasan_atomics+0x1dc/0x310
[   15.095694]  ? __pfx_kasan_atomics+0x10/0x10
[   15.095742]  ? __pfx_read_tsc+0x10/0x10
[   15.095782]  ? ktime_get_ts64+0x86/0x230
[   15.095811]  kunit_try_run_case+0x1a5/0x480
[   15.095838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.095864]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.095891]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.095917]  ? __kthread_parkme+0x82/0x180
[   15.095940]  ? preempt_count_sub+0x50/0x80
[   15.095967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.095993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.096021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.096049]  kthread+0x337/0x6f0
[   15.096070]  ? trace_preempt_on+0x20/0xc0
[   15.096095]  ? __pfx_kthread+0x10/0x10
[   15.096118]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.096141]  ? calculate_sigpending+0x7b/0xa0
[   15.096168]  ? __pfx_kthread+0x10/0x10
[   15.096193]  ret_from_fork+0x116/0x1d0
[   15.096217]  ? __pfx_kthread+0x10/0x10
[   15.096239]  ret_from_fork_asm+0x1a/0x30
[   15.096274]  </TASK>
[   15.096284] 
[   15.105284] Allocated by task 282:
[   15.105529]  kasan_save_stack+0x45/0x70
[   15.105675]  kasan_save_track+0x18/0x40
[   15.105823]  kasan_save_alloc_info+0x3b/0x50
[   15.105979]  __kasan_kmalloc+0xb7/0xc0
[   15.106115]  __kmalloc_cache_noprof+0x189/0x420
[   15.106304]  kasan_atomics+0x95/0x310
[   15.106671]  kunit_try_run_case+0x1a5/0x480
[   15.106908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.107280]  kthread+0x337/0x6f0
[   15.107583]  ret_from_fork+0x116/0x1d0
[   15.107785]  ret_from_fork_asm+0x1a/0x30
[   15.107995] 
[   15.108094] The buggy address belongs to the object at ffff888103082e00
[   15.108094]  which belongs to the cache kmalloc-64 of size 64
[   15.108489] The buggy address is located 0 bytes to the right of
[   15.108489]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.108869] 
[   15.108945] The buggy address belongs to the physical page:
[   15.109119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.109360] flags: 0x200000000000000(node=0|zone=2)
[   15.109561] page_type: f5(slab)
[   15.109753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.110106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.110450] page dumped because: kasan: bad access detected
[   15.110703] 
[   15.110814] Memory state around the buggy address:
[   15.111024]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.111332]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.112409] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.113799]                                      ^
[   15.114071]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.114295]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.114512] ==================================================================
[   15.860310] ==================================================================
[   15.860653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   15.861050] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.861354] 
[   15.861466] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.861508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.861521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.861543] Call Trace:
[   15.861558]  <TASK>
[   15.861572]  dump_stack_lvl+0x73/0xb0
[   15.861601]  print_report+0xd1/0x610
[   15.861625]  ? __virt_addr_valid+0x1db/0x2d0
[   15.861649]  ? kasan_atomics_helper+0x1467/0x5450
[   15.861672]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.861698]  ? kasan_atomics_helper+0x1467/0x5450
[   15.861722]  kasan_report+0x141/0x180
[   15.861746]  ? kasan_atomics_helper+0x1467/0x5450
[   15.861786]  kasan_check_range+0x10c/0x1c0
[   15.861812]  __kasan_check_write+0x18/0x20
[   15.861833]  kasan_atomics_helper+0x1467/0x5450
[   15.861858]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.861883]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.861910]  ? kasan_atomics+0x152/0x310
[   15.861938]  kasan_atomics+0x1dc/0x310
[   15.861962]  ? __pfx_kasan_atomics+0x10/0x10
[   15.861989]  ? __pfx_read_tsc+0x10/0x10
[   15.862011]  ? ktime_get_ts64+0x86/0x230
[   15.862037]  kunit_try_run_case+0x1a5/0x480
[   15.862063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.862089]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.862115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.862140]  ? __kthread_parkme+0x82/0x180
[   15.862163]  ? preempt_count_sub+0x50/0x80
[   15.862188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.862215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.862241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.862268]  kthread+0x337/0x6f0
[   15.862289]  ? trace_preempt_on+0x20/0xc0
[   15.862314]  ? __pfx_kthread+0x10/0x10
[   15.862335]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.862359]  ? calculate_sigpending+0x7b/0xa0
[   15.862384]  ? __pfx_kthread+0x10/0x10
[   15.862407]  ret_from_fork+0x116/0x1d0
[   15.862427]  ? __pfx_kthread+0x10/0x10
[   15.862450]  ret_from_fork_asm+0x1a/0x30
[   15.862483]  </TASK>
[   15.862495] 
[   15.870301] Allocated by task 282:
[   15.870489]  kasan_save_stack+0x45/0x70
[   15.870674]  kasan_save_track+0x18/0x40
[   15.870873]  kasan_save_alloc_info+0x3b/0x50
[   15.871047]  __kasan_kmalloc+0xb7/0xc0
[   15.871223]  __kmalloc_cache_noprof+0x189/0x420
[   15.871386]  kasan_atomics+0x95/0x310
[   15.871521]  kunit_try_run_case+0x1a5/0x480
[   15.871671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.871859]  kthread+0x337/0x6f0
[   15.871983]  ret_from_fork+0x116/0x1d0
[   15.872176]  ret_from_fork_asm+0x1a/0x30
[   15.872375] 
[   15.872475] The buggy address belongs to the object at ffff888103082e00
[   15.872475]  which belongs to the cache kmalloc-64 of size 64
[   15.873038] The buggy address is located 0 bytes to the right of
[   15.873038]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.873600] 
[   15.873696] The buggy address belongs to the physical page:
[   15.873952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.874308] flags: 0x200000000000000(node=0|zone=2)
[   15.874563] page_type: f5(slab)
[   15.874713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.874971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.875203] page dumped because: kasan: bad access detected
[   15.875469] 
[   15.875562] Memory state around the buggy address:
[   15.875800]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.876132]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.876441] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.876719]                                      ^
[   15.876910]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.877157]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.877516] ==================================================================
[   15.256286] ==================================================================
[   15.256594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   15.256953] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.257531] 
[   15.257654] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.257700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.257713] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.257737] Call Trace:
[   15.257750]  <TASK>
[   15.257777]  dump_stack_lvl+0x73/0xb0
[   15.257809]  print_report+0xd1/0x610
[   15.257834]  ? __virt_addr_valid+0x1db/0x2d0
[   15.257860]  ? kasan_atomics_helper+0x72f/0x5450
[   15.257883]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.257909]  ? kasan_atomics_helper+0x72f/0x5450
[   15.257933]  kasan_report+0x141/0x180
[   15.257957]  ? kasan_atomics_helper+0x72f/0x5450
[   15.257986]  kasan_check_range+0x10c/0x1c0
[   15.258012]  __kasan_check_write+0x18/0x20
[   15.258033]  kasan_atomics_helper+0x72f/0x5450
[   15.258058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.258083]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.258110]  ? kasan_atomics+0x152/0x310
[   15.258139]  kasan_atomics+0x1dc/0x310
[   15.258164]  ? __pfx_kasan_atomics+0x10/0x10
[   15.258191]  ? __pfx_read_tsc+0x10/0x10
[   15.258214]  ? ktime_get_ts64+0x86/0x230
[   15.258241]  kunit_try_run_case+0x1a5/0x480
[   15.258268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.258293]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.258321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.258348]  ? __kthread_parkme+0x82/0x180
[   15.258371]  ? preempt_count_sub+0x50/0x80
[   15.258398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.258426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.258464]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.258493]  kthread+0x337/0x6f0
[   15.258518]  ? trace_preempt_on+0x20/0xc0
[   15.258544]  ? __pfx_kthread+0x10/0x10
[   15.258568]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.258591]  ? calculate_sigpending+0x7b/0xa0
[   15.258619]  ? __pfx_kthread+0x10/0x10
[   15.258644]  ret_from_fork+0x116/0x1d0
[   15.258663]  ? __pfx_kthread+0x10/0x10
[   15.258686]  ret_from_fork_asm+0x1a/0x30
[   15.258718]  </TASK>
[   15.258730] 
[   15.266343] Allocated by task 282:
[   15.266479]  kasan_save_stack+0x45/0x70
[   15.266624]  kasan_save_track+0x18/0x40
[   15.266771]  kasan_save_alloc_info+0x3b/0x50
[   15.266924]  __kasan_kmalloc+0xb7/0xc0
[   15.267071]  __kmalloc_cache_noprof+0x189/0x420
[   15.267297]  kasan_atomics+0x95/0x310
[   15.267486]  kunit_try_run_case+0x1a5/0x480
[   15.267699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.267962]  kthread+0x337/0x6f0
[   15.268203]  ret_from_fork+0x116/0x1d0
[   15.268363]  ret_from_fork_asm+0x1a/0x30
[   15.268630] 
[   15.268712] The buggy address belongs to the object at ffff888103082e00
[   15.268712]  which belongs to the cache kmalloc-64 of size 64
[   15.269078] The buggy address is located 0 bytes to the right of
[   15.269078]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.269446] 
[   15.269519] The buggy address belongs to the physical page:
[   15.269959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.270318] flags: 0x200000000000000(node=0|zone=2)
[   15.270551] page_type: f5(slab)
[   15.270721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.271095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.271441] page dumped because: kasan: bad access detected
[   15.271692] 
[   15.272328] Memory state around the buggy address:
[   15.272559]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.272876]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.273096] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.273419]                                      ^
[   15.274609]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.274912]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.275216] ==================================================================
[   15.878016] ==================================================================
[   15.878298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   15.878716] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.879022] 
[   15.879211] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.879256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.879269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.879290] Call Trace:
[   15.879304]  <TASK>
[   15.879318]  dump_stack_lvl+0x73/0xb0
[   15.879348]  print_report+0xd1/0x610
[   15.879373]  ? __virt_addr_valid+0x1db/0x2d0
[   15.879398]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.879421]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.879447]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.879471]  kasan_report+0x141/0x180
[   15.879495]  ? kasan_atomics_helper+0x50d4/0x5450
[   15.879523]  __asan_report_store8_noabort+0x1b/0x30
[   15.879551]  kasan_atomics_helper+0x50d4/0x5450
[   15.879576]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.879601]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.879628]  ? kasan_atomics+0x152/0x310
[   15.879656]  kasan_atomics+0x1dc/0x310
[   15.879680]  ? __pfx_kasan_atomics+0x10/0x10
[   15.879706]  ? __pfx_read_tsc+0x10/0x10
[   15.879728]  ? ktime_get_ts64+0x86/0x230
[   15.879755]  kunit_try_run_case+0x1a5/0x480
[   15.879792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.879817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.879844]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.879870]  ? __kthread_parkme+0x82/0x180
[   15.879892]  ? preempt_count_sub+0x50/0x80
[   15.879918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.879946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.879973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.880001]  kthread+0x337/0x6f0
[   15.880022]  ? trace_preempt_on+0x20/0xc0
[   15.880047]  ? __pfx_kthread+0x10/0x10
[   15.880069]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.880093]  ? calculate_sigpending+0x7b/0xa0
[   15.880119]  ? __pfx_kthread+0x10/0x10
[   15.880143]  ret_from_fork+0x116/0x1d0
[   15.880163]  ? __pfx_kthread+0x10/0x10
[   15.880186]  ret_from_fork_asm+0x1a/0x30
[   15.880228]  </TASK>
[   15.880240] 
[   15.887494] Allocated by task 282:
[   15.887862]  kasan_save_stack+0x45/0x70
[   15.888064]  kasan_save_track+0x18/0x40
[   15.888209]  kasan_save_alloc_info+0x3b/0x50
[   15.888420]  __kasan_kmalloc+0xb7/0xc0
[   15.888577]  __kmalloc_cache_noprof+0x189/0x420
[   15.888737]  kasan_atomics+0x95/0x310
[   15.888938]  kunit_try_run_case+0x1a5/0x480
[   15.889153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.889413]  kthread+0x337/0x6f0
[   15.889588]  ret_from_fork+0x116/0x1d0
[   15.889724]  ret_from_fork_asm+0x1a/0x30
[   15.890926] 
[   15.891350] The buggy address belongs to the object at ffff888103082e00
[   15.891350]  which belongs to the cache kmalloc-64 of size 64
[   15.893225] The buggy address is located 0 bytes to the right of
[   15.893225]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.894329] 
[   15.894723] The buggy address belongs to the physical page:
[   15.895388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.896139] flags: 0x200000000000000(node=0|zone=2)
[   15.896953] page_type: f5(slab)
[   15.897363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.897939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.898174] page dumped because: kasan: bad access detected
[   15.898347] 
[   15.898421] Memory state around the buggy address:
[   15.899357]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.900316]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.901279] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.902091]                                      ^
[   15.902797]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.903293]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.904021] ==================================================================
[   15.322351] ==================================================================
[   15.322655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   15.323425] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.323875] 
[   15.323972] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.324084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.324157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.324181] Call Trace:
[   15.324198]  <TASK>
[   15.324215]  dump_stack_lvl+0x73/0xb0
[   15.324250]  print_report+0xd1/0x610
[   15.324275]  ? __virt_addr_valid+0x1db/0x2d0
[   15.324300]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.324324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.324350]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.324374]  kasan_report+0x141/0x180
[   15.324398]  ? kasan_atomics_helper+0x8f9/0x5450
[   15.324427]  kasan_check_range+0x10c/0x1c0
[   15.324464]  __kasan_check_write+0x18/0x20
[   15.324486]  kasan_atomics_helper+0x8f9/0x5450
[   15.324511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.324536]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.324563]  ? kasan_atomics+0x152/0x310
[   15.324592]  kasan_atomics+0x1dc/0x310
[   15.324616]  ? __pfx_kasan_atomics+0x10/0x10
[   15.324644]  ? __pfx_read_tsc+0x10/0x10
[   15.324667]  ? ktime_get_ts64+0x86/0x230
[   15.324694]  kunit_try_run_case+0x1a5/0x480
[   15.324720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.324745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.324786]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.324812]  ? __kthread_parkme+0x82/0x180
[   15.324835]  ? preempt_count_sub+0x50/0x80
[   15.324861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.324889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.324916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.324944]  kthread+0x337/0x6f0
[   15.324966]  ? trace_preempt_on+0x20/0xc0
[   15.324991]  ? __pfx_kthread+0x10/0x10
[   15.325014]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.325038]  ? calculate_sigpending+0x7b/0xa0
[   15.325065]  ? __pfx_kthread+0x10/0x10
[   15.325088]  ret_from_fork+0x116/0x1d0
[   15.325108]  ? __pfx_kthread+0x10/0x10
[   15.325131]  ret_from_fork_asm+0x1a/0x30
[   15.325163]  </TASK>
[   15.325173] 
[   15.335060] Allocated by task 282:
[   15.335368]  kasan_save_stack+0x45/0x70
[   15.335643]  kasan_save_track+0x18/0x40
[   15.335831]  kasan_save_alloc_info+0x3b/0x50
[   15.336046]  __kasan_kmalloc+0xb7/0xc0
[   15.336220]  __kmalloc_cache_noprof+0x189/0x420
[   15.336433]  kasan_atomics+0x95/0x310
[   15.336968]  kunit_try_run_case+0x1a5/0x480
[   15.337174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.337395]  kthread+0x337/0x6f0
[   15.337689]  ret_from_fork+0x116/0x1d0
[   15.337877]  ret_from_fork_asm+0x1a/0x30
[   15.338200] 
[   15.338284] The buggy address belongs to the object at ffff888103082e00
[   15.338284]  which belongs to the cache kmalloc-64 of size 64
[   15.338936] The buggy address is located 0 bytes to the right of
[   15.338936]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.339609] 
[   15.339792] The buggy address belongs to the physical page:
[   15.340156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.340605] flags: 0x200000000000000(node=0|zone=2)
[   15.340832] page_type: f5(slab)
[   15.341004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.341324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.341887] page dumped because: kasan: bad access detected
[   15.342222] 
[   15.342306] Memory state around the buggy address:
[   15.342522]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.342996]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.343387] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.343839]                                      ^
[   15.344154]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.344590]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.344899] ==================================================================
[   16.059585] ==================================================================
[   16.060436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   16.061125] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.061769] 
[   16.061943] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.061988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.062002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.062024] Call Trace:
[   16.062039]  <TASK>
[   16.062055]  dump_stack_lvl+0x73/0xb0
[   16.062086]  print_report+0xd1/0x610
[   16.062110]  ? __virt_addr_valid+0x1db/0x2d0
[   16.062135]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.062158]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.062184]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.062209]  kasan_report+0x141/0x180
[   16.062233]  ? kasan_atomics_helper+0x18b1/0x5450
[   16.062262]  kasan_check_range+0x10c/0x1c0
[   16.062288]  __kasan_check_write+0x18/0x20
[   16.062311]  kasan_atomics_helper+0x18b1/0x5450
[   16.062336]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.062361]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.062388]  ? kasan_atomics+0x152/0x310
[   16.062417]  kasan_atomics+0x1dc/0x310
[   16.062450]  ? __pfx_kasan_atomics+0x10/0x10
[   16.062476]  ? __pfx_read_tsc+0x10/0x10
[   16.062499]  ? ktime_get_ts64+0x86/0x230
[   16.062525]  kunit_try_run_case+0x1a5/0x480
[   16.062552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.062578]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.062605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.062630]  ? __kthread_parkme+0x82/0x180
[   16.062653]  ? preempt_count_sub+0x50/0x80
[   16.062678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.062706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.062732]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.062770]  kthread+0x337/0x6f0
[   16.062791]  ? trace_preempt_on+0x20/0xc0
[   16.062816]  ? __pfx_kthread+0x10/0x10
[   16.062838]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.062861]  ? calculate_sigpending+0x7b/0xa0
[   16.062888]  ? __pfx_kthread+0x10/0x10
[   16.062910]  ret_from_fork+0x116/0x1d0
[   16.062931]  ? __pfx_kthread+0x10/0x10
[   16.062953]  ret_from_fork_asm+0x1a/0x30
[   16.062985]  </TASK>
[   16.062996] 
[   16.073580] Allocated by task 282:
[   16.073724]  kasan_save_stack+0x45/0x70
[   16.073883]  kasan_save_track+0x18/0x40
[   16.074022]  kasan_save_alloc_info+0x3b/0x50
[   16.074175]  __kasan_kmalloc+0xb7/0xc0
[   16.074310]  __kmalloc_cache_noprof+0x189/0x420
[   16.074527]  kasan_atomics+0x95/0x310
[   16.074866]  kunit_try_run_case+0x1a5/0x480
[   16.075235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.075782]  kthread+0x337/0x6f0
[   16.076150]  ret_from_fork+0x116/0x1d0
[   16.076497]  ret_from_fork_asm+0x1a/0x30
[   16.076906] 
[   16.077065] The buggy address belongs to the object at ffff888103082e00
[   16.077065]  which belongs to the cache kmalloc-64 of size 64
[   16.078310] The buggy address is located 0 bytes to the right of
[   16.078310]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.079523] 
[   16.079686] The buggy address belongs to the physical page:
[   16.080175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.080945] flags: 0x200000000000000(node=0|zone=2)
[   16.081215] page_type: f5(slab)
[   16.081338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.081619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.082318] page dumped because: kasan: bad access detected
[   16.082838] 
[   16.082994] Memory state around the buggy address:
[   16.083410]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.084028]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.084606] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.084832]                                      ^
[   16.084991]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.085208]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.085424] ==================================================================
[   15.757352] ==================================================================
[   15.757699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   15.758091] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.758450] 
[   15.758578] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.758624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.758636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.758659] Call Trace:
[   15.758672]  <TASK>
[   15.758687]  dump_stack_lvl+0x73/0xb0
[   15.758739]  print_report+0xd1/0x610
[   15.758775]  ? __virt_addr_valid+0x1db/0x2d0
[   15.758801]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.758825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.758851]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.758875]  kasan_report+0x141/0x180
[   15.758899]  ? kasan_atomics_helper+0x49e8/0x5450
[   15.758944]  __asan_report_load4_noabort+0x18/0x20
[   15.759000]  kasan_atomics_helper+0x49e8/0x5450
[   15.759039]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.759065]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.759119]  ? kasan_atomics+0x152/0x310
[   15.759162]  kasan_atomics+0x1dc/0x310
[   15.759193]  ? __pfx_kasan_atomics+0x10/0x10
[   15.759220]  ? __pfx_read_tsc+0x10/0x10
[   15.759244]  ? ktime_get_ts64+0x86/0x230
[   15.759271]  kunit_try_run_case+0x1a5/0x480
[   15.759298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.759324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.759351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.759377]  ? __kthread_parkme+0x82/0x180
[   15.759400]  ? preempt_count_sub+0x50/0x80
[   15.759425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.759452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.759482]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.759511]  kthread+0x337/0x6f0
[   15.759532]  ? trace_preempt_on+0x20/0xc0
[   15.759556]  ? __pfx_kthread+0x10/0x10
[   15.759589]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.759612]  ? calculate_sigpending+0x7b/0xa0
[   15.759639]  ? __pfx_kthread+0x10/0x10
[   15.759662]  ret_from_fork+0x116/0x1d0
[   15.759683]  ? __pfx_kthread+0x10/0x10
[   15.759705]  ret_from_fork_asm+0x1a/0x30
[   15.759738]  </TASK>
[   15.759749] 
[   15.767315] Allocated by task 282:
[   15.767525]  kasan_save_stack+0x45/0x70
[   15.767776]  kasan_save_track+0x18/0x40
[   15.767990]  kasan_save_alloc_info+0x3b/0x50
[   15.768293]  __kasan_kmalloc+0xb7/0xc0
[   15.768519]  __kmalloc_cache_noprof+0x189/0x420
[   15.768729]  kasan_atomics+0x95/0x310
[   15.768916]  kunit_try_run_case+0x1a5/0x480
[   15.769152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.769404]  kthread+0x337/0x6f0
[   15.769582]  ret_from_fork+0x116/0x1d0
[   15.769778]  ret_from_fork_asm+0x1a/0x30
[   15.769990] 
[   15.770115] The buggy address belongs to the object at ffff888103082e00
[   15.770115]  which belongs to the cache kmalloc-64 of size 64
[   15.770692] The buggy address is located 0 bytes to the right of
[   15.770692]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.771236] 
[   15.771310] The buggy address belongs to the physical page:
[   15.771478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.771853] flags: 0x200000000000000(node=0|zone=2)
[   15.772082] page_type: f5(slab)
[   15.772242] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.772520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.772872] page dumped because: kasan: bad access detected
[   15.773139] 
[   15.773231] Memory state around the buggy address:
[   15.773383]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.773695]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.774112] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.774408]                                      ^
[   15.774670]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.774997]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.775331] ==================================================================
[   15.825049] ==================================================================
[   15.825640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   15.825904] Read of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.826229] 
[   15.826336] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.826382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.826396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.826418] Call Trace:
[   15.826434]  <TASK>
[   15.826450]  dump_stack_lvl+0x73/0xb0
[   15.826489]  print_report+0xd1/0x610
[   15.826515]  ? __virt_addr_valid+0x1db/0x2d0
[   15.826539]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.826563]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.826589]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.826613]  kasan_report+0x141/0x180
[   15.826638]  ? kasan_atomics_helper+0x13b5/0x5450
[   15.826666]  kasan_check_range+0x10c/0x1c0
[   15.826692]  __kasan_check_read+0x15/0x20
[   15.826714]  kasan_atomics_helper+0x13b5/0x5450
[   15.826739]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.826777]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.826804]  ? kasan_atomics+0x152/0x310
[   15.826833]  kasan_atomics+0x1dc/0x310
[   15.826857]  ? __pfx_kasan_atomics+0x10/0x10
[   15.826884]  ? __pfx_read_tsc+0x10/0x10
[   15.826906]  ? ktime_get_ts64+0x86/0x230
[   15.826934]  kunit_try_run_case+0x1a5/0x480
[   15.826961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.826987]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.827013]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.827039]  ? __kthread_parkme+0x82/0x180
[   15.827062]  ? preempt_count_sub+0x50/0x80
[   15.827088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.827115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.827142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.827170]  kthread+0x337/0x6f0
[   15.827195]  ? trace_preempt_on+0x20/0xc0
[   15.827219]  ? __pfx_kthread+0x10/0x10
[   15.827242]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.827265]  ? calculate_sigpending+0x7b/0xa0
[   15.827291]  ? __pfx_kthread+0x10/0x10
[   15.827314]  ret_from_fork+0x116/0x1d0
[   15.827334]  ? __pfx_kthread+0x10/0x10
[   15.827356]  ret_from_fork_asm+0x1a/0x30
[   15.827389]  </TASK>
[   15.827400] 
[   15.834816] Allocated by task 282:
[   15.835037]  kasan_save_stack+0x45/0x70
[   15.835188]  kasan_save_track+0x18/0x40
[   15.835335]  kasan_save_alloc_info+0x3b/0x50
[   15.835664]  __kasan_kmalloc+0xb7/0xc0
[   15.835866]  __kmalloc_cache_noprof+0x189/0x420
[   15.836091]  kasan_atomics+0x95/0x310
[   15.836279]  kunit_try_run_case+0x1a5/0x480
[   15.836435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.836702]  kthread+0x337/0x6f0
[   15.836864]  ret_from_fork+0x116/0x1d0
[   15.837003]  ret_from_fork_asm+0x1a/0x30
[   15.837148] 
[   15.837222] The buggy address belongs to the object at ffff888103082e00
[   15.837222]  which belongs to the cache kmalloc-64 of size 64
[   15.837971] The buggy address is located 0 bytes to the right of
[   15.837971]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.838515] 
[   15.838594] The buggy address belongs to the physical page:
[   15.838833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.839122] flags: 0x200000000000000(node=0|zone=2)
[   15.839364] page_type: f5(slab)
[   15.839516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.839804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.840129] page dumped because: kasan: bad access detected
[   15.840336] 
[   15.840407] Memory state around the buggy address:
[   15.840649]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.840947]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.841223] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.841550]                                      ^
[   15.841805]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.842080]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.842330] ==================================================================
[   15.238132] ==================================================================
[   15.238383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   15.239109] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.239714] 
[   15.240068] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.240119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.240133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.240156] Call Trace:
[   15.240170]  <TASK>
[   15.240185]  dump_stack_lvl+0x73/0xb0
[   15.240220]  print_report+0xd1/0x610
[   15.240246]  ? __virt_addr_valid+0x1db/0x2d0
[   15.240271]  ? kasan_atomics_helper+0x697/0x5450
[   15.240295]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.240321]  ? kasan_atomics_helper+0x697/0x5450
[   15.240345]  kasan_report+0x141/0x180
[   15.240369]  ? kasan_atomics_helper+0x697/0x5450
[   15.240397]  kasan_check_range+0x10c/0x1c0
[   15.240423]  __kasan_check_write+0x18/0x20
[   15.240453]  kasan_atomics_helper+0x697/0x5450
[   15.240478]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.240503]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.240531]  ? kasan_atomics+0x152/0x310
[   15.240559]  kasan_atomics+0x1dc/0x310
[   15.240584]  ? __pfx_kasan_atomics+0x10/0x10
[   15.240610]  ? __pfx_read_tsc+0x10/0x10
[   15.240633]  ? ktime_get_ts64+0x86/0x230
[   15.240660]  kunit_try_run_case+0x1a5/0x480
[   15.240687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.240712]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.240740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.240780]  ? __kthread_parkme+0x82/0x180
[   15.240803]  ? preempt_count_sub+0x50/0x80
[   15.240830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.240856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.240886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.240914]  kthread+0x337/0x6f0
[   15.240935]  ? trace_preempt_on+0x20/0xc0
[   15.240961]  ? __pfx_kthread+0x10/0x10
[   15.240984]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.241008]  ? calculate_sigpending+0x7b/0xa0
[   15.241035]  ? __pfx_kthread+0x10/0x10
[   15.241059]  ret_from_fork+0x116/0x1d0
[   15.241079]  ? __pfx_kthread+0x10/0x10
[   15.241101]  ret_from_fork_asm+0x1a/0x30
[   15.241133]  </TASK>
[   15.241144] 
[   15.248520] Allocated by task 282:
[   15.248677]  kasan_save_stack+0x45/0x70
[   15.248874]  kasan_save_track+0x18/0x40
[   15.249041]  kasan_save_alloc_info+0x3b/0x50
[   15.249256]  __kasan_kmalloc+0xb7/0xc0
[   15.249427]  __kmalloc_cache_noprof+0x189/0x420
[   15.249607]  kasan_atomics+0x95/0x310
[   15.249739]  kunit_try_run_case+0x1a5/0x480
[   15.249899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.250152]  kthread+0x337/0x6f0
[   15.250321]  ret_from_fork+0x116/0x1d0
[   15.250507]  ret_from_fork_asm+0x1a/0x30
[   15.250649] 
[   15.250722] The buggy address belongs to the object at ffff888103082e00
[   15.250722]  which belongs to the cache kmalloc-64 of size 64
[   15.251368] The buggy address is located 0 bytes to the right of
[   15.251368]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.252011] 
[   15.252085] The buggy address belongs to the physical page:
[   15.252255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.252489] flags: 0x200000000000000(node=0|zone=2)
[   15.252648] page_type: f5(slab)
[   15.252778] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.253122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.253454] page dumped because: kasan: bad access detected
[   15.253702] 
[   15.253807] Memory state around the buggy address:
[   15.254026]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.254339]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.254652] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.254963]                                      ^
[   15.255160]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.255457]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.255714] ==================================================================
[   15.905126] ==================================================================
[   15.905362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   15.905613] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.905846] 
[   15.905933] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.905978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.905992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.906014] Call Trace:
[   15.906031]  <TASK>
[   15.906048]  dump_stack_lvl+0x73/0xb0
[   15.906075]  print_report+0xd1/0x610
[   15.906099]  ? __virt_addr_valid+0x1db/0x2d0
[   15.906123]  ? kasan_atomics_helper+0x151d/0x5450
[   15.906146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.906170]  ? kasan_atomics_helper+0x151d/0x5450
[   15.906192]  kasan_report+0x141/0x180
[   15.906215]  ? kasan_atomics_helper+0x151d/0x5450
[   15.906242]  kasan_check_range+0x10c/0x1c0
[   15.906266]  __kasan_check_write+0x18/0x20
[   15.906286]  kasan_atomics_helper+0x151d/0x5450
[   15.906309]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.906332]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.906358]  ? kasan_atomics+0x152/0x310
[   15.906385]  kasan_atomics+0x1dc/0x310
[   15.906409]  ? __pfx_kasan_atomics+0x10/0x10
[   15.906434]  ? __pfx_read_tsc+0x10/0x10
[   15.906456]  ? ktime_get_ts64+0x86/0x230
[   15.906481]  kunit_try_run_case+0x1a5/0x480
[   15.906508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.906531]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.906557]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.906581]  ? __kthread_parkme+0x82/0x180
[   15.906603]  ? preempt_count_sub+0x50/0x80
[   15.906628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.906653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.906679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.906705]  kthread+0x337/0x6f0
[   15.906725]  ? trace_preempt_on+0x20/0xc0
[   15.906748]  ? __pfx_kthread+0x10/0x10
[   15.906793]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.906815]  ? calculate_sigpending+0x7b/0xa0
[   15.906839]  ? __pfx_kthread+0x10/0x10
[   15.906861]  ret_from_fork+0x116/0x1d0
[   15.906880]  ? __pfx_kthread+0x10/0x10
[   15.906902]  ret_from_fork_asm+0x1a/0x30
[   15.906933]  </TASK>
[   15.906944] 
[   15.918311] Allocated by task 282:
[   15.918622]  kasan_save_stack+0x45/0x70
[   15.918971]  kasan_save_track+0x18/0x40
[   15.919129]  kasan_save_alloc_info+0x3b/0x50
[   15.919347]  __kasan_kmalloc+0xb7/0xc0
[   15.919757]  __kmalloc_cache_noprof+0x189/0x420
[   15.919991]  kasan_atomics+0x95/0x310
[   15.920153]  kunit_try_run_case+0x1a5/0x480
[   15.920512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.920862]  kthread+0x337/0x6f0
[   15.921123]  ret_from_fork+0x116/0x1d0
[   15.921381]  ret_from_fork_asm+0x1a/0x30
[   15.921667] 
[   15.921944] The buggy address belongs to the object at ffff888103082e00
[   15.921944]  which belongs to the cache kmalloc-64 of size 64
[   15.922587] The buggy address is located 0 bytes to the right of
[   15.922587]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.923221] 
[   15.923440] The buggy address belongs to the physical page:
[   15.923669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.924011] flags: 0x200000000000000(node=0|zone=2)
[   15.924230] page_type: f5(slab)
[   15.924398] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.925064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.925510] page dumped because: kasan: bad access detected
[   15.925834] 
[   15.925937] Memory state around the buggy address:
[   15.926304]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.926859]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.927272] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.927747]                                      ^
[   15.928049]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.928452]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.929228] ==================================================================
[   16.103733] ==================================================================
[   16.104203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   16.104451] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.104748] 
[   16.104871] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.104915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.104928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.104951] Call Trace:
[   16.104967]  <TASK>
[   16.104982]  dump_stack_lvl+0x73/0xb0
[   16.105011]  print_report+0xd1/0x610
[   16.105036]  ? __virt_addr_valid+0x1db/0x2d0
[   16.105061]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.105085]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.105111]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.105135]  kasan_report+0x141/0x180
[   16.105159]  ? kasan_atomics_helper+0x19e3/0x5450
[   16.105188]  kasan_check_range+0x10c/0x1c0
[   16.105225]  __kasan_check_write+0x18/0x20
[   16.105247]  kasan_atomics_helper+0x19e3/0x5450
[   16.105273]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.105299]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.105326]  ? kasan_atomics+0x152/0x310
[   16.105354]  kasan_atomics+0x1dc/0x310
[   16.105379]  ? __pfx_kasan_atomics+0x10/0x10
[   16.105405]  ? __pfx_read_tsc+0x10/0x10
[   16.105428]  ? ktime_get_ts64+0x86/0x230
[   16.105455]  kunit_try_run_case+0x1a5/0x480
[   16.105481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.105507]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.105533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.105560]  ? __kthread_parkme+0x82/0x180
[   16.105582]  ? preempt_count_sub+0x50/0x80
[   16.105608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.105635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.105661]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.105697]  kthread+0x337/0x6f0
[   16.105718]  ? trace_preempt_on+0x20/0xc0
[   16.105743]  ? __pfx_kthread+0x10/0x10
[   16.105776]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.105799]  ? calculate_sigpending+0x7b/0xa0
[   16.105825]  ? __pfx_kthread+0x10/0x10
[   16.105848]  ret_from_fork+0x116/0x1d0
[   16.105868]  ? __pfx_kthread+0x10/0x10
[   16.105891]  ret_from_fork_asm+0x1a/0x30
[   16.105922]  </TASK>
[   16.105933] 
[   16.113649] Allocated by task 282:
[   16.113806]  kasan_save_stack+0x45/0x70
[   16.113998]  kasan_save_track+0x18/0x40
[   16.114170]  kasan_save_alloc_info+0x3b/0x50
[   16.114368]  __kasan_kmalloc+0xb7/0xc0
[   16.114547]  __kmalloc_cache_noprof+0x189/0x420
[   16.114707]  kasan_atomics+0x95/0x310
[   16.114891]  kunit_try_run_case+0x1a5/0x480
[   16.115106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.115344]  kthread+0x337/0x6f0
[   16.115467]  ret_from_fork+0x116/0x1d0
[   16.115744]  ret_from_fork_asm+0x1a/0x30
[   16.115954] 
[   16.116051] The buggy address belongs to the object at ffff888103082e00
[   16.116051]  which belongs to the cache kmalloc-64 of size 64
[   16.116516] The buggy address is located 0 bytes to the right of
[   16.116516]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.117121] 
[   16.117209] The buggy address belongs to the physical page:
[   16.117426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.117731] flags: 0x200000000000000(node=0|zone=2)
[   16.117978] page_type: f5(slab)
[   16.118139] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.118446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.118750] page dumped because: kasan: bad access detected
[   16.118980] 
[   16.119070] Memory state around the buggy address:
[   16.119272]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.119584]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.119897] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.120183]                                      ^
[   16.120380]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.120643]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.120919] ==================================================================
[   16.419727] ==================================================================
[   16.420104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   16.420585] Write of size 8 at addr ffff888103082e30 by task kunit_try_catch/282
[   16.421104] 
[   16.421300] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.421348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.421361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.421383] Call Trace:
[   16.421399]  <TASK>
[   16.421415]  dump_stack_lvl+0x73/0xb0
[   16.421447]  print_report+0xd1/0x610
[   16.421559]  ? __virt_addr_valid+0x1db/0x2d0
[   16.421584]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.421608]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.421633]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.421657]  kasan_report+0x141/0x180
[   16.421681]  ? kasan_atomics_helper+0x20c8/0x5450
[   16.421710]  kasan_check_range+0x10c/0x1c0
[   16.421736]  __kasan_check_write+0x18/0x20
[   16.421758]  kasan_atomics_helper+0x20c8/0x5450
[   16.421796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.421821]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.421848]  ? kasan_atomics+0x152/0x310
[   16.421877]  kasan_atomics+0x1dc/0x310
[   16.421900]  ? __pfx_kasan_atomics+0x10/0x10
[   16.421926]  ? __pfx_read_tsc+0x10/0x10
[   16.421948]  ? ktime_get_ts64+0x86/0x230
[   16.421975]  kunit_try_run_case+0x1a5/0x480
[   16.422001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.422026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.422053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.422079]  ? __kthread_parkme+0x82/0x180
[   16.422101]  ? preempt_count_sub+0x50/0x80
[   16.422127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.422153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.422180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.422208]  kthread+0x337/0x6f0
[   16.422229]  ? trace_preempt_on+0x20/0xc0
[   16.422253]  ? __pfx_kthread+0x10/0x10
[   16.422276]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.422299]  ? calculate_sigpending+0x7b/0xa0
[   16.422325]  ? __pfx_kthread+0x10/0x10
[   16.422348]  ret_from_fork+0x116/0x1d0
[   16.422369]  ? __pfx_kthread+0x10/0x10
[   16.422391]  ret_from_fork_asm+0x1a/0x30
[   16.422422]  </TASK>
[   16.422434] 
[   16.433054] Allocated by task 282:
[   16.433450]  kasan_save_stack+0x45/0x70
[   16.433677]  kasan_save_track+0x18/0x40
[   16.434004]  kasan_save_alloc_info+0x3b/0x50
[   16.434309]  __kasan_kmalloc+0xb7/0xc0
[   16.434638]  __kmalloc_cache_noprof+0x189/0x420
[   16.434880]  kasan_atomics+0x95/0x310
[   16.435210]  kunit_try_run_case+0x1a5/0x480
[   16.435536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.435851]  kthread+0x337/0x6f0
[   16.436172]  ret_from_fork+0x116/0x1d0
[   16.436374]  ret_from_fork_asm+0x1a/0x30
[   16.436774] 
[   16.436908] The buggy address belongs to the object at ffff888103082e00
[   16.436908]  which belongs to the cache kmalloc-64 of size 64
[   16.437600] The buggy address is located 0 bytes to the right of
[   16.437600]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   16.438328] 
[   16.438450] The buggy address belongs to the physical page:
[   16.438843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   16.439283] flags: 0x200000000000000(node=0|zone=2)
[   16.439597] page_type: f5(slab)
[   16.439751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.440259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.440736] page dumped because: kasan: bad access detected
[   16.441014] 
[   16.441241] Memory state around the buggy address:
[   16.441473]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.441927]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.442243] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.442758]                                      ^
[   16.443058]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.443499]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.443879] ==================================================================
[   15.074071] ==================================================================
[   15.074305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   15.074541] Read of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.074837] 
[   15.074945] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.074989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.075001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.075022] Call Trace:
[   15.075040]  <TASK>
[   15.075056]  dump_stack_lvl+0x73/0xb0
[   15.075085]  print_report+0xd1/0x610
[   15.075109]  ? __virt_addr_valid+0x1db/0x2d0
[   15.075133]  ? kasan_atomics_helper+0x3df/0x5450
[   15.075155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.075183]  ? kasan_atomics_helper+0x3df/0x5450
[   15.075206]  kasan_report+0x141/0x180
[   15.075229]  ? kasan_atomics_helper+0x3df/0x5450
[   15.075256]  kasan_check_range+0x10c/0x1c0
[   15.075280]  __kasan_check_read+0x15/0x20
[   15.075300]  kasan_atomics_helper+0x3df/0x5450
[   15.075325]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.075348]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.075374]  ? kasan_atomics+0x152/0x310
[   15.075401]  kasan_atomics+0x1dc/0x310
[   15.075424]  ? __pfx_kasan_atomics+0x10/0x10
[   15.075449]  ? __pfx_read_tsc+0x10/0x10
[   15.075470]  ? ktime_get_ts64+0x86/0x230
[   15.075497]  kunit_try_run_case+0x1a5/0x480
[   15.075522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.075545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.075571]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.075596]  ? __kthread_parkme+0x82/0x180
[   15.075617]  ? preempt_count_sub+0x50/0x80
[   15.075642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.075667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.075692]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.075719]  kthread+0x337/0x6f0
[   15.075739]  ? trace_preempt_on+0x20/0xc0
[   15.075784]  ? __pfx_kthread+0x10/0x10
[   15.075805]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.075827]  ? calculate_sigpending+0x7b/0xa0
[   15.075864]  ? __pfx_kthread+0x10/0x10
[   15.075887]  ret_from_fork+0x116/0x1d0
[   15.075906]  ? __pfx_kthread+0x10/0x10
[   15.075926]  ret_from_fork_asm+0x1a/0x30
[   15.075958]  </TASK>
[   15.075970] 
[   15.084994] Allocated by task 282:
[   15.085192]  kasan_save_stack+0x45/0x70
[   15.085397]  kasan_save_track+0x18/0x40
[   15.085593]  kasan_save_alloc_info+0x3b/0x50
[   15.085822]  __kasan_kmalloc+0xb7/0xc0
[   15.085966]  __kmalloc_cache_noprof+0x189/0x420
[   15.086125]  kasan_atomics+0x95/0x310
[   15.086263]  kunit_try_run_case+0x1a5/0x480
[   15.086412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.086733]  kthread+0x337/0x6f0
[   15.086926]  ret_from_fork+0x116/0x1d0
[   15.087119]  ret_from_fork_asm+0x1a/0x30
[   15.087532] 
[   15.087646] The buggy address belongs to the object at ffff888103082e00
[   15.087646]  which belongs to the cache kmalloc-64 of size 64
[   15.088284] The buggy address is located 0 bytes to the right of
[   15.088284]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.088866] 
[   15.088970] The buggy address belongs to the physical page:
[   15.089261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.089621] flags: 0x200000000000000(node=0|zone=2)
[   15.089865] page_type: f5(slab)
[   15.090039] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.090403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.090910] page dumped because: kasan: bad access detected
[   15.091171] 
[   15.091298] Memory state around the buggy address:
[   15.091647]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.091969]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.092430] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.092818]                                      ^
[   15.092988]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.093296]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.093728] ==================================================================
[   15.186628] ==================================================================
[   15.187191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   15.187646] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.187903] 
[   15.188189] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.188367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.188383] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.188407] Call Trace:
[   15.188426]  <TASK>
[   15.188455]  dump_stack_lvl+0x73/0xb0
[   15.188489]  print_report+0xd1/0x610
[   15.188514]  ? __virt_addr_valid+0x1db/0x2d0
[   15.188541]  ? kasan_atomics_helper+0x565/0x5450
[   15.188565]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.188591]  ? kasan_atomics_helper+0x565/0x5450
[   15.188616]  kasan_report+0x141/0x180
[   15.188639]  ? kasan_atomics_helper+0x565/0x5450
[   15.188668]  kasan_check_range+0x10c/0x1c0
[   15.188694]  __kasan_check_write+0x18/0x20
[   15.188716]  kasan_atomics_helper+0x565/0x5450
[   15.188741]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.188780]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.188808]  ? kasan_atomics+0x152/0x310
[   15.188837]  kasan_atomics+0x1dc/0x310
[   15.188862]  ? __pfx_kasan_atomics+0x10/0x10
[   15.188889]  ? __pfx_read_tsc+0x10/0x10
[   15.188912]  ? ktime_get_ts64+0x86/0x230
[   15.188940]  kunit_try_run_case+0x1a5/0x480
[   15.188966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.189007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.189035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.189061]  ? __kthread_parkme+0x82/0x180
[   15.189085]  ? preempt_count_sub+0x50/0x80
[   15.189112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.189140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.189167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.189195]  kthread+0x337/0x6f0
[   15.189217]  ? trace_preempt_on+0x20/0xc0
[   15.189242]  ? __pfx_kthread+0x10/0x10
[   15.189265]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.189290]  ? calculate_sigpending+0x7b/0xa0
[   15.189317]  ? __pfx_kthread+0x10/0x10
[   15.189341]  ret_from_fork+0x116/0x1d0
[   15.189362]  ? __pfx_kthread+0x10/0x10
[   15.189384]  ret_from_fork_asm+0x1a/0x30
[   15.189416]  </TASK>
[   15.189428] 
[   15.200694] Allocated by task 282:
[   15.200901]  kasan_save_stack+0x45/0x70
[   15.201273]  kasan_save_track+0x18/0x40
[   15.201593]  kasan_save_alloc_info+0x3b/0x50
[   15.201815]  __kasan_kmalloc+0xb7/0xc0
[   15.202132]  __kmalloc_cache_noprof+0x189/0x420
[   15.202434]  kasan_atomics+0x95/0x310
[   15.202722]  kunit_try_run_case+0x1a5/0x480
[   15.202927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.203369]  kthread+0x337/0x6f0
[   15.203550]  ret_from_fork+0x116/0x1d0
[   15.203875]  ret_from_fork_asm+0x1a/0x30
[   15.204079] 
[   15.204276] The buggy address belongs to the object at ffff888103082e00
[   15.204276]  which belongs to the cache kmalloc-64 of size 64
[   15.204965] The buggy address is located 0 bytes to the right of
[   15.204965]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.205836] 
[   15.205987] The buggy address belongs to the physical page:
[   15.206520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.206965] flags: 0x200000000000000(node=0|zone=2)
[   15.207368] page_type: f5(slab)
[   15.207539] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.207856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.208341] page dumped because: kasan: bad access detected
[   15.208686] 
[   15.208776] Memory state around the buggy address:
[   15.209194]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.209749]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.210170] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.210609]                                      ^
[   15.210919]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.211407]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.211669] ==================================================================
[   15.403108] ==================================================================
[   15.403399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   15.403717] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.404081] 
[   15.404184] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.404229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.404242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.404264] Call Trace:
[   15.404281]  <TASK>
[   15.404297]  dump_stack_lvl+0x73/0xb0
[   15.404328]  print_report+0xd1/0x610
[   15.404353]  ? __virt_addr_valid+0x1db/0x2d0
[   15.404378]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.404402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.404428]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.404453]  kasan_report+0x141/0x180
[   15.404477]  ? kasan_atomics_helper+0xb6a/0x5450
[   15.404506]  kasan_check_range+0x10c/0x1c0
[   15.404532]  __kasan_check_write+0x18/0x20
[   15.404554]  kasan_atomics_helper+0xb6a/0x5450
[   15.404579]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.404604]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.404632]  ? kasan_atomics+0x152/0x310
[   15.404660]  kasan_atomics+0x1dc/0x310
[   15.404684]  ? __pfx_kasan_atomics+0x10/0x10
[   15.404710]  ? __pfx_read_tsc+0x10/0x10
[   15.404732]  ? ktime_get_ts64+0x86/0x230
[   15.404769]  kunit_try_run_case+0x1a5/0x480
[   15.404797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.404833]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.404860]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.404886]  ? __kthread_parkme+0x82/0x180
[   15.404909]  ? preempt_count_sub+0x50/0x80
[   15.404935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.404962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.404989]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.405016]  kthread+0x337/0x6f0
[   15.405037]  ? trace_preempt_on+0x20/0xc0
[   15.405062]  ? __pfx_kthread+0x10/0x10
[   15.405085]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.405108]  ? calculate_sigpending+0x7b/0xa0
[   15.405135]  ? __pfx_kthread+0x10/0x10
[   15.405158]  ret_from_fork+0x116/0x1d0
[   15.405178]  ? __pfx_kthread+0x10/0x10
[   15.405200]  ret_from_fork_asm+0x1a/0x30
[   15.405233]  </TASK>
[   15.405244] 
[   15.417195] Allocated by task 282:
[   15.417356]  kasan_save_stack+0x45/0x70
[   15.417568]  kasan_save_track+0x18/0x40
[   15.418501]  kasan_save_alloc_info+0x3b/0x50
[   15.418680]  __kasan_kmalloc+0xb7/0xc0
[   15.418832]  __kmalloc_cache_noprof+0x189/0x420
[   15.418999]  kasan_atomics+0x95/0x310
[   15.419269]  kunit_try_run_case+0x1a5/0x480
[   15.419460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.419723]  kthread+0x337/0x6f0
[   15.419903]  ret_from_fork+0x116/0x1d0
[   15.420066]  ret_from_fork_asm+0x1a/0x30
[   15.420266] 
[   15.420350] The buggy address belongs to the object at ffff888103082e00
[   15.420350]  which belongs to the cache kmalloc-64 of size 64
[   15.420952] The buggy address is located 0 bytes to the right of
[   15.420952]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.421468] 
[   15.421543] The buggy address belongs to the physical page:
[   15.421714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.422278] flags: 0x200000000000000(node=0|zone=2)
[   15.422535] page_type: f5(slab)
[   15.422725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.423340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.424475] page dumped because: kasan: bad access detected
[   15.424718] 
[   15.424812] Memory state around the buggy address:
[   15.425184]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.425537]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.425833] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.426148]                                      ^
[   15.426359]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.426879]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.427285] ==================================================================
[   15.428394] ==================================================================
[   15.428724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   15.429151] Write of size 4 at addr ffff888103082e30 by task kunit_try_catch/282
[   15.429755] 
[   15.429887] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   15.429937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.429951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.429975] Call Trace:
[   15.429993]  <TASK>
[   15.430010]  dump_stack_lvl+0x73/0xb0
[   15.430042]  print_report+0xd1/0x610
[   15.430069]  ? __virt_addr_valid+0x1db/0x2d0
[   15.430292]  ? kasan_atomics_helper+0xc70/0x5450
[   15.430318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.430345]  ? kasan_atomics_helper+0xc70/0x5450
[   15.430370]  kasan_report+0x141/0x180
[   15.430394]  ? kasan_atomics_helper+0xc70/0x5450
[   15.430423]  kasan_check_range+0x10c/0x1c0
[   15.430465]  __kasan_check_write+0x18/0x20
[   15.430487]  kasan_atomics_helper+0xc70/0x5450
[   15.430512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.430537]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.430565]  ? kasan_atomics+0x152/0x310
[   15.430594]  kasan_atomics+0x1dc/0x310
[   15.430618]  ? __pfx_kasan_atomics+0x10/0x10
[   15.430645]  ? __pfx_read_tsc+0x10/0x10
[   15.430669]  ? ktime_get_ts64+0x86/0x230
[   15.430697]  kunit_try_run_case+0x1a5/0x480
[   15.430724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.430750]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.430790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.430817]  ? __kthread_parkme+0x82/0x180
[   15.430839]  ? preempt_count_sub+0x50/0x80
[   15.430865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.430892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.430920]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.430948]  kthread+0x337/0x6f0
[   15.430968]  ? trace_preempt_on+0x20/0xc0
[   15.430993]  ? __pfx_kthread+0x10/0x10
[   15.431016]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.431039]  ? calculate_sigpending+0x7b/0xa0
[   15.431065]  ? __pfx_kthread+0x10/0x10
[   15.431089]  ret_from_fork+0x116/0x1d0
[   15.431109]  ? __pfx_kthread+0x10/0x10
[   15.431131]  ret_from_fork_asm+0x1a/0x30
[   15.431164]  </TASK>
[   15.431175] 
[   15.440906] Allocated by task 282:
[   15.441082]  kasan_save_stack+0x45/0x70
[   15.441288]  kasan_save_track+0x18/0x40
[   15.441485]  kasan_save_alloc_info+0x3b/0x50
[   15.441969]  __kasan_kmalloc+0xb7/0xc0
[   15.442223]  __kmalloc_cache_noprof+0x189/0x420
[   15.442402]  kasan_atomics+0x95/0x310
[   15.442731]  kunit_try_run_case+0x1a5/0x480
[   15.443010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.443313]  kthread+0x337/0x6f0
[   15.443549]  ret_from_fork+0x116/0x1d0
[   15.443734]  ret_from_fork_asm+0x1a/0x30
[   15.443931] 
[   15.444033] The buggy address belongs to the object at ffff888103082e00
[   15.444033]  which belongs to the cache kmalloc-64 of size 64
[   15.444782] The buggy address is located 0 bytes to the right of
[   15.444782]  allocated 48-byte region [ffff888103082e00, ffff888103082e30)
[   15.445336] 
[   15.445528] The buggy address belongs to the physical page:
[   15.445839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103082
[   15.446143] flags: 0x200000000000000(node=0|zone=2)
[   15.446485] page_type: f5(slab)
[   15.446660] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.447135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.447517] page dumped because: kasan: bad access detected
[   15.447842] 
[   15.448001] Memory state around the buggy address:
[   15.448211]  ffff888103082d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.448623]  ffff888103082d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.448991] >ffff888103082e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.449358]                                      ^
[   15.449610]  ffff888103082e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.449923]  ffff888103082f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.450220] ==================================================================