Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.741216] ==================================================================
[   22.741317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   22.741439] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.741548] 
[   22.741617] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.741805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.741868] Hardware name: linux,dummy-virt (DT)
[   22.741941] Call trace:
[   22.741992]  show_stack+0x20/0x38 (C)
[   22.742103]  dump_stack_lvl+0x8c/0xd0
[   22.742209]  print_report+0x118/0x608
[   22.742312]  kasan_report+0xdc/0x128
[   22.742435]  kasan_check_range+0x100/0x1a8
[   22.742559]  __kasan_check_write+0x20/0x30
[   22.742662]  kasan_atomics_helper+0x1414/0x4858
[   22.742772]  kasan_atomics+0x198/0x2e0
[   22.742880]  kunit_try_run_case+0x170/0x3f0
[   22.742989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.743109]  kthread+0x328/0x630
[   22.743203]  ret_from_fork+0x10/0x20
[   22.743308] 
[   22.744857] Allocated by task 266:
[   22.745301]  kasan_save_stack+0x3c/0x68
[   22.745649]  kasan_save_track+0x20/0x40
[   22.746533]  kasan_save_alloc_info+0x40/0x58
[   22.746645]  __kasan_kmalloc+0xd4/0xd8
[   22.746735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.746819]  kasan_atomics+0xb8/0x2e0
[   22.746884]  kunit_try_run_case+0x170/0x3f0
[   22.746967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.747060]  kthread+0x328/0x630
[   22.747140]  ret_from_fork+0x10/0x20
[   22.747230] 
[   22.747284] The buggy address belongs to the object at fff00000c79e4c00
[   22.747284]  which belongs to the cache kmalloc-64 of size 64
[   22.747440] The buggy address is located 0 bytes to the right of
[   22.747440]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.747593] 
[   22.748387] The buggy address belongs to the physical page:
[   22.748485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.748664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.748826] page_type: f5(slab)
[   22.748910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.749037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.749144] page dumped because: kasan: bad access detected
[   22.749229] 
[   22.749285] Memory state around the buggy address:
[   22.749383]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.749561]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.749784] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.749939]                                      ^
[   22.750056]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.750156]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.750540] ==================================================================
[   22.484441] ==================================================================
[   22.484610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   22.484779] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.484900] 
[   22.484973] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.485156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.485219] Hardware name: linux,dummy-virt (DT)
[   22.485284] Call trace:
[   22.485340]  show_stack+0x20/0x38 (C)
[   22.485468]  dump_stack_lvl+0x8c/0xd0
[   22.485572]  print_report+0x118/0x608
[   22.485684]  kasan_report+0xdc/0x128
[   22.485840]  kasan_check_range+0x100/0x1a8
[   22.485951]  __kasan_check_write+0x20/0x30
[   22.486089]  kasan_atomics_helper+0xd3c/0x4858
[   22.486193]  kasan_atomics+0x198/0x2e0
[   22.486323]  kunit_try_run_case+0x170/0x3f0
[   22.486488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.486697]  kthread+0x328/0x630
[   22.487161]  ret_from_fork+0x10/0x20
[   22.489377] 
[   22.489448] Allocated by task 266:
[   22.489526]  kasan_save_stack+0x3c/0x68
[   22.489673]  kasan_save_track+0x20/0x40
[   22.489769]  kasan_save_alloc_info+0x40/0x58
[   22.489870]  __kasan_kmalloc+0xd4/0xd8
[   22.489964]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.490095]  kasan_atomics+0xb8/0x2e0
[   22.490321]  kunit_try_run_case+0x170/0x3f0
[   22.490451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.491404]  kthread+0x328/0x630
[   22.491652]  ret_from_fork+0x10/0x20
[   22.491743] 
[   22.492329] The buggy address belongs to the object at fff00000c79e4c00
[   22.492329]  which belongs to the cache kmalloc-64 of size 64
[   22.492676] The buggy address is located 0 bytes to the right of
[   22.492676]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.492891] 
[   22.492968] The buggy address belongs to the physical page:
[   22.493036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.493154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.493269] page_type: f5(slab)
[   22.493396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.493567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.493702] page dumped because: kasan: bad access detected
[   22.493810] 
[   22.493876] Memory state around the buggy address:
[   22.493982]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.494254]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.494489] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.494583]                                      ^
[   22.494661]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.494743]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.494818] ==================================================================
[   22.828096] ==================================================================
[   22.828229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   22.828343] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.828620] 
[   22.828717] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.829377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.829486] Hardware name: linux,dummy-virt (DT)
[   22.829667] Call trace:
[   22.829765]  show_stack+0x20/0x38 (C)
[   22.829999]  dump_stack_lvl+0x8c/0xd0
[   22.830180]  print_report+0x118/0x608
[   22.830295]  kasan_report+0xdc/0x128
[   22.830623]  kasan_check_range+0x100/0x1a8
[   22.830823]  __kasan_check_write+0x20/0x30
[   22.831047]  kasan_atomics_helper+0x16d0/0x4858
[   22.831184]  kasan_atomics+0x198/0x2e0
[   22.831294]  kunit_try_run_case+0x170/0x3f0
[   22.831427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.831556]  kthread+0x328/0x630
[   22.831659]  ret_from_fork+0x10/0x20
[   22.831769] 
[   22.831815] Allocated by task 266:
[   22.831882]  kasan_save_stack+0x3c/0x68
[   22.831977]  kasan_save_track+0x20/0x40
[   22.832069]  kasan_save_alloc_info+0x40/0x58
[   22.832683]  __kasan_kmalloc+0xd4/0xd8
[   22.832853]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.833057]  kasan_atomics+0xb8/0x2e0
[   22.833241]  kunit_try_run_case+0x170/0x3f0
[   22.833334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.833813]  kthread+0x328/0x630
[   22.834029]  ret_from_fork+0x10/0x20
[   22.834616] 
[   22.834713] The buggy address belongs to the object at fff00000c79e4c00
[   22.834713]  which belongs to the cache kmalloc-64 of size 64
[   22.835120] The buggy address is located 0 bytes to the right of
[   22.835120]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.835606] 
[   22.835787] The buggy address belongs to the physical page:
[   22.835935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.836314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.836757] page_type: f5(slab)
[   22.836964] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.837095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.837198] page dumped because: kasan: bad access detected
[   22.837696] 
[   22.837901] Memory state around the buggy address:
[   22.837987]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.838186]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.838476] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.838651]                                      ^
[   22.838744]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.839172]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.839308] ==================================================================
[   22.508251] ==================================================================
[   22.508389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   22.508498] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.508614] 
[   22.508687] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.508878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.508945] Hardware name: linux,dummy-virt (DT)
[   22.509016] Call trace:
[   22.509071]  show_stack+0x20/0x38 (C)
[   22.509177]  dump_stack_lvl+0x8c/0xd0
[   22.509287]  print_report+0x118/0x608
[   22.511438]  kasan_report+0xdc/0x128
[   22.512220]  kasan_check_range+0x100/0x1a8
[   22.512786]  __kasan_check_read+0x20/0x30
[   22.513410]  kasan_atomics_helper+0xdd4/0x4858
[   22.514755]  kasan_atomics+0x198/0x2e0
[   22.515128]  kunit_try_run_case+0x170/0x3f0
[   22.515447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.515969]  kthread+0x328/0x630
[   22.516500]  ret_from_fork+0x10/0x20
[   22.516609] 
[   22.517370] Allocated by task 266:
[   22.517721]  kasan_save_stack+0x3c/0x68
[   22.518065]  kasan_save_track+0x20/0x40
[   22.518191]  kasan_save_alloc_info+0x40/0x58
[   22.518303]  __kasan_kmalloc+0xd4/0xd8
[   22.518406]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.518500]  kasan_atomics+0xb8/0x2e0
[   22.518571]  kunit_try_run_case+0x170/0x3f0
[   22.518650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.518747]  kthread+0x328/0x630
[   22.518823]  ret_from_fork+0x10/0x20
[   22.518926] 
[   22.518973] The buggy address belongs to the object at fff00000c79e4c00
[   22.518973]  which belongs to the cache kmalloc-64 of size 64
[   22.519323] The buggy address is located 0 bytes to the right of
[   22.519323]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.519721] 
[   22.519788] The buggy address belongs to the physical page:
[   22.519858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.519979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.520093] page_type: f5(slab)
[   22.520181] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.520300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.520407] page dumped because: kasan: bad access detected
[   22.520479] 
[   22.520646] Memory state around the buggy address:
[   22.520950]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.521472]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.521582] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.521800]                                      ^
[   22.521925]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.522045]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.522160] ==================================================================
[   22.261600] ==================================================================
[   22.261727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   22.262226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.263036]  kasan_atomics_helper+0x3f94/0x4858
[   22.266130] 
[   22.266253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.266839] page dumped because: kasan: bad access detected
[   22.266964] Memory state around the buggy address:
[   22.267260] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.268040]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.269120] ==================================================================
[   22.638402] ==================================================================
[   22.638556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   22.638808] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.639476] 
[   22.639794] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.640139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.640212] Hardware name: linux,dummy-virt (DT)
[   22.640650] Call trace:
[   22.640965]  show_stack+0x20/0x38 (C)
[   22.641144]  dump_stack_lvl+0x8c/0xd0
[   22.641317]  print_report+0x118/0x608
[   22.641440]  kasan_report+0xdc/0x128
[   22.641941]  kasan_check_range+0x100/0x1a8
[   22.642075]  __kasan_check_write+0x20/0x30
[   22.642186]  kasan_atomics_helper+0x1128/0x4858
[   22.642303]  kasan_atomics+0x198/0x2e0
[   22.642948]  kunit_try_run_case+0x170/0x3f0
[   22.643286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.643688]  kthread+0x328/0x630
[   22.643980]  ret_from_fork+0x10/0x20
[   22.644183] 
[   22.644244] Allocated by task 266:
[   22.644328]  kasan_save_stack+0x3c/0x68
[   22.644447]  kasan_save_track+0x20/0x40
[   22.644529]  kasan_save_alloc_info+0x40/0x58
[   22.644622]  __kasan_kmalloc+0xd4/0xd8
[   22.644872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.645000]  kasan_atomics+0xb8/0x2e0
[   22.645262]  kunit_try_run_case+0x170/0x3f0
[   22.646181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.646258]  kthread+0x328/0x630
[   22.646297]  ret_from_fork+0x10/0x20
[   22.646336] 
[   22.646383] The buggy address belongs to the object at fff00000c79e4c00
[   22.646383]  which belongs to the cache kmalloc-64 of size 64
[   22.646573] The buggy address is located 0 bytes to the right of
[   22.646573]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.646702] 
[   22.646751] The buggy address belongs to the physical page:
[   22.646824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.646972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.647087] page_type: f5(slab)
[   22.647178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.647299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.647421] page dumped because: kasan: bad access detected
[   22.647536] 
[   22.647607] Memory state around the buggy address:
[   22.647699]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.647804]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.647941] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.648070]                                      ^
[   22.648165]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.648267]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.648373] ==================================================================
[   22.550268] ==================================================================
[   22.550558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   22.550705] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.550822] 
[   22.550893] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.551579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.551718] Hardware name: linux,dummy-virt (DT)
[   22.551909] Call trace:
[   22.552001]  show_stack+0x20/0x38 (C)
[   22.552214]  dump_stack_lvl+0x8c/0xd0
[   22.552317]  print_report+0x118/0x608
[   22.552437]  kasan_report+0xdc/0x128
[   22.552546]  kasan_check_range+0x100/0x1a8
[   22.552660]  __kasan_check_write+0x20/0x30
[   22.552768]  kasan_atomics_helper+0xeb8/0x4858
[   22.552878]  kasan_atomics+0x198/0x2e0
[   22.552986]  kunit_try_run_case+0x170/0x3f0
[   22.553098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.553231]  kthread+0x328/0x630
[   22.553795]  ret_from_fork+0x10/0x20
[   22.554063] 
[   22.554125] Allocated by task 266:
[   22.554344]  kasan_save_stack+0x3c/0x68
[   22.554560]  kasan_save_track+0x20/0x40
[   22.554898]  kasan_save_alloc_info+0x40/0x58
[   22.555110]  __kasan_kmalloc+0xd4/0xd8
[   22.555818]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.555970]  kasan_atomics+0xb8/0x2e0
[   22.556055]  kunit_try_run_case+0x170/0x3f0
[   22.556445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.556548]  kthread+0x328/0x630
[   22.556956]  ret_from_fork+0x10/0x20
[   22.557260] 
[   22.557314] The buggy address belongs to the object at fff00000c79e4c00
[   22.557314]  which belongs to the cache kmalloc-64 of size 64
[   22.557768] The buggy address is located 0 bytes to the right of
[   22.557768]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.558153] 
[   22.558212] The buggy address belongs to the physical page:
[   22.558403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.558566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.558698] page_type: f5(slab)
[   22.558883] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.559009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.559291] page dumped because: kasan: bad access detected
[   22.559393] 
[   22.559450] Memory state around the buggy address:
[   22.559609]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.559833]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.560182] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.560442]                                      ^
[   22.560531]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.560703]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.560796] ==================================================================
[   22.772272] ==================================================================
[   22.772453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   22.772817] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.773037] 
[   22.773188] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.773560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.773731] Hardware name: linux,dummy-virt (DT)
[   22.773804] Call trace:
[   22.773861]  show_stack+0x20/0x38 (C)
[   22.774124]  dump_stack_lvl+0x8c/0xd0
[   22.774286]  print_report+0x118/0x608
[   22.774416]  kasan_report+0xdc/0x128
[   22.774543]  kasan_check_range+0x100/0x1a8
[   22.774664]  __kasan_check_write+0x20/0x30
[   22.774809]  kasan_atomics_helper+0x154c/0x4858
[   22.774930]  kasan_atomics+0x198/0x2e0
[   22.775040]  kunit_try_run_case+0x170/0x3f0
[   22.775504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.775737]  kthread+0x328/0x630
[   22.775838]  ret_from_fork+0x10/0x20
[   22.776025] 
[   22.776182] Allocated by task 266:
[   22.776296]  kasan_save_stack+0x3c/0x68
[   22.776698]  kasan_save_track+0x20/0x40
[   22.776919]  kasan_save_alloc_info+0x40/0x58
[   22.777130]  __kasan_kmalloc+0xd4/0xd8
[   22.777466]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.777577]  kasan_atomics+0xb8/0x2e0
[   22.777704]  kunit_try_run_case+0x170/0x3f0
[   22.777803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.777910]  kthread+0x328/0x630
[   22.778056]  ret_from_fork+0x10/0x20
[   22.778144] 
[   22.778240] The buggy address belongs to the object at fff00000c79e4c00
[   22.778240]  which belongs to the cache kmalloc-64 of size 64
[   22.778608] The buggy address is located 0 bytes to the right of
[   22.778608]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.778802] 
[   22.778855] The buggy address belongs to the physical page:
[   22.779068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.779346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.779734] page_type: f5(slab)
[   22.779886] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.780021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.780127] page dumped because: kasan: bad access detected
[   22.780208] 
[   22.780260] Memory state around the buggy address:
[   22.780339]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.780448]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.780546] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.780653]                                      ^
[   22.781178]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.781539]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.781752] ==================================================================
[   22.602900] ==================================================================
[   22.603430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   22.603671] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.603800] 
[   22.603875] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.604063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.604313] Hardware name: linux,dummy-virt (DT)
[   22.605350] Call trace:
[   22.605442]  show_stack+0x20/0x38 (C)
[   22.606046]  dump_stack_lvl+0x8c/0xd0
[   22.606198]  print_report+0x118/0x608
[   22.606315]  kasan_report+0xdc/0x128
[   22.606842]  kasan_check_range+0x100/0x1a8
[   22.607118]  __kasan_check_write+0x20/0x30
[   22.607429]  kasan_atomics_helper+0x1058/0x4858
[   22.607606]  kasan_atomics+0x198/0x2e0
[   22.608160]  kunit_try_run_case+0x170/0x3f0
[   22.608660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.609261]  kthread+0x328/0x630
[   22.609472]  ret_from_fork+0x10/0x20
[   22.609593] 
[   22.609647] Allocated by task 266:
[   22.609715]  kasan_save_stack+0x3c/0x68
[   22.610099]  kasan_save_track+0x20/0x40
[   22.610564]  kasan_save_alloc_info+0x40/0x58
[   22.610830]  __kasan_kmalloc+0xd4/0xd8
[   22.610934]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.611231]  kasan_atomics+0xb8/0x2e0
[   22.611816]  kunit_try_run_case+0x170/0x3f0
[   22.611959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.612064]  kthread+0x328/0x630
[   22.612147]  ret_from_fork+0x10/0x20
[   22.612704] 
[   22.612774] The buggy address belongs to the object at fff00000c79e4c00
[   22.612774]  which belongs to the cache kmalloc-64 of size 64
[   22.612921] The buggy address is located 0 bytes to the right of
[   22.612921]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.613073] 
[   22.613658] The buggy address belongs to the physical page:
[   22.614159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.614452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.614866] page_type: f5(slab)
[   22.615111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.615570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.615944] page dumped because: kasan: bad access detected
[   22.616029] 
[   22.616080] Memory state around the buggy address:
[   22.616755]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.617238]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.617384] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.617481]                                      ^
[   22.618048]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.618374]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.618566] ==================================================================
[   22.622782] ==================================================================
[   22.622925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   22.623048] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.623170] 
[   22.623243] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.623453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.623521] Hardware name: linux,dummy-virt (DT)
[   22.623599] Call trace:
[   22.623661]  show_stack+0x20/0x38 (C)
[   22.623778]  dump_stack_lvl+0x8c/0xd0
[   22.623888]  print_report+0x118/0x608
[   22.623998]  kasan_report+0xdc/0x128
[   22.625180]  kasan_check_range+0x100/0x1a8
[   22.626091]  __kasan_check_write+0x20/0x30
[   22.626205]  kasan_atomics_helper+0x10c0/0x4858
[   22.626315]  kasan_atomics+0x198/0x2e0
[   22.627576]  kunit_try_run_case+0x170/0x3f0
[   22.627968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.628109]  kthread+0x328/0x630
[   22.628289]  ret_from_fork+0x10/0x20
[   22.628716] 
[   22.629142] Allocated by task 266:
[   22.629244]  kasan_save_stack+0x3c/0x68
[   22.629350]  kasan_save_track+0x20/0x40
[   22.629604]  kasan_save_alloc_info+0x40/0x58
[   22.629708]  __kasan_kmalloc+0xd4/0xd8
[   22.630137]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.631005]  kasan_atomics+0xb8/0x2e0
[   22.631104]  kunit_try_run_case+0x170/0x3f0
[   22.631187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.631268]  kthread+0x328/0x630
[   22.631340]  ret_from_fork+0x10/0x20
[   22.631443] 
[   22.631495] The buggy address belongs to the object at fff00000c79e4c00
[   22.631495]  which belongs to the cache kmalloc-64 of size 64
[   22.631640] The buggy address is located 0 bytes to the right of
[   22.631640]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.631795] 
[   22.631844] The buggy address belongs to the physical page:
[   22.631919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.632039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.632154] page_type: f5(slab)
[   22.632247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.634221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.634523] page dumped because: kasan: bad access detected
[   22.634631] 
[   22.635025] Memory state around the buggy address:
[   22.635383]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.635658]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.635765] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.635868]                                      ^
[   22.635953]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.636056]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.636704] ==================================================================
[   22.419822] ==================================================================
[   22.419948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   22.420066] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.420181] 
[   22.420250] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.420461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.420531] Hardware name: linux,dummy-virt (DT)
[   22.420607] Call trace:
[   22.420660]  show_stack+0x20/0x38 (C)
[   22.420768]  dump_stack_lvl+0x8c/0xd0
[   22.421138]  print_report+0x118/0x608
[   22.422594]  __kasan_check_write+0x20/0x30
[   22.424222]  __kasan_kmalloc+0xd4/0xd8
[   22.424338]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.424486]  kasan_atomics+0xb8/0x2e0
[   22.424603]  kunit_try_run_case+0x170/0x3f0
[   22.424690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.424787]  kthread+0x328/0x630
[   22.424883]  ret_from_fork+0x10/0x20
[   22.424970] 
[   22.425018] The buggy address belongs to the object at fff00000c79e4c00
[   22.425018]  which belongs to the cache kmalloc-64 of size 64
[   22.425157] The buggy address is located 0 bytes to the right of
[   22.425157]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.425314] 
[   22.425382] The buggy address belongs to the physical page:
[   22.425589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.426068] 
[   22.426599]                                      ^
[   22.430253]  kasan_save_stack+0x3c/0x68
[   22.430654]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.430754]  kasan_atomics+0xb8/0x2e0
[   22.431440] The buggy address is located 0 bytes to the right of
[   22.431440]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.433112] page dumped because: kasan: bad access detected
[   22.434086]                                      ^
[   22.437107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.439587]  kasan_atomics+0xb8/0x2e0
[   22.440394] The buggy address belongs to the object at fff00000c79e4c00
[   22.440394]  which belongs to the cache kmalloc-64 of size 64
[   22.441586] page dumped because: kasan: bad access detected
[   22.441657] 
[   22.441707] Memory state around the buggy address:
[   22.441875]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.443606] Read of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.447707]  kthread+0x328/0x630
[   22.448645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.449869]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.453909]  __kasan_kmalloc+0xd4/0xd8
[   22.454176]  kunit_try_run_case+0x170/0x3f0
[   22.454264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.454376]  kthread+0x328/0x630
[   22.454453]  ret_from_fork+0x10/0x20
[   22.454788] The buggy address is located 0 bytes to the right of
[   22.454788]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.456648] page dumped because: kasan: bad access detected
[   22.457178]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.457860]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.460245]  kasan_report+0xdc/0x128
[   22.462264]  __kasan_kmalloc+0xd4/0xd8
[   22.462817]  kthread+0x328/0x630
[   22.463062]  ret_from_fork+0x10/0x20
[   22.463486] The buggy address is located 0 bytes to the right of
[   22.463486]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.464302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.464827]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.465363] ==================================================================
[   22.649909] ==================================================================
[   22.650073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   22.650244] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.650432] 
[   22.650560] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.650721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.651161] Hardware name: linux,dummy-virt (DT)
[   22.651249] Call trace:
[   22.651475]  show_stack+0x20/0x38 (C)
[   22.651714]  dump_stack_lvl+0x8c/0xd0
[   22.652076]  print_report+0x118/0x608
[   22.652289]  kasan_report+0xdc/0x128
[   22.652424]  kasan_check_range+0x100/0x1a8
[   22.652549]  __kasan_check_write+0x20/0x30
[   22.652668]  kasan_atomics_helper+0x1190/0x4858
[   22.652780]  kasan_atomics+0x198/0x2e0
[   22.652877]  kunit_try_run_case+0x170/0x3f0
[   22.652985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.653108]  kthread+0x328/0x630
[   22.653465]  ret_from_fork+0x10/0x20
[   22.653727] 
[   22.653797] Allocated by task 266:
[   22.653896]  kasan_save_stack+0x3c/0x68
[   22.654130]  kasan_save_track+0x20/0x40
[   22.654232]  kasan_save_alloc_info+0x40/0x58
[   22.654326]  __kasan_kmalloc+0xd4/0xd8
[   22.654506]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.654609]  kasan_atomics+0xb8/0x2e0
[   22.654731]  kunit_try_run_case+0x170/0x3f0
[   22.654805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.654899]  kthread+0x328/0x630
[   22.654973]  ret_from_fork+0x10/0x20
[   22.655575] 
[   22.655903] The buggy address belongs to the object at fff00000c79e4c00
[   22.655903]  which belongs to the cache kmalloc-64 of size 64
[   22.656261] The buggy address is located 0 bytes to the right of
[   22.656261]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.656784] 
[   22.657142] The buggy address belongs to the physical page:
[   22.657418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.657553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.658020] page_type: f5(slab)
[   22.658382] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.658892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.659178] page dumped because: kasan: bad access detected
[   22.659546] 
[   22.659616] Memory state around the buggy address:
[   22.659889]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.660030]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.660128] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.660260]                                      ^
[   22.660371]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.660477]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.660572] ==================================================================
[   22.855348] ==================================================================
[   22.855507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   22.855661] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.855819] 
[   22.855911] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.856122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.856174] Hardware name: linux,dummy-virt (DT)
[   22.856238] Call trace:
[   22.856285]  show_stack+0x20/0x38 (C)
[   22.856410]  dump_stack_lvl+0x8c/0xd0
[   22.856512]  print_report+0x118/0x608
[   22.856654]  kasan_report+0xdc/0x128
[   22.856806]  __asan_report_load8_noabort+0x20/0x30
[   22.856955]  kasan_atomics_helper+0x3e20/0x4858
[   22.857112]  kasan_atomics+0x198/0x2e0
[   22.857229]  kunit_try_run_case+0x170/0x3f0
[   22.857364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.857471]  kthread+0x328/0x630
[   22.857591]  ret_from_fork+0x10/0x20
[   22.857720] 
[   22.857779] Allocated by task 266:
[   22.857870]  kasan_save_stack+0x3c/0x68
[   22.858039]  kasan_save_track+0x20/0x40
[   22.858257]  kasan_save_alloc_info+0x40/0x58
[   22.858485]  __kasan_kmalloc+0xd4/0xd8
[   22.858574]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.859095]  kasan_atomics+0xb8/0x2e0
[   22.859301]  kunit_try_run_case+0x170/0x3f0
[   22.859448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.859547]  kthread+0x328/0x630
[   22.859614]  ret_from_fork+0x10/0x20
[   22.859680] 
[   22.859943] The buggy address belongs to the object at fff00000c79e4c00
[   22.859943]  which belongs to the cache kmalloc-64 of size 64
[   22.860215] The buggy address is located 0 bytes to the right of
[   22.860215]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.860557] 
[   22.860613] The buggy address belongs to the physical page:
[   22.860688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.860811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.860912] page_type: f5(slab)
[   22.860995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.861121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.861260] page dumped because: kasan: bad access detected
[   22.861388] 
[   22.861458] Memory state around the buggy address:
[   22.861560]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.861705]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.861845] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.861971]                                      ^
[   22.862041]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.862128]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.862245] ==================================================================
[   22.863319] ==================================================================
[   22.863446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   22.863569] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.863690] 
[   22.863761] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.863964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.864033] Hardware name: linux,dummy-virt (DT)
[   22.864111] Call trace:
[   22.864168]  show_stack+0x20/0x38 (C)
[   22.864282]  dump_stack_lvl+0x8c/0xd0
[   22.864451]  print_report+0x118/0x608
[   22.864910]  kasan_report+0xdc/0x128
[   22.865189]  kasan_check_range+0x100/0x1a8
[   22.865307]  __kasan_check_write+0x20/0x30
[   22.865430]  kasan_atomics_helper+0x17ec/0x4858
[   22.866215]  kasan_atomics+0x198/0x2e0
[   22.866367]  kunit_try_run_case+0x170/0x3f0
[   22.866748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.867266]  kthread+0x328/0x630
[   22.867450]  ret_from_fork+0x10/0x20
[   22.867565] 
[   22.867613] Allocated by task 266:
[   22.867851]  kasan_save_stack+0x3c/0x68
[   22.868327]  kasan_save_track+0x20/0x40
[   22.868553]  kasan_save_alloc_info+0x40/0x58
[   22.868772]  __kasan_kmalloc+0xd4/0xd8
[   22.868933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.869021]  kasan_atomics+0xb8/0x2e0
[   22.869105]  kunit_try_run_case+0x170/0x3f0
[   22.869194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.869299]  kthread+0x328/0x630
[   22.869394]  ret_from_fork+0x10/0x20
[   22.869486] 
[   22.869537] The buggy address belongs to the object at fff00000c79e4c00
[   22.869537]  which belongs to the cache kmalloc-64 of size 64
[   22.870166] The buggy address is located 0 bytes to the right of
[   22.870166]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.870845] 
[   22.870967] The buggy address belongs to the physical page:
[   22.871233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.871754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.871998] page_type: f5(slab)
[   22.872480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.872934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.873179] page dumped because: kasan: bad access detected
[   22.873329] 
[   22.873398] Memory state around the buggy address:
[   22.873779]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.874083]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.874460] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.874590]                                      ^
[   22.874768]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.875005]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.875272] ==================================================================
[   22.751456] ==================================================================
[   22.751578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   22.751692] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.752442] 
[   22.752545] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.753659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.753793] Hardware name: linux,dummy-virt (DT)
[   22.754249] Call trace:
[   22.754386]  show_stack+0x20/0x38 (C)
[   22.755000]  dump_stack_lvl+0x8c/0xd0
[   22.755108]  print_report+0x118/0x608
[   22.755655]  kasan_report+0xdc/0x128
[   22.755971]  kasan_check_range+0x100/0x1a8
[   22.756099]  __kasan_check_write+0x20/0x30
[   22.756204]  kasan_atomics_helper+0x147c/0x4858
[   22.756587]  kasan_atomics+0x198/0x2e0
[   22.756698]  kunit_try_run_case+0x170/0x3f0
[   22.757542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.757726]  kthread+0x328/0x630
[   22.757894]  ret_from_fork+0x10/0x20
[   22.758219] 
[   22.758597] Allocated by task 266:
[   22.758686]  kasan_save_stack+0x3c/0x68
[   22.759037]  kasan_save_track+0x20/0x40
[   22.759154]  kasan_save_alloc_info+0x40/0x58
[   22.759249]  __kasan_kmalloc+0xd4/0xd8
[   22.759338]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.761115]  kasan_atomics+0xb8/0x2e0
[   22.761244]  kunit_try_run_case+0x170/0x3f0
[   22.761375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.761488]  kthread+0x328/0x630
[   22.761564]  ret_from_fork+0x10/0x20
[   22.761658] 
[   22.761730] The buggy address belongs to the object at fff00000c79e4c00
[   22.761730]  which belongs to the cache kmalloc-64 of size 64
[   22.761863] The buggy address is located 0 bytes to the right of
[   22.761863]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.762002] 
[   22.762046] The buggy address belongs to the physical page:
[   22.762116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.762320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.762477] page_type: f5(slab)
[   22.762955] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.763128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.763245] page dumped because: kasan: bad access detected
[   22.763332] 
[   22.763400] Memory state around the buggy address:
[   22.763473]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.763560]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.763976] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.764119]                                      ^
[   22.764212]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.764315]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.764433] ==================================================================
[   22.585855] ==================================================================
[   22.585978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   22.586750] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.587106] 
[   22.587661] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.588099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.588346] Hardware name: linux,dummy-virt (DT)
[   22.588449] Call trace:
[   22.588592]  show_stack+0x20/0x38 (C)
[   22.588965]  dump_stack_lvl+0x8c/0xd0
[   22.589531]  print_report+0x118/0x608
[   22.589837]  kasan_report+0xdc/0x128
[   22.589955]  kasan_check_range+0x100/0x1a8
[   22.590057]  __kasan_check_write+0x20/0x30
[   22.590171]  kasan_atomics_helper+0xff0/0x4858
[   22.590288]  kasan_atomics+0x198/0x2e0
[   22.591591]  kunit_try_run_case+0x170/0x3f0
[   22.592332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.592514]  kthread+0x328/0x630
[   22.592841]  ret_from_fork+0x10/0x20
[   22.593320] 
[   22.593440] Allocated by task 266:
[   22.593646]  kasan_save_stack+0x3c/0x68
[   22.593758]  kasan_save_track+0x20/0x40
[   22.593844]  kasan_save_alloc_info+0x40/0x58
[   22.593933]  __kasan_kmalloc+0xd4/0xd8
[   22.594243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.594581]  kasan_atomics+0xb8/0x2e0
[   22.596226]  kunit_try_run_case+0x170/0x3f0
[   22.596370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.596492]  kthread+0x328/0x630
[   22.596577]  ret_from_fork+0x10/0x20
[   22.596680] 
[   22.596735] The buggy address belongs to the object at fff00000c79e4c00
[   22.596735]  which belongs to the cache kmalloc-64 of size 64
[   22.596876] The buggy address is located 0 bytes to the right of
[   22.596876]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.597491] 
[   22.597569] The buggy address belongs to the physical page:
[   22.597660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.597921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.598041] page_type: f5(slab)
[   22.598635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.598784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.598870] page dumped because: kasan: bad access detected
[   22.598942] 
[   22.598990] Memory state around the buggy address:
[   22.599068]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.600008]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.600648] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.600761]                                      ^
[   22.600843]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.600941]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.601026] ==================================================================
[   22.724809] ==================================================================
[   22.724929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   22.725048] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.725168] 
[   22.725238] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.726460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.726709] Hardware name: linux,dummy-virt (DT)
[   22.727426] Call trace:
[   22.728219]  show_stack+0x20/0x38 (C)
[   22.728728]  dump_stack_lvl+0x8c/0xd0
[   22.729365]  print_report+0x118/0x608
[   22.730049]  kasan_report+0xdc/0x128
[   22.730274]  __asan_report_load8_noabort+0x20/0x30
[   22.731045]  kasan_atomics_helper+0x3f04/0x4858
[   22.731521]  kasan_atomics+0x198/0x2e0
[   22.731756]  kunit_try_run_case+0x170/0x3f0
[   22.731882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.732009]  kthread+0x328/0x630
[   22.732112]  ret_from_fork+0x10/0x20
[   22.732221] 
[   22.732271] Allocated by task 266:
[   22.732336]  kasan_save_stack+0x3c/0x68
[   22.732446]  kasan_save_track+0x20/0x40
[   22.732538]  kasan_save_alloc_info+0x40/0x58
[   22.732634]  __kasan_kmalloc+0xd4/0xd8
[   22.732719]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.732812]  kasan_atomics+0xb8/0x2e0
[   22.733329]  kunit_try_run_case+0x170/0x3f0
[   22.734601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.735284]  kthread+0x328/0x630
[   22.735680]  ret_from_fork+0x10/0x20
[   22.736289] 
[   22.736601] The buggy address belongs to the object at fff00000c79e4c00
[   22.736601]  which belongs to the cache kmalloc-64 of size 64
[   22.737427] The buggy address is located 0 bytes to the right of
[   22.737427]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.737923] 
[   22.737980] The buggy address belongs to the physical page:
[   22.739341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.739510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.740200] page_type: f5(slab)
[   22.740304] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.740434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.740496] page dumped because: kasan: bad access detected
[   22.740534] 
[   22.740557] Memory state around the buggy address:
[   22.740593]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.740640]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.740684] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.740725]                                      ^
[   22.740763]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740805]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740845] ==================================================================
[   22.532288] ==================================================================
[   22.532421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   22.532537] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.532646] 
[   22.532713] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.532914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.532972] Hardware name: linux,dummy-virt (DT)
[   22.533042] Call trace:
[   22.533370]  show_stack+0x20/0x38 (C)
[   22.533716]  dump_stack_lvl+0x8c/0xd0
[   22.533826]  print_report+0x118/0x608
[   22.534251]  kasan_report+0xdc/0x128
[   22.534705]  kasan_check_range+0x100/0x1a8
[   22.534867]  __kasan_check_write+0x20/0x30
[   22.535017]  kasan_atomics_helper+0xe44/0x4858
[   22.535174]  kasan_atomics+0x198/0x2e0
[   22.535265]  kunit_try_run_case+0x170/0x3f0
[   22.535348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.535499]  kthread+0x328/0x630
[   22.535593]  ret_from_fork+0x10/0x20
[   22.535692] 
[   22.535735] Allocated by task 266:
[   22.535799]  kasan_save_stack+0x3c/0x68
[   22.535883]  kasan_save_track+0x20/0x40
[   22.536128]  kasan_save_alloc_info+0x40/0x58
[   22.536245]  __kasan_kmalloc+0xd4/0xd8
[   22.536401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.536847]  kasan_atomics+0xb8/0x2e0
[   22.536959]  kunit_try_run_case+0x170/0x3f0
[   22.537260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.537822]  kthread+0x328/0x630
[   22.537922]  ret_from_fork+0x10/0x20
[   22.538006] 
[   22.538348] The buggy address belongs to the object at fff00000c79e4c00
[   22.538348]  which belongs to the cache kmalloc-64 of size 64
[   22.538931] The buggy address is located 0 bytes to the right of
[   22.538931]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.539080] 
[   22.539131] The buggy address belongs to the physical page:
[   22.539206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.539876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.540304] page_type: f5(slab)
[   22.540430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.540967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.541204] page dumped because: kasan: bad access detected
[   22.541298] 
[   22.541346] Memory state around the buggy address:
[   22.541922]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.542192]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.542293] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.542604]                                      ^
[   22.542805]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.543240]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.543384] ==================================================================
[   22.384833] ==================================================================
[   22.384983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   22.385136] Read of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.385289] 
[   22.385402] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.385660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.385731] Hardware name: linux,dummy-virt (DT)
[   22.387686]  kasan_save_track+0x20/0x40
[   22.388020]  __kasan_kmalloc+0xd4/0xd8
[   22.389221] The buggy address belongs to the physical page:
[   22.392410] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.392958]  show_stack+0x20/0x38 (C)
[   22.393069]  dump_stack_lvl+0x8c/0xd0
[   22.393179]  print_report+0x118/0x608
[   22.393285]  kasan_report+0xdc/0x128
[   22.393406]  kasan_check_range+0x100/0x1a8
[   22.393518]  __kasan_check_write+0x20/0x30
[   22.393623]  kasan_atomics_helper+0x934/0x4858
[   22.393733]  kasan_atomics+0x198/0x2e0
[   22.393844]  kunit_try_run_case+0x170/0x3f0
[   22.393955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.394058]  kthread+0x328/0x630
[   22.394156]  ret_from_fork+0x10/0x20
[   22.394286] 
[   22.394364] Allocated by task 266:
[   22.394457]  kasan_save_stack+0x3c/0x68
[   22.394564]  kasan_save_track+0x20/0x40
[   22.394644]  kasan_save_alloc_info+0x40/0x58
[   22.394735]  __kasan_kmalloc+0xd4/0xd8
[   22.394828]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.394934]  kasan_atomics+0xb8/0x2e0
[   22.395044]  kunit_try_run_case+0x170/0x3f0
[   22.395125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.395221]  kthread+0x328/0x630
[   22.395332]  ret_from_fork+0x10/0x20
[   22.395438] 
[   22.395484] The buggy address belongs to the object at fff00000c79e4c00
[   22.395484]  which belongs to the cache kmalloc-64 of size 64
[   22.395597] The buggy address is located 0 bytes to the right of
[   22.395597]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.395722] 
[   22.395766] The buggy address belongs to the physical page:
[   22.395850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.395976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.396077] page_type: f5(slab)
[   22.396162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.396279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.396382] page dumped because: kasan: bad access detected
[   22.396462] 
[   22.396509] Memory state around the buggy address:
[   22.396586]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.396689]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.396797] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.397000]                                      ^
[   22.397080]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.397170]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.397293] ==================================================================
[   22.562417] ==================================================================
[   22.562775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   22.562991] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.563094] 
[   22.563163] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.563450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.563541] Hardware name: linux,dummy-virt (DT)
[   22.563616] Call trace:
[   22.563645]  show_stack+0x20/0x38 (C)
[   22.563705]  dump_stack_lvl+0x8c/0xd0
[   22.563765]  print_report+0x118/0x608
[   22.563869]  kasan_report+0xdc/0x128
[   22.563973]  kasan_check_range+0x100/0x1a8
[   22.564086]  __kasan_check_write+0x20/0x30
[   22.564191]  kasan_atomics_helper+0xf20/0x4858
[   22.564301]  kasan_atomics+0x198/0x2e0
[   22.564422]  kunit_try_run_case+0x170/0x3f0
[   22.564525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.564649]  kthread+0x328/0x630
[   22.564743]  ret_from_fork+0x10/0x20
[   22.564850] 
[   22.564896] Allocated by task 266:
[   22.564963]  kasan_save_stack+0x3c/0x68
[   22.565054]  kasan_save_track+0x20/0x40
[   22.565142]  kasan_save_alloc_info+0x40/0x58
[   22.565231]  __kasan_kmalloc+0xd4/0xd8
[   22.565323]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.565458]  kasan_atomics+0xb8/0x2e0
[   22.565703]  kunit_try_run_case+0x170/0x3f0
[   22.565818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.565933]  kthread+0x328/0x630
[   22.566134]  ret_from_fork+0x10/0x20
[   22.566242] 
[   22.566525] The buggy address belongs to the object at fff00000c79e4c00
[   22.566525]  which belongs to the cache kmalloc-64 of size 64
[   22.566681] The buggy address is located 0 bytes to the right of
[   22.566681]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.566829] 
[   22.566877] The buggy address belongs to the physical page:
[   22.567056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.567282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.567624] page_type: f5(slab)
[   22.567732] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.567951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.568063] page dumped because: kasan: bad access detected
[   22.568141] 
[   22.568396] Memory state around the buggy address:
[   22.568486]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.568612]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.568908] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.569011]                                      ^
[   22.569111]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.569218]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.569315] ==================================================================
[   22.476128] ==================================================================
[   22.476274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   22.476405] Read of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.476932] 
[   22.477029] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.477218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.477286] Hardware name: linux,dummy-virt (DT)
[   22.477597] Call trace:
[   22.477677]  show_stack+0x20/0x38 (C)
[   22.477881]  dump_stack_lvl+0x8c/0xd0
[   22.478254]  print_report+0x118/0x608
[   22.478378]  kasan_report+0xdc/0x128
[   22.478596]  __asan_report_load4_noabort+0x20/0x30
[   22.478735]  kasan_atomics_helper+0x3dd8/0x4858
[   22.478856]  kasan_atomics+0x198/0x2e0
[   22.479207]  kunit_try_run_case+0x170/0x3f0
[   22.479461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.479601]  kthread+0x328/0x630
[   22.479780]  ret_from_fork+0x10/0x20
[   22.480087] 
[   22.480138] Allocated by task 266:
[   22.480257]  kasan_save_stack+0x3c/0x68
[   22.480505]  kasan_save_track+0x20/0x40
[   22.480806]  kasan_save_alloc_info+0x40/0x58
[   22.480903]  __kasan_kmalloc+0xd4/0xd8
[   22.481000]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.481410]  kasan_atomics+0xb8/0x2e0
[   22.481508]  kunit_try_run_case+0x170/0x3f0
[   22.481555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.481602]  kthread+0x328/0x630
[   22.481639]  ret_from_fork+0x10/0x20
[   22.481677] 
[   22.481702] The buggy address belongs to the object at fff00000c79e4c00
[   22.481702]  which belongs to the cache kmalloc-64 of size 64
[   22.481763] The buggy address is located 0 bytes to the right of
[   22.481763]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.481827] 
[   22.481849] The buggy address belongs to the physical page:
[   22.481884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.481938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.481988] page_type: f5(slab)
[   22.482161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.482648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.482806] page dumped because: kasan: bad access detected
[   22.482880] 
[   22.482943] Memory state around the buggy address:
[   22.483032]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.483125]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.483219] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.483310]                                      ^
[   22.483398]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.483493]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.483590] ==================================================================
[   22.397789] ==================================================================
[   22.397898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   22.398060] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.398205] 
[   22.398301] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.398501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.398567] Hardware name: linux,dummy-virt (DT)
[   22.398635] Call trace:
[   22.398699]  show_stack+0x20/0x38 (C)
[   22.398862]  dump_stack_lvl+0x8c/0xd0
[   22.398978]  print_report+0x118/0x608
[   22.399088]  kasan_report+0xdc/0x128
[   22.399187]  kasan_check_range+0x100/0x1a8
[   22.399297]  __kasan_check_write+0x20/0x30
[   22.399411]  kasan_atomics_helper+0x99c/0x4858
[   22.399513]  kasan_atomics+0x198/0x2e0
[   22.399647]  kunit_try_run_case+0x170/0x3f0
[   22.399772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.399904]  kthread+0x328/0x630
[   22.400014]  ret_from_fork+0x10/0x20
[   22.400110] 
[   22.400156] Allocated by task 266:
[   22.400218]  kasan_save_stack+0x3c/0x68
[   22.400308]  kasan_save_track+0x20/0x40
[   22.400421]  kasan_save_alloc_info+0x40/0x58
[   22.400600]  __kasan_kmalloc+0xd4/0xd8
[   22.400709]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.400823]  kasan_atomics+0xb8/0x2e0
[   22.400910]  kunit_try_run_case+0x170/0x3f0
[   22.400994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.401095]  kthread+0x328/0x630
[   22.401175]  ret_from_fork+0x10/0x20
[   22.401257] 
[   22.401305] The buggy address belongs to the object at fff00000c79e4c00
[   22.401305]  which belongs to the cache kmalloc-64 of size 64
[   22.401444] The buggy address is located 0 bytes to the right of
[   22.401444]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.401594] 
[   22.401644] The buggy address belongs to the physical page:
[   22.401715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.401868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.401978] page_type: f5(slab)
[   22.402065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.402224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.402351] page dumped because: kasan: bad access detected
[   22.402488] 
[   22.402564] Memory state around the buggy address:
[   22.402674]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.402824]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.402968] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.403099]                                      ^
[   22.403218]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.403372]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.403455] ==================================================================
[   22.708408] ==================================================================
[   22.708534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   22.708657] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.708776] 
[   22.708851] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.709039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.709104] Hardware name: linux,dummy-virt (DT)
[   22.709563] Call trace:
[   22.710723]  show_stack+0x20/0x38 (C)
[   22.710879]  dump_stack_lvl+0x8c/0xd0
[   22.711001]  print_report+0x118/0x608
[   22.711401]  kasan_report+0xdc/0x128
[   22.711722]  kasan_check_range+0x100/0x1a8
[   22.712117]  __kasan_check_write+0x20/0x30
[   22.712410]  kasan_atomics_helper+0x1384/0x4858
[   22.712711]  kasan_atomics+0x198/0x2e0
[   22.713027]  kunit_try_run_case+0x170/0x3f0
[   22.713328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.713767]  kthread+0x328/0x630
[   22.714057]  ret_from_fork+0x10/0x20
[   22.714550] 
[   22.714622] Allocated by task 266:
[   22.714799]  kasan_save_stack+0x3c/0x68
[   22.714926]  kasan_save_track+0x20/0x40
[   22.715077]  kasan_save_alloc_info+0x40/0x58
[   22.715164]  __kasan_kmalloc+0xd4/0xd8
[   22.715475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.715783]  kasan_atomics+0xb8/0x2e0
[   22.716902]  kunit_try_run_case+0x170/0x3f0
[   22.717041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.717141]  kthread+0x328/0x630
[   22.717225]  ret_from_fork+0x10/0x20
[   22.717661] 
[   22.717752] The buggy address belongs to the object at fff00000c79e4c00
[   22.717752]  which belongs to the cache kmalloc-64 of size 64
[   22.717928] The buggy address is located 0 bytes to the right of
[   22.717928]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.718086] 
[   22.718135] The buggy address belongs to the physical page:
[   22.718201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.718891] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.719478] page_type: f5(slab)
[   22.719770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.719916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.720015] page dumped because: kasan: bad access detected
[   22.720712] 
[   22.720778] Memory state around the buggy address:
[   22.720859]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.721300]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.721750] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.721895]                                      ^
[   22.722583]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.722696]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.722769] ==================================================================
[   22.847203] ==================================================================
[   22.847332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   22.847471] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.847976] 
[   22.848069] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.848418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.848488] Hardware name: linux,dummy-virt (DT)
[   22.848742] Call trace:
[   22.848823]  show_stack+0x20/0x38 (C)
[   22.848954]  dump_stack_lvl+0x8c/0xd0
[   22.849185]  print_report+0x118/0x608
[   22.849408]  kasan_report+0xdc/0x128
[   22.849532]  kasan_check_range+0x100/0x1a8
[   22.849877]  __kasan_check_write+0x20/0x30
[   22.850241]  kasan_atomics_helper+0x175c/0x4858
[   22.850872]  kasan_atomics+0x198/0x2e0
[   22.851037]  kunit_try_run_case+0x170/0x3f0
[   22.851158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.851370]  kthread+0x328/0x630
[   22.851469]  ret_from_fork+0x10/0x20
[   22.851814] 
[   22.851990] Allocated by task 266:
[   22.852191]  kasan_save_stack+0x3c/0x68
[   22.852563]  kasan_save_track+0x20/0x40
[   22.852819]  kasan_save_alloc_info+0x40/0x58
[   22.852938]  __kasan_kmalloc+0xd4/0xd8
[   22.853032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.853200]  kasan_atomics+0xb8/0x2e0
[   22.853281]  kunit_try_run_case+0x170/0x3f0
[   22.853653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.853845]  kthread+0x328/0x630
[   22.853947]  ret_from_fork+0x10/0x20
[   22.854067] 
[   22.854116] The buggy address belongs to the object at fff00000c79e4c00
[   22.854116]  which belongs to the cache kmalloc-64 of size 64
[   22.854222] The buggy address is located 0 bytes to the right of
[   22.854222]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.854291] 
[   22.854317] The buggy address belongs to the physical page:
[   22.854379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.854470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.854525] page_type: f5(slab)
[   22.854568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.854622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.854666] page dumped because: kasan: bad access detected
[   22.854713] 
[   22.854735] Memory state around the buggy address:
[   22.854770]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.854816]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.854861] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.854900]                                      ^
[   22.854937]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.854981]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.855019] ==================================================================
[   22.692850] ==================================================================
[   22.692966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   22.693079] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.693196] 
[   22.693269] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.693474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.693539] Hardware name: linux,dummy-virt (DT)
[   22.693614] Call trace:
[   22.695149]  show_stack+0x20/0x38 (C)
[   22.695341]  dump_stack_lvl+0x8c/0xd0
[   22.695471]  print_report+0x118/0x608
[   22.695573]  kasan_report+0xdc/0x128
[   22.695687]  kasan_check_range+0x100/0x1a8
[   22.696342]  __kasan_check_write+0x20/0x30
[   22.696781]  kasan_atomics_helper+0x12d8/0x4858
[   22.696894]  kasan_atomics+0x198/0x2e0
[   22.697465]  kunit_try_run_case+0x170/0x3f0
[   22.697860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.698707]  kthread+0x328/0x630
[   22.698841]  ret_from_fork+0x10/0x20
[   22.699006] 
[   22.699311] Allocated by task 266:
[   22.699393]  kasan_save_stack+0x3c/0x68
[   22.699487]  kasan_save_track+0x20/0x40
[   22.699568]  kasan_save_alloc_info+0x40/0x58
[   22.700122]  __kasan_kmalloc+0xd4/0xd8
[   22.700561]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.700733]  kasan_atomics+0xb8/0x2e0
[   22.700829]  kunit_try_run_case+0x170/0x3f0
[   22.701895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.702021]  kthread+0x328/0x630
[   22.702105]  ret_from_fork+0x10/0x20
[   22.702430] 
[   22.702543] The buggy address belongs to the object at fff00000c79e4c00
[   22.702543]  which belongs to the cache kmalloc-64 of size 64
[   22.702685] The buggy address is located 0 bytes to the right of
[   22.702685]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.702983] 
[   22.703709] The buggy address belongs to the physical page:
[   22.703813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.703942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.704388] page_type: f5(slab)
[   22.704499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.704625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.705426] page dumped because: kasan: bad access detected
[   22.705589] 
[   22.705660] Memory state around the buggy address:
[   22.706089]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.706211]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.706294] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.706392]                                      ^
[   22.706488]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.707172]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.707445] ==================================================================
[   22.765088] ==================================================================
[   22.765202] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   22.765309] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.765769] 
[   22.765866] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.766054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.766204] Hardware name: linux,dummy-virt (DT)
[   22.766463] Call trace:
[   22.766549]  show_stack+0x20/0x38 (C)
[   22.766662]  dump_stack_lvl+0x8c/0xd0
[   22.766749]  print_report+0x118/0x608
[   22.766999]  kasan_report+0xdc/0x128
[   22.767125]  kasan_check_range+0x100/0x1a8
[   22.767231]  __kasan_check_write+0x20/0x30
[   22.767540]  kasan_atomics_helper+0x14e4/0x4858
[   22.767670]  kasan_atomics+0x198/0x2e0
[   22.767782]  kunit_try_run_case+0x170/0x3f0
[   22.768097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.768316]  kthread+0x328/0x630
[   22.768444]  ret_from_fork+0x10/0x20
[   22.768569] 
[   22.768623] Allocated by task 266:
[   22.768693]  kasan_save_stack+0x3c/0x68
[   22.768784]  kasan_save_track+0x20/0x40
[   22.768884]  kasan_save_alloc_info+0x40/0x58
[   22.768966]  __kasan_kmalloc+0xd4/0xd8
[   22.769050]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.769424]  kasan_atomics+0xb8/0x2e0
[   22.769610]  kunit_try_run_case+0x170/0x3f0
[   22.769708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.769973]  kthread+0x328/0x630
[   22.770835]  ret_from_fork+0x10/0x20
[   22.770939] 
[   22.770966] The buggy address belongs to the object at fff00000c79e4c00
[   22.770966]  which belongs to the cache kmalloc-64 of size 64
[   22.771031] The buggy address is located 0 bytes to the right of
[   22.771031]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.771096] 
[   22.771118] The buggy address belongs to the physical page:
[   22.771153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.771206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.771256] page_type: f5(slab)
[   22.771298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.771352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.771413] page dumped because: kasan: bad access detected
[   22.771447] 
[   22.771470] Memory state around the buggy address:
[   22.771505]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.771550]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.771594] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.771635]                                      ^
[   22.771669]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.771712]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.771750] ==================================================================
[   22.570060] ==================================================================
[   22.570623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   22.570848] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.570994] 
[   22.571075] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.571495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.571769] Hardware name: linux,dummy-virt (DT)
[   22.572136] Call trace:
[   22.572497]  show_stack+0x20/0x38 (C)
[   22.572937]  dump_stack_lvl+0x8c/0xd0
[   22.573158]  print_report+0x118/0x608
[   22.573388]  kasan_report+0xdc/0x128
[   22.573506]  kasan_check_range+0x100/0x1a8
[   22.573617]  __kasan_check_write+0x20/0x30
[   22.573730]  kasan_atomics_helper+0xf88/0x4858
[   22.573847]  kasan_atomics+0x198/0x2e0
[   22.574762]  kunit_try_run_case+0x170/0x3f0
[   22.575073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.575606]  kthread+0x328/0x630
[   22.575734]  ret_from_fork+0x10/0x20
[   22.576461] 
[   22.576772] Allocated by task 266:
[   22.576874]  kasan_save_stack+0x3c/0x68
[   22.577222]  kasan_save_track+0x20/0x40
[   22.577378]  kasan_save_alloc_info+0x40/0x58
[   22.577901]  __kasan_kmalloc+0xd4/0xd8
[   22.578378]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.578493]  kasan_atomics+0xb8/0x2e0
[   22.578585]  kunit_try_run_case+0x170/0x3f0
[   22.578670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.578776]  kthread+0x328/0x630
[   22.578863]  ret_from_fork+0x10/0x20
[   22.579388] 
[   22.579529] The buggy address belongs to the object at fff00000c79e4c00
[   22.579529]  which belongs to the cache kmalloc-64 of size 64
[   22.579687] The buggy address is located 0 bytes to the right of
[   22.579687]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.580519] 
[   22.580696] The buggy address belongs to the physical page:
[   22.580779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.581548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.581749] page_type: f5(slab)
[   22.581851] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.582222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.582686] page dumped because: kasan: bad access detected
[   22.582824] 
[   22.582996] Memory state around the buggy address:
[   22.583074]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.583171]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.583270] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.583379]                                      ^
[   22.583682]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.584022]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.584754] ==================================================================
[   22.522860] ==================================================================
[   22.523155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   22.523305] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.523478] 
[   22.523587] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.523841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.523934] Hardware name: linux,dummy-virt (DT)
[   22.524037] Call trace:
[   22.524107]  show_stack+0x20/0x38 (C)
[   22.524255]  dump_stack_lvl+0x8c/0xd0
[   22.524425]  print_report+0x118/0x608
[   22.524576]  kasan_report+0xdc/0x128
[   22.524691]  __asan_report_load8_noabort+0x20/0x30
[   22.524796]  kasan_atomics_helper+0x3f58/0x4858
[   22.524925]  kasan_atomics+0x198/0x2e0
[   22.525072]  kunit_try_run_case+0x170/0x3f0
[   22.525225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.525656]  kthread+0x328/0x630
[   22.525942]  ret_from_fork+0x10/0x20
[   22.526278] 
[   22.526457] Allocated by task 266:
[   22.526651]  kasan_save_stack+0x3c/0x68
[   22.526757]  kasan_save_track+0x20/0x40
[   22.526840]  kasan_save_alloc_info+0x40/0x58
[   22.526911]  __kasan_kmalloc+0xd4/0xd8
[   22.526995]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.527079]  kasan_atomics+0xb8/0x2e0
[   22.527280]  kunit_try_run_case+0x170/0x3f0
[   22.527387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.527485]  kthread+0x328/0x630
[   22.527568]  ret_from_fork+0x10/0x20
[   22.527657] 
[   22.527703] The buggy address belongs to the object at fff00000c79e4c00
[   22.527703]  which belongs to the cache kmalloc-64 of size 64
[   22.528696] The buggy address is located 0 bytes to the right of
[   22.528696]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.528860] 
[   22.528998] The buggy address belongs to the physical page:
[   22.529076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.529202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.529315] page_type: f5(slab)
[   22.529417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.529543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.529683] page dumped because: kasan: bad access detected
[   22.529772] 
[   22.529815] Memory state around the buggy address:
[   22.529887]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.530019]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.530102] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.530185]                                      ^
[   22.531154]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.531369]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.531493] ==================================================================
[   22.544209] ==================================================================
[   22.544336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   22.544482] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.544604] 
[   22.544705] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.544889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.544955] Hardware name: linux,dummy-virt (DT)
[   22.545035] Call trace:
[   22.545087]  show_stack+0x20/0x38 (C)
[   22.545210]  dump_stack_lvl+0x8c/0xd0
[   22.545319]  print_report+0x118/0x608
[   22.545451]  kasan_report+0xdc/0x128
[   22.545562]  __asan_report_store8_noabort+0x20/0x30
[   22.545675]  kasan_atomics_helper+0x3e5c/0x4858
[   22.545790]  kasan_atomics+0x198/0x2e0
[   22.545893]  kunit_try_run_case+0x170/0x3f0
[   22.546008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.546121]  kthread+0x328/0x630
[   22.546217]  ret_from_fork+0x10/0x20
[   22.546336] 
[   22.546403] Allocated by task 266:
[   22.546482]  kasan_save_stack+0x3c/0x68
[   22.546592]  kasan_save_track+0x20/0x40
[   22.546682]  kasan_save_alloc_info+0x40/0x58
[   22.546789]  __kasan_kmalloc+0xd4/0xd8
[   22.546905]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.547011]  kasan_atomics+0xb8/0x2e0
[   22.547103]  kunit_try_run_case+0x170/0x3f0
[   22.547201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.547310]  kthread+0x328/0x630
[   22.547413]  ret_from_fork+0x10/0x20
[   22.547493] 
[   22.547545] The buggy address belongs to the object at fff00000c79e4c00
[   22.547545]  which belongs to the cache kmalloc-64 of size 64
[   22.547686] The buggy address is located 0 bytes to the right of
[   22.547686]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.547870] 
[   22.547925] The buggy address belongs to the physical page:
[   22.548003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.548124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.548257] page_type: f5(slab)
[   22.548381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.548561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.548672] page dumped because: kasan: bad access detected
[   22.548736] 
[   22.548770] Memory state around the buggy address:
[   22.548999]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.549122]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.549222] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.549306]                                      ^
[   22.549404]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.549499]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.549615] ==================================================================
[   22.660992] ==================================================================
[   22.661093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   22.661203] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.661318] 
[   22.661906] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.662103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.662684] Hardware name: linux,dummy-virt (DT)
[   22.662793] Call trace:
[   22.662862]  show_stack+0x20/0x38 (C)
[   22.663422]  dump_stack_lvl+0x8c/0xd0
[   22.663591]  print_report+0x118/0x608
[   22.664548]  kasan_report+0xdc/0x128
[   22.664762]  kasan_check_range+0x100/0x1a8
[   22.664875]  __kasan_check_write+0x20/0x30
[   22.665243]  kasan_atomics_helper+0x11f8/0x4858
[   22.665383]  kasan_atomics+0x198/0x2e0
[   22.665562]  kunit_try_run_case+0x170/0x3f0
[   22.666062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.666335]  kthread+0x328/0x630
[   22.666926]  ret_from_fork+0x10/0x20
[   22.667134] 
[   22.667205] Allocated by task 266:
[   22.667278]  kasan_save_stack+0x3c/0x68
[   22.667376]  kasan_save_track+0x20/0x40
[   22.667452]  kasan_save_alloc_info+0x40/0x58
[   22.667539]  __kasan_kmalloc+0xd4/0xd8
[   22.668266]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.668536]  kasan_atomics+0xb8/0x2e0
[   22.668639]  kunit_try_run_case+0x170/0x3f0
[   22.668810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.668912]  kthread+0x328/0x630
[   22.668990]  ret_from_fork+0x10/0x20
[   22.669705] 
[   22.669780] The buggy address belongs to the object at fff00000c79e4c00
[   22.669780]  which belongs to the cache kmalloc-64 of size 64
[   22.669918] The buggy address is located 0 bytes to the right of
[   22.669918]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.670792] 
[   22.670866] The buggy address belongs to the physical page:
[   22.670940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.671047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.671156] page_type: f5(slab)
[   22.671505] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.672018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.672126] page dumped because: kasan: bad access detected
[   22.672208] 
[   22.672261] Memory state around the buggy address:
[   22.672895]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.673479]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.673757] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.674039]                                      ^
[   22.674312]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.674928]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.675391] ==================================================================
[   22.797478] ==================================================================
[   22.797595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   22.798325] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.798500] 
[   22.798566] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.798731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.799050] Hardware name: linux,dummy-virt (DT)
[   22.799588] Call trace:
[   22.799658]  show_stack+0x20/0x38 (C)
[   22.799776]  dump_stack_lvl+0x8c/0xd0
[   22.799883]  print_report+0x118/0x608
[   22.799995]  kasan_report+0xdc/0x128
[   22.800124]  __asan_report_load8_noabort+0x20/0x30
[   22.800248]  kasan_atomics_helper+0x3db0/0x4858
[   22.802037]  kasan_atomics+0x198/0x2e0
[   22.802183]  kunit_try_run_case+0x170/0x3f0
[   22.802292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.802434]  kthread+0x328/0x630
[   22.802505]  ret_from_fork+0x10/0x20
[   22.802558] 
[   22.802584] Allocated by task 266:
[   22.802640]  kasan_save_stack+0x3c/0x68
[   22.802691]  kasan_save_track+0x20/0x40
[   22.802732]  kasan_save_alloc_info+0x40/0x58
[   22.802776]  __kasan_kmalloc+0xd4/0xd8
[   22.802815]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.802858]  kasan_atomics+0xb8/0x2e0
[   22.802897]  kunit_try_run_case+0x170/0x3f0
[   22.802939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.802984]  kthread+0x328/0x630
[   22.803019]  ret_from_fork+0x10/0x20
[   22.803058] 
[   22.803082] The buggy address belongs to the object at fff00000c79e4c00
[   22.803082]  which belongs to the cache kmalloc-64 of size 64
[   22.803143] The buggy address is located 0 bytes to the right of
[   22.803143]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.803209] 
[   22.803232] The buggy address belongs to the physical page:
[   22.803266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.803322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.803408] page_type: f5(slab)
[   22.803528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.803673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.803853] page dumped because: kasan: bad access detected
[   22.803940] 
[   22.804038] Memory state around the buggy address:
[   22.804125]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.804296]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.804610] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.804708]                                      ^
[   22.804897]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.804951]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.804995] ==================================================================
[   22.805288] ==================================================================
[   22.805338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   22.805453] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.805567] 
[   22.805637] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.805865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.805939] Hardware name: linux,dummy-virt (DT)
[   22.806014] Call trace:
[   22.806073]  show_stack+0x20/0x38 (C)
[   22.806233]  dump_stack_lvl+0x8c/0xd0
[   22.806401]  print_report+0x118/0x608
[   22.806576]  kasan_report+0xdc/0x128
[   22.806733]  kasan_check_range+0x100/0x1a8
[   22.806884]  __kasan_check_write+0x20/0x30
[   22.807038]  kasan_atomics_helper+0x1644/0x4858
[   22.807156]  kasan_atomics+0x198/0x2e0
[   22.807285]  kunit_try_run_case+0x170/0x3f0
[   22.807419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.807535]  kthread+0x328/0x630
[   22.807849]  ret_from_fork+0x10/0x20
[   22.808046] 
[   22.808100] Allocated by task 266:
[   22.808494]  kasan_save_stack+0x3c/0x68
[   22.808837]  kasan_save_track+0x20/0x40
[   22.808923]  kasan_save_alloc_info+0x40/0x58
[   22.809014]  __kasan_kmalloc+0xd4/0xd8
[   22.809087]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.809164]  kasan_atomics+0xb8/0x2e0
[   22.809538]  kunit_try_run_case+0x170/0x3f0
[   22.809685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.809795]  kthread+0x328/0x630
[   22.809882]  ret_from_fork+0x10/0x20
[   22.809969] 
[   22.810022] The buggy address belongs to the object at fff00000c79e4c00
[   22.810022]  which belongs to the cache kmalloc-64 of size 64
[   22.810434] The buggy address is located 0 bytes to the right of
[   22.810434]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.810586] 
[   22.810636] The buggy address belongs to the physical page:
[   22.810730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.810911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.811070] page_type: f5(slab)
[   22.811188] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.811314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.811420] page dumped because: kasan: bad access detected
[   22.811493] 
[   22.811540] Memory state around the buggy address:
[   22.811945]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.812049]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.812149] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.812241]                                      ^
[   22.812762]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.812884]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.812981] ==================================================================
[   22.404697] ==================================================================
[   22.404831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   22.404972] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.405284] 
[   22.405380] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.406629]  kasan_atomics+0x198/0x2e0
[   22.407214] 
[   22.407262] Allocated by task 266:
[   22.407327]  kasan_save_stack+0x3c/0x68
[   22.407472]  kasan_save_track+0x20/0x40
[   22.407633]  kasan_save_alloc_info+0x40/0x58
[   22.407734]  __kasan_kmalloc+0xd4/0xd8
[   22.407814]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.407909]  kasan_atomics+0xb8/0x2e0
[   22.407995]  kunit_try_run_case+0x170/0x3f0
[   22.408091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.408213]  kthread+0x328/0x630
[   22.408321]  ret_from_fork+0x10/0x20
[   22.408433] 
[   22.408504] The buggy address belongs to the object at fff00000c79e4c00
[   22.408504]  which belongs to the cache kmalloc-64 of size 64
[   22.408666] The buggy address is located 0 bytes to the right of
[   22.408666]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.408814] 
[   22.408871] The buggy address belongs to the physical page:
[   22.408940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.409087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.409242] page_type: f5(slab)
[   22.409375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.409544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.409682] page dumped because: kasan: bad access detected
[   22.409789] 
[   22.409854] Memory state around the buggy address:
[   22.409957]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.410057]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.410149] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.410281]                                      ^
[   22.410380]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.410487]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.410585] ==================================================================
[   22.782567] ==================================================================
[   22.782677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   22.782788] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.782903] 
[   22.783422] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.783650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.783720] Hardware name: linux,dummy-virt (DT)
[   22.783998] Call trace:
[   22.784082]  show_stack+0x20/0x38 (C)
[   22.784491]  dump_stack_lvl+0x8c/0xd0
[   22.784608]  print_report+0x118/0x608
[   22.784712]  kasan_report+0xdc/0x128
[   22.785456]  kasan_check_range+0x100/0x1a8
[   22.785665]  __kasan_check_write+0x20/0x30
[   22.785766]  kasan_atomics_helper+0x15b4/0x4858
[   22.786122]  kasan_atomics+0x198/0x2e0
[   22.786620]  kunit_try_run_case+0x170/0x3f0
[   22.787039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.787502]  kthread+0x328/0x630
[   22.787623]  ret_from_fork+0x10/0x20
[   22.787736] 
[   22.787783] Allocated by task 266:
[   22.788242]  kasan_save_stack+0x3c/0x68
[   22.788571]  kasan_save_track+0x20/0x40
[   22.788676]  kasan_save_alloc_info+0x40/0x58
[   22.789219]  __kasan_kmalloc+0xd4/0xd8
[   22.789451]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.789569]  kasan_atomics+0xb8/0x2e0
[   22.790072]  kunit_try_run_case+0x170/0x3f0
[   22.790555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.790684]  kthread+0x328/0x630
[   22.790934]  ret_from_fork+0x10/0x20
[   22.791069] 
[   22.791113] The buggy address belongs to the object at fff00000c79e4c00
[   22.791113]  which belongs to the cache kmalloc-64 of size 64
[   22.791237] The buggy address is located 0 bytes to the right of
[   22.791237]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.791877] 
[   22.792155] The buggy address belongs to the physical page:
[   22.792257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.792384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.793068] page_type: f5(slab)
[   22.793492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.793792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.793895] page dumped because: kasan: bad access detected
[   22.793970] 
[   22.794324] Memory state around the buggy address:
[   22.794437]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.794984]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.795586] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.795756]                                      ^
[   22.795850]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.796312]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.796580] ==================================================================
[   22.839724] ==================================================================
[   22.839885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   22.840004] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.840132] 
[   22.840239] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.840445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.840516] Hardware name: linux,dummy-virt (DT)
[   22.840589] Call trace:
[   22.840644]  show_stack+0x20/0x38 (C)
[   22.840755]  dump_stack_lvl+0x8c/0xd0
[   22.840872]  print_report+0x118/0x608
[   22.841020]  kasan_report+0xdc/0x128
[   22.841125]  __asan_report_load8_noabort+0x20/0x30
[   22.841276]  kasan_atomics_helper+0x3e10/0x4858
[   22.841814]  kasan_atomics+0x198/0x2e0
[   22.841982]  kunit_try_run_case+0x170/0x3f0
[   22.842114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.842326]  kthread+0x328/0x630
[   22.842456]  ret_from_fork+0x10/0x20
[   22.842615] 
[   22.842691] Allocated by task 266:
[   22.842763]  kasan_save_stack+0x3c/0x68
[   22.842863]  kasan_save_track+0x20/0x40
[   22.842953]  kasan_save_alloc_info+0x40/0x58
[   22.843050]  __kasan_kmalloc+0xd4/0xd8
[   22.843154]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.843271]  kasan_atomics+0xb8/0x2e0
[   22.843341]  kunit_try_run_case+0x170/0x3f0
[   22.843436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.843537]  kthread+0x328/0x630
[   22.843648]  ret_from_fork+0x10/0x20
[   22.843724] 
[   22.843772] The buggy address belongs to the object at fff00000c79e4c00
[   22.843772]  which belongs to the cache kmalloc-64 of size 64
[   22.843948] The buggy address is located 0 bytes to the right of
[   22.843948]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.844107] 
[   22.844164] The buggy address belongs to the physical page:
[   22.844240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.844373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.844493] page_type: f5(slab)
[   22.844580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.844734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.844848] page dumped because: kasan: bad access detected
[   22.844927] 
[   22.844991] Memory state around the buggy address:
[   22.845242]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.845455]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.845673] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.845773]                                      ^
[   22.845860]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.845957]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.846473] ==================================================================
[   22.676696] ==================================================================
[   22.676820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   22.676934] Write of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.677051] 
[   22.677661] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.678132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.678413] Hardware name: linux,dummy-virt (DT)
[   22.678858] Call trace:
[   22.679040]  show_stack+0x20/0x38 (C)
[   22.679186]  dump_stack_lvl+0x8c/0xd0
[   22.679283]  print_report+0x118/0x608
[   22.679611]  kasan_report+0xdc/0x128
[   22.680052]  kasan_check_range+0x100/0x1a8
[   22.680174]  __kasan_check_write+0x20/0x30
[   22.680706]  kasan_atomics_helper+0x126c/0x4858
[   22.680840]  kasan_atomics+0x198/0x2e0
[   22.680945]  kunit_try_run_case+0x170/0x3f0
[   22.681605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.682031]  kthread+0x328/0x630
[   22.682158]  ret_from_fork+0x10/0x20
[   22.682316] 
[   22.682645] Allocated by task 266:
[   22.682733]  kasan_save_stack+0x3c/0x68
[   22.682845]  kasan_save_track+0x20/0x40
[   22.683494]  kasan_save_alloc_info+0x40/0x58
[   22.683662]  __kasan_kmalloc+0xd4/0xd8
[   22.683756]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.683936]  kasan_atomics+0xb8/0x2e0
[   22.684024]  kunit_try_run_case+0x170/0x3f0
[   22.684526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.684648]  kthread+0x328/0x630
[   22.685065]  ret_from_fork+0x10/0x20
[   22.685719] 
[   22.685788] The buggy address belongs to the object at fff00000c79e4c00
[   22.685788]  which belongs to the cache kmalloc-64 of size 64
[   22.686049] The buggy address is located 0 bytes to the right of
[   22.686049]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.686476] 
[   22.686829] The buggy address belongs to the physical page:
[   22.687191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.687573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.687707] page_type: f5(slab)
[   22.688470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.688610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.689239] page dumped because: kasan: bad access detected
[   22.689529] 
[   22.689852] Memory state around the buggy address:
[   22.689954]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.690270]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.690395] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.690493]                                      ^
[   22.691056]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.691544]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.691674] ==================================================================
[   22.813890] ==================================================================
[   22.814302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   22.815118] Read of size 8 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.815258] 
[   22.815517] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.815838] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.816060] Hardware name: linux,dummy-virt (DT)
[   22.816285] Call trace:
[   22.816380]  show_stack+0x20/0x38 (C)
[   22.816928]  dump_stack_lvl+0x8c/0xd0
[   22.817049]  print_report+0x118/0x608
[   22.817160]  kasan_report+0xdc/0x128
[   22.817272]  __asan_report_load8_noabort+0x20/0x30
[   22.817406]  kasan_atomics_helper+0x3df4/0x4858
[   22.817531]  kasan_atomics+0x198/0x2e0
[   22.817641]  kunit_try_run_case+0x170/0x3f0
[   22.817758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.818682]  kthread+0x328/0x630
[   22.820126]  ret_from_fork+0x10/0x20
[   22.821025] 
[   22.821114] Allocated by task 266:
[   22.821207]  kasan_save_stack+0x3c/0x68
[   22.821578]  kasan_save_track+0x20/0x40
[   22.821774]  kasan_save_alloc_info+0x40/0x58
[   22.822064]  __kasan_kmalloc+0xd4/0xd8
[   22.822628]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.822799]  kasan_atomics+0xb8/0x2e0
[   22.822881]  kunit_try_run_case+0x170/0x3f0
[   22.823312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.823577]  kthread+0x328/0x630
[   22.823769]  ret_from_fork+0x10/0x20
[   22.823946] 
[   22.824139] The buggy address belongs to the object at fff00000c79e4c00
[   22.824139]  which belongs to the cache kmalloc-64 of size 64
[   22.824643] The buggy address is located 0 bytes to the right of
[   22.824643]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.824815] 
[   22.824885] The buggy address belongs to the physical page:
[   22.824955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.825076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.825189] page_type: f5(slab)
[   22.825277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.825411] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.825508] page dumped because: kasan: bad access detected
[   22.825579] 
[   22.825625] Memory state around the buggy address:
[   22.825701]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.825807]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.825911] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.826052]                                      ^
[   22.826134]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.826238]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.826331] ==================================================================
[   22.495779] ==================================================================
[   22.495883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   22.496279] Read of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.496480] 
[   22.496583] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.496839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.496905] Hardware name: linux,dummy-virt (DT)
[   22.496973] Call trace:
[   22.497020]  show_stack+0x20/0x38 (C)
[   22.497271]  dump_stack_lvl+0x8c/0xd0
[   22.497489]  print_report+0x118/0x608
[   22.497692]  kasan_report+0xdc/0x128
[   22.497868]  __asan_report_load4_noabort+0x20/0x30
[   22.498016]  kasan_atomics_helper+0x3e04/0x4858
[   22.498134]  kasan_atomics+0x198/0x2e0
[   22.498277]  kunit_try_run_case+0x170/0x3f0
[   22.498687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.498992]  kthread+0x328/0x630
[   22.499094]  ret_from_fork+0x10/0x20
[   22.499454] 
[   22.499531] Allocated by task 266:
[   22.499612]  kasan_save_stack+0x3c/0x68
[   22.499722]  kasan_save_track+0x20/0x40
[   22.499839]  kasan_save_alloc_info+0x40/0x58
[   22.499962]  __kasan_kmalloc+0xd4/0xd8
[   22.500051]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.500126]  kasan_atomics+0xb8/0x2e0
[   22.500580]  kunit_try_run_case+0x170/0x3f0
[   22.500704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.500811]  kthread+0x328/0x630
[   22.500916]  ret_from_fork+0x10/0x20
[   22.500998] 
[   22.501040] The buggy address belongs to the object at fff00000c79e4c00
[   22.501040]  which belongs to the cache kmalloc-64 of size 64
[   22.501182] The buggy address is located 0 bytes to the right of
[   22.501182]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.501337] 
[   22.501410] The buggy address belongs to the physical page:
[   22.501481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.501722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.501996] page_type: f5(slab)
[   22.502081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.502266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.502370] page dumped because: kasan: bad access detected
[   22.502692] 
[   22.502781] Memory state around the buggy address:
[   22.502994]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.503334]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.503665] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.503752]                                      ^
[   22.503832]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.505011]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.505292] ==================================================================
[   22.411866] ==================================================================
[   22.411982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   22.412091] Write of size 4 at addr fff00000c79e4c30 by task kunit_try_catch/266
[   22.412210] 
[   22.412278] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.412708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.412839] Hardware name: linux,dummy-virt (DT)
[   22.412916] Call trace:
[   22.412973]  show_stack+0x20/0x38 (C)
[   22.413107]  dump_stack_lvl+0x8c/0xd0
[   22.413212]  print_report+0x118/0x608
[   22.413350]  kasan_report+0xdc/0x128
[   22.413528]  kasan_check_range+0x100/0x1a8
[   22.413685]  __kasan_check_write+0x20/0x30
[   22.413829]  kasan_atomics_helper+0xa6c/0x4858
[   22.413985]  kasan_atomics+0x198/0x2e0
[   22.414131]  kunit_try_run_case+0x170/0x3f0
[   22.414270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.414400]  kthread+0x328/0x630
[   22.414506]  ret_from_fork+0x10/0x20
[   22.414624] 
[   22.414672] Allocated by task 266:
[   22.414738]  kasan_save_stack+0x3c/0x68
[   22.414841]  kasan_save_track+0x20/0x40
[   22.414966]  kasan_save_alloc_info+0x40/0x58
[   22.415056]  __kasan_kmalloc+0xd4/0xd8
[   22.415144]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.415249]  kasan_atomics+0xb8/0x2e0
[   22.415344]  kunit_try_run_case+0x170/0x3f0
[   22.415462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.415580]  kthread+0x328/0x630
[   22.415650]  ret_from_fork+0x10/0x20
[   22.415727] 
[   22.415805] The buggy address belongs to the object at fff00000c79e4c00
[   22.415805]  which belongs to the cache kmalloc-64 of size 64
[   22.415981] The buggy address is located 0 bytes to the right of
[   22.415981]  allocated 48-byte region [fff00000c79e4c00, fff00000c79e4c30)
[   22.416155] 
[   22.416203] The buggy address belongs to the physical page:
[   22.416278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079e4
[   22.416411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.416527] page_type: f5(slab)
[   22.416692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.416835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.416919] page dumped because: kasan: bad access detected
[   22.416979] 
[   22.417455] Memory state around the buggy address:
[   22.417552]  fff00000c79e4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.417605]  fff00000c79e4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.417651] >fff00000c79e4c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.417691]                                      ^
[   22.417729]  fff00000c79e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.417772]  fff00000c79e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.417812] ==================================================================

[   16.892393] ==================================================================
[   16.892755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   16.893098] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.893393] 
[   16.893499] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.893555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.893572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.893601] Call Trace:
[   16.893624]  <TASK>
[   16.893710]  dump_stack_lvl+0x73/0xb0
[   16.893754]  print_report+0xd1/0x650
[   16.893783]  ? __virt_addr_valid+0x1db/0x2d0
[   16.893854]  ? kasan_atomics_helper+0xac7/0x5450
[   16.893884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.893913]  ? kasan_atomics_helper+0xac7/0x5450
[   16.893940]  kasan_report+0x141/0x180
[   16.893969]  ? kasan_atomics_helper+0xac7/0x5450
[   16.894001]  kasan_check_range+0x10c/0x1c0
[   16.894031]  __kasan_check_write+0x18/0x20
[   16.894056]  kasan_atomics_helper+0xac7/0x5450
[   16.894084]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.894112]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.894143]  ? kasan_atomics+0x152/0x310
[   16.894177]  kasan_atomics+0x1dc/0x310
[   16.894205]  ? __pfx_kasan_atomics+0x10/0x10
[   16.894236]  ? __pfx_read_tsc+0x10/0x10
[   16.894263]  ? ktime_get_ts64+0x86/0x230
[   16.894292]  kunit_try_run_case+0x1a5/0x480
[   16.894324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.894351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.894382]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.894411]  ? __kthread_parkme+0x82/0x180
[   16.894442]  ? preempt_count_sub+0x50/0x80
[   16.894471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.894500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.894529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.894558]  kthread+0x337/0x6f0
[   16.894582]  ? trace_preempt_on+0x20/0xc0
[   16.894611]  ? __pfx_kthread+0x10/0x10
[   16.894637]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.894677]  ? calculate_sigpending+0x7b/0xa0
[   16.894707]  ? __pfx_kthread+0x10/0x10
[   16.894733]  ret_from_fork+0x116/0x1d0
[   16.894757]  ? __pfx_kthread+0x10/0x10
[   16.894782]  ret_from_fork_asm+0x1a/0x30
[   16.894868]  </TASK>
[   16.894883] 
[   16.904927] Allocated by task 283:
[   16.905121]  kasan_save_stack+0x45/0x70
[   16.905303]  kasan_save_track+0x18/0x40
[   16.905466]  kasan_save_alloc_info+0x3b/0x50
[   16.905713]  __kasan_kmalloc+0xb7/0xc0
[   16.905938]  __kmalloc_cache_noprof+0x189/0x420
[   16.906207]  kasan_atomics+0x95/0x310
[   16.906441]  kunit_try_run_case+0x1a5/0x480
[   16.906713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.906920]  kthread+0x337/0x6f0
[   16.907065]  ret_from_fork+0x116/0x1d0
[   16.907270]  ret_from_fork_asm+0x1a/0x30
[   16.907509] 
[   16.907624] The buggy address belongs to the object at ffff888103349180
[   16.907624]  which belongs to the cache kmalloc-64 of size 64
[   16.908276] The buggy address is located 0 bytes to the right of
[   16.908276]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.910687] 
[   16.911109] The buggy address belongs to the physical page:
[   16.911364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.911683] flags: 0x200000000000000(node=0|zone=2)
[   16.912009] page_type: f5(slab)
[   16.912578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.913535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.914769] page dumped because: kasan: bad access detected
[   16.915560] 
[   16.915773] Memory state around the buggy address:
[   16.916382]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.916743]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.917028] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.917915]                                      ^
[   16.918465]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.919321]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.920078] ==================================================================
[   16.519549] ==================================================================
[   16.519863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   16.520788] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.521488] 
[   16.521887] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.521953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.521971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.522000] Call Trace:
[   16.522024]  <TASK>
[   16.522048]  dump_stack_lvl+0x73/0xb0
[   16.522086]  print_report+0xd1/0x650
[   16.522117]  ? __virt_addr_valid+0x1db/0x2d0
[   16.522146]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.522173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.522202]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.522230]  kasan_report+0x141/0x180
[   16.522259]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.522291]  __asan_report_load4_noabort+0x18/0x20
[   16.522322]  kasan_atomics_helper+0x4b54/0x5450
[   16.522349]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.522376]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.522408]  ? kasan_atomics+0x152/0x310
[   16.522449]  kasan_atomics+0x1dc/0x310
[   16.522476]  ? __pfx_kasan_atomics+0x10/0x10
[   16.522507]  ? __pfx_read_tsc+0x10/0x10
[   16.522533]  ? ktime_get_ts64+0x86/0x230
[   16.522564]  kunit_try_run_case+0x1a5/0x480
[   16.522595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.522623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.522666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.522695]  ? __kthread_parkme+0x82/0x180
[   16.522721]  ? preempt_count_sub+0x50/0x80
[   16.522751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.522781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.522809]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.522839]  kthread+0x337/0x6f0
[   16.522863]  ? trace_preempt_on+0x20/0xc0
[   16.522893]  ? __pfx_kthread+0x10/0x10
[   16.522920]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.522945]  ? calculate_sigpending+0x7b/0xa0
[   16.522975]  ? __pfx_kthread+0x10/0x10
[   16.523003]  ret_from_fork+0x116/0x1d0
[   16.523026]  ? __pfx_kthread+0x10/0x10
[   16.523052]  ret_from_fork_asm+0x1a/0x30
[   16.523091]  </TASK>
[   16.523106] 
[   16.536469] Allocated by task 283:
[   16.536719]  kasan_save_stack+0x45/0x70
[   16.537494]  kasan_save_track+0x18/0x40
[   16.537939]  kasan_save_alloc_info+0x3b/0x50
[   16.538297]  __kasan_kmalloc+0xb7/0xc0
[   16.538630]  __kmalloc_cache_noprof+0x189/0x420
[   16.538900]  kasan_atomics+0x95/0x310
[   16.539270]  kunit_try_run_case+0x1a5/0x480
[   16.539509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.539971]  kthread+0x337/0x6f0
[   16.540144]  ret_from_fork+0x116/0x1d0
[   16.540545]  ret_from_fork_asm+0x1a/0x30
[   16.540922] 
[   16.541158] The buggy address belongs to the object at ffff888103349180
[   16.541158]  which belongs to the cache kmalloc-64 of size 64
[   16.541871] The buggy address is located 0 bytes to the right of
[   16.541871]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.542664] 
[   16.543537] The buggy address belongs to the physical page:
[   16.544412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.544737] flags: 0x200000000000000(node=0|zone=2)
[   16.544942] page_type: f5(slab)
[   16.545095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.545367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.545637] page dumped because: kasan: bad access detected
[   16.546981] 
[   16.547083] Memory state around the buggy address:
[   16.547293]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.547567]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.548420] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.549616]                                      ^
[   16.551005]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.552399]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.553826] ==================================================================
[   16.869561] ==================================================================
[   16.870269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   16.870634] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.870979] 
[   16.871185] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.871248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.871266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.871296] Call Trace:
[   16.871322]  <TASK>
[   16.871349]  dump_stack_lvl+0x73/0xb0
[   16.871386]  print_report+0xd1/0x650
[   16.871414]  ? __virt_addr_valid+0x1db/0x2d0
[   16.871445]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.871471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.871500]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.871527]  kasan_report+0x141/0x180
[   16.871556]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.871588]  kasan_check_range+0x10c/0x1c0
[   16.871619]  __kasan_check_write+0x18/0x20
[   16.871644]  kasan_atomics_helper+0xa2b/0x5450
[   16.871688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.871716]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.871748]  ? kasan_atomics+0x152/0x310
[   16.871794]  kasan_atomics+0x1dc/0x310
[   16.871824]  ? __pfx_kasan_atomics+0x10/0x10
[   16.871855]  ? __pfx_read_tsc+0x10/0x10
[   16.871883]  ? ktime_get_ts64+0x86/0x230
[   16.871913]  kunit_try_run_case+0x1a5/0x480
[   16.871945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.871974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.872003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.872033]  ? __kthread_parkme+0x82/0x180
[   16.872059]  ? preempt_count_sub+0x50/0x80
[   16.872089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.872119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.872148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.872177]  kthread+0x337/0x6f0
[   16.872203]  ? trace_preempt_on+0x20/0xc0
[   16.872233]  ? __pfx_kthread+0x10/0x10
[   16.872259]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.872286]  ? calculate_sigpending+0x7b/0xa0
[   16.872315]  ? __pfx_kthread+0x10/0x10
[   16.872344]  ret_from_fork+0x116/0x1d0
[   16.872368]  ? __pfx_kthread+0x10/0x10
[   16.872393]  ret_from_fork_asm+0x1a/0x30
[   16.872432]  </TASK>
[   16.872448] 
[   16.881702] Allocated by task 283:
[   16.881970]  kasan_save_stack+0x45/0x70
[   16.882212]  kasan_save_track+0x18/0x40
[   16.882383]  kasan_save_alloc_info+0x3b/0x50
[   16.882568]  __kasan_kmalloc+0xb7/0xc0
[   16.882769]  __kmalloc_cache_noprof+0x189/0x420
[   16.883253]  kasan_atomics+0x95/0x310
[   16.883494]  kunit_try_run_case+0x1a5/0x480
[   16.883744]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.884035]  kthread+0x337/0x6f0
[   16.884304]  ret_from_fork+0x116/0x1d0
[   16.884521]  ret_from_fork_asm+0x1a/0x30
[   16.884766] 
[   16.884885] The buggy address belongs to the object at ffff888103349180
[   16.884885]  which belongs to the cache kmalloc-64 of size 64
[   16.885291] The buggy address is located 0 bytes to the right of
[   16.885291]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.886020] 
[   16.886141] The buggy address belongs to the physical page:
[   16.886447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.887063] flags: 0x200000000000000(node=0|zone=2)
[   16.887271] page_type: f5(slab)
[   16.887418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.887710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.888630] page dumped because: kasan: bad access detected
[   16.889238] 
[   16.889373] Memory state around the buggy address:
[   16.889634]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.890241]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.890594] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.890877]                                      ^
[   16.891058]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.891378]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.891777] ==================================================================
[   17.316965] ==================================================================
[   17.317598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   17.318098] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.318440] 
[   17.318585] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.318690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.318710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.318743] Call Trace:
[   17.318768]  <TASK>
[   17.318794]  dump_stack_lvl+0x73/0xb0
[   17.318832]  print_report+0xd1/0x650
[   17.318862]  ? __virt_addr_valid+0x1db/0x2d0
[   17.318893]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.318920]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.318950]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.318978]  kasan_report+0x141/0x180
[   17.319008]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.319041]  kasan_check_range+0x10c/0x1c0
[   17.319071]  __kasan_check_write+0x18/0x20
[   17.319095]  kasan_atomics_helper+0x12e6/0x5450
[   17.319124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.319152]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.319184]  ? kasan_atomics+0x152/0x310
[   17.319219]  kasan_atomics+0x1dc/0x310
[   17.319248]  ? __pfx_kasan_atomics+0x10/0x10
[   17.319279]  ? __pfx_read_tsc+0x10/0x10
[   17.319308]  ? ktime_get_ts64+0x86/0x230
[   17.319339]  kunit_try_run_case+0x1a5/0x480
[   17.319370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.319400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.319431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.319459]  ? __kthread_parkme+0x82/0x180
[   17.319485]  ? preempt_count_sub+0x50/0x80
[   17.319515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.319544]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.319573]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.319602]  kthread+0x337/0x6f0
[   17.319627]  ? trace_preempt_on+0x20/0xc0
[   17.319668]  ? __pfx_kthread+0x10/0x10
[   17.319694]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.319720]  ? calculate_sigpending+0x7b/0xa0
[   17.319750]  ? __pfx_kthread+0x10/0x10
[   17.319793]  ret_from_fork+0x116/0x1d0
[   17.319816]  ? __pfx_kthread+0x10/0x10
[   17.319843]  ret_from_fork_asm+0x1a/0x30
[   17.319881]  </TASK>
[   17.319896] 
[   17.329103] Allocated by task 283:
[   17.329300]  kasan_save_stack+0x45/0x70
[   17.329476]  kasan_save_track+0x18/0x40
[   17.329684]  kasan_save_alloc_info+0x3b/0x50
[   17.329939]  __kasan_kmalloc+0xb7/0xc0
[   17.330169]  __kmalloc_cache_noprof+0x189/0x420
[   17.330527]  kasan_atomics+0x95/0x310
[   17.330853]  kunit_try_run_case+0x1a5/0x480
[   17.331046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.331257]  kthread+0x337/0x6f0
[   17.331469]  ret_from_fork+0x116/0x1d0
[   17.331713]  ret_from_fork_asm+0x1a/0x30
[   17.331977] 
[   17.332072] The buggy address belongs to the object at ffff888103349180
[   17.332072]  which belongs to the cache kmalloc-64 of size 64
[   17.332604] The buggy address is located 0 bytes to the right of
[   17.332604]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.333056] 
[   17.333148] The buggy address belongs to the physical page:
[   17.333434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.333868] flags: 0x200000000000000(node=0|zone=2)
[   17.334167] page_type: f5(slab)
[   17.334372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.334802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.335117] page dumped because: kasan: bad access detected
[   17.335328] 
[   17.335416] Memory state around the buggy address:
[   17.335616]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.336315]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.336725] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.337138]                                      ^
[   17.337394]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.337763]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.338099] ==================================================================
[   17.338880] ==================================================================
[   17.339258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   17.339570] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.340153] 
[   17.340302] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.340360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.340377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.340406] Call Trace:
[   17.340429]  <TASK>
[   17.340452]  dump_stack_lvl+0x73/0xb0
[   17.340489]  print_report+0xd1/0x650
[   17.340517]  ? __virt_addr_valid+0x1db/0x2d0
[   17.340548]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.340575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.340604]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.340633]  kasan_report+0x141/0x180
[   17.340675]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.340708]  __asan_report_load4_noabort+0x18/0x20
[   17.340739]  kasan_atomics_helper+0x49ce/0x5450
[   17.340769]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.342719]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.342764]  ? kasan_atomics+0x152/0x310
[   17.342802]  kasan_atomics+0x1dc/0x310
[   17.342837]  ? __pfx_kasan_atomics+0x10/0x10
[   17.342869]  ? __pfx_read_tsc+0x10/0x10
[   17.342897]  ? ktime_get_ts64+0x86/0x230
[   17.342928]  kunit_try_run_case+0x1a5/0x480
[   17.342959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.342988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.343018]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.343048]  ? __kthread_parkme+0x82/0x180
[   17.343074]  ? preempt_count_sub+0x50/0x80
[   17.343105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.343136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.343166]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.343195]  kthread+0x337/0x6f0
[   17.343220]  ? trace_preempt_on+0x20/0xc0
[   17.343250]  ? __pfx_kthread+0x10/0x10
[   17.343276]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.343303]  ? calculate_sigpending+0x7b/0xa0
[   17.343332]  ? __pfx_kthread+0x10/0x10
[   17.343360]  ret_from_fork+0x116/0x1d0
[   17.343383]  ? __pfx_kthread+0x10/0x10
[   17.343410]  ret_from_fork_asm+0x1a/0x30
[   17.343449]  </TASK>
[   17.343464] 
[   17.353729] Allocated by task 283:
[   17.354011]  kasan_save_stack+0x45/0x70
[   17.354371]  kasan_save_track+0x18/0x40
[   17.354589]  kasan_save_alloc_info+0x3b/0x50
[   17.354845]  __kasan_kmalloc+0xb7/0xc0
[   17.356138]  __kmalloc_cache_noprof+0x189/0x420
[   17.356361]  kasan_atomics+0x95/0x310
[   17.356597]  kunit_try_run_case+0x1a5/0x480
[   17.356869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.357141]  kthread+0x337/0x6f0
[   17.357293]  ret_from_fork+0x116/0x1d0
[   17.357564]  ret_from_fork_asm+0x1a/0x30
[   17.357915] 
[   17.358016] The buggy address belongs to the object at ffff888103349180
[   17.358016]  which belongs to the cache kmalloc-64 of size 64
[   17.358457] The buggy address is located 0 bytes to the right of
[   17.358457]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.359477] 
[   17.359625] The buggy address belongs to the physical page:
[   17.360081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.360458] flags: 0x200000000000000(node=0|zone=2)
[   17.360769] page_type: f5(slab)
[   17.360960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.361274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.361552] page dumped because: kasan: bad access detected
[   17.361852] 
[   17.361971] Memory state around the buggy address:
[   17.362248]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.362739]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.363007] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.363444]                                      ^
[   17.363743]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.364158]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.364550] ==================================================================
[   17.552054] ==================================================================
[   17.552837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   17.553578] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.553892] 
[   17.554003] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.554060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.554078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.554107] Call Trace:
[   17.554130]  <TASK>
[   17.554161]  dump_stack_lvl+0x73/0xb0
[   17.554210]  print_report+0xd1/0x650
[   17.554238]  ? __virt_addr_valid+0x1db/0x2d0
[   17.554281]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.554309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.554337]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.554363]  kasan_report+0x141/0x180
[   17.554391]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.554429]  kasan_check_range+0x10c/0x1c0
[   17.554459]  __kasan_check_write+0x18/0x20
[   17.554483]  kasan_atomics_helper+0x16e7/0x5450
[   17.554511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.554539]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.554569]  ? kasan_atomics+0x152/0x310
[   17.554603]  kasan_atomics+0x1dc/0x310
[   17.554632]  ? __pfx_kasan_atomics+0x10/0x10
[   17.554674]  ? __pfx_read_tsc+0x10/0x10
[   17.554702]  ? ktime_get_ts64+0x86/0x230
[   17.554731]  kunit_try_run_case+0x1a5/0x480
[   17.554761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.554802]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.554832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.554860]  ? __kthread_parkme+0x82/0x180
[   17.554886]  ? preempt_count_sub+0x50/0x80
[   17.554915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.554944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.554984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.555012]  kthread+0x337/0x6f0
[   17.555036]  ? trace_preempt_on+0x20/0xc0
[   17.555080]  ? __pfx_kthread+0x10/0x10
[   17.555105]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.555132]  ? calculate_sigpending+0x7b/0xa0
[   17.555161]  ? __pfx_kthread+0x10/0x10
[   17.555187]  ret_from_fork+0x116/0x1d0
[   17.555211]  ? __pfx_kthread+0x10/0x10
[   17.555237]  ret_from_fork_asm+0x1a/0x30
[   17.555275]  </TASK>
[   17.555300] 
[   17.564557] Allocated by task 283:
[   17.564796]  kasan_save_stack+0x45/0x70
[   17.565041]  kasan_save_track+0x18/0x40
[   17.565280]  kasan_save_alloc_info+0x3b/0x50
[   17.565520]  __kasan_kmalloc+0xb7/0xc0
[   17.565692]  __kmalloc_cache_noprof+0x189/0x420
[   17.566203]  kasan_atomics+0x95/0x310
[   17.566435]  kunit_try_run_case+0x1a5/0x480
[   17.566614]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.566836]  kthread+0x337/0x6f0
[   17.566984]  ret_from_fork+0x116/0x1d0
[   17.567144]  ret_from_fork_asm+0x1a/0x30
[   17.567315] 
[   17.567404] The buggy address belongs to the object at ffff888103349180
[   17.567404]  which belongs to the cache kmalloc-64 of size 64
[   17.567996] The buggy address is located 0 bytes to the right of
[   17.567996]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.568698] 
[   17.568821] The buggy address belongs to the physical page:
[   17.569135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.569502] flags: 0x200000000000000(node=0|zone=2)
[   17.569718] page_type: f5(slab)
[   17.569869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.570151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.570511] page dumped because: kasan: bad access detected
[   17.570913] 
[   17.571048] Memory state around the buggy address:
[   17.571373]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.571820]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.572271] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.572693]                                      ^
[   17.573218]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.573615]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.573983] ==================================================================
[   17.773045] ==================================================================
[   17.773342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   17.773634] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.776383] 
[   17.776942] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.777009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.777028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.777058] Call Trace:
[   17.777084]  <TASK>
[   17.777110]  dump_stack_lvl+0x73/0xb0
[   17.777150]  print_report+0xd1/0x650
[   17.777178]  ? __virt_addr_valid+0x1db/0x2d0
[   17.777209]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.777236]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.777265]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.777293]  kasan_report+0x141/0x180
[   17.777323]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.777357]  kasan_check_range+0x10c/0x1c0
[   17.777387]  __kasan_check_write+0x18/0x20
[   17.777412]  kasan_atomics_helper+0x1c18/0x5450
[   17.777441]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.777469]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.777501]  ? kasan_atomics+0x152/0x310
[   17.777535]  kasan_atomics+0x1dc/0x310
[   17.777563]  ? __pfx_kasan_atomics+0x10/0x10
[   17.777593]  ? __pfx_read_tsc+0x10/0x10
[   17.777620]  ? ktime_get_ts64+0x86/0x230
[   17.777666]  kunit_try_run_case+0x1a5/0x480
[   17.777698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.777725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.778044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.778137]  ? __kthread_parkme+0x82/0x180
[   17.778165]  ? preempt_count_sub+0x50/0x80
[   17.778195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.778225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.778254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.778282]  kthread+0x337/0x6f0
[   17.778307]  ? trace_preempt_on+0x20/0xc0
[   17.778338]  ? __pfx_kthread+0x10/0x10
[   17.778364]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.778391]  ? calculate_sigpending+0x7b/0xa0
[   17.778425]  ? __pfx_kthread+0x10/0x10
[   17.778452]  ret_from_fork+0x116/0x1d0
[   17.778476]  ? __pfx_kthread+0x10/0x10
[   17.778502]  ret_from_fork_asm+0x1a/0x30
[   17.778540]  </TASK>
[   17.778555] 
[   17.802432] Allocated by task 283:
[   17.803367]  kasan_save_stack+0x45/0x70
[   17.804311]  kasan_save_track+0x18/0x40
[   17.805149]  kasan_save_alloc_info+0x3b/0x50
[   17.805918]  __kasan_kmalloc+0xb7/0xc0
[   17.806096]  __kmalloc_cache_noprof+0x189/0x420
[   17.806289]  kasan_atomics+0x95/0x310
[   17.806467]  kunit_try_run_case+0x1a5/0x480
[   17.807432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.808397]  kthread+0x337/0x6f0
[   17.808949]  ret_from_fork+0x116/0x1d0
[   17.809632]  ret_from_fork_asm+0x1a/0x30
[   17.810318] 
[   17.810736] The buggy address belongs to the object at ffff888103349180
[   17.810736]  which belongs to the cache kmalloc-64 of size 64
[   17.811608] The buggy address is located 0 bytes to the right of
[   17.811608]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.813444] 
[   17.813938] The buggy address belongs to the physical page:
[   17.814694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.815505] flags: 0x200000000000000(node=0|zone=2)
[   17.816380] page_type: f5(slab)
[   17.817023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.817537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.818038] page dumped because: kasan: bad access detected
[   17.818634] 
[   17.819041] Memory state around the buggy address:
[   17.819596]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.819901]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.820634] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.821472]                                      ^
[   17.822009]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.822288]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.822556] ==================================================================
[   17.931434] ==================================================================
[   17.931909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   17.932261] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.933006] 
[   17.933329] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.933393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.933411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.933440] Call Trace:
[   17.933466]  <TASK>
[   17.933490]  dump_stack_lvl+0x73/0xb0
[   17.933529]  print_report+0xd1/0x650
[   17.933557]  ? __virt_addr_valid+0x1db/0x2d0
[   17.933588]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.933615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.933659]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.933688]  kasan_report+0x141/0x180
[   17.933716]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.933749]  kasan_check_range+0x10c/0x1c0
[   17.934199]  __kasan_check_write+0x18/0x20
[   17.934235]  kasan_atomics_helper+0x1eaa/0x5450
[   17.934265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.934295]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.934340]  ? kasan_atomics+0x152/0x310
[   17.934373]  kasan_atomics+0x1dc/0x310
[   17.934402]  ? __pfx_kasan_atomics+0x10/0x10
[   17.934436]  ? __pfx_read_tsc+0x10/0x10
[   17.934465]  ? ktime_get_ts64+0x86/0x230
[   17.934495]  kunit_try_run_case+0x1a5/0x480
[   17.934528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.934556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.934586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.934615]  ? __kthread_parkme+0x82/0x180
[   17.934641]  ? preempt_count_sub+0x50/0x80
[   17.934683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.934713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.934742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.935019]  kthread+0x337/0x6f0
[   17.935058]  ? trace_preempt_on+0x20/0xc0
[   17.935090]  ? __pfx_kthread+0x10/0x10
[   17.935117]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.935145]  ? calculate_sigpending+0x7b/0xa0
[   17.935176]  ? __pfx_kthread+0x10/0x10
[   17.935203]  ret_from_fork+0x116/0x1d0
[   17.935228]  ? __pfx_kthread+0x10/0x10
[   17.935254]  ret_from_fork_asm+0x1a/0x30
[   17.935293]  </TASK>
[   17.935309] 
[   17.947740] Allocated by task 283:
[   17.948271]  kasan_save_stack+0x45/0x70
[   17.948526]  kasan_save_track+0x18/0x40
[   17.948740]  kasan_save_alloc_info+0x3b/0x50
[   17.949243]  __kasan_kmalloc+0xb7/0xc0
[   17.949467]  __kmalloc_cache_noprof+0x189/0x420
[   17.949701]  kasan_atomics+0x95/0x310
[   17.949935]  kunit_try_run_case+0x1a5/0x480
[   17.950411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.950814]  kthread+0x337/0x6f0
[   17.951024]  ret_from_fork+0x116/0x1d0
[   17.951258]  ret_from_fork_asm+0x1a/0x30
[   17.951491] 
[   17.951611] The buggy address belongs to the object at ffff888103349180
[   17.951611]  which belongs to the cache kmalloc-64 of size 64
[   17.953056] The buggy address is located 0 bytes to the right of
[   17.953056]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.953882] 
[   17.954229] The buggy address belongs to the physical page:
[   17.954946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.955558] flags: 0x200000000000000(node=0|zone=2)
[   17.955800] page_type: f5(slab)
[   17.956177] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.957024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.957814] page dumped because: kasan: bad access detected
[   17.958271] 
[   17.958359] Memory state around the buggy address:
[   17.958556]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.958939]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.959665] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.960569]                                      ^
[   17.961207]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.962015]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.962751] ==================================================================
[   17.851695] ==================================================================
[   17.852037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   17.852793] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.853511] 
[   17.853731] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.853789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.853806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.853855] Call Trace:
[   17.853877]  <TASK>
[   17.853898]  dump_stack_lvl+0x73/0xb0
[   17.853934]  print_report+0xd1/0x650
[   17.853961]  ? __virt_addr_valid+0x1db/0x2d0
[   17.853990]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.854016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.854043]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.854070]  kasan_report+0x141/0x180
[   17.854097]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.854128]  kasan_check_range+0x10c/0x1c0
[   17.854158]  __kasan_check_write+0x18/0x20
[   17.854182]  kasan_atomics_helper+0x1ce1/0x5450
[   17.854210]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.854237]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.854267]  ? kasan_atomics+0x152/0x310
[   17.854300]  kasan_atomics+0x1dc/0x310
[   17.854328]  ? __pfx_kasan_atomics+0x10/0x10
[   17.854359]  ? __pfx_read_tsc+0x10/0x10
[   17.854386]  ? ktime_get_ts64+0x86/0x230
[   17.854416]  kunit_try_run_case+0x1a5/0x480
[   17.854456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.854486]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.854517]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.854546]  ? __kthread_parkme+0x82/0x180
[   17.854571]  ? preempt_count_sub+0x50/0x80
[   17.854600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.854630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.854673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.854703]  kthread+0x337/0x6f0
[   17.854727]  ? trace_preempt_on+0x20/0xc0
[   17.854755]  ? __pfx_kthread+0x10/0x10
[   17.854792]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.854819]  ? calculate_sigpending+0x7b/0xa0
[   17.854847]  ? __pfx_kthread+0x10/0x10
[   17.854874]  ret_from_fork+0x116/0x1d0
[   17.854897]  ? __pfx_kthread+0x10/0x10
[   17.854922]  ret_from_fork_asm+0x1a/0x30
[   17.854959]  </TASK>
[   17.854973] 
[   17.864939] Allocated by task 283:
[   17.865112]  kasan_save_stack+0x45/0x70
[   17.865294]  kasan_save_track+0x18/0x40
[   17.865515]  kasan_save_alloc_info+0x3b/0x50
[   17.865783]  __kasan_kmalloc+0xb7/0xc0
[   17.866016]  __kmalloc_cache_noprof+0x189/0x420
[   17.866487]  kasan_atomics+0x95/0x310
[   17.866689]  kunit_try_run_case+0x1a5/0x480
[   17.866868]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.867180]  kthread+0x337/0x6f0
[   17.867392]  ret_from_fork+0x116/0x1d0
[   17.867611]  ret_from_fork_asm+0x1a/0x30
[   17.867852] 
[   17.867969] The buggy address belongs to the object at ffff888103349180
[   17.867969]  which belongs to the cache kmalloc-64 of size 64
[   17.868538] The buggy address is located 0 bytes to the right of
[   17.868538]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.869249] 
[   17.869370] The buggy address belongs to the physical page:
[   17.869661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.870054] flags: 0x200000000000000(node=0|zone=2)
[   17.870323] page_type: f5(slab)
[   17.870519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.870904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.874716] page dumped because: kasan: bad access detected
[   17.874960] 
[   17.875059] Memory state around the buggy address:
[   17.875253]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.875561]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.877249] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.877537]                                      ^
[   17.877745]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.879953]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.880234] ==================================================================
[   17.824078] ==================================================================
[   17.824562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   17.825055] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.825379] 
[   17.825521] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.825581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.825598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.825627] Call Trace:
[   17.825667]  <TASK>
[   17.825693]  dump_stack_lvl+0x73/0xb0
[   17.825732]  print_report+0xd1/0x650
[   17.825761]  ? __virt_addr_valid+0x1db/0x2d0
[   17.825791]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.825817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.825845]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.825872]  kasan_report+0x141/0x180
[   17.825900]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.825934]  __asan_report_load8_noabort+0x18/0x20
[   17.825965]  kasan_atomics_helper+0x4f30/0x5450
[   17.825994]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.826022]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.826054]  ? kasan_atomics+0x152/0x310
[   17.826088]  kasan_atomics+0x1dc/0x310
[   17.826117]  ? __pfx_kasan_atomics+0x10/0x10
[   17.826149]  ? __pfx_read_tsc+0x10/0x10
[   17.826180]  ? ktime_get_ts64+0x86/0x230
[   17.826212]  kunit_try_run_case+0x1a5/0x480
[   17.826244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.826272]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.826302]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.826331]  ? __kthread_parkme+0x82/0x180
[   17.826357]  ? preempt_count_sub+0x50/0x80
[   17.826388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.826423]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.826453]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.826481]  kthread+0x337/0x6f0
[   17.826505]  ? trace_preempt_on+0x20/0xc0
[   17.826535]  ? __pfx_kthread+0x10/0x10
[   17.826560]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.826586]  ? calculate_sigpending+0x7b/0xa0
[   17.826617]  ? __pfx_kthread+0x10/0x10
[   17.826654]  ret_from_fork+0x116/0x1d0
[   17.826677]  ? __pfx_kthread+0x10/0x10
[   17.826702]  ret_from_fork_asm+0x1a/0x30
[   17.826741]  </TASK>
[   17.826757] 
[   17.838196] Allocated by task 283:
[   17.838478]  kasan_save_stack+0x45/0x70
[   17.838931]  kasan_save_track+0x18/0x40
[   17.839294]  kasan_save_alloc_info+0x3b/0x50
[   17.839539]  __kasan_kmalloc+0xb7/0xc0
[   17.839757]  __kmalloc_cache_noprof+0x189/0x420
[   17.840294]  kasan_atomics+0x95/0x310
[   17.840707]  kunit_try_run_case+0x1a5/0x480
[   17.841308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.841735]  kthread+0x337/0x6f0
[   17.842081]  ret_from_fork+0x116/0x1d0
[   17.842309]  ret_from_fork_asm+0x1a/0x30
[   17.842539] 
[   17.842667] The buggy address belongs to the object at ffff888103349180
[   17.842667]  which belongs to the cache kmalloc-64 of size 64
[   17.843282] The buggy address is located 0 bytes to the right of
[   17.843282]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.843914] 
[   17.844071] The buggy address belongs to the physical page:
[   17.844363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.844669] flags: 0x200000000000000(node=0|zone=2)
[   17.845199] page_type: f5(slab)
[   17.845409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.845829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.846274] page dumped because: kasan: bad access detected
[   17.846589] 
[   17.846691] Memory state around the buggy address:
[   17.847131]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.847623]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.848531] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.848916]                                      ^
[   17.849347]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.849839]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.850442] ==================================================================
[   16.678347] ==================================================================
[   16.678728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   16.679630] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.680157] 
[   16.680274] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.680329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.680347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.680375] Call Trace:
[   16.680398]  <TASK>
[   16.680422]  dump_stack_lvl+0x73/0xb0
[   16.680458]  print_report+0xd1/0x650
[   16.680487]  ? __virt_addr_valid+0x1db/0x2d0
[   16.680517]  ? kasan_atomics_helper+0x697/0x5450
[   16.680544]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.680571]  ? kasan_atomics_helper+0x697/0x5450
[   16.680599]  kasan_report+0x141/0x180
[   16.680627]  ? kasan_atomics_helper+0x697/0x5450
[   16.680674]  kasan_check_range+0x10c/0x1c0
[   16.680704]  __kasan_check_write+0x18/0x20
[   16.680729]  kasan_atomics_helper+0x697/0x5450
[   16.680758]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.680786]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.680864]  ? kasan_atomics+0x152/0x310
[   16.680899]  kasan_atomics+0x1dc/0x310
[   16.680928]  ? __pfx_kasan_atomics+0x10/0x10
[   16.680959]  ? __pfx_read_tsc+0x10/0x10
[   16.680986]  ? ktime_get_ts64+0x86/0x230
[   16.681017]  kunit_try_run_case+0x1a5/0x480
[   16.681049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.681077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.681107]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.681136]  ? __kthread_parkme+0x82/0x180
[   16.681161]  ? preempt_count_sub+0x50/0x80
[   16.681191]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.681221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.681250]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.681279]  kthread+0x337/0x6f0
[   16.681304]  ? trace_preempt_on+0x20/0xc0
[   16.681334]  ? __pfx_kthread+0x10/0x10
[   16.681360]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.681386]  ? calculate_sigpending+0x7b/0xa0
[   16.681416]  ? __pfx_kthread+0x10/0x10
[   16.681443]  ret_from_fork+0x116/0x1d0
[   16.681467]  ? __pfx_kthread+0x10/0x10
[   16.681494]  ret_from_fork_asm+0x1a/0x30
[   16.681531]  </TASK>
[   16.681545] 
[   16.691429] Allocated by task 283:
[   16.691601]  kasan_save_stack+0x45/0x70
[   16.692113]  kasan_save_track+0x18/0x40
[   16.692355]  kasan_save_alloc_info+0x3b/0x50
[   16.692614]  __kasan_kmalloc+0xb7/0xc0
[   16.693128]  __kmalloc_cache_noprof+0x189/0x420
[   16.693361]  kasan_atomics+0x95/0x310
[   16.693567]  kunit_try_run_case+0x1a5/0x480
[   16.693761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.693975]  kthread+0x337/0x6f0
[   16.694123]  ret_from_fork+0x116/0x1d0
[   16.694284]  ret_from_fork_asm+0x1a/0x30
[   16.694626] 
[   16.694761] The buggy address belongs to the object at ffff888103349180
[   16.694761]  which belongs to the cache kmalloc-64 of size 64
[   16.695413] The buggy address is located 0 bytes to the right of
[   16.695413]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.696070] 
[   16.696161] The buggy address belongs to the physical page:
[   16.696371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.697116] flags: 0x200000000000000(node=0|zone=2)
[   16.697414] page_type: f5(slab)
[   16.697625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.698065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.698437] page dumped because: kasan: bad access detected
[   16.698660] 
[   16.698782] Memory state around the buggy address:
[   16.699057]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.699453]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.699860] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.700165]                                      ^
[   16.700352]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.700612]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.701661] ==================================================================
[   17.112951] ==================================================================
[   17.113538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   17.114195] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.114741] 
[   17.114930] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.114990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.115007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.115038] Call Trace:
[   17.115056]  <TASK>
[   17.115078]  dump_stack_lvl+0x73/0xb0
[   17.115129]  print_report+0xd1/0x650
[   17.115157]  ? __virt_addr_valid+0x1db/0x2d0
[   17.115200]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.115226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.115255]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.115282]  kasan_report+0x141/0x180
[   17.115310]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.115343]  kasan_check_range+0x10c/0x1c0
[   17.115373]  __kasan_check_write+0x18/0x20
[   17.115397]  kasan_atomics_helper+0xfa9/0x5450
[   17.115436]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.115464]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.115508]  ? kasan_atomics+0x152/0x310
[   17.115542]  kasan_atomics+0x1dc/0x310
[   17.115571]  ? __pfx_kasan_atomics+0x10/0x10
[   17.115601]  ? __pfx_read_tsc+0x10/0x10
[   17.115628]  ? ktime_get_ts64+0x86/0x230
[   17.115670]  kunit_try_run_case+0x1a5/0x480
[   17.115700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.115728]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.115757]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.115812]  ? __kthread_parkme+0x82/0x180
[   17.115839]  ? preempt_count_sub+0x50/0x80
[   17.115881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.115910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.115939]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.115967]  kthread+0x337/0x6f0
[   17.116003]  ? trace_preempt_on+0x20/0xc0
[   17.116034]  ? __pfx_kthread+0x10/0x10
[   17.116061]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.116101]  ? calculate_sigpending+0x7b/0xa0
[   17.116131]  ? __pfx_kthread+0x10/0x10
[   17.116159]  ret_from_fork+0x116/0x1d0
[   17.116182]  ? __pfx_kthread+0x10/0x10
[   17.116208]  ret_from_fork_asm+0x1a/0x30
[   17.116247]  </TASK>
[   17.116261] 
[   17.125773] Allocated by task 283:
[   17.126006]  kasan_save_stack+0x45/0x70
[   17.126290]  kasan_save_track+0x18/0x40
[   17.126501]  kasan_save_alloc_info+0x3b/0x50
[   17.126696]  __kasan_kmalloc+0xb7/0xc0
[   17.126858]  __kmalloc_cache_noprof+0x189/0x420
[   17.127177]  kasan_atomics+0x95/0x310
[   17.127410]  kunit_try_run_case+0x1a5/0x480
[   17.127699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.128020]  kthread+0x337/0x6f0
[   17.128277]  ret_from_fork+0x116/0x1d0
[   17.128558]  ret_from_fork_asm+0x1a/0x30
[   17.128777] 
[   17.128866] The buggy address belongs to the object at ffff888103349180
[   17.128866]  which belongs to the cache kmalloc-64 of size 64
[   17.129321] The buggy address is located 0 bytes to the right of
[   17.129321]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.130063] 
[   17.130200] The buggy address belongs to the physical page:
[   17.130585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.130889] flags: 0x200000000000000(node=0|zone=2)
[   17.131091] page_type: f5(slab)
[   17.131240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.131678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.132127] page dumped because: kasan: bad access detected
[   17.132473] 
[   17.132618] Memory state around the buggy address:
[   17.132958]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.133305]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.133601] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.134295]                                      ^
[   17.134573]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.134985]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.135243] ==================================================================
[   17.484590] ==================================================================
[   17.484899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   17.485591] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.486017] 
[   17.486156] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.486215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.486232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.486259] Call Trace:
[   17.486283]  <TASK>
[   17.486307]  dump_stack_lvl+0x73/0xb0
[   17.486343]  print_report+0xd1/0x650
[   17.486372]  ? __virt_addr_valid+0x1db/0x2d0
[   17.486403]  ? kasan_atomics_helper+0x151d/0x5450
[   17.486433]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.486461]  ? kasan_atomics_helper+0x151d/0x5450
[   17.486491]  kasan_report+0x141/0x180
[   17.486520]  ? kasan_atomics_helper+0x151d/0x5450
[   17.486552]  kasan_check_range+0x10c/0x1c0
[   17.486581]  __kasan_check_write+0x18/0x20
[   17.486606]  kasan_atomics_helper+0x151d/0x5450
[   17.486633]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.486674]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.486706]  ? kasan_atomics+0x152/0x310
[   17.486740]  kasan_atomics+0x1dc/0x310
[   17.486781]  ? __pfx_kasan_atomics+0x10/0x10
[   17.486811]  ? __pfx_read_tsc+0x10/0x10
[   17.486837]  ? ktime_get_ts64+0x86/0x230
[   17.486867]  kunit_try_run_case+0x1a5/0x480
[   17.486897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.486924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.486954]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.486982]  ? __kthread_parkme+0x82/0x180
[   17.487008]  ? preempt_count_sub+0x50/0x80
[   17.487037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.487066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.487094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.487123]  kthread+0x337/0x6f0
[   17.487146]  ? trace_preempt_on+0x20/0xc0
[   17.487175]  ? __pfx_kthread+0x10/0x10
[   17.487201]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.487227]  ? calculate_sigpending+0x7b/0xa0
[   17.487256]  ? __pfx_kthread+0x10/0x10
[   17.487283]  ret_from_fork+0x116/0x1d0
[   17.487305]  ? __pfx_kthread+0x10/0x10
[   17.487331]  ret_from_fork_asm+0x1a/0x30
[   17.487368]  </TASK>
[   17.487382] 
[   17.496013] Allocated by task 283:
[   17.496239]  kasan_save_stack+0x45/0x70
[   17.496482]  kasan_save_track+0x18/0x40
[   17.496702]  kasan_save_alloc_info+0x3b/0x50
[   17.497101]  __kasan_kmalloc+0xb7/0xc0
[   17.497336]  __kmalloc_cache_noprof+0x189/0x420
[   17.497592]  kasan_atomics+0x95/0x310
[   17.497769]  kunit_try_run_case+0x1a5/0x480
[   17.497949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.498513]  kthread+0x337/0x6f0
[   17.498766]  ret_from_fork+0x116/0x1d0
[   17.499029]  ret_from_fork_asm+0x1a/0x30
[   17.499353] 
[   17.499500] The buggy address belongs to the object at ffff888103349180
[   17.499500]  which belongs to the cache kmalloc-64 of size 64
[   17.500061] The buggy address is located 0 bytes to the right of
[   17.500061]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.500770] 
[   17.500883] The buggy address belongs to the physical page:
[   17.501196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.501602] flags: 0x200000000000000(node=0|zone=2)
[   17.501914] page_type: f5(slab)
[   17.502110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.502519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.502969] page dumped because: kasan: bad access detected
[   17.503230] 
[   17.503347] Memory state around the buggy address:
[   17.503582]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.503981]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.504379] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.504795]                                      ^
[   17.505026]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.505353]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.505612] ==================================================================
[   17.233152] ==================================================================
[   17.233700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   17.234177] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.234589] 
[   17.234714] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.234775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.234804] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.234835] Call Trace:
[   17.234862]  <TASK>
[   17.234887]  dump_stack_lvl+0x73/0xb0
[   17.234965]  print_report+0xd1/0x650
[   17.234994]  ? __virt_addr_valid+0x1db/0x2d0
[   17.235059]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.235117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.235147]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.235175]  kasan_report+0x141/0x180
[   17.235217]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.235250]  __asan_report_load4_noabort+0x18/0x20
[   17.235280]  kasan_atomics_helper+0x4a02/0x5450
[   17.235309]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.235339]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.235401]  ? kasan_atomics+0x152/0x310
[   17.235436]  kasan_atomics+0x1dc/0x310
[   17.235465]  ? __pfx_kasan_atomics+0x10/0x10
[   17.235508]  ? __pfx_read_tsc+0x10/0x10
[   17.235567]  ? ktime_get_ts64+0x86/0x230
[   17.235596]  kunit_try_run_case+0x1a5/0x480
[   17.235640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.235679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.235709]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.235737]  ? __kthread_parkme+0x82/0x180
[   17.235762]  ? preempt_count_sub+0x50/0x80
[   17.235838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.235869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.235932]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.235961]  kthread+0x337/0x6f0
[   17.236000]  ? trace_preempt_on+0x20/0xc0
[   17.236030]  ? __pfx_kthread+0x10/0x10
[   17.236057]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.236083]  ? calculate_sigpending+0x7b/0xa0
[   17.236143]  ? __pfx_kthread+0x10/0x10
[   17.236171]  ret_from_fork+0x116/0x1d0
[   17.236194]  ? __pfx_kthread+0x10/0x10
[   17.236232]  ret_from_fork_asm+0x1a/0x30
[   17.236270]  </TASK>
[   17.236285] 
[   17.246157] Allocated by task 283:
[   17.246384]  kasan_save_stack+0x45/0x70
[   17.246668]  kasan_save_track+0x18/0x40
[   17.246998]  kasan_save_alloc_info+0x3b/0x50
[   17.247277]  __kasan_kmalloc+0xb7/0xc0
[   17.247506]  __kmalloc_cache_noprof+0x189/0x420
[   17.247712]  kasan_atomics+0x95/0x310
[   17.248150]  kunit_try_run_case+0x1a5/0x480
[   17.248405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.248752]  kthread+0x337/0x6f0
[   17.248986]  ret_from_fork+0x116/0x1d0
[   17.249240]  ret_from_fork_asm+0x1a/0x30
[   17.249462] 
[   17.249568] The buggy address belongs to the object at ffff888103349180
[   17.249568]  which belongs to the cache kmalloc-64 of size 64
[   17.250312] The buggy address is located 0 bytes to the right of
[   17.250312]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.251017] 
[   17.251111] The buggy address belongs to the physical page:
[   17.251462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.251926] flags: 0x200000000000000(node=0|zone=2)
[   17.252298] page_type: f5(slab)
[   17.252525] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.253032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.253449] page dumped because: kasan: bad access detected
[   17.253771] 
[   17.253972] Memory state around the buggy address:
[   17.254255]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.254665]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.255183] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.255558]                                      ^
[   17.255953]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.256422]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.256964] ==================================================================
[   18.144695] ==================================================================
[   18.145853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   18.146632] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   18.147484] 
[   18.147748] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.147835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.147853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.147882] Call Trace:
[   18.147911]  <TASK>
[   18.147939]  dump_stack_lvl+0x73/0xb0
[   18.147977]  print_report+0xd1/0x650
[   18.148008]  ? __virt_addr_valid+0x1db/0x2d0
[   18.148039]  ? kasan_atomics_helper+0x4fa5/0x5450
[   18.148067]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.148095]  ? kasan_atomics_helper+0x4fa5/0x5450
[   18.148122]  kasan_report+0x141/0x180
[   18.148151]  ? kasan_atomics_helper+0x4fa5/0x5450
[   18.148184]  __asan_report_load8_noabort+0x18/0x20
[   18.148215]  kasan_atomics_helper+0x4fa5/0x5450
[   18.148276]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.148305]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.148338]  ? kasan_atomics+0x152/0x310
[   18.148373]  kasan_atomics+0x1dc/0x310
[   18.148402]  ? __pfx_kasan_atomics+0x10/0x10
[   18.148446]  ? __pfx_read_tsc+0x10/0x10
[   18.148474]  ? ktime_get_ts64+0x86/0x230
[   18.148518]  kunit_try_run_case+0x1a5/0x480
[   18.148550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.148579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.148610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.148639]  ? __kthread_parkme+0x82/0x180
[   18.148684]  ? preempt_count_sub+0x50/0x80
[   18.148715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.148804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.148834]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.148878]  kthread+0x337/0x6f0
[   18.148903]  ? trace_preempt_on+0x20/0xc0
[   18.148956]  ? __pfx_kthread+0x10/0x10
[   18.148993]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.149021]  ? calculate_sigpending+0x7b/0xa0
[   18.149065]  ? __pfx_kthread+0x10/0x10
[   18.149093]  ret_from_fork+0x116/0x1d0
[   18.149138]  ? __pfx_kthread+0x10/0x10
[   18.149176]  ret_from_fork_asm+0x1a/0x30
[   18.149216]  </TASK>
[   18.149247] 
[   18.164000] Allocated by task 283:
[   18.164429]  kasan_save_stack+0x45/0x70
[   18.164900]  kasan_save_track+0x18/0x40
[   18.165376]  kasan_save_alloc_info+0x3b/0x50
[   18.165902]  __kasan_kmalloc+0xb7/0xc0
[   18.166337]  __kmalloc_cache_noprof+0x189/0x420
[   18.166888]  kasan_atomics+0x95/0x310
[   18.167317]  kunit_try_run_case+0x1a5/0x480
[   18.167814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.168394]  kthread+0x337/0x6f0
[   18.168669]  ret_from_fork+0x116/0x1d0
[   18.169099]  ret_from_fork_asm+0x1a/0x30
[   18.169280] 
[   18.169373] The buggy address belongs to the object at ffff888103349180
[   18.169373]  which belongs to the cache kmalloc-64 of size 64
[   18.170169] The buggy address is located 0 bytes to the right of
[   18.170169]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   18.171162] 
[   18.171361] The buggy address belongs to the physical page:
[   18.171732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   18.172378] flags: 0x200000000000000(node=0|zone=2)
[   18.172588] page_type: f5(slab)
[   18.172954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.173778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.174565] page dumped because: kasan: bad access detected
[   18.175005] 
[   18.175098] Memory state around the buggy address:
[   18.175292]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.175557]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.176240] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.177009]                                      ^
[   18.177521]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.178306]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.179100] ==================================================================
[   17.257929] ==================================================================
[   17.258814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   17.259262] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.259697] 
[   17.259908] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.259980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.259998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.260027] Call Trace:
[   17.260084]  <TASK>
[   17.260108]  dump_stack_lvl+0x73/0xb0
[   17.260161]  print_report+0xd1/0x650
[   17.260190]  ? __virt_addr_valid+0x1db/0x2d0
[   17.260252]  ? kasan_atomics_helper+0x1217/0x5450
[   17.260281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.260309]  ? kasan_atomics_helper+0x1217/0x5450
[   17.260353]  kasan_report+0x141/0x180
[   17.260412]  ? kasan_atomics_helper+0x1217/0x5450
[   17.260446]  kasan_check_range+0x10c/0x1c0
[   17.260478]  __kasan_check_write+0x18/0x20
[   17.260516]  kasan_atomics_helper+0x1217/0x5450
[   17.260545]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.260602]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.260635]  ? kasan_atomics+0x152/0x310
[   17.260691]  kasan_atomics+0x1dc/0x310
[   17.260720]  ? __pfx_kasan_atomics+0x10/0x10
[   17.260751]  ? __pfx_read_tsc+0x10/0x10
[   17.260812]  ? ktime_get_ts64+0x86/0x230
[   17.260843]  kunit_try_run_case+0x1a5/0x480
[   17.260887]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.260915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.260946]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.260978]  ? __kthread_parkme+0x82/0x180
[   17.261004]  ? preempt_count_sub+0x50/0x80
[   17.261067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.261097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.261140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.261169]  kthread+0x337/0x6f0
[   17.261207]  ? trace_preempt_on+0x20/0xc0
[   17.261239]  ? __pfx_kthread+0x10/0x10
[   17.261265]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.261291]  ? calculate_sigpending+0x7b/0xa0
[   17.261321]  ? __pfx_kthread+0x10/0x10
[   17.261348]  ret_from_fork+0x116/0x1d0
[   17.261370]  ? __pfx_kthread+0x10/0x10
[   17.261398]  ret_from_fork_asm+0x1a/0x30
[   17.261435]  </TASK>
[   17.261451] 
[   17.271763] Allocated by task 283:
[   17.272024]  kasan_save_stack+0x45/0x70
[   17.272316]  kasan_save_track+0x18/0x40
[   17.272627]  kasan_save_alloc_info+0x3b/0x50
[   17.273191]  __kasan_kmalloc+0xb7/0xc0
[   17.273422]  __kmalloc_cache_noprof+0x189/0x420
[   17.273716]  kasan_atomics+0x95/0x310
[   17.274129]  kunit_try_run_case+0x1a5/0x480
[   17.274439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.274672]  kthread+0x337/0x6f0
[   17.274821]  ret_from_fork+0x116/0x1d0
[   17.275192]  ret_from_fork_asm+0x1a/0x30
[   17.275521] 
[   17.275744] The buggy address belongs to the object at ffff888103349180
[   17.275744]  which belongs to the cache kmalloc-64 of size 64
[   17.276513] The buggy address is located 0 bytes to the right of
[   17.276513]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.277143] 
[   17.277403] The buggy address belongs to the physical page:
[   17.277818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.278288] flags: 0x200000000000000(node=0|zone=2)
[   17.278510] page_type: f5(slab)
[   17.278733] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.279216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.279562] page dumped because: kasan: bad access detected
[   17.279985] 
[   17.280114] Memory state around the buggy address:
[   17.280309]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.280760]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.281221] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.281634]                                      ^
[   17.281999]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.282436]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.282865] ==================================================================
[   16.621012] ==================================================================
[   16.621460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   16.621859] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.622269] 
[   16.622425] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.622485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.622504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.622533] Call Trace:
[   16.622561]  <TASK>
[   16.622585]  dump_stack_lvl+0x73/0xb0
[   16.622624]  print_report+0xd1/0x650
[   16.622669]  ? __virt_addr_valid+0x1db/0x2d0
[   16.622699]  ? kasan_atomics_helper+0x565/0x5450
[   16.622726]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.622755]  ? kasan_atomics_helper+0x565/0x5450
[   16.622782]  kasan_report+0x141/0x180
[   16.622812]  ? kasan_atomics_helper+0x565/0x5450
[   16.622845]  kasan_check_range+0x10c/0x1c0
[   16.622875]  __kasan_check_write+0x18/0x20
[   16.622899]  kasan_atomics_helper+0x565/0x5450
[   16.622927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.622955]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.622990]  ? kasan_atomics+0x152/0x310
[   16.623024]  kasan_atomics+0x1dc/0x310
[   16.623053]  ? __pfx_kasan_atomics+0x10/0x10
[   16.623083]  ? __pfx_read_tsc+0x10/0x10
[   16.623110]  ? ktime_get_ts64+0x86/0x230
[   16.623141]  kunit_try_run_case+0x1a5/0x480
[   16.623172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.623200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.623230]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.623259]  ? __kthread_parkme+0x82/0x180
[   16.623285]  ? preempt_count_sub+0x50/0x80
[   16.623316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.623346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.623374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.623403]  kthread+0x337/0x6f0
[   16.623428]  ? trace_preempt_on+0x20/0xc0
[   16.623458]  ? __pfx_kthread+0x10/0x10
[   16.623484]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.623510]  ? calculate_sigpending+0x7b/0xa0
[   16.623541]  ? __pfx_kthread+0x10/0x10
[   16.623568]  ret_from_fork+0x116/0x1d0
[   16.623592]  ? __pfx_kthread+0x10/0x10
[   16.623618]  ret_from_fork_asm+0x1a/0x30
[   16.623668]  </TASK>
[   16.623683] 
[   16.637342] Allocated by task 283:
[   16.637570]  kasan_save_stack+0x45/0x70
[   16.637773]  kasan_save_track+0x18/0x40
[   16.637941]  kasan_save_alloc_info+0x3b/0x50
[   16.638227]  __kasan_kmalloc+0xb7/0xc0
[   16.638619]  __kmalloc_cache_noprof+0x189/0x420
[   16.639302]  kasan_atomics+0x95/0x310
[   16.639975]  kunit_try_run_case+0x1a5/0x480
[   16.640224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.640675]  kthread+0x337/0x6f0
[   16.641054]  ret_from_fork+0x116/0x1d0
[   16.641452]  ret_from_fork_asm+0x1a/0x30
[   16.641710] 
[   16.642068] The buggy address belongs to the object at ffff888103349180
[   16.642068]  which belongs to the cache kmalloc-64 of size 64
[   16.643705] The buggy address is located 0 bytes to the right of
[   16.643705]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.644676] 
[   16.644790] The buggy address belongs to the physical page:
[   16.645479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.646433] flags: 0x200000000000000(node=0|zone=2)
[   16.647125] page_type: f5(slab)
[   16.647547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.648425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.649409] page dumped because: kasan: bad access detected
[   16.649632] 
[   16.649737] Memory state around the buggy address:
[   16.650025]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.650768]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.651588] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.652403]                                      ^
[   16.653007]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.654040]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.654310] ==================================================================
[   17.283701] ==================================================================
[   17.284439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   17.285401] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.285934] 
[   17.286316] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.286380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.286438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.286467] Call Trace:
[   17.286492]  <TASK>
[   17.286528]  dump_stack_lvl+0x73/0xb0
[   17.286568]  print_report+0xd1/0x650
[   17.286596]  ? __virt_addr_valid+0x1db/0x2d0
[   17.286627]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.286665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.286694]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.286722]  kasan_report+0x141/0x180
[   17.286785]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.286832]  __asan_report_load4_noabort+0x18/0x20
[   17.286877]  kasan_atomics_helper+0x49e8/0x5450
[   17.286907]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.286936]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.286969]  ? kasan_atomics+0x152/0x310
[   17.287023]  kasan_atomics+0x1dc/0x310
[   17.287068]  ? __pfx_kasan_atomics+0x10/0x10
[   17.287115]  ? __pfx_read_tsc+0x10/0x10
[   17.287143]  ? ktime_get_ts64+0x86/0x230
[   17.287174]  kunit_try_run_case+0x1a5/0x480
[   17.287222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.287267]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.287308]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.287338]  ? __kthread_parkme+0x82/0x180
[   17.287365]  ? preempt_count_sub+0x50/0x80
[   17.287408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.287439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.287467]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.287496]  kthread+0x337/0x6f0
[   17.287522]  ? trace_preempt_on+0x20/0xc0
[   17.287552]  ? __pfx_kthread+0x10/0x10
[   17.287579]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.287605]  ? calculate_sigpending+0x7b/0xa0
[   17.287636]  ? __pfx_kthread+0x10/0x10
[   17.287673]  ret_from_fork+0x116/0x1d0
[   17.287697]  ? __pfx_kthread+0x10/0x10
[   17.287722]  ret_from_fork_asm+0x1a/0x30
[   17.287761]  </TASK>
[   17.287786] 
[   17.299493] Allocated by task 283:
[   17.300043]  kasan_save_stack+0x45/0x70
[   17.300304]  kasan_save_track+0x18/0x40
[   17.300525]  kasan_save_alloc_info+0x3b/0x50
[   17.300779]  __kasan_kmalloc+0xb7/0xc0
[   17.300993]  __kmalloc_cache_noprof+0x189/0x420
[   17.301241]  kasan_atomics+0x95/0x310
[   17.301458]  kunit_try_run_case+0x1a5/0x480
[   17.302132]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.302847]  kthread+0x337/0x6f0
[   17.303341]  ret_from_fork+0x116/0x1d0
[   17.303853]  ret_from_fork_asm+0x1a/0x30
[   17.304378] 
[   17.304590] The buggy address belongs to the object at ffff888103349180
[   17.304590]  which belongs to the cache kmalloc-64 of size 64
[   17.305401] The buggy address is located 0 bytes to the right of
[   17.305401]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.306736] 
[   17.306963] The buggy address belongs to the physical page:
[   17.307661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.308791] flags: 0x200000000000000(node=0|zone=2)
[   17.309291] page_type: f5(slab)
[   17.309750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.310463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.311360] page dumped because: kasan: bad access detected
[   17.312084] 
[   17.312298] Memory state around the buggy address:
[   17.312823]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.313512]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.314090] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.314432]                                      ^
[   17.314695]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.315369]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.316201] ==================================================================
[   16.799310] ==================================================================
[   16.800095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   16.800405] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.800679] 
[   16.801031] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.801091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.801108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.801138] Call Trace:
[   16.801164]  <TASK>
[   16.801190]  dump_stack_lvl+0x73/0xb0
[   16.801227]  print_report+0xd1/0x650
[   16.801255]  ? __virt_addr_valid+0x1db/0x2d0
[   16.801284]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.801310]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.801340]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.801368]  kasan_report+0x141/0x180
[   16.801396]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.801429]  kasan_check_range+0x10c/0x1c0
[   16.801459]  __kasan_check_write+0x18/0x20
[   16.801484]  kasan_atomics_helper+0x8f9/0x5450
[   16.801512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.801584]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.801630]  ? kasan_atomics+0x152/0x310
[   16.801676]  kasan_atomics+0x1dc/0x310
[   16.801705]  ? __pfx_kasan_atomics+0x10/0x10
[   16.801739]  ? __pfx_read_tsc+0x10/0x10
[   16.801767]  ? ktime_get_ts64+0x86/0x230
[   16.801817]  kunit_try_run_case+0x1a5/0x480
[   16.801849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.801877]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.801906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.801936]  ? __kthread_parkme+0x82/0x180
[   16.801962]  ? preempt_count_sub+0x50/0x80
[   16.801992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.802021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.802049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.802079]  kthread+0x337/0x6f0
[   16.802104]  ? trace_preempt_on+0x20/0xc0
[   16.802134]  ? __pfx_kthread+0x10/0x10
[   16.802160]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.802187]  ? calculate_sigpending+0x7b/0xa0
[   16.802218]  ? __pfx_kthread+0x10/0x10
[   16.802244]  ret_from_fork+0x116/0x1d0
[   16.802268]  ? __pfx_kthread+0x10/0x10
[   16.802294]  ret_from_fork_asm+0x1a/0x30
[   16.802332]  </TASK>
[   16.802348] 
[   16.818474] Allocated by task 283:
[   16.818892]  kasan_save_stack+0x45/0x70
[   16.819359]  kasan_save_track+0x18/0x40
[   16.819784]  kasan_save_alloc_info+0x3b/0x50
[   16.820497]  __kasan_kmalloc+0xb7/0xc0
[   16.821143]  __kmalloc_cache_noprof+0x189/0x420
[   16.821621]  kasan_atomics+0x95/0x310
[   16.822085]  kunit_try_run_case+0x1a5/0x480
[   16.823068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.823396]  kthread+0x337/0x6f0
[   16.823548]  ret_from_fork+0x116/0x1d0
[   16.823722]  ret_from_fork_asm+0x1a/0x30
[   16.824272] 
[   16.824499] The buggy address belongs to the object at ffff888103349180
[   16.824499]  which belongs to the cache kmalloc-64 of size 64
[   16.825980] The buggy address is located 0 bytes to the right of
[   16.825980]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.827568] 
[   16.827830] The buggy address belongs to the physical page:
[   16.828194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.828480] flags: 0x200000000000000(node=0|zone=2)
[   16.828692] page_type: f5(slab)
[   16.829040] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.830029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.830989] page dumped because: kasan: bad access detected
[   16.831544] 
[   16.831744] Memory state around the buggy address:
[   16.832316]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.833106]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.833952] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.834227]                                      ^
[   16.834757]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.835506]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.835952] ==================================================================
[   17.087518] ==================================================================
[   17.087837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   17.088192] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.088574] 
[   17.088697] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.088754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.088771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.088800] Call Trace:
[   17.088825]  <TASK>
[   17.088848]  dump_stack_lvl+0x73/0xb0
[   17.088884]  print_report+0xd1/0x650
[   17.088912]  ? __virt_addr_valid+0x1db/0x2d0
[   17.088940]  ? kasan_atomics_helper+0xf10/0x5450
[   17.088966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.088994]  ? kasan_atomics_helper+0xf10/0x5450
[   17.089020]  kasan_report+0x141/0x180
[   17.089048]  ? kasan_atomics_helper+0xf10/0x5450
[   17.089079]  kasan_check_range+0x10c/0x1c0
[   17.089107]  __kasan_check_write+0x18/0x20
[   17.089131]  kasan_atomics_helper+0xf10/0x5450
[   17.089158]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.089185]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.089217]  ? kasan_atomics+0x152/0x310
[   17.089249]  kasan_atomics+0x1dc/0x310
[   17.089277]  ? __pfx_kasan_atomics+0x10/0x10
[   17.089306]  ? __pfx_read_tsc+0x10/0x10
[   17.089333]  ? ktime_get_ts64+0x86/0x230
[   17.089361]  kunit_try_run_case+0x1a5/0x480
[   17.089430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.089459]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.089489]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.089516]  ? __kthread_parkme+0x82/0x180
[   17.089541]  ? preempt_count_sub+0x50/0x80
[   17.089570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.089599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.089627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.089733]  kthread+0x337/0x6f0
[   17.089762]  ? trace_preempt_on+0x20/0xc0
[   17.089953]  ? __pfx_kthread+0x10/0x10
[   17.090005]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.090032]  ? calculate_sigpending+0x7b/0xa0
[   17.090078]  ? __pfx_kthread+0x10/0x10
[   17.090105]  ret_from_fork+0x116/0x1d0
[   17.090143]  ? __pfx_kthread+0x10/0x10
[   17.090169]  ret_from_fork_asm+0x1a/0x30
[   17.090221]  </TASK>
[   17.090236] 
[   17.101137] Allocated by task 283:
[   17.101402]  kasan_save_stack+0x45/0x70
[   17.101631]  kasan_save_track+0x18/0x40
[   17.101908]  kasan_save_alloc_info+0x3b/0x50
[   17.102210]  __kasan_kmalloc+0xb7/0xc0
[   17.102459]  __kmalloc_cache_noprof+0x189/0x420
[   17.102673]  kasan_atomics+0x95/0x310
[   17.102848]  kunit_try_run_case+0x1a5/0x480
[   17.103030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.103308]  kthread+0x337/0x6f0
[   17.103572]  ret_from_fork+0x116/0x1d0
[   17.103902]  ret_from_fork_asm+0x1a/0x30
[   17.104155] 
[   17.104273] The buggy address belongs to the object at ffff888103349180
[   17.104273]  which belongs to the cache kmalloc-64 of size 64
[   17.105309] The buggy address is located 0 bytes to the right of
[   17.105309]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.105895] 
[   17.105986] The buggy address belongs to the physical page:
[   17.106193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.106663] flags: 0x200000000000000(node=0|zone=2)
[   17.107247] page_type: f5(slab)
[   17.107411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.107918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.108345] page dumped because: kasan: bad access detected
[   17.108655] 
[   17.108749] Memory state around the buggy address:
[   17.109143]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.109410]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.110149] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.110593]                                      ^
[   17.111042]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.111468]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.111906] ==================================================================
[   16.376095] ==================================================================
[   16.376891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   16.377382] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.377747] 
[   16.377956] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.378016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.378032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.378061] Call Trace:
[   16.378077]  <TASK>
[   16.378100]  dump_stack_lvl+0x73/0xb0
[   16.378140]  print_report+0xd1/0x650
[   16.378167]  ? __virt_addr_valid+0x1db/0x2d0
[   16.378197]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.378223]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.378249]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.378275]  kasan_report+0x141/0x180
[   16.378301]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.378332]  __asan_report_load4_noabort+0x18/0x20
[   16.378362]  kasan_atomics_helper+0x4bbc/0x5450
[   16.378391]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.378417]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.378456]  ? kasan_atomics+0x152/0x310
[   16.378488]  kasan_atomics+0x1dc/0x310
[   16.378517]  ? __pfx_kasan_atomics+0x10/0x10
[   16.378546]  ? __pfx_read_tsc+0x10/0x10
[   16.378572]  ? ktime_get_ts64+0x86/0x230
[   16.378628]  kunit_try_run_case+0x1a5/0x480
[   16.378671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.378697]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.378725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.378753]  ? __kthread_parkme+0x82/0x180
[   16.378842]  ? preempt_count_sub+0x50/0x80
[   16.378877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.378904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.378932]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.378959]  kthread+0x337/0x6f0
[   16.378982]  ? trace_preempt_on+0x20/0xc0
[   16.379013]  ? __pfx_kthread+0x10/0x10
[   16.379036]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.379061]  ? calculate_sigpending+0x7b/0xa0
[   16.379090]  ? __pfx_kthread+0x10/0x10
[   16.379116]  ret_from_fork+0x116/0x1d0
[   16.379138]  ? __pfx_kthread+0x10/0x10
[   16.379163]  ret_from_fork_asm+0x1a/0x30
[   16.379204]  </TASK>
[   16.379218] 
[   16.390729] Allocated by task 283:
[   16.391194]  kasan_save_stack+0x45/0x70
[   16.391719]  kasan_save_track+0x18/0x40
[   16.392298]  kasan_save_alloc_info+0x3b/0x50
[   16.392913]  __kasan_kmalloc+0xb7/0xc0
[   16.393341]  __kmalloc_cache_noprof+0x189/0x420
[   16.393875]  kasan_atomics+0x95/0x310
[   16.394288]  kunit_try_run_case+0x1a5/0x480
[   16.394872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.395454]  kthread+0x337/0x6f0
[   16.395843]  ret_from_fork+0x116/0x1d0
[   16.396394]  ret_from_fork_asm+0x1a/0x30
[   16.396830] 
[   16.397073] The buggy address belongs to the object at ffff888103349180
[   16.397073]  which belongs to the cache kmalloc-64 of size 64
[   16.398309] The buggy address is located 0 bytes to the right of
[   16.398309]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.399073] 
[   16.399168] The buggy address belongs to the physical page:
[   16.399395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.399737] flags: 0x200000000000000(node=0|zone=2)
[   16.400414] page_type: f5(slab)
[   16.400884] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.401634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.402076] page dumped because: kasan: bad access detected
[   16.402706] 
[   16.402965] Memory state around the buggy address:
[   16.403311]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.403800]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.404559] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.405207]                                      ^
[   16.405687]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.406247]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.407089] ==================================================================
[   16.555565] ==================================================================
[   16.556231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   16.556803] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.557267] 
[   16.557389] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.557449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.557467] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.557496] Call Trace:
[   16.557523]  <TASK>
[   16.557549]  dump_stack_lvl+0x73/0xb0
[   16.557587]  print_report+0xd1/0x650
[   16.557616]  ? __virt_addr_valid+0x1db/0x2d0
[   16.557981]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.558021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.558050]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.558078]  kasan_report+0x141/0x180
[   16.558107]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.558140]  kasan_check_range+0x10c/0x1c0
[   16.558170]  __kasan_check_write+0x18/0x20
[   16.558194]  kasan_atomics_helper+0x4a0/0x5450
[   16.558223]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.558251]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.558283]  ? kasan_atomics+0x152/0x310
[   16.558317]  kasan_atomics+0x1dc/0x310
[   16.558346]  ? __pfx_kasan_atomics+0x10/0x10
[   16.558376]  ? __pfx_read_tsc+0x10/0x10
[   16.558403]  ? ktime_get_ts64+0x86/0x230
[   16.558440]  kunit_try_run_case+0x1a5/0x480
[   16.558472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.558499]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.558530]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.558560]  ? __kthread_parkme+0x82/0x180
[   16.558587]  ? preempt_count_sub+0x50/0x80
[   16.558617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.558672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.558701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.558730]  kthread+0x337/0x6f0
[   16.558756]  ? trace_preempt_on+0x20/0xc0
[   16.558822]  ? __pfx_kthread+0x10/0x10
[   16.558849]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.558878]  ? calculate_sigpending+0x7b/0xa0
[   16.558908]  ? __pfx_kthread+0x10/0x10
[   16.558935]  ret_from_fork+0x116/0x1d0
[   16.558959]  ? __pfx_kthread+0x10/0x10
[   16.558985]  ret_from_fork_asm+0x1a/0x30
[   16.559024]  </TASK>
[   16.559039] 
[   16.574642] Allocated by task 283:
[   16.575391]  kasan_save_stack+0x45/0x70
[   16.575992]  kasan_save_track+0x18/0x40
[   16.576285]  kasan_save_alloc_info+0x3b/0x50
[   16.576472]  __kasan_kmalloc+0xb7/0xc0
[   16.576636]  __kmalloc_cache_noprof+0x189/0x420
[   16.577099]  kasan_atomics+0x95/0x310
[   16.577528]  kunit_try_run_case+0x1a5/0x480
[   16.578108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.578715]  kthread+0x337/0x6f0
[   16.579187]  ret_from_fork+0x116/0x1d0
[   16.579618]  ret_from_fork_asm+0x1a/0x30
[   16.580160] 
[   16.580260] The buggy address belongs to the object at ffff888103349180
[   16.580260]  which belongs to the cache kmalloc-64 of size 64
[   16.580789] The buggy address is located 0 bytes to the right of
[   16.580789]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.582235] 
[   16.582443] The buggy address belongs to the physical page:
[   16.583124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.583954] flags: 0x200000000000000(node=0|zone=2)
[   16.584157] page_type: f5(slab)
[   16.584305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.584575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.584867] page dumped because: kasan: bad access detected
[   16.585071] 
[   16.585155] Memory state around the buggy address:
[   16.585340]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.585591]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.585949] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.586298]                                      ^
[   16.586503]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.586879]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.587218] ==================================================================
[   16.702340] ==================================================================
[   16.702728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   16.703514] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.704082] 
[   16.704213] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.704271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.704287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.704315] Call Trace:
[   16.704342]  <TASK>
[   16.704367]  dump_stack_lvl+0x73/0xb0
[   16.704402]  print_report+0xd1/0x650
[   16.704431]  ? __virt_addr_valid+0x1db/0x2d0
[   16.704462]  ? kasan_atomics_helper+0x72f/0x5450
[   16.704490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.704517]  ? kasan_atomics_helper+0x72f/0x5450
[   16.704545]  kasan_report+0x141/0x180
[   16.704574]  ? kasan_atomics_helper+0x72f/0x5450
[   16.704606]  kasan_check_range+0x10c/0x1c0
[   16.704636]  __kasan_check_write+0x18/0x20
[   16.704675]  kasan_atomics_helper+0x72f/0x5450
[   16.704703]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.704732]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.704765]  ? kasan_atomics+0x152/0x310
[   16.704800]  kasan_atomics+0x1dc/0x310
[   16.704831]  ? __pfx_kasan_atomics+0x10/0x10
[   16.704879]  ? __pfx_read_tsc+0x10/0x10
[   16.704907]  ? ktime_get_ts64+0x86/0x230
[   16.704939]  kunit_try_run_case+0x1a5/0x480
[   16.704971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.704999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.705030]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.705059]  ? __kthread_parkme+0x82/0x180
[   16.705087]  ? preempt_count_sub+0x50/0x80
[   16.705118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.705147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.705177]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.705206]  kthread+0x337/0x6f0
[   16.705232]  ? trace_preempt_on+0x20/0xc0
[   16.705262]  ? __pfx_kthread+0x10/0x10
[   16.705288]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.705315]  ? calculate_sigpending+0x7b/0xa0
[   16.705346]  ? __pfx_kthread+0x10/0x10
[   16.705373]  ret_from_fork+0x116/0x1d0
[   16.705398]  ? __pfx_kthread+0x10/0x10
[   16.705423]  ret_from_fork_asm+0x1a/0x30
[   16.705461]  </TASK>
[   16.705475] 
[   16.715278] Allocated by task 283:
[   16.715445]  kasan_save_stack+0x45/0x70
[   16.715624]  kasan_save_track+0x18/0x40
[   16.716029]  kasan_save_alloc_info+0x3b/0x50
[   16.716295]  __kasan_kmalloc+0xb7/0xc0
[   16.716527]  __kmalloc_cache_noprof+0x189/0x420
[   16.716810]  kasan_atomics+0x95/0x310
[   16.717045]  kunit_try_run_case+0x1a5/0x480
[   16.717508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.718594]  kthread+0x337/0x6f0
[   16.718872]  ret_from_fork+0x116/0x1d0
[   16.719106]  ret_from_fork_asm+0x1a/0x30
[   16.719284] 
[   16.719377] The buggy address belongs to the object at ffff888103349180
[   16.719377]  which belongs to the cache kmalloc-64 of size 64
[   16.721432] The buggy address is located 0 bytes to the right of
[   16.721432]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.723402] 
[   16.723873] The buggy address belongs to the physical page:
[   16.725048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.726353] flags: 0x200000000000000(node=0|zone=2)
[   16.727168] page_type: f5(slab)
[   16.727615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.728967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.729256] page dumped because: kasan: bad access detected
[   16.729471] 
[   16.729562] Memory state around the buggy address:
[   16.730164]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.731048]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.731900] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.732665]                                      ^
[   16.733275]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.733594]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.734592] ==================================================================
[   17.182099] ==================================================================
[   17.182475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   17.182906] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.183293] 
[   17.183415] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.183471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.183488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.183517] Call Trace:
[   17.183539]  <TASK>
[   17.183561]  dump_stack_lvl+0x73/0xb0
[   17.183596]  print_report+0xd1/0x650
[   17.183623]  ? __virt_addr_valid+0x1db/0x2d0
[   17.183923]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.183956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.183984]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.184012]  kasan_report+0x141/0x180
[   17.184040]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.184074]  __asan_report_load4_noabort+0x18/0x20
[   17.184121]  kasan_atomics_helper+0x4a1c/0x5450
[   17.184149]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.184191]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.184223]  ? kasan_atomics+0x152/0x310
[   17.184257]  kasan_atomics+0x1dc/0x310
[   17.184296]  ? __pfx_kasan_atomics+0x10/0x10
[   17.184326]  ? __pfx_read_tsc+0x10/0x10
[   17.184352]  ? ktime_get_ts64+0x86/0x230
[   17.184394]  kunit_try_run_case+0x1a5/0x480
[   17.184424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.184452]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.184492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.184520]  ? __kthread_parkme+0x82/0x180
[   17.184545]  ? preempt_count_sub+0x50/0x80
[   17.184587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.184615]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.184644]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.184692]  kthread+0x337/0x6f0
[   17.184718]  ? trace_preempt_on+0x20/0xc0
[   17.184747]  ? __pfx_kthread+0x10/0x10
[   17.184786]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.184830]  ? calculate_sigpending+0x7b/0xa0
[   17.184859]  ? __pfx_kthread+0x10/0x10
[   17.184886]  ret_from_fork+0x116/0x1d0
[   17.184908]  ? __pfx_kthread+0x10/0x10
[   17.184946]  ret_from_fork_asm+0x1a/0x30
[   17.184983]  </TASK>
[   17.185010] 
[   17.194432] Allocated by task 283:
[   17.194638]  kasan_save_stack+0x45/0x70
[   17.194939]  kasan_save_track+0x18/0x40
[   17.195150]  kasan_save_alloc_info+0x3b/0x50
[   17.195412]  __kasan_kmalloc+0xb7/0xc0
[   17.195676]  __kmalloc_cache_noprof+0x189/0x420
[   17.195995]  kasan_atomics+0x95/0x310
[   17.196253]  kunit_try_run_case+0x1a5/0x480
[   17.196468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.196786]  kthread+0x337/0x6f0
[   17.197006]  ret_from_fork+0x116/0x1d0
[   17.197188]  ret_from_fork_asm+0x1a/0x30
[   17.197361] 
[   17.197452] The buggy address belongs to the object at ffff888103349180
[   17.197452]  which belongs to the cache kmalloc-64 of size 64
[   17.198010] The buggy address is located 0 bytes to the right of
[   17.198010]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.198708] 
[   17.198883] The buggy address belongs to the physical page:
[   17.199145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.199439] flags: 0x200000000000000(node=0|zone=2)
[   17.199703] page_type: f5(slab)
[   17.199945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.200392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.200750] page dumped because: kasan: bad access detected
[   17.201057] 
[   17.201194] Memory state around the buggy address:
[   17.201452]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.201845]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.202241] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.202509]                                      ^
[   17.202859]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.203675]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.204675] ==================================================================
[   18.208048] ==================================================================
[   18.208436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   18.208877] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   18.209151] 
[   18.209292] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.209361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.209379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.209407] Call Trace:
[   18.209444]  <TASK>
[   18.209468]  dump_stack_lvl+0x73/0xb0
[   18.209507]  print_report+0xd1/0x650
[   18.209535]  ? __virt_addr_valid+0x1db/0x2d0
[   18.209564]  ? kasan_atomics_helper+0x5115/0x5450
[   18.209592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.209622]  ? kasan_atomics_helper+0x5115/0x5450
[   18.209662]  kasan_report+0x141/0x180
[   18.209692]  ? kasan_atomics_helper+0x5115/0x5450
[   18.209724]  __asan_report_load8_noabort+0x18/0x20
[   18.209755]  kasan_atomics_helper+0x5115/0x5450
[   18.209798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.209826]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.209870]  ? kasan_atomics+0x152/0x310
[   18.209904]  kasan_atomics+0x1dc/0x310
[   18.209947]  ? __pfx_kasan_atomics+0x10/0x10
[   18.209977]  ? __pfx_read_tsc+0x10/0x10
[   18.210004]  ? ktime_get_ts64+0x86/0x230
[   18.210035]  kunit_try_run_case+0x1a5/0x480
[   18.210066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.210105]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.210135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.210176]  ? __kthread_parkme+0x82/0x180
[   18.210203]  ? preempt_count_sub+0x50/0x80
[   18.210233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.210263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.210292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.210332]  kthread+0x337/0x6f0
[   18.210357]  ? trace_preempt_on+0x20/0xc0
[   18.210399]  ? __pfx_kthread+0x10/0x10
[   18.210430]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.210457]  ? calculate_sigpending+0x7b/0xa0
[   18.210487]  ? __pfx_kthread+0x10/0x10
[   18.210515]  ret_from_fork+0x116/0x1d0
[   18.210539]  ? __pfx_kthread+0x10/0x10
[   18.210564]  ret_from_fork_asm+0x1a/0x30
[   18.210604]  </TASK>
[   18.210618] 
[   18.222178] Allocated by task 283:
[   18.222567]  kasan_save_stack+0x45/0x70
[   18.222966]  kasan_save_track+0x18/0x40
[   18.223138]  kasan_save_alloc_info+0x3b/0x50
[   18.223317]  __kasan_kmalloc+0xb7/0xc0
[   18.223477]  __kmalloc_cache_noprof+0x189/0x420
[   18.223679]  kasan_atomics+0x95/0x310
[   18.223972]  kunit_try_run_case+0x1a5/0x480
[   18.224243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.224562]  kthread+0x337/0x6f0
[   18.224827]  ret_from_fork+0x116/0x1d0
[   18.225063]  ret_from_fork_asm+0x1a/0x30
[   18.225289] 
[   18.225408] The buggy address belongs to the object at ffff888103349180
[   18.225408]  which belongs to the cache kmalloc-64 of size 64
[   18.226198] The buggy address is located 0 bytes to the right of
[   18.226198]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   18.226878] 
[   18.227104] The buggy address belongs to the physical page:
[   18.227433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   18.227914] flags: 0x200000000000000(node=0|zone=2)
[   18.228247] page_type: f5(slab)
[   18.228450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.228914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.229289] page dumped because: kasan: bad access detected
[   18.229511] 
[   18.229628] Memory state around the buggy address:
[   18.230036]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.230561]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.230881] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.231364]                                      ^
[   18.231728]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.232334]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.232641] ==================================================================
[   17.529425] ==================================================================
[   17.529777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   17.530189] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.530803] 
[   17.531052] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.531110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.531126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.531154] Call Trace:
[   17.531176]  <TASK>
[   17.531197]  dump_stack_lvl+0x73/0xb0
[   17.531231]  print_report+0xd1/0x650
[   17.531258]  ? __virt_addr_valid+0x1db/0x2d0
[   17.531287]  ? kasan_atomics_helper+0x164f/0x5450
[   17.531313]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.531342]  ? kasan_atomics_helper+0x164f/0x5450
[   17.531372]  kasan_report+0x141/0x180
[   17.531404]  ? kasan_atomics_helper+0x164f/0x5450
[   17.531437]  kasan_check_range+0x10c/0x1c0
[   17.531468]  __kasan_check_write+0x18/0x20
[   17.531492]  kasan_atomics_helper+0x164f/0x5450
[   17.531521]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.531550]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.531581]  ? kasan_atomics+0x152/0x310
[   17.531614]  kasan_atomics+0x1dc/0x310
[   17.531659]  ? __pfx_kasan_atomics+0x10/0x10
[   17.531689]  ? __pfx_read_tsc+0x10/0x10
[   17.531716]  ? ktime_get_ts64+0x86/0x230
[   17.531745]  kunit_try_run_case+0x1a5/0x480
[   17.531784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.531812]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.531840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.531869]  ? __kthread_parkme+0x82/0x180
[   17.531895]  ? preempt_count_sub+0x50/0x80
[   17.531924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.531965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.531993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.532035]  kthread+0x337/0x6f0
[   17.532070]  ? trace_preempt_on+0x20/0xc0
[   17.532100]  ? __pfx_kthread+0x10/0x10
[   17.532139]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.532166]  ? calculate_sigpending+0x7b/0xa0
[   17.532195]  ? __pfx_kthread+0x10/0x10
[   17.532222]  ret_from_fork+0x116/0x1d0
[   17.532246]  ? __pfx_kthread+0x10/0x10
[   17.532272]  ret_from_fork_asm+0x1a/0x30
[   17.532311]  </TASK>
[   17.532325] 
[   17.541883] Allocated by task 283:
[   17.542050]  kasan_save_stack+0x45/0x70
[   17.542262]  kasan_save_track+0x18/0x40
[   17.542519]  kasan_save_alloc_info+0x3b/0x50
[   17.542780]  __kasan_kmalloc+0xb7/0xc0
[   17.543049]  __kmalloc_cache_noprof+0x189/0x420
[   17.543310]  kasan_atomics+0x95/0x310
[   17.543506]  kunit_try_run_case+0x1a5/0x480
[   17.543798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.544080]  kthread+0x337/0x6f0
[   17.544289]  ret_from_fork+0x116/0x1d0
[   17.544503]  ret_from_fork_asm+0x1a/0x30
[   17.544756] 
[   17.544886] The buggy address belongs to the object at ffff888103349180
[   17.544886]  which belongs to the cache kmalloc-64 of size 64
[   17.545361] The buggy address is located 0 bytes to the right of
[   17.545361]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.546024] 
[   17.546172] The buggy address belongs to the physical page:
[   17.546398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.546799] flags: 0x200000000000000(node=0|zone=2)
[   17.547090] page_type: f5(slab)
[   17.547325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.547732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.548201] page dumped because: kasan: bad access detected
[   17.548530] 
[   17.548634] Memory state around the buggy address:
[   17.549059]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.549424]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.549806] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.550174]                                      ^
[   17.550439]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.550859]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.551236] ==================================================================
[   16.589893] ==================================================================
[   16.590289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   16.590679] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.591281] 
[   16.591403] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.591462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.591480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.591508] Call Trace:
[   16.591532]  <TASK>
[   16.591557]  dump_stack_lvl+0x73/0xb0
[   16.591596]  print_report+0xd1/0x650
[   16.591625]  ? __virt_addr_valid+0x1db/0x2d0
[   16.591671]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.591698]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.591726]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.591753]  kasan_report+0x141/0x180
[   16.592004]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.592038]  __asan_report_store4_noabort+0x1b/0x30
[   16.592064]  kasan_atomics_helper+0x4b3a/0x5450
[   16.592093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.592121]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.592154]  ? kasan_atomics+0x152/0x310
[   16.592189]  kasan_atomics+0x1dc/0x310
[   16.592218]  ? __pfx_kasan_atomics+0x10/0x10
[   16.592248]  ? __pfx_read_tsc+0x10/0x10
[   16.592276]  ? ktime_get_ts64+0x86/0x230
[   16.592307]  kunit_try_run_case+0x1a5/0x480
[   16.592338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.592366]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.592396]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.592425]  ? __kthread_parkme+0x82/0x180
[   16.592452]  ? preempt_count_sub+0x50/0x80
[   16.592483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.592513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.592541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.592569]  kthread+0x337/0x6f0
[   16.592594]  ? trace_preempt_on+0x20/0xc0
[   16.592623]  ? __pfx_kthread+0x10/0x10
[   16.592664]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.592690]  ? calculate_sigpending+0x7b/0xa0
[   16.592721]  ? __pfx_kthread+0x10/0x10
[   16.592747]  ret_from_fork+0x116/0x1d0
[   16.592867]  ? __pfx_kthread+0x10/0x10
[   16.592896]  ret_from_fork_asm+0x1a/0x30
[   16.592936]  </TASK>
[   16.592951] 
[   16.605587] Allocated by task 283:
[   16.606357]  kasan_save_stack+0x45/0x70
[   16.606584]  kasan_save_track+0x18/0x40
[   16.607068]  kasan_save_alloc_info+0x3b/0x50
[   16.607284]  __kasan_kmalloc+0xb7/0xc0
[   16.607679]  __kmalloc_cache_noprof+0x189/0x420
[   16.608341]  kasan_atomics+0x95/0x310
[   16.608580]  kunit_try_run_case+0x1a5/0x480
[   16.609070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.609486]  kthread+0x337/0x6f0
[   16.609825]  ret_from_fork+0x116/0x1d0
[   16.610190]  ret_from_fork_asm+0x1a/0x30
[   16.610598] 
[   16.610744] The buggy address belongs to the object at ffff888103349180
[   16.610744]  which belongs to the cache kmalloc-64 of size 64
[   16.611732] The buggy address is located 0 bytes to the right of
[   16.611732]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.612760] 
[   16.613147] The buggy address belongs to the physical page:
[   16.613528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.614068] flags: 0x200000000000000(node=0|zone=2)
[   16.614484] page_type: f5(slab)
[   16.614644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.615348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.615848] page dumped because: kasan: bad access detected
[   16.616266] 
[   16.616507] Memory state around the buggy address:
[   16.616777]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.617373]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.618012] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.618379]                                      ^
[   16.618778]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.619560]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.620172] ==================================================================
[   17.984839] ==================================================================
[   17.985499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   17.985973] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.986244] 
[   17.986352] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.986408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.986429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.986475] Call Trace:
[   17.986499]  <TASK>
[   17.986522]  dump_stack_lvl+0x73/0xb0
[   17.986558]  print_report+0xd1/0x650
[   17.986586]  ? __virt_addr_valid+0x1db/0x2d0
[   17.986615]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.986642]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.986684]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.986712]  kasan_report+0x141/0x180
[   17.986741]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.986775]  __asan_report_load8_noabort+0x18/0x20
[   17.986807]  kasan_atomics_helper+0x4f71/0x5450
[   17.986836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.986865]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.986897]  ? kasan_atomics+0x152/0x310
[   17.986932]  kasan_atomics+0x1dc/0x310
[   17.986960]  ? __pfx_kasan_atomics+0x10/0x10
[   17.986991]  ? __pfx_read_tsc+0x10/0x10
[   17.987019]  ? ktime_get_ts64+0x86/0x230
[   17.987049]  kunit_try_run_case+0x1a5/0x480
[   17.987081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.987109]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.987139]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.987168]  ? __kthread_parkme+0x82/0x180
[   17.987194]  ? preempt_count_sub+0x50/0x80
[   17.987224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.987254]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.987283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.987313]  kthread+0x337/0x6f0
[   17.987338]  ? trace_preempt_on+0x20/0xc0
[   17.987368]  ? __pfx_kthread+0x10/0x10
[   17.987395]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.987422]  ? calculate_sigpending+0x7b/0xa0
[   17.987452]  ? __pfx_kthread+0x10/0x10
[   17.987480]  ret_from_fork+0x116/0x1d0
[   17.987504]  ? __pfx_kthread+0x10/0x10
[   17.987531]  ret_from_fork_asm+0x1a/0x30
[   17.987570]  </TASK>
[   17.987585] 
[   17.997180] Allocated by task 283:
[   17.997383]  kasan_save_stack+0x45/0x70
[   17.997655]  kasan_save_track+0x18/0x40
[   17.997960]  kasan_save_alloc_info+0x3b/0x50
[   17.998145]  __kasan_kmalloc+0xb7/0xc0
[   17.998309]  __kmalloc_cache_noprof+0x189/0x420
[   17.998505]  kasan_atomics+0x95/0x310
[   17.998685]  kunit_try_run_case+0x1a5/0x480
[   17.998989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.999299]  kthread+0x337/0x6f0
[   17.999503]  ret_from_fork+0x116/0x1d0
[   17.999741]  ret_from_fork_asm+0x1a/0x30
[   17.999979] 
[   18.000097] The buggy address belongs to the object at ffff888103349180
[   18.000097]  which belongs to the cache kmalloc-64 of size 64
[   18.000564] The buggy address is located 0 bytes to the right of
[   18.000564]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   18.001613] 
[   18.001747] The buggy address belongs to the physical page:
[   18.002018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   18.002400] flags: 0x200000000000000(node=0|zone=2)
[   18.002681] page_type: f5(slab)
[   18.002878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.003245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.003602] page dumped because: kasan: bad access detected
[   18.003926] 
[   18.004045] Memory state around the buggy address:
[   18.004292]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.004667]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.005046] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.005369]                                      ^
[   18.005638]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.006043]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.006329] ==================================================================
[   17.657770] ==================================================================
[   17.659463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   17.660215] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.660504] 
[   17.660619] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.660695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.660711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.660740] Call Trace:
[   17.660766]  <TASK>
[   17.660789]  dump_stack_lvl+0x73/0xb0
[   17.660937]  print_report+0xd1/0x650
[   17.660967]  ? __virt_addr_valid+0x1db/0x2d0
[   17.661045]  ? kasan_atomics_helper+0x194a/0x5450
[   17.661073]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.661158]  ? kasan_atomics_helper+0x194a/0x5450
[   17.661186]  kasan_report+0x141/0x180
[   17.661229]  ? kasan_atomics_helper+0x194a/0x5450
[   17.661262]  kasan_check_range+0x10c/0x1c0
[   17.661293]  __kasan_check_write+0x18/0x20
[   17.661318]  kasan_atomics_helper+0x194a/0x5450
[   17.661347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.661375]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.661407]  ? kasan_atomics+0x152/0x310
[   17.661440]  kasan_atomics+0x1dc/0x310
[   17.661469]  ? __pfx_kasan_atomics+0x10/0x10
[   17.661499]  ? __pfx_read_tsc+0x10/0x10
[   17.661527]  ? ktime_get_ts64+0x86/0x230
[   17.661557]  kunit_try_run_case+0x1a5/0x480
[   17.661588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.661615]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.661656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.661684]  ? __kthread_parkme+0x82/0x180
[   17.661708]  ? preempt_count_sub+0x50/0x80
[   17.661739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.661778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.661806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.661836]  kthread+0x337/0x6f0
[   17.661861]  ? trace_preempt_on+0x20/0xc0
[   17.661890]  ? __pfx_kthread+0x10/0x10
[   17.661916]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.661943]  ? calculate_sigpending+0x7b/0xa0
[   17.661973]  ? __pfx_kthread+0x10/0x10
[   17.661999]  ret_from_fork+0x116/0x1d0
[   17.662024]  ? __pfx_kthread+0x10/0x10
[   17.662049]  ret_from_fork_asm+0x1a/0x30
[   17.662087]  </TASK>
[   17.662103] 
[   17.677274] Allocated by task 283:
[   17.677787]  kasan_save_stack+0x45/0x70
[   17.678280]  kasan_save_track+0x18/0x40
[   17.678731]  kasan_save_alloc_info+0x3b/0x50
[   17.679232]  __kasan_kmalloc+0xb7/0xc0
[   17.679665]  __kmalloc_cache_noprof+0x189/0x420
[   17.679947]  kasan_atomics+0x95/0x310
[   17.680394]  kunit_try_run_case+0x1a5/0x480
[   17.680896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.681568]  kthread+0x337/0x6f0
[   17.681731]  ret_from_fork+0x116/0x1d0
[   17.682178]  ret_from_fork_asm+0x1a/0x30
[   17.682633] 
[   17.682867] The buggy address belongs to the object at ffff888103349180
[   17.682867]  which belongs to the cache kmalloc-64 of size 64
[   17.683744] The buggy address is located 0 bytes to the right of
[   17.683744]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.684188] 
[   17.684282] The buggy address belongs to the physical page:
[   17.684496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.685113] flags: 0x200000000000000(node=0|zone=2)
[   17.685688] page_type: f5(slab)
[   17.686200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.687112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.687940] page dumped because: kasan: bad access detected
[   17.688755] 
[   17.688983] Memory state around the buggy address:
[   17.689525]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.690516]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.691276] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.692050]                                      ^
[   17.692574]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.693169]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.693625] ==================================================================
[   16.948172] ==================================================================
[   16.948523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   16.949158] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.949563] 
[   16.949696] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.949755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.949772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.949802] Call Trace:
[   16.949827]  <TASK>
[   16.949853]  dump_stack_lvl+0x73/0xb0
[   16.949936]  print_report+0xd1/0x650
[   16.949965]  ? __virt_addr_valid+0x1db/0x2d0
[   16.950010]  ? kasan_atomics_helper+0xc70/0x5450
[   16.950037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.950065]  ? kasan_atomics_helper+0xc70/0x5450
[   16.950092]  kasan_report+0x141/0x180
[   16.950213]  ? kasan_atomics_helper+0xc70/0x5450
[   16.950262]  kasan_check_range+0x10c/0x1c0
[   16.950292]  __kasan_check_write+0x18/0x20
[   16.950317]  kasan_atomics_helper+0xc70/0x5450
[   16.950345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.950373]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.950408]  ? kasan_atomics+0x152/0x310
[   16.950448]  kasan_atomics+0x1dc/0x310
[   16.950477]  ? __pfx_kasan_atomics+0x10/0x10
[   16.950508]  ? __pfx_read_tsc+0x10/0x10
[   16.950537]  ? ktime_get_ts64+0x86/0x230
[   16.950567]  kunit_try_run_case+0x1a5/0x480
[   16.950635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.950683]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.950748]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.950854]  ? __kthread_parkme+0x82/0x180
[   16.950886]  ? preempt_count_sub+0x50/0x80
[   16.950917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.950947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.950977]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.951007]  kthread+0x337/0x6f0
[   16.951032]  ? trace_preempt_on+0x20/0xc0
[   16.951063]  ? __pfx_kthread+0x10/0x10
[   16.951088]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.951114]  ? calculate_sigpending+0x7b/0xa0
[   16.951145]  ? __pfx_kthread+0x10/0x10
[   16.951171]  ret_from_fork+0x116/0x1d0
[   16.951195]  ? __pfx_kthread+0x10/0x10
[   16.951221]  ret_from_fork_asm+0x1a/0x30
[   16.951260]  </TASK>
[   16.951275] 
[   16.963173] Allocated by task 283:
[   16.963509]  kasan_save_stack+0x45/0x70
[   16.964153]  kasan_save_track+0x18/0x40
[   16.964363]  kasan_save_alloc_info+0x3b/0x50
[   16.964549]  __kasan_kmalloc+0xb7/0xc0
[   16.964892]  __kmalloc_cache_noprof+0x189/0x420
[   16.965191]  kasan_atomics+0x95/0x310
[   16.965389]  kunit_try_run_case+0x1a5/0x480
[   16.965639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.966002]  kthread+0x337/0x6f0
[   16.966205]  ret_from_fork+0x116/0x1d0
[   16.966426]  ret_from_fork_asm+0x1a/0x30
[   16.966667] 
[   16.966865] The buggy address belongs to the object at ffff888103349180
[   16.966865]  which belongs to the cache kmalloc-64 of size 64
[   16.967492] The buggy address is located 0 bytes to the right of
[   16.967492]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.968005] 
[   16.968132] The buggy address belongs to the physical page:
[   16.968508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.968968] flags: 0x200000000000000(node=0|zone=2)
[   16.969349] page_type: f5(slab)
[   16.969535] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.969836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.970320] page dumped because: kasan: bad access detected
[   16.970658] 
[   16.970780] Memory state around the buggy address:
[   16.971514]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.971941]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.972357] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.972720]                                      ^
[   16.973100]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.973433]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.973867] ==================================================================
[   17.746156] ==================================================================
[   17.746588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   17.747089] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.747470] 
[   17.747585] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.747641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.747672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.747702] Call Trace:
[   17.747727]  <TASK>
[   17.747792]  dump_stack_lvl+0x73/0xb0
[   17.747829]  print_report+0xd1/0x650
[   17.747904]  ? __virt_addr_valid+0x1db/0x2d0
[   17.747934]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.747976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.748005]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.748033]  kasan_report+0x141/0x180
[   17.748061]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.748094]  kasan_check_range+0x10c/0x1c0
[   17.748141]  __kasan_check_write+0x18/0x20
[   17.748166]  kasan_atomics_helper+0x1b22/0x5450
[   17.748194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.748223]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.748256]  ? kasan_atomics+0x152/0x310
[   17.748289]  kasan_atomics+0x1dc/0x310
[   17.748318]  ? __pfx_kasan_atomics+0x10/0x10
[   17.748348]  ? __pfx_read_tsc+0x10/0x10
[   17.748376]  ? ktime_get_ts64+0x86/0x230
[   17.748405]  kunit_try_run_case+0x1a5/0x480
[   17.748436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.748464]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.748495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.748524]  ? __kthread_parkme+0x82/0x180
[   17.748550]  ? preempt_count_sub+0x50/0x80
[   17.748580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.748608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.748637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.748676]  kthread+0x337/0x6f0
[   17.748701]  ? trace_preempt_on+0x20/0xc0
[   17.748742]  ? __pfx_kthread+0x10/0x10
[   17.748781]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.748820]  ? calculate_sigpending+0x7b/0xa0
[   17.748851]  ? __pfx_kthread+0x10/0x10
[   17.748878]  ret_from_fork+0x116/0x1d0
[   17.748902]  ? __pfx_kthread+0x10/0x10
[   17.748928]  ret_from_fork_asm+0x1a/0x30
[   17.748967]  </TASK>
[   17.748981] 
[   17.758690] Allocated by task 283:
[   17.758959]  kasan_save_stack+0x45/0x70
[   17.759242]  kasan_save_track+0x18/0x40
[   17.759490]  kasan_save_alloc_info+0x3b/0x50
[   17.759733]  __kasan_kmalloc+0xb7/0xc0
[   17.759984]  __kmalloc_cache_noprof+0x189/0x420
[   17.760171]  kasan_atomics+0x95/0x310
[   17.760371]  kunit_try_run_case+0x1a5/0x480
[   17.760618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.760983]  kthread+0x337/0x6f0
[   17.761156]  ret_from_fork+0x116/0x1d0
[   17.761402]  ret_from_fork_asm+0x1a/0x30
[   17.761569] 
[   17.761667] The buggy address belongs to the object at ffff888103349180
[   17.761667]  which belongs to the cache kmalloc-64 of size 64
[   17.762369] The buggy address is located 0 bytes to the right of
[   17.762369]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.762934] 
[   17.763055] The buggy address belongs to the physical page:
[   17.763382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.763824] flags: 0x200000000000000(node=0|zone=2)
[   17.764044] page_type: f5(slab)
[   17.764252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.764699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.765129] page dumped because: kasan: bad access detected
[   17.765403] 
[   17.765518] Memory state around the buggy address:
[   17.765744]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.768133]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.768638] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.769837]                                      ^
[   17.770636]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.771822]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.772320] ==================================================================
[   16.974548] ==================================================================
[   16.975073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   16.975564] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.975961] 
[   16.976242] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.976304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.976322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.976351] Call Trace:
[   16.976377]  <TASK>
[   16.976401]  dump_stack_lvl+0x73/0xb0
[   16.976468]  print_report+0xd1/0x650
[   16.976497]  ? __virt_addr_valid+0x1db/0x2d0
[   16.976527]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.976554]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.976604]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.976633]  kasan_report+0x141/0x180
[   16.976682]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.976715]  __asan_report_load4_noabort+0x18/0x20
[   16.976747]  kasan_atomics_helper+0x4a84/0x5450
[   16.976786]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.976866]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.976900]  ? kasan_atomics+0x152/0x310
[   16.976934]  kasan_atomics+0x1dc/0x310
[   16.977008]  ? __pfx_kasan_atomics+0x10/0x10
[   16.977041]  ? __pfx_read_tsc+0x10/0x10
[   16.977096]  ? ktime_get_ts64+0x86/0x230
[   16.977128]  kunit_try_run_case+0x1a5/0x480
[   16.977161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.977190]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.977220]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.977250]  ? __kthread_parkme+0x82/0x180
[   16.977277]  ? preempt_count_sub+0x50/0x80
[   16.977307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.977338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.977367]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.977397]  kthread+0x337/0x6f0
[   16.977421]  ? trace_preempt_on+0x20/0xc0
[   16.977451]  ? __pfx_kthread+0x10/0x10
[   16.977477]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.977504]  ? calculate_sigpending+0x7b/0xa0
[   16.977534]  ? __pfx_kthread+0x10/0x10
[   16.977561]  ret_from_fork+0x116/0x1d0
[   16.977586]  ? __pfx_kthread+0x10/0x10
[   16.977611]  ret_from_fork_asm+0x1a/0x30
[   16.977661]  </TASK>
[   16.977675] 
[   16.988217] Allocated by task 283:
[   16.988580]  kasan_save_stack+0x45/0x70
[   16.988995]  kasan_save_track+0x18/0x40
[   16.989287]  kasan_save_alloc_info+0x3b/0x50
[   16.989661]  __kasan_kmalloc+0xb7/0xc0
[   16.989841]  __kmalloc_cache_noprof+0x189/0x420
[   16.990031]  kasan_atomics+0x95/0x310
[   16.990194]  kunit_try_run_case+0x1a5/0x480
[   16.990526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.990912]  kthread+0x337/0x6f0
[   16.991128]  ret_from_fork+0x116/0x1d0
[   16.991354]  ret_from_fork_asm+0x1a/0x30
[   16.991579] 
[   16.991683] The buggy address belongs to the object at ffff888103349180
[   16.991683]  which belongs to the cache kmalloc-64 of size 64
[   16.992432] The buggy address is located 0 bytes to the right of
[   16.992432]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.993506] 
[   16.993629] The buggy address belongs to the physical page:
[   16.994072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.994500] flags: 0x200000000000000(node=0|zone=2)
[   16.994827] page_type: f5(slab)
[   16.995149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.995558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.996112] page dumped because: kasan: bad access detected
[   16.996416] 
[   16.996618] Memory state around the buggy address:
[   16.997217]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.997588]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.998132] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.998465]                                      ^
[   16.998808]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.999265]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.999830] ==================================================================
[   17.034558] ==================================================================
[   17.035032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   17.035414] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.036061] 
[   17.036636] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.036732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.036750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.036786] Call Trace:
[   17.036904]  <TASK>
[   17.036937]  dump_stack_lvl+0x73/0xb0
[   17.036978]  print_report+0xd1/0x650
[   17.037006]  ? __virt_addr_valid+0x1db/0x2d0
[   17.037037]  ? kasan_atomics_helper+0xde0/0x5450
[   17.037064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.037091]  ? kasan_atomics_helper+0xde0/0x5450
[   17.037120]  kasan_report+0x141/0x180
[   17.037149]  ? kasan_atomics_helper+0xde0/0x5450
[   17.037182]  kasan_check_range+0x10c/0x1c0
[   17.037211]  __kasan_check_write+0x18/0x20
[   17.037236]  kasan_atomics_helper+0xde0/0x5450
[   17.037265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.037292]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.037325]  ? kasan_atomics+0x152/0x310
[   17.037359]  kasan_atomics+0x1dc/0x310
[   17.037388]  ? __pfx_kasan_atomics+0x10/0x10
[   17.037418]  ? __pfx_read_tsc+0x10/0x10
[   17.037445]  ? ktime_get_ts64+0x86/0x230
[   17.037476]  kunit_try_run_case+0x1a5/0x480
[   17.037508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.037537]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.037567]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.037597]  ? __kthread_parkme+0x82/0x180
[   17.037623]  ? preempt_count_sub+0x50/0x80
[   17.037668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.037698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.037728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.037757]  kthread+0x337/0x6f0
[   17.037783]  ? trace_preempt_on+0x20/0xc0
[   17.037864]  ? __pfx_kthread+0x10/0x10
[   17.037891]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.037919]  ? calculate_sigpending+0x7b/0xa0
[   17.037949]  ? __pfx_kthread+0x10/0x10
[   17.037976]  ret_from_fork+0x116/0x1d0
[   17.037999]  ? __pfx_kthread+0x10/0x10
[   17.038026]  ret_from_fork_asm+0x1a/0x30
[   17.038065]  </TASK>
[   17.038081] 
[   17.048787] Allocated by task 283:
[   17.049127]  kasan_save_stack+0x45/0x70
[   17.049341]  kasan_save_track+0x18/0x40
[   17.049577]  kasan_save_alloc_info+0x3b/0x50
[   17.050035]  __kasan_kmalloc+0xb7/0xc0
[   17.050268]  __kmalloc_cache_noprof+0x189/0x420
[   17.050547]  kasan_atomics+0x95/0x310
[   17.050803]  kunit_try_run_case+0x1a5/0x480
[   17.051125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.051431]  kthread+0x337/0x6f0
[   17.051631]  ret_from_fork+0x116/0x1d0
[   17.052138]  ret_from_fork_asm+0x1a/0x30
[   17.052558] 
[   17.052724] The buggy address belongs to the object at ffff888103349180
[   17.052724]  which belongs to the cache kmalloc-64 of size 64
[   17.053392] The buggy address is located 0 bytes to the right of
[   17.053392]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.054094] 
[   17.054301] The buggy address belongs to the physical page:
[   17.054621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.055077] flags: 0x200000000000000(node=0|zone=2)
[   17.055289] page_type: f5(slab)
[   17.055444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.055911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.056515] page dumped because: kasan: bad access detected
[   17.056787] 
[   17.056915] Memory state around the buggy address:
[   17.057222]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.057624]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.057903] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.058253]                                      ^
[   17.058539]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.058953]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.059999] ==================================================================
[   16.735597] ==================================================================
[   16.735988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   16.736442] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.736866] 
[   16.737072] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.737133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.737150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.737194] Call Trace:
[   16.737220]  <TASK>
[   16.737246]  dump_stack_lvl+0x73/0xb0
[   16.737302]  print_report+0xd1/0x650
[   16.737332]  ? __virt_addr_valid+0x1db/0x2d0
[   16.737362]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.737389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.737420]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.737446]  kasan_report+0x141/0x180
[   16.737475]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.737508]  kasan_check_range+0x10c/0x1c0
[   16.737538]  __kasan_check_write+0x18/0x20
[   16.737563]  kasan_atomics_helper+0x7c7/0x5450
[   16.737600]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.737628]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.737680]  ? kasan_atomics+0x152/0x310
[   16.737714]  kasan_atomics+0x1dc/0x310
[   16.737743]  ? __pfx_kasan_atomics+0x10/0x10
[   16.737788]  ? __pfx_read_tsc+0x10/0x10
[   16.737817]  ? ktime_get_ts64+0x86/0x230
[   16.737848]  kunit_try_run_case+0x1a5/0x480
[   16.737879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.737908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.737939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.737969]  ? __kthread_parkme+0x82/0x180
[   16.737995]  ? preempt_count_sub+0x50/0x80
[   16.738025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.738054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.738084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.738114]  kthread+0x337/0x6f0
[   16.738169]  ? trace_preempt_on+0x20/0xc0
[   16.738199]  ? __pfx_kthread+0x10/0x10
[   16.738226]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.738308]  ? calculate_sigpending+0x7b/0xa0
[   16.738341]  ? __pfx_kthread+0x10/0x10
[   16.738369]  ret_from_fork+0x116/0x1d0
[   16.738394]  ? __pfx_kthread+0x10/0x10
[   16.738425]  ret_from_fork_asm+0x1a/0x30
[   16.738465]  </TASK>
[   16.738481] 
[   16.751140] Allocated by task 283:
[   16.751381]  kasan_save_stack+0x45/0x70
[   16.751620]  kasan_save_track+0x18/0x40
[   16.752218]  kasan_save_alloc_info+0x3b/0x50
[   16.752476]  __kasan_kmalloc+0xb7/0xc0
[   16.752707]  __kmalloc_cache_noprof+0x189/0x420
[   16.753009]  kasan_atomics+0x95/0x310
[   16.753359]  kunit_try_run_case+0x1a5/0x480
[   16.753586]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.754334]  kthread+0x337/0x6f0
[   16.754519]  ret_from_fork+0x116/0x1d0
[   16.754772]  ret_from_fork_asm+0x1a/0x30
[   16.755096] 
[   16.755200] The buggy address belongs to the object at ffff888103349180
[   16.755200]  which belongs to the cache kmalloc-64 of size 64
[   16.756408] The buggy address is located 0 bytes to the right of
[   16.756408]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.757318] 
[   16.757452] The buggy address belongs to the physical page:
[   16.757997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.758531] flags: 0x200000000000000(node=0|zone=2)
[   16.758825] page_type: f5(slab)
[   16.759332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.759914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.760217] page dumped because: kasan: bad access detected
[   16.760431] 
[   16.760520] Memory state around the buggy address:
[   16.760736]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.761465]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.761781] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.762363]                                      ^
[   16.762809]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.763276]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.763592] ==================================================================
[   16.439291] ==================================================================
[   16.439738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   16.440764] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.441563] 
[   16.441702] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.441762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.441788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.441816] Call Trace:
[   16.441836]  <TASK>
[   16.441859]  dump_stack_lvl+0x73/0xb0
[   16.441895]  print_report+0xd1/0x650
[   16.441922]  ? __virt_addr_valid+0x1db/0x2d0
[   16.441950]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.441975]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.442001]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.442026]  kasan_report+0x141/0x180
[   16.442052]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.442084]  __asan_report_load4_noabort+0x18/0x20
[   16.442113]  kasan_atomics_helper+0x4b88/0x5450
[   16.442140]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.442166]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.442195]  ? kasan_atomics+0x152/0x310
[   16.442227]  kasan_atomics+0x1dc/0x310
[   16.442253]  ? __pfx_kasan_atomics+0x10/0x10
[   16.442282]  ? __pfx_read_tsc+0x10/0x10
[   16.442307]  ? ktime_get_ts64+0x86/0x230
[   16.442336]  kunit_try_run_case+0x1a5/0x480
[   16.442365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.442390]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.442423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.442450]  ? __kthread_parkme+0x82/0x180
[   16.442474]  ? preempt_count_sub+0x50/0x80
[   16.442503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.442529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.442555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.442583]  kthread+0x337/0x6f0
[   16.442608]  ? trace_preempt_on+0x20/0xc0
[   16.442791]  ? __pfx_kthread+0x10/0x10
[   16.442820]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.442868]  ? calculate_sigpending+0x7b/0xa0
[   16.442899]  ? __pfx_kthread+0x10/0x10
[   16.442927]  ret_from_fork+0x116/0x1d0
[   16.442953]  ? __pfx_kthread+0x10/0x10
[   16.442979]  ret_from_fork_asm+0x1a/0x30
[   16.443019]  </TASK>
[   16.443034] 
[   16.455244] Allocated by task 283:
[   16.455449]  kasan_save_stack+0x45/0x70
[   16.455724]  kasan_save_track+0x18/0x40
[   16.455984]  kasan_save_alloc_info+0x3b/0x50
[   16.456242]  __kasan_kmalloc+0xb7/0xc0
[   16.456405]  __kmalloc_cache_noprof+0x189/0x420
[   16.456594]  kasan_atomics+0x95/0x310
[   16.456782]  kunit_try_run_case+0x1a5/0x480
[   16.457034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.457353]  kthread+0x337/0x6f0
[   16.457561]  ret_from_fork+0x116/0x1d0
[   16.457880]  ret_from_fork_asm+0x1a/0x30
[   16.458095] 
[   16.458217] The buggy address belongs to the object at ffff888103349180
[   16.458217]  which belongs to the cache kmalloc-64 of size 64
[   16.458722] The buggy address is located 0 bytes to the right of
[   16.458722]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.459521] 
[   16.459644] The buggy address belongs to the physical page:
[   16.459967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.460466] flags: 0x200000000000000(node=0|zone=2)
[   16.460705] page_type: f5(slab)
[   16.461185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.461572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.462067] page dumped because: kasan: bad access detected
[   16.462350] 
[   16.462457] Memory state around the buggy address:
[   16.462756]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.463164]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.463504] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.463931]                                      ^
[   16.464175]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.464528]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.464848] ==================================================================
[   17.365507] ==================================================================
[   17.365933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   17.366349] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.366713] 
[   17.366860] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.366920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.366938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.366967] Call Trace:
[   17.366993]  <TASK>
[   17.367019]  dump_stack_lvl+0x73/0xb0
[   17.367055]  print_report+0xd1/0x650
[   17.367085]  ? __virt_addr_valid+0x1db/0x2d0
[   17.367116]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.367143]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.367171]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.367199]  kasan_report+0x141/0x180
[   17.367227]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.367261]  kasan_check_range+0x10c/0x1c0
[   17.367291]  __kasan_check_read+0x15/0x20
[   17.367315]  kasan_atomics_helper+0x13b5/0x5450
[   17.367343]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.367374]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.367407]  ? kasan_atomics+0x152/0x310
[   17.367442]  kasan_atomics+0x1dc/0x310
[   17.367471]  ? __pfx_kasan_atomics+0x10/0x10
[   17.367502]  ? __pfx_read_tsc+0x10/0x10
[   17.367529]  ? ktime_get_ts64+0x86/0x230
[   17.367560]  kunit_try_run_case+0x1a5/0x480
[   17.367591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.367620]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.367665]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.367694]  ? __kthread_parkme+0x82/0x180
[   17.367719]  ? preempt_count_sub+0x50/0x80
[   17.367750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.367795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.367824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.367853]  kthread+0x337/0x6f0
[   17.367878]  ? trace_preempt_on+0x20/0xc0
[   17.367908]  ? __pfx_kthread+0x10/0x10
[   17.367934]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.367961]  ? calculate_sigpending+0x7b/0xa0
[   17.367991]  ? __pfx_kthread+0x10/0x10
[   17.368018]  ret_from_fork+0x116/0x1d0
[   17.368041]  ? __pfx_kthread+0x10/0x10
[   17.368067]  ret_from_fork_asm+0x1a/0x30
[   17.368105]  </TASK>
[   17.368121] 
[   17.377321] Allocated by task 283:
[   17.377527]  kasan_save_stack+0x45/0x70
[   17.377768]  kasan_save_track+0x18/0x40
[   17.377982]  kasan_save_alloc_info+0x3b/0x50
[   17.378246]  __kasan_kmalloc+0xb7/0xc0
[   17.378448]  __kmalloc_cache_noprof+0x189/0x420
[   17.378708]  kasan_atomics+0x95/0x310
[   17.378876]  kunit_try_run_case+0x1a5/0x480
[   17.379088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.379404]  kthread+0x337/0x6f0
[   17.379578]  ret_from_fork+0x116/0x1d0
[   17.379752]  ret_from_fork_asm+0x1a/0x30
[   17.379956] 
[   17.380079] The buggy address belongs to the object at ffff888103349180
[   17.380079]  which belongs to the cache kmalloc-64 of size 64
[   17.380741] The buggy address is located 0 bytes to the right of
[   17.380741]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.381342] 
[   17.381463] The buggy address belongs to the physical page:
[   17.381744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.382120] flags: 0x200000000000000(node=0|zone=2)
[   17.382407] page_type: f5(slab)
[   17.382570] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.383010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.383368] page dumped because: kasan: bad access detected
[   17.383658] 
[   17.383764] Memory state around the buggy address:
[   17.383994]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.384258]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.384519] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.384855]                                      ^
[   17.385223]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.385600]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.385920] ==================================================================
[   17.425411] ==================================================================
[   17.425800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   17.426611] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.427067] 
[   17.427204] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.427263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.427281] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.427311] Call Trace:
[   17.427337]  <TASK>
[   17.427364]  dump_stack_lvl+0x73/0xb0
[   17.427403]  print_report+0xd1/0x650
[   17.427434]  ? __virt_addr_valid+0x1db/0x2d0
[   17.427465]  ? kasan_atomics_helper+0x1467/0x5450
[   17.427493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.427521]  ? kasan_atomics_helper+0x1467/0x5450
[   17.427550]  kasan_report+0x141/0x180
[   17.427580]  ? kasan_atomics_helper+0x1467/0x5450
[   17.427613]  kasan_check_range+0x10c/0x1c0
[   17.427643]  __kasan_check_write+0x18/0x20
[   17.427684]  kasan_atomics_helper+0x1467/0x5450
[   17.427712]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.427742]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.427775]  ? kasan_atomics+0x152/0x310
[   17.427809]  kasan_atomics+0x1dc/0x310
[   17.427838]  ? __pfx_kasan_atomics+0x10/0x10
[   17.427869]  ? __pfx_read_tsc+0x10/0x10
[   17.427897]  ? ktime_get_ts64+0x86/0x230
[   17.427927]  kunit_try_run_case+0x1a5/0x480
[   17.427960]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.427988]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.428019]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.428049]  ? __kthread_parkme+0x82/0x180
[   17.428074]  ? preempt_count_sub+0x50/0x80
[   17.428106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.428137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.428166]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.428196]  kthread+0x337/0x6f0
[   17.428221]  ? trace_preempt_on+0x20/0xc0
[   17.428251]  ? __pfx_kthread+0x10/0x10
[   17.428278]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.428304]  ? calculate_sigpending+0x7b/0xa0
[   17.428335]  ? __pfx_kthread+0x10/0x10
[   17.428363]  ret_from_fork+0x116/0x1d0
[   17.428387]  ? __pfx_kthread+0x10/0x10
[   17.428412]  ret_from_fork_asm+0x1a/0x30
[   17.428453]  </TASK>
[   17.428470] 
[   17.439983] Allocated by task 283:
[   17.440456]  kasan_save_stack+0x45/0x70
[   17.440692]  kasan_save_track+0x18/0x40
[   17.441070]  kasan_save_alloc_info+0x3b/0x50
[   17.441309]  __kasan_kmalloc+0xb7/0xc0
[   17.441528]  __kmalloc_cache_noprof+0x189/0x420
[   17.442130]  kasan_atomics+0x95/0x310
[   17.442370]  kunit_try_run_case+0x1a5/0x480
[   17.442722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.443139]  kthread+0x337/0x6f0
[   17.443521]  ret_from_fork+0x116/0x1d0
[   17.443765]  ret_from_fork_asm+0x1a/0x30
[   17.444114] 
[   17.444213] The buggy address belongs to the object at ffff888103349180
[   17.444213]  which belongs to the cache kmalloc-64 of size 64
[   17.445119] The buggy address is located 0 bytes to the right of
[   17.445119]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.445826] 
[   17.445977] The buggy address belongs to the physical page:
[   17.446369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.446993] flags: 0x200000000000000(node=0|zone=2)
[   17.447361] page_type: f5(slab)
[   17.447541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.448245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.448756] page dumped because: kasan: bad access detected
[   17.449183] 
[   17.449308] Memory state around the buggy address:
[   17.449745]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.450140]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.450523] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.451212]                                      ^
[   17.451475]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.451993]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.452475] ==================================================================
[   17.880983] ==================================================================
[   17.882236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   17.883098] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.884026] 
[   17.884429] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.884493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.884512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.884542] Call Trace:
[   17.884569]  <TASK>
[   17.884596]  dump_stack_lvl+0x73/0xb0
[   17.884634]  print_report+0xd1/0x650
[   17.884678]  ? __virt_addr_valid+0x1db/0x2d0
[   17.884708]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.884736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.884772]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.884800]  kasan_report+0x141/0x180
[   17.884829]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.884863]  kasan_check_range+0x10c/0x1c0
[   17.884892]  __kasan_check_write+0x18/0x20
[   17.884917]  kasan_atomics_helper+0x1d7a/0x5450
[   17.884945]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.884973]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.885031]  ? kasan_atomics+0x152/0x310
[   17.885064]  kasan_atomics+0x1dc/0x310
[   17.885092]  ? __pfx_kasan_atomics+0x10/0x10
[   17.885123]  ? __pfx_read_tsc+0x10/0x10
[   17.885150]  ? ktime_get_ts64+0x86/0x230
[   17.885181]  kunit_try_run_case+0x1a5/0x480
[   17.885213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.885242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.885272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.885301]  ? __kthread_parkme+0x82/0x180
[   17.885328]  ? preempt_count_sub+0x50/0x80
[   17.885358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.885387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.885416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.885445]  kthread+0x337/0x6f0
[   17.885472]  ? trace_preempt_on+0x20/0xc0
[   17.885503]  ? __pfx_kthread+0x10/0x10
[   17.885529]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.885556]  ? calculate_sigpending+0x7b/0xa0
[   17.885586]  ? __pfx_kthread+0x10/0x10
[   17.885613]  ret_from_fork+0x116/0x1d0
[   17.885636]  ? __pfx_kthread+0x10/0x10
[   17.885674]  ret_from_fork_asm+0x1a/0x30
[   17.885714]  </TASK>
[   17.885731] 
[   17.897506] Allocated by task 283:
[   17.897785]  kasan_save_stack+0x45/0x70
[   17.898036]  kasan_save_track+0x18/0x40
[   17.898207]  kasan_save_alloc_info+0x3b/0x50
[   17.898400]  __kasan_kmalloc+0xb7/0xc0
[   17.898624]  __kmalloc_cache_noprof+0x189/0x420
[   17.898943]  kasan_atomics+0x95/0x310
[   17.899210]  kunit_try_run_case+0x1a5/0x480
[   17.899699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.900036]  kthread+0x337/0x6f0
[   17.900187]  ret_from_fork+0x116/0x1d0
[   17.900416]  ret_from_fork_asm+0x1a/0x30
[   17.900667] 
[   17.900814] The buggy address belongs to the object at ffff888103349180
[   17.900814]  which belongs to the cache kmalloc-64 of size 64
[   17.901278] The buggy address is located 0 bytes to the right of
[   17.901278]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.902069] 
[   17.902189] The buggy address belongs to the physical page:
[   17.902457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.902977] flags: 0x200000000000000(node=0|zone=2)
[   17.903279] page_type: f5(slab)
[   17.903454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.903780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.904184] page dumped because: kasan: bad access detected
[   17.904440] 
[   17.904561] Memory state around the buggy address:
[   17.904886]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.905229]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.905546] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.905934]                                      ^
[   17.906232]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.906639]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.907069] ==================================================================
[   18.036144] ==================================================================
[   18.036583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   18.037987] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   18.038455] 
[   18.038602] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.038713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.038732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.038762] Call Trace:
[   18.038803]  <TASK>
[   18.038828]  dump_stack_lvl+0x73/0xb0
[   18.038867]  print_report+0xd1/0x650
[   18.038918]  ? __virt_addr_valid+0x1db/0x2d0
[   18.038961]  ? kasan_atomics_helper+0x4f98/0x5450
[   18.038988]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.039031]  ? kasan_atomics_helper+0x4f98/0x5450
[   18.039058]  kasan_report+0x141/0x180
[   18.039087]  ? kasan_atomics_helper+0x4f98/0x5450
[   18.039120]  __asan_report_load8_noabort+0x18/0x20
[   18.039150]  kasan_atomics_helper+0x4f98/0x5450
[   18.039211]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.039239]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.039284]  ? kasan_atomics+0x152/0x310
[   18.039318]  kasan_atomics+0x1dc/0x310
[   18.039347]  ? __pfx_kasan_atomics+0x10/0x10
[   18.039408]  ? __pfx_read_tsc+0x10/0x10
[   18.039435]  ? ktime_get_ts64+0x86/0x230
[   18.039479]  kunit_try_run_case+0x1a5/0x480
[   18.039511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.039539]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.039571]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.039600]  ? __kthread_parkme+0x82/0x180
[   18.039627]  ? preempt_count_sub+0x50/0x80
[   18.039668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.039697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.039726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.039755]  kthread+0x337/0x6f0
[   18.039790]  ? trace_preempt_on+0x20/0xc0
[   18.039822]  ? __pfx_kthread+0x10/0x10
[   18.039848]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.039874]  ? calculate_sigpending+0x7b/0xa0
[   18.039905]  ? __pfx_kthread+0x10/0x10
[   18.039932]  ret_from_fork+0x116/0x1d0
[   18.039956]  ? __pfx_kthread+0x10/0x10
[   18.039982]  ret_from_fork_asm+0x1a/0x30
[   18.040022]  </TASK>
[   18.040038] 
[   18.053614] Allocated by task 283:
[   18.053988]  kasan_save_stack+0x45/0x70
[   18.054302]  kasan_save_track+0x18/0x40
[   18.054597]  kasan_save_alloc_info+0x3b/0x50
[   18.054974]  __kasan_kmalloc+0xb7/0xc0
[   18.055193]  __kmalloc_cache_noprof+0x189/0x420
[   18.055465]  kasan_atomics+0x95/0x310
[   18.055814]  kunit_try_run_case+0x1a5/0x480
[   18.056045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.056395]  kthread+0x337/0x6f0
[   18.056592]  ret_from_fork+0x116/0x1d0
[   18.056884]  ret_from_fork_asm+0x1a/0x30
[   18.057152] 
[   18.057281] The buggy address belongs to the object at ffff888103349180
[   18.057281]  which belongs to the cache kmalloc-64 of size 64
[   18.057956] The buggy address is located 0 bytes to the right of
[   18.057956]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   18.058685] 
[   18.058849] The buggy address belongs to the physical page:
[   18.059114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   18.059578] flags: 0x200000000000000(node=0|zone=2)
[   18.059958] page_type: f5(slab)
[   18.060201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.060613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.061071] page dumped because: kasan: bad access detected
[   18.061444] 
[   18.061603] Memory state around the buggy address:
[   18.061885]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.062390]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.062940] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.063276]                                      ^
[   18.063625]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.064217]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.064616] ==================================================================
[   17.158630] ==================================================================
[   17.159054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   17.159417] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.159965] 
[   17.160130] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.160186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.160203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.160233] Call Trace:
[   17.160266]  <TASK>
[   17.160287]  dump_stack_lvl+0x73/0xb0
[   17.160337]  print_report+0xd1/0x650
[   17.160365]  ? __virt_addr_valid+0x1db/0x2d0
[   17.160394]  ? kasan_atomics_helper+0x1079/0x5450
[   17.160421]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.160460]  ? kasan_atomics_helper+0x1079/0x5450
[   17.160488]  kasan_report+0x141/0x180
[   17.160528]  ? kasan_atomics_helper+0x1079/0x5450
[   17.160562]  kasan_check_range+0x10c/0x1c0
[   17.160592]  __kasan_check_write+0x18/0x20
[   17.160617]  kasan_atomics_helper+0x1079/0x5450
[   17.160673]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.160700]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.160731]  ? kasan_atomics+0x152/0x310
[   17.160764]  kasan_atomics+0x1dc/0x310
[   17.160806]  ? __pfx_kasan_atomics+0x10/0x10
[   17.160836]  ? __pfx_read_tsc+0x10/0x10
[   17.160863]  ? ktime_get_ts64+0x86/0x230
[   17.160904]  kunit_try_run_case+0x1a5/0x480
[   17.160934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.160974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.161004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.161032]  ? __kthread_parkme+0x82/0x180
[   17.161056]  ? preempt_count_sub+0x50/0x80
[   17.161086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.161116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.161144]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.161173]  kthread+0x337/0x6f0
[   17.161197]  ? trace_preempt_on+0x20/0xc0
[   17.161237]  ? __pfx_kthread+0x10/0x10
[   17.161262]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.161288]  ? calculate_sigpending+0x7b/0xa0
[   17.161330]  ? __pfx_kthread+0x10/0x10
[   17.161358]  ret_from_fork+0x116/0x1d0
[   17.161382]  ? __pfx_kthread+0x10/0x10
[   17.161407]  ret_from_fork_asm+0x1a/0x30
[   17.161445]  </TASK>
[   17.161459] 
[   17.170835] Allocated by task 283:
[   17.171057]  kasan_save_stack+0x45/0x70
[   17.171293]  kasan_save_track+0x18/0x40
[   17.171531]  kasan_save_alloc_info+0x3b/0x50
[   17.171793]  __kasan_kmalloc+0xb7/0xc0
[   17.172010]  __kmalloc_cache_noprof+0x189/0x420
[   17.172268]  kasan_atomics+0x95/0x310
[   17.172502]  kunit_try_run_case+0x1a5/0x480
[   17.172765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.173137]  kthread+0x337/0x6f0
[   17.173285]  ret_from_fork+0x116/0x1d0
[   17.173479]  ret_from_fork_asm+0x1a/0x30
[   17.173741] 
[   17.173858] The buggy address belongs to the object at ffff888103349180
[   17.173858]  which belongs to the cache kmalloc-64 of size 64
[   17.174597] The buggy address is located 0 bytes to the right of
[   17.174597]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.175317] 
[   17.175408] The buggy address belongs to the physical page:
[   17.175622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.176461] flags: 0x200000000000000(node=0|zone=2)
[   17.176781] page_type: f5(slab)
[   17.177002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.177335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.177611] page dumped because: kasan: bad access detected
[   17.177881] 
[   17.178017] Memory state around the buggy address:
[   17.178327]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.178778]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.179299] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.179741]                                      ^
[   17.179947]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.180525]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.181541] ==================================================================
[   18.006980] ==================================================================
[   18.007411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   18.007981] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   18.008344] 
[   18.008476] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.008533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.008551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.008579] Call Trace:
[   18.008603]  <TASK>
[   18.008626]  dump_stack_lvl+0x73/0xb0
[   18.008674]  print_report+0xd1/0x650
[   18.008701]  ? __virt_addr_valid+0x1db/0x2d0
[   18.008732]  ? kasan_atomics_helper+0x2006/0x5450
[   18.008760]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.008788]  ? kasan_atomics_helper+0x2006/0x5450
[   18.008816]  kasan_report+0x141/0x180
[   18.008844]  ? kasan_atomics_helper+0x2006/0x5450
[   18.008877]  kasan_check_range+0x10c/0x1c0
[   18.008907]  __kasan_check_write+0x18/0x20
[   18.008933]  kasan_atomics_helper+0x2006/0x5450
[   18.008962]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.008990]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.009021]  ? kasan_atomics+0x152/0x310
[   18.009056]  kasan_atomics+0x1dc/0x310
[   18.009085]  ? __pfx_kasan_atomics+0x10/0x10
[   18.009116]  ? __pfx_read_tsc+0x10/0x10
[   18.009144]  ? ktime_get_ts64+0x86/0x230
[   18.009174]  kunit_try_run_case+0x1a5/0x480
[   18.009205]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.009233]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.009263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.009292]  ? __kthread_parkme+0x82/0x180
[   18.009318]  ? preempt_count_sub+0x50/0x80
[   18.009349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.009378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.009407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.009437]  kthread+0x337/0x6f0
[   18.009462]  ? trace_preempt_on+0x20/0xc0
[   18.009492]  ? __pfx_kthread+0x10/0x10
[   18.009519]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.009548]  ? calculate_sigpending+0x7b/0xa0
[   18.009579]  ? __pfx_kthread+0x10/0x10
[   18.009607]  ret_from_fork+0x116/0x1d0
[   18.009631]  ? __pfx_kthread+0x10/0x10
[   18.009668]  ret_from_fork_asm+0x1a/0x30
[   18.009707]  </TASK>
[   18.009723] 
[   18.022398] Allocated by task 283:
[   18.023088]  kasan_save_stack+0x45/0x70
[   18.023298]  kasan_save_track+0x18/0x40
[   18.023469]  kasan_save_alloc_info+0x3b/0x50
[   18.023672]  __kasan_kmalloc+0xb7/0xc0
[   18.024199]  __kmalloc_cache_noprof+0x189/0x420
[   18.024753]  kasan_atomics+0x95/0x310
[   18.025096]  kunit_try_run_case+0x1a5/0x480
[   18.025426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.025662]  kthread+0x337/0x6f0
[   18.025848]  ret_from_fork+0x116/0x1d0
[   18.026362]  ret_from_fork_asm+0x1a/0x30
[   18.026894] 
[   18.027137] The buggy address belongs to the object at ffff888103349180
[   18.027137]  which belongs to the cache kmalloc-64 of size 64
[   18.028509] The buggy address is located 0 bytes to the right of
[   18.028509]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   18.029371] 
[   18.029614] The buggy address belongs to the physical page:
[   18.030302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   18.030878] flags: 0x200000000000000(node=0|zone=2)
[   18.031090] page_type: f5(slab)
[   18.031241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.031523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.031882] page dumped because: kasan: bad access detected
[   18.032143] 
[   18.032254] Memory state around the buggy address:
[   18.032530]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.032951]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.033317] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.033731]                                      ^
[   18.033979]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.034386]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.034822] ==================================================================
[   18.092592] ==================================================================
[   18.092917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   18.093355] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   18.093720] 
[   18.093880] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.093939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.093958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.093986] Call Trace:
[   18.094009]  <TASK>
[   18.094032]  dump_stack_lvl+0x73/0xb0
[   18.094068]  print_report+0xd1/0x650
[   18.094096]  ? __virt_addr_valid+0x1db/0x2d0
[   18.094124]  ? kasan_atomics_helper+0x4fb2/0x5450
[   18.094153]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.094180]  ? kasan_atomics_helper+0x4fb2/0x5450
[   18.094208]  kasan_report+0x141/0x180
[   18.094236]  ? kasan_atomics_helper+0x4fb2/0x5450
[   18.094269]  __asan_report_load8_noabort+0x18/0x20
[   18.094299]  kasan_atomics_helper+0x4fb2/0x5450
[   18.094327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.094355]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.094386]  ? kasan_atomics+0x152/0x310
[   18.094425]  kasan_atomics+0x1dc/0x310
[   18.094454]  ? __pfx_kasan_atomics+0x10/0x10
[   18.094483]  ? __pfx_read_tsc+0x10/0x10
[   18.094510]  ? ktime_get_ts64+0x86/0x230
[   18.094540]  kunit_try_run_case+0x1a5/0x480
[   18.094571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.094600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.094630]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.094674]  ? __kthread_parkme+0x82/0x180
[   18.094700]  ? preempt_count_sub+0x50/0x80
[   18.094730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.094760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.094789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.094818]  kthread+0x337/0x6f0
[   18.094843]  ? trace_preempt_on+0x20/0xc0
[   18.094873]  ? __pfx_kthread+0x10/0x10
[   18.094899]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.094925]  ? calculate_sigpending+0x7b/0xa0
[   18.094956]  ? __pfx_kthread+0x10/0x10
[   18.094982]  ret_from_fork+0x116/0x1d0
[   18.095006]  ? __pfx_kthread+0x10/0x10
[   18.095032]  ret_from_fork_asm+0x1a/0x30
[   18.095071]  </TASK>
[   18.095086] 
[   18.103712] Allocated by task 283:
[   18.103955]  kasan_save_stack+0x45/0x70
[   18.104185]  kasan_save_track+0x18/0x40
[   18.104416]  kasan_save_alloc_info+0x3b/0x50
[   18.104631]  __kasan_kmalloc+0xb7/0xc0
[   18.104877]  __kmalloc_cache_noprof+0x189/0x420
[   18.105140]  kasan_atomics+0x95/0x310
[   18.105318]  kunit_try_run_case+0x1a5/0x480
[   18.105502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.105860]  kthread+0x337/0x6f0
[   18.106066]  ret_from_fork+0x116/0x1d0
[   18.106290]  ret_from_fork_asm+0x1a/0x30
[   18.106541] 
[   18.106666] The buggy address belongs to the object at ffff888103349180
[   18.106666]  which belongs to the cache kmalloc-64 of size 64
[   18.107390] The buggy address is located 0 bytes to the right of
[   18.107390]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   18.108022] 
[   18.108116] The buggy address belongs to the physical page:
[   18.108329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   18.108622] flags: 0x200000000000000(node=0|zone=2)
[   18.108917] page_type: f5(slab)
[   18.109122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.109826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.110120] page dumped because: kasan: bad access detected
[   18.110338] 
[   18.110434] Memory state around the buggy address:
[   18.110625]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.111035]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.111425] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.111814]                                      ^
[   18.112090]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.112489]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.112970] ==================================================================
[   17.453987] ==================================================================
[   17.454363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   17.454928] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.455260] 
[   17.455404] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.455464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.455481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.455509] Call Trace:
[   17.455533]  <TASK>
[   17.455557]  dump_stack_lvl+0x73/0xb0
[   17.455592]  print_report+0xd1/0x650
[   17.455620]  ? __virt_addr_valid+0x1db/0x2d0
[   17.455664]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.455691]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.455721]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.455749]  kasan_report+0x141/0x180
[   17.455776]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.455809]  __asan_report_store8_noabort+0x1b/0x30
[   17.455835]  kasan_atomics_helper+0x50d4/0x5450
[   17.455863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.455889]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.455921]  ? kasan_atomics+0x152/0x310
[   17.455954]  kasan_atomics+0x1dc/0x310
[   17.455982]  ? __pfx_kasan_atomics+0x10/0x10
[   17.456012]  ? __pfx_read_tsc+0x10/0x10
[   17.456038]  ? ktime_get_ts64+0x86/0x230
[   17.456068]  kunit_try_run_case+0x1a5/0x480
[   17.456099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.456126]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.456156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.456185]  ? __kthread_parkme+0x82/0x180
[   17.456211]  ? preempt_count_sub+0x50/0x80
[   17.456240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.456269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.456297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.456326]  kthread+0x337/0x6f0
[   17.456349]  ? trace_preempt_on+0x20/0xc0
[   17.456379]  ? __pfx_kthread+0x10/0x10
[   17.456405]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.456431]  ? calculate_sigpending+0x7b/0xa0
[   17.456461]  ? __pfx_kthread+0x10/0x10
[   17.456487]  ret_from_fork+0x116/0x1d0
[   17.456510]  ? __pfx_kthread+0x10/0x10
[   17.456536]  ret_from_fork_asm+0x1a/0x30
[   17.456574]  </TASK>
[   17.456588] 
[   17.469175] Allocated by task 283:
[   17.469507]  kasan_save_stack+0x45/0x70
[   17.470220]  kasan_save_track+0x18/0x40
[   17.470457]  kasan_save_alloc_info+0x3b/0x50
[   17.470693]  __kasan_kmalloc+0xb7/0xc0
[   17.471195]  __kmalloc_cache_noprof+0x189/0x420
[   17.471658]  kasan_atomics+0x95/0x310
[   17.472018]  kunit_try_run_case+0x1a5/0x480
[   17.472452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.472751]  kthread+0x337/0x6f0
[   17.472942]  ret_from_fork+0x116/0x1d0
[   17.473150]  ret_from_fork_asm+0x1a/0x30
[   17.473363] 
[   17.473475] The buggy address belongs to the object at ffff888103349180
[   17.473475]  which belongs to the cache kmalloc-64 of size 64
[   17.474499] The buggy address is located 0 bytes to the right of
[   17.474499]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.475626] 
[   17.475915] The buggy address belongs to the physical page:
[   17.476351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.476762] flags: 0x200000000000000(node=0|zone=2)
[   17.477284] page_type: f5(slab)
[   17.477631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.478149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.478527] page dumped because: kasan: bad access detected
[   17.479101] 
[   17.479377] Memory state around the buggy address:
[   17.479859]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.480354]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.481027] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.481472]                                      ^
[   17.481727]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.482512]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.483430] ==================================================================
[   17.060555] ==================================================================
[   17.061513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   17.061955] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.062406] 
[   17.062587] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.062658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.062676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.062706] Call Trace:
[   17.062743]  <TASK>
[   17.062769]  dump_stack_lvl+0x73/0xb0
[   17.062806]  print_report+0xd1/0x650
[   17.062905]  ? __virt_addr_valid+0x1db/0x2d0
[   17.062940]  ? kasan_atomics_helper+0xe78/0x5450
[   17.062966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.063008]  ? kasan_atomics_helper+0xe78/0x5450
[   17.063034]  kasan_report+0x141/0x180
[   17.063076]  ? kasan_atomics_helper+0xe78/0x5450
[   17.063108]  kasan_check_range+0x10c/0x1c0
[   17.063138]  __kasan_check_write+0x18/0x20
[   17.063161]  kasan_atomics_helper+0xe78/0x5450
[   17.063200]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.063229]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.063273]  ? kasan_atomics+0x152/0x310
[   17.063306]  kasan_atomics+0x1dc/0x310
[   17.063335]  ? __pfx_kasan_atomics+0x10/0x10
[   17.063364]  ? __pfx_read_tsc+0x10/0x10
[   17.063392]  ? ktime_get_ts64+0x86/0x230
[   17.063423]  kunit_try_run_case+0x1a5/0x480
[   17.063454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.063481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.063510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.063540]  ? __kthread_parkme+0x82/0x180
[   17.063565]  ? preempt_count_sub+0x50/0x80
[   17.063594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.063625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.063664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.063694]  kthread+0x337/0x6f0
[   17.063718]  ? trace_preempt_on+0x20/0xc0
[   17.063748]  ? __pfx_kthread+0x10/0x10
[   17.063774]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.063801]  ? calculate_sigpending+0x7b/0xa0
[   17.063831]  ? __pfx_kthread+0x10/0x10
[   17.063858]  ret_from_fork+0x116/0x1d0
[   17.063882]  ? __pfx_kthread+0x10/0x10
[   17.063908]  ret_from_fork_asm+0x1a/0x30
[   17.063947]  </TASK>
[   17.063962] 
[   17.074158] Allocated by task 283:
[   17.074335]  kasan_save_stack+0x45/0x70
[   17.074519]  kasan_save_track+0x18/0x40
[   17.074740]  kasan_save_alloc_info+0x3b/0x50
[   17.074939]  __kasan_kmalloc+0xb7/0xc0
[   17.075096]  __kmalloc_cache_noprof+0x189/0x420
[   17.075279]  kasan_atomics+0x95/0x310
[   17.075438]  kunit_try_run_case+0x1a5/0x480
[   17.075759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.076092]  kthread+0x337/0x6f0
[   17.076394]  ret_from_fork+0x116/0x1d0
[   17.076671]  ret_from_fork_asm+0x1a/0x30
[   17.076978] 
[   17.077096] The buggy address belongs to the object at ffff888103349180
[   17.077096]  which belongs to the cache kmalloc-64 of size 64
[   17.077747] The buggy address is located 0 bytes to the right of
[   17.077747]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.078631] 
[   17.078787] The buggy address belongs to the physical page:
[   17.080424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.080868] flags: 0x200000000000000(node=0|zone=2)
[   17.081153] page_type: f5(slab)
[   17.082620] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.083077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.083351] page dumped because: kasan: bad access detected
[   17.083557] 
[   17.083656] Memory state around the buggy address:
[   17.083903]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.084158]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.084409] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.085549]                                      ^
[   17.086095]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.086416]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.086937] ==================================================================
[   17.386627] ==================================================================
[   17.387491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   17.387923] Read of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.388330] 
[   17.388473] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.388527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.388543] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.388571] Call Trace:
[   17.388591]  <TASK>
[   17.388613]  dump_stack_lvl+0x73/0xb0
[   17.388660]  print_report+0xd1/0x650
[   17.388688]  ? __virt_addr_valid+0x1db/0x2d0
[   17.388718]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.388745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.388790]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.388817]  kasan_report+0x141/0x180
[   17.388846]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.388879]  __asan_report_load8_noabort+0x18/0x20
[   17.388912]  kasan_atomics_helper+0x4eae/0x5450
[   17.388945]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.388974]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.389005]  ? kasan_atomics+0x152/0x310
[   17.389038]  kasan_atomics+0x1dc/0x310
[   17.389067]  ? __pfx_kasan_atomics+0x10/0x10
[   17.389097]  ? __pfx_read_tsc+0x10/0x10
[   17.389123]  ? ktime_get_ts64+0x86/0x230
[   17.389153]  kunit_try_run_case+0x1a5/0x480
[   17.389182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.389210]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.389240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.389268]  ? __kthread_parkme+0x82/0x180
[   17.389294]  ? preempt_count_sub+0x50/0x80
[   17.389323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.389352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.389380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.389409]  kthread+0x337/0x6f0
[   17.389434]  ? trace_preempt_on+0x20/0xc0
[   17.389462]  ? __pfx_kthread+0x10/0x10
[   17.389488]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.389514]  ? calculate_sigpending+0x7b/0xa0
[   17.389543]  ? __pfx_kthread+0x10/0x10
[   17.389570]  ret_from_fork+0x116/0x1d0
[   17.389594]  ? __pfx_kthread+0x10/0x10
[   17.389619]  ret_from_fork_asm+0x1a/0x30
[   17.389681]  </TASK>
[   17.389697] 
[   17.407900] Allocated by task 283:
[   17.408330]  kasan_save_stack+0x45/0x70
[   17.408808]  kasan_save_track+0x18/0x40
[   17.409250]  kasan_save_alloc_info+0x3b/0x50
[   17.409723]  __kasan_kmalloc+0xb7/0xc0
[   17.410231]  __kmalloc_cache_noprof+0x189/0x420
[   17.410471]  kasan_atomics+0x95/0x310
[   17.410636]  kunit_try_run_case+0x1a5/0x480
[   17.410936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.411482]  kthread+0x337/0x6f0
[   17.411910]  ret_from_fork+0x116/0x1d0
[   17.412346]  ret_from_fork_asm+0x1a/0x30
[   17.412806] 
[   17.413073] The buggy address belongs to the object at ffff888103349180
[   17.413073]  which belongs to the cache kmalloc-64 of size 64
[   17.414248] The buggy address is located 0 bytes to the right of
[   17.414248]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.414711] 
[   17.414873] The buggy address belongs to the physical page:
[   17.415467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.416542] flags: 0x200000000000000(node=0|zone=2)
[   17.417273] page_type: f5(slab)
[   17.417662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.418757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.419639] page dumped because: kasan: bad access detected
[   17.419953] 
[   17.420170] Memory state around the buggy address:
[   17.420720]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.421606]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.422500] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.423031]                                      ^
[   17.423551]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.424011]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.424276] ==================================================================
[   16.654809] ==================================================================
[   16.655296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   16.655635] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.656262] 
[   16.656404] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.656462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.656480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.656508] Call Trace:
[   16.656534]  <TASK>
[   16.656559]  dump_stack_lvl+0x73/0xb0
[   16.656598]  print_report+0xd1/0x650
[   16.656627]  ? __virt_addr_valid+0x1db/0x2d0
[   16.656668]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.656695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.656724]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.656751]  kasan_report+0x141/0x180
[   16.656779]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.656812]  kasan_check_range+0x10c/0x1c0
[   16.656842]  __kasan_check_write+0x18/0x20
[   16.656866]  kasan_atomics_helper+0x5fe/0x5450
[   16.656894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.656983]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.657018]  ? kasan_atomics+0x152/0x310
[   16.657052]  kasan_atomics+0x1dc/0x310
[   16.657080]  ? __pfx_kasan_atomics+0x10/0x10
[   16.657110]  ? __pfx_read_tsc+0x10/0x10
[   16.657138]  ? ktime_get_ts64+0x86/0x230
[   16.657169]  kunit_try_run_case+0x1a5/0x480
[   16.657200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.657228]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.657260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.657288]  ? __kthread_parkme+0x82/0x180
[   16.657314]  ? preempt_count_sub+0x50/0x80
[   16.657345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.657375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.657404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.657433]  kthread+0x337/0x6f0
[   16.657458]  ? trace_preempt_on+0x20/0xc0
[   16.657488]  ? __pfx_kthread+0x10/0x10
[   16.657514]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.657540]  ? calculate_sigpending+0x7b/0xa0
[   16.657569]  ? __pfx_kthread+0x10/0x10
[   16.657597]  ret_from_fork+0x116/0x1d0
[   16.657621]  ? __pfx_kthread+0x10/0x10
[   16.657660]  ret_from_fork_asm+0x1a/0x30
[   16.657699]  </TASK>
[   16.657713] 
[   16.667567] Allocated by task 283:
[   16.667888]  kasan_save_stack+0x45/0x70
[   16.668108]  kasan_save_track+0x18/0x40
[   16.668342]  kasan_save_alloc_info+0x3b/0x50
[   16.668556]  __kasan_kmalloc+0xb7/0xc0
[   16.668828]  __kmalloc_cache_noprof+0x189/0x420
[   16.669022]  kasan_atomics+0x95/0x310
[   16.669189]  kunit_try_run_case+0x1a5/0x480
[   16.669441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.669750]  kthread+0x337/0x6f0
[   16.670015]  ret_from_fork+0x116/0x1d0
[   16.670236]  ret_from_fork_asm+0x1a/0x30
[   16.670454] 
[   16.670574] The buggy address belongs to the object at ffff888103349180
[   16.670574]  which belongs to the cache kmalloc-64 of size 64
[   16.671108] The buggy address is located 0 bytes to the right of
[   16.671108]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.671771] 
[   16.671863] The buggy address belongs to the physical page:
[   16.672076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.672367] flags: 0x200000000000000(node=0|zone=2)
[   16.672780] page_type: f5(slab)
[   16.673049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.673462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.673779] page dumped because: kasan: bad access detected
[   16.673988] 
[   16.674074] Memory state around the buggy address:
[   16.674264]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.674617]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.675584] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.676352]                                      ^
[   16.676659]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.677405]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.677755] ==================================================================
[   17.136156] ==================================================================
[   17.136622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   17.137276] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.137640] 
[   17.137812] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.137880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.137897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.137923] Call Trace:
[   17.137941]  <TASK>
[   17.137973]  dump_stack_lvl+0x73/0xb0
[   17.138010]  print_report+0xd1/0x650
[   17.138051]  ? __virt_addr_valid+0x1db/0x2d0
[   17.138080]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.138108]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.138140]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.138180]  kasan_report+0x141/0x180
[   17.138207]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.138254]  __asan_report_load4_noabort+0x18/0x20
[   17.138285]  kasan_atomics_helper+0x4a36/0x5450
[   17.138314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.138342]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.138385]  ? kasan_atomics+0x152/0x310
[   17.138424]  kasan_atomics+0x1dc/0x310
[   17.138466]  ? __pfx_kasan_atomics+0x10/0x10
[   17.138495]  ? __pfx_read_tsc+0x10/0x10
[   17.138522]  ? ktime_get_ts64+0x86/0x230
[   17.138563]  kunit_try_run_case+0x1a5/0x480
[   17.138592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.138620]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.138672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.138701]  ? __kthread_parkme+0x82/0x180
[   17.138738]  ? preempt_count_sub+0x50/0x80
[   17.138782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.138821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.138850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.138879]  kthread+0x337/0x6f0
[   17.138919]  ? trace_preempt_on+0x20/0xc0
[   17.138948]  ? __pfx_kthread+0x10/0x10
[   17.138986]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.139023]  ? calculate_sigpending+0x7b/0xa0
[   17.139053]  ? __pfx_kthread+0x10/0x10
[   17.139079]  ret_from_fork+0x116/0x1d0
[   17.139116]  ? __pfx_kthread+0x10/0x10
[   17.139142]  ret_from_fork_asm+0x1a/0x30
[   17.139195]  </TASK>
[   17.139209] 
[   17.148491] Allocated by task 283:
[   17.148717]  kasan_save_stack+0x45/0x70
[   17.149205]  kasan_save_track+0x18/0x40
[   17.149381]  kasan_save_alloc_info+0x3b/0x50
[   17.149570]  __kasan_kmalloc+0xb7/0xc0
[   17.149910]  __kmalloc_cache_noprof+0x189/0x420
[   17.150182]  kasan_atomics+0x95/0x310
[   17.150400]  kunit_try_run_case+0x1a5/0x480
[   17.150665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.150995]  kthread+0x337/0x6f0
[   17.151151]  ret_from_fork+0x116/0x1d0
[   17.151411]  ret_from_fork_asm+0x1a/0x30
[   17.151624] 
[   17.151759] The buggy address belongs to the object at ffff888103349180
[   17.151759]  which belongs to the cache kmalloc-64 of size 64
[   17.152356] The buggy address is located 0 bytes to the right of
[   17.152356]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.153044] 
[   17.153168] The buggy address belongs to the physical page:
[   17.153470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.153945] flags: 0x200000000000000(node=0|zone=2)
[   17.154149] page_type: f5(slab)
[   17.154298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.154582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.154997] page dumped because: kasan: bad access detected
[   17.155336] 
[   17.155456] Memory state around the buggy address:
[   17.155733]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.156068]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.156329] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.156603]                                      ^
[   17.157019]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.157435]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.157935] ==================================================================
[   17.506967] ==================================================================
[   17.507410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   17.507938] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.508218] 
[   17.508326] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.508378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.508395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.508424] Call Trace:
[   17.508446]  <TASK>
[   17.508465]  dump_stack_lvl+0x73/0xb0
[   17.508499]  print_report+0xd1/0x650
[   17.508541]  ? __virt_addr_valid+0x1db/0x2d0
[   17.508570]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.508596]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.508637]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.508675]  kasan_report+0x141/0x180
[   17.508703]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.508735]  kasan_check_range+0x10c/0x1c0
[   17.508763]  __kasan_check_write+0x18/0x20
[   17.508788]  kasan_atomics_helper+0x15b6/0x5450
[   17.508815]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.508854]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.508897]  ? kasan_atomics+0x152/0x310
[   17.508944]  kasan_atomics+0x1dc/0x310
[   17.508973]  ? __pfx_kasan_atomics+0x10/0x10
[   17.509003]  ? __pfx_read_tsc+0x10/0x10
[   17.509029]  ? ktime_get_ts64+0x86/0x230
[   17.509061]  kunit_try_run_case+0x1a5/0x480
[   17.509092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.509120]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.509150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.509180]  ? __kthread_parkme+0x82/0x180
[   17.509206]  ? preempt_count_sub+0x50/0x80
[   17.509236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.509266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.509295]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.509324]  kthread+0x337/0x6f0
[   17.509350]  ? trace_preempt_on+0x20/0xc0
[   17.509380]  ? __pfx_kthread+0x10/0x10
[   17.509406]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.509433]  ? calculate_sigpending+0x7b/0xa0
[   17.509475]  ? __pfx_kthread+0x10/0x10
[   17.509503]  ret_from_fork+0x116/0x1d0
[   17.509538]  ? __pfx_kthread+0x10/0x10
[   17.509565]  ret_from_fork_asm+0x1a/0x30
[   17.509603]  </TASK>
[   17.509618] 
[   17.519323] Allocated by task 283:
[   17.519518]  kasan_save_stack+0x45/0x70
[   17.519710]  kasan_save_track+0x18/0x40
[   17.519877]  kasan_save_alloc_info+0x3b/0x50
[   17.520073]  __kasan_kmalloc+0xb7/0xc0
[   17.520331]  __kmalloc_cache_noprof+0x189/0x420
[   17.520603]  kasan_atomics+0x95/0x310
[   17.520836]  kunit_try_run_case+0x1a5/0x480
[   17.521200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.521491]  kthread+0x337/0x6f0
[   17.521640]  ret_from_fork+0x116/0x1d0
[   17.521909]  ret_from_fork_asm+0x1a/0x30
[   17.522156] 
[   17.522276] The buggy address belongs to the object at ffff888103349180
[   17.522276]  which belongs to the cache kmalloc-64 of size 64
[   17.523015] The buggy address is located 0 bytes to the right of
[   17.523015]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.523692] 
[   17.523828] The buggy address belongs to the physical page:
[   17.524111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.524512] flags: 0x200000000000000(node=0|zone=2)
[   17.524805] page_type: f5(slab)
[   17.525018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.525417] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.525743] page dumped because: kasan: bad access detected
[   17.526074] 
[   17.526203] Memory state around the buggy address:
[   17.526440]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.526881]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.527246] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.527620]                                      ^
[   17.527918]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.528276]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.528612] ==================================================================
[   16.920588] ==================================================================
[   16.921261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   16.921876] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.922952] 
[   16.923227] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.923287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.923319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.923348] Call Trace:
[   16.923373]  <TASK>
[   16.923398]  dump_stack_lvl+0x73/0xb0
[   16.923437]  print_report+0xd1/0x650
[   16.923466]  ? __virt_addr_valid+0x1db/0x2d0
[   16.923497]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.923525]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.923555]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.923582]  kasan_report+0x141/0x180
[   16.923610]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.923643]  kasan_check_range+0x10c/0x1c0
[   16.923687]  __kasan_check_write+0x18/0x20
[   16.923725]  kasan_atomics_helper+0xb6a/0x5450
[   16.923754]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.923796]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.923846]  ? kasan_atomics+0x152/0x310
[   16.923896]  kasan_atomics+0x1dc/0x310
[   16.923925]  ? __pfx_kasan_atomics+0x10/0x10
[   16.923956]  ? __pfx_read_tsc+0x10/0x10
[   16.923982]  ? ktime_get_ts64+0x86/0x230
[   16.924012]  kunit_try_run_case+0x1a5/0x480
[   16.924043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.924069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.924101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.924129]  ? __kthread_parkme+0x82/0x180
[   16.924155]  ? preempt_count_sub+0x50/0x80
[   16.924186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.924215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.924244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.924272]  kthread+0x337/0x6f0
[   16.924297]  ? trace_preempt_on+0x20/0xc0
[   16.924326]  ? __pfx_kthread+0x10/0x10
[   16.924351]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.924379]  ? calculate_sigpending+0x7b/0xa0
[   16.924409]  ? __pfx_kthread+0x10/0x10
[   16.924435]  ret_from_fork+0x116/0x1d0
[   16.924459]  ? __pfx_kthread+0x10/0x10
[   16.924484]  ret_from_fork_asm+0x1a/0x30
[   16.924523]  </TASK>
[   16.924538] 
[   16.936089] Allocated by task 283:
[   16.936489]  kasan_save_stack+0x45/0x70
[   16.936766]  kasan_save_track+0x18/0x40
[   16.937146]  kasan_save_alloc_info+0x3b/0x50
[   16.937379]  __kasan_kmalloc+0xb7/0xc0
[   16.937697]  __kmalloc_cache_noprof+0x189/0x420
[   16.937974]  kasan_atomics+0x95/0x310
[   16.938518]  kunit_try_run_case+0x1a5/0x480
[   16.938795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.939095]  kthread+0x337/0x6f0
[   16.939293]  ret_from_fork+0x116/0x1d0
[   16.939474]  ret_from_fork_asm+0x1a/0x30
[   16.939715] 
[   16.939974] The buggy address belongs to the object at ffff888103349180
[   16.939974]  which belongs to the cache kmalloc-64 of size 64
[   16.940581] The buggy address is located 0 bytes to the right of
[   16.940581]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.941247] 
[   16.941429] The buggy address belongs to the physical page:
[   16.941757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.942291] flags: 0x200000000000000(node=0|zone=2)
[   16.942589] page_type: f5(slab)
[   16.942842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.943389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.943786] page dumped because: kasan: bad access detected
[   16.944459] 
[   16.944697] Memory state around the buggy address:
[   16.945054]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.945450]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.945918] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.946252]                                      ^
[   16.946542]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.947042]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.947378] ==================================================================
[   16.488734] ==================================================================
[   16.489624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   16.490136] Read of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.490526] 
[   16.490691] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.490750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.490769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.490799] Call Trace:
[   16.490887]  <TASK>
[   16.490915]  dump_stack_lvl+0x73/0xb0
[   16.490953]  print_report+0xd1/0x650
[   16.490983]  ? __virt_addr_valid+0x1db/0x2d0
[   16.491013]  ? kasan_atomics_helper+0x3df/0x5450
[   16.491039]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.491069]  ? kasan_atomics_helper+0x3df/0x5450
[   16.491097]  kasan_report+0x141/0x180
[   16.491124]  ? kasan_atomics_helper+0x3df/0x5450
[   16.491158]  kasan_check_range+0x10c/0x1c0
[   16.491188]  __kasan_check_read+0x15/0x20
[   16.491213]  kasan_atomics_helper+0x3df/0x5450
[   16.491241]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.491269]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.491301]  ? kasan_atomics+0x152/0x310
[   16.491334]  kasan_atomics+0x1dc/0x310
[   16.491364]  ? __pfx_kasan_atomics+0x10/0x10
[   16.491395]  ? __pfx_read_tsc+0x10/0x10
[   16.491422]  ? ktime_get_ts64+0x86/0x230
[   16.491453]  kunit_try_run_case+0x1a5/0x480
[   16.491484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.491512]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.491541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.491571]  ? __kthread_parkme+0x82/0x180
[   16.491596]  ? preempt_count_sub+0x50/0x80
[   16.491626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.491670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.491699]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.491729]  kthread+0x337/0x6f0
[   16.491754]  ? trace_preempt_on+0x20/0xc0
[   16.491784]  ? __pfx_kthread+0x10/0x10
[   16.491809]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.491835]  ? calculate_sigpending+0x7b/0xa0
[   16.491865]  ? __pfx_kthread+0x10/0x10
[   16.491893]  ret_from_fork+0x116/0x1d0
[   16.491916]  ? __pfx_kthread+0x10/0x10
[   16.491941]  ret_from_fork_asm+0x1a/0x30
[   16.491985]  </TASK>
[   16.492000] 
[   16.502615] Allocated by task 283:
[   16.503750]  kasan_save_stack+0x45/0x70
[   16.504323]  kasan_save_track+0x18/0x40
[   16.504512]  kasan_save_alloc_info+0x3b/0x50
[   16.504710]  __kasan_kmalloc+0xb7/0xc0
[   16.504884]  __kmalloc_cache_noprof+0x189/0x420
[   16.505078]  kasan_atomics+0x95/0x310
[   16.505243]  kunit_try_run_case+0x1a5/0x480
[   16.505424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.505638]  kthread+0x337/0x6f0
[   16.506871]  ret_from_fork+0x116/0x1d0
[   16.507507]  ret_from_fork_asm+0x1a/0x30
[   16.508376] 
[   16.508952] The buggy address belongs to the object at ffff888103349180
[   16.508952]  which belongs to the cache kmalloc-64 of size 64
[   16.511288] The buggy address is located 0 bytes to the right of
[   16.511288]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.512332] 
[   16.512442] The buggy address belongs to the physical page:
[   16.512676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.513063] flags: 0x200000000000000(node=0|zone=2)
[   16.513398] page_type: f5(slab)
[   16.513595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.514486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.514987] page dumped because: kasan: bad access detected
[   16.515279] 
[   16.515392] Memory state around the buggy address:
[   16.516032]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.516409]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.516921] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.517437]                                      ^
[   16.517718]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.518287]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.518734] ==================================================================
[   17.206353] ==================================================================
[   17.207087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   17.207892] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.208399] 
[   17.208689] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.208746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.208798] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.208845] Call Trace:
[   17.208911]  <TASK>
[   17.208935]  dump_stack_lvl+0x73/0xb0
[   17.208971]  print_report+0xd1/0x650
[   17.209012]  ? __virt_addr_valid+0x1db/0x2d0
[   17.209042]  ? kasan_atomics_helper+0x1148/0x5450
[   17.209069]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.209098]  ? kasan_atomics_helper+0x1148/0x5450
[   17.209125]  kasan_report+0x141/0x180
[   17.209154]  ? kasan_atomics_helper+0x1148/0x5450
[   17.209186]  kasan_check_range+0x10c/0x1c0
[   17.209216]  __kasan_check_write+0x18/0x20
[   17.209242]  kasan_atomics_helper+0x1148/0x5450
[   17.209270]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.209299]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.209332]  ? kasan_atomics+0x152/0x310
[   17.209365]  kasan_atomics+0x1dc/0x310
[   17.209394]  ? __pfx_kasan_atomics+0x10/0x10
[   17.209424]  ? __pfx_read_tsc+0x10/0x10
[   17.209452]  ? ktime_get_ts64+0x86/0x230
[   17.209483]  kunit_try_run_case+0x1a5/0x480
[   17.209514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.209541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.209571]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.209600]  ? __kthread_parkme+0x82/0x180
[   17.209626]  ? preempt_count_sub+0x50/0x80
[   17.209667]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.209696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.209724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.209754]  kthread+0x337/0x6f0
[   17.209794]  ? trace_preempt_on+0x20/0xc0
[   17.209824]  ? __pfx_kthread+0x10/0x10
[   17.209850]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.209876]  ? calculate_sigpending+0x7b/0xa0
[   17.209906]  ? __pfx_kthread+0x10/0x10
[   17.209933]  ret_from_fork+0x116/0x1d0
[   17.209956]  ? __pfx_kthread+0x10/0x10
[   17.209982]  ret_from_fork_asm+0x1a/0x30
[   17.210020]  </TASK>
[   17.210035] 
[   17.221431] Allocated by task 283:
[   17.221628]  kasan_save_stack+0x45/0x70
[   17.221931]  kasan_save_track+0x18/0x40
[   17.222194]  kasan_save_alloc_info+0x3b/0x50
[   17.222447]  __kasan_kmalloc+0xb7/0xc0
[   17.222606]  __kmalloc_cache_noprof+0x189/0x420
[   17.222937]  kasan_atomics+0x95/0x310
[   17.223347]  kunit_try_run_case+0x1a5/0x480
[   17.223634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.223990]  kthread+0x337/0x6f0
[   17.224138]  ret_from_fork+0x116/0x1d0
[   17.224470]  ret_from_fork_asm+0x1a/0x30
[   17.224806] 
[   17.225069] The buggy address belongs to the object at ffff888103349180
[   17.225069]  which belongs to the cache kmalloc-64 of size 64
[   17.225580] The buggy address is located 0 bytes to the right of
[   17.225580]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.226490] 
[   17.226636] The buggy address belongs to the physical page:
[   17.227030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.227486] flags: 0x200000000000000(node=0|zone=2)
[   17.227794] page_type: f5(slab)
[   17.228046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.228392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.228671] page dumped because: kasan: bad access detected
[   17.229253] 
[   17.229387] Memory state around the buggy address:
[   17.229695]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.229953]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.230240] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.230695]                                      ^
[   17.231261]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.231802]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.232175] ==================================================================
[   16.764681] ==================================================================
[   16.765374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   16.765834] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.766221] 
[   16.766352] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.766409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.766431] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.766460] Call Trace:
[   16.766485]  <TASK>
[   16.766508]  dump_stack_lvl+0x73/0xb0
[   16.766544]  print_report+0xd1/0x650
[   16.766573]  ? __virt_addr_valid+0x1db/0x2d0
[   16.766603]  ? kasan_atomics_helper+0x860/0x5450
[   16.766630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.766672]  ? kasan_atomics_helper+0x860/0x5450
[   16.766699]  kasan_report+0x141/0x180
[   16.766728]  ? kasan_atomics_helper+0x860/0x5450
[   16.766763]  kasan_check_range+0x10c/0x1c0
[   16.766795]  __kasan_check_write+0x18/0x20
[   16.766820]  kasan_atomics_helper+0x860/0x5450
[   16.766849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.766877]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.766908]  ? kasan_atomics+0x152/0x310
[   16.766942]  kasan_atomics+0x1dc/0x310
[   16.766971]  ? __pfx_kasan_atomics+0x10/0x10
[   16.767004]  ? __pfx_read_tsc+0x10/0x10
[   16.767034]  ? ktime_get_ts64+0x86/0x230
[   16.767066]  kunit_try_run_case+0x1a5/0x480
[   16.767097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.767125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.767156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.767185]  ? __kthread_parkme+0x82/0x180
[   16.767212]  ? preempt_count_sub+0x50/0x80
[   16.767242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.767273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.767305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.767348]  kthread+0x337/0x6f0
[   16.767372]  ? trace_preempt_on+0x20/0xc0
[   16.767402]  ? __pfx_kthread+0x10/0x10
[   16.767429]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.767457]  ? calculate_sigpending+0x7b/0xa0
[   16.767487]  ? __pfx_kthread+0x10/0x10
[   16.767513]  ret_from_fork+0x116/0x1d0
[   16.767537]  ? __pfx_kthread+0x10/0x10
[   16.767563]  ret_from_fork_asm+0x1a/0x30
[   16.767601]  </TASK>
[   16.767618] 
[   16.779916] Allocated by task 283:
[   16.780414]  kasan_save_stack+0x45/0x70
[   16.781016]  kasan_save_track+0x18/0x40
[   16.781476]  kasan_save_alloc_info+0x3b/0x50
[   16.782023]  __kasan_kmalloc+0xb7/0xc0
[   16.782582]  __kmalloc_cache_noprof+0x189/0x420
[   16.783079]  kasan_atomics+0x95/0x310
[   16.783636]  kunit_try_run_case+0x1a5/0x480
[   16.784278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.784965]  kthread+0x337/0x6f0
[   16.785484]  ret_from_fork+0x116/0x1d0
[   16.786186]  ret_from_fork_asm+0x1a/0x30
[   16.786671] 
[   16.786871] The buggy address belongs to the object at ffff888103349180
[   16.786871]  which belongs to the cache kmalloc-64 of size 64
[   16.787556] The buggy address is located 0 bytes to the right of
[   16.787556]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.789045] 
[   16.789337] The buggy address belongs to the physical page:
[   16.790106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.791198] flags: 0x200000000000000(node=0|zone=2)
[   16.791684] page_type: f5(slab)
[   16.791865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.792851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.793463] page dumped because: kasan: bad access detected
[   16.793694] 
[   16.793787] Memory state around the buggy address:
[   16.794004]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.795055]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.795662] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.796424]                                      ^
[   16.796620]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.797293]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.798152] ==================================================================
[   17.574668] ==================================================================
[   17.575356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   17.575701] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.576211] 
[   17.576357] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.576427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.576445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.576486] Call Trace:
[   17.576511]  <TASK>
[   17.576533]  dump_stack_lvl+0x73/0xb0
[   17.576569]  print_report+0xd1/0x650
[   17.576597]  ? __virt_addr_valid+0x1db/0x2d0
[   17.576627]  ? kasan_atomics_helper+0x177f/0x5450
[   17.576665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.576693]  ? kasan_atomics_helper+0x177f/0x5450
[   17.576722]  kasan_report+0x141/0x180
[   17.576750]  ? kasan_atomics_helper+0x177f/0x5450
[   17.576791]  kasan_check_range+0x10c/0x1c0
[   17.576832]  __kasan_check_write+0x18/0x20
[   17.576856]  kasan_atomics_helper+0x177f/0x5450
[   17.576883]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.576925]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.576956]  ? kasan_atomics+0x152/0x310
[   17.576990]  kasan_atomics+0x1dc/0x310
[   17.577019]  ? __pfx_kasan_atomics+0x10/0x10
[   17.577049]  ? __pfx_read_tsc+0x10/0x10
[   17.577076]  ? ktime_get_ts64+0x86/0x230
[   17.577106]  kunit_try_run_case+0x1a5/0x480
[   17.577137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.577163]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.577204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.577233]  ? __kthread_parkme+0x82/0x180
[   17.577258]  ? preempt_count_sub+0x50/0x80
[   17.577301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.577331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.577359]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.577398]  kthread+0x337/0x6f0
[   17.577423]  ? trace_preempt_on+0x20/0xc0
[   17.577467]  ? __pfx_kthread+0x10/0x10
[   17.577492]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.577519]  ? calculate_sigpending+0x7b/0xa0
[   17.577561]  ? __pfx_kthread+0x10/0x10
[   17.577588]  ret_from_fork+0x116/0x1d0
[   17.577611]  ? __pfx_kthread+0x10/0x10
[   17.577638]  ret_from_fork_asm+0x1a/0x30
[   17.577687]  </TASK>
[   17.577702] 
[   17.587075] Allocated by task 283:
[   17.587336]  kasan_save_stack+0x45/0x70
[   17.587564]  kasan_save_track+0x18/0x40
[   17.588566]  kasan_save_alloc_info+0x3b/0x50
[   17.589249]  __kasan_kmalloc+0xb7/0xc0
[   17.589429]  __kmalloc_cache_noprof+0x189/0x420
[   17.589624]  kasan_atomics+0x95/0x310
[   17.589801]  kunit_try_run_case+0x1a5/0x480
[   17.589979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.590190]  kthread+0x337/0x6f0
[   17.590338]  ret_from_fork+0x116/0x1d0
[   17.590505]  ret_from_fork_asm+0x1a/0x30
[   17.590965] 
[   17.591158] The buggy address belongs to the object at ffff888103349180
[   17.591158]  which belongs to the cache kmalloc-64 of size 64
[   17.592707] The buggy address is located 0 bytes to the right of
[   17.592707]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.594193] 
[   17.594413] The buggy address belongs to the physical page:
[   17.595076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.595948] flags: 0x200000000000000(node=0|zone=2)
[   17.596506] page_type: f5(slab)
[   17.596904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.597693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.598590] page dumped because: kasan: bad access detected
[   17.599236] 
[   17.599424] Memory state around the buggy address:
[   17.599971]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.600522]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.600819] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.601561]                                      ^
[   17.602153]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.602933]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.603686] ==================================================================
[   17.000358] ==================================================================
[   17.000806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   17.001377] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.001829] 
[   17.001948] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.002081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.002103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.002147] Call Trace:
[   17.002171]  <TASK>
[   17.002193]  dump_stack_lvl+0x73/0xb0
[   17.002230]  print_report+0xd1/0x650
[   17.002259]  ? __virt_addr_valid+0x1db/0x2d0
[   17.002288]  ? kasan_atomics_helper+0xd47/0x5450
[   17.002315]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.002344]  ? kasan_atomics_helper+0xd47/0x5450
[   17.002371]  kasan_report+0x141/0x180
[   17.002399]  ? kasan_atomics_helper+0xd47/0x5450
[   17.002439]  kasan_check_range+0x10c/0x1c0
[   17.002511]  __kasan_check_write+0x18/0x20
[   17.002537]  kasan_atomics_helper+0xd47/0x5450
[   17.002593]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.002622]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.002678]  ? kasan_atomics+0x152/0x310
[   17.002711]  kasan_atomics+0x1dc/0x310
[   17.002740]  ? __pfx_kasan_atomics+0x10/0x10
[   17.002783]  ? __pfx_read_tsc+0x10/0x10
[   17.002858]  ? ktime_get_ts64+0x86/0x230
[   17.002919]  kunit_try_run_case+0x1a5/0x480
[   17.002952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.003010]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.003041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.003101]  ? __kthread_parkme+0x82/0x180
[   17.003128]  ? preempt_count_sub+0x50/0x80
[   17.003171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.003200]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.003229]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.003258]  kthread+0x337/0x6f0
[   17.003284]  ? trace_preempt_on+0x20/0xc0
[   17.003313]  ? __pfx_kthread+0x10/0x10
[   17.003339]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.003366]  ? calculate_sigpending+0x7b/0xa0
[   17.003397]  ? __pfx_kthread+0x10/0x10
[   17.003424]  ret_from_fork+0x116/0x1d0
[   17.003448]  ? __pfx_kthread+0x10/0x10
[   17.003474]  ret_from_fork_asm+0x1a/0x30
[   17.003512]  </TASK>
[   17.003527] 
[   17.014531] Allocated by task 283:
[   17.014733]  kasan_save_stack+0x45/0x70
[   17.015028]  kasan_save_track+0x18/0x40
[   17.015377]  kasan_save_alloc_info+0x3b/0x50
[   17.015664]  __kasan_kmalloc+0xb7/0xc0
[   17.015962]  __kmalloc_cache_noprof+0x189/0x420
[   17.016478]  kasan_atomics+0x95/0x310
[   17.017349]  kunit_try_run_case+0x1a5/0x480
[   17.018153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.018636]  kthread+0x337/0x6f0
[   17.019354]  ret_from_fork+0x116/0x1d0
[   17.019761]  ret_from_fork_asm+0x1a/0x30
[   17.020275] 
[   17.020723] The buggy address belongs to the object at ffff888103349180
[   17.020723]  which belongs to the cache kmalloc-64 of size 64
[   17.022120] The buggy address is located 0 bytes to the right of
[   17.022120]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.023912] 
[   17.024079] The buggy address belongs to the physical page:
[   17.024606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.025105] flags: 0x200000000000000(node=0|zone=2)
[   17.025382] page_type: f5(slab)
[   17.025577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.026678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.027639] page dumped because: kasan: bad access detected
[   17.028208] 
[   17.028336] Memory state around the buggy address:
[   17.028597]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.029217]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.029582] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.030677]                                      ^
[   17.031611]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.032348]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.032721] ==================================================================
[   17.604586] ==================================================================
[   17.605395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   17.605878] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.606821] 
[   17.606962] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.607023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.607041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.607071] Call Trace:
[   17.607097]  <TASK>
[   17.607122]  dump_stack_lvl+0x73/0xb0
[   17.607162]  print_report+0xd1/0x650
[   17.607190]  ? __virt_addr_valid+0x1db/0x2d0
[   17.607220]  ? kasan_atomics_helper+0x1818/0x5450
[   17.607249]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.607278]  ? kasan_atomics_helper+0x1818/0x5450
[   17.607305]  kasan_report+0x141/0x180
[   17.607333]  ? kasan_atomics_helper+0x1818/0x5450
[   17.607366]  kasan_check_range+0x10c/0x1c0
[   17.607395]  __kasan_check_write+0x18/0x20
[   17.607420]  kasan_atomics_helper+0x1818/0x5450
[   17.607449]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.607476]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.607508]  ? kasan_atomics+0x152/0x310
[   17.607541]  kasan_atomics+0x1dc/0x310
[   17.607570]  ? __pfx_kasan_atomics+0x10/0x10
[   17.607600]  ? __pfx_read_tsc+0x10/0x10
[   17.607625]  ? ktime_get_ts64+0x86/0x230
[   17.607790]  kunit_try_run_case+0x1a5/0x480
[   17.607829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.607858]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.607888]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.607930]  ? __kthread_parkme+0x82/0x180
[   17.607969]  ? preempt_count_sub+0x50/0x80
[   17.607998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.608042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.608070]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.608099]  kthread+0x337/0x6f0
[   17.608124]  ? trace_preempt_on+0x20/0xc0
[   17.608153]  ? __pfx_kthread+0x10/0x10
[   17.608180]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.608207]  ? calculate_sigpending+0x7b/0xa0
[   17.608236]  ? __pfx_kthread+0x10/0x10
[   17.608263]  ret_from_fork+0x116/0x1d0
[   17.608286]  ? __pfx_kthread+0x10/0x10
[   17.608312]  ret_from_fork_asm+0x1a/0x30
[   17.608351]  </TASK>
[   17.608367] 
[   17.621823] Allocated by task 283:
[   17.622066]  kasan_save_stack+0x45/0x70
[   17.622316]  kasan_save_track+0x18/0x40
[   17.622485]  kasan_save_alloc_info+0x3b/0x50
[   17.622687]  __kasan_kmalloc+0xb7/0xc0
[   17.623034]  __kmalloc_cache_noprof+0x189/0x420
[   17.623305]  kasan_atomics+0x95/0x310
[   17.623540]  kunit_try_run_case+0x1a5/0x480
[   17.623872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.624154]  kthread+0x337/0x6f0
[   17.624336]  ret_from_fork+0x116/0x1d0
[   17.624533]  ret_from_fork_asm+0x1a/0x30
[   17.624749] 
[   17.624881] The buggy address belongs to the object at ffff888103349180
[   17.624881]  which belongs to the cache kmalloc-64 of size 64
[   17.625465] The buggy address is located 0 bytes to the right of
[   17.625465]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.626129] 
[   17.626222] The buggy address belongs to the physical page:
[   17.626440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.627052] flags: 0x200000000000000(node=0|zone=2)
[   17.627313] page_type: f5(slab)
[   17.627518] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.627847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.628211] page dumped because: kasan: bad access detected
[   17.628490] 
[   17.628606] Memory state around the buggy address:
[   17.628914]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.629175]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.629435] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.629756]                                      ^
[   17.630026]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.630408]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.630791] ==================================================================
[   17.631524] ==================================================================
[   17.631887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   17.632250] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.632716] 
[   17.632897] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.632953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.632970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.632999] Call Trace:
[   17.633022]  <TASK>
[   17.633047]  dump_stack_lvl+0x73/0xb0
[   17.633082]  print_report+0xd1/0x650
[   17.633109]  ? __virt_addr_valid+0x1db/0x2d0
[   17.633139]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.633166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.633194]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.633222]  kasan_report+0x141/0x180
[   17.633250]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.633283]  kasan_check_range+0x10c/0x1c0
[   17.633313]  __kasan_check_write+0x18/0x20
[   17.633338]  kasan_atomics_helper+0x18b1/0x5450
[   17.633367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.633394]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.633426]  ? kasan_atomics+0x152/0x310
[   17.633459]  kasan_atomics+0x1dc/0x310
[   17.633488]  ? __pfx_kasan_atomics+0x10/0x10
[   17.633518]  ? __pfx_read_tsc+0x10/0x10
[   17.633546]  ? ktime_get_ts64+0x86/0x230
[   17.633576]  kunit_try_run_case+0x1a5/0x480
[   17.633605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.633633]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.633677]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.633705]  ? __kthread_parkme+0x82/0x180
[   17.633731]  ? preempt_count_sub+0x50/0x80
[   17.633761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.633790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.633819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.633848]  kthread+0x337/0x6f0
[   17.633872]  ? trace_preempt_on+0x20/0xc0
[   17.633901]  ? __pfx_kthread+0x10/0x10
[   17.633927]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.633953]  ? calculate_sigpending+0x7b/0xa0
[   17.633984]  ? __pfx_kthread+0x10/0x10
[   17.634010]  ret_from_fork+0x116/0x1d0
[   17.634034]  ? __pfx_kthread+0x10/0x10
[   17.634060]  ret_from_fork_asm+0x1a/0x30
[   17.634098]  </TASK>
[   17.634113] 
[   17.642933] Allocated by task 283:
[   17.643165]  kasan_save_stack+0x45/0x70
[   17.643413]  kasan_save_track+0x18/0x40
[   17.643593]  kasan_save_alloc_info+0x3b/0x50
[   17.643805]  __kasan_kmalloc+0xb7/0xc0
[   17.644036]  __kmalloc_cache_noprof+0x189/0x420
[   17.644313]  kasan_atomics+0x95/0x310
[   17.644545]  kunit_try_run_case+0x1a5/0x480
[   17.644737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.644952]  kthread+0x337/0x6f0
[   17.645100]  ret_from_fork+0x116/0x1d0
[   17.645509]  ret_from_fork_asm+0x1a/0x30
[   17.645755] 
[   17.645976] The buggy address belongs to the object at ffff888103349180
[   17.645976]  which belongs to the cache kmalloc-64 of size 64
[   17.646836] The buggy address is located 0 bytes to the right of
[   17.646836]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.647283] 
[   17.647409] The buggy address belongs to the physical page:
[   17.647950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.648380] flags: 0x200000000000000(node=0|zone=2)
[   17.648684] page_type: f5(slab)
[   17.648836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.649117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.649391] page dumped because: kasan: bad access detected
[   17.649600] 
[   17.650579] Memory state around the buggy address:
[   17.651854]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.652761]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.653923] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.654195]                                      ^
[   17.654392]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.655019]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.656283] ==================================================================
[   17.907949] ==================================================================
[   17.908326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   17.908914] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.909339] 
[   17.909455] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.909513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.909531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.909561] Call Trace:
[   17.909585]  <TASK>
[   17.909612]  dump_stack_lvl+0x73/0xb0
[   17.909700]  print_report+0xd1/0x650
[   17.909729]  ? __virt_addr_valid+0x1db/0x2d0
[   17.909761]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.909788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.909817]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.909844]  kasan_report+0x141/0x180
[   17.909873]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.909905]  kasan_check_range+0x10c/0x1c0
[   17.909936]  __kasan_check_write+0x18/0x20
[   17.909981]  kasan_atomics_helper+0x1e12/0x5450
[   17.910011]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.910043]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.910077]  ? kasan_atomics+0x152/0x310
[   17.910114]  kasan_atomics+0x1dc/0x310
[   17.910142]  ? __pfx_kasan_atomics+0x10/0x10
[   17.910174]  ? __pfx_read_tsc+0x10/0x10
[   17.910202]  ? ktime_get_ts64+0x86/0x230
[   17.910233]  kunit_try_run_case+0x1a5/0x480
[   17.910264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.910294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.910325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.910355]  ? __kthread_parkme+0x82/0x180
[   17.910382]  ? preempt_count_sub+0x50/0x80
[   17.910413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.910448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.910478]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.910507]  kthread+0x337/0x6f0
[   17.910533]  ? trace_preempt_on+0x20/0xc0
[   17.910584]  ? __pfx_kthread+0x10/0x10
[   17.910610]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.910638]  ? calculate_sigpending+0x7b/0xa0
[   17.910678]  ? __pfx_kthread+0x10/0x10
[   17.910707]  ret_from_fork+0x116/0x1d0
[   17.910730]  ? __pfx_kthread+0x10/0x10
[   17.910756]  ret_from_fork_asm+0x1a/0x30
[   17.910794]  </TASK>
[   17.910810] 
[   17.920261] Allocated by task 283:
[   17.920700]  kasan_save_stack+0x45/0x70
[   17.920885]  kasan_save_track+0x18/0x40
[   17.921055]  kasan_save_alloc_info+0x3b/0x50
[   17.921596]  __kasan_kmalloc+0xb7/0xc0
[   17.921857]  __kmalloc_cache_noprof+0x189/0x420
[   17.922139]  kasan_atomics+0x95/0x310
[   17.922310]  kunit_try_run_case+0x1a5/0x480
[   17.922500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.922849]  kthread+0x337/0x6f0
[   17.923060]  ret_from_fork+0x116/0x1d0
[   17.923289]  ret_from_fork_asm+0x1a/0x30
[   17.923534] 
[   17.923667] The buggy address belongs to the object at ffff888103349180
[   17.923667]  which belongs to the cache kmalloc-64 of size 64
[   17.924244] The buggy address is located 0 bytes to the right of
[   17.924244]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.924790] 
[   17.924913] The buggy address belongs to the physical page:
[   17.925255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.925709] flags: 0x200000000000000(node=0|zone=2)
[   17.926021] page_type: f5(slab)
[   17.926235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.926607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.926980] page dumped because: kasan: bad access detected
[   17.927500] 
[   17.927599] Memory state around the buggy address:
[   17.927851]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.928118]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.928609] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.929069]                                      ^
[   17.929537]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.930033]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.930438] ==================================================================
[   16.465348] ==================================================================
[   16.465769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   16.466197] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.466519] 
[   16.466632] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.466700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.466716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.466746] Call Trace:
[   16.466770]  <TASK>
[   16.467013]  dump_stack_lvl+0x73/0xb0
[   16.467066]  print_report+0xd1/0x650
[   16.467096]  ? __virt_addr_valid+0x1db/0x2d0
[   16.467128]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.467154]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.467183]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.467212]  kasan_report+0x141/0x180
[   16.467240]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.467275]  __asan_report_store4_noabort+0x1b/0x30
[   16.467302]  kasan_atomics_helper+0x4b6e/0x5450
[   16.467331]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.467358]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.467390]  ? kasan_atomics+0x152/0x310
[   16.467424]  kasan_atomics+0x1dc/0x310
[   16.467453]  ? __pfx_kasan_atomics+0x10/0x10
[   16.467483]  ? __pfx_read_tsc+0x10/0x10
[   16.467510]  ? ktime_get_ts64+0x86/0x230
[   16.467541]  kunit_try_run_case+0x1a5/0x480
[   16.467571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.467599]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.467629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.467676]  ? __kthread_parkme+0x82/0x180
[   16.467701]  ? preempt_count_sub+0x50/0x80
[   16.467731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.467762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.467858]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.467891]  kthread+0x337/0x6f0
[   16.467917]  ? trace_preempt_on+0x20/0xc0
[   16.467947]  ? __pfx_kthread+0x10/0x10
[   16.467974]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.468001]  ? calculate_sigpending+0x7b/0xa0
[   16.468032]  ? __pfx_kthread+0x10/0x10
[   16.468059]  ret_from_fork+0x116/0x1d0
[   16.468084]  ? __pfx_kthread+0x10/0x10
[   16.468111]  ret_from_fork_asm+0x1a/0x30
[   16.468150]  </TASK>
[   16.468167] 
[   16.477991] Allocated by task 283:
[   16.478233]  kasan_save_stack+0x45/0x70
[   16.478492]  kasan_save_track+0x18/0x40
[   16.478756]  kasan_save_alloc_info+0x3b/0x50
[   16.479013]  __kasan_kmalloc+0xb7/0xc0
[   16.479241]  __kmalloc_cache_noprof+0x189/0x420
[   16.479434]  kasan_atomics+0x95/0x310
[   16.479632]  kunit_try_run_case+0x1a5/0x480
[   16.480034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.480338]  kthread+0x337/0x6f0
[   16.480520]  ret_from_fork+0x116/0x1d0
[   16.480700]  ret_from_fork_asm+0x1a/0x30
[   16.481114] 
[   16.481242] The buggy address belongs to the object at ffff888103349180
[   16.481242]  which belongs to the cache kmalloc-64 of size 64
[   16.481760] The buggy address is located 0 bytes to the right of
[   16.481760]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.482230] 
[   16.482348] The buggy address belongs to the physical page:
[   16.482924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.483322] flags: 0x200000000000000(node=0|zone=2)
[   16.483529] page_type: f5(slab)
[   16.483694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.484389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.484889] page dumped because: kasan: bad access detected
[   16.485171] 
[   16.485267] Memory state around the buggy address:
[   16.485501]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.486155]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.486437] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.486756]                                      ^
[   16.487072]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.487467]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.488085] ==================================================================
[   17.963821] ==================================================================
[   17.964303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   17.964687] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.965029] 
[   17.965171] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.965229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.965246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.965274] Call Trace:
[   17.965299]  <TASK>
[   17.965322]  dump_stack_lvl+0x73/0xb0
[   17.965358]  print_report+0xd1/0x650
[   17.965386]  ? __virt_addr_valid+0x1db/0x2d0
[   17.965415]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.965441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.965470]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.965497]  kasan_report+0x141/0x180
[   17.965525]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.965558]  kasan_check_range+0x10c/0x1c0
[   17.965587]  __kasan_check_write+0x18/0x20
[   17.965612]  kasan_atomics_helper+0x1f43/0x5450
[   17.965640]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.965681]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.965712]  ? kasan_atomics+0x152/0x310
[   17.965746]  kasan_atomics+0x1dc/0x310
[   17.965787]  ? __pfx_kasan_atomics+0x10/0x10
[   17.965817]  ? __pfx_read_tsc+0x10/0x10
[   17.965843]  ? ktime_get_ts64+0x86/0x230
[   17.965874]  kunit_try_run_case+0x1a5/0x480
[   17.965904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.965932]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.965962]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.965991]  ? __kthread_parkme+0x82/0x180
[   17.966018]  ? preempt_count_sub+0x50/0x80
[   17.966048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.966078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.966106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.966137]  kthread+0x337/0x6f0
[   17.966162]  ? trace_preempt_on+0x20/0xc0
[   17.966192]  ? __pfx_kthread+0x10/0x10
[   17.966218]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.966244]  ? calculate_sigpending+0x7b/0xa0
[   17.966274]  ? __pfx_kthread+0x10/0x10
[   17.966301]  ret_from_fork+0x116/0x1d0
[   17.966325]  ? __pfx_kthread+0x10/0x10
[   17.966351]  ret_from_fork_asm+0x1a/0x30
[   17.966389]  </TASK>
[   17.966404] 
[   17.975120] Allocated by task 283:
[   17.975279]  kasan_save_stack+0x45/0x70
[   17.975524]  kasan_save_track+0x18/0x40
[   17.975773]  kasan_save_alloc_info+0x3b/0x50
[   17.976043]  __kasan_kmalloc+0xb7/0xc0
[   17.976441]  __kmalloc_cache_noprof+0x189/0x420
[   17.976685]  kasan_atomics+0x95/0x310
[   17.976864]  kunit_try_run_case+0x1a5/0x480
[   17.977158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.977468]  kthread+0x337/0x6f0
[   17.977639]  ret_from_fork+0x116/0x1d0
[   17.977877]  ret_from_fork_asm+0x1a/0x30
[   17.978097] 
[   17.978217] The buggy address belongs to the object at ffff888103349180
[   17.978217]  which belongs to the cache kmalloc-64 of size 64
[   17.978777] The buggy address is located 0 bytes to the right of
[   17.978777]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.979380] 
[   17.979473] The buggy address belongs to the physical page:
[   17.979758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.980468] flags: 0x200000000000000(node=0|zone=2)
[   17.980760] page_type: f5(slab)
[   17.980949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.981231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.981539] page dumped because: kasan: bad access detected
[   17.981875] 
[   17.981983] Memory state around the buggy address:
[   17.982252]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.982587]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.983024] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.983358]                                      ^
[   17.983574]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.983851]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.984111] ==================================================================
[   17.694555] ==================================================================
[   17.695361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   17.695877] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.696795] 
[   17.697036] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.697095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.697114] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.697143] Call Trace:
[   17.697168]  <TASK>
[   17.697193]  dump_stack_lvl+0x73/0xb0
[   17.697231]  print_report+0xd1/0x650
[   17.697260]  ? __virt_addr_valid+0x1db/0x2d0
[   17.697291]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.697331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.697359]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.697388]  kasan_report+0x141/0x180
[   17.697439]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.697473]  kasan_check_range+0x10c/0x1c0
[   17.697516]  __kasan_check_write+0x18/0x20
[   17.697541]  kasan_atomics_helper+0x19e3/0x5450
[   17.697570]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.697598]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.697630]  ? kasan_atomics+0x152/0x310
[   17.697676]  kasan_atomics+0x1dc/0x310
[   17.697705]  ? __pfx_kasan_atomics+0x10/0x10
[   17.697736]  ? __pfx_read_tsc+0x10/0x10
[   17.697762]  ? ktime_get_ts64+0x86/0x230
[   17.697806]  kunit_try_run_case+0x1a5/0x480
[   17.697837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.697869]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.697901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.697929]  ? __kthread_parkme+0x82/0x180
[   17.697955]  ? preempt_count_sub+0x50/0x80
[   17.697984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.698015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.698043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.698072]  kthread+0x337/0x6f0
[   17.698098]  ? trace_preempt_on+0x20/0xc0
[   17.698129]  ? __pfx_kthread+0x10/0x10
[   17.698157]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.698183]  ? calculate_sigpending+0x7b/0xa0
[   17.698213]  ? __pfx_kthread+0x10/0x10
[   17.698239]  ret_from_fork+0x116/0x1d0
[   17.698263]  ? __pfx_kthread+0x10/0x10
[   17.698288]  ret_from_fork_asm+0x1a/0x30
[   17.698327]  </TASK>
[   17.698342] 
[   17.711781] Allocated by task 283:
[   17.712014]  kasan_save_stack+0x45/0x70
[   17.712270]  kasan_save_track+0x18/0x40
[   17.712482]  kasan_save_alloc_info+0x3b/0x50
[   17.712759]  __kasan_kmalloc+0xb7/0xc0
[   17.713030]  __kmalloc_cache_noprof+0x189/0x420
[   17.713361]  kasan_atomics+0x95/0x310
[   17.713589]  kunit_try_run_case+0x1a5/0x480
[   17.713858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.714180]  kthread+0x337/0x6f0
[   17.714328]  ret_from_fork+0x116/0x1d0
[   17.714494]  ret_from_fork_asm+0x1a/0x30
[   17.714750] 
[   17.714932] The buggy address belongs to the object at ffff888103349180
[   17.714932]  which belongs to the cache kmalloc-64 of size 64
[   17.715417] The buggy address is located 0 bytes to the right of
[   17.715417]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.716292] 
[   17.716387] The buggy address belongs to the physical page:
[   17.716601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.717384] flags: 0x200000000000000(node=0|zone=2)
[   17.717694] page_type: f5(slab)
[   17.717954] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.718364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.718753] page dumped because: kasan: bad access detected
[   17.719104] 
[   17.719207] Memory state around the buggy address:
[   17.719409]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.719869]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.720413] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.720733]                                      ^
[   17.721178]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.721535]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.721975] ==================================================================
[   18.180256] ==================================================================
[   18.181151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   18.182085] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   18.182978] 
[   18.183215] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.183298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.183317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.183347] Call Trace:
[   18.183384]  <TASK>
[   18.183410]  dump_stack_lvl+0x73/0xb0
[   18.183447]  print_report+0xd1/0x650
[   18.183477]  ? __virt_addr_valid+0x1db/0x2d0
[   18.183507]  ? kasan_atomics_helper+0x224c/0x5450
[   18.183534]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.183563]  ? kasan_atomics_helper+0x224c/0x5450
[   18.183589]  kasan_report+0x141/0x180
[   18.183618]  ? kasan_atomics_helper+0x224c/0x5450
[   18.183664]  kasan_check_range+0x10c/0x1c0
[   18.183695]  __kasan_check_write+0x18/0x20
[   18.183720]  kasan_atomics_helper+0x224c/0x5450
[   18.183750]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.183802]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.183835]  ? kasan_atomics+0x152/0x310
[   18.183869]  kasan_atomics+0x1dc/0x310
[   18.183898]  ? __pfx_kasan_atomics+0x10/0x10
[   18.183930]  ? __pfx_read_tsc+0x10/0x10
[   18.183957]  ? ktime_get_ts64+0x86/0x230
[   18.183989]  kunit_try_run_case+0x1a5/0x480
[   18.184024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.184053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.184083]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.184113]  ? __kthread_parkme+0x82/0x180
[   18.184140]  ? preempt_count_sub+0x50/0x80
[   18.184172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.184202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.184231]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.184261]  kthread+0x337/0x6f0
[   18.184285]  ? trace_preempt_on+0x20/0xc0
[   18.184316]  ? __pfx_kthread+0x10/0x10
[   18.184344]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.184372]  ? calculate_sigpending+0x7b/0xa0
[   18.184403]  ? __pfx_kthread+0x10/0x10
[   18.184430]  ret_from_fork+0x116/0x1d0
[   18.184454]  ? __pfx_kthread+0x10/0x10
[   18.184480]  ret_from_fork_asm+0x1a/0x30
[   18.184521]  </TASK>
[   18.184536] 
[   18.197570] Allocated by task 283:
[   18.197873]  kasan_save_stack+0x45/0x70
[   18.198144]  kasan_save_track+0x18/0x40
[   18.198345]  kasan_save_alloc_info+0x3b/0x50
[   18.198535]  __kasan_kmalloc+0xb7/0xc0
[   18.198836]  __kmalloc_cache_noprof+0x189/0x420
[   18.199111]  kasan_atomics+0x95/0x310
[   18.199367]  kunit_try_run_case+0x1a5/0x480
[   18.199582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.200036]  kthread+0x337/0x6f0
[   18.200229]  ret_from_fork+0x116/0x1d0
[   18.200468]  ret_from_fork_asm+0x1a/0x30
[   18.200717] 
[   18.200892] The buggy address belongs to the object at ffff888103349180
[   18.200892]  which belongs to the cache kmalloc-64 of size 64
[   18.201494] The buggy address is located 0 bytes to the right of
[   18.201494]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   18.201954] 
[   18.202145] The buggy address belongs to the physical page:
[   18.202461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   18.203055] flags: 0x200000000000000(node=0|zone=2)
[   18.203285] page_type: f5(slab)
[   18.203520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.203969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.204383] page dumped because: kasan: bad access detected
[   18.204594] 
[   18.204696] Memory state around the buggy address:
[   18.205048]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.205440]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.205900] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.206273]                                      ^
[   18.206470]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.206823]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.207243] ==================================================================
[   18.065635] ==================================================================
[   18.066150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   18.066561] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   18.067179] 
[   18.067349] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.067453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.067513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.067543] Call Trace:
[   18.067568]  <TASK>
[   18.067605]  dump_stack_lvl+0x73/0xb0
[   18.067655]  print_report+0xd1/0x650
[   18.067684]  ? __virt_addr_valid+0x1db/0x2d0
[   18.067715]  ? kasan_atomics_helper+0x20c8/0x5450
[   18.067744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.067784]  ? kasan_atomics_helper+0x20c8/0x5450
[   18.067814]  kasan_report+0x141/0x180
[   18.067843]  ? kasan_atomics_helper+0x20c8/0x5450
[   18.067912]  kasan_check_range+0x10c/0x1c0
[   18.067972]  __kasan_check_write+0x18/0x20
[   18.067997]  kasan_atomics_helper+0x20c8/0x5450
[   18.068059]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.068088]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.068131]  ? kasan_atomics+0x152/0x310
[   18.068166]  kasan_atomics+0x1dc/0x310
[   18.068194]  ? __pfx_kasan_atomics+0x10/0x10
[   18.068225]  ? __pfx_read_tsc+0x10/0x10
[   18.068253]  ? ktime_get_ts64+0x86/0x230
[   18.068284]  kunit_try_run_case+0x1a5/0x480
[   18.068315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.068343]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.068374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.068435]  ? __kthread_parkme+0x82/0x180
[   18.068461]  ? preempt_count_sub+0x50/0x80
[   18.068492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.068534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.068565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.068623]  kthread+0x337/0x6f0
[   18.068668]  ? trace_preempt_on+0x20/0xc0
[   18.068700]  ? __pfx_kthread+0x10/0x10
[   18.068725]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.068752]  ? calculate_sigpending+0x7b/0xa0
[   18.068814]  ? __pfx_kthread+0x10/0x10
[   18.068843]  ret_from_fork+0x116/0x1d0
[   18.068895]  ? __pfx_kthread+0x10/0x10
[   18.068923]  ret_from_fork_asm+0x1a/0x30
[   18.068962]  </TASK>
[   18.068977] 
[   18.079320] Allocated by task 283:
[   18.079586]  kasan_save_stack+0x45/0x70
[   18.079868]  kasan_save_track+0x18/0x40
[   18.080164]  kasan_save_alloc_info+0x3b/0x50
[   18.080448]  __kasan_kmalloc+0xb7/0xc0
[   18.080721]  __kmalloc_cache_noprof+0x189/0x420
[   18.081055]  kasan_atomics+0x95/0x310
[   18.081282]  kunit_try_run_case+0x1a5/0x480
[   18.081500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.081773]  kthread+0x337/0x6f0
[   18.082140]  ret_from_fork+0x116/0x1d0
[   18.082346]  ret_from_fork_asm+0x1a/0x30
[   18.082603] 
[   18.082762] The buggy address belongs to the object at ffff888103349180
[   18.082762]  which belongs to the cache kmalloc-64 of size 64
[   18.083380] The buggy address is located 0 bytes to the right of
[   18.083380]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   18.083822] 
[   18.083943] The buggy address belongs to the physical page:
[   18.084245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   18.084722] flags: 0x200000000000000(node=0|zone=2)
[   18.085208] page_type: f5(slab)
[   18.085385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.086500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.087344] page dumped because: kasan: bad access detected
[   18.087985] 
[   18.088128] Memory state around the buggy address:
[   18.088393]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.089025]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.089543] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.090195]                                      ^
[   18.090472]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.091055]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.091837] ==================================================================
[   16.837025] ==================================================================
[   16.837608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   16.838541] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.838920] 
[   16.839032] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.839092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.839108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.839137] Call Trace:
[   16.839163]  <TASK>
[   16.839191]  dump_stack_lvl+0x73/0xb0
[   16.839228]  print_report+0xd1/0x650
[   16.839255]  ? __virt_addr_valid+0x1db/0x2d0
[   16.839284]  ? kasan_atomics_helper+0x992/0x5450
[   16.839312]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.839341]  ? kasan_atomics_helper+0x992/0x5450
[   16.839368]  kasan_report+0x141/0x180
[   16.839398]  ? kasan_atomics_helper+0x992/0x5450
[   16.839430]  kasan_check_range+0x10c/0x1c0
[   16.839460]  __kasan_check_write+0x18/0x20
[   16.839485]  kasan_atomics_helper+0x992/0x5450
[   16.839513]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.839540]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.839574]  ? kasan_atomics+0x152/0x310
[   16.839608]  kasan_atomics+0x1dc/0x310
[   16.839636]  ? __pfx_kasan_atomics+0x10/0x10
[   16.839682]  ? __pfx_read_tsc+0x10/0x10
[   16.839708]  ? ktime_get_ts64+0x86/0x230
[   16.839739]  kunit_try_run_case+0x1a5/0x480
[   16.839784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.839836]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.839867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.839896]  ? __kthread_parkme+0x82/0x180
[   16.839922]  ? preempt_count_sub+0x50/0x80
[   16.839953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.839983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.840011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.840040]  kthread+0x337/0x6f0
[   16.840064]  ? trace_preempt_on+0x20/0xc0
[   16.840094]  ? __pfx_kthread+0x10/0x10
[   16.840119]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.840146]  ? calculate_sigpending+0x7b/0xa0
[   16.840177]  ? __pfx_kthread+0x10/0x10
[   16.840204]  ret_from_fork+0x116/0x1d0
[   16.840228]  ? __pfx_kthread+0x10/0x10
[   16.840253]  ret_from_fork_asm+0x1a/0x30
[   16.840293]  </TASK>
[   16.840308] 
[   16.856493] Allocated by task 283:
[   16.856697]  kasan_save_stack+0x45/0x70
[   16.856932]  kasan_save_track+0x18/0x40
[   16.857348]  kasan_save_alloc_info+0x3b/0x50
[   16.857817]  __kasan_kmalloc+0xb7/0xc0
[   16.858276]  __kmalloc_cache_noprof+0x189/0x420
[   16.858799]  kasan_atomics+0x95/0x310
[   16.859445]  kunit_try_run_case+0x1a5/0x480
[   16.860021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.860616]  kthread+0x337/0x6f0
[   16.861083]  ret_from_fork+0x116/0x1d0
[   16.861410]  ret_from_fork_asm+0x1a/0x30
[   16.861586] 
[   16.861693] The buggy address belongs to the object at ffff888103349180
[   16.861693]  which belongs to the cache kmalloc-64 of size 64
[   16.862294] The buggy address is located 0 bytes to the right of
[   16.862294]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.863078] 
[   16.863207] The buggy address belongs to the physical page:
[   16.863481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.863845] flags: 0x200000000000000(node=0|zone=2)
[   16.864136] page_type: f5(slab)
[   16.864402] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.864730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.865143] page dumped because: kasan: bad access detected
[   16.865506] 
[   16.866088] Memory state around the buggy address:
[   16.866344]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.866713]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.867168] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.867737]                                      ^
[   16.868117]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.868418]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.868807] ==================================================================
[   18.113592] ==================================================================
[   18.114275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   18.114687] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   18.114962] 
[   18.115071] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   18.115126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.115143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.115171] Call Trace:
[   18.115193]  <TASK>
[   18.115215]  dump_stack_lvl+0x73/0xb0
[   18.115248]  print_report+0xd1/0x650
[   18.115276]  ? __virt_addr_valid+0x1db/0x2d0
[   18.115306]  ? kasan_atomics_helper+0x218a/0x5450
[   18.115332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.115360]  ? kasan_atomics_helper+0x218a/0x5450
[   18.115401]  kasan_report+0x141/0x180
[   18.115428]  ? kasan_atomics_helper+0x218a/0x5450
[   18.115462]  kasan_check_range+0x10c/0x1c0
[   18.115492]  __kasan_check_write+0x18/0x20
[   18.115550]  kasan_atomics_helper+0x218a/0x5450
[   18.115579]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.115607]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.115638]  ? kasan_atomics+0x152/0x310
[   18.115685]  kasan_atomics+0x1dc/0x310
[   18.115714]  ? __pfx_kasan_atomics+0x10/0x10
[   18.115744]  ? __pfx_read_tsc+0x10/0x10
[   18.115771]  ? ktime_get_ts64+0x86/0x230
[   18.115801]  kunit_try_run_case+0x1a5/0x480
[   18.115832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.115859]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.115889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.115918]  ? __kthread_parkme+0x82/0x180
[   18.115980]  ? preempt_count_sub+0x50/0x80
[   18.116011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.116041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.116069]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.116098]  kthread+0x337/0x6f0
[   18.116123]  ? trace_preempt_on+0x20/0xc0
[   18.116152]  ? __pfx_kthread+0x10/0x10
[   18.116178]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.116205]  ? calculate_sigpending+0x7b/0xa0
[   18.116234]  ? __pfx_kthread+0x10/0x10
[   18.116261]  ret_from_fork+0x116/0x1d0
[   18.116284]  ? __pfx_kthread+0x10/0x10
[   18.116311]  ret_from_fork_asm+0x1a/0x30
[   18.116348]  </TASK>
[   18.116364] 
[   18.129913] Allocated by task 283:
[   18.130164]  kasan_save_stack+0x45/0x70
[   18.130423]  kasan_save_track+0x18/0x40
[   18.130643]  kasan_save_alloc_info+0x3b/0x50
[   18.131343]  __kasan_kmalloc+0xb7/0xc0
[   18.131535]  __kmalloc_cache_noprof+0x189/0x420
[   18.131992]  kasan_atomics+0x95/0x310
[   18.132339]  kunit_try_run_case+0x1a5/0x480
[   18.132701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.133165]  kthread+0x337/0x6f0
[   18.133334]  ret_from_fork+0x116/0x1d0
[   18.133720]  ret_from_fork_asm+0x1a/0x30
[   18.134560] 
[   18.134691] The buggy address belongs to the object at ffff888103349180
[   18.134691]  which belongs to the cache kmalloc-64 of size 64
[   18.135124] The buggy address is located 0 bytes to the right of
[   18.135124]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   18.135566] 
[   18.135672] The buggy address belongs to the physical page:
[   18.135886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   18.136183] flags: 0x200000000000000(node=0|zone=2)
[   18.136386] page_type: f5(slab)
[   18.137313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.137617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.137931] page dumped because: kasan: bad access detected
[   18.138151] 
[   18.138241] Memory state around the buggy address:
[   18.138443]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.138883]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.139775] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.140472]                                      ^
[   18.141239]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.141996]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.142727] ==================================================================
[   16.408124] ==================================================================
[   16.409384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   16.410214] Write of size 4 at addr ffff8881033491b0 by task kunit_try_catch/283
[   16.410742] 
[   16.410922] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.410995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.411011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.411038] Call Trace:
[   16.411072]  <TASK>
[   16.411093]  dump_stack_lvl+0x73/0xb0
[   16.411129]  print_report+0xd1/0x650
[   16.411157]  ? __virt_addr_valid+0x1db/0x2d0
[   16.411197]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.411222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.411248]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.411285]  kasan_report+0x141/0x180
[   16.411311]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.411343]  __asan_report_store4_noabort+0x1b/0x30
[   16.411367]  kasan_atomics_helper+0x4ba2/0x5450
[   16.411393]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.411418]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.411448]  ? kasan_atomics+0x152/0x310
[   16.411479]  kasan_atomics+0x1dc/0x310
[   16.411506]  ? __pfx_kasan_atomics+0x10/0x10
[   16.411533]  ? __pfx_read_tsc+0x10/0x10
[   16.411559]  ? ktime_get_ts64+0x86/0x230
[   16.411587]  kunit_try_run_case+0x1a5/0x480
[   16.411616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.411641]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.411680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.411707]  ? __kthread_parkme+0x82/0x180
[   16.411730]  ? preempt_count_sub+0x50/0x80
[   16.411757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.411785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.411831]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.411857]  kthread+0x337/0x6f0
[   16.411881]  ? trace_preempt_on+0x20/0xc0
[   16.411908]  ? __pfx_kthread+0x10/0x10
[   16.411931]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.411956]  ? calculate_sigpending+0x7b/0xa0
[   16.411984]  ? __pfx_kthread+0x10/0x10
[   16.412008]  ret_from_fork+0x116/0x1d0
[   16.412029]  ? __pfx_kthread+0x10/0x10
[   16.412054]  ret_from_fork_asm+0x1a/0x30
[   16.412091]  </TASK>
[   16.412104] 
[   16.426961] Allocated by task 283:
[   16.427136]  kasan_save_stack+0x45/0x70
[   16.427321]  kasan_save_track+0x18/0x40
[   16.427491]  kasan_save_alloc_info+0x3b/0x50
[   16.427697]  __kasan_kmalloc+0xb7/0xc0
[   16.428066]  __kmalloc_cache_noprof+0x189/0x420
[   16.428315]  kasan_atomics+0x95/0x310
[   16.428479]  kunit_try_run_case+0x1a5/0x480
[   16.428672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.428976]  kthread+0x337/0x6f0
[   16.429431]  ret_from_fork+0x116/0x1d0
[   16.429629]  ret_from_fork_asm+0x1a/0x30
[   16.429816] 
[   16.429930] The buggy address belongs to the object at ffff888103349180
[   16.429930]  which belongs to the cache kmalloc-64 of size 64
[   16.430574] The buggy address is located 0 bytes to the right of
[   16.430574]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   16.431244] 
[   16.431338] The buggy address belongs to the physical page:
[   16.431606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   16.432112] flags: 0x200000000000000(node=0|zone=2)
[   16.432391] page_type: f5(slab)
[   16.432599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.432891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.433435] page dumped because: kasan: bad access detected
[   16.433828] 
[   16.433929] Memory state around the buggy address:
[   16.434233]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.434611]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.435058] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.435354]                                      ^
[   16.435619]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.435937]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.436301] ==================================================================
[   17.722730] ==================================================================
[   17.723154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   17.723726] Write of size 8 at addr ffff8881033491b0 by task kunit_try_catch/283
[   17.724006] 
[   17.724164] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.724262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.724279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.724322] Call Trace:
[   17.724343]  <TASK>
[   17.724364]  dump_stack_lvl+0x73/0xb0
[   17.724402]  print_report+0xd1/0x650
[   17.724433]  ? __virt_addr_valid+0x1db/0x2d0
[   17.724500]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.724530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.724573]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.724601]  kasan_report+0x141/0x180
[   17.724630]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.724675]  kasan_check_range+0x10c/0x1c0
[   17.724705]  __kasan_check_write+0x18/0x20
[   17.724767]  kasan_atomics_helper+0x1a7f/0x5450
[   17.724797]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.724837]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.724869]  ? kasan_atomics+0x152/0x310
[   17.724904]  kasan_atomics+0x1dc/0x310
[   17.724933]  ? __pfx_kasan_atomics+0x10/0x10
[   17.724963]  ? __pfx_read_tsc+0x10/0x10
[   17.724991]  ? ktime_get_ts64+0x86/0x230
[   17.725034]  kunit_try_run_case+0x1a5/0x480
[   17.725066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.725095]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.725162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.725191]  ? __kthread_parkme+0x82/0x180
[   17.725229]  ? preempt_count_sub+0x50/0x80
[   17.725259]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.725287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.725318]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.725352]  kthread+0x337/0x6f0
[   17.725377]  ? trace_preempt_on+0x20/0xc0
[   17.725407]  ? __pfx_kthread+0x10/0x10
[   17.725434]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.725461]  ? calculate_sigpending+0x7b/0xa0
[   17.725491]  ? __pfx_kthread+0x10/0x10
[   17.725518]  ret_from_fork+0x116/0x1d0
[   17.725542]  ? __pfx_kthread+0x10/0x10
[   17.725568]  ret_from_fork_asm+0x1a/0x30
[   17.725608]  </TASK>
[   17.725623] 
[   17.735281] Allocated by task 283:
[   17.735518]  kasan_save_stack+0x45/0x70
[   17.735830]  kasan_save_track+0x18/0x40
[   17.736084]  kasan_save_alloc_info+0x3b/0x50
[   17.736341]  __kasan_kmalloc+0xb7/0xc0
[   17.736579]  __kmalloc_cache_noprof+0x189/0x420
[   17.736791]  kasan_atomics+0x95/0x310
[   17.737039]  kunit_try_run_case+0x1a5/0x480
[   17.737350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.737743]  kthread+0x337/0x6f0
[   17.737944]  ret_from_fork+0x116/0x1d0
[   17.738112]  ret_from_fork_asm+0x1a/0x30
[   17.738421] 
[   17.738549] The buggy address belongs to the object at ffff888103349180
[   17.738549]  which belongs to the cache kmalloc-64 of size 64
[   17.739263] The buggy address is located 0 bytes to the right of
[   17.739263]  allocated 48-byte region [ffff888103349180, ffff8881033491b0)
[   17.739998] 
[   17.740094] The buggy address belongs to the physical page:
[   17.740348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103349
[   17.740824] flags: 0x200000000000000(node=0|zone=2)
[   17.741054] page_type: f5(slab)
[   17.741206] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.741526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.742202] page dumped because: kasan: bad access detected
[   17.742677] 
[   17.742771] Memory state around the buggy address:
[   17.743112]  ffff888103349080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.743447]  ffff888103349100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.743788] >ffff888103349180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.744217]                                      ^
[   17.744513]  ffff888103349200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.745123]  ffff888103349280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.745431] ==================================================================