Hay
Date
July 1, 2025, 11:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.501323] ==================================================================
[   21.501399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   21.501463] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.502205] 
[   21.502733] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.502881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.502914] Hardware name: linux,dummy-virt (DT)
[   21.502955] Call trace:
[   21.504009]  show_stack+0x20/0x38 (C)
[   21.504189]  dump_stack_lvl+0x8c/0xd0
[   21.504247]  print_report+0x118/0x608
[   21.504302]  kasan_report+0xdc/0x128
[   21.504354]  kasan_check_range+0x100/0x1a8
[   21.504409]  __kasan_check_write+0x20/0x30
[   21.504461]  kasan_atomics_helper+0xad4/0x4858
[   21.504516]  kasan_atomics+0x198/0x2e0
[   21.504567]  kunit_try_run_case+0x170/0x3f0
[   21.504622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.504681]  kthread+0x328/0x630
[   21.504730]  ret_from_fork+0x10/0x20
[   21.504897]  kasan_save_track+0x20/0x40
[   21.506142]  __kasan_kmalloc+0xd4/0xd8
[   21.506187]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.506234]  kasan_atomics+0xb8/0x2e0
[   21.506708]  kunit_try_run_case+0x170/0x3f0
[   21.506798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.506854]  kthread+0x328/0x630
[   21.506894]  ret_from_fork+0x10/0x20
[   21.506937] 
[   21.506962] The buggy address belongs to the object at fff00000c76da700
[   21.506962]  which belongs to the cache kmalloc-64 of size 64
[   21.507046] The buggy address is located 0 bytes to the right of
[   21.507046]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.507124] 
[   21.507526] The buggy address belongs to the physical page:
[   21.507570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.507640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.507810] page_type: f5(slab)
[   21.507859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.508405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.508855] page dumped because: kasan: bad access detected
[   21.508947] 
[   21.508970] Memory state around the buggy address:
[   21.509011]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.509412]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.509468] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.509716]                                      ^
[   21.510047]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.510142]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.510190] ==================================================================
[   21.668843] ==================================================================
[   21.668922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.669372] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.669455] 
[   21.669498] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.669601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.669955] Hardware name: linux,dummy-virt (DT)
[   21.670357] Call trace:
[   21.670421]  show_stack+0x20/0x38 (C)
[   21.670524]  dump_stack_lvl+0x8c/0xd0
[   21.670583]  print_report+0x118/0x608
[   21.670636]  kasan_report+0xdc/0x128
[   21.670697]  kasan_check_range+0x100/0x1a8
[   21.670754]  __kasan_check_write+0x20/0x30
[   21.670804]  kasan_atomics_helper+0x1058/0x4858
[   21.670870]  kasan_atomics+0x198/0x2e0
[   21.670920]  kunit_try_run_case+0x170/0x3f0
[   21.670988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.671047]  kthread+0x328/0x630
[   21.671094]  ret_from_fork+0x10/0x20
[   21.671390] 
[   21.671416] Allocated by task 266:
[   21.671773]  kasan_save_stack+0x3c/0x68
[   21.671865]  kasan_save_track+0x20/0x40
[   21.672219]  kasan_save_alloc_info+0x40/0x58
[   21.672391]  __kasan_kmalloc+0xd4/0xd8
[   21.672493]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.673237]  kasan_atomics+0xb8/0x2e0
[   21.673308]  kunit_try_run_case+0x170/0x3f0
[   21.673352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.673785]  kthread+0x328/0x630
[   21.674196]  ret_from_fork+0x10/0x20
[   21.674314] 
[   21.674399] The buggy address belongs to the object at fff00000c76da700
[   21.674399]  which belongs to the cache kmalloc-64 of size 64
[   21.674826] The buggy address is located 0 bytes to the right of
[   21.674826]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.675242] 
[   21.675410] The buggy address belongs to the physical page:
[   21.675483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.675553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.675613] page_type: f5(slab)
[   21.675663] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.675724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.675774] page dumped because: kasan: bad access detected
[   21.676187] 
[   21.676306] Memory state around the buggy address:
[   21.676786]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.676857]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.677194] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.677272]                                      ^
[   21.677460]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.677535]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.677580] ==================================================================
[   21.460899] ==================================================================
[   21.460987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   21.461143] Read of size 4 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.461581] 
[   21.461650] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.461805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.461846] Hardware name: linux,dummy-virt (DT)
[   21.462372] Call trace:
[   21.462497]  show_stack+0x20/0x38 (C)
[   21.462861]  dump_stack_lvl+0x8c/0xd0
[   21.462999]  print_report+0x118/0x608
[   21.463205]  kasan_report+0xdc/0x128
[   21.466327]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.466476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.466992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.468970]                                      ^
[   21.472040] 
[   21.473147]  dump_stack_lvl+0x8c/0xd0
[   21.473583]  print_report+0x118/0x608
[   21.473789]  kasan_report+0xdc/0x128
[   21.474106]  kasan_check_range+0x100/0x1a8
[   21.474361]  __kasan_check_write+0x20/0x30
[   21.474505]  kasan_atomics_helper+0x934/0x4858
[   21.474988]  kasan_atomics+0x198/0x2e0
[   21.475086]  kunit_try_run_case+0x170/0x3f0
[   21.475195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.475256]  kthread+0x328/0x630
[   21.475597]  ret_from_fork+0x10/0x20
[   21.475704] 
[   21.475730] Allocated by task 266:
[   21.475766]  kasan_save_stack+0x3c/0x68
[   21.475814]  kasan_save_track+0x20/0x40
[   21.475856]  kasan_save_alloc_info+0x40/0x58
[   21.475902]  __kasan_kmalloc+0xd4/0xd8
[   21.475943]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.476002]  kasan_atomics+0xb8/0x2e0
[   21.476053]  kunit_try_run_case+0x170/0x3f0
[   21.476105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.476166]  kthread+0x328/0x630
[   21.476211]  ret_from_fork+0x10/0x20
[   21.476253] 
[   21.476297] The buggy address belongs to the object at fff00000c76da700
[   21.476297]  which belongs to the cache kmalloc-64 of size 64
[   21.476367] The buggy address is located 0 bytes to the right of
[   21.476367]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.476441] 
[   21.476466] The buggy address belongs to the physical page:
[   21.476504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.476592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.476659] page_type: f5(slab)
[   21.476716] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.476781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.476845] page dumped because: kasan: bad access detected
[   21.476895] 
[   21.476927] Memory state around the buggy address:
[   21.476967]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.477028]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.477090] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.477644]                                      ^
[   21.478019]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.478208]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.478937] ==================================================================
[   21.680298] ==================================================================
[   21.680378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   21.680447] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.680507] 
[   21.680550] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.680646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.680678] Hardware name: linux,dummy-virt (DT)
[   21.681335] Call trace:
[   21.681533]  show_stack+0x20/0x38 (C)
[   21.681970]  dump_stack_lvl+0x8c/0xd0
[   21.682302]  print_report+0x118/0x608
[   21.682367]  kasan_report+0xdc/0x128
[   21.682510]  kasan_check_range+0x100/0x1a8
[   21.682568]  __kasan_check_write+0x20/0x30
[   21.682617]  kasan_atomics_helper+0x10c0/0x4858
[   21.682739]  kasan_atomics+0x198/0x2e0
[   21.682793]  kunit_try_run_case+0x170/0x3f0
[   21.683181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.683318]  kthread+0x328/0x630
[   21.683720]  ret_from_fork+0x10/0x20
[   21.683902] 
[   21.684005] Allocated by task 266:
[   21.684266]  kasan_save_stack+0x3c/0x68
[   21.684325]  kasan_save_track+0x20/0x40
[   21.684368]  kasan_save_alloc_info+0x40/0x58
[   21.684754]  __kasan_kmalloc+0xd4/0xd8
[   21.684832]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.685059]  kasan_atomics+0xb8/0x2e0
[   21.685420]  kunit_try_run_case+0x170/0x3f0
[   21.685507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.685645]  kthread+0x328/0x630
[   21.685697]  ret_from_fork+0x10/0x20
[   21.685786] 
[   21.685814] The buggy address belongs to the object at fff00000c76da700
[   21.685814]  which belongs to the cache kmalloc-64 of size 64
[   21.685889] The buggy address is located 0 bytes to the right of
[   21.685889]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.685970] 
[   21.686005] The buggy address belongs to the physical page:
[   21.686055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.686140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.686209] page_type: f5(slab)
[   21.686265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.686327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.686376] page dumped because: kasan: bad access detected
[   21.686415] 
[   21.686452] Memory state around the buggy address:
[   21.686493]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.686545]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.686606] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.686670]                                      ^
[   21.686718]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.686768]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.686812] ==================================================================
[   21.584530] ==================================================================
[   21.585112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   21.585208] Read of size 4 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.585359] 
[   21.585441] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.586000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.586083] Hardware name: linux,dummy-virt (DT)
[   21.586361] Call trace:
[   21.586420]  show_stack+0x20/0x38 (C)
[   21.586486]  dump_stack_lvl+0x8c/0xd0
[   21.586619]  print_report+0x118/0x608
[   21.586710]  kasan_report+0xdc/0x128
[   21.586863]  __asan_report_load4_noabort+0x20/0x30
[   21.586923]  kasan_atomics_helper+0x3e04/0x4858
[   21.587007]  kasan_atomics+0x198/0x2e0
[   21.587066]  kunit_try_run_case+0x170/0x3f0
[   21.587387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.587694]  kthread+0x328/0x630
[   21.587763]  ret_from_fork+0x10/0x20
[   21.587919] 
[   21.587974] Allocated by task 266:
[   21.588012]  kasan_save_stack+0x3c/0x68
[   21.588063]  kasan_save_track+0x20/0x40
[   21.588105]  kasan_save_alloc_info+0x40/0x58
[   21.588165]  __kasan_kmalloc+0xd4/0xd8
[   21.588207]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.588272]  kasan_atomics+0xb8/0x2e0
[   21.588315]  kunit_try_run_case+0x170/0x3f0
[   21.588359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.588415]  kthread+0x328/0x630
[   21.588458]  ret_from_fork+0x10/0x20
[   21.588511] 
[   21.588562] The buggy address belongs to the object at fff00000c76da700
[   21.588562]  which belongs to the cache kmalloc-64 of size 64
[   21.588637] The buggy address is located 0 bytes to the right of
[   21.588637]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.588720] 
[   21.588753] The buggy address belongs to the physical page:
[   21.588803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.588867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.588926] page_type: f5(slab)
[   21.588983] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.589053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.589101] page dumped because: kasan: bad access detected
[   21.589874] 
[   21.589926] Memory state around the buggy address:
[   21.589999]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.590377]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.590481] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.591091]                                      ^
[   21.591196]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.591424]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.591553] ==================================================================
[   21.564702] ==================================================================
[   21.564805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   21.564876] Read of size 4 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.565209] 
[   21.565471] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.565649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.565722] Hardware name: linux,dummy-virt (DT)
[   21.565793] Call trace:
[   21.565830]  show_stack+0x20/0x38 (C)
[   21.566145]  dump_stack_lvl+0x8c/0xd0
[   21.566230]  print_report+0x118/0x608
[   21.566380]  kasan_report+0xdc/0x128
[   21.566436]  __asan_report_load4_noabort+0x20/0x30
[   21.566500]  kasan_atomics_helper+0x3dd8/0x4858
[   21.566699]  kasan_atomics+0x198/0x2e0
[   21.566887]  kunit_try_run_case+0x170/0x3f0
[   21.567081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.567286]  kthread+0x328/0x630
[   21.567692]  ret_from_fork+0x10/0x20
[   21.567896] 
[   21.567968] Allocated by task 266:
[   21.568114]  kasan_save_stack+0x3c/0x68
[   21.568320]  kasan_save_track+0x20/0x40
[   21.568365]  kasan_save_alloc_info+0x40/0x58
[   21.568411]  __kasan_kmalloc+0xd4/0xd8
[   21.568777]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.568853]  kasan_atomics+0xb8/0x2e0
[   21.568896]  kunit_try_run_case+0x170/0x3f0
[   21.569248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.569542]  kthread+0x328/0x630
[   21.569696]  ret_from_fork+0x10/0x20
[   21.569739] 
[   21.569794] The buggy address belongs to the object at fff00000c76da700
[   21.569794]  which belongs to the cache kmalloc-64 of size 64
[   21.570150] The buggy address is located 0 bytes to the right of
[   21.570150]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.570390] 
[   21.570527] The buggy address belongs to the physical page:
[   21.570700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.570838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.570899] page_type: f5(slab)
[   21.570952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.571011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.571302] page dumped because: kasan: bad access detected
[   21.571534] 
[   21.571567] Memory state around the buggy address:
[   21.571609]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.572039]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.572149] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.572585]                                      ^
[   21.572703]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.572884]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.573097] ==================================================================
[   21.785489] ==================================================================
[   21.785641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   21.785742] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.785880] 
[   21.785926] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.786159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.786206] Hardware name: linux,dummy-virt (DT)
[   21.786264] Call trace:
[   21.786388]  show_stack+0x20/0x38 (C)
[   21.786456]  dump_stack_lvl+0x8c/0xd0
[   21.786586]  print_report+0x118/0x608
[   21.786691]  kasan_report+0xdc/0x128
[   21.786824]  __asan_report_load8_noabort+0x20/0x30
[   21.787019]  kasan_atomics_helper+0x3db0/0x4858
[   21.787092]  kasan_atomics+0x198/0x2e0
[   21.787270]  kunit_try_run_case+0x170/0x3f0
[   21.787498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.787584]  kthread+0x328/0x630
[   21.787638]  ret_from_fork+0x10/0x20
[   21.787694] 
[   21.787717] Allocated by task 266:
[   21.787750]  kasan_save_stack+0x3c/0x68
[   21.788037]  kasan_save_track+0x20/0x40
[   21.788188]  kasan_save_alloc_info+0x40/0x58
[   21.788238]  __kasan_kmalloc+0xd4/0xd8
[   21.788323]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.788400]  kasan_atomics+0xb8/0x2e0
[   21.788445]  kunit_try_run_case+0x170/0x3f0
[   21.788498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.788548]  kthread+0x328/0x630
[   21.788596]  ret_from_fork+0x10/0x20
[   21.788648] 
[   21.788686] The buggy address belongs to the object at fff00000c76da700
[   21.788686]  which belongs to the cache kmalloc-64 of size 64
[   21.788759] The buggy address is located 0 bytes to the right of
[   21.788759]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.788849] 
[   21.788876] The buggy address belongs to the physical page:
[   21.788924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.789008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.789084] page_type: f5(slab)
[   21.789141] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.789533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.789585] page dumped because: kasan: bad access detected
[   21.789969] 
[   21.790059] Memory state around the buggy address:
[   21.790413]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.790542]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.790766] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.790936]                                      ^
[   21.791086]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.791232]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.791325] ==================================================================
[   21.730451] ==================================================================
[   21.730584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   21.730653] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.731126] 
[   21.731431] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.731594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.731737] Hardware name: linux,dummy-virt (DT)
[   21.731788] Call trace:
[   21.731882]  show_stack+0x20/0x38 (C)
[   21.731968]  dump_stack_lvl+0x8c/0xd0
[   21.732026]  print_report+0x118/0x608
[   21.732078]  kasan_report+0xdc/0x128
[   21.732173]  kasan_check_range+0x100/0x1a8
[   21.732229]  __kasan_check_write+0x20/0x30
[   21.732544]  kasan_atomics_helper+0x12d8/0x4858
[   21.733048]  kasan_atomics+0x198/0x2e0
[   21.733452]  kunit_try_run_case+0x170/0x3f0
[   21.733636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.733703]  kthread+0x328/0x630
[   21.733819]  ret_from_fork+0x10/0x20
[   21.734259] 
[   21.734322] Allocated by task 266:
[   21.735033]  kasan_save_stack+0x3c/0x68
[   21.735314]  kasan_save_track+0x20/0x40
[   21.735366]  kasan_save_alloc_info+0x40/0x58
[   21.735414]  __kasan_kmalloc+0xd4/0xd8
[   21.735465]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.735634]  kasan_atomics+0xb8/0x2e0
[   21.735898]  kunit_try_run_case+0x170/0x3f0
[   21.735953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.736002]  kthread+0x328/0x630
[   21.736065]  ret_from_fork+0x10/0x20
[   21.736108] 
[   21.736166] The buggy address belongs to the object at fff00000c76da700
[   21.736166]  which belongs to the cache kmalloc-64 of size 64
[   21.736264] The buggy address is located 0 bytes to the right of
[   21.736264]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.736351] 
[   21.736378] The buggy address belongs to the physical page:
[   21.736417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.736491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.736561] page_type: f5(slab)
[   21.736610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.737236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.737311] page dumped because: kasan: bad access detected
[   21.737351] 
[   21.737374] Memory state around the buggy address:
[   21.737791]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.737890]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.738373] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.738441]                                      ^
[   21.738493]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.738557]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.739209] ==================================================================
[   21.512118] ==================================================================
[   21.512209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   21.512822] Hardware name: linux,dummy-virt (DT)
[   21.514237]  __asan_report_load4_noabort+0x20/0x30
[   21.515439] 
[   21.516347]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.516396]  kasan_atomics+0xb8/0x2e0
[   21.516438]  kunit_try_run_case+0x170/0x3f0
[   21.516481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.516707] The buggy address is located 0 bytes to the right of
[   21.516707]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.517152] page dumped because: kasan: bad access detected
[   21.517249]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.517495]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.520635] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.521445]  kasan_check_range+0x100/0x1a8
[   21.521867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.522645]  __kasan_kmalloc+0xd4/0xd8
[   21.522758]  kasan_atomics+0xb8/0x2e0
[   21.522806]  kunit_try_run_case+0x170/0x3f0
[   21.523005] The buggy address belongs to the object at fff00000c76da700
[   21.523005]  which belongs to the cache kmalloc-64 of size 64
[   21.524677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.527834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   21.528374] Hardware name: linux,dummy-virt (DT)
[   21.528607]  kasan_report+0xdc/0x128
[   21.528962]  kthread+0x328/0x630
[   21.529311]  __kasan_kmalloc+0xd4/0xd8
[   21.529447]  kunit_try_run_case+0x170/0x3f0
[   21.529491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.529543]  kthread+0x328/0x630
[   21.529579]  ret_from_fork+0x10/0x20
[   21.529620] 
[   21.529643] The buggy address belongs to the object at fff00000c76da700
[   21.529643]  which belongs to the cache kmalloc-64 of size 64
[   21.529929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.530304]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.531268]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.534740] Hardware name: linux,dummy-virt (DT)
[   21.537601] Allocated by task 266:
[   21.539225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.539424]  kthread+0x328/0x630
[   21.539666]  ret_from_fork+0x10/0x20
[   21.539841] 
[   21.540067] The buggy address belongs to the object at fff00000c76da700
[   21.540067]  which belongs to the cache kmalloc-64 of size 64
[   21.540325] The buggy address is located 0 bytes to the right of
[   21.540325]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.540492] 
[   21.540566] The buggy address belongs to the physical page:
[   21.540959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.541115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.541190] page_type: f5(slab)
[   21.541471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.541654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.541888] page dumped because: kasan: bad access detected
[   21.542057] 
[   21.542180] Memory state around the buggy address:
[   21.542225]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.542697]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.542867] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.543009]                                      ^
[   21.543380]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.545706] Hardware name: linux,dummy-virt (DT)
[   21.546792]  kthread+0x328/0x630
[   21.548472]  __kasan_kmalloc+0xd4/0xd8
[   21.549454] The buggy address belongs to the object at fff00000c76da700
[   21.549454]  which belongs to the cache kmalloc-64 of size 64
[   21.549997] 
[   21.550544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.551289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.551752]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.554455] ==================================================================
[   21.798862] ==================================================================
[   21.798979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   21.799093] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.799266] 
[   21.799450] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.799755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.799960] Hardware name: linux,dummy-virt (DT)
[   21.800113] Call trace:
[   21.800212]  show_stack+0x20/0x38 (C)
[   21.800376]  dump_stack_lvl+0x8c/0xd0
[   21.800456]  print_report+0x118/0x608
[   21.800508]  kasan_report+0xdc/0x128
[   21.800560]  __asan_report_load8_noabort+0x20/0x30
[   21.800615]  kasan_atomics_helper+0x3df4/0x4858
[   21.800670]  kasan_atomics+0x198/0x2e0
[   21.800845]  kunit_try_run_case+0x170/0x3f0
[   21.800972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.801277]  kthread+0x328/0x630
[   21.801536]  ret_from_fork+0x10/0x20
[   21.801615] 
[   21.801640] Allocated by task 266:
[   21.801712]  kasan_save_stack+0x3c/0x68
[   21.801779]  kasan_save_track+0x20/0x40
[   21.801861]  kasan_save_alloc_info+0x40/0x58
[   21.801907]  __kasan_kmalloc+0xd4/0xd8
[   21.801949]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.802006]  kasan_atomics+0xb8/0x2e0
[   21.802048]  kunit_try_run_case+0x170/0x3f0
[   21.802092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.802174]  kthread+0x328/0x630
[   21.802221]  ret_from_fork+0x10/0x20
[   21.802262] 
[   21.802301] The buggy address belongs to the object at fff00000c76da700
[   21.802301]  which belongs to the cache kmalloc-64 of size 64
[   21.802371] The buggy address is located 0 bytes to the right of
[   21.802371]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.802459] 
[   21.802505] The buggy address belongs to the physical page:
[   21.802544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.802606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.802666] page_type: f5(slab)
[   21.802710] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.802771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.802839] page dumped because: kasan: bad access detected
[   21.802886] 
[   21.802908] Memory state around the buggy address:
[   21.802973]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.803032]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.803098] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.803446]                                      ^
[   21.803495]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.803544]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.803600] ==================================================================
[   21.602065] ==================================================================
[   21.602229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.602434] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.602500] 
[   21.602544] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.602947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.603335] Hardware name: linux,dummy-virt (DT)
[   21.603620] Call trace:
[   21.603776]  show_stack+0x20/0x38 (C)
[   21.603961]  dump_stack_lvl+0x8c/0xd0
[   21.604039]  print_report+0x118/0x608
[   21.604091]  kasan_report+0xdc/0x128
[   21.604162]  __asan_report_load8_noabort+0x20/0x30
[   21.604216]  kasan_atomics_helper+0x3f58/0x4858
[   21.604617]  kasan_atomics+0x198/0x2e0
[   21.605117]  kunit_try_run_case+0x170/0x3f0
[   21.605262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.605588]  kthread+0x328/0x630
[   21.605643]  ret_from_fork+0x10/0x20
[   21.606094] 
[   21.606179] Allocated by task 266:
[   21.606226]  kasan_save_stack+0x3c/0x68
[   21.606290]  kasan_save_track+0x20/0x40
[   21.606346]  kasan_save_alloc_info+0x40/0x58
[   21.606402]  __kasan_kmalloc+0xd4/0xd8
[   21.606457]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.606520]  kasan_atomics+0xb8/0x2e0
[   21.606562]  kunit_try_run_case+0x170/0x3f0
[   21.606607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.606670]  kthread+0x328/0x630
[   21.606717]  ret_from_fork+0x10/0x20
[   21.606759] 
[   21.606799] The buggy address belongs to the object at fff00000c76da700
[   21.606799]  which belongs to the cache kmalloc-64 of size 64
[   21.606888] The buggy address is located 0 bytes to the right of
[   21.606888]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.606975] 
[   21.607001] The buggy address belongs to the physical page:
[   21.607039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.607650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.607742] page_type: f5(slab)
[   21.608029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.608150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.608203] page dumped because: kasan: bad access detected
[   21.608241] 
[   21.608262] Memory state around the buggy address:
[   21.608810]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.608907]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.609216] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.609515]                                      ^
[   21.609871]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.609974]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.610195] ==================================================================
[   21.574721] ==================================================================
[   21.574799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   21.574867] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.574926] 
[   21.574967] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.575060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.575092] Hardware name: linux,dummy-virt (DT)
[   21.575600] Call trace:
[   21.576127]  show_stack+0x20/0x38 (C)
[   21.576396]  dump_stack_lvl+0x8c/0xd0
[   21.576520]  print_report+0x118/0x608
[   21.576635]  kasan_report+0xdc/0x128
[   21.576686]  kasan_check_range+0x100/0x1a8
[   21.576740]  __kasan_check_write+0x20/0x30
[   21.577006]  kasan_atomics_helper+0xd3c/0x4858
[   21.577404]  kasan_atomics+0x198/0x2e0
[   21.577845]  kunit_try_run_case+0x170/0x3f0
[   21.577948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.578115]  kthread+0x328/0x630
[   21.578300]  ret_from_fork+0x10/0x20
[   21.578378] 
[   21.578403] Allocated by task 266:
[   21.578438]  kasan_save_stack+0x3c/0x68
[   21.578546]  kasan_save_track+0x20/0x40
[   21.578787]  kasan_save_alloc_info+0x40/0x58
[   21.578884]  __kasan_kmalloc+0xd4/0xd8
[   21.578944]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.578992]  kasan_atomics+0xb8/0x2e0
[   21.579034]  kunit_try_run_case+0x170/0x3f0
[   21.579086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.579368]  kthread+0x328/0x630
[   21.579705]  ret_from_fork+0x10/0x20
[   21.580237] 
[   21.580273] The buggy address belongs to the object at fff00000c76da700
[   21.580273]  which belongs to the cache kmalloc-64 of size 64
[   21.580349] The buggy address is located 0 bytes to the right of
[   21.580349]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.580775] 
[   21.580868] The buggy address belongs to the physical page:
[   21.580943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.581029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.581154] page_type: f5(slab)
[   21.581305] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.581507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.581627] page dumped because: kasan: bad access detected
[   21.582124] 
[   21.582231] Memory state around the buggy address:
[   21.582362]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.582573]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.582624] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.583056]                                      ^
[   21.583356]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.583415]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.583472] ==================================================================
[   21.492809] ==================================================================
[   21.492881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   21.493264] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.493629] 
[   21.493675] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.493771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.494418] Hardware name: linux,dummy-virt (DT)
[   21.494580] Call trace:
[   21.494709]  show_stack+0x20/0x38 (C)
[   21.494783]  dump_stack_lvl+0x8c/0xd0
[   21.494840]  print_report+0x118/0x608
[   21.494907]  kasan_report+0xdc/0x128
[   21.494960]  kasan_check_range+0x100/0x1a8
[   21.495569]  __kasan_check_write+0x20/0x30
[   21.495651]  kasan_atomics_helper+0xa6c/0x4858
[   21.495776]  kasan_atomics+0x198/0x2e0
[   21.495830]  kunit_try_run_case+0x170/0x3f0
[   21.495892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.496224]  kthread+0x328/0x630
[   21.496291]  ret_from_fork+0x10/0x20
[   21.496464] 
[   21.496489] Allocated by task 266:
[   21.496523]  kasan_save_stack+0x3c/0x68
[   21.496580]  kasan_save_track+0x20/0x40
[   21.496796]  kasan_save_alloc_info+0x40/0x58
[   21.496929]  __kasan_kmalloc+0xd4/0xd8
[   21.497032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.497086]  kasan_atomics+0xb8/0x2e0
[   21.497497]  kunit_try_run_case+0x170/0x3f0
[   21.497723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.497775]  kthread+0x328/0x630
[   21.497812]  ret_from_fork+0x10/0x20
[   21.497855] 
[   21.497881] The buggy address belongs to the object at fff00000c76da700
[   21.497881]  which belongs to the cache kmalloc-64 of size 64
[   21.497954] The buggy address is located 0 bytes to the right of
[   21.497954]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.498296] 
[   21.498384] The buggy address belongs to the physical page:
[   21.498493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.498678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.498844] page_type: f5(slab)
[   21.499090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.499169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.499280] page dumped because: kasan: bad access detected
[   21.499318] 
[   21.499342] Memory state around the buggy address:
[   21.499381]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.499432]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.499634] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.499705]                                      ^
[   21.499749]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.499800]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.499845] ==================================================================
[   21.741532] ==================================================================
[   21.741827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   21.741905] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.742224] 
[   21.742303] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.742446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.742665] Hardware name: linux,dummy-virt (DT)
[   21.742703] Call trace:
[   21.742875]  show_stack+0x20/0x38 (C)
[   21.742952]  dump_stack_lvl+0x8c/0xd0
[   21.743322]  print_report+0x118/0x608
[   21.743410]  kasan_report+0xdc/0x128
[   21.743572]  kasan_check_range+0x100/0x1a8
[   21.743700]  __kasan_check_write+0x20/0x30
[   21.743859]  kasan_atomics_helper+0x1384/0x4858
[   21.743916]  kasan_atomics+0x198/0x2e0
[   21.743966]  kunit_try_run_case+0x170/0x3f0
[   21.744020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.744744]  kthread+0x328/0x630
[   21.744832]  ret_from_fork+0x10/0x20
[   21.745073] 
[   21.745124] Allocated by task 266:
[   21.745184]  kasan_save_stack+0x3c/0x68
[   21.745332]  kasan_save_track+0x20/0x40
[   21.745400]  kasan_save_alloc_info+0x40/0x58
[   21.745458]  __kasan_kmalloc+0xd4/0xd8
[   21.745510]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.745558]  kasan_atomics+0xb8/0x2e0
[   21.745603]  kunit_try_run_case+0x170/0x3f0
[   21.745649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.745698]  kthread+0x328/0x630
[   21.745747]  ret_from_fork+0x10/0x20
[   21.745789] 
[   21.745829] The buggy address belongs to the object at fff00000c76da700
[   21.745829]  which belongs to the cache kmalloc-64 of size 64
[   21.745902] The buggy address is located 0 bytes to the right of
[   21.745902]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.745986] 
[   21.746012] The buggy address belongs to the physical page:
[   21.746051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.746115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.746195] page_type: f5(slab)
[   21.746243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.746304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.746362] page dumped because: kasan: bad access detected
[   21.746401] 
[   21.746435] Memory state around the buggy address:
[   21.746481]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.746532]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.746583] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.746653]                                      ^
[   21.746706]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.746755]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.746799] ==================================================================
[   21.771911] ==================================================================
[   21.771985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   21.772079] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.772226] 
[   21.772267] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.772612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.772696] Hardware name: linux,dummy-virt (DT)
[   21.772785] Call trace:
[   21.772815]  show_stack+0x20/0x38 (C)
[   21.772987]  dump_stack_lvl+0x8c/0xd0
[   21.773066]  print_report+0x118/0x608
[   21.773197]  kasan_report+0xdc/0x128
[   21.773252]  kasan_check_range+0x100/0x1a8
[   21.773329]  __kasan_check_write+0x20/0x30
[   21.773410]  kasan_atomics_helper+0x154c/0x4858
[   21.773466]  kasan_atomics+0x198/0x2e0
[   21.773719]  kunit_try_run_case+0x170/0x3f0
[   21.773825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.773897]  kthread+0x328/0x630
[   21.773945]  ret_from_fork+0x10/0x20
[   21.774068] 
[   21.774094] Allocated by task 266:
[   21.774169]  kasan_save_stack+0x3c/0x68
[   21.774348]  kasan_save_track+0x20/0x40
[   21.774404]  kasan_save_alloc_info+0x40/0x58
[   21.774485]  __kasan_kmalloc+0xd4/0xd8
[   21.774553]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.774648]  kasan_atomics+0xb8/0x2e0
[   21.774694]  kunit_try_run_case+0x170/0x3f0
[   21.774826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.774882]  kthread+0x328/0x630
[   21.774920]  ret_from_fork+0x10/0x20
[   21.774960] 
[   21.775046] The buggy address belongs to the object at fff00000c76da700
[   21.775046]  which belongs to the cache kmalloc-64 of size 64
[   21.775252] The buggy address is located 0 bytes to the right of
[   21.775252]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.775339] 
[   21.775365] The buggy address belongs to the physical page:
[   21.775454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.775519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.775575] page_type: f5(slab)
[   21.775622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.775722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.775902] page dumped because: kasan: bad access detected
[   21.776148] 
[   21.776250] Memory state around the buggy address:
[   21.776418]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.776473]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.776727] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.776788]                                      ^
[   21.776882]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.776964]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.777232] ==================================================================
[   21.710210] ==================================================================
[   21.710308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   21.710410] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.710470] 
[   21.710508] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.710600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.710632] Hardware name: linux,dummy-virt (DT)
[   21.710668] Call trace:
[   21.710696]  show_stack+0x20/0x38 (C)
[   21.710751]  dump_stack_lvl+0x8c/0xd0
[   21.710805]  print_report+0x118/0x608
[   21.710855]  kasan_report+0xdc/0x128
[   21.710905]  kasan_check_range+0x100/0x1a8
[   21.710970]  __kasan_check_write+0x20/0x30
[   21.711021]  kasan_atomics_helper+0x11f8/0x4858
[   21.711075]  kasan_atomics+0x198/0x2e0
[   21.711519]  kunit_try_run_case+0x170/0x3f0
[   21.711869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.711951]  kthread+0x328/0x630
[   21.711998]  ret_from_fork+0x10/0x20
[   21.712053] 
[   21.712076] Allocated by task 266:
[   21.712109]  kasan_save_stack+0x3c/0x68
[   21.712170]  kasan_save_track+0x20/0x40
[   21.712587]  kasan_save_alloc_info+0x40/0x58
[   21.712991]  __kasan_kmalloc+0xd4/0xd8
[   21.713069]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.713504]  kasan_atomics+0xb8/0x2e0
[   21.713953]  kunit_try_run_case+0x170/0x3f0
[   21.714159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.714358]  kthread+0x328/0x630
[   21.714438]  ret_from_fork+0x10/0x20
[   21.715019] 
[   21.715235] The buggy address belongs to the object at fff00000c76da700
[   21.715235]  which belongs to the cache kmalloc-64 of size 64
[   21.715447] The buggy address is located 0 bytes to the right of
[   21.715447]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.715666] 
[   21.715698] The buggy address belongs to the physical page:
[   21.715873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.715990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.716367] page_type: f5(slab)
[   21.716541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.716793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.716850] page dumped because: kasan: bad access detected
[   21.717074] 
[   21.717315] Memory state around the buggy address:
[   21.717389]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.717790]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.717928] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.717980]                                      ^
[   21.718194]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.718415]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.718491] ==================================================================
[   21.766468] ==================================================================
[   21.766531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   21.766582] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.766649] 
[   21.766684] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.766783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.766821] Hardware name: linux,dummy-virt (DT)
[   21.766859] Call trace:
[   21.766884]  show_stack+0x20/0x38 (C)
[   21.766937]  dump_stack_lvl+0x8c/0xd0
[   21.766987]  print_report+0x118/0x608
[   21.767039]  kasan_report+0xdc/0x128
[   21.767087]  kasan_check_range+0x100/0x1a8
[   21.767944]  __kasan_check_write+0x20/0x30
[   21.768087]  kasan_atomics_helper+0x14e4/0x4858
[   21.768228]  kasan_atomics+0x198/0x2e0
[   21.768283]  kunit_try_run_case+0x170/0x3f0
[   21.768335]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.768394]  kthread+0x328/0x630
[   21.768441]  ret_from_fork+0x10/0x20
[   21.768493] 
[   21.768514] Allocated by task 266:
[   21.768546]  kasan_save_stack+0x3c/0x68
[   21.768590]  kasan_save_track+0x20/0x40
[   21.768654]  kasan_save_alloc_info+0x40/0x58
[   21.768808]  __kasan_kmalloc+0xd4/0xd8
[   21.768903]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.769053]  kasan_atomics+0xb8/0x2e0
[   21.769196]  kunit_try_run_case+0x170/0x3f0
[   21.769352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.769534]  kthread+0x328/0x630
[   21.769673]  ret_from_fork+0x10/0x20
[   21.769744] 
[   21.769770] The buggy address belongs to the object at fff00000c76da700
[   21.769770]  which belongs to the cache kmalloc-64 of size 64
[   21.769837] The buggy address is located 0 bytes to the right of
[   21.769837]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.769910] 
[   21.769935] The buggy address belongs to the physical page:
[   21.769972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.770033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.770088] page_type: f5(slab)
[   21.770143] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.770202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.770332] page dumped because: kasan: bad access detected
[   21.770371] 
[   21.770393] Memory state around the buggy address:
[   21.770431]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.770481]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.770531] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.770617]                                      ^
[   21.770835]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.770958]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.771422] ==================================================================
[   21.612265] ==================================================================
[   21.612496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.612571] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.612922] 
[   21.612980] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.613408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.613482] Hardware name: linux,dummy-virt (DT)
[   21.613535] Call trace:
[   21.613590]  show_stack+0x20/0x38 (C)
[   21.614149]  dump_stack_lvl+0x8c/0xd0
[   21.614250]  print_report+0x118/0x608
[   21.614309]  kasan_report+0xdc/0x128
[   21.614676]  kasan_check_range+0x100/0x1a8
[   21.614757]  __kasan_check_write+0x20/0x30
[   21.614811]  kasan_atomics_helper+0xe44/0x4858
[   21.614866]  kasan_atomics+0x198/0x2e0
[   21.615254]  kunit_try_run_case+0x170/0x3f0
[   21.615672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.615844]  kthread+0x328/0x630
[   21.615949]  ret_from_fork+0x10/0x20
[   21.616090] 
[   21.616116] Allocated by task 266:
[   21.616164]  kasan_save_stack+0x3c/0x68
[   21.616214]  kasan_save_track+0x20/0x40
[   21.616259]  kasan_save_alloc_info+0x40/0x58
[   21.616303]  __kasan_kmalloc+0xd4/0xd8
[   21.616344]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.616391]  kasan_atomics+0xb8/0x2e0
[   21.616432]  kunit_try_run_case+0x170/0x3f0
[   21.616477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.616528]  kthread+0x328/0x630
[   21.616567]  ret_from_fork+0x10/0x20
[   21.616621] 
[   21.616662] The buggy address belongs to the object at fff00000c76da700
[   21.616662]  which belongs to the cache kmalloc-64 of size 64
[   21.616756] The buggy address is located 0 bytes to the right of
[   21.616756]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.616831] 
[   21.616863] The buggy address belongs to the physical page:
[   21.616912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.616978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.617050] page_type: f5(slab)
[   21.617098] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.617182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.617240] page dumped because: kasan: bad access detected
[   21.617302] 
[   21.617334] Memory state around the buggy address:
[   21.617390]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.617453]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.617502] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.617547]                                      ^
[   21.617595]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.617646]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.617693] ==================================================================
[   21.763618] ==================================================================
[   21.763680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   21.763734] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.763792] 
[   21.763828] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.763919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.763950] Hardware name: linux,dummy-virt (DT)
[   21.763988] Call trace:
[   21.764029]  show_stack+0x20/0x38 (C)
[   21.764102]  dump_stack_lvl+0x8c/0xd0
[   21.764168]  print_report+0x118/0x608
[   21.764222]  kasan_report+0xdc/0x128
[   21.764304]  kasan_check_range+0x100/0x1a8
[   21.764399]  __kasan_check_write+0x20/0x30
[   21.764470]  kasan_atomics_helper+0x147c/0x4858
[   21.764527]  kasan_atomics+0x198/0x2e0
[   21.764578]  kunit_try_run_case+0x170/0x3f0
[   21.764636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.764728]  kthread+0x328/0x630
[   21.764777]  ret_from_fork+0x10/0x20
[   21.764829] 
[   21.764870] Allocated by task 266:
[   21.764915]  kasan_save_stack+0x3c/0x68
[   21.764961]  kasan_save_track+0x20/0x40
[   21.765004]  kasan_save_alloc_info+0x40/0x58
[   21.765050]  __kasan_kmalloc+0xd4/0xd8
[   21.765092]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.765147]  kasan_atomics+0xb8/0x2e0
[   21.765188]  kunit_try_run_case+0x170/0x3f0
[   21.765230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.765281]  kthread+0x328/0x630
[   21.765326]  ret_from_fork+0x10/0x20
[   21.765365] 
[   21.765389] The buggy address belongs to the object at fff00000c76da700
[   21.765389]  which belongs to the cache kmalloc-64 of size 64
[   21.765457] The buggy address is located 0 bytes to the right of
[   21.765457]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.765532] 
[   21.765557] The buggy address belongs to the physical page:
[   21.765595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.765676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.765732] page_type: f5(slab)
[   21.765795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.765868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.765924] page dumped because: kasan: bad access detected
[   21.765963] 
[   21.765984] Memory state around the buggy address:
[   21.766022]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.766082]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.766144] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.766190]                                      ^
[   21.766226]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.766286]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.766331] ==================================================================
[   21.826520] ==================================================================
[   21.826611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   21.826670] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.826726] 
[   21.826762] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.826853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.827031] Hardware name: linux,dummy-virt (DT)
[   21.827077] Call trace:
[   21.827170]  show_stack+0x20/0x38 (C)
[   21.827291]  dump_stack_lvl+0x8c/0xd0
[   21.827481]  print_report+0x118/0x608
[   21.827536]  kasan_report+0xdc/0x128
[   21.827613]  kasan_check_range+0x100/0x1a8
[   21.827681]  __kasan_check_write+0x20/0x30
[   21.827872]  kasan_atomics_helper+0x17ec/0x4858
[   21.827986]  kasan_atomics+0x198/0x2e0
[   21.828064]  kunit_try_run_case+0x170/0x3f0
[   21.828123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.828193]  kthread+0x328/0x630
[   21.828258]  ret_from_fork+0x10/0x20
[   21.828311] 
[   21.828341] Allocated by task 266:
[   21.828376]  kasan_save_stack+0x3c/0x68
[   21.828421]  kasan_save_track+0x20/0x40
[   21.828476]  kasan_save_alloc_info+0x40/0x58
[   21.828521]  __kasan_kmalloc+0xd4/0xd8
[   21.828574]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.828628]  kasan_atomics+0xb8/0x2e0
[   21.828669]  kunit_try_run_case+0x170/0x3f0
[   21.828723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.828787]  kthread+0x328/0x630
[   21.828826]  ret_from_fork+0x10/0x20
[   21.828875] 
[   21.828907] The buggy address belongs to the object at fff00000c76da700
[   21.828907]  which belongs to the cache kmalloc-64 of size 64
[   21.828980] The buggy address is located 0 bytes to the right of
[   21.828980]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.829073] 
[   21.829097] The buggy address belongs to the physical page:
[   21.829145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.829214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.829298] page_type: f5(slab)
[   21.829344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.829401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.829472] page dumped because: kasan: bad access detected
[   21.829512] 
[   21.829534] Memory state around the buggy address:
[   21.829583]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.829634]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.829685] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.829730]                                      ^
[   21.829779]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.829830]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.829902] ==================================================================
[   21.803961] ==================================================================
[   21.804046] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   21.804215] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.804401] 
[   21.804449] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.804804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.804931] Hardware name: linux,dummy-virt (DT)
[   21.805027] Call trace:
[   21.805209]  show_stack+0x20/0x38 (C)
[   21.805319]  dump_stack_lvl+0x8c/0xd0
[   21.805672]  print_report+0x118/0x608
[   21.805774]  kasan_report+0xdc/0x128
[   21.805877]  kasan_check_range+0x100/0x1a8
[   21.805969]  __kasan_check_write+0x20/0x30
[   21.806061]  kasan_atomics_helper+0x16d0/0x4858
[   21.806119]  kasan_atomics+0x198/0x2e0
[   21.806182]  kunit_try_run_case+0x170/0x3f0
[   21.806234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.806293]  kthread+0x328/0x630
[   21.806343]  ret_from_fork+0x10/0x20
[   21.806564] 
[   21.806598] Allocated by task 266:
[   21.806805]  kasan_save_stack+0x3c/0x68
[   21.806955]  kasan_save_track+0x20/0x40
[   21.807006]  kasan_save_alloc_info+0x40/0x58
[   21.807178]  __kasan_kmalloc+0xd4/0xd8
[   21.807421]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.807613]  kasan_atomics+0xb8/0x2e0
[   21.807779]  kunit_try_run_case+0x170/0x3f0
[   21.807827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.807877]  kthread+0x328/0x630
[   21.808007]  ret_from_fork+0x10/0x20
[   21.808067] 
[   21.808235] The buggy address belongs to the object at fff00000c76da700
[   21.808235]  which belongs to the cache kmalloc-64 of size 64
[   21.808413] The buggy address is located 0 bytes to the right of
[   21.808413]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.808609] 
[   21.808958] The buggy address belongs to the physical page:
[   21.809082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.809248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.809321] page_type: f5(slab)
[   21.809366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.809617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.809682] page dumped because: kasan: bad access detected
[   21.809742] 
[   21.809817] Memory state around the buggy address:
[   21.809923]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.810178]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.810239] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.810294]                                      ^
[   21.810335]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.810384]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.810429] ==================================================================
[   21.656779] ==================================================================
[   21.657005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.657197] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.657265] 
[   21.657316] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.657410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.657614] Hardware name: linux,dummy-virt (DT)
[   21.657721] Call trace:
[   21.658006]  show_stack+0x20/0x38 (C)
[   21.658204]  dump_stack_lvl+0x8c/0xd0
[   21.658613]  print_report+0x118/0x608
[   21.658957]  kasan_report+0xdc/0x128
[   21.659045]  kasan_check_range+0x100/0x1a8
[   21.659100]  __kasan_check_write+0x20/0x30
[   21.659300]  kasan_atomics_helper+0xff0/0x4858
[   21.659518]  kasan_atomics+0x198/0x2e0
[   21.659580]  kunit_try_run_case+0x170/0x3f0
[   21.659639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.659877]  kthread+0x328/0x630
[   21.659981]  ret_from_fork+0x10/0x20
[   21.660597] 
[   21.660708] Allocated by task 266:
[   21.660782]  kasan_save_stack+0x3c/0x68
[   21.660942]  kasan_save_track+0x20/0x40
[   21.661092]  kasan_save_alloc_info+0x40/0x58
[   21.661195]  __kasan_kmalloc+0xd4/0xd8
[   21.661245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.661304]  kasan_atomics+0xb8/0x2e0
[   21.661725]  kunit_try_run_case+0x170/0x3f0
[   21.661920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.662153]  kthread+0x328/0x630
[   21.662293]  ret_from_fork+0x10/0x20
[   21.662341] 
[   21.662365] The buggy address belongs to the object at fff00000c76da700
[   21.662365]  which belongs to the cache kmalloc-64 of size 64
[   21.662628] The buggy address is located 0 bytes to the right of
[   21.662628]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.663236] 
[   21.663283] The buggy address belongs to the physical page:
[   21.663396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.663469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.663843] page_type: f5(slab)
[   21.663937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.664213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.664579] page dumped because: kasan: bad access detected
[   21.664647] 
[   21.664670] Memory state around the buggy address:
[   21.664713]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.665213]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.665465] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.665549]                                      ^
[   21.665630]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.665743]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.665797] ==================================================================
[   21.758819] ==================================================================
[   21.758887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   21.758945] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.759051] 
[   21.759096] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.759222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.759343] Hardware name: linux,dummy-virt (DT)
[   21.759460] Call trace:
[   21.759838]  show_stack+0x20/0x38 (C)
[   21.760004]  dump_stack_lvl+0x8c/0xd0
[   21.760148]  print_report+0x118/0x608
[   21.760238]  kasan_report+0xdc/0x128
[   21.760304]  kasan_check_range+0x100/0x1a8
[   21.760357]  __kasan_check_write+0x20/0x30
[   21.760408]  kasan_atomics_helper+0x1414/0x4858
[   21.760463]  kasan_atomics+0x198/0x2e0
[   21.760513]  kunit_try_run_case+0x170/0x3f0
[   21.760566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.760626]  kthread+0x328/0x630
[   21.760674]  ret_from_fork+0x10/0x20
[   21.760742] 
[   21.760765] Allocated by task 266:
[   21.760797]  kasan_save_stack+0x3c/0x68
[   21.760844]  kasan_save_track+0x20/0x40
[   21.760948]  kasan_save_alloc_info+0x40/0x58
[   21.761222]  __kasan_kmalloc+0xd4/0xd8
[   21.761322]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.761369]  kasan_atomics+0xb8/0x2e0
[   21.761430]  kunit_try_run_case+0x170/0x3f0
[   21.761474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.761523]  kthread+0x328/0x630
[   21.761562]  ret_from_fork+0x10/0x20
[   21.761604] 
[   21.761627] The buggy address belongs to the object at fff00000c76da700
[   21.761627]  which belongs to the cache kmalloc-64 of size 64
[   21.761697] The buggy address is located 0 bytes to the right of
[   21.761697]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.761903] 
[   21.762020] The buggy address belongs to the physical page:
[   21.762101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.762225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.762391] page_type: f5(slab)
[   21.762474] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.762535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.762583] page dumped because: kasan: bad access detected
[   21.762621] 
[   21.762642] Memory state around the buggy address:
[   21.762681]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.762732]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.762783] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.762828]                                      ^
[   21.762865]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.762915]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.762959] ==================================================================
[   21.791922] ==================================================================
[   21.791989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   21.792046] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.792335] 
[   21.792416] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.792564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.792649] Hardware name: linux,dummy-virt (DT)
[   21.792812] Call trace:
[   21.792875]  show_stack+0x20/0x38 (C)
[   21.793002]  dump_stack_lvl+0x8c/0xd0
[   21.793115]  print_report+0x118/0x608
[   21.793182]  kasan_report+0xdc/0x128
[   21.793306]  kasan_check_range+0x100/0x1a8
[   21.793365]  __kasan_check_write+0x20/0x30
[   21.793655]  kasan_atomics_helper+0x1644/0x4858
[   21.793770]  kasan_atomics+0x198/0x2e0
[   21.793877]  kunit_try_run_case+0x170/0x3f0
[   21.794076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.794174]  kthread+0x328/0x630
[   21.794241]  ret_from_fork+0x10/0x20
[   21.794298] 
[   21.794348] Allocated by task 266:
[   21.794423]  kasan_save_stack+0x3c/0x68
[   21.794534]  kasan_save_track+0x20/0x40
[   21.794581]  kasan_save_alloc_info+0x40/0x58
[   21.794777]  __kasan_kmalloc+0xd4/0xd8
[   21.794835]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.794980]  kasan_atomics+0xb8/0x2e0
[   21.795027]  kunit_try_run_case+0x170/0x3f0
[   21.795206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.795372]  kthread+0x328/0x630
[   21.795577]  ret_from_fork+0x10/0x20
[   21.795782] 
[   21.795954] The buggy address belongs to the object at fff00000c76da700
[   21.795954]  which belongs to the cache kmalloc-64 of size 64
[   21.796071] The buggy address is located 0 bytes to the right of
[   21.796071]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.796286] 
[   21.796415] The buggy address belongs to the physical page:
[   21.796547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.796623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.796681] page_type: f5(slab)
[   21.796737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.796797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.797080] page dumped because: kasan: bad access detected
[   21.797230] 
[   21.797406] Memory state around the buggy address:
[   21.797511]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.797942]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.798011] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.798065]                                      ^
[   21.798106]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.798216]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.798280] ==================================================================
[   21.592376] ==================================================================
[   21.592487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   21.592687] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.592894] 
[   21.593104] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.593227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.593499] Hardware name: linux,dummy-virt (DT)
[   21.593570] Call trace:
[   21.593634]  show_stack+0x20/0x38 (C)
[   21.593780]  dump_stack_lvl+0x8c/0xd0
[   21.594043]  print_report+0x118/0x608
[   21.594119]  kasan_report+0xdc/0x128
[   21.594350]  kasan_check_range+0x100/0x1a8
[   21.594511]  __kasan_check_read+0x20/0x30
[   21.594612]  kasan_atomics_helper+0xdd4/0x4858
[   21.594812]  kasan_atomics+0x198/0x2e0
[   21.594968]  kunit_try_run_case+0x170/0x3f0
[   21.595054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.595178]  kthread+0x328/0x630
[   21.595239]  ret_from_fork+0x10/0x20
[   21.595491] 
[   21.595518] Allocated by task 266:
[   21.595552]  kasan_save_stack+0x3c/0x68
[   21.595754]  kasan_save_track+0x20/0x40
[   21.595944]  kasan_save_alloc_info+0x40/0x58
[   21.596000]  __kasan_kmalloc+0xd4/0xd8
[   21.596045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.596095]  kasan_atomics+0xb8/0x2e0
[   21.596548]  kunit_try_run_case+0x170/0x3f0
[   21.596611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.596954]  kthread+0x328/0x630
[   21.597152]  ret_from_fork+0x10/0x20
[   21.597554] 
[   21.597626] The buggy address belongs to the object at fff00000c76da700
[   21.597626]  which belongs to the cache kmalloc-64 of size 64
[   21.597915] The buggy address is located 0 bytes to the right of
[   21.597915]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.598329] 
[   21.598390] The buggy address belongs to the physical page:
[   21.598485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.598566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.598626] page_type: f5(slab)
[   21.598671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.598730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.598791] page dumped because: kasan: bad access detected
[   21.598842] 
[   21.598878] Memory state around the buggy address:
[   21.598926]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.598985]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.599035] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.599080]                                      ^
[   21.599679]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.599763]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.599837] ==================================================================
[   21.748152] ==================================================================
[   21.748218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   21.748278] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.748337] 
[   21.748373] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.748679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.749392] Hardware name: linux,dummy-virt (DT)
[   21.749476] Call trace:
[   21.749752]  show_stack+0x20/0x38 (C)
[   21.750367]  dump_stack_lvl+0x8c/0xd0
[   21.750744]  print_report+0x118/0x608
[   21.750896]  kasan_report+0xdc/0x128
[   21.751081]  __asan_report_load8_noabort+0x20/0x30
[   21.751240]  kasan_atomics_helper+0x3f04/0x4858
[   21.751576]  kasan_atomics+0x198/0x2e0
[   21.751786]  kunit_try_run_case+0x170/0x3f0
[   21.751991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.752484]  kthread+0x328/0x630
[   21.752669]  ret_from_fork+0x10/0x20
[   21.752881] 
[   21.752970] Allocated by task 266:
[   21.755416]  kasan_save_stack+0x3c/0x68
[   21.755487]  kasan_save_track+0x20/0x40
[   21.755530]  kasan_save_alloc_info+0x40/0x58
[   21.756343]  __kasan_kmalloc+0xd4/0xd8
[   21.756386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.756432]  kasan_atomics+0xb8/0x2e0
[   21.756474]  kunit_try_run_case+0x170/0x3f0
[   21.756518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.756567]  kthread+0x328/0x630
[   21.756605]  ret_from_fork+0x10/0x20
[   21.756647] 
[   21.756670] The buggy address belongs to the object at fff00000c76da700
[   21.756670]  which belongs to the cache kmalloc-64 of size 64
[   21.756742] The buggy address is located 0 bytes to the right of
[   21.756742]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.756817] 
[   21.756844] The buggy address belongs to the physical page:
[   21.756883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.756948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.757008] page_type: f5(slab)
[   21.757056] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.757117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.757244] page dumped because: kasan: bad access detected
[   21.757307] 
[   21.757339] Memory state around the buggy address:
[   21.757390]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.757527]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.757600] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.757695]                                      ^
[   21.757758]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.757866]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.757954] ==================================================================
[   21.700256] ==================================================================
[   21.700364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   21.700817] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.700949] 
[   21.700997] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.701093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.701321] Hardware name: linux,dummy-virt (DT)
[   21.701466] Call trace:
[   21.701505]  show_stack+0x20/0x38 (C)
[   21.701744]  dump_stack_lvl+0x8c/0xd0
[   21.701811]  print_report+0x118/0x608
[   21.701873]  kasan_report+0xdc/0x128
[   21.701922]  kasan_check_range+0x100/0x1a8
[   21.702354]  __kasan_check_write+0x20/0x30
[   21.702462]  kasan_atomics_helper+0x1190/0x4858
[   21.702945]  kasan_atomics+0x198/0x2e0
[   21.703046]  kunit_try_run_case+0x170/0x3f0
[   21.703111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.703302]  kthread+0x328/0x630
[   21.703530]  ret_from_fork+0x10/0x20
[   21.703590] 
[   21.703614] Allocated by task 266:
[   21.703867]  kasan_save_stack+0x3c/0x68
[   21.704060]  kasan_save_track+0x20/0x40
[   21.704279]  kasan_save_alloc_info+0x40/0x58
[   21.704473]  __kasan_kmalloc+0xd4/0xd8
[   21.704553]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.704633]  kasan_atomics+0xb8/0x2e0
[   21.704690]  kunit_try_run_case+0x170/0x3f0
[   21.704758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.704809]  kthread+0x328/0x630
[   21.704846]  ret_from_fork+0x10/0x20
[   21.704887] 
[   21.704928] The buggy address belongs to the object at fff00000c76da700
[   21.704928]  which belongs to the cache kmalloc-64 of size 64
[   21.705004] The buggy address is located 0 bytes to the right of
[   21.705004]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.705079] 
[   21.705122] The buggy address belongs to the physical page:
[   21.705563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.705929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.706175] page_type: f5(slab)
[   21.706492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.706629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.706811] page dumped because: kasan: bad access detected
[   21.706935] 
[   21.706980] Memory state around the buggy address:
[   21.707021]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.707413]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.707497] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.707827]                                      ^
[   21.707992]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.708048]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.708412] ==================================================================
[   21.629840] ==================================================================
[   21.630429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.630635] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.630709] 
[   21.630871] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.631014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.631164] Hardware name: linux,dummy-virt (DT)
[   21.631236] Call trace:
[   21.631271]  show_stack+0x20/0x38 (C)
[   21.631333]  dump_stack_lvl+0x8c/0xd0
[   21.631388]  print_report+0x118/0x608
[   21.631441]  kasan_report+0xdc/0x128
[   21.631866]  kasan_check_range+0x100/0x1a8
[   21.632429]  __kasan_check_write+0x20/0x30
[   21.632799]  kasan_atomics_helper+0xeb8/0x4858
[   21.633101]  kasan_atomics+0x198/0x2e0
[   21.633338]  kunit_try_run_case+0x170/0x3f0
[   21.633420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.633522]  kthread+0x328/0x630
[   21.633946]  ret_from_fork+0x10/0x20
[   21.634040] 
[   21.634153] Allocated by task 266:
[   21.634224]  kasan_save_stack+0x3c/0x68
[   21.634288]  kasan_save_track+0x20/0x40
[   21.634333]  kasan_save_alloc_info+0x40/0x58
[   21.634378]  __kasan_kmalloc+0xd4/0xd8
[   21.634422]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.634474]  kasan_atomics+0xb8/0x2e0
[   21.634514]  kunit_try_run_case+0x170/0x3f0
[   21.634558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.634608]  kthread+0x328/0x630
[   21.634647]  ret_from_fork+0x10/0x20
[   21.634689] 
[   21.634735] The buggy address belongs to the object at fff00000c76da700
[   21.634735]  which belongs to the cache kmalloc-64 of size 64
[   21.634829] The buggy address is located 0 bytes to the right of
[   21.634829]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.634904] 
[   21.634955] The buggy address belongs to the physical page:
[   21.634996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.635070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.635206] page_type: f5(slab)
[   21.635828] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.635895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.635978] page dumped because: kasan: bad access detected
[   21.636017] 
[   21.636041] Memory state around the buggy address:
[   21.636082]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.636146]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.636200] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.636245]                                      ^
[   21.636285]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.637122]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.637504] ==================================================================
[   21.815567] ==================================================================
[   21.815625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   21.815679] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.815735] 
[   21.815772] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.815864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.815896] Hardware name: linux,dummy-virt (DT)
[   21.815932] Call trace:
[   21.815979]  show_stack+0x20/0x38 (C)
[   21.816075]  dump_stack_lvl+0x8c/0xd0
[   21.816481]  print_report+0x118/0x608
[   21.816537]  kasan_report+0xdc/0x128
[   21.816588]  kasan_check_range+0x100/0x1a8
[   21.816723]  __kasan_check_write+0x20/0x30
[   21.816775]  kasan_atomics_helper+0x175c/0x4858
[   21.816830]  kasan_atomics+0x198/0x2e0
[   21.816879]  kunit_try_run_case+0x170/0x3f0
[   21.816933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.816992]  kthread+0x328/0x630
[   21.817038]  ret_from_fork+0x10/0x20
[   21.817091] 
[   21.817113] Allocated by task 266:
[   21.817155]  kasan_save_stack+0x3c/0x68
[   21.817202]  kasan_save_track+0x20/0x40
[   21.817244]  kasan_save_alloc_info+0x40/0x58
[   21.817300]  __kasan_kmalloc+0xd4/0xd8
[   21.817342]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.817398]  kasan_atomics+0xb8/0x2e0
[   21.817461]  kunit_try_run_case+0x170/0x3f0
[   21.817601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.817695]  kthread+0x328/0x630
[   21.817732]  ret_from_fork+0x10/0x20
[   21.817772] 
[   21.817794] The buggy address belongs to the object at fff00000c76da700
[   21.817794]  which belongs to the cache kmalloc-64 of size 64
[   21.817893] The buggy address is located 0 bytes to the right of
[   21.817893]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.818109] 
[   21.818251] The buggy address belongs to the physical page:
[   21.818290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.818351] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.818411] page_type: f5(slab)
[   21.818484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.818573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.818999] page dumped because: kasan: bad access detected
[   21.819040] 
[   21.819081] Memory state around the buggy address:
[   21.819154]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.819318]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.819546] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.819640]                                      ^
[   21.819679]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.819729]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.819774] ==================================================================
[   21.618853] ==================================================================
[   21.618936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.618996] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.619054] 
[   21.619405] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.619722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.619760] Hardware name: linux,dummy-virt (DT)
[   21.619853] Call trace:
[   21.619881]  show_stack+0x20/0x38 (C)
[   21.620161]  dump_stack_lvl+0x8c/0xd0
[   21.620323]  print_report+0x118/0x608
[   21.620749]  kasan_report+0xdc/0x128
[   21.620850]  __asan_report_store8_noabort+0x20/0x30
[   21.621072]  kasan_atomics_helper+0x3e5c/0x4858
[   21.621328]  kasan_atomics+0x198/0x2e0
[   21.621387]  kunit_try_run_case+0x170/0x3f0
[   21.621470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.622171]  kthread+0x328/0x630
[   21.622254]  ret_from_fork+0x10/0x20
[   21.622499] 
[   21.622573] Allocated by task 266:
[   21.622772]  kasan_save_stack+0x3c/0x68
[   21.622825]  kasan_save_track+0x20/0x40
[   21.622869]  kasan_save_alloc_info+0x40/0x58
[   21.623272]  __kasan_kmalloc+0xd4/0xd8
[   21.623360]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.623612]  kasan_atomics+0xb8/0x2e0
[   21.623667]  kunit_try_run_case+0x170/0x3f0
[   21.623712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.623776]  kthread+0x328/0x630
[   21.623816]  ret_from_fork+0x10/0x20
[   21.624179] 
[   21.624685] The buggy address belongs to the object at fff00000c76da700
[   21.624685]  which belongs to the cache kmalloc-64 of size 64
[   21.624784] The buggy address is located 0 bytes to the right of
[   21.624784]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.625509] 
[   21.625639] The buggy address belongs to the physical page:
[   21.625693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.625861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.625934] page_type: f5(slab)
[   21.626391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.626487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.627043] page dumped because: kasan: bad access detected
[   21.627117] 
[   21.627285] Memory state around the buggy address:
[   21.627367]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.627771]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.628003] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.628054]                                      ^
[   21.628098]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.628166]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.628214] ==================================================================
[   21.777985] ==================================================================
[   21.778053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   21.778110] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.778256] 
[   21.778308] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.778434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.778468] Hardware name: linux,dummy-virt (DT)
[   21.778506] Call trace:
[   21.778531]  show_stack+0x20/0x38 (C)
[   21.778588]  dump_stack_lvl+0x8c/0xd0
[   21.778640]  print_report+0x118/0x608
[   21.778705]  kasan_report+0xdc/0x128
[   21.778755]  kasan_check_range+0x100/0x1a8
[   21.778809]  __kasan_check_write+0x20/0x30
[   21.778868]  kasan_atomics_helper+0x15b4/0x4858
[   21.778923]  kasan_atomics+0x198/0x2e0
[   21.778973]  kunit_try_run_case+0x170/0x3f0
[   21.779024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.779092]  kthread+0x328/0x630
[   21.779512]  ret_from_fork+0x10/0x20
[   21.779742] 
[   21.779889] Allocated by task 266:
[   21.779937]  kasan_save_stack+0x3c/0x68
[   21.779991]  kasan_save_track+0x20/0x40
[   21.780035]  kasan_save_alloc_info+0x40/0x58
[   21.780079]  __kasan_kmalloc+0xd4/0xd8
[   21.780122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.780395]  kasan_atomics+0xb8/0x2e0
[   21.780627]  kunit_try_run_case+0x170/0x3f0
[   21.780906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.781048]  kthread+0x328/0x630
[   21.781090]  ret_from_fork+0x10/0x20
[   21.781359] 
[   21.781531] The buggy address belongs to the object at fff00000c76da700
[   21.781531]  which belongs to the cache kmalloc-64 of size 64
[   21.781839] The buggy address is located 0 bytes to the right of
[   21.781839]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.781950] 
[   21.782070] The buggy address belongs to the physical page:
[   21.782141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.782368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.782568] page_type: f5(slab)
[   21.782669] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.783032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.783118] page dumped because: kasan: bad access detected
[   21.783299] 
[   21.783325] Memory state around the buggy address:
[   21.783366]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.783426]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.783478] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.783524]                                      ^
[   21.783562]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.783871]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.783934] ==================================================================
[   21.649308] ==================================================================
[   21.649527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.649730] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.649880] 
[   21.649929] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.650323] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.650399] Hardware name: linux,dummy-virt (DT)
[   21.650439] Call trace:
[   21.650469]  show_stack+0x20/0x38 (C)
[   21.650659]  dump_stack_lvl+0x8c/0xd0
[   21.650735]  print_report+0x118/0x608
[   21.650914]  kasan_report+0xdc/0x128
[   21.650982]  kasan_check_range+0x100/0x1a8
[   21.651150]  __kasan_check_write+0x20/0x30
[   21.651215]  kasan_atomics_helper+0xf88/0x4858
[   21.651280]  kasan_atomics+0x198/0x2e0
[   21.651333]  kunit_try_run_case+0x170/0x3f0
[   21.651385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.651821]  kthread+0x328/0x630
[   21.652275]  ret_from_fork+0x10/0x20
[   21.652426] 
[   21.652493] Allocated by task 266:
[   21.652618]  kasan_save_stack+0x3c/0x68
[   21.652716]  kasan_save_track+0x20/0x40
[   21.652807]  kasan_save_alloc_info+0x40/0x58
[   21.653274]  __kasan_kmalloc+0xd4/0xd8
[   21.653341]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.653421]  kasan_atomics+0xb8/0x2e0
[   21.653485]  kunit_try_run_case+0x170/0x3f0
[   21.653530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.653582]  kthread+0x328/0x630
[   21.653629]  ret_from_fork+0x10/0x20
[   21.653688] 
[   21.653723] The buggy address belongs to the object at fff00000c76da700
[   21.653723]  which belongs to the cache kmalloc-64 of size 64
[   21.653808] The buggy address is located 0 bytes to the right of
[   21.653808]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.653882] 
[   21.653919] The buggy address belongs to the physical page:
[   21.653959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.654032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.654102] page_type: f5(slab)
[   21.654165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.654236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.654293] page dumped because: kasan: bad access detected
[   21.654340] 
[   21.654365] Memory state around the buggy address:
[   21.654405]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.654467]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.654521] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.654566]                                      ^
[   21.654624]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.654673]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.654720] ==================================================================
[   21.810640] ==================================================================
[   21.810699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   21.810754] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.810811] 
[   21.810851] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.810944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.810974] Hardware name: linux,dummy-virt (DT)
[   21.811013] Call trace:
[   21.811038]  show_stack+0x20/0x38 (C)
[   21.811093]  dump_stack_lvl+0x8c/0xd0
[   21.813203]  print_report+0x118/0x608
[   21.813262]  kasan_report+0xdc/0x128
[   21.813321]  __asan_report_load8_noabort+0x20/0x30
[   21.813377]  kasan_atomics_helper+0x3e10/0x4858
[   21.813431]  kasan_atomics+0x198/0x2e0
[   21.813480]  kunit_try_run_case+0x170/0x3f0
[   21.813535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.813594]  kthread+0x328/0x630
[   21.813640]  ret_from_fork+0x10/0x20
[   21.813695] 
[   21.813717] Allocated by task 266:
[   21.813750]  kasan_save_stack+0x3c/0x68
[   21.813798]  kasan_save_track+0x20/0x40
[   21.813839]  kasan_save_alloc_info+0x40/0x58
[   21.813885]  __kasan_kmalloc+0xd4/0xd8
[   21.813927]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.813971]  kasan_atomics+0xb8/0x2e0
[   21.814012]  kunit_try_run_case+0x170/0x3f0
[   21.814053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.814104]  kthread+0x328/0x630
[   21.814150]  ret_from_fork+0x10/0x20
[   21.814261] 
[   21.814285] The buggy address belongs to the object at fff00000c76da700
[   21.814285]  which belongs to the cache kmalloc-64 of size 64
[   21.814366] The buggy address is located 0 bytes to the right of
[   21.814366]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.814460] 
[   21.814493] The buggy address belongs to the physical page:
[   21.814539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.814606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.814665] page_type: f5(slab)
[   21.814710] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.814786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.814838] page dumped because: kasan: bad access detected
[   21.814885] 
[   21.814907] Memory state around the buggy address:
[   21.814952]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.815026]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.815091] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.815155]                                      ^
[   21.815195]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.815246]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.815290] ==================================================================
[   21.689050] ==================================================================
[   21.689147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   21.689400] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.689474] 
[   21.689532] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.689638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.690070] Hardware name: linux,dummy-virt (DT)
[   21.690437] Call trace:
[   21.690492]  show_stack+0x20/0x38 (C)
[   21.690560]  dump_stack_lvl+0x8c/0xd0
[   21.690616]  print_report+0x118/0x608
[   21.690808]  kasan_report+0xdc/0x128
[   21.690923]  kasan_check_range+0x100/0x1a8
[   21.691286]  __kasan_check_write+0x20/0x30
[   21.691470]  kasan_atomics_helper+0x1128/0x4858
[   21.691656]  kasan_atomics+0x198/0x2e0
[   21.691722]  kunit_try_run_case+0x170/0x3f0
[   21.691778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.692232]  kthread+0x328/0x630
[   21.692378]  ret_from_fork+0x10/0x20
[   21.692893] 
[   21.693013] Allocated by task 266:
[   21.693206]  kasan_save_stack+0x3c/0x68
[   21.693370]  kasan_save_track+0x20/0x40
[   21.693417]  kasan_save_alloc_info+0x40/0x58
[   21.693771]  __kasan_kmalloc+0xd4/0xd8
[   21.694644]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.694760]  kasan_atomics+0xb8/0x2e0
[   21.694828]  kunit_try_run_case+0x170/0x3f0
[   21.694925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.694980]  kthread+0x328/0x630
[   21.695018]  ret_from_fork+0x10/0x20
[   21.695369] 
[   21.695456] The buggy address belongs to the object at fff00000c76da700
[   21.695456]  which belongs to the cache kmalloc-64 of size 64
[   21.695875] The buggy address is located 0 bytes to the right of
[   21.695875]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.696011] 
[   21.696116] The buggy address belongs to the physical page:
[   21.696170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.696520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.696699] page_type: f5(slab)
[   21.696813] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.697302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.697579] page dumped because: kasan: bad access detected
[   21.697670] 
[   21.697750] Memory state around the buggy address:
[   21.697877]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.698096]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.698189] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.698245]                                      ^
[   21.698288]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.698360]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.698430] ==================================================================
[   21.639464] ==================================================================
[   21.639734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.639901] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.640103] 
[   21.640162] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.640268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.640301] Hardware name: linux,dummy-virt (DT)
[   21.640339] Call trace:
[   21.640367]  show_stack+0x20/0x38 (C)
[   21.640831]  dump_stack_lvl+0x8c/0xd0
[   21.641247]  print_report+0x118/0x608
[   21.641352]  kasan_report+0xdc/0x128
[   21.641536]  kasan_check_range+0x100/0x1a8
[   21.641698]  __kasan_check_write+0x20/0x30
[   21.641783]  kasan_atomics_helper+0xf20/0x4858
[   21.641860]  kasan_atomics+0x198/0x2e0
[   21.642177]  kunit_try_run_case+0x170/0x3f0
[   21.642318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.642693]  kthread+0x328/0x630
[   21.642806]  ret_from_fork+0x10/0x20
[   21.642945] 
[   21.643081] Allocated by task 266:
[   21.643196]  kasan_save_stack+0x3c/0x68
[   21.643328]  kasan_save_track+0x20/0x40
[   21.643375]  kasan_save_alloc_info+0x40/0x58
[   21.643420]  __kasan_kmalloc+0xd4/0xd8
[   21.644144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.644432]  kasan_atomics+0xb8/0x2e0
[   21.644508]  kunit_try_run_case+0x170/0x3f0
[   21.644887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.645021]  kthread+0x328/0x630
[   21.645230]  ret_from_fork+0x10/0x20
[   21.645325] 
[   21.645404] The buggy address belongs to the object at fff00000c76da700
[   21.645404]  which belongs to the cache kmalloc-64 of size 64
[   21.645483] The buggy address is located 0 bytes to the right of
[   21.645483]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.645886] 
[   21.645944] The buggy address belongs to the physical page:
[   21.646116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.646212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.646404] page_type: f5(slab)
[   21.646463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.646558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.646620] page dumped because: kasan: bad access detected
[   21.646668] 
[   21.646692] Memory state around the buggy address:
[   21.646735]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.646803]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.646886] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.646950]                                      ^
[   21.646989]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.647039]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.647103] ==================================================================
[   21.820155] ==================================================================
[   21.820212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   21.820694] Read of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.820752] 
[   21.821028] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.821137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.821171] Hardware name: linux,dummy-virt (DT)
[   21.821278] Call trace:
[   21.821324]  show_stack+0x20/0x38 (C)
[   21.821546]  dump_stack_lvl+0x8c/0xd0
[   21.821744]  print_report+0x118/0x608
[   21.821813]  kasan_report+0xdc/0x128
[   21.821975]  __asan_report_load8_noabort+0x20/0x30
[   21.822061]  kasan_atomics_helper+0x3e20/0x4858
[   21.822117]  kasan_atomics+0x198/0x2e0
[   21.822210]  kunit_try_run_case+0x170/0x3f0
[   21.822303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.822364]  kthread+0x328/0x630
[   21.822411]  ret_from_fork+0x10/0x20
[   21.822507] 
[   21.822551] Allocated by task 266:
[   21.822592]  kasan_save_stack+0x3c/0x68
[   21.822638]  kasan_save_track+0x20/0x40
[   21.822681]  kasan_save_alloc_info+0x40/0x58
[   21.822725]  __kasan_kmalloc+0xd4/0xd8
[   21.822767]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.822939]  kasan_atomics+0xb8/0x2e0
[   21.823192]  kunit_try_run_case+0x170/0x3f0
[   21.823264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.823359]  kthread+0x328/0x630
[   21.823410]  ret_from_fork+0x10/0x20
[   21.823478] 
[   21.823561] The buggy address belongs to the object at fff00000c76da700
[   21.823561]  which belongs to the cache kmalloc-64 of size 64
[   21.823630] The buggy address is located 0 bytes to the right of
[   21.823630]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.823897] 
[   21.824040] The buggy address belongs to the physical page:
[   21.824105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.824551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.824641] page_type: f5(slab)
[   21.824796] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.824912] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.824981] page dumped because: kasan: bad access detected
[   21.825020] 
[   21.825041] Memory state around the buggy address:
[   21.825081]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.825278]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.825342] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.825387]                                      ^
[   21.825425]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.825673]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.825791] ==================================================================
[   21.719855] ==================================================================
[   21.720283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   21.720365] Write of size 8 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.720787] 
[   21.720851] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.720948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.721078] Hardware name: linux,dummy-virt (DT)
[   21.721224] Call trace:
[   21.721278]  show_stack+0x20/0x38 (C)
[   21.721349]  dump_stack_lvl+0x8c/0xd0
[   21.721674]  print_report+0x118/0x608
[   21.721740]  kasan_report+0xdc/0x128
[   21.722214]  kasan_check_range+0x100/0x1a8
[   21.722295]  __kasan_check_write+0x20/0x30
[   21.722350]  kasan_atomics_helper+0x126c/0x4858
[   21.722415]  kasan_atomics+0x198/0x2e0
[   21.722518]  kunit_try_run_case+0x170/0x3f0
[   21.722575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.722647]  kthread+0x328/0x630
[   21.722704]  ret_from_fork+0x10/0x20
[   21.722762] 
[   21.722790] Allocated by task 266:
[   21.722824]  kasan_save_stack+0x3c/0x68
[   21.722874]  kasan_save_track+0x20/0x40
[   21.722925]  kasan_save_alloc_info+0x40/0x58
[   21.722971]  __kasan_kmalloc+0xd4/0xd8
[   21.723022]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.723069]  kasan_atomics+0xb8/0x2e0
[   21.723110]  kunit_try_run_case+0x170/0x3f0
[   21.723427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.723479]  kthread+0x328/0x630
[   21.724052]  ret_from_fork+0x10/0x20
[   21.724413] 
[   21.724584] The buggy address belongs to the object at fff00000c76da700
[   21.724584]  which belongs to the cache kmalloc-64 of size 64
[   21.724715] The buggy address is located 0 bytes to the right of
[   21.724715]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.725094] 
[   21.725175] The buggy address belongs to the physical page:
[   21.725616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.725754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.726476] page_type: f5(slab)
[   21.726569] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.726745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.726848] page dumped because: kasan: bad access detected
[   21.727198] 
[   21.727248] Memory state around the buggy address:
[   21.727373]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.727433]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.727534] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.727908]                                      ^
[   21.728000]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.728196]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.728247] ==================================================================
[   21.479863] ==================================================================
[   21.479936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   21.480002] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.480059] 
[   21.481016] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.481204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.481272] Hardware name: linux,dummy-virt (DT)
[   21.481338] Call trace:
[   21.481370]  show_stack+0x20/0x38 (C)
[   21.481793]  dump_stack_lvl+0x8c/0xd0
[   21.481879]  print_report+0x118/0x608
[   21.481935]  kasan_report+0xdc/0x128
[   21.482505]  kasan_check_range+0x100/0x1a8
[   21.482737]  __kasan_check_write+0x20/0x30
[   21.482806]  kasan_atomics_helper+0x99c/0x4858
[   21.482884]  kasan_atomics+0x198/0x2e0
[   21.482959]  kunit_try_run_case+0x170/0x3f0
[   21.483017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.483199]  kthread+0x328/0x630
[   21.483262]  ret_from_fork+0x10/0x20
[   21.483322] 
[   21.483347] Allocated by task 266:
[   21.483383]  kasan_save_stack+0x3c/0x68
[   21.483432]  kasan_save_track+0x20/0x40
[   21.483474]  kasan_save_alloc_info+0x40/0x58
[   21.483521]  __kasan_kmalloc+0xd4/0xd8
[   21.483562]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.483607]  kasan_atomics+0xb8/0x2e0
[   21.483650]  kunit_try_run_case+0x170/0x3f0
[   21.483692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.483743]  kthread+0x328/0x630
[   21.483779]  ret_from_fork+0x10/0x20
[   21.483821] 
[   21.483844] The buggy address belongs to the object at fff00000c76da700
[   21.483844]  which belongs to the cache kmalloc-64 of size 64
[   21.483916] The buggy address is located 0 bytes to the right of
[   21.483916]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.483990] 
[   21.484016] The buggy address belongs to the physical page:
[   21.484056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.484118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.484290] page_type: f5(slab)
[   21.484433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.484598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.484692] page dumped because: kasan: bad access detected
[   21.484740] 
[   21.484762] Memory state around the buggy address:
[   21.484908] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.487301]  kasan_check_range+0x100/0x1a8
[   21.487831] 
[   21.487853] Allocated by task 266:
[   21.487887]  kasan_save_stack+0x3c/0x68
[   21.488016]  kasan_save_track+0x20/0x40
[   21.488060]  kasan_save_alloc_info+0x40/0x58
[   21.488156]  __kasan_kmalloc+0xd4/0xd8
[   21.488200]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.488247]  kasan_atomics+0xb8/0x2e0
[   21.488289]  kunit_try_run_case+0x170/0x3f0
[   21.488332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.488394]  kthread+0x328/0x630
[   21.488438]  ret_from_fork+0x10/0x20
[   21.488478] 
[   21.488592] The buggy address belongs to the object at fff00000c76da700
[   21.488592]  which belongs to the cache kmalloc-64 of size 64
[   21.488910] The buggy address is located 0 bytes to the right of
[   21.488910]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.489234] 
[   21.489259] The buggy address belongs to the physical page:
[   21.489391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.489596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.489743] page_type: f5(slab)
[   21.489887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.489961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.490047] page dumped because: kasan: bad access detected
[   21.490121] 
[   21.490464] Memory state around the buggy address:
[   21.490511]  fff00000c76da600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.491017]  fff00000c76da680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.491334] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.491472]                                      ^
[   21.491553]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.491613]  fff00000c76da800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.491659] ==================================================================
[   21.365674] ==================================================================
[   21.365834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   21.366065] Write of size 4 at addr fff00000c76da730 by task kunit_try_catch/266
[   21.366124] 
[   21.366175] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.369327] page_type: f5(slab)
[   21.370269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   21.374825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.379025]  kasan_report+0xdc/0x128
[   21.381353] 
[   21.381575] page_type: f5(slab)
[   21.381962] >fff00000c76da700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.386637] 
[   21.387551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.388348]  fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.391799] 
[   21.392327]  kthread+0x328/0x630
[   21.392657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da
[   21.394148]                                      ^
[   21.395469] 
[   21.395669] Call trace:
[   21.397495]  kthread+0x328/0x630
[   21.399524] The buggy address is located 0 bytes to the right of
[   21.399524]  allocated 48-byte region [fff00000c76da700, fff00000c76da730)
[   21.400290] page dumped because: kasan: bad access detected
[   21.404792] ==================================================================

[   13.959825] ==================================================================
[   13.960059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.960543] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   13.960936] 
[   13.961026] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.961070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.961083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.961105] Call Trace:
[   13.961119]  <TASK>
[   13.961135]  dump_stack_lvl+0x73/0xb0
[   13.961163]  print_report+0xd1/0x650
[   13.961186]  ? __virt_addr_valid+0x1db/0x2d0
[   13.961210]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.961231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.961253]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.961275]  kasan_report+0x141/0x180
[   13.961298]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.961324]  __asan_report_store4_noabort+0x1b/0x30
[   13.961345]  kasan_atomics_helper+0x4b6e/0x5450
[   13.961368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.961402]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.961428]  ? kasan_atomics+0x152/0x310
[   13.961454]  kasan_atomics+0x1dc/0x310
[   13.961476]  ? __pfx_kasan_atomics+0x10/0x10
[   13.961499]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   13.961527]  ? __pfx_read_tsc+0x10/0x10
[   13.961548]  ? ktime_get_ts64+0x86/0x230
[   13.961618]  kunit_try_run_case+0x1a5/0x480
[   13.961645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.961669]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.961692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.961715]  ? __kthread_parkme+0x82/0x180
[   13.961736]  ? preempt_count_sub+0x50/0x80
[   13.961760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.961784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.961807]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.961832]  kthread+0x337/0x6f0
[   13.961852]  ? trace_preempt_on+0x20/0xc0
[   13.961876]  ? __pfx_kthread+0x10/0x10
[   13.961897]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.961919]  ? calculate_sigpending+0x7b/0xa0
[   13.961943]  ? __pfx_kthread+0x10/0x10
[   13.961965]  ret_from_fork+0x116/0x1d0
[   13.961984]  ? __pfx_kthread+0x10/0x10
[   13.962004]  ret_from_fork_asm+0x1a/0x30
[   13.962035]  </TASK>
[   13.962046] 
[   13.970311] Allocated by task 282:
[   13.970528]  kasan_save_stack+0x45/0x70
[   13.970751]  kasan_save_track+0x18/0x40
[   13.970960]  kasan_save_alloc_info+0x3b/0x50
[   13.971424]  __kasan_kmalloc+0xb7/0xc0
[   13.971641]  __kmalloc_cache_noprof+0x189/0x420
[   13.971814]  kasan_atomics+0x95/0x310
[   13.971948]  kunit_try_run_case+0x1a5/0x480
[   13.972097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.972348]  kthread+0x337/0x6f0
[   13.972558]  ret_from_fork+0x116/0x1d0
[   13.972887]  ret_from_fork_asm+0x1a/0x30
[   13.973064] 
[   13.973138] The buggy address belongs to the object at ffff8881025a0d80
[   13.973138]  which belongs to the cache kmalloc-64 of size 64
[   13.973504] The buggy address is located 0 bytes to the right of
[   13.973504]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   13.974563] 
[   13.974675] The buggy address belongs to the physical page:
[   13.974936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   13.975268] flags: 0x200000000000000(node=0|zone=2)
[   13.975446] page_type: f5(slab)
[   13.975676] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.976118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.976502] page dumped because: kasan: bad access detected
[   13.976678] 
[   13.976748] Memory state around the buggy address:
[   13.976904]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.977152]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.977482] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.977808]                                      ^
[   13.978034]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.978495]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.978769] ==================================================================
[   14.316575] ==================================================================
[   14.317047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.317440] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.317806] 
[   14.318071] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.318125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.318151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.318175] Call Trace:
[   14.318196]  <TASK>
[   14.318219]  dump_stack_lvl+0x73/0xb0
[   14.318279]  print_report+0xd1/0x650
[   14.318305]  ? __virt_addr_valid+0x1db/0x2d0
[   14.318360]  ? kasan_atomics_helper+0xc70/0x5450
[   14.318390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.318413]  ? kasan_atomics_helper+0xc70/0x5450
[   14.318435]  kasan_report+0x141/0x180
[   14.318457]  ? kasan_atomics_helper+0xc70/0x5450
[   14.318484]  kasan_check_range+0x10c/0x1c0
[   14.318508]  __kasan_check_write+0x18/0x20
[   14.318527]  kasan_atomics_helper+0xc70/0x5450
[   14.318550]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.318583]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.318614]  ? kasan_atomics+0x152/0x310
[   14.318670]  kasan_atomics+0x1dc/0x310
[   14.318693]  ? __pfx_kasan_atomics+0x10/0x10
[   14.318727]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.318754]  ? __pfx_read_tsc+0x10/0x10
[   14.318777]  ? ktime_get_ts64+0x86/0x230
[   14.318831]  kunit_try_run_case+0x1a5/0x480
[   14.318857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.318890]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.318913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.318999]  ? __kthread_parkme+0x82/0x180
[   14.319024]  ? preempt_count_sub+0x50/0x80
[   14.319049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.319074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.319099]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.319121]  kthread+0x337/0x6f0
[   14.319143]  ? trace_preempt_on+0x20/0xc0
[   14.319170]  ? __pfx_kthread+0x10/0x10
[   14.319191]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.319213]  ? calculate_sigpending+0x7b/0xa0
[   14.319238]  ? __pfx_kthread+0x10/0x10
[   14.319259]  ret_from_fork+0x116/0x1d0
[   14.319279]  ? __pfx_kthread+0x10/0x10
[   14.319299]  ret_from_fork_asm+0x1a/0x30
[   14.319332]  </TASK>
[   14.319345] 
[   14.330450] Allocated by task 282:
[   14.330756]  kasan_save_stack+0x45/0x70
[   14.331110]  kasan_save_track+0x18/0x40
[   14.331314]  kasan_save_alloc_info+0x3b/0x50
[   14.331588]  __kasan_kmalloc+0xb7/0xc0
[   14.331781]  __kmalloc_cache_noprof+0x189/0x420
[   14.332165]  kasan_atomics+0x95/0x310
[   14.332321]  kunit_try_run_case+0x1a5/0x480
[   14.332607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.332890]  kthread+0x337/0x6f0
[   14.333402]  ret_from_fork+0x116/0x1d0
[   14.333555]  ret_from_fork_asm+0x1a/0x30
[   14.333753] 
[   14.334053] The buggy address belongs to the object at ffff8881025a0d80
[   14.334053]  which belongs to the cache kmalloc-64 of size 64
[   14.334570] The buggy address is located 0 bytes to the right of
[   14.334570]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.335435] 
[   14.335517] The buggy address belongs to the physical page:
[   14.335905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.336388] flags: 0x200000000000000(node=0|zone=2)
[   14.336653] page_type: f5(slab)
[   14.336847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.337363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.338208] page dumped because: kasan: bad access detected
[   14.338525] 
[   14.338613] Memory state around the buggy address:
[   14.338999]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.339359]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.339649] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.340016]                                      ^
[   14.340449]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.340782]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.341194] ==================================================================
[   14.646953] ==================================================================
[   14.647629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.648390] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.649102] 
[   14.649476] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.649525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.649538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.649561] Call Trace:
[   14.649578]  <TASK>
[   14.649629]  dump_stack_lvl+0x73/0xb0
[   14.649659]  print_report+0xd1/0x650
[   14.649683]  ? __virt_addr_valid+0x1db/0x2d0
[   14.649707]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.649731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.649754]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.649778]  kasan_report+0x141/0x180
[   14.649800]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.649827]  kasan_check_range+0x10c/0x1c0
[   14.649851]  __kasan_check_write+0x18/0x20
[   14.649871]  kasan_atomics_helper+0x12e6/0x5450
[   14.649894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.649916]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.649943]  ? kasan_atomics+0x152/0x310
[   14.649971]  kasan_atomics+0x1dc/0x310
[   14.649994]  ? __pfx_kasan_atomics+0x10/0x10
[   14.650015]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.650042]  ? __pfx_read_tsc+0x10/0x10
[   14.650065]  ? ktime_get_ts64+0x86/0x230
[   14.650090]  kunit_try_run_case+0x1a5/0x480
[   14.650115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.650138]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.650160]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.650184]  ? __kthread_parkme+0x82/0x180
[   14.650205]  ? preempt_count_sub+0x50/0x80
[   14.650229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.650253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.650276]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.650300]  kthread+0x337/0x6f0
[   14.650320]  ? trace_preempt_on+0x20/0xc0
[   14.650345]  ? __pfx_kthread+0x10/0x10
[   14.650366]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.650399]  ? calculate_sigpending+0x7b/0xa0
[   14.650423]  ? __pfx_kthread+0x10/0x10
[   14.650445]  ret_from_fork+0x116/0x1d0
[   14.650464]  ? __pfx_kthread+0x10/0x10
[   14.650484]  ret_from_fork_asm+0x1a/0x30
[   14.650515]  </TASK>
[   14.650528] 
[   14.663556] Allocated by task 282:
[   14.663736]  kasan_save_stack+0x45/0x70
[   14.664126]  kasan_save_track+0x18/0x40
[   14.664434]  kasan_save_alloc_info+0x3b/0x50
[   14.664811]  __kasan_kmalloc+0xb7/0xc0
[   14.665243]  __kmalloc_cache_noprof+0x189/0x420
[   14.665486]  kasan_atomics+0x95/0x310
[   14.665946]  kunit_try_run_case+0x1a5/0x480
[   14.666428]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.666672]  kthread+0x337/0x6f0
[   14.666841]  ret_from_fork+0x116/0x1d0
[   14.667223]  ret_from_fork_asm+0x1a/0x30
[   14.667567] 
[   14.667806] The buggy address belongs to the object at ffff8881025a0d80
[   14.667806]  which belongs to the cache kmalloc-64 of size 64
[   14.668584] The buggy address is located 0 bytes to the right of
[   14.668584]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.669548] 
[   14.669782] The buggy address belongs to the physical page:
[   14.670236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.670800] flags: 0x200000000000000(node=0|zone=2)
[   14.671216] page_type: f5(slab)
[   14.671495] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.672106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.672425] page dumped because: kasan: bad access detected
[   14.672959] 
[   14.673207] Memory state around the buggy address:
[   14.673483]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.674179]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.674486] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.674944]                                      ^
[   14.675370]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.675989]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.676355] ==================================================================
[   14.894427] ==================================================================
[   14.894804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.895270] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.895582] 
[   14.895665] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.895716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.895763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.895784] Call Trace:
[   14.895799]  <TASK>
[   14.895815]  dump_stack_lvl+0x73/0xb0
[   14.895860]  print_report+0xd1/0x650
[   14.895883]  ? __virt_addr_valid+0x1db/0x2d0
[   14.895905]  ? kasan_atomics_helper+0x1818/0x5450
[   14.895937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.895959]  ? kasan_atomics_helper+0x1818/0x5450
[   14.895981]  kasan_report+0x141/0x180
[   14.896003]  ? kasan_atomics_helper+0x1818/0x5450
[   14.896045]  kasan_check_range+0x10c/0x1c0
[   14.896069]  __kasan_check_write+0x18/0x20
[   14.896089]  kasan_atomics_helper+0x1818/0x5450
[   14.896112]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.896135]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.896160]  ? kasan_atomics+0x152/0x310
[   14.896187]  kasan_atomics+0x1dc/0x310
[   14.896209]  ? __pfx_kasan_atomics+0x10/0x10
[   14.896232]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.896258]  ? __pfx_read_tsc+0x10/0x10
[   14.896280]  ? ktime_get_ts64+0x86/0x230
[   14.896306]  kunit_try_run_case+0x1a5/0x480
[   14.896330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.896353]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.896387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.896414]  ? __kthread_parkme+0x82/0x180
[   14.896435]  ? preempt_count_sub+0x50/0x80
[   14.896459]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.896483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.896507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.896532]  kthread+0x337/0x6f0
[   14.896552]  ? trace_preempt_on+0x20/0xc0
[   14.896586]  ? __pfx_kthread+0x10/0x10
[   14.896627]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.896649]  ? calculate_sigpending+0x7b/0xa0
[   14.896673]  ? __pfx_kthread+0x10/0x10
[   14.896695]  ret_from_fork+0x116/0x1d0
[   14.896714]  ? __pfx_kthread+0x10/0x10
[   14.896735]  ret_from_fork_asm+0x1a/0x30
[   14.896764]  </TASK>
[   14.896793] 
[   14.904422] Allocated by task 282:
[   14.904641]  kasan_save_stack+0x45/0x70
[   14.904860]  kasan_save_track+0x18/0x40
[   14.905071]  kasan_save_alloc_info+0x3b/0x50
[   14.905286]  __kasan_kmalloc+0xb7/0xc0
[   14.905482]  __kmalloc_cache_noprof+0x189/0x420
[   14.905829]  kasan_atomics+0x95/0x310
[   14.906030]  kunit_try_run_case+0x1a5/0x480
[   14.906340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.906581]  kthread+0x337/0x6f0
[   14.906705]  ret_from_fork+0x116/0x1d0
[   14.906836]  ret_from_fork_asm+0x1a/0x30
[   14.906971] 
[   14.907042] The buggy address belongs to the object at ffff8881025a0d80
[   14.907042]  which belongs to the cache kmalloc-64 of size 64
[   14.907551] The buggy address is located 0 bytes to the right of
[   14.907551]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.908004] 
[   14.908079] The buggy address belongs to the physical page:
[   14.908252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.908563] flags: 0x200000000000000(node=0|zone=2)
[   14.908825] page_type: f5(slab)
[   14.908992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.909350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.909857] page dumped because: kasan: bad access detected
[   14.910111] 
[   14.910202] Memory state around the buggy address:
[   14.910431]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.910807]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.911096] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.911416]                                      ^
[   14.911582]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.911796]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.912255] ==================================================================
[   15.119212] ==================================================================
[   15.119787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.120545] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.120892] 
[   15.121028] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.121071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.121085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.121106] Call Trace:
[   15.121121]  <TASK>
[   15.121147]  dump_stack_lvl+0x73/0xb0
[   15.121179]  print_report+0xd1/0x650
[   15.121203]  ? __virt_addr_valid+0x1db/0x2d0
[   15.121237]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.121259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.121281]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.121312]  kasan_report+0x141/0x180
[   15.121335]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.121362]  kasan_check_range+0x10c/0x1c0
[   15.121406]  __kasan_check_write+0x18/0x20
[   15.121426]  kasan_atomics_helper+0x1eaa/0x5450
[   15.121449]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.121479]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.121505]  ? kasan_atomics+0x152/0x310
[   15.121531]  kasan_atomics+0x1dc/0x310
[   15.121565]  ? __pfx_kasan_atomics+0x10/0x10
[   15.121598]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.121625]  ? __pfx_read_tsc+0x10/0x10
[   15.121647]  ? ktime_get_ts64+0x86/0x230
[   15.121680]  kunit_try_run_case+0x1a5/0x480
[   15.121705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.121738]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.121761]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.121784]  ? __kthread_parkme+0x82/0x180
[   15.121805]  ? preempt_count_sub+0x50/0x80
[   15.121837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.121861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.121885]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.121920]  kthread+0x337/0x6f0
[   15.121939]  ? trace_preempt_on+0x20/0xc0
[   15.121963]  ? __pfx_kthread+0x10/0x10
[   15.121985]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.122015]  ? calculate_sigpending+0x7b/0xa0
[   15.122040]  ? __pfx_kthread+0x10/0x10
[   15.122062]  ret_from_fork+0x116/0x1d0
[   15.122090]  ? __pfx_kthread+0x10/0x10
[   15.122111]  ret_from_fork_asm+0x1a/0x30
[   15.122142]  </TASK>
[   15.122154] 
[   15.130057] Allocated by task 282:
[   15.130189]  kasan_save_stack+0x45/0x70
[   15.130341]  kasan_save_track+0x18/0x40
[   15.130576]  kasan_save_alloc_info+0x3b/0x50
[   15.130817]  __kasan_kmalloc+0xb7/0xc0
[   15.131007]  __kmalloc_cache_noprof+0x189/0x420
[   15.131231]  kasan_atomics+0x95/0x310
[   15.131431]  kunit_try_run_case+0x1a5/0x480
[   15.131704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.131886]  kthread+0x337/0x6f0
[   15.132013]  ret_from_fork+0x116/0x1d0
[   15.132146]  ret_from_fork_asm+0x1a/0x30
[   15.132301] 
[   15.132425] The buggy address belongs to the object at ffff8881025a0d80
[   15.132425]  which belongs to the cache kmalloc-64 of size 64
[   15.133008] The buggy address is located 0 bytes to the right of
[   15.133008]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.133608] 
[   15.133709] The buggy address belongs to the physical page:
[   15.133964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.134313] flags: 0x200000000000000(node=0|zone=2)
[   15.134566] page_type: f5(slab)
[   15.134735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.135084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.135423] page dumped because: kasan: bad access detected
[   15.135769] 
[   15.135848] Memory state around the buggy address:
[   15.136004]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.136221]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.136586] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.136902]                                      ^
[   15.137090]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.137308]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.137660] ==================================================================
[   14.796788] ==================================================================
[   14.797272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.797762] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.798100] 
[   14.798201] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.798242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.798255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.798277] Call Trace:
[   14.798292]  <TASK>
[   14.798309]  dump_stack_lvl+0x73/0xb0
[   14.798336]  print_report+0xd1/0x650
[   14.798359]  ? __virt_addr_valid+0x1db/0x2d0
[   14.798394]  ? kasan_atomics_helper+0x151d/0x5450
[   14.798415]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.798437]  ? kasan_atomics_helper+0x151d/0x5450
[   14.798480]  kasan_report+0x141/0x180
[   14.798516]  ? kasan_atomics_helper+0x151d/0x5450
[   14.798554]  kasan_check_range+0x10c/0x1c0
[   14.798596]  __kasan_check_write+0x18/0x20
[   14.798616]  kasan_atomics_helper+0x151d/0x5450
[   14.798639]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.798662]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.798686]  ? kasan_atomics+0x152/0x310
[   14.798713]  kasan_atomics+0x1dc/0x310
[   14.798735]  ? __pfx_kasan_atomics+0x10/0x10
[   14.798758]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.798803]  ? __pfx_read_tsc+0x10/0x10
[   14.798824]  ? ktime_get_ts64+0x86/0x230
[   14.798850]  kunit_try_run_case+0x1a5/0x480
[   14.798888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.798911]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.798934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.798957]  ? __kthread_parkme+0x82/0x180
[   14.798976]  ? preempt_count_sub+0x50/0x80
[   14.799001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.799025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.799048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.799072]  kthread+0x337/0x6f0
[   14.799091]  ? trace_preempt_on+0x20/0xc0
[   14.799115]  ? __pfx_kthread+0x10/0x10
[   14.799135]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.799157]  ? calculate_sigpending+0x7b/0xa0
[   14.799181]  ? __pfx_kthread+0x10/0x10
[   14.799202]  ret_from_fork+0x116/0x1d0
[   14.799220]  ? __pfx_kthread+0x10/0x10
[   14.799242]  ret_from_fork_asm+0x1a/0x30
[   14.799271]  </TASK>
[   14.799282] 
[   14.807276] Allocated by task 282:
[   14.807463]  kasan_save_stack+0x45/0x70
[   14.807681]  kasan_save_track+0x18/0x40
[   14.807859]  kasan_save_alloc_info+0x3b/0x50
[   14.808065]  __kasan_kmalloc+0xb7/0xc0
[   14.808233]  __kmalloc_cache_noprof+0x189/0x420
[   14.808402]  kasan_atomics+0x95/0x310
[   14.808602]  kunit_try_run_case+0x1a5/0x480
[   14.808811]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.809085]  kthread+0x337/0x6f0
[   14.809275]  ret_from_fork+0x116/0x1d0
[   14.809456]  ret_from_fork_asm+0x1a/0x30
[   14.809682] 
[   14.809801] The buggy address belongs to the object at ffff8881025a0d80
[   14.809801]  which belongs to the cache kmalloc-64 of size 64
[   14.810297] The buggy address is located 0 bytes to the right of
[   14.810297]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.810883] 
[   14.810984] The buggy address belongs to the physical page:
[   14.811179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.811447] flags: 0x200000000000000(node=0|zone=2)
[   14.811732] page_type: f5(slab)
[   14.811896] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.812174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.812413] page dumped because: kasan: bad access detected
[   14.812759] 
[   14.812876] Memory state around the buggy address:
[   14.813115]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.813466]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.813815] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.814101]                                      ^
[   14.814332]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.814694]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.814962] ==================================================================
[   14.618596] ==================================================================
[   14.618942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.619267] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.619756] 
[   14.620124] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.620182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.620199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.620221] Call Trace:
[   14.620243]  <TASK>
[   14.620272]  dump_stack_lvl+0x73/0xb0
[   14.620303]  print_report+0xd1/0x650
[   14.620330]  ? __virt_addr_valid+0x1db/0x2d0
[   14.620356]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.620387]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.620414]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.620435]  kasan_report+0x141/0x180
[   14.620459]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.620485]  __asan_report_load4_noabort+0x18/0x20
[   14.620510]  kasan_atomics_helper+0x49e8/0x5450
[   14.620533]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.620555]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.620628]  ? kasan_atomics+0x152/0x310
[   14.620655]  kasan_atomics+0x1dc/0x310
[   14.620677]  ? __pfx_kasan_atomics+0x10/0x10
[   14.620700]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.620727]  ? __pfx_read_tsc+0x10/0x10
[   14.620749]  ? ktime_get_ts64+0x86/0x230
[   14.620774]  kunit_try_run_case+0x1a5/0x480
[   14.620802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.620825]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.620849]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.620872]  ? __kthread_parkme+0x82/0x180
[   14.620895]  ? preempt_count_sub+0x50/0x80
[   14.620940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.620964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.620988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.621012]  kthread+0x337/0x6f0
[   14.621032]  ? trace_preempt_on+0x20/0xc0
[   14.621058]  ? __pfx_kthread+0x10/0x10
[   14.621080]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.621101]  ? calculate_sigpending+0x7b/0xa0
[   14.621126]  ? __pfx_kthread+0x10/0x10
[   14.621147]  ret_from_fork+0x116/0x1d0
[   14.621167]  ? __pfx_kthread+0x10/0x10
[   14.621187]  ret_from_fork_asm+0x1a/0x30
[   14.621219]  </TASK>
[   14.621231] 
[   14.634121] Allocated by task 282:
[   14.634503]  kasan_save_stack+0x45/0x70
[   14.634739]  kasan_save_track+0x18/0x40
[   14.635066]  kasan_save_alloc_info+0x3b/0x50
[   14.635327]  __kasan_kmalloc+0xb7/0xc0
[   14.635655]  __kmalloc_cache_noprof+0x189/0x420
[   14.635869]  kasan_atomics+0x95/0x310
[   14.636441]  kunit_try_run_case+0x1a5/0x480
[   14.636733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.637340]  kthread+0x337/0x6f0
[   14.637647]  ret_from_fork+0x116/0x1d0
[   14.637839]  ret_from_fork_asm+0x1a/0x30
[   14.638186] 
[   14.638428] The buggy address belongs to the object at ffff8881025a0d80
[   14.638428]  which belongs to the cache kmalloc-64 of size 64
[   14.639443] The buggy address is located 0 bytes to the right of
[   14.639443]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.640330] 
[   14.640581] The buggy address belongs to the physical page:
[   14.641109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.641687] flags: 0x200000000000000(node=0|zone=2)
[   14.642051] page_type: f5(slab)
[   14.642189] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.642509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.643445] page dumped because: kasan: bad access detected
[   14.643885] 
[   14.643961] Memory state around the buggy address:
[   14.644174]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.644405]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.644620] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.644828]                                      ^
[   14.644980]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.645192]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.645757] ==================================================================
[   13.920994] ==================================================================
[   13.921412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.921757] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   13.922125] 
[   13.922214] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.922259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.922271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.922292] Call Trace:
[   13.922309]  <TASK>
[   13.922325]  dump_stack_lvl+0x73/0xb0
[   13.922353]  print_report+0xd1/0x650
[   13.922388]  ? __virt_addr_valid+0x1db/0x2d0
[   13.922411]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.922430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.922452]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.922473]  kasan_report+0x141/0x180
[   13.922494]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.922519]  __asan_report_store4_noabort+0x1b/0x30
[   13.922539]  kasan_atomics_helper+0x4ba2/0x5450
[   13.922561]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.922582]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.922606]  ? kasan_atomics+0x152/0x310
[   13.922631]  kasan_atomics+0x1dc/0x310
[   13.922653]  ? __pfx_kasan_atomics+0x10/0x10
[   13.922674]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   13.922700]  ? __pfx_read_tsc+0x10/0x10
[   13.922720]  ? ktime_get_ts64+0x86/0x230
[   13.922744]  kunit_try_run_case+0x1a5/0x480
[   13.922768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.922790]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.922811]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.922835]  ? __kthread_parkme+0x82/0x180
[   13.922856]  ? preempt_count_sub+0x50/0x80
[   13.922880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.922904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.922926]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.922948]  kthread+0x337/0x6f0
[   13.922967]  ? trace_preempt_on+0x20/0xc0
[   13.922993]  ? __pfx_kthread+0x10/0x10
[   13.923012]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.923034]  ? calculate_sigpending+0x7b/0xa0
[   13.923057]  ? __pfx_kthread+0x10/0x10
[   13.923078]  ret_from_fork+0x116/0x1d0
[   13.923096]  ? __pfx_kthread+0x10/0x10
[   13.923116]  ret_from_fork_asm+0x1a/0x30
[   13.923146]  </TASK>
[   13.923157] 
[   13.931164] Allocated by task 282:
[   13.931302]  kasan_save_stack+0x45/0x70
[   13.931519]  kasan_save_track+0x18/0x40
[   13.931731]  kasan_save_alloc_info+0x3b/0x50
[   13.931959]  __kasan_kmalloc+0xb7/0xc0
[   13.932119]  __kmalloc_cache_noprof+0x189/0x420
[   13.932327]  kasan_atomics+0x95/0x310
[   13.932494]  kunit_try_run_case+0x1a5/0x480
[   13.932642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.932860]  kthread+0x337/0x6f0
[   13.933025]  ret_from_fork+0x116/0x1d0
[   13.933211]  ret_from_fork_asm+0x1a/0x30
[   13.933623] 
[   13.933705] The buggy address belongs to the object at ffff8881025a0d80
[   13.933705]  which belongs to the cache kmalloc-64 of size 64
[   13.934321] The buggy address is located 0 bytes to the right of
[   13.934321]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   13.934810] 
[   13.934885] The buggy address belongs to the physical page:
[   13.935058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   13.935297] flags: 0x200000000000000(node=0|zone=2)
[   13.935533] page_type: f5(slab)
[   13.935702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.936305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.936591] page dumped because: kasan: bad access detected
[   13.936841] 
[   13.936944] Memory state around the buggy address:
[   13.937170]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.937488]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.938101] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.938411]                                      ^
[   13.938601]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.938905]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.939149] ==================================================================
[   15.244005] ==================================================================
[   15.244334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.245508] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.245757] 
[   15.245854] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.245903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.245916] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.245941] Call Trace:
[   15.245955]  <TASK>
[   15.245974]  dump_stack_lvl+0x73/0xb0
[   15.246007]  print_report+0xd1/0x650
[   15.246033]  ? __virt_addr_valid+0x1db/0x2d0
[   15.246059]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.246082]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.246104]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.246128]  kasan_report+0x141/0x180
[   15.246151]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.246177]  __asan_report_load8_noabort+0x18/0x20
[   15.246202]  kasan_atomics_helper+0x4fb2/0x5450
[   15.246226]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.246247]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.246273]  ? kasan_atomics+0x152/0x310
[   15.246299]  kasan_atomics+0x1dc/0x310
[   15.246323]  ? __pfx_kasan_atomics+0x10/0x10
[   15.246344]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.246372]  ? __pfx_read_tsc+0x10/0x10
[   15.246406]  ? ktime_get_ts64+0x86/0x230
[   15.246432]  kunit_try_run_case+0x1a5/0x480
[   15.246457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.246479]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.246503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.246526]  ? __kthread_parkme+0x82/0x180
[   15.246547]  ? preempt_count_sub+0x50/0x80
[   15.246573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.246597]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.246654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.246677]  kthread+0x337/0x6f0
[   15.246697]  ? trace_preempt_on+0x20/0xc0
[   15.246726]  ? __pfx_kthread+0x10/0x10
[   15.246749]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.246773]  ? calculate_sigpending+0x7b/0xa0
[   15.246798]  ? __pfx_kthread+0x10/0x10
[   15.246820]  ret_from_fork+0x116/0x1d0
[   15.246839]  ? __pfx_kthread+0x10/0x10
[   15.246859]  ret_from_fork_asm+0x1a/0x30
[   15.246892]  </TASK>
[   15.246905] 
[   15.257681] Allocated by task 282:
[   15.258042]  kasan_save_stack+0x45/0x70
[   15.258467]  kasan_save_track+0x18/0x40
[   15.258874]  kasan_save_alloc_info+0x3b/0x50
[   15.259266]  __kasan_kmalloc+0xb7/0xc0
[   15.259663]  __kmalloc_cache_noprof+0x189/0x420
[   15.260074]  kasan_atomics+0x95/0x310
[   15.260429]  kunit_try_run_case+0x1a5/0x480
[   15.260829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.261312]  kthread+0x337/0x6f0
[   15.261629]  ret_from_fork+0x116/0x1d0
[   15.261937]  ret_from_fork_asm+0x1a/0x30
[   15.262080] 
[   15.262153] The buggy address belongs to the object at ffff8881025a0d80
[   15.262153]  which belongs to the cache kmalloc-64 of size 64
[   15.262516] The buggy address is located 0 bytes to the right of
[   15.262516]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.262972] 
[   15.263070] The buggy address belongs to the physical page:
[   15.263320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.263604] flags: 0x200000000000000(node=0|zone=2)
[   15.263875] page_type: f5(slab)
[   15.264049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.264353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.264673] page dumped because: kasan: bad access detected
[   15.264965] 
[   15.265041] Memory state around the buggy address:
[   15.265225]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.265564]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.265841] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.266168]                                      ^
[   15.266384]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.266721]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.267004] ==================================================================
[   14.492987] ==================================================================
[   14.493212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.493955] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.494286] 
[   14.494401] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.494443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.494455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.494476] Call Trace:
[   14.494491]  <TASK>
[   14.494508]  dump_stack_lvl+0x73/0xb0
[   14.494535]  print_report+0xd1/0x650
[   14.494571]  ? __virt_addr_valid+0x1db/0x2d0
[   14.494595]  ? kasan_atomics_helper+0x1079/0x5450
[   14.494623]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.494645]  ? kasan_atomics_helper+0x1079/0x5450
[   14.494667]  kasan_report+0x141/0x180
[   14.494690]  ? kasan_atomics_helper+0x1079/0x5450
[   14.494717]  kasan_check_range+0x10c/0x1c0
[   14.494742]  __kasan_check_write+0x18/0x20
[   14.494762]  kasan_atomics_helper+0x1079/0x5450
[   14.494786]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.494811]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.494836]  ? kasan_atomics+0x152/0x310
[   14.494864]  kasan_atomics+0x1dc/0x310
[   14.494888]  ? __pfx_kasan_atomics+0x10/0x10
[   14.494912]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.494950]  ? __pfx_read_tsc+0x10/0x10
[   14.494970]  ? ktime_get_ts64+0x86/0x230
[   14.494995]  kunit_try_run_case+0x1a5/0x480
[   14.495019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.495043]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.495066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.495089]  ? __kthread_parkme+0x82/0x180
[   14.495110]  ? preempt_count_sub+0x50/0x80
[   14.495135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.495159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.495185]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.495208]  kthread+0x337/0x6f0
[   14.495228]  ? trace_preempt_on+0x20/0xc0
[   14.495264]  ? __pfx_kthread+0x10/0x10
[   14.495285]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.495306]  ? calculate_sigpending+0x7b/0xa0
[   14.495342]  ? __pfx_kthread+0x10/0x10
[   14.495364]  ret_from_fork+0x116/0x1d0
[   14.495391]  ? __pfx_kthread+0x10/0x10
[   14.495412]  ret_from_fork_asm+0x1a/0x30
[   14.495443]  </TASK>
[   14.495455] 
[   14.505311] Allocated by task 282:
[   14.505560]  kasan_save_stack+0x45/0x70
[   14.505878]  kasan_save_track+0x18/0x40
[   14.506021]  kasan_save_alloc_info+0x3b/0x50
[   14.506429]  __kasan_kmalloc+0xb7/0xc0
[   14.506683]  __kmalloc_cache_noprof+0x189/0x420
[   14.506922]  kasan_atomics+0x95/0x310
[   14.507190]  kunit_try_run_case+0x1a5/0x480
[   14.507423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.507700]  kthread+0x337/0x6f0
[   14.507896]  ret_from_fork+0x116/0x1d0
[   14.508132]  ret_from_fork_asm+0x1a/0x30
[   14.508422] 
[   14.508571] The buggy address belongs to the object at ffff8881025a0d80
[   14.508571]  which belongs to the cache kmalloc-64 of size 64
[   14.509183] The buggy address is located 0 bytes to the right of
[   14.509183]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.509808] 
[   14.509920] The buggy address belongs to the physical page:
[   14.510205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.510585] flags: 0x200000000000000(node=0|zone=2)
[   14.510821] page_type: f5(slab)
[   14.511023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.511406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.511790] page dumped because: kasan: bad access detected
[   14.512245] 
[   14.512337] Memory state around the buggy address:
[   14.512565]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.513244]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.513559] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.513775]                                      ^
[   14.513923]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.514129]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.514330] ==================================================================
[   14.291231] ==================================================================
[   14.291543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.291887] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.292489] 
[   14.292593] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.292641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.292653] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.292676] Call Trace:
[   14.292696]  <TASK>
[   14.292718]  dump_stack_lvl+0x73/0xb0
[   14.292750]  print_report+0xd1/0x650
[   14.292776]  ? __virt_addr_valid+0x1db/0x2d0
[   14.292799]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.292856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.292895]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.292980]  kasan_report+0x141/0x180
[   14.293006]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.293033]  kasan_check_range+0x10c/0x1c0
[   14.293057]  __kasan_check_write+0x18/0x20
[   14.293077]  kasan_atomics_helper+0xb6a/0x5450
[   14.293100]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.293122]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.293185]  ? kasan_atomics+0x152/0x310
[   14.293213]  kasan_atomics+0x1dc/0x310
[   14.293236]  ? __pfx_kasan_atomics+0x10/0x10
[   14.293270]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.293296]  ? __pfx_read_tsc+0x10/0x10
[   14.293347]  ? ktime_get_ts64+0x86/0x230
[   14.293389]  kunit_try_run_case+0x1a5/0x480
[   14.293415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.293438]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.293460]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.293484]  ? __kthread_parkme+0x82/0x180
[   14.293505]  ? preempt_count_sub+0x50/0x80
[   14.293530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.293555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.293590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.293613]  kthread+0x337/0x6f0
[   14.293634]  ? trace_preempt_on+0x20/0xc0
[   14.293659]  ? __pfx_kthread+0x10/0x10
[   14.293680]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.293702]  ? calculate_sigpending+0x7b/0xa0
[   14.293726]  ? __pfx_kthread+0x10/0x10
[   14.293748]  ret_from_fork+0x116/0x1d0
[   14.293767]  ? __pfx_kthread+0x10/0x10
[   14.293788]  ret_from_fork_asm+0x1a/0x30
[   14.293820]  </TASK>
[   14.293834] 
[   14.304302] Allocated by task 282:
[   14.304476]  kasan_save_stack+0x45/0x70
[   14.305033]  kasan_save_track+0x18/0x40
[   14.305249]  kasan_save_alloc_info+0x3b/0x50
[   14.305568]  __kasan_kmalloc+0xb7/0xc0
[   14.305728]  __kmalloc_cache_noprof+0x189/0x420
[   14.306050]  kasan_atomics+0x95/0x310
[   14.306266]  kunit_try_run_case+0x1a5/0x480
[   14.306521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.306806]  kthread+0x337/0x6f0
[   14.307098]  ret_from_fork+0x116/0x1d0
[   14.307335]  ret_from_fork_asm+0x1a/0x30
[   14.307561] 
[   14.307701] The buggy address belongs to the object at ffff8881025a0d80
[   14.307701]  which belongs to the cache kmalloc-64 of size 64
[   14.308612] The buggy address is located 0 bytes to the right of
[   14.308612]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.309327] 
[   14.309446] The buggy address belongs to the physical page:
[   14.309775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.310296] flags: 0x200000000000000(node=0|zone=2)
[   14.310486] page_type: f5(slab)
[   14.310636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.311095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.311494] page dumped because: kasan: bad access detected
[   14.311867] 
[   14.312101] Memory state around the buggy address:
[   14.312866]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.313341]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.314184] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.314916]                                      ^
[   14.315081]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.315300]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.315538] ==================================================================
[   14.514654] ==================================================================
[   14.514984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.515315] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.515989] 
[   14.516099] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.516176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.516189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.516210] Call Trace:
[   14.516252]  <TASK>
[   14.516281]  dump_stack_lvl+0x73/0xb0
[   14.516321]  print_report+0xd1/0x650
[   14.516358]  ? __virt_addr_valid+0x1db/0x2d0
[   14.516411]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.516456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.516497]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.516530]  kasan_report+0x141/0x180
[   14.516553]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.516590]  __asan_report_load4_noabort+0x18/0x20
[   14.516614]  kasan_atomics_helper+0x4a1c/0x5450
[   14.516638]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.516661]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.516687]  ? kasan_atomics+0x152/0x310
[   14.516732]  kasan_atomics+0x1dc/0x310
[   14.516765]  ? __pfx_kasan_atomics+0x10/0x10
[   14.516788]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.516824]  ? __pfx_read_tsc+0x10/0x10
[   14.516846]  ? ktime_get_ts64+0x86/0x230
[   14.516870]  kunit_try_run_case+0x1a5/0x480
[   14.516895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.516918]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.516941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.516964]  ? __kthread_parkme+0x82/0x180
[   14.516985]  ? preempt_count_sub+0x50/0x80
[   14.517008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.517032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.517081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.517105]  kthread+0x337/0x6f0
[   14.517125]  ? trace_preempt_on+0x20/0xc0
[   14.517158]  ? __pfx_kthread+0x10/0x10
[   14.517180]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.517202]  ? calculate_sigpending+0x7b/0xa0
[   14.517225]  ? __pfx_kthread+0x10/0x10
[   14.517247]  ret_from_fork+0x116/0x1d0
[   14.517265]  ? __pfx_kthread+0x10/0x10
[   14.517286]  ret_from_fork_asm+0x1a/0x30
[   14.517317]  </TASK>
[   14.517329] 
[   14.526342] Allocated by task 282:
[   14.526559]  kasan_save_stack+0x45/0x70
[   14.526882]  kasan_save_track+0x18/0x40
[   14.527228]  kasan_save_alloc_info+0x3b/0x50
[   14.527413]  __kasan_kmalloc+0xb7/0xc0
[   14.527608]  __kmalloc_cache_noprof+0x189/0x420
[   14.527811]  kasan_atomics+0x95/0x310
[   14.527986]  kunit_try_run_case+0x1a5/0x480
[   14.528286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.528575]  kthread+0x337/0x6f0
[   14.528719]  ret_from_fork+0x116/0x1d0
[   14.529036]  ret_from_fork_asm+0x1a/0x30
[   14.529221] 
[   14.529333] The buggy address belongs to the object at ffff8881025a0d80
[   14.529333]  which belongs to the cache kmalloc-64 of size 64
[   14.529805] The buggy address is located 0 bytes to the right of
[   14.529805]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.530397] 
[   14.530520] The buggy address belongs to the physical page:
[   14.530824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.531256] flags: 0x200000000000000(node=0|zone=2)
[   14.531518] page_type: f5(slab)
[   14.531681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.532011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.532336] page dumped because: kasan: bad access detected
[   14.532590] 
[   14.532684] Memory state around the buggy address:
[   14.532899]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.533226]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.533501] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.533922]                                      ^
[   14.534071]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.534277]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.534732] ==================================================================
[   14.177804] ==================================================================
[   14.178159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.178505] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.178903] 
[   14.179047] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.179108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.179122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.179162] Call Trace:
[   14.179178]  <TASK>
[   14.179196]  dump_stack_lvl+0x73/0xb0
[   14.179250]  print_report+0xd1/0x650
[   14.179275]  ? __virt_addr_valid+0x1db/0x2d0
[   14.179299]  ? kasan_atomics_helper+0x860/0x5450
[   14.179320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.179343]  ? kasan_atomics_helper+0x860/0x5450
[   14.179364]  kasan_report+0x141/0x180
[   14.179397]  ? kasan_atomics_helper+0x860/0x5450
[   14.179424]  kasan_check_range+0x10c/0x1c0
[   14.179448]  __kasan_check_write+0x18/0x20
[   14.179468]  kasan_atomics_helper+0x860/0x5450
[   14.179508]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.179531]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.179575]  ? kasan_atomics+0x152/0x310
[   14.179602]  kasan_atomics+0x1dc/0x310
[   14.179625]  ? __pfx_kasan_atomics+0x10/0x10
[   14.179648]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.179674]  ? __pfx_read_tsc+0x10/0x10
[   14.179696]  ? ktime_get_ts64+0x86/0x230
[   14.179721]  kunit_try_run_case+0x1a5/0x480
[   14.179746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.179768]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.179806]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.179842]  ? __kthread_parkme+0x82/0x180
[   14.179876]  ? preempt_count_sub+0x50/0x80
[   14.179901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.179957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.179993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.180030]  kthread+0x337/0x6f0
[   14.180051]  ? trace_preempt_on+0x20/0xc0
[   14.180075]  ? __pfx_kthread+0x10/0x10
[   14.180096]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.180118]  ? calculate_sigpending+0x7b/0xa0
[   14.180142]  ? __pfx_kthread+0x10/0x10
[   14.180163]  ret_from_fork+0x116/0x1d0
[   14.180182]  ? __pfx_kthread+0x10/0x10
[   14.180203]  ret_from_fork_asm+0x1a/0x30
[   14.180233]  </TASK>
[   14.180245] 
[   14.189113] Allocated by task 282:
[   14.189348]  kasan_save_stack+0x45/0x70
[   14.189523]  kasan_save_track+0x18/0x40
[   14.189878]  kasan_save_alloc_info+0x3b/0x50
[   14.190234]  __kasan_kmalloc+0xb7/0xc0
[   14.190513]  __kmalloc_cache_noprof+0x189/0x420
[   14.190742]  kasan_atomics+0x95/0x310
[   14.190930]  kunit_try_run_case+0x1a5/0x480
[   14.191115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.191290]  kthread+0x337/0x6f0
[   14.191464]  ret_from_fork+0x116/0x1d0
[   14.191654]  ret_from_fork_asm+0x1a/0x30
[   14.191851] 
[   14.191937] The buggy address belongs to the object at ffff8881025a0d80
[   14.191937]  which belongs to the cache kmalloc-64 of size 64
[   14.192317] The buggy address is located 0 bytes to the right of
[   14.192317]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.193047] 
[   14.193138] The buggy address belongs to the physical page:
[   14.193312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.193577] flags: 0x200000000000000(node=0|zone=2)
[   14.193835] page_type: f5(slab)
[   14.194066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.194554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.195011] page dumped because: kasan: bad access detected
[   14.195289] 
[   14.195361] Memory state around the buggy address:
[   14.195527]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.195791]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.196348] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.196758]                                      ^
[   14.196992]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.197462]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.197883] ==================================================================
[   14.736676] ==================================================================
[   14.736966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.737390] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.737698] 
[   14.737789] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.737841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.737855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.737877] Call Trace:
[   14.737903]  <TASK>
[   14.737924]  dump_stack_lvl+0x73/0xb0
[   14.737953]  print_report+0xd1/0x650
[   14.737976]  ? __virt_addr_valid+0x1db/0x2d0
[   14.738001]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.738023]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.738046]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.738068]  kasan_report+0x141/0x180
[   14.738090]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.738117]  __asan_report_load8_noabort+0x18/0x20
[   14.738142]  kasan_atomics_helper+0x4eae/0x5450
[   14.738165]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.738188]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.738213]  ? kasan_atomics+0x152/0x310
[   14.738240]  kasan_atomics+0x1dc/0x310
[   14.738264]  ? __pfx_kasan_atomics+0x10/0x10
[   14.738287]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.738314]  ? __pfx_read_tsc+0x10/0x10
[   14.738337]  ? ktime_get_ts64+0x86/0x230
[   14.738361]  kunit_try_run_case+0x1a5/0x480
[   14.738398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.738421]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.738444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.738467]  ? __kthread_parkme+0x82/0x180
[   14.738488]  ? preempt_count_sub+0x50/0x80
[   14.738513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.738538]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.738562]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.738587]  kthread+0x337/0x6f0
[   14.738607]  ? trace_preempt_on+0x20/0xc0
[   14.738631]  ? __pfx_kthread+0x10/0x10
[   14.738652]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.738675]  ? calculate_sigpending+0x7b/0xa0
[   14.738699]  ? __pfx_kthread+0x10/0x10
[   14.738721]  ret_from_fork+0x116/0x1d0
[   14.738740]  ? __pfx_kthread+0x10/0x10
[   14.738762]  ret_from_fork_asm+0x1a/0x30
[   14.738792]  </TASK>
[   14.738804] 
[   14.749131] Allocated by task 282:
[   14.749321]  kasan_save_stack+0x45/0x70
[   14.749553]  kasan_save_track+0x18/0x40
[   14.749985]  kasan_save_alloc_info+0x3b/0x50
[   14.750450]  __kasan_kmalloc+0xb7/0xc0
[   14.750769]  __kmalloc_cache_noprof+0x189/0x420
[   14.751184]  kasan_atomics+0x95/0x310
[   14.751337]  kunit_try_run_case+0x1a5/0x480
[   14.751565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.751877]  kthread+0x337/0x6f0
[   14.752216]  ret_from_fork+0x116/0x1d0
[   14.752372]  ret_from_fork_asm+0x1a/0x30
[   14.752571] 
[   14.752793] The buggy address belongs to the object at ffff8881025a0d80
[   14.752793]  which belongs to the cache kmalloc-64 of size 64
[   14.753410] The buggy address is located 0 bytes to the right of
[   14.753410]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.754098] 
[   14.754196] The buggy address belongs to the physical page:
[   14.754426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.754945] flags: 0x200000000000000(node=0|zone=2)
[   14.755241] page_type: f5(slab)
[   14.755408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.755879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.756329] page dumped because: kasan: bad access detected
[   14.756568] 
[   14.756746] Memory state around the buggy address:
[   14.757113]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.757422]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.757774] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.758229]                                      ^
[   14.758606]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.758865]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.759349] ==================================================================
[   14.815590] ==================================================================
[   14.815924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.816296] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.816600] 
[   14.816740] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.816819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.816832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.816854] Call Trace:
[   14.816870]  <TASK>
[   14.816887]  dump_stack_lvl+0x73/0xb0
[   14.816914]  print_report+0xd1/0x650
[   14.816938]  ? __virt_addr_valid+0x1db/0x2d0
[   14.816961]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.816982]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.817005]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.817027]  kasan_report+0x141/0x180
[   14.817050]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.817077]  kasan_check_range+0x10c/0x1c0
[   14.817112]  __kasan_check_write+0x18/0x20
[   14.817133]  kasan_atomics_helper+0x15b6/0x5450
[   14.817157]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.817180]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.817205]  ? kasan_atomics+0x152/0x310
[   14.817232]  kasan_atomics+0x1dc/0x310
[   14.817255]  ? __pfx_kasan_atomics+0x10/0x10
[   14.817278]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.817304]  ? __pfx_read_tsc+0x10/0x10
[   14.817326]  ? ktime_get_ts64+0x86/0x230
[   14.817352]  kunit_try_run_case+0x1a5/0x480
[   14.817386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.817409]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.817433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.817456]  ? __kthread_parkme+0x82/0x180
[   14.817478]  ? preempt_count_sub+0x50/0x80
[   14.817503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.817528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.817551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.817576]  kthread+0x337/0x6f0
[   14.817596]  ? trace_preempt_on+0x20/0xc0
[   14.817621]  ? __pfx_kthread+0x10/0x10
[   14.817644]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.817666]  ? calculate_sigpending+0x7b/0xa0
[   14.817690]  ? __pfx_kthread+0x10/0x10
[   14.817712]  ret_from_fork+0x116/0x1d0
[   14.817731]  ? __pfx_kthread+0x10/0x10
[   14.817752]  ret_from_fork_asm+0x1a/0x30
[   14.817782]  </TASK>
[   14.817815] 
[   14.825951] Allocated by task 282:
[   14.826105]  kasan_save_stack+0x45/0x70
[   14.826300]  kasan_save_track+0x18/0x40
[   14.826492]  kasan_save_alloc_info+0x3b/0x50
[   14.826730]  __kasan_kmalloc+0xb7/0xc0
[   14.826973]  __kmalloc_cache_noprof+0x189/0x420
[   14.827249]  kasan_atomics+0x95/0x310
[   14.827464]  kunit_try_run_case+0x1a5/0x480
[   14.827677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.827942]  kthread+0x337/0x6f0
[   14.828287]  ret_from_fork+0x116/0x1d0
[   14.828488]  ret_from_fork_asm+0x1a/0x30
[   14.828680] 
[   14.828774] The buggy address belongs to the object at ffff8881025a0d80
[   14.828774]  which belongs to the cache kmalloc-64 of size 64
[   14.829285] The buggy address is located 0 bytes to the right of
[   14.829285]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.829690] 
[   14.829765] The buggy address belongs to the physical page:
[   14.829939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.830178] flags: 0x200000000000000(node=0|zone=2)
[   14.830354] page_type: f5(slab)
[   14.830563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.830934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.831321] page dumped because: kasan: bad access detected
[   14.831591] 
[   14.831690] Memory state around the buggy address:
[   14.831925]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.832236]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.832591] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.832916]                                      ^
[   14.833104]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.833412]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.833752] ==================================================================
[   14.054414] ==================================================================
[   14.054851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.055179] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.055462] 
[   14.055573] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.055616] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.055630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.055652] Call Trace:
[   14.055667]  <TASK>
[   14.055684]  dump_stack_lvl+0x73/0xb0
[   14.055711]  print_report+0xd1/0x650
[   14.055734]  ? __virt_addr_valid+0x1db/0x2d0
[   14.055760]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.055782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.055805]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.055827]  kasan_report+0x141/0x180
[   14.055849]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.055875]  __asan_report_store4_noabort+0x1b/0x30
[   14.055896]  kasan_atomics_helper+0x4b3a/0x5450
[   14.055930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.055953]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.055979]  ? kasan_atomics+0x152/0x310
[   14.056005]  kasan_atomics+0x1dc/0x310
[   14.056028]  ? __pfx_kasan_atomics+0x10/0x10
[   14.056050]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.056077]  ? __pfx_read_tsc+0x10/0x10
[   14.056098]  ? ktime_get_ts64+0x86/0x230
[   14.056124]  kunit_try_run_case+0x1a5/0x480
[   14.056147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.056170]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.056193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.056216]  ? __kthread_parkme+0x82/0x180
[   14.056236]  ? preempt_count_sub+0x50/0x80
[   14.056260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.056283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.056306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.056330]  kthread+0x337/0x6f0
[   14.056349]  ? trace_preempt_on+0x20/0xc0
[   14.056384]  ? __pfx_kthread+0x10/0x10
[   14.056409]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.056430]  ? calculate_sigpending+0x7b/0xa0
[   14.056453]  ? __pfx_kthread+0x10/0x10
[   14.056475]  ret_from_fork+0x116/0x1d0
[   14.056494]  ? __pfx_kthread+0x10/0x10
[   14.056515]  ret_from_fork_asm+0x1a/0x30
[   14.056544]  </TASK>
[   14.056557] 
[   14.064773] Allocated by task 282:
[   14.065026]  kasan_save_stack+0x45/0x70
[   14.065230]  kasan_save_track+0x18/0x40
[   14.065432]  kasan_save_alloc_info+0x3b/0x50
[   14.066406]  __kasan_kmalloc+0xb7/0xc0
[   14.066795]  __kmalloc_cache_noprof+0x189/0x420
[   14.067296]  kasan_atomics+0x95/0x310
[   14.067563]  kunit_try_run_case+0x1a5/0x480
[   14.067772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.068451]  kthread+0x337/0x6f0
[   14.068729]  ret_from_fork+0x116/0x1d0
[   14.069137]  ret_from_fork_asm+0x1a/0x30
[   14.069342] 
[   14.069444] The buggy address belongs to the object at ffff8881025a0d80
[   14.069444]  which belongs to the cache kmalloc-64 of size 64
[   14.070408] The buggy address is located 0 bytes to the right of
[   14.070408]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.071545] 
[   14.071743] The buggy address belongs to the physical page:
[   14.072408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.073031] flags: 0x200000000000000(node=0|zone=2)
[   14.073393] page_type: f5(slab)
[   14.073560] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.073866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.074434] page dumped because: kasan: bad access detected
[   14.074861] 
[   14.075117] Memory state around the buggy address:
[   14.075295]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.075625]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.075869] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.076188]                                      ^
[   14.076422]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.076660]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.077086] ==================================================================
[   14.912888] ==================================================================
[   14.913401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.913831] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.914054] 
[   14.914137] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.914180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.914193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.914215] Call Trace:
[   14.914230]  <TASK>
[   14.914247]  dump_stack_lvl+0x73/0xb0
[   14.914276]  print_report+0xd1/0x650
[   14.914297]  ? __virt_addr_valid+0x1db/0x2d0
[   14.914324]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.914346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.914369]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.914403]  kasan_report+0x141/0x180
[   14.914437]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.914464]  kasan_check_range+0x10c/0x1c0
[   14.914489]  __kasan_check_write+0x18/0x20
[   14.914510]  kasan_atomics_helper+0x18b1/0x5450
[   14.914534]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.914556]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.914581]  ? kasan_atomics+0x152/0x310
[   14.914636]  kasan_atomics+0x1dc/0x310
[   14.914660]  ? __pfx_kasan_atomics+0x10/0x10
[   14.914682]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.914708]  ? __pfx_read_tsc+0x10/0x10
[   14.914730]  ? ktime_get_ts64+0x86/0x230
[   14.914754]  kunit_try_run_case+0x1a5/0x480
[   14.914778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.914800]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.914824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.914863]  ? __kthread_parkme+0x82/0x180
[   14.914883]  ? preempt_count_sub+0x50/0x80
[   14.914908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.914931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.914955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.914980]  kthread+0x337/0x6f0
[   14.915001]  ? trace_preempt_on+0x20/0xc0
[   14.915040]  ? __pfx_kthread+0x10/0x10
[   14.915062]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.915083]  ? calculate_sigpending+0x7b/0xa0
[   14.915107]  ? __pfx_kthread+0x10/0x10
[   14.915129]  ret_from_fork+0x116/0x1d0
[   14.915148]  ? __pfx_kthread+0x10/0x10
[   14.915168]  ret_from_fork_asm+0x1a/0x30
[   14.915199]  </TASK>
[   14.915211] 
[   14.922951] Allocated by task 282:
[   14.923088]  kasan_save_stack+0x45/0x70
[   14.923287]  kasan_save_track+0x18/0x40
[   14.923514]  kasan_save_alloc_info+0x3b/0x50
[   14.923665]  __kasan_kmalloc+0xb7/0xc0
[   14.923794]  __kmalloc_cache_noprof+0x189/0x420
[   14.924029]  kasan_atomics+0x95/0x310
[   14.924214]  kunit_try_run_case+0x1a5/0x480
[   14.924451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.924686]  kthread+0x337/0x6f0
[   14.924851]  ret_from_fork+0x116/0x1d0
[   14.924990]  ret_from_fork_asm+0x1a/0x30
[   14.925124] 
[   14.925193] The buggy address belongs to the object at ffff8881025a0d80
[   14.925193]  which belongs to the cache kmalloc-64 of size 64
[   14.926623] The buggy address is located 0 bytes to the right of
[   14.926623]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.928784] 
[   14.929085] The buggy address belongs to the physical page:
[   14.929492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.930179] flags: 0x200000000000000(node=0|zone=2)
[   14.930353] page_type: f5(slab)
[   14.930484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.931097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.931976] page dumped because: kasan: bad access detected
[   14.932403] 
[   14.932482] Memory state around the buggy address:
[   14.932821]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.933451]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.933793] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.934011]                                      ^
[   14.934170]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.934397]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.934773] ==================================================================
[   14.935482] ==================================================================
[   14.935776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.936095] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.936437] 
[   14.936539] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.936583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.936596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.936618] Call Trace:
[   14.936634]  <TASK>
[   14.936651]  dump_stack_lvl+0x73/0xb0
[   14.936676]  print_report+0xd1/0x650
[   14.936700]  ? __virt_addr_valid+0x1db/0x2d0
[   14.936723]  ? kasan_atomics_helper+0x194a/0x5450
[   14.936744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.936765]  ? kasan_atomics_helper+0x194a/0x5450
[   14.936787]  kasan_report+0x141/0x180
[   14.936810]  ? kasan_atomics_helper+0x194a/0x5450
[   14.936836]  kasan_check_range+0x10c/0x1c0
[   14.936860]  __kasan_check_write+0x18/0x20
[   14.936879]  kasan_atomics_helper+0x194a/0x5450
[   14.936902]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.936924]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.936950]  ? kasan_atomics+0x152/0x310
[   14.936976]  kasan_atomics+0x1dc/0x310
[   14.936999]  ? __pfx_kasan_atomics+0x10/0x10
[   14.937021]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.937047]  ? __pfx_read_tsc+0x10/0x10
[   14.937069]  ? ktime_get_ts64+0x86/0x230
[   14.937093]  kunit_try_run_case+0x1a5/0x480
[   14.937118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.937140]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.937162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.937186]  ? __kthread_parkme+0x82/0x180
[   14.937206]  ? preempt_count_sub+0x50/0x80
[   14.937232]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.937256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.937279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.937302]  kthread+0x337/0x6f0
[   14.937322]  ? trace_preempt_on+0x20/0xc0
[   14.937347]  ? __pfx_kthread+0x10/0x10
[   14.937368]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.937716]  ? calculate_sigpending+0x7b/0xa0
[   14.937742]  ? __pfx_kthread+0x10/0x10
[   14.937779]  ret_from_fork+0x116/0x1d0
[   14.937799]  ? __pfx_kthread+0x10/0x10
[   14.937820]  ret_from_fork_asm+0x1a/0x30
[   14.937850]  </TASK>
[   14.937862] 
[   14.949220] Allocated by task 282:
[   14.949404]  kasan_save_stack+0x45/0x70
[   14.949578]  kasan_save_track+0x18/0x40
[   14.949753]  kasan_save_alloc_info+0x3b/0x50
[   14.949949]  __kasan_kmalloc+0xb7/0xc0
[   14.950106]  __kmalloc_cache_noprof+0x189/0x420
[   14.950310]  kasan_atomics+0x95/0x310
[   14.950593]  kunit_try_run_case+0x1a5/0x480
[   14.950768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.951107]  kthread+0x337/0x6f0
[   14.951241]  ret_from_fork+0x116/0x1d0
[   14.951486]  ret_from_fork_asm+0x1a/0x30
[   14.951657] 
[   14.951816] The buggy address belongs to the object at ffff8881025a0d80
[   14.951816]  which belongs to the cache kmalloc-64 of size 64
[   14.952239] The buggy address is located 0 bytes to the right of
[   14.952239]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.952750] 
[   14.952882] The buggy address belongs to the physical page:
[   14.953269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.954429] flags: 0x200000000000000(node=0|zone=2)
[   14.954741] page_type: f5(slab)
[   14.954954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.955439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.955772] page dumped because: kasan: bad access detected
[   14.956085] 
[   14.956165] Memory state around the buggy address:
[   14.956386]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.956791]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.957203] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.957551]                                      ^
[   14.957719]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.958103]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.958423] ==================================================================
[   14.999806] ==================================================================
[   15.000741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.001233] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.001599] 
[   15.001758] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.001819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.001833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.001856] Call Trace:
[   15.001904]  <TASK>
[   15.001925]  dump_stack_lvl+0x73/0xb0
[   15.001954]  print_report+0xd1/0x650
[   15.001989]  ? __virt_addr_valid+0x1db/0x2d0
[   15.002013]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.002034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.002057]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.002079]  kasan_report+0x141/0x180
[   15.002101]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.002127]  kasan_check_range+0x10c/0x1c0
[   15.002152]  __kasan_check_write+0x18/0x20
[   15.002171]  kasan_atomics_helper+0x1b22/0x5450
[   15.002226]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.002249]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.002286]  ? kasan_atomics+0x152/0x310
[   15.002313]  kasan_atomics+0x1dc/0x310
[   15.002363]  ? __pfx_kasan_atomics+0x10/0x10
[   15.002402]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.002429]  ? __pfx_read_tsc+0x10/0x10
[   15.002452]  ? ktime_get_ts64+0x86/0x230
[   15.002477]  kunit_try_run_case+0x1a5/0x480
[   15.002501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.002524]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.002547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.002570]  ? __kthread_parkme+0x82/0x180
[   15.002603]  ? preempt_count_sub+0x50/0x80
[   15.002628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.002652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.002676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.002699]  kthread+0x337/0x6f0
[   15.002719]  ? trace_preempt_on+0x20/0xc0
[   15.002745]  ? __pfx_kthread+0x10/0x10
[   15.002766]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.002788]  ? calculate_sigpending+0x7b/0xa0
[   15.002813]  ? __pfx_kthread+0x10/0x10
[   15.002835]  ret_from_fork+0x116/0x1d0
[   15.002854]  ? __pfx_kthread+0x10/0x10
[   15.002875]  ret_from_fork_asm+0x1a/0x30
[   15.002906]  </TASK>
[   15.002918] 
[   15.011327] Allocated by task 282:
[   15.011576]  kasan_save_stack+0x45/0x70
[   15.011874]  kasan_save_track+0x18/0x40
[   15.012069]  kasan_save_alloc_info+0x3b/0x50
[   15.012219]  __kasan_kmalloc+0xb7/0xc0
[   15.012548]  __kmalloc_cache_noprof+0x189/0x420
[   15.012788]  kasan_atomics+0x95/0x310
[   15.012981]  kunit_try_run_case+0x1a5/0x480
[   15.013189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.013373]  kthread+0x337/0x6f0
[   15.013515]  ret_from_fork+0x116/0x1d0
[   15.013870]  ret_from_fork_asm+0x1a/0x30
[   15.014089] 
[   15.014190] The buggy address belongs to the object at ffff8881025a0d80
[   15.014190]  which belongs to the cache kmalloc-64 of size 64
[   15.014836] The buggy address is located 0 bytes to the right of
[   15.014836]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.015381] 
[   15.015483] The buggy address belongs to the physical page:
[   15.015768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.016110] flags: 0x200000000000000(node=0|zone=2)
[   15.016404] page_type: f5(slab)
[   15.016626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.016878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.017109] page dumped because: kasan: bad access detected
[   15.017305] 
[   15.017418] Memory state around the buggy address:
[   15.017741]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.018142]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.018575] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.018796]                                      ^
[   15.018954]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.019320]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.019681] ==================================================================
[   14.006461] ==================================================================
[   14.007105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.007726] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.008184] 
[   14.008321] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.008364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.008387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.008412] Call Trace:
[   14.008430]  <TASK>
[   14.008447]  dump_stack_lvl+0x73/0xb0
[   14.008475]  print_report+0xd1/0x650
[   14.008499]  ? __virt_addr_valid+0x1db/0x2d0
[   14.008522]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.008543]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.008565]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.008598]  kasan_report+0x141/0x180
[   14.008620]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.008647]  __asan_report_load4_noabort+0x18/0x20
[   14.008672]  kasan_atomics_helper+0x4b54/0x5450
[   14.008695]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.008717]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.008743]  ? kasan_atomics+0x152/0x310
[   14.008770]  kasan_atomics+0x1dc/0x310
[   14.008792]  ? __pfx_kasan_atomics+0x10/0x10
[   14.008815]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.008840]  ? __pfx_read_tsc+0x10/0x10
[   14.008862]  ? ktime_get_ts64+0x86/0x230
[   14.008885]  kunit_try_run_case+0x1a5/0x480
[   14.008911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.008935]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.008958]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.008981]  ? __kthread_parkme+0x82/0x180
[   14.009001]  ? preempt_count_sub+0x50/0x80
[   14.009026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.009050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.009073]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.009097]  kthread+0x337/0x6f0
[   14.009116]  ? trace_preempt_on+0x20/0xc0
[   14.009141]  ? __pfx_kthread+0x10/0x10
[   14.009163]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.009185]  ? calculate_sigpending+0x7b/0xa0
[   14.009209]  ? __pfx_kthread+0x10/0x10
[   14.009232]  ret_from_fork+0x116/0x1d0
[   14.009251]  ? __pfx_kthread+0x10/0x10
[   14.009271]  ret_from_fork_asm+0x1a/0x30
[   14.009302]  </TASK>
[   14.009314] 
[   14.021808] Allocated by task 282:
[   14.021944]  kasan_save_stack+0x45/0x70
[   14.022096]  kasan_save_track+0x18/0x40
[   14.022271]  kasan_save_alloc_info+0x3b/0x50
[   14.022474]  __kasan_kmalloc+0xb7/0xc0
[   14.022655]  __kmalloc_cache_noprof+0x189/0x420
[   14.022835]  kasan_atomics+0x95/0x310
[   14.023049]  kunit_try_run_case+0x1a5/0x480
[   14.023351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.023546]  kthread+0x337/0x6f0
[   14.023726]  ret_from_fork+0x116/0x1d0
[   14.023907]  ret_from_fork_asm+0x1a/0x30
[   14.024049] 
[   14.024122] The buggy address belongs to the object at ffff8881025a0d80
[   14.024122]  which belongs to the cache kmalloc-64 of size 64
[   14.024712] The buggy address is located 0 bytes to the right of
[   14.024712]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.025476] 
[   14.025554] The buggy address belongs to the physical page:
[   14.025917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.026257] flags: 0x200000000000000(node=0|zone=2)
[   14.026500] page_type: f5(slab)
[   14.026757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.027058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.027386] page dumped because: kasan: bad access detected
[   14.027682] 
[   14.027772] Memory state around the buggy address:
[   14.027960]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.028180]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.028498] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.028815]                                      ^
[   14.029085]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.029390]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.029606] ==================================================================
[   15.322902] ==================================================================
[   15.323283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.323681] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.324005] 
[   15.324093] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.324134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.324147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.324168] Call Trace:
[   15.324185]  <TASK>
[   15.324203]  dump_stack_lvl+0x73/0xb0
[   15.324230]  print_report+0xd1/0x650
[   15.324254]  ? __virt_addr_valid+0x1db/0x2d0
[   15.324276]  ? kasan_atomics_helper+0x5115/0x5450
[   15.324297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.324410]  ? kasan_atomics_helper+0x5115/0x5450
[   15.324436]  kasan_report+0x141/0x180
[   15.324459]  ? kasan_atomics_helper+0x5115/0x5450
[   15.324485]  __asan_report_load8_noabort+0x18/0x20
[   15.324510]  kasan_atomics_helper+0x5115/0x5450
[   15.324532]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.324555]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.324580]  ? kasan_atomics+0x152/0x310
[   15.324606]  kasan_atomics+0x1dc/0x310
[   15.324654]  ? __pfx_kasan_atomics+0x10/0x10
[   15.324722]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.324793]  ? __pfx_read_tsc+0x10/0x10
[   15.324881]  ? ktime_get_ts64+0x86/0x230
[   15.324971]  kunit_try_run_case+0x1a5/0x480
[   15.324997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.325019]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.325041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.325065]  ? __kthread_parkme+0x82/0x180
[   15.325086]  ? preempt_count_sub+0x50/0x80
[   15.325110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.325134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.325157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.325181]  kthread+0x337/0x6f0
[   15.325200]  ? trace_preempt_on+0x20/0xc0
[   15.325224]  ? __pfx_kthread+0x10/0x10
[   15.325245]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.325267]  ? calculate_sigpending+0x7b/0xa0
[   15.325290]  ? __pfx_kthread+0x10/0x10
[   15.325312]  ret_from_fork+0x116/0x1d0
[   15.325331]  ? __pfx_kthread+0x10/0x10
[   15.325352]  ret_from_fork_asm+0x1a/0x30
[   15.325391]  </TASK>
[   15.325403] 
[   15.333339] Allocated by task 282:
[   15.333559]  kasan_save_stack+0x45/0x70
[   15.333796]  kasan_save_track+0x18/0x40
[   15.333980]  kasan_save_alloc_info+0x3b/0x50
[   15.334124]  __kasan_kmalloc+0xb7/0xc0
[   15.334251]  __kmalloc_cache_noprof+0x189/0x420
[   15.334449]  kasan_atomics+0x95/0x310
[   15.334599]  kunit_try_run_case+0x1a5/0x480
[   15.334807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.335042]  kthread+0x337/0x6f0
[   15.335158]  ret_from_fork+0x116/0x1d0
[   15.335286]  ret_from_fork_asm+0x1a/0x30
[   15.335429] 
[   15.335498] The buggy address belongs to the object at ffff8881025a0d80
[   15.335498]  which belongs to the cache kmalloc-64 of size 64
[   15.335998] The buggy address is located 0 bytes to the right of
[   15.335998]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.336548] 
[   15.336668] The buggy address belongs to the physical page:
[   15.336913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.337180] flags: 0x200000000000000(node=0|zone=2)
[   15.337338] page_type: f5(slab)
[   15.337506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.337869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.338157] page dumped because: kasan: bad access detected
[   15.338323] 
[   15.339497] Memory state around the buggy address:
[   15.340028]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.340938]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.341736] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.342122]                                      ^
[   15.342288]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.342806]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.343414] ==================================================================
[   14.385965] ==================================================================
[   14.386304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.386646] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.386970] 
[   14.387081] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.387124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.387136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.387159] Call Trace:
[   14.387173]  <TASK>
[   14.387190]  dump_stack_lvl+0x73/0xb0
[   14.387280]  print_report+0xd1/0x650
[   14.387317]  ? __virt_addr_valid+0x1db/0x2d0
[   14.387355]  ? kasan_atomics_helper+0xde0/0x5450
[   14.387399]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.387438]  ? kasan_atomics_helper+0xde0/0x5450
[   14.387473]  kasan_report+0x141/0x180
[   14.387521]  ? kasan_atomics_helper+0xde0/0x5450
[   14.387588]  kasan_check_range+0x10c/0x1c0
[   14.387627]  __kasan_check_write+0x18/0x20
[   14.387660]  kasan_atomics_helper+0xde0/0x5450
[   14.387710]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.387748]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.387800]  ? kasan_atomics+0x152/0x310
[   14.387840]  kasan_atomics+0x1dc/0x310
[   14.387891]  ? __pfx_kasan_atomics+0x10/0x10
[   14.387940]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.387975]  ? __pfx_read_tsc+0x10/0x10
[   14.388009]  ? ktime_get_ts64+0x86/0x230
[   14.388034]  kunit_try_run_case+0x1a5/0x480
[   14.388060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.388094]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.388116]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.388140]  ? __kthread_parkme+0x82/0x180
[   14.388162]  ? preempt_count_sub+0x50/0x80
[   14.388187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.388211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.388234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.388258]  kthread+0x337/0x6f0
[   14.388278]  ? trace_preempt_on+0x20/0xc0
[   14.388303]  ? __pfx_kthread+0x10/0x10
[   14.388325]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.388347]  ? calculate_sigpending+0x7b/0xa0
[   14.388371]  ? __pfx_kthread+0x10/0x10
[   14.388407]  ret_from_fork+0x116/0x1d0
[   14.388425]  ? __pfx_kthread+0x10/0x10
[   14.388446]  ret_from_fork_asm+0x1a/0x30
[   14.388477]  </TASK>
[   14.388489] 
[   14.397328] Allocated by task 282:
[   14.397520]  kasan_save_stack+0x45/0x70
[   14.397780]  kasan_save_track+0x18/0x40
[   14.398031]  kasan_save_alloc_info+0x3b/0x50
[   14.398339]  __kasan_kmalloc+0xb7/0xc0
[   14.398588]  __kmalloc_cache_noprof+0x189/0x420
[   14.398839]  kasan_atomics+0x95/0x310
[   14.399144]  kunit_try_run_case+0x1a5/0x480
[   14.399324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.399641]  kthread+0x337/0x6f0
[   14.399805]  ret_from_fork+0x116/0x1d0
[   14.400089]  ret_from_fork_asm+0x1a/0x30
[   14.400329] 
[   14.400480] The buggy address belongs to the object at ffff8881025a0d80
[   14.400480]  which belongs to the cache kmalloc-64 of size 64
[   14.401073] The buggy address is located 0 bytes to the right of
[   14.401073]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.401724] 
[   14.401870] The buggy address belongs to the physical page:
[   14.402098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.402506] flags: 0x200000000000000(node=0|zone=2)
[   14.402783] page_type: f5(slab)
[   14.403097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.403453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.403785] page dumped because: kasan: bad access detected
[   14.404078] 
[   14.404183] Memory state around the buggy address:
[   14.404426]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.404803]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.405273] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.405638]                                      ^
[   14.405891]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.406294]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.406707] ==================================================================
[   13.893915] ==================================================================
[   13.894905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.895949] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   13.896449] 
[   13.896546] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.896644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.896657] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.896681] Call Trace:
[   13.896694]  <TASK>
[   13.896713]  dump_stack_lvl+0x73/0xb0
[   13.896744]  print_report+0xd1/0x650
[   13.896768]  ? __virt_addr_valid+0x1db/0x2d0
[   13.896790]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.896812]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.896834]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.896856]  kasan_report+0x141/0x180
[   13.896878]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.896904]  __asan_report_load4_noabort+0x18/0x20
[   13.896976]  kasan_atomics_helper+0x4bbc/0x5450
[   13.897002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.897023]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.897048]  ? kasan_atomics+0x152/0x310
[   13.897075]  kasan_atomics+0x1dc/0x310
[   13.897099]  ? __pfx_kasan_atomics+0x10/0x10
[   13.897119]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   13.897146]  ? __pfx_read_tsc+0x10/0x10
[   13.897167]  ? ktime_get_ts64+0x86/0x230
[   13.897193]  kunit_try_run_case+0x1a5/0x480
[   13.897217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.897238]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.897261]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.897282]  ? __kthread_parkme+0x82/0x180
[   13.897303]  ? preempt_count_sub+0x50/0x80
[   13.897328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.897352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.897387]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.897411]  kthread+0x337/0x6f0
[   13.897429]  ? trace_preempt_on+0x20/0xc0
[   13.897453]  ? __pfx_kthread+0x10/0x10
[   13.897474]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.897495]  ? calculate_sigpending+0x7b/0xa0
[   13.897519]  ? __pfx_kthread+0x10/0x10
[   13.897539]  ret_from_fork+0x116/0x1d0
[   13.897557]  ? __pfx_kthread+0x10/0x10
[   13.897577]  ret_from_fork_asm+0x1a/0x30
[   13.897608]  </TASK>
[   13.897620] 
[   13.911917] Allocated by task 282:
[   13.912317]  kasan_save_stack+0x45/0x70
[   13.912748]  kasan_save_track+0x18/0x40
[   13.912984]  kasan_save_alloc_info+0x3b/0x50
[   13.913146]  __kasan_kmalloc+0xb7/0xc0
[   13.913280]  __kmalloc_cache_noprof+0x189/0x420
[   13.913450]  kasan_atomics+0x95/0x310
[   13.913597]  kunit_try_run_case+0x1a5/0x480
[   13.913788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.913996]  kthread+0x337/0x6f0
[   13.914237]  ret_from_fork+0x116/0x1d0
[   13.914404]  ret_from_fork_asm+0x1a/0x30
[   13.914612] 
[   13.914698] The buggy address belongs to the object at ffff8881025a0d80
[   13.914698]  which belongs to the cache kmalloc-64 of size 64
[   13.915231] The buggy address is located 0 bytes to the right of
[   13.915231]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   13.915983] 
[   13.916101] The buggy address belongs to the physical page:
[   13.916328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   13.916784] flags: 0x200000000000000(node=0|zone=2)
[   13.917060] page_type: f5(slab)
[   13.917188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.917543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.917829] page dumped because: kasan: bad access detected
[   13.918164] 
[   13.918263] Memory state around the buggy address:
[   13.918434]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.918722]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.919220] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.919536]                                      ^
[   13.919776]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.920167]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.920458] ==================================================================
[   14.472190] ==================================================================
[   14.472480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.473848] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.474387] 
[   14.474487] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.474531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.474545] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.474567] Call Trace:
[   14.474581]  <TASK>
[   14.474599]  dump_stack_lvl+0x73/0xb0
[   14.474628]  print_report+0xd1/0x650
[   14.474652]  ? __virt_addr_valid+0x1db/0x2d0
[   14.474676]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.474697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.474720]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.474742]  kasan_report+0x141/0x180
[   14.474765]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.474791]  __asan_report_load4_noabort+0x18/0x20
[   14.474816]  kasan_atomics_helper+0x4a36/0x5450
[   14.474839]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.474861]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.474886]  ? kasan_atomics+0x152/0x310
[   14.474914]  kasan_atomics+0x1dc/0x310
[   14.474957]  ? __pfx_kasan_atomics+0x10/0x10
[   14.474980]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.475013]  ? __pfx_read_tsc+0x10/0x10
[   14.475035]  ? ktime_get_ts64+0x86/0x230
[   14.475062]  kunit_try_run_case+0x1a5/0x480
[   14.475086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475109]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.475131]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.475154]  ? __kthread_parkme+0x82/0x180
[   14.475175]  ? preempt_count_sub+0x50/0x80
[   14.475200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.475248]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.475272]  kthread+0x337/0x6f0
[   14.475292]  ? trace_preempt_on+0x20/0xc0
[   14.475317]  ? __pfx_kthread+0x10/0x10
[   14.475339]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.475360]  ? calculate_sigpending+0x7b/0xa0
[   14.475412]  ? __pfx_kthread+0x10/0x10
[   14.475434]  ret_from_fork+0x116/0x1d0
[   14.475454]  ? __pfx_kthread+0x10/0x10
[   14.475475]  ret_from_fork_asm+0x1a/0x30
[   14.475506]  </TASK>
[   14.475518] 
[   14.484124] Allocated by task 282:
[   14.484421]  kasan_save_stack+0x45/0x70
[   14.484771]  kasan_save_track+0x18/0x40
[   14.485002]  kasan_save_alloc_info+0x3b/0x50
[   14.485158]  __kasan_kmalloc+0xb7/0xc0
[   14.485293]  __kmalloc_cache_noprof+0x189/0x420
[   14.485460]  kasan_atomics+0x95/0x310
[   14.485593]  kunit_try_run_case+0x1a5/0x480
[   14.485746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.486178]  kthread+0x337/0x6f0
[   14.486347]  ret_from_fork+0x116/0x1d0
[   14.486685]  ret_from_fork_asm+0x1a/0x30
[   14.487047] 
[   14.487143] The buggy address belongs to the object at ffff8881025a0d80
[   14.487143]  which belongs to the cache kmalloc-64 of size 64
[   14.487571] The buggy address is located 0 bytes to the right of
[   14.487571]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.488102] 
[   14.488221] The buggy address belongs to the physical page:
[   14.488427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.488909] flags: 0x200000000000000(node=0|zone=2)
[   14.489132] page_type: f5(slab)
[   14.489267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.489627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.489869] page dumped because: kasan: bad access detected
[   14.490042] 
[   14.490112] Memory state around the buggy address:
[   14.490266]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.490512]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.491209] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.491710]                                      ^
[   14.492072]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.492407]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.492618] ==================================================================
[   14.853613] ==================================================================
[   14.854049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.854476] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.854830] 
[   14.854918] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.854963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.854976] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.855000] Call Trace:
[   14.855015]  <TASK>
[   14.855030]  dump_stack_lvl+0x73/0xb0
[   14.855057]  print_report+0xd1/0x650
[   14.855083]  ? __virt_addr_valid+0x1db/0x2d0
[   14.855106]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.855128]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.855152]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.855174]  kasan_report+0x141/0x180
[   14.855198]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.855224]  kasan_check_range+0x10c/0x1c0
[   14.855249]  __kasan_check_write+0x18/0x20
[   14.855270]  kasan_atomics_helper+0x16e7/0x5450
[   14.855294]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.855318]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.855344]  ? kasan_atomics+0x152/0x310
[   14.855372]  kasan_atomics+0x1dc/0x310
[   14.855407]  ? __pfx_kasan_atomics+0x10/0x10
[   14.855430]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.855458]  ? __pfx_read_tsc+0x10/0x10
[   14.855480]  ? ktime_get_ts64+0x86/0x230
[   14.855505]  kunit_try_run_case+0x1a5/0x480
[   14.855531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.855554]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.855586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.855632]  ? __kthread_parkme+0x82/0x180
[   14.855655]  ? preempt_count_sub+0x50/0x80
[   14.855694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.855720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.855758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.855794]  kthread+0x337/0x6f0
[   14.855815]  ? trace_preempt_on+0x20/0xc0
[   14.855854]  ? __pfx_kthread+0x10/0x10
[   14.855890]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.855925]  ? calculate_sigpending+0x7b/0xa0
[   14.855962]  ? __pfx_kthread+0x10/0x10
[   14.855997]  ret_from_fork+0x116/0x1d0
[   14.856016]  ? __pfx_kthread+0x10/0x10
[   14.856036]  ret_from_fork_asm+0x1a/0x30
[   14.856067]  </TASK>
[   14.856078] 
[   14.864024] Allocated by task 282:
[   14.864210]  kasan_save_stack+0x45/0x70
[   14.864449]  kasan_save_track+0x18/0x40
[   14.864726]  kasan_save_alloc_info+0x3b/0x50
[   14.864936]  __kasan_kmalloc+0xb7/0xc0
[   14.865137]  __kmalloc_cache_noprof+0x189/0x420
[   14.865371]  kasan_atomics+0x95/0x310
[   14.865636]  kunit_try_run_case+0x1a5/0x480
[   14.865841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.866050]  kthread+0x337/0x6f0
[   14.866167]  ret_from_fork+0x116/0x1d0
[   14.866296]  ret_from_fork_asm+0x1a/0x30
[   14.866469] 
[   14.866566] The buggy address belongs to the object at ffff8881025a0d80
[   14.866566]  which belongs to the cache kmalloc-64 of size 64
[   14.867131] The buggy address is located 0 bytes to the right of
[   14.867131]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.867678] 
[   14.867794] The buggy address belongs to the physical page:
[   14.868014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.868411] flags: 0x200000000000000(node=0|zone=2)
[   14.868739] page_type: f5(slab)
[   14.868905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.869231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.869562] page dumped because: kasan: bad access detected
[   14.870214] 
[   14.870356] Memory state around the buggy address:
[   14.870527]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.871178]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.871512] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.872089]                                      ^
[   14.872724]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.873430]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.874120] ==================================================================
[   14.198425] ==================================================================
[   14.198834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.199293] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.199666] 
[   14.199808] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.199854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.199879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.199900] Call Trace:
[   14.199956]  <TASK>
[   14.199972]  dump_stack_lvl+0x73/0xb0
[   14.200001]  print_report+0xd1/0x650
[   14.200037]  ? __virt_addr_valid+0x1db/0x2d0
[   14.200061]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.200082]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.200105]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.200127]  kasan_report+0x141/0x180
[   14.200150]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.200176]  kasan_check_range+0x10c/0x1c0
[   14.200200]  __kasan_check_write+0x18/0x20
[   14.200220]  kasan_atomics_helper+0x8f9/0x5450
[   14.200243]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.200292]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.200319]  ? kasan_atomics+0x152/0x310
[   14.200347]  kasan_atomics+0x1dc/0x310
[   14.200388]  ? __pfx_kasan_atomics+0x10/0x10
[   14.200414]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.200466]  ? __pfx_read_tsc+0x10/0x10
[   14.200489]  ? ktime_get_ts64+0x86/0x230
[   14.200513]  kunit_try_run_case+0x1a5/0x480
[   14.200548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.200613]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.200636]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.200677]  ? __kthread_parkme+0x82/0x180
[   14.200708]  ? preempt_count_sub+0x50/0x80
[   14.200731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.200755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.200778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.200802]  kthread+0x337/0x6f0
[   14.200822]  ? trace_preempt_on+0x20/0xc0
[   14.200869]  ? __pfx_kthread+0x10/0x10
[   14.200891]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.200952]  ? calculate_sigpending+0x7b/0xa0
[   14.200976]  ? __pfx_kthread+0x10/0x10
[   14.200998]  ret_from_fork+0x116/0x1d0
[   14.201017]  ? __pfx_kthread+0x10/0x10
[   14.201038]  ret_from_fork_asm+0x1a/0x30
[   14.201086]  </TASK>
[   14.201097] 
[   14.209973] Allocated by task 282:
[   14.210287]  kasan_save_stack+0x45/0x70
[   14.210508]  kasan_save_track+0x18/0x40
[   14.210709]  kasan_save_alloc_info+0x3b/0x50
[   14.210859]  __kasan_kmalloc+0xb7/0xc0
[   14.211015]  __kmalloc_cache_noprof+0x189/0x420
[   14.211215]  kasan_atomics+0x95/0x310
[   14.211485]  kunit_try_run_case+0x1a5/0x480
[   14.211804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.212257]  kthread+0x337/0x6f0
[   14.212452]  ret_from_fork+0x116/0x1d0
[   14.212661]  ret_from_fork_asm+0x1a/0x30
[   14.212876] 
[   14.212994] The buggy address belongs to the object at ffff8881025a0d80
[   14.212994]  which belongs to the cache kmalloc-64 of size 64
[   14.213549] The buggy address is located 0 bytes to the right of
[   14.213549]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.214340] 
[   14.214427] The buggy address belongs to the physical page:
[   14.214730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.215178] flags: 0x200000000000000(node=0|zone=2)
[   14.215426] page_type: f5(slab)
[   14.215613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.216017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.216331] page dumped because: kasan: bad access detected
[   14.216618] 
[   14.216751] Memory state around the buggy address:
[   14.217044]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.217321]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.217545] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.217937]                                      ^
[   14.218268]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.218673]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.219125] ==================================================================
[   14.874664] ==================================================================
[   14.875519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.876186] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.877092] 
[   14.877339] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.877435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.877451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.877474] Call Trace:
[   14.877489]  <TASK>
[   14.877506]  dump_stack_lvl+0x73/0xb0
[   14.877536]  print_report+0xd1/0x650
[   14.877562]  ? __virt_addr_valid+0x1db/0x2d0
[   14.877598]  ? kasan_atomics_helper+0x177f/0x5450
[   14.877620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.877643]  ? kasan_atomics_helper+0x177f/0x5450
[   14.877666]  kasan_report+0x141/0x180
[   14.877690]  ? kasan_atomics_helper+0x177f/0x5450
[   14.877717]  kasan_check_range+0x10c/0x1c0
[   14.877741]  __kasan_check_write+0x18/0x20
[   14.877761]  kasan_atomics_helper+0x177f/0x5450
[   14.877785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.877808]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.877834]  ? kasan_atomics+0x152/0x310
[   14.877862]  kasan_atomics+0x1dc/0x310
[   14.877886]  ? __pfx_kasan_atomics+0x10/0x10
[   14.877908]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.877936]  ? __pfx_read_tsc+0x10/0x10
[   14.877957]  ? ktime_get_ts64+0x86/0x230
[   14.877982]  kunit_try_run_case+0x1a5/0x480
[   14.878007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.878030]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.878053]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.878077]  ? __kthread_parkme+0x82/0x180
[   14.878099]  ? preempt_count_sub+0x50/0x80
[   14.878123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.878147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.878171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.878196]  kthread+0x337/0x6f0
[   14.878217]  ? trace_preempt_on+0x20/0xc0
[   14.878243]  ? __pfx_kthread+0x10/0x10
[   14.878264]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.878286]  ? calculate_sigpending+0x7b/0xa0
[   14.878310]  ? __pfx_kthread+0x10/0x10
[   14.878332]  ret_from_fork+0x116/0x1d0
[   14.878351]  ? __pfx_kthread+0x10/0x10
[   14.878372]  ret_from_fork_asm+0x1a/0x30
[   14.878414]  </TASK>
[   14.878425] 
[   14.886506] Allocated by task 282:
[   14.886693]  kasan_save_stack+0x45/0x70
[   14.886838]  kasan_save_track+0x18/0x40
[   14.886968]  kasan_save_alloc_info+0x3b/0x50
[   14.887149]  __kasan_kmalloc+0xb7/0xc0
[   14.887280]  __kmalloc_cache_noprof+0x189/0x420
[   14.887441]  kasan_atomics+0x95/0x310
[   14.887681]  kunit_try_run_case+0x1a5/0x480
[   14.887886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.888142]  kthread+0x337/0x6f0
[   14.888314]  ret_from_fork+0x116/0x1d0
[   14.888519]  ret_from_fork_asm+0x1a/0x30
[   14.888666] 
[   14.888736] The buggy address belongs to the object at ffff8881025a0d80
[   14.888736]  which belongs to the cache kmalloc-64 of size 64
[   14.889429] The buggy address is located 0 bytes to the right of
[   14.889429]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.890079] 
[   14.890154] The buggy address belongs to the physical page:
[   14.890322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.890564] flags: 0x200000000000000(node=0|zone=2)
[   14.890724] page_type: f5(slab)
[   14.890841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.891121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.891487] page dumped because: kasan: bad access detected
[   14.891737] 
[   14.891832] Memory state around the buggy address:
[   14.892056]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.892391]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.892767] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.893098]                                      ^
[   14.893302]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.893613]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.893873] ==================================================================
[   13.939558] ==================================================================
[   13.939891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.940251] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   13.940491] 
[   13.940574] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.940615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.940626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.940646] Call Trace:
[   13.940659]  <TASK>
[   13.940674]  dump_stack_lvl+0x73/0xb0
[   13.940699]  print_report+0xd1/0x650
[   13.940721]  ? __virt_addr_valid+0x1db/0x2d0
[   13.940743]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.940763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.940784]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.940805]  kasan_report+0x141/0x180
[   13.940825]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.940851]  __asan_report_load4_noabort+0x18/0x20
[   13.940874]  kasan_atomics_helper+0x4b88/0x5450
[   13.940896]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.940916]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.940941]  ? kasan_atomics+0x152/0x310
[   13.940967]  kasan_atomics+0x1dc/0x310
[   13.941162]  ? __pfx_kasan_atomics+0x10/0x10
[   13.941186]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   13.941212]  ? __pfx_read_tsc+0x10/0x10
[   13.941233]  ? ktime_get_ts64+0x86/0x230
[   13.941256]  kunit_try_run_case+0x1a5/0x480
[   13.941278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.941301]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.941323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.941345]  ? __kthread_parkme+0x82/0x180
[   13.941365]  ? preempt_count_sub+0x50/0x80
[   13.941402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.941425]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.941447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.941469]  kthread+0x337/0x6f0
[   13.941488]  ? trace_preempt_on+0x20/0xc0
[   13.941510]  ? __pfx_kthread+0x10/0x10
[   13.941530]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.941550]  ? calculate_sigpending+0x7b/0xa0
[   13.941583]  ? __pfx_kthread+0x10/0x10
[   13.941604]  ret_from_fork+0x116/0x1d0
[   13.941622]  ? __pfx_kthread+0x10/0x10
[   13.941642]  ret_from_fork_asm+0x1a/0x30
[   13.941671]  </TASK>
[   13.941683] 
[   13.950183] Allocated by task 282:
[   13.950355]  kasan_save_stack+0x45/0x70
[   13.950568]  kasan_save_track+0x18/0x40
[   13.951104]  kasan_save_alloc_info+0x3b/0x50
[   13.951415]  __kasan_kmalloc+0xb7/0xc0
[   13.951577]  __kmalloc_cache_noprof+0x189/0x420
[   13.951734]  kasan_atomics+0x95/0x310
[   13.952158]  kunit_try_run_case+0x1a5/0x480
[   13.952388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.952644]  kthread+0x337/0x6f0
[   13.952794]  ret_from_fork+0x116/0x1d0
[   13.952927]  ret_from_fork_asm+0x1a/0x30
[   13.953067] 
[   13.953138] The buggy address belongs to the object at ffff8881025a0d80
[   13.953138]  which belongs to the cache kmalloc-64 of size 64
[   13.954299] The buggy address is located 0 bytes to the right of
[   13.954299]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   13.954823] 
[   13.954900] The buggy address belongs to the physical page:
[   13.955075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   13.955472] flags: 0x200000000000000(node=0|zone=2)
[   13.955954] page_type: f5(slab)
[   13.956131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.956505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.956762] page dumped because: kasan: bad access detected
[   13.956957] 
[   13.957104] Memory state around the buggy address:
[   13.957330]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.957676]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.958151] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.958449]                                      ^
[   13.958700]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.958921]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.959242] ==================================================================
[   15.060912] ==================================================================
[   15.061523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.061914] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.062255] 
[   15.062448] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.062491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.062516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.062537] Call Trace:
[   15.062553]  <TASK>
[   15.062570]  dump_stack_lvl+0x73/0xb0
[   15.062598]  print_report+0xd1/0x650
[   15.062622]  ? __virt_addr_valid+0x1db/0x2d0
[   15.062645]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.062667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.062721]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.062755]  kasan_report+0x141/0x180
[   15.062815]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.062853]  kasan_check_range+0x10c/0x1c0
[   15.062888]  __kasan_check_write+0x18/0x20
[   15.062908]  kasan_atomics_helper+0x1ce1/0x5450
[   15.062931]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.062954]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.062979]  ? kasan_atomics+0x152/0x310
[   15.063007]  kasan_atomics+0x1dc/0x310
[   15.063029]  ? __pfx_kasan_atomics+0x10/0x10
[   15.063052]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.063078]  ? __pfx_read_tsc+0x10/0x10
[   15.063100]  ? ktime_get_ts64+0x86/0x230
[   15.063125]  kunit_try_run_case+0x1a5/0x480
[   15.063150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.063172]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.063196]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.063219]  ? __kthread_parkme+0x82/0x180
[   15.063240]  ? preempt_count_sub+0x50/0x80
[   15.063264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.063289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.063341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.063366]  kthread+0x337/0x6f0
[   15.063400]  ? trace_preempt_on+0x20/0xc0
[   15.063451]  ? __pfx_kthread+0x10/0x10
[   15.063473]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.063496]  ? calculate_sigpending+0x7b/0xa0
[   15.063531]  ? __pfx_kthread+0x10/0x10
[   15.063553]  ret_from_fork+0x116/0x1d0
[   15.063583]  ? __pfx_kthread+0x10/0x10
[   15.063604]  ret_from_fork_asm+0x1a/0x30
[   15.063635]  </TASK>
[   15.063647] 
[   15.072110] Allocated by task 282:
[   15.072364]  kasan_save_stack+0x45/0x70
[   15.072589]  kasan_save_track+0x18/0x40
[   15.072788]  kasan_save_alloc_info+0x3b/0x50
[   15.072980]  __kasan_kmalloc+0xb7/0xc0
[   15.073157]  __kmalloc_cache_noprof+0x189/0x420
[   15.073352]  kasan_atomics+0x95/0x310
[   15.073537]  kunit_try_run_case+0x1a5/0x480
[   15.073801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.074063]  kthread+0x337/0x6f0
[   15.074214]  ret_from_fork+0x116/0x1d0
[   15.074439]  ret_from_fork_asm+0x1a/0x30
[   15.074739] 
[   15.074818] The buggy address belongs to the object at ffff8881025a0d80
[   15.074818]  which belongs to the cache kmalloc-64 of size 64
[   15.075270] The buggy address is located 0 bytes to the right of
[   15.075270]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.075693] 
[   15.075791] The buggy address belongs to the physical page:
[   15.076049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.076437] flags: 0x200000000000000(node=0|zone=2)
[   15.076797] page_type: f5(slab)
[   15.077029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.077275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.077512] page dumped because: kasan: bad access detected
[   15.077686] 
[   15.077791] Memory state around the buggy address:
[   15.078048]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.078401]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.078728] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.079055]                                      ^
[   15.079293]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.079763]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.080045] ==================================================================
[   15.138962] ==================================================================
[   15.139393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.139841] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.140214] 
[   15.140358] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.140421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.140434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.140458] Call Trace:
[   15.140473]  <TASK>
[   15.140492]  dump_stack_lvl+0x73/0xb0
[   15.140523]  print_report+0xd1/0x650
[   15.140547]  ? __virt_addr_valid+0x1db/0x2d0
[   15.140570]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.140592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.140614]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.140636]  kasan_report+0x141/0x180
[   15.140658]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.140684]  kasan_check_range+0x10c/0x1c0
[   15.140720]  __kasan_check_write+0x18/0x20
[   15.140741]  kasan_atomics_helper+0x1f43/0x5450
[   15.140775]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.140798]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.140824]  ? kasan_atomics+0x152/0x310
[   15.140861]  kasan_atomics+0x1dc/0x310
[   15.140884]  ? __pfx_kasan_atomics+0x10/0x10
[   15.140906]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.140933]  ? __pfx_read_tsc+0x10/0x10
[   15.140955]  ? ktime_get_ts64+0x86/0x230
[   15.140981]  kunit_try_run_case+0x1a5/0x480
[   15.141005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.141037]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.141060]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.141082]  ? __kthread_parkme+0x82/0x180
[   15.141114]  ? preempt_count_sub+0x50/0x80
[   15.141138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.141162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.141186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.141210]  kthread+0x337/0x6f0
[   15.141230]  ? trace_preempt_on+0x20/0xc0
[   15.141255]  ? __pfx_kthread+0x10/0x10
[   15.141276]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.141298]  ? calculate_sigpending+0x7b/0xa0
[   15.141322]  ? __pfx_kthread+0x10/0x10
[   15.141343]  ret_from_fork+0x116/0x1d0
[   15.141362]  ? __pfx_kthread+0x10/0x10
[   15.141392]  ret_from_fork_asm+0x1a/0x30
[   15.141423]  </TASK>
[   15.141435] 
[   15.151463] Allocated by task 282:
[   15.151669]  kasan_save_stack+0x45/0x70
[   15.152047]  kasan_save_track+0x18/0x40
[   15.152400]  kasan_save_alloc_info+0x3b/0x50
[   15.152887]  __kasan_kmalloc+0xb7/0xc0
[   15.153246]  __kmalloc_cache_noprof+0x189/0x420
[   15.153664]  kasan_atomics+0x95/0x310
[   15.154010]  kunit_try_run_case+0x1a5/0x480
[   15.154413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.155055]  kthread+0x337/0x6f0
[   15.155397]  ret_from_fork+0x116/0x1d0
[   15.155757]  ret_from_fork_asm+0x1a/0x30
[   15.156133] 
[   15.156313] The buggy address belongs to the object at ffff8881025a0d80
[   15.156313]  which belongs to the cache kmalloc-64 of size 64
[   15.157158] The buggy address is located 0 bytes to the right of
[   15.157158]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.157537] 
[   15.157631] The buggy address belongs to the physical page:
[   15.157901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.158572] flags: 0x200000000000000(node=0|zone=2)
[   15.159047] page_type: f5(slab)
[   15.159356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.159617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.160280] page dumped because: kasan: bad access detected
[   15.160896] 
[   15.161062] Memory state around the buggy address:
[   15.161485]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.161745]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.162326] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.162550]                                      ^
[   15.162993]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.163594]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.164228] ==================================================================
[   15.303468] ==================================================================
[   15.303938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.304212] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.304569] 
[   15.304752] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.304793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.304805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.304827] Call Trace:
[   15.304840]  <TASK>
[   15.304854]  dump_stack_lvl+0x73/0xb0
[   15.304881]  print_report+0xd1/0x650
[   15.304904]  ? __virt_addr_valid+0x1db/0x2d0
[   15.304927]  ? kasan_atomics_helper+0x224c/0x5450
[   15.304949]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.304970]  ? kasan_atomics_helper+0x224c/0x5450
[   15.304992]  kasan_report+0x141/0x180
[   15.305014]  ? kasan_atomics_helper+0x224c/0x5450
[   15.305041]  kasan_check_range+0x10c/0x1c0
[   15.305064]  __kasan_check_write+0x18/0x20
[   15.305084]  kasan_atomics_helper+0x224c/0x5450
[   15.305106]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.305128]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.305153]  ? kasan_atomics+0x152/0x310
[   15.305179]  kasan_atomics+0x1dc/0x310
[   15.305202]  ? __pfx_kasan_atomics+0x10/0x10
[   15.305225]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.305252]  ? __pfx_read_tsc+0x10/0x10
[   15.305272]  ? ktime_get_ts64+0x86/0x230
[   15.305296]  kunit_try_run_case+0x1a5/0x480
[   15.305345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.305370]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.305403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.305428]  ? __kthread_parkme+0x82/0x180
[   15.305449]  ? preempt_count_sub+0x50/0x80
[   15.305473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.305497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.305520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.305543]  kthread+0x337/0x6f0
[   15.305563]  ? trace_preempt_on+0x20/0xc0
[   15.305594]  ? __pfx_kthread+0x10/0x10
[   15.305615]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.305637]  ? calculate_sigpending+0x7b/0xa0
[   15.305660]  ? __pfx_kthread+0x10/0x10
[   15.305682]  ret_from_fork+0x116/0x1d0
[   15.305700]  ? __pfx_kthread+0x10/0x10
[   15.305721]  ret_from_fork_asm+0x1a/0x30
[   15.305751]  </TASK>
[   15.305762] 
[   15.314105] Allocated by task 282:
[   15.314329]  kasan_save_stack+0x45/0x70
[   15.314523]  kasan_save_track+0x18/0x40
[   15.314896]  kasan_save_alloc_info+0x3b/0x50
[   15.315129]  __kasan_kmalloc+0xb7/0xc0
[   15.315328]  __kmalloc_cache_noprof+0x189/0x420
[   15.315562]  kasan_atomics+0x95/0x310
[   15.315745]  kunit_try_run_case+0x1a5/0x480
[   15.315974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.316216]  kthread+0x337/0x6f0
[   15.316402]  ret_from_fork+0x116/0x1d0
[   15.316617]  ret_from_fork_asm+0x1a/0x30
[   15.316817] 
[   15.316894] The buggy address belongs to the object at ffff8881025a0d80
[   15.316894]  which belongs to the cache kmalloc-64 of size 64
[   15.317425] The buggy address is located 0 bytes to the right of
[   15.317425]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.317984] 
[   15.318110] The buggy address belongs to the physical page:
[   15.318305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.318555] flags: 0x200000000000000(node=0|zone=2)
[   15.318821] page_type: f5(slab)
[   15.318984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.319352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.319739] page dumped because: kasan: bad access detected
[   15.319998] 
[   15.320091] Memory state around the buggy address:
[   15.320314]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.320548]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.320805] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.321168]                                      ^
[   15.321456]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.321987]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.322298] ==================================================================
[   15.184777] ==================================================================
[   15.185705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.186089] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.186451] 
[   15.186557] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.186603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.186616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.186637] Call Trace:
[   15.186664]  <TASK>
[   15.186682]  dump_stack_lvl+0x73/0xb0
[   15.186711]  print_report+0xd1/0x650
[   15.186747]  ? __virt_addr_valid+0x1db/0x2d0
[   15.186770]  ? kasan_atomics_helper+0x2006/0x5450
[   15.186791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.186814]  ? kasan_atomics_helper+0x2006/0x5450
[   15.186835]  kasan_report+0x141/0x180
[   15.186857]  ? kasan_atomics_helper+0x2006/0x5450
[   15.186884]  kasan_check_range+0x10c/0x1c0
[   15.186907]  __kasan_check_write+0x18/0x20
[   15.186926]  kasan_atomics_helper+0x2006/0x5450
[   15.186950]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.186972]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.186998]  ? kasan_atomics+0x152/0x310
[   15.187026]  kasan_atomics+0x1dc/0x310
[   15.187050]  ? __pfx_kasan_atomics+0x10/0x10
[   15.187081]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.187108]  ? __pfx_read_tsc+0x10/0x10
[   15.187140]  ? ktime_get_ts64+0x86/0x230
[   15.187166]  kunit_try_run_case+0x1a5/0x480
[   15.187191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.187214]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.187245]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.187269]  ? __kthread_parkme+0x82/0x180
[   15.187300]  ? preempt_count_sub+0x50/0x80
[   15.187325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.187349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.187389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.187413]  kthread+0x337/0x6f0
[   15.187433]  ? trace_preempt_on+0x20/0xc0
[   15.187467]  ? __pfx_kthread+0x10/0x10
[   15.187488]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.187510]  ? calculate_sigpending+0x7b/0xa0
[   15.187535]  ? __pfx_kthread+0x10/0x10
[   15.187557]  ret_from_fork+0x116/0x1d0
[   15.187586]  ? __pfx_kthread+0x10/0x10
[   15.187615]  ret_from_fork_asm+0x1a/0x30
[   15.187646]  </TASK>
[   15.187658] 
[   15.195298] Allocated by task 282:
[   15.195441]  kasan_save_stack+0x45/0x70
[   15.195593]  kasan_save_track+0x18/0x40
[   15.195770]  kasan_save_alloc_info+0x3b/0x50
[   15.196032]  __kasan_kmalloc+0xb7/0xc0
[   15.196241]  __kmalloc_cache_noprof+0x189/0x420
[   15.196473]  kasan_atomics+0x95/0x310
[   15.196760]  kunit_try_run_case+0x1a5/0x480
[   15.196967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.197213]  kthread+0x337/0x6f0
[   15.197389]  ret_from_fork+0x116/0x1d0
[   15.197585]  ret_from_fork_asm+0x1a/0x30
[   15.197782] 
[   15.197862] The buggy address belongs to the object at ffff8881025a0d80
[   15.197862]  which belongs to the cache kmalloc-64 of size 64
[   15.198211] The buggy address is located 0 bytes to the right of
[   15.198211]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.198804] 
[   15.198900] The buggy address belongs to the physical page:
[   15.199155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.199530] flags: 0x200000000000000(node=0|zone=2)
[   15.199838] page_type: f5(slab)
[   15.199997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.200237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.200474] page dumped because: kasan: bad access detected
[   15.200819] 
[   15.200933] Memory state around the buggy address:
[   15.201155]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.201458]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.201673] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.201886]                                      ^
[   15.202119]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.202460]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.203039] ==================================================================
[   15.166068] ==================================================================
[   15.166886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.167417] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.167801] 
[   15.167895] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.167941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.167954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.167976] Call Trace:
[   15.167995]  <TASK>
[   15.168014]  dump_stack_lvl+0x73/0xb0
[   15.168043]  print_report+0xd1/0x650
[   15.168068]  ? __virt_addr_valid+0x1db/0x2d0
[   15.168091]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.168112]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.168135]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.168156]  kasan_report+0x141/0x180
[   15.168178]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.168204]  __asan_report_load8_noabort+0x18/0x20
[   15.168229]  kasan_atomics_helper+0x4f71/0x5450
[   15.168251]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.168274]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.168300]  ? kasan_atomics+0x152/0x310
[   15.168328]  kasan_atomics+0x1dc/0x310
[   15.168351]  ? __pfx_kasan_atomics+0x10/0x10
[   15.168373]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.168415]  ? __pfx_read_tsc+0x10/0x10
[   15.168438]  ? ktime_get_ts64+0x86/0x230
[   15.168465]  kunit_try_run_case+0x1a5/0x480
[   15.168502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.168525]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.168548]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.168584]  ? __kthread_parkme+0x82/0x180
[   15.168606]  ? preempt_count_sub+0x50/0x80
[   15.168631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.168654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.168677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.168713]  kthread+0x337/0x6f0
[   15.168734]  ? trace_preempt_on+0x20/0xc0
[   15.168771]  ? __pfx_kthread+0x10/0x10
[   15.168792]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.168813]  ? calculate_sigpending+0x7b/0xa0
[   15.168838]  ? __pfx_kthread+0x10/0x10
[   15.168859]  ret_from_fork+0x116/0x1d0
[   15.168887]  ? __pfx_kthread+0x10/0x10
[   15.168908]  ret_from_fork_asm+0x1a/0x30
[   15.168939]  </TASK>
[   15.168961] 
[   15.176769] Allocated by task 282:
[   15.176965]  kasan_save_stack+0x45/0x70
[   15.177138]  kasan_save_track+0x18/0x40
[   15.177277]  kasan_save_alloc_info+0x3b/0x50
[   15.177469]  __kasan_kmalloc+0xb7/0xc0
[   15.177666]  __kmalloc_cache_noprof+0x189/0x420
[   15.177902]  kasan_atomics+0x95/0x310
[   15.178145]  kunit_try_run_case+0x1a5/0x480
[   15.178301]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.178570]  kthread+0x337/0x6f0
[   15.178760]  ret_from_fork+0x116/0x1d0
[   15.178926]  ret_from_fork_asm+0x1a/0x30
[   15.179071] 
[   15.179179] The buggy address belongs to the object at ffff8881025a0d80
[   15.179179]  which belongs to the cache kmalloc-64 of size 64
[   15.179720] The buggy address is located 0 bytes to the right of
[   15.179720]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.180238] 
[   15.180356] The buggy address belongs to the physical page:
[   15.180551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.180932] flags: 0x200000000000000(node=0|zone=2)
[   15.181148] page_type: f5(slab)
[   15.181340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.181746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.182026] page dumped because: kasan: bad access detected
[   15.182306] 
[   15.182406] Memory state around the buggy address:
[   15.182648]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.182934]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.183193] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.183415]                                      ^
[   15.183570]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.183784]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.184092] ==================================================================
[   14.219762] ==================================================================
[   14.220313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.220725] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.221095] 
[   14.221189] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.221232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.221246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.221267] Call Trace:
[   14.221281]  <TASK>
[   14.221296]  dump_stack_lvl+0x73/0xb0
[   14.221326]  print_report+0xd1/0x650
[   14.221349]  ? __virt_addr_valid+0x1db/0x2d0
[   14.221418]  ? kasan_atomics_helper+0x992/0x5450
[   14.221440]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.221491]  ? kasan_atomics_helper+0x992/0x5450
[   14.221513]  kasan_report+0x141/0x180
[   14.221594]  ? kasan_atomics_helper+0x992/0x5450
[   14.221631]  kasan_check_range+0x10c/0x1c0
[   14.221655]  __kasan_check_write+0x18/0x20
[   14.221675]  kasan_atomics_helper+0x992/0x5450
[   14.221697]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.221719]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.221746]  ? kasan_atomics+0x152/0x310
[   14.221773]  kasan_atomics+0x1dc/0x310
[   14.221796]  ? __pfx_kasan_atomics+0x10/0x10
[   14.221819]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.221869]  ? __pfx_read_tsc+0x10/0x10
[   14.221890]  ? ktime_get_ts64+0x86/0x230
[   14.222015]  kunit_try_run_case+0x1a5/0x480
[   14.222045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.222069]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.222104]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.222127]  ? __kthread_parkme+0x82/0x180
[   14.222176]  ? preempt_count_sub+0x50/0x80
[   14.222202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.222238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.222264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.222313]  kthread+0x337/0x6f0
[   14.222333]  ? trace_preempt_on+0x20/0xc0
[   14.222357]  ? __pfx_kthread+0x10/0x10
[   14.222393]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.222417]  ? calculate_sigpending+0x7b/0xa0
[   14.222440]  ? __pfx_kthread+0x10/0x10
[   14.222488]  ret_from_fork+0x116/0x1d0
[   14.222507]  ? __pfx_kthread+0x10/0x10
[   14.222528]  ret_from_fork_asm+0x1a/0x30
[   14.222583]  </TASK>
[   14.222596] 
[   14.232501] Allocated by task 282:
[   14.232653]  kasan_save_stack+0x45/0x70
[   14.232803]  kasan_save_track+0x18/0x40
[   14.232995]  kasan_save_alloc_info+0x3b/0x50
[   14.233209]  __kasan_kmalloc+0xb7/0xc0
[   14.233414]  __kmalloc_cache_noprof+0x189/0x420
[   14.233650]  kasan_atomics+0x95/0x310
[   14.233845]  kunit_try_run_case+0x1a5/0x480
[   14.234028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.234254]  kthread+0x337/0x6f0
[   14.234591]  ret_from_fork+0x116/0x1d0
[   14.234760]  ret_from_fork_asm+0x1a/0x30
[   14.234997] 
[   14.235087] The buggy address belongs to the object at ffff8881025a0d80
[   14.235087]  which belongs to the cache kmalloc-64 of size 64
[   14.235509] The buggy address is located 0 bytes to the right of
[   14.235509]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.236406] 
[   14.236576] The buggy address belongs to the physical page:
[   14.236833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.237316] flags: 0x200000000000000(node=0|zone=2)
[   14.237633] page_type: f5(slab)
[   14.237809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.238331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.238715] page dumped because: kasan: bad access detected
[   14.238890] 
[   14.238996] Memory state around the buggy address:
[   14.239333]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.239743]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.240302] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.240703]                                      ^
[   14.241082]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.241468]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.241851] ==================================================================
[   14.588835] ==================================================================
[   14.589361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.589851] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.590367] 
[   14.590499] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.590550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.590565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.590730] Call Trace:
[   14.590754]  <TASK>
[   14.590776]  dump_stack_lvl+0x73/0xb0
[   14.590811]  print_report+0xd1/0x650
[   14.590837]  ? __virt_addr_valid+0x1db/0x2d0
[   14.590901]  ? kasan_atomics_helper+0x1217/0x5450
[   14.590939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.590963]  ? kasan_atomics_helper+0x1217/0x5450
[   14.590985]  kasan_report+0x141/0x180
[   14.591007]  ? kasan_atomics_helper+0x1217/0x5450
[   14.591034]  kasan_check_range+0x10c/0x1c0
[   14.591057]  __kasan_check_write+0x18/0x20
[   14.591077]  kasan_atomics_helper+0x1217/0x5450
[   14.591099]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.591122]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.591148]  ? kasan_atomics+0x152/0x310
[   14.591175]  kasan_atomics+0x1dc/0x310
[   14.591198]  ? __pfx_kasan_atomics+0x10/0x10
[   14.591220]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.591248]  ? __pfx_read_tsc+0x10/0x10
[   14.591271]  ? ktime_get_ts64+0x86/0x230
[   14.591296]  kunit_try_run_case+0x1a5/0x480
[   14.591322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.591345]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.591367]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.591405]  ? __kthread_parkme+0x82/0x180
[   14.591428]  ? preempt_count_sub+0x50/0x80
[   14.591453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.591477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.591502]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.591527]  kthread+0x337/0x6f0
[   14.591547]  ? trace_preempt_on+0x20/0xc0
[   14.591578]  ? __pfx_kthread+0x10/0x10
[   14.591600]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.591622]  ? calculate_sigpending+0x7b/0xa0
[   14.591647]  ? __pfx_kthread+0x10/0x10
[   14.591669]  ret_from_fork+0x116/0x1d0
[   14.591688]  ? __pfx_kthread+0x10/0x10
[   14.591709]  ret_from_fork_asm+0x1a/0x30
[   14.591740]  </TASK>
[   14.591753] 
[   14.604108] Allocated by task 282:
[   14.604280]  kasan_save_stack+0x45/0x70
[   14.604767]  kasan_save_track+0x18/0x40
[   14.604921]  kasan_save_alloc_info+0x3b/0x50
[   14.605073]  __kasan_kmalloc+0xb7/0xc0
[   14.605206]  __kmalloc_cache_noprof+0x189/0x420
[   14.605362]  kasan_atomics+0x95/0x310
[   14.606290]  kunit_try_run_case+0x1a5/0x480
[   14.606742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.607190]  kthread+0x337/0x6f0
[   14.607386]  ret_from_fork+0x116/0x1d0
[   14.607769]  ret_from_fork_asm+0x1a/0x30
[   14.608140] 
[   14.608392] The buggy address belongs to the object at ffff8881025a0d80
[   14.608392]  which belongs to the cache kmalloc-64 of size 64
[   14.609153] The buggy address is located 0 bytes to the right of
[   14.609153]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.610050] 
[   14.610162] The buggy address belongs to the physical page:
[   14.610683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.611502] flags: 0x200000000000000(node=0|zone=2)
[   14.611885] page_type: f5(slab)
[   14.612194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.612523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.613215] page dumped because: kasan: bad access detected
[   14.613703] 
[   14.613810] Memory state around the buggy address:
[   14.614274]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.614889]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.615401] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.615900]                                      ^
[   14.616352]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.616877]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.617362] ==================================================================
[   15.080733] ==================================================================
[   15.081461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.081902] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.082249] 
[   15.082365] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.082448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.082462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.082484] Call Trace:
[   15.082511]  <TASK>
[   15.082528]  dump_stack_lvl+0x73/0xb0
[   15.082556]  print_report+0xd1/0x650
[   15.082580]  ? __virt_addr_valid+0x1db/0x2d0
[   15.082604]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.082625]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.082648]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.082680]  kasan_report+0x141/0x180
[   15.082704]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.082731]  kasan_check_range+0x10c/0x1c0
[   15.082754]  __kasan_check_write+0x18/0x20
[   15.082806]  kasan_atomics_helper+0x1d7a/0x5450
[   15.082829]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.082874]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.082900]  ? kasan_atomics+0x152/0x310
[   15.082927]  kasan_atomics+0x1dc/0x310
[   15.082950]  ? __pfx_kasan_atomics+0x10/0x10
[   15.082972]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.082998]  ? __pfx_read_tsc+0x10/0x10
[   15.083020]  ? ktime_get_ts64+0x86/0x230
[   15.083044]  kunit_try_run_case+0x1a5/0x480
[   15.083068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.083091]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.083114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.083137]  ? __kthread_parkme+0x82/0x180
[   15.083158]  ? preempt_count_sub+0x50/0x80
[   15.083182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.083206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.083230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.083255]  kthread+0x337/0x6f0
[   15.083275]  ? trace_preempt_on+0x20/0xc0
[   15.083298]  ? __pfx_kthread+0x10/0x10
[   15.083320]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.083342]  ? calculate_sigpending+0x7b/0xa0
[   15.083365]  ? __pfx_kthread+0x10/0x10
[   15.083397]  ret_from_fork+0x116/0x1d0
[   15.083424]  ? __pfx_kthread+0x10/0x10
[   15.083445]  ret_from_fork_asm+0x1a/0x30
[   15.083475]  </TASK>
[   15.083498] 
[   15.091435] Allocated by task 282:
[   15.091657]  kasan_save_stack+0x45/0x70
[   15.091837]  kasan_save_track+0x18/0x40
[   15.091976]  kasan_save_alloc_info+0x3b/0x50
[   15.092168]  __kasan_kmalloc+0xb7/0xc0
[   15.092383]  __kmalloc_cache_noprof+0x189/0x420
[   15.092606]  kasan_atomics+0x95/0x310
[   15.092823]  kunit_try_run_case+0x1a5/0x480
[   15.092984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.093239]  kthread+0x337/0x6f0
[   15.093443]  ret_from_fork+0x116/0x1d0
[   15.093679]  ret_from_fork_asm+0x1a/0x30
[   15.093862] 
[   15.093937] The buggy address belongs to the object at ffff8881025a0d80
[   15.093937]  which belongs to the cache kmalloc-64 of size 64
[   15.094465] The buggy address is located 0 bytes to the right of
[   15.094465]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.095018] 
[   15.095093] The buggy address belongs to the physical page:
[   15.095265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.095512] flags: 0x200000000000000(node=0|zone=2)
[   15.095913] page_type: f5(slab)
[   15.096085] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.096442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.096959] page dumped because: kasan: bad access detected
[   15.097134] 
[   15.097207] Memory state around the buggy address:
[   15.097370]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.097874]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.098202] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.098472]                                      ^
[   15.098628]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.099204]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.099513] ==================================================================
[   15.041199] ==================================================================
[   15.042044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.042448] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.042878] 
[   15.043006] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.043064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.043077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.043101] Call Trace:
[   15.043117]  <TASK>
[   15.043164]  dump_stack_lvl+0x73/0xb0
[   15.043193]  print_report+0xd1/0x650
[   15.043228]  ? __virt_addr_valid+0x1db/0x2d0
[   15.043252]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.043274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.043296]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.043318]  kasan_report+0x141/0x180
[   15.043341]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.043367]  __asan_report_load8_noabort+0x18/0x20
[   15.043401]  kasan_atomics_helper+0x4f30/0x5450
[   15.043424]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.043446]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.043503]  ? kasan_atomics+0x152/0x310
[   15.043530]  kasan_atomics+0x1dc/0x310
[   15.043564]  ? __pfx_kasan_atomics+0x10/0x10
[   15.043599]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.043626]  ? __pfx_read_tsc+0x10/0x10
[   15.043678]  ? ktime_get_ts64+0x86/0x230
[   15.043703]  kunit_try_run_case+0x1a5/0x480
[   15.043739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.043762]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.043784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.043808]  ? __kthread_parkme+0x82/0x180
[   15.043829]  ? preempt_count_sub+0x50/0x80
[   15.043854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.043878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.043901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.043925]  kthread+0x337/0x6f0
[   15.043945]  ? trace_preempt_on+0x20/0xc0
[   15.043971]  ? __pfx_kthread+0x10/0x10
[   15.043992]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.044014]  ? calculate_sigpending+0x7b/0xa0
[   15.044038]  ? __pfx_kthread+0x10/0x10
[   15.044060]  ret_from_fork+0x116/0x1d0
[   15.044079]  ? __pfx_kthread+0x10/0x10
[   15.044100]  ret_from_fork_asm+0x1a/0x30
[   15.044132]  </TASK>
[   15.044145] 
[   15.052035] Allocated by task 282:
[   15.052274]  kasan_save_stack+0x45/0x70
[   15.052514]  kasan_save_track+0x18/0x40
[   15.052803]  kasan_save_alloc_info+0x3b/0x50
[   15.053038]  __kasan_kmalloc+0xb7/0xc0
[   15.053205]  __kmalloc_cache_noprof+0x189/0x420
[   15.053363]  kasan_atomics+0x95/0x310
[   15.053546]  kunit_try_run_case+0x1a5/0x480
[   15.053803]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.054127]  kthread+0x337/0x6f0
[   15.054337]  ret_from_fork+0x116/0x1d0
[   15.054482]  ret_from_fork_asm+0x1a/0x30
[   15.054627] 
[   15.054711] The buggy address belongs to the object at ffff8881025a0d80
[   15.054711]  which belongs to the cache kmalloc-64 of size 64
[   15.055328] The buggy address is located 0 bytes to the right of
[   15.055328]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.055896] 
[   15.056027] The buggy address belongs to the physical page:
[   15.056418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.056665] flags: 0x200000000000000(node=0|zone=2)
[   15.056894] page_type: f5(slab)
[   15.057065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.057441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.057817] page dumped because: kasan: bad access detected
[   15.058123] 
[   15.058241] Memory state around the buggy address:
[   15.058448]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.058817]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.059131] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.059501]                                      ^
[   15.059853]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.060119]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.060412] ==================================================================
[   14.449164] ==================================================================
[   14.449672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.450026] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.450425] 
[   14.450597] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.450642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.450655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.450677] Call Trace:
[   14.450722]  <TASK>
[   14.450739]  dump_stack_lvl+0x73/0xb0
[   14.450768]  print_report+0xd1/0x650
[   14.450802]  ? __virt_addr_valid+0x1db/0x2d0
[   14.450825]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.450847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.450895]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.450942]  kasan_report+0x141/0x180
[   14.450972]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.450999]  kasan_check_range+0x10c/0x1c0
[   14.451023]  __kasan_check_write+0x18/0x20
[   14.451042]  kasan_atomics_helper+0xfa9/0x5450
[   14.451065]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.451088]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.451113]  ? kasan_atomics+0x152/0x310
[   14.451140]  kasan_atomics+0x1dc/0x310
[   14.451163]  ? __pfx_kasan_atomics+0x10/0x10
[   14.451186]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.451213]  ? __pfx_read_tsc+0x10/0x10
[   14.451235]  ? ktime_get_ts64+0x86/0x230
[   14.451259]  kunit_try_run_case+0x1a5/0x480
[   14.451284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.451307]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.451331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.451354]  ? __kthread_parkme+0x82/0x180
[   14.451386]  ? preempt_count_sub+0x50/0x80
[   14.451410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.451434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.451458]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.451483]  kthread+0x337/0x6f0
[   14.451503]  ? trace_preempt_on+0x20/0xc0
[   14.451527]  ? __pfx_kthread+0x10/0x10
[   14.451549]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.451618]  ? calculate_sigpending+0x7b/0xa0
[   14.451644]  ? __pfx_kthread+0x10/0x10
[   14.451665]  ret_from_fork+0x116/0x1d0
[   14.451696]  ? __pfx_kthread+0x10/0x10
[   14.451717]  ret_from_fork_asm+0x1a/0x30
[   14.451748]  </TASK>
[   14.451760] 
[   14.460803] Allocated by task 282:
[   14.461066]  kasan_save_stack+0x45/0x70
[   14.461311]  kasan_save_track+0x18/0x40
[   14.461486]  kasan_save_alloc_info+0x3b/0x50
[   14.461745]  __kasan_kmalloc+0xb7/0xc0
[   14.462007]  __kmalloc_cache_noprof+0x189/0x420
[   14.462278]  kasan_atomics+0x95/0x310
[   14.462513]  kunit_try_run_case+0x1a5/0x480
[   14.462781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.463091]  kthread+0x337/0x6f0
[   14.463300]  ret_from_fork+0x116/0x1d0
[   14.463490]  ret_from_fork_asm+0x1a/0x30
[   14.463733] 
[   14.463872] The buggy address belongs to the object at ffff8881025a0d80
[   14.463872]  which belongs to the cache kmalloc-64 of size 64
[   14.464482] The buggy address is located 0 bytes to the right of
[   14.464482]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.465135] 
[   14.465255] The buggy address belongs to the physical page:
[   14.465648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.465977] flags: 0x200000000000000(node=0|zone=2)
[   14.466234] page_type: f5(slab)
[   14.466453] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.466792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.467287] page dumped because: kasan: bad access detected
[   14.467528] 
[   14.467711] Memory state around the buggy address:
[   14.467968]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.468416]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.468768] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.469240]                                      ^
[   14.469484]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.471613]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.471845] ==================================================================
[   14.407236] ==================================================================
[   14.407630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.407877] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.408115] 
[   14.408201] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.408244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.408257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.408278] Call Trace:
[   14.408295]  <TASK>
[   14.408311]  dump_stack_lvl+0x73/0xb0
[   14.408340]  print_report+0xd1/0x650
[   14.408364]  ? __virt_addr_valid+0x1db/0x2d0
[   14.408444]  ? kasan_atomics_helper+0xe78/0x5450
[   14.408467]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.408489]  ? kasan_atomics_helper+0xe78/0x5450
[   14.408523]  kasan_report+0x141/0x180
[   14.408546]  ? kasan_atomics_helper+0xe78/0x5450
[   14.408590]  kasan_check_range+0x10c/0x1c0
[   14.408625]  __kasan_check_write+0x18/0x20
[   14.408652]  kasan_atomics_helper+0xe78/0x5450
[   14.408675]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.408720]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.408745]  ? kasan_atomics+0x152/0x310
[   14.408773]  kasan_atomics+0x1dc/0x310
[   14.408806]  ? __pfx_kasan_atomics+0x10/0x10
[   14.408828]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.408855]  ? __pfx_read_tsc+0x10/0x10
[   14.408878]  ? ktime_get_ts64+0x86/0x230
[   14.408921]  kunit_try_run_case+0x1a5/0x480
[   14.408947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.408970]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.408993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.409017]  ? __kthread_parkme+0x82/0x180
[   14.409038]  ? preempt_count_sub+0x50/0x80
[   14.409063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.409089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.409112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.409139]  kthread+0x337/0x6f0
[   14.409158]  ? trace_preempt_on+0x20/0xc0
[   14.409184]  ? __pfx_kthread+0x10/0x10
[   14.409205]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.409227]  ? calculate_sigpending+0x7b/0xa0
[   14.409252]  ? __pfx_kthread+0x10/0x10
[   14.409273]  ret_from_fork+0x116/0x1d0
[   14.409292]  ? __pfx_kthread+0x10/0x10
[   14.409313]  ret_from_fork_asm+0x1a/0x30
[   14.409344]  </TASK>
[   14.409357] 
[   14.418817] Allocated by task 282:
[   14.419069]  kasan_save_stack+0x45/0x70
[   14.419369]  kasan_save_track+0x18/0x40
[   14.419581]  kasan_save_alloc_info+0x3b/0x50
[   14.419746]  __kasan_kmalloc+0xb7/0xc0
[   14.419942]  __kmalloc_cache_noprof+0x189/0x420
[   14.420158]  kasan_atomics+0x95/0x310
[   14.420337]  kunit_try_run_case+0x1a5/0x480
[   14.420510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.420763]  kthread+0x337/0x6f0
[   14.420929]  ret_from_fork+0x116/0x1d0
[   14.421086]  ret_from_fork_asm+0x1a/0x30
[   14.421220] 
[   14.421291] The buggy address belongs to the object at ffff8881025a0d80
[   14.421291]  which belongs to the cache kmalloc-64 of size 64
[   14.422261] The buggy address is located 0 bytes to the right of
[   14.422261]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.422654] 
[   14.422743] The buggy address belongs to the physical page:
[   14.423106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.423642] flags: 0x200000000000000(node=0|zone=2)
[   14.423919] page_type: f5(slab)
[   14.424257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.424513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.424745] page dumped because: kasan: bad access detected
[   14.424915] 
[   14.424984] Memory state around the buggy address:
[   14.425137]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.425429]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.425764] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.426073]                                      ^
[   14.426296]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.426776]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.427064] ==================================================================
[   14.077657] ==================================================================
[   14.077916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.078272] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.078528] 
[   14.078619] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.078666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.078680] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.078706] Call Trace:
[   14.078726]  <TASK>
[   14.078746]  dump_stack_lvl+0x73/0xb0
[   14.078776]  print_report+0xd1/0x650
[   14.078816]  ? __virt_addr_valid+0x1db/0x2d0
[   14.078840]  ? kasan_atomics_helper+0x565/0x5450
[   14.078862]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.078894]  ? kasan_atomics_helper+0x565/0x5450
[   14.078916]  kasan_report+0x141/0x180
[   14.078939]  ? kasan_atomics_helper+0x565/0x5450
[   14.078966]  kasan_check_range+0x10c/0x1c0
[   14.078990]  __kasan_check_write+0x18/0x20
[   14.079010]  kasan_atomics_helper+0x565/0x5450
[   14.079033]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.079055]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.079082]  ? kasan_atomics+0x152/0x310
[   14.079110]  kasan_atomics+0x1dc/0x310
[   14.079135]  ? __pfx_kasan_atomics+0x10/0x10
[   14.079157]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.079183]  ? __pfx_read_tsc+0x10/0x10
[   14.079205]  ? ktime_get_ts64+0x86/0x230
[   14.079230]  kunit_try_run_case+0x1a5/0x480
[   14.079254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.079277]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.079300]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.079322]  ? __kthread_parkme+0x82/0x180
[   14.079344]  ? preempt_count_sub+0x50/0x80
[   14.079368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.079403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.079426]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.079450]  kthread+0x337/0x6f0
[   14.079469]  ? trace_preempt_on+0x20/0xc0
[   14.079495]  ? __pfx_kthread+0x10/0x10
[   14.079515]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.079537]  ? calculate_sigpending+0x7b/0xa0
[   14.079562]  ? __pfx_kthread+0x10/0x10
[   14.079593]  ret_from_fork+0x116/0x1d0
[   14.079613]  ? __pfx_kthread+0x10/0x10
[   14.079633]  ret_from_fork_asm+0x1a/0x30
[   14.079664]  </TASK>
[   14.079677] 
[   14.088120] Allocated by task 282:
[   14.088350]  kasan_save_stack+0x45/0x70
[   14.088527]  kasan_save_track+0x18/0x40
[   14.088733]  kasan_save_alloc_info+0x3b/0x50
[   14.088922]  __kasan_kmalloc+0xb7/0xc0
[   14.089109]  __kmalloc_cache_noprof+0x189/0x420
[   14.089268]  kasan_atomics+0x95/0x310
[   14.089456]  kunit_try_run_case+0x1a5/0x480
[   14.089780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.089978]  kthread+0x337/0x6f0
[   14.090100]  ret_from_fork+0x116/0x1d0
[   14.090230]  ret_from_fork_asm+0x1a/0x30
[   14.090368] 
[   14.090449] The buggy address belongs to the object at ffff8881025a0d80
[   14.090449]  which belongs to the cache kmalloc-64 of size 64
[   14.090871] The buggy address is located 0 bytes to the right of
[   14.090871]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.091870] 
[   14.091966] The buggy address belongs to the physical page:
[   14.092178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.092509] flags: 0x200000000000000(node=0|zone=2)
[   14.092961] page_type: f5(slab)
[   14.093125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.093435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.093784] page dumped because: kasan: bad access detected
[   14.094044] 
[   14.094120] Memory state around the buggy address:
[   14.094339]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.094758]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.094975] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.095187]                                      ^
[   14.095340]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.096783]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.097288] ==================================================================
[   14.708158] ==================================================================
[   14.708707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.709477] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.709873] 
[   14.710135] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.710188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.710202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.710225] Call Trace:
[   14.710257]  <TASK>
[   14.710278]  dump_stack_lvl+0x73/0xb0
[   14.710311]  print_report+0xd1/0x650
[   14.710336]  ? __virt_addr_valid+0x1db/0x2d0
[   14.710361]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.710392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.710415]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.710438]  kasan_report+0x141/0x180
[   14.710460]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.710486]  kasan_check_range+0x10c/0x1c0
[   14.710511]  __kasan_check_read+0x15/0x20
[   14.710530]  kasan_atomics_helper+0x13b5/0x5450
[   14.710552]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.710605]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.710633]  ? kasan_atomics+0x152/0x310
[   14.710662]  kasan_atomics+0x1dc/0x310
[   14.710685]  ? __pfx_kasan_atomics+0x10/0x10
[   14.710708]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.710736]  ? __pfx_read_tsc+0x10/0x10
[   14.710759]  ? ktime_get_ts64+0x86/0x230
[   14.710785]  kunit_try_run_case+0x1a5/0x480
[   14.710811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.710834]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.710857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.710880]  ? __kthread_parkme+0x82/0x180
[   14.710902]  ? preempt_count_sub+0x50/0x80
[   14.710927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.710952]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.710975]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.710999]  kthread+0x337/0x6f0
[   14.711019]  ? trace_preempt_on+0x20/0xc0
[   14.711044]  ? __pfx_kthread+0x10/0x10
[   14.711065]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.711087]  ? calculate_sigpending+0x7b/0xa0
[   14.711112]  ? __pfx_kthread+0x10/0x10
[   14.711133]  ret_from_fork+0x116/0x1d0
[   14.711152]  ? __pfx_kthread+0x10/0x10
[   14.711173]  ret_from_fork_asm+0x1a/0x30
[   14.711205]  </TASK>
[   14.711218] 
[   14.723524] Allocated by task 282:
[   14.723922]  kasan_save_stack+0x45/0x70
[   14.724346]  kasan_save_track+0x18/0x40
[   14.724716]  kasan_save_alloc_info+0x3b/0x50
[   14.725046]  __kasan_kmalloc+0xb7/0xc0
[   14.725240]  __kmalloc_cache_noprof+0x189/0x420
[   14.725459]  kasan_atomics+0x95/0x310
[   14.725882]  kunit_try_run_case+0x1a5/0x480
[   14.726216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.726660]  kthread+0x337/0x6f0
[   14.726936]  ret_from_fork+0x116/0x1d0
[   14.727145]  ret_from_fork_asm+0x1a/0x30
[   14.727320] 
[   14.727424] The buggy address belongs to the object at ffff8881025a0d80
[   14.727424]  which belongs to the cache kmalloc-64 of size 64
[   14.728507] The buggy address is located 0 bytes to the right of
[   14.728507]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.729478] 
[   14.729741] The buggy address belongs to the physical page:
[   14.729975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.730497] flags: 0x200000000000000(node=0|zone=2)
[   14.730911] page_type: f5(slab)
[   14.731338] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.731886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.732316] page dumped because: kasan: bad access detected
[   14.732738] 
[   14.732834] Memory state around the buggy address:
[   14.733192]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.733511]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.734076] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.734585]                                      ^
[   14.734802]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.735321]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.735988] ==================================================================
[   14.427444] ==================================================================
[   14.427678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.427906] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.428129] 
[   14.428214] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.428256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.428269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.428290] Call Trace:
[   14.428306]  <TASK>
[   14.428321]  dump_stack_lvl+0x73/0xb0
[   14.428348]  print_report+0xd1/0x650
[   14.428371]  ? __virt_addr_valid+0x1db/0x2d0
[   14.428435]  ? kasan_atomics_helper+0xf10/0x5450
[   14.428457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.428479]  ? kasan_atomics_helper+0xf10/0x5450
[   14.428501]  kasan_report+0x141/0x180
[   14.428523]  ? kasan_atomics_helper+0xf10/0x5450
[   14.428600]  kasan_check_range+0x10c/0x1c0
[   14.428625]  __kasan_check_write+0x18/0x20
[   14.428675]  kasan_atomics_helper+0xf10/0x5450
[   14.428725]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.428764]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.428826]  ? kasan_atomics+0x152/0x310
[   14.428854]  kasan_atomics+0x1dc/0x310
[   14.428940]  ? __pfx_kasan_atomics+0x10/0x10
[   14.428964]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.429000]  ? __pfx_read_tsc+0x10/0x10
[   14.429039]  ? ktime_get_ts64+0x86/0x230
[   14.429076]  kunit_try_run_case+0x1a5/0x480
[   14.429100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429123]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.429145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.429169]  ? __kthread_parkme+0x82/0x180
[   14.429189]  ? preempt_count_sub+0x50/0x80
[   14.429214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.429239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.429262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.429286]  kthread+0x337/0x6f0
[   14.429305]  ? trace_preempt_on+0x20/0xc0
[   14.429331]  ? __pfx_kthread+0x10/0x10
[   14.429352]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.429383]  ? calculate_sigpending+0x7b/0xa0
[   14.429408]  ? __pfx_kthread+0x10/0x10
[   14.429429]  ret_from_fork+0x116/0x1d0
[   14.429448]  ? __pfx_kthread+0x10/0x10
[   14.429468]  ret_from_fork_asm+0x1a/0x30
[   14.429525]  </TASK>
[   14.429537] 
[   14.439621] Allocated by task 282:
[   14.439793]  kasan_save_stack+0x45/0x70
[   14.440010]  kasan_save_track+0x18/0x40
[   14.440290]  kasan_save_alloc_info+0x3b/0x50
[   14.440534]  __kasan_kmalloc+0xb7/0xc0
[   14.440740]  __kmalloc_cache_noprof+0x189/0x420
[   14.441033]  kasan_atomics+0x95/0x310
[   14.441303]  kunit_try_run_case+0x1a5/0x480
[   14.441631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.441899]  kthread+0x337/0x6f0
[   14.442067]  ret_from_fork+0x116/0x1d0
[   14.442253]  ret_from_fork_asm+0x1a/0x30
[   14.442459] 
[   14.442573] The buggy address belongs to the object at ffff8881025a0d80
[   14.442573]  which belongs to the cache kmalloc-64 of size 64
[   14.443448] The buggy address is located 0 bytes to the right of
[   14.443448]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.444075] 
[   14.444172] The buggy address belongs to the physical page:
[   14.444500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.444775] flags: 0x200000000000000(node=0|zone=2)
[   14.444940] page_type: f5(slab)
[   14.445062] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.445410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.445753] page dumped because: kasan: bad access detected
[   14.446010] 
[   14.446106] Memory state around the buggy address:
[   14.446275]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.446868]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.447335] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.447626]                                      ^
[   14.447788]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.448005]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.448529] ==================================================================
[   14.557030] ==================================================================
[   14.557371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.557889] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.558446] 
[   14.558560] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.558606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.558620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.558644] Call Trace:
[   14.558663]  <TASK>
[   14.558684]  dump_stack_lvl+0x73/0xb0
[   14.558713]  print_report+0xd1/0x650
[   14.558736]  ? __virt_addr_valid+0x1db/0x2d0
[   14.558763]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.558784]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.558807]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.558829]  kasan_report+0x141/0x180
[   14.558851]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.558878]  __asan_report_load4_noabort+0x18/0x20
[   14.558903]  kasan_atomics_helper+0x4a02/0x5450
[   14.558925]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.558947]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.558973]  ? kasan_atomics+0x152/0x310
[   14.559000]  kasan_atomics+0x1dc/0x310
[   14.559023]  ? __pfx_kasan_atomics+0x10/0x10
[   14.559046]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.559074]  ? __pfx_read_tsc+0x10/0x10
[   14.559098]  ? ktime_get_ts64+0x86/0x230
[   14.559123]  kunit_try_run_case+0x1a5/0x480
[   14.559149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559172]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.559194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.559217]  ? __kthread_parkme+0x82/0x180
[   14.559238]  ? preempt_count_sub+0x50/0x80
[   14.559263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.559328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.559372]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.559428]  kthread+0x337/0x6f0
[   14.559460]  ? trace_preempt_on+0x20/0xc0
[   14.559499]  ? __pfx_kthread+0x10/0x10
[   14.559533]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.559568]  ? calculate_sigpending+0x7b/0xa0
[   14.559620]  ? __pfx_kthread+0x10/0x10
[   14.559655]  ret_from_fork+0x116/0x1d0
[   14.559686]  ? __pfx_kthread+0x10/0x10
[   14.559708]  ret_from_fork_asm+0x1a/0x30
[   14.559739]  </TASK>
[   14.559750] 
[   14.574489] Allocated by task 282:
[   14.575079]  kasan_save_stack+0x45/0x70
[   14.575504]  kasan_save_track+0x18/0x40
[   14.575776]  kasan_save_alloc_info+0x3b/0x50
[   14.576204]  __kasan_kmalloc+0xb7/0xc0
[   14.576461]  __kmalloc_cache_noprof+0x189/0x420
[   14.576854]  kasan_atomics+0x95/0x310
[   14.577235]  kunit_try_run_case+0x1a5/0x480
[   14.577432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.577865]  kthread+0x337/0x6f0
[   14.578296]  ret_from_fork+0x116/0x1d0
[   14.578565]  ret_from_fork_asm+0x1a/0x30
[   14.578759] 
[   14.578858] The buggy address belongs to the object at ffff8881025a0d80
[   14.578858]  which belongs to the cache kmalloc-64 of size 64
[   14.579724] The buggy address is located 0 bytes to the right of
[   14.579724]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.580468] 
[   14.580566] The buggy address belongs to the physical page:
[   14.581120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.581420] flags: 0x200000000000000(node=0|zone=2)
[   14.581922] page_type: f5(slab)
[   14.582426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.583062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.583716] page dumped because: kasan: bad access detected
[   14.584068] 
[   14.584161] Memory state around the buggy address:
[   14.584367]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.584893]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.585514] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.586168]                                      ^
[   14.586418]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.586879]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.587520] ==================================================================
[   14.363414] ==================================================================
[   14.363647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.364146] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.364636] 
[   14.364842] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.364891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.364931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.364971] Call Trace:
[   14.365004]  <TASK>
[   14.365025]  dump_stack_lvl+0x73/0xb0
[   14.365057]  print_report+0xd1/0x650
[   14.365093]  ? __virt_addr_valid+0x1db/0x2d0
[   14.365116]  ? kasan_atomics_helper+0xd47/0x5450
[   14.365138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.365161]  ? kasan_atomics_helper+0xd47/0x5450
[   14.365184]  kasan_report+0x141/0x180
[   14.365206]  ? kasan_atomics_helper+0xd47/0x5450
[   14.365233]  kasan_check_range+0x10c/0x1c0
[   14.365257]  __kasan_check_write+0x18/0x20
[   14.365276]  kasan_atomics_helper+0xd47/0x5450
[   14.365299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.365340]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.365389]  ? kasan_atomics+0x152/0x310
[   14.365418]  kasan_atomics+0x1dc/0x310
[   14.365441]  ? __pfx_kasan_atomics+0x10/0x10
[   14.365464]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.365491]  ? __pfx_read_tsc+0x10/0x10
[   14.365513]  ? ktime_get_ts64+0x86/0x230
[   14.365540]  kunit_try_run_case+0x1a5/0x480
[   14.365565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.365599]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.365622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.365673]  ? __kthread_parkme+0x82/0x180
[   14.365694]  ? preempt_count_sub+0x50/0x80
[   14.365736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.365771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.365794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.365818]  kthread+0x337/0x6f0
[   14.365837]  ? trace_preempt_on+0x20/0xc0
[   14.365862]  ? __pfx_kthread+0x10/0x10
[   14.365883]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.365905]  ? calculate_sigpending+0x7b/0xa0
[   14.365930]  ? __pfx_kthread+0x10/0x10
[   14.365951]  ret_from_fork+0x116/0x1d0
[   14.365971]  ? __pfx_kthread+0x10/0x10
[   14.365992]  ret_from_fork_asm+0x1a/0x30
[   14.366024]  </TASK>
[   14.366037] 
[   14.375699] Allocated by task 282:
[   14.375875]  kasan_save_stack+0x45/0x70
[   14.376532]  kasan_save_track+0x18/0x40
[   14.376774]  kasan_save_alloc_info+0x3b/0x50
[   14.377029]  __kasan_kmalloc+0xb7/0xc0
[   14.377258]  __kmalloc_cache_noprof+0x189/0x420
[   14.377518]  kasan_atomics+0x95/0x310
[   14.377828]  kunit_try_run_case+0x1a5/0x480
[   14.378116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.378354]  kthread+0x337/0x6f0
[   14.378581]  ret_from_fork+0x116/0x1d0
[   14.378852]  ret_from_fork_asm+0x1a/0x30
[   14.379142] 
[   14.379253] The buggy address belongs to the object at ffff8881025a0d80
[   14.379253]  which belongs to the cache kmalloc-64 of size 64
[   14.379837] The buggy address is located 0 bytes to the right of
[   14.379837]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.380581] 
[   14.380720] The buggy address belongs to the physical page:
[   14.381086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.381518] flags: 0x200000000000000(node=0|zone=2)
[   14.381803] page_type: f5(slab)
[   14.381961] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.382348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.382701] page dumped because: kasan: bad access detected
[   14.383056] 
[   14.383129] Memory state around the buggy address:
[   14.383366]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.383829]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.384177] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.384635]                                      ^
[   14.384912]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.385133]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.385349] ==================================================================
[   14.030513] ==================================================================
[   14.030857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.031304] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.031710] 
[   14.031802] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.031847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.031859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.031881] Call Trace:
[   14.031897]  <TASK>
[   14.031913]  dump_stack_lvl+0x73/0xb0
[   14.031942]  print_report+0xd1/0x650
[   14.031968]  ? __virt_addr_valid+0x1db/0x2d0
[   14.031992]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.032032]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.032056]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.032080]  kasan_report+0x141/0x180
[   14.032102]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.032128]  kasan_check_range+0x10c/0x1c0
[   14.032152]  __kasan_check_write+0x18/0x20
[   14.032172]  kasan_atomics_helper+0x4a0/0x5450
[   14.032194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.032217]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.032243]  ? kasan_atomics+0x152/0x310
[   14.032269]  kasan_atomics+0x1dc/0x310
[   14.032293]  ? __pfx_kasan_atomics+0x10/0x10
[   14.032316]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.032342]  ? __pfx_read_tsc+0x10/0x10
[   14.032363]  ? ktime_get_ts64+0x86/0x230
[   14.032402]  kunit_try_run_case+0x1a5/0x480
[   14.032426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.032449]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.032473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.032496]  ? __kthread_parkme+0x82/0x180
[   14.032517]  ? preempt_count_sub+0x50/0x80
[   14.032543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.032567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.032600]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.032623]  kthread+0x337/0x6f0
[   14.032644]  ? trace_preempt_on+0x20/0xc0
[   14.032667]  ? __pfx_kthread+0x10/0x10
[   14.032689]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.032710]  ? calculate_sigpending+0x7b/0xa0
[   14.032734]  ? __pfx_kthread+0x10/0x10
[   14.032756]  ret_from_fork+0x116/0x1d0
[   14.032775]  ? __pfx_kthread+0x10/0x10
[   14.032796]  ret_from_fork_asm+0x1a/0x30
[   14.032825]  </TASK>
[   14.032838] 
[   14.045262] Allocated by task 282:
[   14.045439]  kasan_save_stack+0x45/0x70
[   14.045869]  kasan_save_track+0x18/0x40
[   14.046319]  kasan_save_alloc_info+0x3b/0x50
[   14.046555]  __kasan_kmalloc+0xb7/0xc0
[   14.046708]  __kmalloc_cache_noprof+0x189/0x420
[   14.046902]  kasan_atomics+0x95/0x310
[   14.047194]  kunit_try_run_case+0x1a5/0x480
[   14.047392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.047567]  kthread+0x337/0x6f0
[   14.047688]  ret_from_fork+0x116/0x1d0
[   14.047962]  ret_from_fork_asm+0x1a/0x30
[   14.048131] 
[   14.048265] The buggy address belongs to the object at ffff8881025a0d80
[   14.048265]  which belongs to the cache kmalloc-64 of size 64
[   14.048827] The buggy address is located 0 bytes to the right of
[   14.048827]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.049413] 
[   14.049518] The buggy address belongs to the physical page:
[   14.049708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.050043] flags: 0x200000000000000(node=0|zone=2)
[   14.050244] page_type: f5(slab)
[   14.050363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.050827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.051143] page dumped because: kasan: bad access detected
[   14.051462] 
[   14.051537] Memory state around the buggy address:
[   14.051929]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.052366]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.052607] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.053053]                                      ^
[   14.053227]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.053470]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.054021] ==================================================================
[   14.266864] ==================================================================
[   14.267367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.267731] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.268149] 
[   14.268435] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.268522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.268536] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.268558] Call Trace:
[   14.268585]  <TASK>
[   14.268602]  dump_stack_lvl+0x73/0xb0
[   14.268661]  print_report+0xd1/0x650
[   14.268686]  ? __virt_addr_valid+0x1db/0x2d0
[   14.268710]  ? kasan_atomics_helper+0xac7/0x5450
[   14.268741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.268764]  ? kasan_atomics_helper+0xac7/0x5450
[   14.268786]  kasan_report+0x141/0x180
[   14.268808]  ? kasan_atomics_helper+0xac7/0x5450
[   14.268834]  kasan_check_range+0x10c/0x1c0
[   14.268884]  __kasan_check_write+0x18/0x20
[   14.268903]  kasan_atomics_helper+0xac7/0x5450
[   14.268947]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.268970]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.268995]  ? kasan_atomics+0x152/0x310
[   14.269023]  kasan_atomics+0x1dc/0x310
[   14.269046]  ? __pfx_kasan_atomics+0x10/0x10
[   14.269069]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.269168]  ? __pfx_read_tsc+0x10/0x10
[   14.269208]  ? ktime_get_ts64+0x86/0x230
[   14.269233]  kunit_try_run_case+0x1a5/0x480
[   14.269290]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.269312]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.269336]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.269369]  ? __kthread_parkme+0x82/0x180
[   14.269400]  ? preempt_count_sub+0x50/0x80
[   14.269424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.269448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.269472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.269496]  kthread+0x337/0x6f0
[   14.269517]  ? trace_preempt_on+0x20/0xc0
[   14.269541]  ? __pfx_kthread+0x10/0x10
[   14.269561]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.269583]  ? calculate_sigpending+0x7b/0xa0
[   14.269608]  ? __pfx_kthread+0x10/0x10
[   14.269630]  ret_from_fork+0x116/0x1d0
[   14.269649]  ? __pfx_kthread+0x10/0x10
[   14.269670]  ret_from_fork_asm+0x1a/0x30
[   14.269700]  </TASK>
[   14.269712] 
[   14.279864] Allocated by task 282:
[   14.280136]  kasan_save_stack+0x45/0x70
[   14.280512]  kasan_save_track+0x18/0x40
[   14.280842]  kasan_save_alloc_info+0x3b/0x50
[   14.281018]  __kasan_kmalloc+0xb7/0xc0
[   14.281148]  __kmalloc_cache_noprof+0x189/0x420
[   14.281659]  kasan_atomics+0x95/0x310
[   14.281885]  kunit_try_run_case+0x1a5/0x480
[   14.282032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.282201]  kthread+0x337/0x6f0
[   14.282500]  ret_from_fork+0x116/0x1d0
[   14.282784]  ret_from_fork_asm+0x1a/0x30
[   14.283142] 
[   14.283244] The buggy address belongs to the object at ffff8881025a0d80
[   14.283244]  which belongs to the cache kmalloc-64 of size 64
[   14.283825] The buggy address is located 0 bytes to the right of
[   14.283825]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.284883] 
[   14.285049] The buggy address belongs to the physical page:
[   14.285393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.285840] flags: 0x200000000000000(node=0|zone=2)
[   14.286186] page_type: f5(slab)
[   14.286401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.286848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.287269] page dumped because: kasan: bad access detected
[   14.287744] 
[   14.287886] Memory state around the buggy address:
[   14.288254]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.288739]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.289137] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.289476]                                      ^
[   14.289721]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.290022]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.290514] ==================================================================
[   14.098221] ==================================================================
[   14.098947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.099612] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.100225] 
[   14.100347] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.100410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.100424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.100447] Call Trace:
[   14.100464]  <TASK>
[   14.100483]  dump_stack_lvl+0x73/0xb0
[   14.100513]  print_report+0xd1/0x650
[   14.100539]  ? __virt_addr_valid+0x1db/0x2d0
[   14.100583]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.100606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.100629]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.100651]  kasan_report+0x141/0x180
[   14.100673]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.100700]  kasan_check_range+0x10c/0x1c0
[   14.100725]  __kasan_check_write+0x18/0x20
[   14.100744]  kasan_atomics_helper+0x5fe/0x5450
[   14.100768]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.100790]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.100818]  ? kasan_atomics+0x152/0x310
[   14.100845]  kasan_atomics+0x1dc/0x310
[   14.100867]  ? __pfx_kasan_atomics+0x10/0x10
[   14.100890]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.100942]  ? __pfx_read_tsc+0x10/0x10
[   14.100969]  ? ktime_get_ts64+0x86/0x230
[   14.100996]  kunit_try_run_case+0x1a5/0x480
[   14.101021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.101043]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.101066]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.101089]  ? __kthread_parkme+0x82/0x180
[   14.101110]  ? preempt_count_sub+0x50/0x80
[   14.101134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.101158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.101181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.101205]  kthread+0x337/0x6f0
[   14.101224]  ? trace_preempt_on+0x20/0xc0
[   14.101250]  ? __pfx_kthread+0x10/0x10
[   14.101271]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.101292]  ? calculate_sigpending+0x7b/0xa0
[   14.101316]  ? __pfx_kthread+0x10/0x10
[   14.101337]  ret_from_fork+0x116/0x1d0
[   14.101357]  ? __pfx_kthread+0x10/0x10
[   14.101390]  ret_from_fork_asm+0x1a/0x30
[   14.101421]  </TASK>
[   14.101433] 
[   14.109459] Allocated by task 282:
[   14.109599]  kasan_save_stack+0x45/0x70
[   14.109744]  kasan_save_track+0x18/0x40
[   14.109880]  kasan_save_alloc_info+0x3b/0x50
[   14.110058]  __kasan_kmalloc+0xb7/0xc0
[   14.110247]  __kmalloc_cache_noprof+0x189/0x420
[   14.110480]  kasan_atomics+0x95/0x310
[   14.110675]  kunit_try_run_case+0x1a5/0x480
[   14.110887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.111135]  kthread+0x337/0x6f0
[   14.111304]  ret_from_fork+0x116/0x1d0
[   14.111659]  ret_from_fork_asm+0x1a/0x30
[   14.111857] 
[   14.111972] The buggy address belongs to the object at ffff8881025a0d80
[   14.111972]  which belongs to the cache kmalloc-64 of size 64
[   14.112439] The buggy address is located 0 bytes to the right of
[   14.112439]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.112881] 
[   14.112979] The buggy address belongs to the physical page:
[   14.113152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.113411] flags: 0x200000000000000(node=0|zone=2)
[   14.113671] page_type: f5(slab)
[   14.113834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.114160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.114603] page dumped because: kasan: bad access detected
[   14.114858] 
[   14.114950] Memory state around the buggy address:
[   14.115339]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.115582]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.115799] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.116014]                                      ^
[   14.116234]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.116557]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.116867] ==================================================================
[   14.535316] ==================================================================
[   14.535780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.536210] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.536455] 
[   14.536548] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.536596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.536608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.536631] Call Trace:
[   14.536685]  <TASK>
[   14.536719]  dump_stack_lvl+0x73/0xb0
[   14.536780]  print_report+0xd1/0x650
[   14.536807]  ? __virt_addr_valid+0x1db/0x2d0
[   14.536832]  ? kasan_atomics_helper+0x1148/0x5450
[   14.536853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.536876]  ? kasan_atomics_helper+0x1148/0x5450
[   14.536898]  kasan_report+0x141/0x180
[   14.536921]  ? kasan_atomics_helper+0x1148/0x5450
[   14.536947]  kasan_check_range+0x10c/0x1c0
[   14.536971]  __kasan_check_write+0x18/0x20
[   14.537008]  kasan_atomics_helper+0x1148/0x5450
[   14.537031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.537054]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.537080]  ? kasan_atomics+0x152/0x310
[   14.537107]  kasan_atomics+0x1dc/0x310
[   14.537130]  ? __pfx_kasan_atomics+0x10/0x10
[   14.537153]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.537179]  ? __pfx_read_tsc+0x10/0x10
[   14.537202]  ? ktime_get_ts64+0x86/0x230
[   14.537228]  kunit_try_run_case+0x1a5/0x480
[   14.537254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.537277]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.537300]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.537323]  ? __kthread_parkme+0x82/0x180
[   14.537364]  ? preempt_count_sub+0x50/0x80
[   14.537411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.537436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.537470]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.537493]  kthread+0x337/0x6f0
[   14.537513]  ? trace_preempt_on+0x20/0xc0
[   14.537565]  ? __pfx_kthread+0x10/0x10
[   14.537596]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.537618]  ? calculate_sigpending+0x7b/0xa0
[   14.537653]  ? __pfx_kthread+0x10/0x10
[   14.537675]  ret_from_fork+0x116/0x1d0
[   14.537695]  ? __pfx_kthread+0x10/0x10
[   14.537742]  ret_from_fork_asm+0x1a/0x30
[   14.537774]  </TASK>
[   14.537787] 
[   14.547651] Allocated by task 282:
[   14.547851]  kasan_save_stack+0x45/0x70
[   14.548005]  kasan_save_track+0x18/0x40
[   14.548412]  kasan_save_alloc_info+0x3b/0x50
[   14.548745]  __kasan_kmalloc+0xb7/0xc0
[   14.548930]  __kmalloc_cache_noprof+0x189/0x420
[   14.549086]  kasan_atomics+0x95/0x310
[   14.549221]  kunit_try_run_case+0x1a5/0x480
[   14.549482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.549732]  kthread+0x337/0x6f0
[   14.549929]  ret_from_fork+0x116/0x1d0
[   14.550120]  ret_from_fork_asm+0x1a/0x30
[   14.550357] 
[   14.550498] The buggy address belongs to the object at ffff8881025a0d80
[   14.550498]  which belongs to the cache kmalloc-64 of size 64
[   14.550958] The buggy address is located 0 bytes to the right of
[   14.550958]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.551545] 
[   14.551718] The buggy address belongs to the physical page:
[   14.551976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.552419] flags: 0x200000000000000(node=0|zone=2)
[   14.552711] page_type: f5(slab)
[   14.552893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.553243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.553624] page dumped because: kasan: bad access detected
[   14.553871] 
[   14.554030] Memory state around the buggy address:
[   14.554247]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.554598]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.555797] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.556074]                                      ^
[   14.556225]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556451]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.556658] ==================================================================
[   14.677440] ==================================================================
[   14.677940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.678589] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.679056] 
[   14.679174] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.679314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.679330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.679352] Call Trace:
[   14.679371]  <TASK>
[   14.679426]  dump_stack_lvl+0x73/0xb0
[   14.679458]  print_report+0xd1/0x650
[   14.679482]  ? __virt_addr_valid+0x1db/0x2d0
[   14.679507]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.679529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.679552]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.679583]  kasan_report+0x141/0x180
[   14.679606]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.679632]  __asan_report_load4_noabort+0x18/0x20
[   14.679657]  kasan_atomics_helper+0x49ce/0x5450
[   14.679680]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.679702]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.679728]  ? kasan_atomics+0x152/0x310
[   14.679754]  kasan_atomics+0x1dc/0x310
[   14.679778]  ? __pfx_kasan_atomics+0x10/0x10
[   14.679801]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.679828]  ? __pfx_read_tsc+0x10/0x10
[   14.679850]  ? ktime_get_ts64+0x86/0x230
[   14.679876]  kunit_try_run_case+0x1a5/0x480
[   14.679901]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.679924]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.679947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.679969]  ? __kthread_parkme+0x82/0x180
[   14.679991]  ? preempt_count_sub+0x50/0x80
[   14.680015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.680038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.680062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.680085]  kthread+0x337/0x6f0
[   14.680105]  ? trace_preempt_on+0x20/0xc0
[   14.680130]  ? __pfx_kthread+0x10/0x10
[   14.680151]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.680172]  ? calculate_sigpending+0x7b/0xa0
[   14.680197]  ? __pfx_kthread+0x10/0x10
[   14.680219]  ret_from_fork+0x116/0x1d0
[   14.680237]  ? __pfx_kthread+0x10/0x10
[   14.680258]  ret_from_fork_asm+0x1a/0x30
[   14.680289]  </TASK>
[   14.680301] 
[   14.693504] Allocated by task 282:
[   14.694042]  kasan_save_stack+0x45/0x70
[   14.694322]  kasan_save_track+0x18/0x40
[   14.694776]  kasan_save_alloc_info+0x3b/0x50
[   14.695096]  __kasan_kmalloc+0xb7/0xc0
[   14.695290]  __kmalloc_cache_noprof+0x189/0x420
[   14.695511]  kasan_atomics+0x95/0x310
[   14.696000]  kunit_try_run_case+0x1a5/0x480
[   14.696355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.696805]  kthread+0x337/0x6f0
[   14.697059]  ret_from_fork+0x116/0x1d0
[   14.697526]  ret_from_fork_asm+0x1a/0x30
[   14.697748] 
[   14.697843] The buggy address belongs to the object at ffff8881025a0d80
[   14.697843]  which belongs to the cache kmalloc-64 of size 64
[   14.698815] The buggy address is located 0 bytes to the right of
[   14.698815]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.699783] 
[   14.700009] The buggy address belongs to the physical page:
[   14.700419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.701007] flags: 0x200000000000000(node=0|zone=2)
[   14.701361] page_type: f5(slab)
[   14.701752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.702357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.703018] page dumped because: kasan: bad access detected
[   14.703260] 
[   14.703355] Memory state around the buggy address:
[   14.703781]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.704322]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.704962] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.705262]                                      ^
[   14.705479]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.706232]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.706781] ==================================================================
[   14.242527] ==================================================================
[   14.242937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.243403] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.243758] 
[   14.243887] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.243978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.243991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.244014] Call Trace:
[   14.244138]  <TASK>
[   14.244161]  dump_stack_lvl+0x73/0xb0
[   14.244191]  print_report+0xd1/0x650
[   14.244344]  ? __virt_addr_valid+0x1db/0x2d0
[   14.244391]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.244416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.244439]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.244461]  kasan_report+0x141/0x180
[   14.244511]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.244539]  kasan_check_range+0x10c/0x1c0
[   14.244588]  __kasan_check_write+0x18/0x20
[   14.244608]  kasan_atomics_helper+0xa2b/0x5450
[   14.244632]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.244671]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.244707]  ? kasan_atomics+0x152/0x310
[   14.244735]  kasan_atomics+0x1dc/0x310
[   14.244758]  ? __pfx_kasan_atomics+0x10/0x10
[   14.244790]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.244817]  ? __pfx_read_tsc+0x10/0x10
[   14.244839]  ? ktime_get_ts64+0x86/0x230
[   14.244864]  kunit_try_run_case+0x1a5/0x480
[   14.244888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.244917]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.244939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.244962]  ? __kthread_parkme+0x82/0x180
[   14.244984]  ? preempt_count_sub+0x50/0x80
[   14.245008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.245033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.245057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.245080]  kthread+0x337/0x6f0
[   14.245101]  ? trace_preempt_on+0x20/0xc0
[   14.245126]  ? __pfx_kthread+0x10/0x10
[   14.245146]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.245168]  ? calculate_sigpending+0x7b/0xa0
[   14.245193]  ? __pfx_kthread+0x10/0x10
[   14.245214]  ret_from_fork+0x116/0x1d0
[   14.245233]  ? __pfx_kthread+0x10/0x10
[   14.245253]  ret_from_fork_asm+0x1a/0x30
[   14.245284]  </TASK>
[   14.245296] 
[   14.256184] Allocated by task 282:
[   14.256355]  kasan_save_stack+0x45/0x70
[   14.256519]  kasan_save_track+0x18/0x40
[   14.256803]  kasan_save_alloc_info+0x3b/0x50
[   14.257206]  __kasan_kmalloc+0xb7/0xc0
[   14.257659]  __kmalloc_cache_noprof+0x189/0x420
[   14.257903]  kasan_atomics+0x95/0x310
[   14.258101]  kunit_try_run_case+0x1a5/0x480
[   14.258334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.258679]  kthread+0x337/0x6f0
[   14.259073]  ret_from_fork+0x116/0x1d0
[   14.259271]  ret_from_fork_asm+0x1a/0x30
[   14.259423] 
[   14.259496] The buggy address belongs to the object at ffff8881025a0d80
[   14.259496]  which belongs to the cache kmalloc-64 of size 64
[   14.260575] The buggy address is located 0 bytes to the right of
[   14.260575]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.261170] 
[   14.261252] The buggy address belongs to the physical page:
[   14.261564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.261945] flags: 0x200000000000000(node=0|zone=2)
[   14.262262] page_type: f5(slab)
[   14.262458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.262862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.263227] page dumped because: kasan: bad access detected
[   14.263517] 
[   14.263653] Memory state around the buggy address:
[   14.263895]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.264391]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.264757] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.265072]                                      ^
[   14.265490]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.266053]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.266424] ==================================================================
[   15.100269] ==================================================================
[   15.101027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.101399] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.101748] 
[   15.101836] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.101879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.101891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.101913] Call Trace:
[   15.101928]  <TASK>
[   15.101943]  dump_stack_lvl+0x73/0xb0
[   15.101970]  print_report+0xd1/0x650
[   15.101994]  ? __virt_addr_valid+0x1db/0x2d0
[   15.102015]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.102037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.102060]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.102082]  kasan_report+0x141/0x180
[   15.102105]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.102132]  kasan_check_range+0x10c/0x1c0
[   15.102156]  __kasan_check_write+0x18/0x20
[   15.102176]  kasan_atomics_helper+0x1e12/0x5450
[   15.102198]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.102221]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.102247]  ? kasan_atomics+0x152/0x310
[   15.102275]  kasan_atomics+0x1dc/0x310
[   15.102299]  ? __pfx_kasan_atomics+0x10/0x10
[   15.102332]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.102358]  ? __pfx_read_tsc+0x10/0x10
[   15.102397]  ? ktime_get_ts64+0x86/0x230
[   15.102422]  kunit_try_run_case+0x1a5/0x480
[   15.102446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.102470]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.102493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.102516]  ? __kthread_parkme+0x82/0x180
[   15.102536]  ? preempt_count_sub+0x50/0x80
[   15.102561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.102594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.102617]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.102641]  kthread+0x337/0x6f0
[   15.102661]  ? trace_preempt_on+0x20/0xc0
[   15.102695]  ? __pfx_kthread+0x10/0x10
[   15.102716]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.102738]  ? calculate_sigpending+0x7b/0xa0
[   15.102772]  ? __pfx_kthread+0x10/0x10
[   15.102794]  ret_from_fork+0x116/0x1d0
[   15.102813]  ? __pfx_kthread+0x10/0x10
[   15.102834]  ret_from_fork_asm+0x1a/0x30
[   15.102875]  </TASK>
[   15.102886] 
[   15.110862] Allocated by task 282:
[   15.110992]  kasan_save_stack+0x45/0x70
[   15.111135]  kasan_save_track+0x18/0x40
[   15.111316]  kasan_save_alloc_info+0x3b/0x50
[   15.111550]  __kasan_kmalloc+0xb7/0xc0
[   15.111749]  __kmalloc_cache_noprof+0x189/0x420
[   15.112061]  kasan_atomics+0x95/0x310
[   15.112239]  kunit_try_run_case+0x1a5/0x480
[   15.112400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.112666]  kthread+0x337/0x6f0
[   15.112838]  ret_from_fork+0x116/0x1d0
[   15.113059]  ret_from_fork_asm+0x1a/0x30
[   15.113261] 
[   15.113355] The buggy address belongs to the object at ffff8881025a0d80
[   15.113355]  which belongs to the cache kmalloc-64 of size 64
[   15.113911] The buggy address is located 0 bytes to the right of
[   15.113911]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.114429] 
[   15.114513] The buggy address belongs to the physical page:
[   15.114783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.115073] flags: 0x200000000000000(node=0|zone=2)
[   15.115239] page_type: f5(slab)
[   15.115361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.115606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.116006] page dumped because: kasan: bad access detected
[   15.116269] 
[   15.116366] Memory state around the buggy address:
[   15.116659]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.116977]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.117299] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.117645]                                      ^
[   15.117809]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.118028]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.118241] ==================================================================
[   15.203861] ==================================================================
[   15.204121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.204353] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.204588] 
[   15.205131] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.205198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.205211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.205233] Call Trace:
[   15.205251]  <TASK>
[   15.205270]  dump_stack_lvl+0x73/0xb0
[   15.205300]  print_report+0xd1/0x650
[   15.205324]  ? __virt_addr_valid+0x1db/0x2d0
[   15.205347]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.205369]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.205400]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.205422]  kasan_report+0x141/0x180
[   15.205444]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.205470]  __asan_report_load8_noabort+0x18/0x20
[   15.205495]  kasan_atomics_helper+0x4f98/0x5450
[   15.205518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.205540]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.205628]  ? kasan_atomics+0x152/0x310
[   15.205656]  kasan_atomics+0x1dc/0x310
[   15.205679]  ? __pfx_kasan_atomics+0x10/0x10
[   15.205711]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.205739]  ? __pfx_read_tsc+0x10/0x10
[   15.205762]  ? ktime_get_ts64+0x86/0x230
[   15.205799]  kunit_try_run_case+0x1a5/0x480
[   15.205824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.205847]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.205878]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.205900]  ? __kthread_parkme+0x82/0x180
[   15.205922]  ? preempt_count_sub+0x50/0x80
[   15.205956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.205981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.206004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.206028]  kthread+0x337/0x6f0
[   15.206048]  ? trace_preempt_on+0x20/0xc0
[   15.206073]  ? __pfx_kthread+0x10/0x10
[   15.206093]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.206116]  ? calculate_sigpending+0x7b/0xa0
[   15.206149]  ? __pfx_kthread+0x10/0x10
[   15.206172]  ret_from_fork+0x116/0x1d0
[   15.206191]  ? __pfx_kthread+0x10/0x10
[   15.206212]  ret_from_fork_asm+0x1a/0x30
[   15.206253]  </TASK>
[   15.206266] 
[   15.214206] Allocated by task 282:
[   15.214343]  kasan_save_stack+0x45/0x70
[   15.214558]  kasan_save_track+0x18/0x40
[   15.214941]  kasan_save_alloc_info+0x3b/0x50
[   15.215135]  __kasan_kmalloc+0xb7/0xc0
[   15.215269]  __kmalloc_cache_noprof+0x189/0x420
[   15.215475]  kasan_atomics+0x95/0x310
[   15.215752]  kunit_try_run_case+0x1a5/0x480
[   15.216124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.216372]  kthread+0x337/0x6f0
[   15.216591]  ret_from_fork+0x116/0x1d0
[   15.216742]  ret_from_fork_asm+0x1a/0x30
[   15.216947] 
[   15.217056] The buggy address belongs to the object at ffff8881025a0d80
[   15.217056]  which belongs to the cache kmalloc-64 of size 64
[   15.217531] The buggy address is located 0 bytes to the right of
[   15.217531]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.218032] 
[   15.218105] The buggy address belongs to the physical page:
[   15.218447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.218837] flags: 0x200000000000000(node=0|zone=2)
[   15.219094] page_type: f5(slab)
[   15.219241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.219570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.219891] page dumped because: kasan: bad access detected
[   15.220141] 
[   15.220238] Memory state around the buggy address:
[   15.220475]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.220762]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.220975] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.221182]                                      ^
[   15.221335]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.221578]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.221916] ==================================================================
[   14.342121] ==================================================================
[   14.342442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.342987] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.343331] 
[   14.343505] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.343554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.343568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.343602] Call Trace:
[   14.343623]  <TASK>
[   14.343676]  dump_stack_lvl+0x73/0xb0
[   14.343707]  print_report+0xd1/0x650
[   14.343733]  ? __virt_addr_valid+0x1db/0x2d0
[   14.343791]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.343813]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.343835]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.343867]  kasan_report+0x141/0x180
[   14.343889]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.343916]  __asan_report_load4_noabort+0x18/0x20
[   14.343959]  kasan_atomics_helper+0x4a84/0x5450
[   14.343982]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.344004]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.344031]  ? kasan_atomics+0x152/0x310
[   14.344057]  kasan_atomics+0x1dc/0x310
[   14.344081]  ? __pfx_kasan_atomics+0x10/0x10
[   14.344103]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.344130]  ? __pfx_read_tsc+0x10/0x10
[   14.344153]  ? ktime_get_ts64+0x86/0x230
[   14.344178]  kunit_try_run_case+0x1a5/0x480
[   14.344204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.344227]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.344249]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.344272]  ? __kthread_parkme+0x82/0x180
[   14.344293]  ? preempt_count_sub+0x50/0x80
[   14.344340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.344363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.344409]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.344433]  kthread+0x337/0x6f0
[   14.344452]  ? trace_preempt_on+0x20/0xc0
[   14.344478]  ? __pfx_kthread+0x10/0x10
[   14.344498]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.344520]  ? calculate_sigpending+0x7b/0xa0
[   14.344545]  ? __pfx_kthread+0x10/0x10
[   14.344567]  ret_from_fork+0x116/0x1d0
[   14.344586]  ? __pfx_kthread+0x10/0x10
[   14.344606]  ret_from_fork_asm+0x1a/0x30
[   14.344639]  </TASK>
[   14.344650] 
[   14.353559] Allocated by task 282:
[   14.353873]  kasan_save_stack+0x45/0x70
[   14.354066]  kasan_save_track+0x18/0x40
[   14.354307]  kasan_save_alloc_info+0x3b/0x50
[   14.354639]  __kasan_kmalloc+0xb7/0xc0
[   14.354863]  __kmalloc_cache_noprof+0x189/0x420
[   14.355127]  kasan_atomics+0x95/0x310
[   14.355317]  kunit_try_run_case+0x1a5/0x480
[   14.355479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.355953]  kthread+0x337/0x6f0
[   14.356153]  ret_from_fork+0x116/0x1d0
[   14.356291]  ret_from_fork_asm+0x1a/0x30
[   14.356472] 
[   14.356572] The buggy address belongs to the object at ffff8881025a0d80
[   14.356572]  which belongs to the cache kmalloc-64 of size 64
[   14.357187] The buggy address is located 0 bytes to the right of
[   14.357187]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.357562] 
[   14.357639] The buggy address belongs to the physical page:
[   14.357814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.358509] flags: 0x200000000000000(node=0|zone=2)
[   14.358945] page_type: f5(slab)
[   14.359075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.359308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.359947] page dumped because: kasan: bad access detected
[   14.360194] 
[   14.360266] Memory state around the buggy address:
[   14.360621]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.361060]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.361429] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.361748]                                      ^
[   14.362140]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.362554]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.362812] ==================================================================
[   15.223053] ==================================================================
[   15.223635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.224005] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.224346] 
[   15.224452] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.224498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.224512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.224534] Call Trace:
[   15.224552]  <TASK>
[   15.224571]  dump_stack_lvl+0x73/0xb0
[   15.224600]  print_report+0xd1/0x650
[   15.224623]  ? __virt_addr_valid+0x1db/0x2d0
[   15.224647]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.224669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.224691]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.224713]  kasan_report+0x141/0x180
[   15.224735]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.224774]  kasan_check_range+0x10c/0x1c0
[   15.224798]  __kasan_check_write+0x18/0x20
[   15.224818]  kasan_atomics_helper+0x20c8/0x5450
[   15.224851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.224874]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.224900]  ? kasan_atomics+0x152/0x310
[   15.224927]  kasan_atomics+0x1dc/0x310
[   15.224949]  ? __pfx_kasan_atomics+0x10/0x10
[   15.224972]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.224999]  ? __pfx_read_tsc+0x10/0x10
[   15.225021]  ? ktime_get_ts64+0x86/0x230
[   15.225045]  kunit_try_run_case+0x1a5/0x480
[   15.225071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.225095]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.225118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.225141]  ? __kthread_parkme+0x82/0x180
[   15.225162]  ? preempt_count_sub+0x50/0x80
[   15.225187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.225211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.225234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.225258]  kthread+0x337/0x6f0
[   15.225278]  ? trace_preempt_on+0x20/0xc0
[   15.225304]  ? __pfx_kthread+0x10/0x10
[   15.225331]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.225353]  ? calculate_sigpending+0x7b/0xa0
[   15.225391]  ? __pfx_kthread+0x10/0x10
[   15.225412]  ret_from_fork+0x116/0x1d0
[   15.225432]  ? __pfx_kthread+0x10/0x10
[   15.225453]  ret_from_fork_asm+0x1a/0x30
[   15.225484]  </TASK>
[   15.225495] 
[   15.233331] Allocated by task 282:
[   15.233530]  kasan_save_stack+0x45/0x70
[   15.233854]  kasan_save_track+0x18/0x40
[   15.234051]  kasan_save_alloc_info+0x3b/0x50
[   15.234476]  __kasan_kmalloc+0xb7/0xc0
[   15.234625]  __kmalloc_cache_noprof+0x189/0x420
[   15.234781]  kasan_atomics+0x95/0x310
[   15.234945]  kunit_try_run_case+0x1a5/0x480
[   15.235175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.235435]  kthread+0x337/0x6f0
[   15.235603]  ret_from_fork+0x116/0x1d0
[   15.235762]  ret_from_fork_asm+0x1a/0x30
[   15.235901] 
[   15.235973] The buggy address belongs to the object at ffff8881025a0d80
[   15.235973]  which belongs to the cache kmalloc-64 of size 64
[   15.236587] The buggy address is located 0 bytes to the right of
[   15.236587]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.237147] 
[   15.237259] The buggy address belongs to the physical page:
[   15.237543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.237885] flags: 0x200000000000000(node=0|zone=2)
[   15.238074] page_type: f5(slab)
[   15.238253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.238592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.238917] page dumped because: kasan: bad access detected
[   15.239179] 
[   15.239279] Memory state around the buggy address:
[   15.239951]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.240531]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.241269] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.241744]                                      ^
[   15.241987]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.242281]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.242781] ==================================================================
[   14.760064] ==================================================================
[   14.760680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.761068] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.761586] 
[   14.761831] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.761886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.761900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.761934] Call Trace:
[   14.761949]  <TASK>
[   14.761965]  dump_stack_lvl+0x73/0xb0
[   14.761997]  print_report+0xd1/0x650
[   14.762021]  ? __virt_addr_valid+0x1db/0x2d0
[   14.762045]  ? kasan_atomics_helper+0x1467/0x5450
[   14.762066]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.762089]  ? kasan_atomics_helper+0x1467/0x5450
[   14.762111]  kasan_report+0x141/0x180
[   14.762133]  ? kasan_atomics_helper+0x1467/0x5450
[   14.762159]  kasan_check_range+0x10c/0x1c0
[   14.762183]  __kasan_check_write+0x18/0x20
[   14.762203]  kasan_atomics_helper+0x1467/0x5450
[   14.762227]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.762249]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.762274]  ? kasan_atomics+0x152/0x310
[   14.762301]  kasan_atomics+0x1dc/0x310
[   14.762324]  ? __pfx_kasan_atomics+0x10/0x10
[   14.762347]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.762386]  ? __pfx_read_tsc+0x10/0x10
[   14.762408]  ? ktime_get_ts64+0x86/0x230
[   14.762434]  kunit_try_run_case+0x1a5/0x480
[   14.762458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.762482]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.762505]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.762528]  ? __kthread_parkme+0x82/0x180
[   14.762549]  ? preempt_count_sub+0x50/0x80
[   14.762574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.762605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.762628]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.762653]  kthread+0x337/0x6f0
[   14.762673]  ? trace_preempt_on+0x20/0xc0
[   14.762697]  ? __pfx_kthread+0x10/0x10
[   14.762718]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.762739]  ? calculate_sigpending+0x7b/0xa0
[   14.762765]  ? __pfx_kthread+0x10/0x10
[   14.762786]  ret_from_fork+0x116/0x1d0
[   14.762805]  ? __pfx_kthread+0x10/0x10
[   14.762827]  ret_from_fork_asm+0x1a/0x30
[   14.762857]  </TASK>
[   14.762868] 
[   14.770157] Allocated by task 282:
[   14.770314]  kasan_save_stack+0x45/0x70
[   14.770475]  kasan_save_track+0x18/0x40
[   14.770613]  kasan_save_alloc_info+0x3b/0x50
[   14.770816]  __kasan_kmalloc+0xb7/0xc0
[   14.771007]  __kmalloc_cache_noprof+0x189/0x420
[   14.771355]  kasan_atomics+0x95/0x310
[   14.771499]  kunit_try_run_case+0x1a5/0x480
[   14.771687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.771940]  kthread+0x337/0x6f0
[   14.772117]  ret_from_fork+0x116/0x1d0
[   14.772313]  ret_from_fork_asm+0x1a/0x30
[   14.772487] 
[   14.772563] The buggy address belongs to the object at ffff8881025a0d80
[   14.772563]  which belongs to the cache kmalloc-64 of size 64
[   14.772909] The buggy address is located 0 bytes to the right of
[   14.772909]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.773420] 
[   14.773515] The buggy address belongs to the physical page:
[   14.773856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.774179] flags: 0x200000000000000(node=0|zone=2)
[   14.774392] page_type: f5(slab)
[   14.774554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.774814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.775041] page dumped because: kasan: bad access detected
[   14.775263] 
[   14.775357] Memory state around the buggy address:
[   14.775652]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.776014]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.776354] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.776725]                                      ^
[   14.776941]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.777280]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.777602] ==================================================================
[   14.117339] ==================================================================
[   14.117791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.118228] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.118529] 
[   14.118654] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.118699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.118712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.118736] Call Trace:
[   14.118754]  <TASK>
[   14.118772]  dump_stack_lvl+0x73/0xb0
[   14.118801]  print_report+0xd1/0x650
[   14.118824]  ? __virt_addr_valid+0x1db/0x2d0
[   14.118848]  ? kasan_atomics_helper+0x697/0x5450
[   14.118870]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.118893]  ? kasan_atomics_helper+0x697/0x5450
[   14.118934]  kasan_report+0x141/0x180
[   14.118957]  ? kasan_atomics_helper+0x697/0x5450
[   14.118983]  kasan_check_range+0x10c/0x1c0
[   14.119007]  __kasan_check_write+0x18/0x20
[   14.119027]  kasan_atomics_helper+0x697/0x5450
[   14.119051]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.119072]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.119098]  ? kasan_atomics+0x152/0x310
[   14.119125]  kasan_atomics+0x1dc/0x310
[   14.119147]  ? __pfx_kasan_atomics+0x10/0x10
[   14.119169]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.119196]  ? __pfx_read_tsc+0x10/0x10
[   14.119218]  ? ktime_get_ts64+0x86/0x230
[   14.119243]  kunit_try_run_case+0x1a5/0x480
[   14.119267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.119290]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.119312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.119334]  ? __kthread_parkme+0x82/0x180
[   14.119356]  ? preempt_count_sub+0x50/0x80
[   14.119388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.119413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.119436]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.119460]  kthread+0x337/0x6f0
[   14.119480]  ? trace_preempt_on+0x20/0xc0
[   14.119504]  ? __pfx_kthread+0x10/0x10
[   14.119525]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.119546]  ? calculate_sigpending+0x7b/0xa0
[   14.119586]  ? __pfx_kthread+0x10/0x10
[   14.119607]  ret_from_fork+0x116/0x1d0
[   14.119626]  ? __pfx_kthread+0x10/0x10
[   14.119646]  ret_from_fork_asm+0x1a/0x30
[   14.119677]  </TASK>
[   14.119688] 
[   14.127585] Allocated by task 282:
[   14.127765]  kasan_save_stack+0x45/0x70
[   14.127950]  kasan_save_track+0x18/0x40
[   14.128110]  kasan_save_alloc_info+0x3b/0x50
[   14.128308]  __kasan_kmalloc+0xb7/0xc0
[   14.128475]  __kmalloc_cache_noprof+0x189/0x420
[   14.128664]  kasan_atomics+0x95/0x310
[   14.128827]  kunit_try_run_case+0x1a5/0x480
[   14.129034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.129211]  kthread+0x337/0x6f0
[   14.129330]  ret_from_fork+0x116/0x1d0
[   14.129534]  ret_from_fork_asm+0x1a/0x30
[   14.129751] 
[   14.129850] The buggy address belongs to the object at ffff8881025a0d80
[   14.129850]  which belongs to the cache kmalloc-64 of size 64
[   14.130425] The buggy address is located 0 bytes to the right of
[   14.130425]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.130814] 
[   14.130889] The buggy address belongs to the physical page:
[   14.131062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.131299] flags: 0x200000000000000(node=0|zone=2)
[   14.131534] page_type: f5(slab)
[   14.131723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.132055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.132611] page dumped because: kasan: bad access detected
[   14.132858] 
[   14.132951] Memory state around the buggy address:
[   14.133272]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.133699]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.133916] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.134127]                                      ^
[   14.134582]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.134933]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.135287] ==================================================================
[   14.959596] ==================================================================
[   14.959987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.960339] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.960591] 
[   14.960761] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.960836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.960850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.960873] Call Trace:
[   14.960901]  <TASK>
[   14.960918]  dump_stack_lvl+0x73/0xb0
[   14.960947]  print_report+0xd1/0x650
[   14.960971]  ? __virt_addr_valid+0x1db/0x2d0
[   14.960994]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.961016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.961038]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.961060]  kasan_report+0x141/0x180
[   14.961112]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.961139]  kasan_check_range+0x10c/0x1c0
[   14.961163]  __kasan_check_write+0x18/0x20
[   14.961194]  kasan_atomics_helper+0x19e3/0x5450
[   14.961217]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.961241]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.961266]  ? kasan_atomics+0x152/0x310
[   14.961293]  kasan_atomics+0x1dc/0x310
[   14.961316]  ? __pfx_kasan_atomics+0x10/0x10
[   14.961339]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.961366]  ? __pfx_read_tsc+0x10/0x10
[   14.961397]  ? ktime_get_ts64+0x86/0x230
[   14.961423]  kunit_try_run_case+0x1a5/0x480
[   14.961448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.961472]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.961494]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.961518]  ? __kthread_parkme+0x82/0x180
[   14.961539]  ? preempt_count_sub+0x50/0x80
[   14.961563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.961600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.961624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.961647]  kthread+0x337/0x6f0
[   14.961668]  ? trace_preempt_on+0x20/0xc0
[   14.961694]  ? __pfx_kthread+0x10/0x10
[   14.961715]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.961737]  ? calculate_sigpending+0x7b/0xa0
[   14.961762]  ? __pfx_kthread+0x10/0x10
[   14.961784]  ret_from_fork+0x116/0x1d0
[   14.961803]  ? __pfx_kthread+0x10/0x10
[   14.961824]  ret_from_fork_asm+0x1a/0x30
[   14.961855]  </TASK>
[   14.961867] 
[   14.970208] Allocated by task 282:
[   14.970426]  kasan_save_stack+0x45/0x70
[   14.970650]  kasan_save_track+0x18/0x40
[   14.970838]  kasan_save_alloc_info+0x3b/0x50
[   14.971045]  __kasan_kmalloc+0xb7/0xc0
[   14.971282]  __kmalloc_cache_noprof+0x189/0x420
[   14.971593]  kasan_atomics+0x95/0x310
[   14.971775]  kunit_try_run_case+0x1a5/0x480
[   14.971966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.972177]  kthread+0x337/0x6f0
[   14.972354]  ret_from_fork+0x116/0x1d0
[   14.972541]  ret_from_fork_asm+0x1a/0x30
[   14.972763] 
[   14.972869] The buggy address belongs to the object at ffff8881025a0d80
[   14.972869]  which belongs to the cache kmalloc-64 of size 64
[   14.973386] The buggy address is located 0 bytes to the right of
[   14.973386]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.973806] 
[   14.973906] The buggy address belongs to the physical page:
[   14.974213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.974569] flags: 0x200000000000000(node=0|zone=2)
[   14.974837] page_type: f5(slab)
[   14.975066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.975333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.975573] page dumped because: kasan: bad access detected
[   14.975857] 
[   14.976031] Memory state around the buggy address:
[   14.976352]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.976827]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.977055] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.977274]                                      ^
[   14.977519]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.978188]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.978497] ==================================================================
[   14.135800] ==================================================================
[   14.136110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.136599] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.136870] 
[   14.136980] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.137024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.137038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.137061] Call Trace:
[   14.137075]  <TASK>
[   14.137091]  dump_stack_lvl+0x73/0xb0
[   14.137119]  print_report+0xd1/0x650
[   14.137145]  ? __virt_addr_valid+0x1db/0x2d0
[   14.137188]  ? kasan_atomics_helper+0x72f/0x5450
[   14.137210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.137232]  ? kasan_atomics_helper+0x72f/0x5450
[   14.137255]  kasan_report+0x141/0x180
[   14.137278]  ? kasan_atomics_helper+0x72f/0x5450
[   14.137305]  kasan_check_range+0x10c/0x1c0
[   14.137329]  __kasan_check_write+0x18/0x20
[   14.137349]  kasan_atomics_helper+0x72f/0x5450
[   14.137381]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.137405]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.137430]  ? kasan_atomics+0x152/0x310
[   14.137456]  kasan_atomics+0x1dc/0x310
[   14.137480]  ? __pfx_kasan_atomics+0x10/0x10
[   14.137502]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.137528]  ? __pfx_read_tsc+0x10/0x10
[   14.137549]  ? ktime_get_ts64+0x86/0x230
[   14.137593]  kunit_try_run_case+0x1a5/0x480
[   14.137617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.137640]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.137662]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.137691]  ? __kthread_parkme+0x82/0x180
[   14.137712]  ? preempt_count_sub+0x50/0x80
[   14.137750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.137775]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.137798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.137821]  kthread+0x337/0x6f0
[   14.137841]  ? trace_preempt_on+0x20/0xc0
[   14.137865]  ? __pfx_kthread+0x10/0x10
[   14.137886]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.137920]  ? calculate_sigpending+0x7b/0xa0
[   14.137945]  ? __pfx_kthread+0x10/0x10
[   14.137966]  ret_from_fork+0x116/0x1d0
[   14.137985]  ? __pfx_kthread+0x10/0x10
[   14.138005]  ret_from_fork_asm+0x1a/0x30
[   14.138035]  </TASK>
[   14.138046] 
[   14.146085] Allocated by task 282:
[   14.146328]  kasan_save_stack+0x45/0x70
[   14.146488]  kasan_save_track+0x18/0x40
[   14.146704]  kasan_save_alloc_info+0x3b/0x50
[   14.146917]  __kasan_kmalloc+0xb7/0xc0
[   14.147121]  __kmalloc_cache_noprof+0x189/0x420
[   14.147299]  kasan_atomics+0x95/0x310
[   14.147487]  kunit_try_run_case+0x1a5/0x480
[   14.147705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.147959]  kthread+0x337/0x6f0
[   14.148140]  ret_from_fork+0x116/0x1d0
[   14.148336]  ret_from_fork_asm+0x1a/0x30
[   14.148503] 
[   14.148604] The buggy address belongs to the object at ffff8881025a0d80
[   14.148604]  which belongs to the cache kmalloc-64 of size 64
[   14.148983] The buggy address is located 0 bytes to the right of
[   14.148983]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.149347] 
[   14.149447] The buggy address belongs to the physical page:
[   14.149831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.150240] flags: 0x200000000000000(node=0|zone=2)
[   14.150484] page_type: f5(slab)
[   14.150674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.151005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.151404] page dumped because: kasan: bad access detected
[   14.151602] 
[   14.151673] Memory state around the buggy address:
[   14.151831]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.152070]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.152286] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.152914]                                      ^
[   14.153141]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.153470]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.153865] ==================================================================
[   14.979623] ==================================================================
[   14.980190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.980588] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.980857] 
[   14.980947] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.980992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.981006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.981028] Call Trace:
[   14.981045]  <TASK>
[   14.981064]  dump_stack_lvl+0x73/0xb0
[   14.981093]  print_report+0xd1/0x650
[   14.981117]  ? __virt_addr_valid+0x1db/0x2d0
[   14.981140]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.981162]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.981184]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.981206]  kasan_report+0x141/0x180
[   14.981229]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.981255]  kasan_check_range+0x10c/0x1c0
[   14.981279]  __kasan_check_write+0x18/0x20
[   14.981299]  kasan_atomics_helper+0x1a7f/0x5450
[   14.981322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.981345]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.981370]  ? kasan_atomics+0x152/0x310
[   14.981409]  kasan_atomics+0x1dc/0x310
[   14.981432]  ? __pfx_kasan_atomics+0x10/0x10
[   14.981455]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.981482]  ? __pfx_read_tsc+0x10/0x10
[   14.981504]  ? ktime_get_ts64+0x86/0x230
[   14.981530]  kunit_try_run_case+0x1a5/0x480
[   14.981554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.981614]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.981637]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.981672]  ? __kthread_parkme+0x82/0x180
[   14.981693]  ? preempt_count_sub+0x50/0x80
[   14.981717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.981741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.981765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.981789]  kthread+0x337/0x6f0
[   14.981809]  ? trace_preempt_on+0x20/0xc0
[   14.981834]  ? __pfx_kthread+0x10/0x10
[   14.981855]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.981878]  ? calculate_sigpending+0x7b/0xa0
[   14.981903]  ? __pfx_kthread+0x10/0x10
[   14.981925]  ret_from_fork+0x116/0x1d0
[   14.981944]  ? __pfx_kthread+0x10/0x10
[   14.981965]  ret_from_fork_asm+0x1a/0x30
[   14.981996]  </TASK>
[   14.982008] 
[   14.990428] Allocated by task 282:
[   14.990659]  kasan_save_stack+0x45/0x70
[   14.990920]  kasan_save_track+0x18/0x40
[   14.991120]  kasan_save_alloc_info+0x3b/0x50
[   14.991391]  __kasan_kmalloc+0xb7/0xc0
[   14.991573]  __kmalloc_cache_noprof+0x189/0x420
[   14.991809]  kasan_atomics+0x95/0x310
[   14.991975]  kunit_try_run_case+0x1a5/0x480
[   14.992267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.992651]  kthread+0x337/0x6f0
[   14.992844]  ret_from_fork+0x116/0x1d0
[   14.992983]  ret_from_fork_asm+0x1a/0x30
[   14.993170] 
[   14.993297] The buggy address belongs to the object at ffff8881025a0d80
[   14.993297]  which belongs to the cache kmalloc-64 of size 64
[   14.993864] The buggy address is located 0 bytes to the right of
[   14.993864]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.994420] 
[   14.994524] The buggy address belongs to the physical page:
[   14.995008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.995258] flags: 0x200000000000000(node=0|zone=2)
[   14.995460] page_type: f5(slab)
[   14.995682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.996034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.996499] page dumped because: kasan: bad access detected
[   14.996762] 
[   14.996837] Memory state around the buggy address:
[   14.996995]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.997300]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.997674] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.998057]                                      ^
[   14.998334]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.998724]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.999094] ==================================================================
[   15.285761] ==================================================================
[   15.286111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.286350] Read of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.286868] 
[   15.286978] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.287021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.287033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.287080] Call Trace:
[   15.287096]  <TASK>
[   15.287114]  dump_stack_lvl+0x73/0xb0
[   15.287145]  print_report+0xd1/0x650
[   15.287168]  ? __virt_addr_valid+0x1db/0x2d0
[   15.287192]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.287214]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.287236]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.287258]  kasan_report+0x141/0x180
[   15.287280]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.287309]  __asan_report_load8_noabort+0x18/0x20
[   15.287332]  kasan_atomics_helper+0x4fa5/0x5450
[   15.287355]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.287388]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.287413]  ? kasan_atomics+0x152/0x310
[   15.287440]  kasan_atomics+0x1dc/0x310
[   15.287462]  ? __pfx_kasan_atomics+0x10/0x10
[   15.287485]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.287531]  ? __pfx_read_tsc+0x10/0x10
[   15.287553]  ? ktime_get_ts64+0x86/0x230
[   15.287578]  kunit_try_run_case+0x1a5/0x480
[   15.287609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.287632]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.287654]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.287677]  ? __kthread_parkme+0x82/0x180
[   15.287699]  ? preempt_count_sub+0x50/0x80
[   15.287723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.287746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.287769]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.287812]  kthread+0x337/0x6f0
[   15.287832]  ? trace_preempt_on+0x20/0xc0
[   15.287856]  ? __pfx_kthread+0x10/0x10
[   15.287877]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.287899]  ? calculate_sigpending+0x7b/0xa0
[   15.287924]  ? __pfx_kthread+0x10/0x10
[   15.287945]  ret_from_fork+0x116/0x1d0
[   15.287963]  ? __pfx_kthread+0x10/0x10
[   15.287984]  ret_from_fork_asm+0x1a/0x30
[   15.288015]  </TASK>
[   15.288026] 
[   15.295349] Allocated by task 282:
[   15.295530]  kasan_save_stack+0x45/0x70
[   15.295723]  kasan_save_track+0x18/0x40
[   15.296062]  kasan_save_alloc_info+0x3b/0x50
[   15.296275]  __kasan_kmalloc+0xb7/0xc0
[   15.296459]  __kmalloc_cache_noprof+0x189/0x420
[   15.296727]  kasan_atomics+0x95/0x310
[   15.296914]  kunit_try_run_case+0x1a5/0x480
[   15.297062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.297303]  kthread+0x337/0x6f0
[   15.297485]  ret_from_fork+0x116/0x1d0
[   15.297722]  ret_from_fork_asm+0x1a/0x30
[   15.297887] 
[   15.297982] The buggy address belongs to the object at ffff8881025a0d80
[   15.297982]  which belongs to the cache kmalloc-64 of size 64
[   15.298401] The buggy address is located 0 bytes to the right of
[   15.298401]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.298901] 
[   15.298998] The buggy address belongs to the physical page:
[   15.299241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.299501] flags: 0x200000000000000(node=0|zone=2)
[   15.299955] page_type: f5(slab)
[   15.300084] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.300315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.300555] page dumped because: kasan: bad access detected
[   15.300821] 
[   15.300915] Memory state around the buggy address:
[   15.301132]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.301459]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.301953] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.302164]                                      ^
[   15.302318]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.302595]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.302910] ==================================================================
[   13.979286] ==================================================================
[   13.979587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.979942] Read of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   13.980279] 
[   13.980400] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.980441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.980453] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.980474] Call Trace:
[   13.980490]  <TASK>
[   13.980505]  dump_stack_lvl+0x73/0xb0
[   13.980532]  print_report+0xd1/0x650
[   13.980555]  ? __virt_addr_valid+0x1db/0x2d0
[   13.980633]  ? kasan_atomics_helper+0x3df/0x5450
[   13.980657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.980680]  ? kasan_atomics_helper+0x3df/0x5450
[   13.980702]  kasan_report+0x141/0x180
[   13.980726]  ? kasan_atomics_helper+0x3df/0x5450
[   13.980753]  kasan_check_range+0x10c/0x1c0
[   13.980778]  __kasan_check_read+0x15/0x20
[   13.980797]  kasan_atomics_helper+0x3df/0x5450
[   13.980820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.980843]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.980870]  ? kasan_atomics+0x152/0x310
[   13.980897]  kasan_atomics+0x1dc/0x310
[   13.980957]  ? __pfx_kasan_atomics+0x10/0x10
[   13.980982]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   13.981008]  ? __pfx_read_tsc+0x10/0x10
[   13.981030]  ? ktime_get_ts64+0x86/0x230
[   13.981055]  kunit_try_run_case+0x1a5/0x480
[   13.981080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.981102]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   13.981125]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.981148]  ? __kthread_parkme+0x82/0x180
[   13.981169]  ? preempt_count_sub+0x50/0x80
[   13.981194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.981218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.981242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.981266]  kthread+0x337/0x6f0
[   13.981285]  ? trace_preempt_on+0x20/0xc0
[   13.981310]  ? __pfx_kthread+0x10/0x10
[   13.981331]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.981353]  ? calculate_sigpending+0x7b/0xa0
[   13.981389]  ? __pfx_kthread+0x10/0x10
[   13.981411]  ret_from_fork+0x116/0x1d0
[   13.981430]  ? __pfx_kthread+0x10/0x10
[   13.981451]  ret_from_fork_asm+0x1a/0x30
[   13.981482]  </TASK>
[   13.981494] 
[   13.991599] Allocated by task 282:
[   13.991909]  kasan_save_stack+0x45/0x70
[   13.992327]  kasan_save_track+0x18/0x40
[   13.992761]  kasan_save_alloc_info+0x3b/0x50
[   13.993211]  __kasan_kmalloc+0xb7/0xc0
[   13.993577]  __kmalloc_cache_noprof+0x189/0x420
[   13.994013]  kasan_atomics+0x95/0x310
[   13.994412]  kunit_try_run_case+0x1a5/0x480
[   13.994820]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.995352]  kthread+0x337/0x6f0
[   13.995733]  ret_from_fork+0x116/0x1d0
[   13.995928]  ret_from_fork_asm+0x1a/0x30
[   13.996271] 
[   13.996445] The buggy address belongs to the object at ffff8881025a0d80
[   13.996445]  which belongs to the cache kmalloc-64 of size 64
[   13.997650] The buggy address is located 0 bytes to the right of
[   13.997650]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   13.998121] 
[   13.998199] The buggy address belongs to the physical page:
[   13.998403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   13.998681] flags: 0x200000000000000(node=0|zone=2)
[   13.999140] page_type: f5(slab)
[   13.999484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.000204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.000993] page dumped because: kasan: bad access detected
[   14.001602] 
[   14.001803] Memory state around the buggy address:
[   14.002295]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.002946]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.003626] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.004162]                                      ^
[   14.004647]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.005121]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.005693] ==================================================================
[   14.834512] ==================================================================
[   14.834915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.835240] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.835689] 
[   14.835831] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.835875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.835888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.836012] Call Trace:
[   14.836029]  <TASK>
[   14.836046]  dump_stack_lvl+0x73/0xb0
[   14.836074]  print_report+0xd1/0x650
[   14.836106]  ? __virt_addr_valid+0x1db/0x2d0
[   14.836129]  ? kasan_atomics_helper+0x164f/0x5450
[   14.836153]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.836176]  ? kasan_atomics_helper+0x164f/0x5450
[   14.836199]  kasan_report+0x141/0x180
[   14.836221]  ? kasan_atomics_helper+0x164f/0x5450
[   14.836249]  kasan_check_range+0x10c/0x1c0
[   14.836273]  __kasan_check_write+0x18/0x20
[   14.836294]  kasan_atomics_helper+0x164f/0x5450
[   14.836317]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.836340]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.836367]  ? kasan_atomics+0x152/0x310
[   14.836414]  kasan_atomics+0x1dc/0x310
[   14.836438]  ? __pfx_kasan_atomics+0x10/0x10
[   14.836461]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.836488]  ? __pfx_read_tsc+0x10/0x10
[   14.836511]  ? ktime_get_ts64+0x86/0x230
[   14.836535]  kunit_try_run_case+0x1a5/0x480
[   14.836560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.836592]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.836615]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.836640]  ? __kthread_parkme+0x82/0x180
[   14.836661]  ? preempt_count_sub+0x50/0x80
[   14.836686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.836709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.836734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.836757]  kthread+0x337/0x6f0
[   14.836777]  ? trace_preempt_on+0x20/0xc0
[   14.836803]  ? __pfx_kthread+0x10/0x10
[   14.836824]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.836846]  ? calculate_sigpending+0x7b/0xa0
[   14.836870]  ? __pfx_kthread+0x10/0x10
[   14.836892]  ret_from_fork+0x116/0x1d0
[   14.836912]  ? __pfx_kthread+0x10/0x10
[   14.836933]  ret_from_fork_asm+0x1a/0x30
[   14.836964]  </TASK>
[   14.836976] 
[   14.845207] Allocated by task 282:
[   14.845335]  kasan_save_stack+0x45/0x70
[   14.845489]  kasan_save_track+0x18/0x40
[   14.845624]  kasan_save_alloc_info+0x3b/0x50
[   14.845806]  __kasan_kmalloc+0xb7/0xc0
[   14.846009]  __kmalloc_cache_noprof+0x189/0x420
[   14.846225]  kasan_atomics+0x95/0x310
[   14.846419]  kunit_try_run_case+0x1a5/0x480
[   14.846669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.846927]  kthread+0x337/0x6f0
[   14.847092]  ret_from_fork+0x116/0x1d0
[   14.847277]  ret_from_fork_asm+0x1a/0x30
[   14.847479] 
[   14.847585] The buggy address belongs to the object at ffff8881025a0d80
[   14.847585]  which belongs to the cache kmalloc-64 of size 64
[   14.848074] The buggy address is located 0 bytes to the right of
[   14.848074]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.848732] 
[   14.848832] The buggy address belongs to the physical page:
[   14.849076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.849429] flags: 0x200000000000000(node=0|zone=2)
[   14.849669] page_type: f5(slab)
[   14.849787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.850011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.850228] page dumped because: kasan: bad access detected
[   14.850410] 
[   14.850507] Memory state around the buggy address:
[   14.850939]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.851300]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.851688] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.852020]                                      ^
[   14.852254]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.852519]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.853012] ==================================================================
[   14.778421] ==================================================================
[   14.778903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.779262] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.779653] 
[   14.779780] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.779825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.779838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.779861] Call Trace:
[   14.779875]  <TASK>
[   14.779893]  dump_stack_lvl+0x73/0xb0
[   14.779921]  print_report+0xd1/0x650
[   14.779946]  ? __virt_addr_valid+0x1db/0x2d0
[   14.779969]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.779991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.780014]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.780035]  kasan_report+0x141/0x180
[   14.780057]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.780083]  __asan_report_store8_noabort+0x1b/0x30
[   14.780105]  kasan_atomics_helper+0x50d4/0x5450
[   14.780127]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.780149]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.780175]  ? kasan_atomics+0x152/0x310
[   14.780202]  kasan_atomics+0x1dc/0x310
[   14.780248]  ? __pfx_kasan_atomics+0x10/0x10
[   14.780270]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.780297]  ? __pfx_read_tsc+0x10/0x10
[   14.780320]  ? ktime_get_ts64+0x86/0x230
[   14.780356]  kunit_try_run_case+0x1a5/0x480
[   14.780391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.780417]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.780439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.780462]  ? __kthread_parkme+0x82/0x180
[   14.780483]  ? preempt_count_sub+0x50/0x80
[   14.780508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.780532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.780555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.780587]  kthread+0x337/0x6f0
[   14.780606]  ? trace_preempt_on+0x20/0xc0
[   14.780632]  ? __pfx_kthread+0x10/0x10
[   14.780653]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.780674]  ? calculate_sigpending+0x7b/0xa0
[   14.780698]  ? __pfx_kthread+0x10/0x10
[   14.780719]  ret_from_fork+0x116/0x1d0
[   14.780738]  ? __pfx_kthread+0x10/0x10
[   14.780759]  ret_from_fork_asm+0x1a/0x30
[   14.780790]  </TASK>
[   14.780802] 
[   14.788535] Allocated by task 282:
[   14.788731]  kasan_save_stack+0x45/0x70
[   14.788878]  kasan_save_track+0x18/0x40
[   14.789015]  kasan_save_alloc_info+0x3b/0x50
[   14.789164]  __kasan_kmalloc+0xb7/0xc0
[   14.789297]  __kmalloc_cache_noprof+0x189/0x420
[   14.789510]  kasan_atomics+0x95/0x310
[   14.789728]  kunit_try_run_case+0x1a5/0x480
[   14.789957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.790205]  kthread+0x337/0x6f0
[   14.790403]  ret_from_fork+0x116/0x1d0
[   14.790586]  ret_from_fork_asm+0x1a/0x30
[   14.790812] 
[   14.790912] The buggy address belongs to the object at ffff8881025a0d80
[   14.790912]  which belongs to the cache kmalloc-64 of size 64
[   14.791451] The buggy address is located 0 bytes to the right of
[   14.791451]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.792031] 
[   14.792126] The buggy address belongs to the physical page:
[   14.792429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.792977] flags: 0x200000000000000(node=0|zone=2)
[   14.793213] page_type: f5(slab)
[   14.793335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.793589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.793950] page dumped because: kasan: bad access detected
[   14.794220] 
[   14.794321] Memory state around the buggy address:
[   14.794563]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.794809]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.795017] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.795220]                                      ^
[   14.795367]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.795711]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.796061] ==================================================================
[   15.267630] ==================================================================
[   15.268236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.268601] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.268926] 
[   15.269038] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.269083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.269097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.269119] Call Trace:
[   15.269137]  <TASK>
[   15.269157]  dump_stack_lvl+0x73/0xb0
[   15.269184]  print_report+0xd1/0x650
[   15.269230]  ? __virt_addr_valid+0x1db/0x2d0
[   15.269254]  ? kasan_atomics_helper+0x218a/0x5450
[   15.269275]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.269297]  ? kasan_atomics_helper+0x218a/0x5450
[   15.269319]  kasan_report+0x141/0x180
[   15.269341]  ? kasan_atomics_helper+0x218a/0x5450
[   15.269397]  kasan_check_range+0x10c/0x1c0
[   15.269422]  __kasan_check_write+0x18/0x20
[   15.269441]  kasan_atomics_helper+0x218a/0x5450
[   15.269464]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.269486]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.269512]  ? kasan_atomics+0x152/0x310
[   15.269539]  kasan_atomics+0x1dc/0x310
[   15.269561]  ? __pfx_kasan_atomics+0x10/0x10
[   15.269592]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.269620]  ? __pfx_read_tsc+0x10/0x10
[   15.269642]  ? ktime_get_ts64+0x86/0x230
[   15.269668]  kunit_try_run_case+0x1a5/0x480
[   15.269692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.269715]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.269758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.269782]  ? __kthread_parkme+0x82/0x180
[   15.269804]  ? preempt_count_sub+0x50/0x80
[   15.269828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.269852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.269875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.269899]  kthread+0x337/0x6f0
[   15.269919]  ? trace_preempt_on+0x20/0xc0
[   15.269944]  ? __pfx_kthread+0x10/0x10
[   15.269966]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.269988]  ? calculate_sigpending+0x7b/0xa0
[   15.270014]  ? __pfx_kthread+0x10/0x10
[   15.270036]  ret_from_fork+0x116/0x1d0
[   15.270055]  ? __pfx_kthread+0x10/0x10
[   15.270076]  ret_from_fork_asm+0x1a/0x30
[   15.270108]  </TASK>
[   15.270119] 
[   15.277628] Allocated by task 282:
[   15.277811]  kasan_save_stack+0x45/0x70
[   15.278030]  kasan_save_track+0x18/0x40
[   15.278362]  kasan_save_alloc_info+0x3b/0x50
[   15.278521]  __kasan_kmalloc+0xb7/0xc0
[   15.278653]  __kmalloc_cache_noprof+0x189/0x420
[   15.278869]  kasan_atomics+0x95/0x310
[   15.279057]  kunit_try_run_case+0x1a5/0x480
[   15.279331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.279523]  kthread+0x337/0x6f0
[   15.279725]  ret_from_fork+0x116/0x1d0
[   15.279916]  ret_from_fork_asm+0x1a/0x30
[   15.280107] 
[   15.280206] The buggy address belongs to the object at ffff8881025a0d80
[   15.280206]  which belongs to the cache kmalloc-64 of size 64
[   15.280756] The buggy address is located 0 bytes to the right of
[   15.280756]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.281206] 
[   15.281299] The buggy address belongs to the physical page:
[   15.281565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.281830] flags: 0x200000000000000(node=0|zone=2)
[   15.281996] page_type: f5(slab)
[   15.282175] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.282526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.283116] page dumped because: kasan: bad access detected
[   15.283383] 
[   15.283478] Memory state around the buggy address:
[   15.283690]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.283905]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.284118] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.284357]                                      ^
[   15.284612]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.284929]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.285259] ==================================================================
[   15.020604] ==================================================================
[   15.020909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.021886] Write of size 8 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   15.022230] 
[   15.022357] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.022447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.022462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.022485] Call Trace:
[   15.022515]  <TASK>
[   15.022533]  dump_stack_lvl+0x73/0xb0
[   15.022564]  print_report+0xd1/0x650
[   15.022587]  ? __virt_addr_valid+0x1db/0x2d0
[   15.022611]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.022633]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.022656]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.022678]  kasan_report+0x141/0x180
[   15.022700]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.022727]  kasan_check_range+0x10c/0x1c0
[   15.022751]  __kasan_check_write+0x18/0x20
[   15.022770]  kasan_atomics_helper+0x1c18/0x5450
[   15.022793]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.022816]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.022843]  ? kasan_atomics+0x152/0x310
[   15.022870]  kasan_atomics+0x1dc/0x310
[   15.022892]  ? __pfx_kasan_atomics+0x10/0x10
[   15.022915]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   15.022943]  ? __pfx_read_tsc+0x10/0x10
[   15.022965]  ? ktime_get_ts64+0x86/0x230
[   15.022990]  kunit_try_run_case+0x1a5/0x480
[   15.023015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023037]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   15.023060]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.023084]  ? __kthread_parkme+0x82/0x180
[   15.023105]  ? preempt_count_sub+0x50/0x80
[   15.023129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.023153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.023177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.023201]  kthread+0x337/0x6f0
[   15.023221]  ? trace_preempt_on+0x20/0xc0
[   15.023246]  ? __pfx_kthread+0x10/0x10
[   15.023267]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.023289]  ? calculate_sigpending+0x7b/0xa0
[   15.023397]  ? __pfx_kthread+0x10/0x10
[   15.023425]  ret_from_fork+0x116/0x1d0
[   15.023445]  ? __pfx_kthread+0x10/0x10
[   15.023501]  ret_from_fork_asm+0x1a/0x30
[   15.023532]  </TASK>
[   15.023555] 
[   15.031948] Allocated by task 282:
[   15.032087]  kasan_save_stack+0x45/0x70
[   15.032296]  kasan_save_track+0x18/0x40
[   15.032544]  kasan_save_alloc_info+0x3b/0x50
[   15.032779]  __kasan_kmalloc+0xb7/0xc0
[   15.033006]  __kmalloc_cache_noprof+0x189/0x420
[   15.033362]  kasan_atomics+0x95/0x310
[   15.033568]  kunit_try_run_case+0x1a5/0x480
[   15.033791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.033983]  kthread+0x337/0x6f0
[   15.034107]  ret_from_fork+0x116/0x1d0
[   15.034296]  ret_from_fork_asm+0x1a/0x30
[   15.034543] 
[   15.034642] The buggy address belongs to the object at ffff8881025a0d80
[   15.034642]  which belongs to the cache kmalloc-64 of size 64
[   15.035275] The buggy address is located 0 bytes to the right of
[   15.035275]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   15.036015] 
[   15.036131] The buggy address belongs to the physical page:
[   15.036408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   15.036838] flags: 0x200000000000000(node=0|zone=2)
[   15.037106] page_type: f5(slab)
[   15.037235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.037525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.037924] page dumped because: kasan: bad access detected
[   15.038352] 
[   15.038499] Memory state around the buggy address:
[   15.038750]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.039090]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.039307] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.039594]                                      ^
[   15.039871]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.040201]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.040541] ==================================================================
[   14.154553] ==================================================================
[   14.154845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.155123] Write of size 4 at addr ffff8881025a0db0 by task kunit_try_catch/282
[   14.155349] 
[   14.155572] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   14.155620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.155634] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.155656] Call Trace:
[   14.155676]  <TASK>
[   14.155696]  dump_stack_lvl+0x73/0xb0
[   14.155725]  print_report+0xd1/0x650
[   14.155748]  ? __virt_addr_valid+0x1db/0x2d0
[   14.155772]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.155793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.155816]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.155839]  kasan_report+0x141/0x180
[   14.155861]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.155887]  kasan_check_range+0x10c/0x1c0
[   14.155931]  __kasan_check_write+0x18/0x20
[   14.155952]  kasan_atomics_helper+0x7c7/0x5450
[   14.155975]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.155998]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.156023]  ? kasan_atomics+0x152/0x310
[   14.156051]  kasan_atomics+0x1dc/0x310
[   14.156074]  ? __pfx_kasan_atomics+0x10/0x10
[   14.156097]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   14.156124]  ? __pfx_read_tsc+0x10/0x10
[   14.156145]  ? ktime_get_ts64+0x86/0x230
[   14.156171]  kunit_try_run_case+0x1a5/0x480
[   14.156196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.156221]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   14.156246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.156269]  ? __kthread_parkme+0x82/0x180
[   14.156289]  ? preempt_count_sub+0x50/0x80
[   14.156313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.156338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.156361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.156399]  kthread+0x337/0x6f0
[   14.156419]  ? trace_preempt_on+0x20/0xc0
[   14.156444]  ? __pfx_kthread+0x10/0x10
[   14.156468]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.156489]  ? calculate_sigpending+0x7b/0xa0
[   14.156514]  ? __pfx_kthread+0x10/0x10
[   14.156535]  ret_from_fork+0x116/0x1d0
[   14.156554]  ? __pfx_kthread+0x10/0x10
[   14.156591]  ret_from_fork_asm+0x1a/0x30
[   14.156622]  </TASK>
[   14.156633] 
[   14.168539] Allocated by task 282:
[   14.168703]  kasan_save_stack+0x45/0x70
[   14.168853]  kasan_save_track+0x18/0x40
[   14.169019]  kasan_save_alloc_info+0x3b/0x50
[   14.169235]  __kasan_kmalloc+0xb7/0xc0
[   14.169469]  __kmalloc_cache_noprof+0x189/0x420
[   14.169782]  kasan_atomics+0x95/0x310
[   14.170203]  kunit_try_run_case+0x1a5/0x480
[   14.170424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.170719]  kthread+0x337/0x6f0
[   14.170938]  ret_from_fork+0x116/0x1d0
[   14.171131]  ret_from_fork_asm+0x1a/0x30
[   14.171351] 
[   14.171434] The buggy address belongs to the object at ffff8881025a0d80
[   14.171434]  which belongs to the cache kmalloc-64 of size 64
[   14.171809] The buggy address is located 0 bytes to the right of
[   14.171809]  allocated 48-byte region [ffff8881025a0d80, ffff8881025a0db0)
[   14.172351] 
[   14.172484] The buggy address belongs to the physical page:
[   14.172842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025a0
[   14.173202] flags: 0x200000000000000(node=0|zone=2)
[   14.173644] page_type: f5(slab)
[   14.173805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.174086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.174309] page dumped because: kasan: bad access detected
[   14.174551] 
[   14.174692] Memory state around the buggy address:
[   14.174965]  ffff8881025a0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.175590]  ffff8881025a0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.175900] >ffff8881025a0d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.176383]                                      ^
[   14.176554]  ffff8881025a0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.176933]  ffff8881025a0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.177263] ==================================================================