Hay
Date
July 5, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   21.098301] ==================================================================
[   21.098353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   21.098404] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.098455] 
[   21.098494] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.098915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.099042] Hardware name: linux,dummy-virt (DT)
[   21.099075] Call trace:
[   21.099099]  show_stack+0x20/0x38 (C)
[   21.099211]  dump_stack_lvl+0x8c/0xd0
[   21.099292]  print_report+0x118/0x608
[   21.099339]  kasan_report+0xdc/0x128
[   21.099385]  kasan_check_range+0x100/0x1a8
[   21.099439]  __kasan_check_write+0x20/0x30
[   21.099484]  kasan_atomics_helper+0x154c/0x4858
[   21.099538]  kasan_atomics+0x198/0x2e0
[   21.099776]  kunit_try_run_case+0x170/0x3f0
[   21.099861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.099945]  kthread+0x328/0x630
[   21.100188]  ret_from_fork+0x10/0x20
[   21.100697] 
[   21.100975] Allocated by task 265:
[   21.101050]  kasan_save_stack+0x3c/0x68
[   21.101171]  kasan_save_track+0x20/0x40
[   21.101212]  kasan_save_alloc_info+0x40/0x58
[   21.101254]  __kasan_kmalloc+0xd4/0xd8
[   21.101293]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.101332]  kasan_atomics+0xb8/0x2e0
[   21.101373]  kunit_try_run_case+0x170/0x3f0
[   21.101413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.101486]  kthread+0x328/0x630
[   21.101520]  ret_from_fork+0x10/0x20
[   21.101557] 
[   21.101580] The buggy address belongs to the object at fff00000c78ca300
[   21.101580]  which belongs to the cache kmalloc-64 of size 64
[   21.101960] The buggy address is located 0 bytes to the right of
[   21.101960]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.102060] 
[   21.102094] The buggy address belongs to the physical page:
[   21.102128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.102427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.102489] page_type: f5(slab)
[   21.102666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.102746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.102788] page dumped because: kasan: bad access detected
[   21.103055] 
[   21.103244] Memory state around the buggy address:
[   21.103312]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.103412]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.103457] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.103498]                                      ^
[   21.103566]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.103838]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.103987] ==================================================================
[   21.129143] ==================================================================
[   21.129206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   21.129256] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.129305] 
[   21.129337] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.129416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.129444] Hardware name: linux,dummy-virt (DT)
[   21.129477] Call trace:
[   21.129500]  show_stack+0x20/0x38 (C)
[   21.129548]  dump_stack_lvl+0x8c/0xd0
[   21.129598]  print_report+0x118/0x608
[   21.129647]  kasan_report+0xdc/0x128
[   21.129759]  kasan_check_range+0x100/0x1a8
[   21.129817]  __kasan_check_write+0x20/0x30
[   21.130055]  kasan_atomics_helper+0x16d0/0x4858
[   21.130106]  kasan_atomics+0x198/0x2e0
[   21.130161]  kunit_try_run_case+0x170/0x3f0
[   21.130216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.130435]  kthread+0x328/0x630
[   21.130478]  ret_from_fork+0x10/0x20
[   21.130726] 
[   21.130753] Allocated by task 265:
[   21.130840]  kasan_save_stack+0x3c/0x68
[   21.130882]  kasan_save_track+0x20/0x40
[   21.130922]  kasan_save_alloc_info+0x40/0x58
[   21.130962]  __kasan_kmalloc+0xd4/0xd8
[   21.131006]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.131051]  kasan_atomics+0xb8/0x2e0
[   21.131179]  kunit_try_run_case+0x170/0x3f0
[   21.131218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.131263]  kthread+0x328/0x630
[   21.131295]  ret_from_fork+0x10/0x20
[   21.131333] 
[   21.131353] The buggy address belongs to the object at fff00000c78ca300
[   21.131353]  which belongs to the cache kmalloc-64 of size 64
[   21.131684] The buggy address is located 0 bytes to the right of
[   21.131684]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.131752] 
[   21.131774] The buggy address belongs to the physical page:
[   21.131806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.132226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.132301] page_type: f5(slab)
[   21.132358] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.132412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.132576] page dumped because: kasan: bad access detected
[   21.132611] 
[   21.132631] Memory state around the buggy address:
[   21.132666]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.132711]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.132789] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.132829]                                      ^
[   21.132865]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.132907]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.133197] ==================================================================
[   21.141117] ==================================================================
[   21.141175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   21.141226] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.141351] 
[   21.141385] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.141465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.141494] Hardware name: linux,dummy-virt (DT)
[   21.141525] Call trace:
[   21.141630]  show_stack+0x20/0x38 (C)
[   21.141750]  dump_stack_lvl+0x8c/0xd0
[   21.141802]  print_report+0x118/0x608
[   21.141866]  kasan_report+0xdc/0x128
[   21.141915]  __asan_report_load8_noabort+0x20/0x30
[   21.141974]  kasan_atomics_helper+0x3e20/0x4858
[   21.142025]  kasan_atomics+0x198/0x2e0
[   21.142071]  kunit_try_run_case+0x170/0x3f0
[   21.142119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.142183]  kthread+0x328/0x630
[   21.142234]  ret_from_fork+0x10/0x20
[   21.142483] 
[   21.142601] Allocated by task 265:
[   21.142692]  kasan_save_stack+0x3c/0x68
[   21.142733]  kasan_save_track+0x20/0x40
[   21.142930]  kasan_save_alloc_info+0x40/0x58
[   21.143137]  __kasan_kmalloc+0xd4/0xd8
[   21.143470]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.143512]  kasan_atomics+0xb8/0x2e0
[   21.143549]  kunit_try_run_case+0x170/0x3f0
[   21.143588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.143631]  kthread+0x328/0x630
[   21.143665]  ret_from_fork+0x10/0x20
[   21.143702] 
[   21.143722] The buggy address belongs to the object at fff00000c78ca300
[   21.143722]  which belongs to the cache kmalloc-64 of size 64
[   21.143779] The buggy address is located 0 bytes to the right of
[   21.143779]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.143982] 
[   21.144005] The buggy address belongs to the physical page:
[   21.144037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.144189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.144293] page_type: f5(slab)
[   21.144446] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.144499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.144561] page dumped because: kasan: bad access detected
[   21.144597] 
[   21.144617] Memory state around the buggy address:
[   21.144649]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.144700]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.144745] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.144785]                                      ^
[   21.144819]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.144898]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.144972] ==================================================================
[   20.984596] ==================================================================
[   20.984646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.985178] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   20.985233] 
[   20.985265] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.985345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.985373] Hardware name: linux,dummy-virt (DT)
[   20.986104] Call trace:
[   20.986142]  show_stack+0x20/0x38 (C)
[   20.986212]  dump_stack_lvl+0x8c/0xd0
[   20.986300]  print_report+0x118/0x608
[   20.986348]  kasan_report+0xdc/0x128
[   20.986402]  __asan_report_store8_noabort+0x20/0x30
[   20.986512]  kasan_atomics_helper+0x3e5c/0x4858
[   20.986565]  kasan_atomics+0x198/0x2e0
[   20.986658]  kunit_try_run_case+0x170/0x3f0
[   20.986705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.986758]  kthread+0x328/0x630
[   20.987114]  ret_from_fork+0x10/0x20
[   20.987269] 
[   20.987305] Allocated by task 265:
[   20.987449]  kasan_save_stack+0x3c/0x68
[   20.987553]  kasan_save_track+0x20/0x40
[   20.987942]  kasan_save_alloc_info+0x40/0x58
[   20.988137]  __kasan_kmalloc+0xd4/0xd8
[   20.988189]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.988231]  kasan_atomics+0xb8/0x2e0
[   20.988269]  kunit_try_run_case+0x170/0x3f0
[   20.988310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.988356]  kthread+0x328/0x630
[   20.988390]  ret_from_fork+0x10/0x20
[   20.988427] 
[   20.989024] The buggy address belongs to the object at fff00000c78ca300
[   20.989024]  which belongs to the cache kmalloc-64 of size 64
[   20.989138] The buggy address is located 0 bytes to the right of
[   20.989138]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.989214] 
[   20.989247] The buggy address belongs to the physical page:
[   20.989280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.989802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.989871] page_type: f5(slab)
[   20.989919] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.990159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.990207] page dumped because: kasan: bad access detected
[   20.990262] 
[   20.990282] Memory state around the buggy address:
[   20.990317]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.990571]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.990989] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.991263]                                      ^
[   20.991398]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.991746]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.992135] ==================================================================
[   21.045172] ==================================================================
[   21.045534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   21.045593] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.045650] 
[   21.045805] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.046224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.046289] Hardware name: linux,dummy-virt (DT)
[   21.046321] Call trace:
[   21.046346]  show_stack+0x20/0x38 (C)
[   21.046519]  dump_stack_lvl+0x8c/0xd0
[   21.046569]  print_report+0x118/0x608
[   21.046615]  kasan_report+0xdc/0x128
[   21.046662]  kasan_check_range+0x100/0x1a8
[   21.046710]  __kasan_check_write+0x20/0x30
[   21.046756]  kasan_atomics_helper+0x11f8/0x4858
[   21.046817]  kasan_atomics+0x198/0x2e0
[   21.046865]  kunit_try_run_case+0x170/0x3f0
[   21.047008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.047259]  kthread+0x328/0x630
[   21.047450]  ret_from_fork+0x10/0x20
[   21.047921] 
[   21.047946] Allocated by task 265:
[   21.047976]  kasan_save_stack+0x3c/0x68
[   21.048416]  kasan_save_track+0x20/0x40
[   21.048507]  kasan_save_alloc_info+0x40/0x58
[   21.048550]  __kasan_kmalloc+0xd4/0xd8
[   21.048587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.048742]  kasan_atomics+0xb8/0x2e0
[   21.048780]  kunit_try_run_case+0x170/0x3f0
[   21.048822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.048865]  kthread+0x328/0x630
[   21.048936]  ret_from_fork+0x10/0x20
[   21.048973] 
[   21.048998] The buggy address belongs to the object at fff00000c78ca300
[   21.048998]  which belongs to the cache kmalloc-64 of size 64
[   21.049074] The buggy address is located 0 bytes to the right of
[   21.049074]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.049140] 
[   21.049187] The buggy address belongs to the physical page:
[   21.049368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.049441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.049588] page_type: f5(slab)
[   21.049706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.049777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.049820] page dumped because: kasan: bad access detected
[   21.049853] 
[   21.049876] Memory state around the buggy address:
[   21.049977]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.050114]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.050168] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.050208]                                      ^
[   21.050243]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.050284]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.050323] ==================================================================
[   21.133530] ==================================================================
[   21.133579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   21.133628] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.133708] 
[   21.133740] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.133836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.133865] Hardware name: linux,dummy-virt (DT)
[   21.133897] Call trace:
[   21.133920]  show_stack+0x20/0x38 (C)
[   21.134007]  dump_stack_lvl+0x8c/0xd0
[   21.134134]  print_report+0x118/0x608
[   21.134195]  kasan_report+0xdc/0x128
[   21.134241]  __asan_report_load8_noabort+0x20/0x30
[   21.134290]  kasan_atomics_helper+0x3e10/0x4858
[   21.134338]  kasan_atomics+0x198/0x2e0
[   21.134385]  kunit_try_run_case+0x170/0x3f0
[   21.134440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.134712]  kthread+0x328/0x630
[   21.134929]  ret_from_fork+0x10/0x20
[   21.135099] 
[   21.135119] Allocated by task 265:
[   21.135220]  kasan_save_stack+0x3c/0x68
[   21.135443]  kasan_save_track+0x20/0x40
[   21.135640]  kasan_save_alloc_info+0x40/0x58
[   21.135852]  __kasan_kmalloc+0xd4/0xd8
[   21.135945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.135986]  kasan_atomics+0xb8/0x2e0
[   21.136022]  kunit_try_run_case+0x170/0x3f0
[   21.136062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.136107]  kthread+0x328/0x630
[   21.136140]  ret_from_fork+0x10/0x20
[   21.136184] 
[   21.136204] The buggy address belongs to the object at fff00000c78ca300
[   21.136204]  which belongs to the cache kmalloc-64 of size 64
[   21.136316] The buggy address is located 0 bytes to the right of
[   21.136316]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.136382] 
[   21.136405] The buggy address belongs to the physical page:
[   21.136479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.136537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.136586] page_type: f5(slab)
[   21.136623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.136674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.136717] page dumped because: kasan: bad access detected
[   21.136751] 
[   21.136770] Memory state around the buggy address:
[   21.136802]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.136847]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.136892] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.136931]                                      ^
[   21.136967]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.137011]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.137048] ==================================================================
[   21.076907] ==================================================================
[   21.077038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   21.077092] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.077376] 
[   21.077411] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.077491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.077519] Hardware name: linux,dummy-virt (DT)
[   21.077553] Call trace:
[   21.077577]  show_stack+0x20/0x38 (C)
[   21.077628]  dump_stack_lvl+0x8c/0xd0
[   21.077688]  print_report+0x118/0x608
[   21.077736]  kasan_report+0xdc/0x128
[   21.078008]  kasan_check_range+0x100/0x1a8
[   21.078210]  __kasan_check_write+0x20/0x30
[   21.078596]  kasan_atomics_helper+0x1414/0x4858
[   21.078962]  kasan_atomics+0x198/0x2e0
[   21.079020]  kunit_try_run_case+0x170/0x3f0
[   21.079238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.079298]  kthread+0x328/0x630
[   21.080756]  ret_from_fork+0x10/0x20
[   21.080900] 
[   21.080984] Allocated by task 265:
[   21.081079]  kasan_save_stack+0x3c/0x68
[   21.081231]  kasan_save_track+0x20/0x40
[   21.081272]  kasan_save_alloc_info+0x40/0x58
[   21.081336]  __kasan_kmalloc+0xd4/0xd8
[   21.081536]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.081601]  kasan_atomics+0xb8/0x2e0
[   21.081637]  kunit_try_run_case+0x170/0x3f0
[   21.081678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.081744]  kthread+0x328/0x630
[   21.081918]  ret_from_fork+0x10/0x20
[   21.082006] 
[   21.082029] The buggy address belongs to the object at fff00000c78ca300
[   21.082029]  which belongs to the cache kmalloc-64 of size 64
[   21.082268] The buggy address is located 0 bytes to the right of
[   21.082268]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.082333] 
[   21.082360] The buggy address belongs to the physical page:
[   21.082512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.082577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.082625] page_type: f5(slab)
[   21.082671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.082859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.082903] page dumped because: kasan: bad access detected
[   21.082936] 
[   21.082957] Memory state around the buggy address:
[   21.082995]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.083040]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.083084] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.083623]                                      ^
[   21.084091]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.084581]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.084698] ==================================================================
[   20.961749] ==================================================================
[   20.961811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.962035] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   20.962509] 
[   20.962794] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.962884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.962912] Hardware name: linux,dummy-virt (DT)
[   20.962944] Call trace:
[   20.962968]  show_stack+0x20/0x38 (C)
[   20.963035]  dump_stack_lvl+0x8c/0xd0
[   20.963082]  print_report+0x118/0x608
[   20.963498]  kasan_report+0xdc/0x128
[   20.963930]  kasan_check_range+0x100/0x1a8
[   20.964078]  __kasan_check_read+0x20/0x30
[   20.964133]  kasan_atomics_helper+0xdd4/0x4858
[   20.964418]  kasan_atomics+0x198/0x2e0
[   20.964646]  kunit_try_run_case+0x170/0x3f0
[   20.964700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.964837]  kthread+0x328/0x630
[   20.965137]  ret_from_fork+0x10/0x20
[   20.965707] 
[   20.965746] Allocated by task 265:
[   20.965784]  kasan_save_stack+0x3c/0x68
[   20.965858]  kasan_save_track+0x20/0x40
[   20.965966]  kasan_save_alloc_info+0x40/0x58
[   20.966060]  __kasan_kmalloc+0xd4/0xd8
[   20.966138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.966283]  kasan_atomics+0xb8/0x2e0
[   20.966353]  kunit_try_run_case+0x170/0x3f0
[   20.966393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.966480]  kthread+0x328/0x630
[   20.966604]  ret_from_fork+0x10/0x20
[   20.966687] 
[   20.966737] The buggy address belongs to the object at fff00000c78ca300
[   20.966737]  which belongs to the cache kmalloc-64 of size 64
[   20.966798] The buggy address is located 0 bytes to the right of
[   20.966798]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.966862] 
[   20.966924] The buggy address belongs to the physical page:
[   20.966956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.967083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.967571] page_type: f5(slab)
[   20.967619] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.968254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.968300] page dumped because: kasan: bad access detected
[   20.968395] 
[   20.968521] Memory state around the buggy address:
[   20.969009]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.969169]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.969266] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.969392]                                      ^
[   20.969428]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.969693]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.969791] ==================================================================
[   21.050981] ==================================================================
[   21.051033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   21.051082] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.051132] 
[   21.051176] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.051263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.051290] Hardware name: linux,dummy-virt (DT)
[   21.051323] Call trace:
[   21.051362]  show_stack+0x20/0x38 (C)
[   21.051412]  dump_stack_lvl+0x8c/0xd0
[   21.051486]  print_report+0x118/0x608
[   21.051532]  kasan_report+0xdc/0x128
[   21.051913]  kasan_check_range+0x100/0x1a8
[   21.052361]  __kasan_check_write+0x20/0x30
[   21.052435]  kasan_atomics_helper+0x126c/0x4858
[   21.052484]  kasan_atomics+0x198/0x2e0
[   21.052635]  kunit_try_run_case+0x170/0x3f0
[   21.052763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.052841]  kthread+0x328/0x630
[   21.052884]  ret_from_fork+0x10/0x20
[   21.052943] 
[   21.052964] Allocated by task 265:
[   21.052993]  kasan_save_stack+0x3c/0x68
[   21.053200]  kasan_save_track+0x20/0x40
[   21.053589]  kasan_save_alloc_info+0x40/0x58
[   21.053658]  __kasan_kmalloc+0xd4/0xd8
[   21.053697]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.053739]  kasan_atomics+0xb8/0x2e0
[   21.053775]  kunit_try_run_case+0x170/0x3f0
[   21.053816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.053859]  kthread+0x328/0x630
[   21.053940]  ret_from_fork+0x10/0x20
[   21.053977] 
[   21.054000] The buggy address belongs to the object at fff00000c78ca300
[   21.054000]  which belongs to the cache kmalloc-64 of size 64
[   21.054060] The buggy address is located 0 bytes to the right of
[   21.054060]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.054407] 
[   21.054431] The buggy address belongs to the physical page:
[   21.054463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.054590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.054669] page_type: f5(slab)
[   21.054777] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.054838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.054880] page dumped because: kasan: bad access detected
[   21.054933] 
[   21.054971] Memory state around the buggy address:
[   21.055010]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.055138]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.055516] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.055841]                                      ^
[   21.055992]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.056274]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.056319] ==================================================================
[   20.946417] ==================================================================
[   20.946622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.946674] Write of size 4 at addr fff00000c78ca330 by task kunit_try_catch/265
[   20.947195] 
[   20.947326] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.947613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.947650] Hardware name: linux,dummy-virt (DT)
[   20.947707] Call trace:
[   20.947732]  show_stack+0x20/0x38 (C)
[   20.947783]  dump_stack_lvl+0x8c/0xd0
[   20.948007]  print_report+0x118/0x608
[   20.948055]  kasan_report+0xdc/0x128
[   20.948233]  kasan_check_range+0x100/0x1a8
[   20.948320]  __kasan_check_write+0x20/0x30
[   20.948370]  kasan_atomics_helper+0xd3c/0x4858
[   20.948750]  kasan_atomics+0x198/0x2e0
[   20.948812]  kunit_try_run_case+0x170/0x3f0
[   20.948863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.948918]  kthread+0x328/0x630
[   20.949202]  ret_from_fork+0x10/0x20
[   20.949253] 
[   20.949274] Allocated by task 265:
[   20.949468]  kasan_save_stack+0x3c/0x68
[   20.949644]  kasan_save_track+0x20/0x40
[   20.949702]  kasan_save_alloc_info+0x40/0x58
[   20.949746]  __kasan_kmalloc+0xd4/0xd8
[   20.949797]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.949838]  kasan_atomics+0xb8/0x2e0
[   20.950073]  kunit_try_run_case+0x170/0x3f0
[   20.950118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.950174]  kthread+0x328/0x630
[   20.950224]  ret_from_fork+0x10/0x20
[   20.950262] 
[   20.950463] The buggy address belongs to the object at fff00000c78ca300
[   20.950463]  which belongs to the cache kmalloc-64 of size 64
[   20.950984] The buggy address is located 0 bytes to the right of
[   20.950984]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.951095] 
[   20.951118] The buggy address belongs to the physical page:
[   20.951161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.951217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.951903] page_type: f5(slab)
[   20.951976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.952026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.952067] page dumped because: kasan: bad access detected
[   20.952100] 
[   20.952189] Memory state around the buggy address:
[   20.952227]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.952528]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.952606] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.952645]                                      ^
[   20.952681]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.952892]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.952932] ==================================================================
[   20.953921] ==================================================================
[   20.954055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.954130] Read of size 4 at addr fff00000c78ca330 by task kunit_try_catch/265
[   20.954193] 
[   20.954225] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.954776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.954807] Hardware name: linux,dummy-virt (DT)
[   20.955182] Call trace:
[   20.955247]  show_stack+0x20/0x38 (C)
[   20.955572]  dump_stack_lvl+0x8c/0xd0
[   20.955902]  print_report+0x118/0x608
[   20.955984]  kasan_report+0xdc/0x128
[   20.956033]  __asan_report_load4_noabort+0x20/0x30
[   20.956107]  kasan_atomics_helper+0x3e04/0x4858
[   20.956223]  kasan_atomics+0x198/0x2e0
[   20.956425]  kunit_try_run_case+0x170/0x3f0
[   20.956474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.956528]  kthread+0x328/0x630
[   20.956570]  ret_from_fork+0x10/0x20
[   20.957473] 
[   20.957597] Allocated by task 265:
[   20.957869]  kasan_save_stack+0x3c/0x68
[   20.957918]  kasan_save_track+0x20/0x40
[   20.958172]  kasan_save_alloc_info+0x40/0x58
[   20.958400]  __kasan_kmalloc+0xd4/0xd8
[   20.958498]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.958573]  kasan_atomics+0xb8/0x2e0
[   20.958611]  kunit_try_run_case+0x170/0x3f0
[   20.958650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.958696]  kthread+0x328/0x630
[   20.958767]  ret_from_fork+0x10/0x20
[   20.958823] 
[   20.958899] The buggy address belongs to the object at fff00000c78ca300
[   20.958899]  which belongs to the cache kmalloc-64 of size 64
[   20.958966] The buggy address is located 0 bytes to the right of
[   20.958966]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.959239] 
[   20.959282] The buggy address belongs to the physical page:
[   20.959398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.959452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.959501] page_type: f5(slab)
[   20.959547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.959713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.959753] page dumped because: kasan: bad access detected
[   20.959918] 
[   20.959939] Memory state around the buggy address:
[   20.959972]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.960018]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.960061] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.960102]                                      ^
[   20.960136]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.960359]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.961212] ==================================================================
[   20.888756] ==================================================================
[   20.888811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.889211] Write of size 4 at addr fff00000c78ca330 by task kunit_try_catch/265
[   20.889510] 
[   20.889544] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.889638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.889667] Hardware name: linux,dummy-virt (DT)
[   20.891363]  kunit_try_run_case+0x170/0x3f0
[   20.892661]  kasan_save_alloc_info+0x40/0x58
[   20.892705]  __kasan_kmalloc+0xd4/0xd8
[   20.893028]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.893197]  kasan_atomics+0xb8/0x2e0
[   20.893236]  kunit_try_run_case+0x170/0x3f0
[   20.893601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.893777]  kthread+0x328/0x630
[   20.893811]  ret_from_fork+0x10/0x20
[   20.894060] 
[   20.894290] The buggy address belongs to the object at fff00000c78ca300
[   20.894290]  which belongs to the cache kmalloc-64 of size 64
[   20.895438] page dumped because: kasan: bad access detected
[   20.896165]                                      ^
[   20.898339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.900006]  __kasan_check_write+0x20/0x30
[   20.901052]  kasan_save_track+0x20/0x40
[   20.901405]  __kasan_kmalloc+0xd4/0xd8
[   20.901540]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.901621]  kasan_atomics+0xb8/0x2e0
[   20.901670]  kunit_try_run_case+0x170/0x3f0
[   20.901806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.901852]  kthread+0x328/0x630
[   20.901926]  ret_from_fork+0x10/0x20
[   20.902113] 
[   20.902417] The buggy address belongs to the object at fff00000c78ca300
[   20.902417]  which belongs to the cache kmalloc-64 of size 64
[   20.902485] The buggy address is located 0 bytes to the right of
[   20.902485]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.902549] 
[   20.902865] The buggy address belongs to the physical page:
[   20.902985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.903043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.903113] page_type: f5(slab)
[   20.903168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.903249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.903290] page dumped because: kasan: bad access detected
[   20.903323] 
[   20.903342] Memory state around the buggy address:
[   20.904006]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.904771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   20.906003]  __asan_report_load4_noabort+0x20/0x30
[   20.906415]  kasan_save_stack+0x3c/0x68
[   20.907189]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.908245] The buggy address is located 0 bytes to the right of
[   20.908245]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.909330]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.909839]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.911343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.913367]  show_stack+0x20/0x38 (C)
[   20.914879]  __kasan_kmalloc+0xd4/0xd8
[   20.914960]  kasan_atomics+0xb8/0x2e0
[   20.915002]  kunit_try_run_case+0x170/0x3f0
[   20.915241] The buggy address belongs to the object at fff00000c78ca300
[   20.915241]  which belongs to the cache kmalloc-64 of size 64
[   20.917115] page dumped because: kasan: bad access detected
[   20.917306] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.918075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.919595]  kasan_save_alloc_info+0x40/0x58
[   20.919973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.920865] ==================================================================
[   21.137308] ==================================================================
[   21.137375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   21.137431] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.137595] 
[   21.137625] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.137707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.137735] Hardware name: linux,dummy-virt (DT)
[   21.137765] Call trace:
[   21.137788]  show_stack+0x20/0x38 (C)
[   21.137837]  dump_stack_lvl+0x8c/0xd0
[   21.137884]  print_report+0x118/0x608
[   21.137942]  kasan_report+0xdc/0x128
[   21.137989]  kasan_check_range+0x100/0x1a8
[   21.138037]  __kasan_check_write+0x20/0x30
[   21.138113]  kasan_atomics_helper+0x175c/0x4858
[   21.138173]  kasan_atomics+0x198/0x2e0
[   21.138220]  kunit_try_run_case+0x170/0x3f0
[   21.138290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.138344]  kthread+0x328/0x630
[   21.138522]  ret_from_fork+0x10/0x20
[   21.138788] 
[   21.138923] Allocated by task 265:
[   21.138951]  kasan_save_stack+0x3c/0x68
[   21.139000]  kasan_save_track+0x20/0x40
[   21.139160]  kasan_save_alloc_info+0x40/0x58
[   21.139203]  __kasan_kmalloc+0xd4/0xd8
[   21.139240]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.139302]  kasan_atomics+0xb8/0x2e0
[   21.139351]  kunit_try_run_case+0x170/0x3f0
[   21.139392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.139440]  kthread+0x328/0x630
[   21.139473]  ret_from_fork+0x10/0x20
[   21.139596] 
[   21.139624] The buggy address belongs to the object at fff00000c78ca300
[   21.139624]  which belongs to the cache kmalloc-64 of size 64
[   21.140010] The buggy address is located 0 bytes to the right of
[   21.140010]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.140107] 
[   21.140130] The buggy address belongs to the physical page:
[   21.140171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.140223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.140273] page_type: f5(slab)
[   21.140310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.140361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.140403] page dumped because: kasan: bad access detected
[   21.140437] 
[   21.140457] Memory state around the buggy address:
[   21.140495]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.140540]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.140586] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.140661]                                      ^
[   21.140702]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.140748]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.140817] ==================================================================
[   21.038178] ==================================================================
[   21.038228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   21.038680] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.039056] 
[   21.039231] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.039495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.039600] Hardware name: linux,dummy-virt (DT)
[   21.039633] Call trace:
[   21.039657]  show_stack+0x20/0x38 (C)
[   21.039712]  dump_stack_lvl+0x8c/0xd0
[   21.039761]  print_report+0x118/0x608
[   21.039808]  kasan_report+0xdc/0x128
[   21.039853]  kasan_check_range+0x100/0x1a8
[   21.039963]  __kasan_check_write+0x20/0x30
[   21.040202]  kasan_atomics_helper+0x1190/0x4858
[   21.040263]  kasan_atomics+0x198/0x2e0
[   21.040309]  kunit_try_run_case+0x170/0x3f0
[   21.040470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.040627]  kthread+0x328/0x630
[   21.040792]  ret_from_fork+0x10/0x20
[   21.041045] 
[   21.041168] Allocated by task 265:
[   21.041330]  kasan_save_stack+0x3c/0x68
[   21.041414]  kasan_save_track+0x20/0x40
[   21.041467]  kasan_save_alloc_info+0x40/0x58
[   21.041507]  __kasan_kmalloc+0xd4/0xd8
[   21.041548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.041627]  kasan_atomics+0xb8/0x2e0
[   21.041780]  kunit_try_run_case+0x170/0x3f0
[   21.041827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.042013]  kthread+0x328/0x630
[   21.042046]  ret_from_fork+0x10/0x20
[   21.042118] 
[   21.042370] The buggy address belongs to the object at fff00000c78ca300
[   21.042370]  which belongs to the cache kmalloc-64 of size 64
[   21.042438] The buggy address is located 0 bytes to the right of
[   21.042438]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.042503] 
[   21.042526] The buggy address belongs to the physical page:
[   21.042557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.042610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.043148] page_type: f5(slab)
[   21.043354] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.043408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.044328] page dumped because: kasan: bad access detected
[   21.044386] 
[   21.044408] Memory state around the buggy address:
[   21.044450]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.044520]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.044563] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.044621]                                      ^
[   21.044667]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.044844]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.044946] ==================================================================
[   21.026719] ==================================================================
[   21.026770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   21.026821] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.027259] 
[   21.027485] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.027613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.027643] Hardware name: linux,dummy-virt (DT)
[   21.027673] Call trace:
[   21.027697]  show_stack+0x20/0x38 (C)
[   21.027747]  dump_stack_lvl+0x8c/0xd0
[   21.027795]  print_report+0x118/0x608
[   21.027842]  kasan_report+0xdc/0x128
[   21.027938]  kasan_check_range+0x100/0x1a8
[   21.027987]  __kasan_check_write+0x20/0x30
[   21.028034]  kasan_atomics_helper+0x10c0/0x4858
[   21.028084]  kasan_atomics+0x198/0x2e0
[   21.028372]  kunit_try_run_case+0x170/0x3f0
[   21.028428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.028528]  kthread+0x328/0x630
[   21.028571]  ret_from_fork+0x10/0x20
[   21.028620] 
[   21.028641] Allocated by task 265:
[   21.028867]  kasan_save_stack+0x3c/0x68
[   21.029009]  kasan_save_track+0x20/0x40
[   21.029047]  kasan_save_alloc_info+0x40/0x58
[   21.029089]  __kasan_kmalloc+0xd4/0xd8
[   21.029126]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.029379]  kasan_atomics+0xb8/0x2e0
[   21.029494]  kunit_try_run_case+0x170/0x3f0
[   21.029534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.029580]  kthread+0x328/0x630
[   21.029615]  ret_from_fork+0x10/0x20
[   21.029653] 
[   21.029928] The buggy address belongs to the object at fff00000c78ca300
[   21.029928]  which belongs to the cache kmalloc-64 of size 64
[   21.030226] The buggy address is located 0 bytes to the right of
[   21.030226]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.030295] 
[   21.030316] The buggy address belongs to the physical page:
[   21.030453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.030540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.030697] page_type: f5(slab)
[   21.030742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.030893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.030935] page dumped because: kasan: bad access detected
[   21.031054] 
[   21.031128] Memory state around the buggy address:
[   21.031171]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.031216]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.031269] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.031310]                                      ^
[   21.031344]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.031390]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.031550] ==================================================================
[   21.092329] ==================================================================
[   21.092375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   21.092422] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.092719] 
[   21.092823] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.092907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.092936] Hardware name: linux,dummy-virt (DT)
[   21.092969] Call trace:
[   21.093000]  show_stack+0x20/0x38 (C)
[   21.093051]  dump_stack_lvl+0x8c/0xd0
[   21.093097]  print_report+0x118/0x608
[   21.093144]  kasan_report+0xdc/0x128
[   21.093200]  kasan_check_range+0x100/0x1a8
[   21.093257]  __kasan_check_write+0x20/0x30
[   21.093479]  kasan_atomics_helper+0x14e4/0x4858
[   21.093724]  kasan_atomics+0x198/0x2e0
[   21.093949]  kunit_try_run_case+0x170/0x3f0
[   21.094026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.094665]  kthread+0x328/0x630
[   21.094730]  ret_from_fork+0x10/0x20
[   21.094996] 
[   21.095027] Allocated by task 265:
[   21.095058]  kasan_save_stack+0x3c/0x68
[   21.095101]  kasan_save_track+0x20/0x40
[   21.095161]  kasan_save_alloc_info+0x40/0x58
[   21.095305]  __kasan_kmalloc+0xd4/0xd8
[   21.095345]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.095384]  kasan_atomics+0xb8/0x2e0
[   21.095577]  kunit_try_run_case+0x170/0x3f0
[   21.095729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.095812]  kthread+0x328/0x630
[   21.095955]  ret_from_fork+0x10/0x20
[   21.095995] 
[   21.096018] The buggy address belongs to the object at fff00000c78ca300
[   21.096018]  which belongs to the cache kmalloc-64 of size 64
[   21.096406] The buggy address is located 0 bytes to the right of
[   21.096406]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.096474] 
[   21.096497] The buggy address belongs to the physical page:
[   21.096571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.096646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.096694] page_type: f5(slab)
[   21.096734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.096971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.097085] page dumped because: kasan: bad access detected
[   21.097137] 
[   21.097169] Memory state around the buggy address:
[   21.097203]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.097248]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.097320] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.097361]                                      ^
[   21.097660]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.097768]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.097921] ==================================================================
[   21.063654] ==================================================================
[   21.063709] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   21.063759] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.063809] 
[   21.063841] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.063976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.064339] Hardware name: linux,dummy-virt (DT)
[   21.064380] Call trace:
[   21.064429]  show_stack+0x20/0x38 (C)
[   21.064484]  dump_stack_lvl+0x8c/0xd0
[   21.064650]  print_report+0x118/0x608
[   21.064736]  kasan_report+0xdc/0x128
[   21.064819]  kasan_check_range+0x100/0x1a8
[   21.064874]  __kasan_check_write+0x20/0x30
[   21.064952]  kasan_atomics_helper+0x1384/0x4858
[   21.065001]  kasan_atomics+0x198/0x2e0
[   21.065076]  kunit_try_run_case+0x170/0x3f0
[   21.065326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.065382]  kthread+0x328/0x630
[   21.065446]  ret_from_fork+0x10/0x20
[   21.065545] 
[   21.065566] Allocated by task 265:
[   21.065693]  kasan_save_stack+0x3c/0x68
[   21.065869]  kasan_save_track+0x20/0x40
[   21.065928]  kasan_save_alloc_info+0x40/0x58
[   21.065970]  __kasan_kmalloc+0xd4/0xd8
[   21.066008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.066049]  kasan_atomics+0xb8/0x2e0
[   21.066085]  kunit_try_run_case+0x170/0x3f0
[   21.066128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.066564]  kthread+0x328/0x630
[   21.066610]  ret_from_fork+0x10/0x20
[   21.066648] 
[   21.066671] The buggy address belongs to the object at fff00000c78ca300
[   21.066671]  which belongs to the cache kmalloc-64 of size 64
[   21.067027] The buggy address is located 0 bytes to the right of
[   21.067027]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.068121] 
[   21.068391] The buggy address belongs to the physical page:
[   21.068431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.068513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.068565] page_type: f5(slab)
[   21.068605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.068692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.068735] page dumped because: kasan: bad access detected
[   21.068955] 
[   21.068988] Memory state around the buggy address:
[   21.069023]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.069133]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.069431] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.069548]                                      ^
[   21.069583]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.069710]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.069875] ==================================================================
[   21.011407] ==================================================================
[   21.011658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.011827] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.011929] 
[   21.011963] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.012044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.012072] Hardware name: linux,dummy-virt (DT)
[   21.012104] Call trace:
[   21.012127]  show_stack+0x20/0x38 (C)
[   21.012829]  dump_stack_lvl+0x8c/0xd0
[   21.012893]  print_report+0x118/0x608
[   21.013007]  kasan_report+0xdc/0x128
[   21.013116]  kasan_check_range+0x100/0x1a8
[   21.013177]  __kasan_check_write+0x20/0x30
[   21.013318]  kasan_atomics_helper+0xff0/0x4858
[   21.013403]  kasan_atomics+0x198/0x2e0
[   21.013448]  kunit_try_run_case+0x170/0x3f0
[   21.013538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.013612]  kthread+0x328/0x630
[   21.013758]  ret_from_fork+0x10/0x20
[   21.014180] 
[   21.014232] Allocated by task 265:
[   21.014340]  kasan_save_stack+0x3c/0x68
[   21.014388]  kasan_save_track+0x20/0x40
[   21.014447]  kasan_save_alloc_info+0x40/0x58
[   21.014554]  __kasan_kmalloc+0xd4/0xd8
[   21.014596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.014851]  kasan_atomics+0xb8/0x2e0
[   21.014963]  kunit_try_run_case+0x170/0x3f0
[   21.015286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.015505]  kthread+0x328/0x630
[   21.015629]  ret_from_fork+0x10/0x20
[   21.015670] 
[   21.015693] The buggy address belongs to the object at fff00000c78ca300
[   21.015693]  which belongs to the cache kmalloc-64 of size 64
[   21.016078] The buggy address is located 0 bytes to the right of
[   21.016078]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.016164] 
[   21.016187] The buggy address belongs to the physical page:
[   21.016232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.016286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.017512] page_type: f5(slab)
[   21.017631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.017807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.017878] page dumped because: kasan: bad access detected
[   21.017911] 
[   21.017932] Memory state around the buggy address:
[   21.017966]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.018362]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.018448] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.018622]                                      ^
[   21.018830]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.018902]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.018944] ==================================================================
[   21.111107] ==================================================================
[   21.111341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   21.111683] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.111762] 
[   21.111792] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.112280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.112313] Hardware name: linux,dummy-virt (DT)
[   21.112348] Call trace:
[   21.112371]  show_stack+0x20/0x38 (C)
[   21.112450]  dump_stack_lvl+0x8c/0xd0
[   21.112497]  print_report+0x118/0x608
[   21.112545]  kasan_report+0xdc/0x128
[   21.112630]  __asan_report_load8_noabort+0x20/0x30
[   21.112680]  kasan_atomics_helper+0x3db0/0x4858
[   21.112966]  kasan_atomics+0x198/0x2e0
[   21.113115]  kunit_try_run_case+0x170/0x3f0
[   21.113175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.113230]  kthread+0x328/0x630
[   21.113519]  ret_from_fork+0x10/0x20
[   21.113604] 
[   21.113637] Allocated by task 265:
[   21.113666]  kasan_save_stack+0x3c/0x68
[   21.113806]  kasan_save_track+0x20/0x40
[   21.113864]  kasan_save_alloc_info+0x40/0x58
[   21.113929]  __kasan_kmalloc+0xd4/0xd8
[   21.113966]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.114068]  kasan_atomics+0xb8/0x2e0
[   21.114104]  kunit_try_run_case+0x170/0x3f0
[   21.114146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.114201]  kthread+0x328/0x630
[   21.114236]  ret_from_fork+0x10/0x20
[   21.114343] 
[   21.114393] The buggy address belongs to the object at fff00000c78ca300
[   21.114393]  which belongs to the cache kmalloc-64 of size 64
[   21.114501] The buggy address is located 0 bytes to the right of
[   21.114501]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.114614] 
[   21.114690] The buggy address belongs to the physical page:
[   21.114721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.114831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.114981] page_type: f5(slab)
[   21.115058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.115195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.115237] page dumped because: kasan: bad access detected
[   21.115269] 
[   21.115433] Memory state around the buggy address:
[   21.115634]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.115686]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.115731] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.115772]                                      ^
[   21.115807]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.115849]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.115898] ==================================================================
[   21.020486] ==================================================================
[   21.021032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.021085] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.021135] 
[   21.021177] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.021265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.021294] Hardware name: linux,dummy-virt (DT)
[   21.021326] Call trace:
[   21.021350]  show_stack+0x20/0x38 (C)
[   21.021498]  dump_stack_lvl+0x8c/0xd0
[   21.021726]  print_report+0x118/0x608
[   21.021976]  kasan_report+0xdc/0x128
[   21.022172]  kasan_check_range+0x100/0x1a8
[   21.022222]  __kasan_check_write+0x20/0x30
[   21.022267]  kasan_atomics_helper+0x1058/0x4858
[   21.022316]  kasan_atomics+0x198/0x2e0
[   21.022660]  kunit_try_run_case+0x170/0x3f0
[   21.022714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.022768]  kthread+0x328/0x630
[   21.022812]  ret_from_fork+0x10/0x20
[   21.022861] 
[   21.022892] Allocated by task 265:
[   21.022922]  kasan_save_stack+0x3c/0x68
[   21.022964]  kasan_save_track+0x20/0x40
[   21.023346]  kasan_save_alloc_info+0x40/0x58
[   21.023405]  __kasan_kmalloc+0xd4/0xd8
[   21.023574]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.023682]  kasan_atomics+0xb8/0x2e0
[   21.023719]  kunit_try_run_case+0x170/0x3f0
[   21.023836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.023929]  kthread+0x328/0x630
[   21.023964]  ret_from_fork+0x10/0x20
[   21.024004] 
[   21.024211] The buggy address belongs to the object at fff00000c78ca300
[   21.024211]  which belongs to the cache kmalloc-64 of size 64
[   21.024409] The buggy address is located 0 bytes to the right of
[   21.024409]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.024480] 
[   21.024515] The buggy address belongs to the physical page:
[   21.024649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.024870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.024957] page_type: f5(slab)
[   21.024999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.025126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.025206] page dumped because: kasan: bad access detected
[   21.025352] 
[   21.025408] Memory state around the buggy address:
[   21.025441]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.025487]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.025594] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.025647]                                      ^
[   21.025681]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.025838]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.026009] ==================================================================
[   20.858749] ==================================================================
[   20.858800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.858851] Read of size 4 at addr fff00000c78ca330 by task kunit_try_catch/265
[   20.858901] 
[   20.858931] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.859019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.859048] Hardware name: linux,dummy-virt (DT)
[   20.859081] Call trace:
[   20.859103]  show_stack+0x20/0x38 (C)
[   20.859165]  dump_stack_lvl+0x8c/0xd0
[   20.859211]  print_report+0x118/0x608
[   20.859655]  kasan_report+0xdc/0x128
[   20.860125]  __asan_report_load4_noabort+0x20/0x30
[   20.860191]  kasan_atomics_helper+0x42d8/0x4858
[   20.860313]  kunit_try_run_case+0x170/0x3f0
[   20.861436]  __kasan_kmalloc+0xd4/0xd8
[   20.862170]  kthread+0x328/0x630
[   20.864307]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.866356]  kasan_report+0xdc/0x128
[   20.867008]  kasan_check_range+0x100/0x1a8
[   20.867334]  __kasan_check_write+0x20/0x30
[   20.867550]  kasan_atomics_helper+0x934/0x4858
[   20.867751]  kasan_atomics+0x198/0x2e0
[   20.868018]  kunit_try_run_case+0x170/0x3f0
[   20.868096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.868214]  kthread+0x328/0x630
[   20.868382]  ret_from_fork+0x10/0x20
[   20.868501] 
[   20.868550] Allocated by task 265:
[   20.868620]  kasan_save_stack+0x3c/0x68
[   20.868706]  kasan_save_track+0x20/0x40
[   20.868748]  kasan_save_alloc_info+0x40/0x58
[   20.868847]  __kasan_kmalloc+0xd4/0xd8
[   20.868885]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.868948]  kasan_atomics+0xb8/0x2e0
[   20.868987]  kunit_try_run_case+0x170/0x3f0
[   20.869024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.869068]  kthread+0x328/0x630
[   20.869370]  ret_from_fork+0x10/0x20
[   20.869489] 
[   20.869546] The buggy address belongs to the object at fff00000c78ca300
[   20.869546]  which belongs to the cache kmalloc-64 of size 64
[   20.869683] The buggy address is located 0 bytes to the right of
[   20.869683]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.869787] 
[   20.869808] The buggy address belongs to the physical page:
[   20.869841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.869897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.869948] page_type: f5(slab)
[   20.869998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.870051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.870261] page dumped because: kasan: bad access detected
[   20.870990]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.873473]  print_report+0x118/0x608
[   20.874595]  ret_from_fork+0x10/0x20
[   20.875671]  ret_from_fork+0x10/0x20
[   20.875967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.877475] ==================================================================
[   20.992716] ==================================================================
[   20.992768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.992819] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   20.993224] 
[   20.993316] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.993399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.993426] Hardware name: linux,dummy-virt (DT)
[   20.993467] Call trace:
[   20.993600]  show_stack+0x20/0x38 (C)
[   20.993859]  dump_stack_lvl+0x8c/0xd0
[   20.993919]  print_report+0x118/0x608
[   20.994002]  kasan_report+0xdc/0x128
[   20.994120]  kasan_check_range+0x100/0x1a8
[   20.994185]  __kasan_check_write+0x20/0x30
[   20.994339]  kasan_atomics_helper+0xeb8/0x4858
[   20.994426]  kasan_atomics+0x198/0x2e0
[   20.994550]  kunit_try_run_case+0x170/0x3f0
[   20.994597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.994650]  kthread+0x328/0x630
[   20.994691]  ret_from_fork+0x10/0x20
[   20.994740] 
[   20.994760] Allocated by task 265:
[   20.994788]  kasan_save_stack+0x3c/0x68
[   20.994832]  kasan_save_track+0x20/0x40
[   20.994870]  kasan_save_alloc_info+0x40/0x58
[   20.994910]  __kasan_kmalloc+0xd4/0xd8
[   20.994958]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.995071]  kasan_atomics+0xb8/0x2e0
[   20.995134]  kunit_try_run_case+0x170/0x3f0
[   20.995194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.995239]  kthread+0x328/0x630
[   20.995603]  ret_from_fork+0x10/0x20
[   20.995774] 
[   20.996479] The buggy address belongs to the object at fff00000c78ca300
[   20.996479]  which belongs to the cache kmalloc-64 of size 64
[   20.996881] The buggy address is located 0 bytes to the right of
[   20.996881]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.997533] 
[   20.997625] The buggy address belongs to the physical page:
[   20.997883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.998047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.998302] page_type: f5(slab)
[   20.998348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.998990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.999054] page dumped because: kasan: bad access detected
[   20.999108] 
[   20.999130] Memory state around the buggy address:
[   20.999175]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.999276]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.999574] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.999616]                                      ^
[   20.999654]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.000014]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.000056] ==================================================================
[   21.070205] ==================================================================
[   21.070256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   21.070654] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.070714] 
[   21.070751] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.071028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.071058] Hardware name: linux,dummy-virt (DT)
[   21.071091] Call trace:
[   21.071113]  show_stack+0x20/0x38 (C)
[   21.071181]  dump_stack_lvl+0x8c/0xd0
[   21.071407]  print_report+0x118/0x608
[   21.071457]  kasan_report+0xdc/0x128
[   21.071548]  __asan_report_load8_noabort+0x20/0x30
[   21.071659]  kasan_atomics_helper+0x3f04/0x4858
[   21.071707]  kasan_atomics+0x198/0x2e0
[   21.071760]  kunit_try_run_case+0x170/0x3f0
[   21.071969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.072025]  kthread+0x328/0x630
[   21.072137]  ret_from_fork+0x10/0x20
[   21.072200] 
[   21.072755] Allocated by task 265:
[   21.072798]  kasan_save_stack+0x3c/0x68
[   21.072947]  kasan_save_track+0x20/0x40
[   21.072993]  kasan_save_alloc_info+0x40/0x58
[   21.073166]  __kasan_kmalloc+0xd4/0xd8
[   21.073205]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.073355]  kasan_atomics+0xb8/0x2e0
[   21.073398]  kunit_try_run_case+0x170/0x3f0
[   21.073438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.073663]  kthread+0x328/0x630
[   21.073743]  ret_from_fork+0x10/0x20
[   21.073831] 
[   21.073854] The buggy address belongs to the object at fff00000c78ca300
[   21.073854]  which belongs to the cache kmalloc-64 of size 64
[   21.073930] The buggy address is located 0 bytes to the right of
[   21.073930]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.073995] 
[   21.074368] The buggy address belongs to the physical page:
[   21.074407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.074463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.074511] page_type: f5(slab)
[   21.074551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.074834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.074952] page dumped because: kasan: bad access detected
[   21.075218] 
[   21.075298] Memory state around the buggy address:
[   21.075335]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.075501]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.075547] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.075588]                                      ^
[   21.076070]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.076119]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.076169] ==================================================================
[   21.085571] ==================================================================
[   21.085921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   21.085982] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.086064] 
[   21.086207] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.086443] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.086512] Hardware name: linux,dummy-virt (DT)
[   21.086544] Call trace:
[   21.086567]  show_stack+0x20/0x38 (C)
[   21.086617]  dump_stack_lvl+0x8c/0xd0
[   21.086762]  print_report+0x118/0x608
[   21.087340]  kasan_report+0xdc/0x128
[   21.087480]  kasan_check_range+0x100/0x1a8
[   21.087534]  __kasan_check_write+0x20/0x30
[   21.087580]  kasan_atomics_helper+0x147c/0x4858
[   21.087649]  kasan_atomics+0x198/0x2e0
[   21.087756]  kunit_try_run_case+0x170/0x3f0
[   21.087802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.087856]  kthread+0x328/0x630
[   21.088441]  ret_from_fork+0x10/0x20
[   21.088763] 
[   21.088793] Allocated by task 265:
[   21.088878]  kasan_save_stack+0x3c/0x68
[   21.089001]  kasan_save_track+0x20/0x40
[   21.089043]  kasan_save_alloc_info+0x40/0x58
[   21.089085]  __kasan_kmalloc+0xd4/0xd8
[   21.089123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.089202]  kasan_atomics+0xb8/0x2e0
[   21.089242]  kunit_try_run_case+0x170/0x3f0
[   21.089303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.089348]  kthread+0x328/0x630
[   21.089381]  ret_from_fork+0x10/0x20
[   21.089418] 
[   21.089441] The buggy address belongs to the object at fff00000c78ca300
[   21.089441]  which belongs to the cache kmalloc-64 of size 64
[   21.089811] The buggy address is located 0 bytes to the right of
[   21.089811]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.090067] 
[   21.090170] The buggy address belongs to the physical page:
[   21.090220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.090323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.090390] page_type: f5(slab)
[   21.090430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.090482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.090524] page dumped because: kasan: bad access detected
[   21.090750] 
[   21.091101] Memory state around the buggy address:
[   21.091145]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.091211]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.091538] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.091647]                                      ^
[   21.092011]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.092081]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.092119] ==================================================================
[   21.116785] ==================================================================
[   21.116885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   21.116945] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.117013] 
[   21.117047] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.117127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.117332] Hardware name: linux,dummy-virt (DT)
[   21.117379] Call trace:
[   21.117538]  show_stack+0x20/0x38 (C)
[   21.117592]  dump_stack_lvl+0x8c/0xd0
[   21.117640]  print_report+0x118/0x608
[   21.117832]  kasan_report+0xdc/0x128
[   21.117898]  kasan_check_range+0x100/0x1a8
[   21.117946]  __kasan_check_write+0x20/0x30
[   21.118201]  kasan_atomics_helper+0x1644/0x4858
[   21.118282]  kasan_atomics+0x198/0x2e0
[   21.118608]  kunit_try_run_case+0x170/0x3f0
[   21.118700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.118842]  kthread+0x328/0x630
[   21.118890]  ret_from_fork+0x10/0x20
[   21.118939] 
[   21.119029] Allocated by task 265:
[   21.119246]  kasan_save_stack+0x3c/0x68
[   21.119334]  kasan_save_track+0x20/0x40
[   21.119446]  kasan_save_alloc_info+0x40/0x58
[   21.119488]  __kasan_kmalloc+0xd4/0xd8
[   21.119526]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.119568]  kasan_atomics+0xb8/0x2e0
[   21.119604]  kunit_try_run_case+0x170/0x3f0
[   21.119644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.119981]  kthread+0x328/0x630
[   21.120329]  ret_from_fork+0x10/0x20
[   21.120377] 
[   21.120401] The buggy address belongs to the object at fff00000c78ca300
[   21.120401]  which belongs to the cache kmalloc-64 of size 64
[   21.120461] The buggy address is located 0 bytes to the right of
[   21.120461]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.120555] 
[   21.120581] The buggy address belongs to the physical page:
[   21.120619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.120671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.120744] page_type: f5(slab)
[   21.120783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.120836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.120885] page dumped because: kasan: bad access detected
[   21.120919] 
[   21.120940] Memory state around the buggy address:
[   21.121232]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.121438]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.121485] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.121527]                                      ^
[   21.121563]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.121606]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.121646] ==================================================================
[   20.977198] ==================================================================
[   20.977333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.977386] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   20.977437] 
[   20.977478] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.977771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.977938] Hardware name: linux,dummy-virt (DT)
[   20.978172] Call trace:
[   20.978207]  show_stack+0x20/0x38 (C)
[   20.978260]  dump_stack_lvl+0x8c/0xd0
[   20.978307]  print_report+0x118/0x608
[   20.978354]  kasan_report+0xdc/0x128
[   20.978399]  kasan_check_range+0x100/0x1a8
[   20.978628]  __kasan_check_write+0x20/0x30
[   20.978901]  kasan_atomics_helper+0xe44/0x4858
[   20.979184]  kasan_atomics+0x198/0x2e0
[   20.979437]  kunit_try_run_case+0x170/0x3f0
[   20.979547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.979599]  kthread+0x328/0x630
[   20.980648]  ret_from_fork+0x10/0x20
[   20.980721] 
[   20.980743] Allocated by task 265:
[   20.981255]  kasan_save_stack+0x3c/0x68
[   20.981354]  kasan_save_track+0x20/0x40
[   20.981398]  kasan_save_alloc_info+0x40/0x58
[   20.981667]  __kasan_kmalloc+0xd4/0xd8
[   20.981809]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.981854]  kasan_atomics+0xb8/0x2e0
[   20.982340]  kunit_try_run_case+0x170/0x3f0
[   20.982408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.982454]  kthread+0x328/0x630
[   20.982487]  ret_from_fork+0x10/0x20
[   20.982525] 
[   20.982547] The buggy address belongs to the object at fff00000c78ca300
[   20.982547]  which belongs to the cache kmalloc-64 of size 64
[   20.982607] The buggy address is located 0 bytes to the right of
[   20.982607]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.982694] 
[   20.982807] The buggy address belongs to the physical page:
[   20.982874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.983022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.983099] page_type: f5(slab)
[   20.983140] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.983203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.983249] page dumped because: kasan: bad access detected
[   20.983283] 
[   20.983360] Memory state around the buggy address:
[   20.983541]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.983658]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.983704] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.983756]                                      ^
[   20.983791]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.983909]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.983953] ==================================================================
[   20.939931] ==================================================================
[   20.940614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.940858] Read of size 4 at addr fff00000c78ca330 by task kunit_try_catch/265
[   20.940918] 
[   20.940956] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.941105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.941133] Hardware name: linux,dummy-virt (DT)
[   20.941175] Call trace:
[   20.941197]  show_stack+0x20/0x38 (C)
[   20.941374]  dump_stack_lvl+0x8c/0xd0
[   20.941720]  print_report+0x118/0x608
[   20.941775]  kasan_report+0xdc/0x128
[   20.941821]  __asan_report_load4_noabort+0x20/0x30
[   20.941882]  kasan_atomics_helper+0x3dd8/0x4858
[   20.941932]  kasan_atomics+0x198/0x2e0
[   20.942416]  kunit_try_run_case+0x170/0x3f0
[   20.942602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.942657]  kthread+0x328/0x630
[   20.942903]  ret_from_fork+0x10/0x20
[   20.943061] 
[   20.943215] Allocated by task 265:
[   20.943248]  kasan_save_stack+0x3c/0x68
[   20.943432]  kasan_save_track+0x20/0x40
[   20.943478]  kasan_save_alloc_info+0x40/0x58
[   20.943527]  __kasan_kmalloc+0xd4/0xd8
[   20.943565]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.944043]  kasan_atomics+0xb8/0x2e0
[   20.944089]  kunit_try_run_case+0x170/0x3f0
[   20.944376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.944456]  kthread+0x328/0x630
[   20.944493]  ret_from_fork+0x10/0x20
[   20.944533] 
[   20.944554] The buggy address belongs to the object at fff00000c78ca300
[   20.944554]  which belongs to the cache kmalloc-64 of size 64
[   20.944614] The buggy address is located 0 bytes to the right of
[   20.944614]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.944681] 
[   20.944702] The buggy address belongs to the physical page:
[   20.944735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.944846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.944993] page_type: f5(slab)
[   20.945067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.945255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.945296] page dumped because: kasan: bad access detected
[   20.945329] 
[   20.945349] Memory state around the buggy address:
[   20.945381]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.945488]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.945682] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.945775]                                      ^
[   20.945809]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.945908]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.946055] ==================================================================
[   21.032620] ==================================================================
[   21.032672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   21.032724] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.032774] 
[   21.032814] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.032995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.033047] Hardware name: linux,dummy-virt (DT)
[   21.033082] Call trace:
[   21.033105]  show_stack+0x20/0x38 (C)
[   21.033262]  dump_stack_lvl+0x8c/0xd0
[   21.033322]  print_report+0x118/0x608
[   21.033877]  kasan_report+0xdc/0x128
[   21.034211]  kasan_check_range+0x100/0x1a8
[   21.034274]  __kasan_check_write+0x20/0x30
[   21.034416]  kasan_atomics_helper+0x1128/0x4858
[   21.034465]  kasan_atomics+0x198/0x2e0
[   21.034613]  kunit_try_run_case+0x170/0x3f0
[   21.034908]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.035017]  kthread+0x328/0x630
[   21.035061]  ret_from_fork+0x10/0x20
[   21.035107] 
[   21.035133] Allocated by task 265:
[   21.035186]  kasan_save_stack+0x3c/0x68
[   21.035229]  kasan_save_track+0x20/0x40
[   21.035358]  kasan_save_alloc_info+0x40/0x58
[   21.035522]  __kasan_kmalloc+0xd4/0xd8
[   21.035563]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.035604]  kasan_atomics+0xb8/0x2e0
[   21.035641]  kunit_try_run_case+0x170/0x3f0
[   21.035680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.036270]  kthread+0x328/0x630
[   21.036315]  ret_from_fork+0x10/0x20
[   21.036353] 
[   21.036375] The buggy address belongs to the object at fff00000c78ca300
[   21.036375]  which belongs to the cache kmalloc-64 of size 64
[   21.036434] The buggy address is located 0 bytes to the right of
[   21.036434]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.036527] 
[   21.036712] The buggy address belongs to the physical page:
[   21.036753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.036931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.036983] page_type: f5(slab)
[   21.037110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.037259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.037344] page dumped because: kasan: bad access detected
[   21.037406] 
[   21.037465] Memory state around the buggy address:
[   21.037500]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.037547]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.037615] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.037655]                                      ^
[   21.037735]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.037777]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.037864] ==================================================================
[   21.056864] ==================================================================
[   21.057104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   21.057167] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.057218] 
[   21.057249] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.057347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.057446] Hardware name: linux,dummy-virt (DT)
[   21.057478] Call trace:
[   21.057503]  show_stack+0x20/0x38 (C)
[   21.057716]  dump_stack_lvl+0x8c/0xd0
[   21.057895]  print_report+0x118/0x608
[   21.057988]  kasan_report+0xdc/0x128
[   21.058515]  kasan_check_range+0x100/0x1a8
[   21.058992]  __kasan_check_write+0x20/0x30
[   21.059058]  kasan_atomics_helper+0x12d8/0x4858
[   21.059108]  kasan_atomics+0x198/0x2e0
[   21.059166]  kunit_try_run_case+0x170/0x3f0
[   21.059223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.059277]  kthread+0x328/0x630
[   21.059450]  ret_from_fork+0x10/0x20
[   21.059547] 
[   21.059638] Allocated by task 265:
[   21.059666]  kasan_save_stack+0x3c/0x68
[   21.059709]  kasan_save_track+0x20/0x40
[   21.060293]  kasan_save_alloc_info+0x40/0x58
[   21.060343]  __kasan_kmalloc+0xd4/0xd8
[   21.060381]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.060440]  kasan_atomics+0xb8/0x2e0
[   21.060476]  kunit_try_run_case+0x170/0x3f0
[   21.060517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.060796]  kthread+0x328/0x630
[   21.060891]  ret_from_fork+0x10/0x20
[   21.060946] 
[   21.061052] The buggy address belongs to the object at fff00000c78ca300
[   21.061052]  which belongs to the cache kmalloc-64 of size 64
[   21.061130] The buggy address is located 0 bytes to the right of
[   21.061130]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.061296] 
[   21.061568] The buggy address belongs to the physical page:
[   21.061605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.061693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.061745] page_type: f5(slab)
[   21.061934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.062021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.062064] page dumped because: kasan: bad access detected
[   21.062163] 
[   21.062185] Memory state around the buggy address:
[   21.062219]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.062455]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.062504] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.062546]                                      ^
[   21.062581]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.062622]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.062671] ==================================================================
[   21.104620] ==================================================================
[   21.104670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   21.104764] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.104819] 
[   21.104848] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.105275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.105308] Hardware name: linux,dummy-virt (DT)
[   21.105409] Call trace:
[   21.105438]  show_stack+0x20/0x38 (C)
[   21.105490]  dump_stack_lvl+0x8c/0xd0
[   21.105538]  print_report+0x118/0x608
[   21.105627]  kasan_report+0xdc/0x128
[   21.105674]  kasan_check_range+0x100/0x1a8
[   21.106836]  __kasan_check_write+0x20/0x30
[   21.106901]  kasan_atomics_helper+0x15b4/0x4858
[   21.106954]  kasan_atomics+0x198/0x2e0
[   21.107009]  kunit_try_run_case+0x170/0x3f0
[   21.107056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.107110]  kthread+0x328/0x630
[   21.107167]  ret_from_fork+0x10/0x20
[   21.107575] 
[   21.107717] Allocated by task 265:
[   21.107921]  kasan_save_stack+0x3c/0x68
[   21.107968]  kasan_save_track+0x20/0x40
[   21.108009]  kasan_save_alloc_info+0x40/0x58
[   21.108050]  __kasan_kmalloc+0xd4/0xd8
[   21.108089]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.108459]  kasan_atomics+0xb8/0x2e0
[   21.108504]  kunit_try_run_case+0x170/0x3f0
[   21.108672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.108723]  kthread+0x328/0x630
[   21.108756]  ret_from_fork+0x10/0x20
[   21.108794] 
[   21.108881] The buggy address belongs to the object at fff00000c78ca300
[   21.108881]  which belongs to the cache kmalloc-64 of size 64
[   21.108943] The buggy address is located 0 bytes to the right of
[   21.108943]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.109080] 
[   21.109137] The buggy address belongs to the physical page:
[   21.109388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.109644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.109699] page_type: f5(slab)
[   21.109739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.109791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.109842] page dumped because: kasan: bad access detected
[   21.109876] 
[   21.109897] Memory state around the buggy address:
[   21.110196]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.110327]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.110374] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.110545]                                      ^
[   21.110581]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.110626]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.110918] ==================================================================
[   21.122075] ==================================================================
[   21.122122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   21.122311] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.122569] 
[   21.122762] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.122919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.122949] Hardware name: linux,dummy-virt (DT)
[   21.122993] Call trace:
[   21.123051]  show_stack+0x20/0x38 (C)
[   21.123104]  dump_stack_lvl+0x8c/0xd0
[   21.123162]  print_report+0x118/0x608
[   21.123452]  kasan_report+0xdc/0x128
[   21.123531]  __asan_report_load8_noabort+0x20/0x30
[   21.123587]  kasan_atomics_helper+0x3df4/0x4858
[   21.123842]  kasan_atomics+0x198/0x2e0
[   21.123936]  kunit_try_run_case+0x170/0x3f0
[   21.123989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.124043]  kthread+0x328/0x630
[   21.124205]  ret_from_fork+0x10/0x20
[   21.124347] 
[   21.124372] Allocated by task 265:
[   21.124403]  kasan_save_stack+0x3c/0x68
[   21.124446]  kasan_save_track+0x20/0x40
[   21.124485]  kasan_save_alloc_info+0x40/0x58
[   21.124525]  __kasan_kmalloc+0xd4/0xd8
[   21.124563]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.124602]  kasan_atomics+0xb8/0x2e0
[   21.124640]  kunit_try_run_case+0x170/0x3f0
[   21.124680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.124850]  kthread+0x328/0x630
[   21.124947]  ret_from_fork+0x10/0x20
[   21.125033] 
[   21.125068] The buggy address belongs to the object at fff00000c78ca300
[   21.125068]  which belongs to the cache kmalloc-64 of size 64
[   21.125127] The buggy address is located 0 bytes to the right of
[   21.125127]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.125204] 
[   21.125630] The buggy address belongs to the physical page:
[   21.126914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.127284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.127452] page_type: f5(slab)
[   21.127535] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.127777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.127832] page dumped because: kasan: bad access detected
[   21.127867] 
[   21.127916] Memory state around the buggy address:
[   21.127951]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.127997]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.128398] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.128452]                                      ^
[   21.128496]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.128539]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.128819] ==================================================================
[   21.008551] ==================================================================
[   21.008603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.008652] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.008703] 
[   21.008732] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.008814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.008841] Hardware name: linux,dummy-virt (DT)
[   21.008873] Call trace:
[   21.008895]  show_stack+0x20/0x38 (C)
[   21.008944]  dump_stack_lvl+0x8c/0xd0
[   21.008989]  print_report+0x118/0x608
[   21.009036]  kasan_report+0xdc/0x128
[   21.009081]  kasan_check_range+0x100/0x1a8
[   21.009131]  __kasan_check_write+0x20/0x30
[   21.009198]  kasan_atomics_helper+0xf88/0x4858
[   21.009248]  kasan_atomics+0x198/0x2e0
[   21.009295]  kunit_try_run_case+0x170/0x3f0
[   21.009342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.009395]  kthread+0x328/0x630
[   21.009438]  ret_from_fork+0x10/0x20
[   21.009487] 
[   21.009509] Allocated by task 265:
[   21.009537]  kasan_save_stack+0x3c/0x68
[   21.009586]  kasan_save_track+0x20/0x40
[   21.009625]  kasan_save_alloc_info+0x40/0x58
[   21.009667]  __kasan_kmalloc+0xd4/0xd8
[   21.009704]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.009743]  kasan_atomics+0xb8/0x2e0
[   21.009781]  kunit_try_run_case+0x170/0x3f0
[   21.009820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.009867]  kthread+0x328/0x630
[   21.009901]  ret_from_fork+0x10/0x20
[   21.009939] 
[   21.009959] The buggy address belongs to the object at fff00000c78ca300
[   21.009959]  which belongs to the cache kmalloc-64 of size 64
[   21.010017] The buggy address is located 0 bytes to the right of
[   21.010017]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.010080] 
[   21.010101] The buggy address belongs to the physical page:
[   21.010133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.010542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.010595] page_type: f5(slab)
[   21.010635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.010688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.010731] page dumped because: kasan: bad access detected
[   21.010792] 
[   21.010913] Memory state around the buggy address:
[   21.011030]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.011075]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.011118] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.011168]                                      ^
[   21.011201]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.011246]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.011286] ==================================================================
[   21.000905] ==================================================================
[   21.000975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.001025] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.001077] 
[   21.001111] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.001204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.001233] Hardware name: linux,dummy-virt (DT)
[   21.001265] Call trace:
[   21.001288]  show_stack+0x20/0x38 (C)
[   21.001336]  dump_stack_lvl+0x8c/0xd0
[   21.001383]  print_report+0x118/0x608
[   21.001442]  kasan_report+0xdc/0x128
[   21.001495]  kasan_check_range+0x100/0x1a8
[   21.001704]  __kasan_check_write+0x20/0x30
[   21.001753]  kasan_atomics_helper+0xf20/0x4858
[   21.002229]  kasan_atomics+0x198/0x2e0
[   21.002546]  kunit_try_run_case+0x170/0x3f0
[   21.002949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.003263]  kthread+0x328/0x630
[   21.003310]  ret_from_fork+0x10/0x20
[   21.003358] 
[   21.003381] Allocated by task 265:
[   21.003410]  kasan_save_stack+0x3c/0x68
[   21.003454]  kasan_save_track+0x20/0x40
[   21.003501]  kasan_save_alloc_info+0x40/0x58
[   21.003558]  __kasan_kmalloc+0xd4/0xd8
[   21.003748]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.003930]  kasan_atomics+0xb8/0x2e0
[   21.003972]  kunit_try_run_case+0x170/0x3f0
[   21.004012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.004553]  kthread+0x328/0x630
[   21.004837]  ret_from_fork+0x10/0x20
[   21.004879] 
[   21.005050] The buggy address belongs to the object at fff00000c78ca300
[   21.005050]  which belongs to the cache kmalloc-64 of size 64
[   21.005509] The buggy address is located 0 bytes to the right of
[   21.005509]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.005648] 
[   21.005673] The buggy address belongs to the physical page:
[   21.005706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.005772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.005821] page_type: f5(slab)
[   21.006246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.006499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.006542] page dumped because: kasan: bad access detected
[   21.006865] 
[   21.007120] Memory state around the buggy address:
[   21.007197]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.007274]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.007422] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.007513]                                      ^
[   21.007694]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.007865]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.007997] ==================================================================
[   20.970113] ==================================================================
[   20.970172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.970223] Read of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   20.970426] 
[   20.970717] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.970989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.971018] Hardware name: linux,dummy-virt (DT)
[   20.971051] Call trace:
[   20.971074]  show_stack+0x20/0x38 (C)
[   20.971129]  dump_stack_lvl+0x8c/0xd0
[   20.971188]  print_report+0x118/0x608
[   20.971238]  kasan_report+0xdc/0x128
[   20.971285]  __asan_report_load8_noabort+0x20/0x30
[   20.971342]  kasan_atomics_helper+0x3f58/0x4858
[   20.971390]  kasan_atomics+0x198/0x2e0
[   20.971437]  kunit_try_run_case+0x170/0x3f0
[   20.971564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.972099]  kthread+0x328/0x630
[   20.972145]  ret_from_fork+0x10/0x20
[   20.972208] 
[   20.972230] Allocated by task 265:
[   20.972284]  kasan_save_stack+0x3c/0x68
[   20.972328]  kasan_save_track+0x20/0x40
[   20.972493]  kasan_save_alloc_info+0x40/0x58
[   20.972699]  __kasan_kmalloc+0xd4/0xd8
[   20.972773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.972814]  kasan_atomics+0xb8/0x2e0
[   20.972851]  kunit_try_run_case+0x170/0x3f0
[   20.972924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.973003]  kthread+0x328/0x630
[   20.973069]  ret_from_fork+0x10/0x20
[   20.973118] 
[   20.973188] The buggy address belongs to the object at fff00000c78ca300
[   20.973188]  which belongs to the cache kmalloc-64 of size 64
[   20.973343] The buggy address is located 0 bytes to the right of
[   20.973343]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   20.973412] 
[   20.973443] The buggy address belongs to the physical page:
[   20.973584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   20.974278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.974330] page_type: f5(slab)
[   20.974368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.974420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.974463] page dumped because: kasan: bad access detected
[   20.974494] 
[   20.974513] Memory state around the buggy address:
[   20.975339]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.975388]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.975912] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.976370]                                      ^
[   20.976526]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.976631]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.976745] ==================================================================
[   21.145400] ==================================================================
[   21.145447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   21.145497] Write of size 8 at addr fff00000c78ca330 by task kunit_try_catch/265
[   21.145549] 
[   21.145580] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.145662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.145689] Hardware name: linux,dummy-virt (DT)
[   21.145721] Call trace:
[   21.145744]  show_stack+0x20/0x38 (C)
[   21.145791]  dump_stack_lvl+0x8c/0xd0
[   21.145860]  print_report+0x118/0x608
[   21.146121]  kasan_report+0xdc/0x128
[   21.146363]  kasan_check_range+0x100/0x1a8
[   21.146522]  __kasan_check_write+0x20/0x30
[   21.146626]  kasan_atomics_helper+0x17ec/0x4858
[   21.146871]  kasan_atomics+0x198/0x2e0
[   21.147095]  kunit_try_run_case+0x170/0x3f0
[   21.147200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.147254]  kthread+0x328/0x630
[   21.147299]  ret_from_fork+0x10/0x20
[   21.147346] 
[   21.147367] Allocated by task 265:
[   21.147396]  kasan_save_stack+0x3c/0x68
[   21.147463]  kasan_save_track+0x20/0x40
[   21.147506]  kasan_save_alloc_info+0x40/0x58
[   21.147546]  __kasan_kmalloc+0xd4/0xd8
[   21.147585]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.147625]  kasan_atomics+0xb8/0x2e0
[   21.147662]  kunit_try_run_case+0x170/0x3f0
[   21.147702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.147745]  kthread+0x328/0x630
[   21.147780]  ret_from_fork+0x10/0x20
[   21.147851] 
[   21.147948] The buggy address belongs to the object at fff00000c78ca300
[   21.147948]  which belongs to the cache kmalloc-64 of size 64
[   21.148007] The buggy address is located 0 bytes to the right of
[   21.148007]  allocated 48-byte region [fff00000c78ca300, fff00000c78ca330)
[   21.148073] 
[   21.148106] The buggy address belongs to the physical page:
[   21.148187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ca
[   21.148241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.148289] page_type: f5(slab)
[   21.148328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.148379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.148469] page dumped because: kasan: bad access detected
[   21.148512] 
[   21.148531] Memory state around the buggy address:
[   21.148565]  fff00000c78ca200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.148609]  fff00000c78ca280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.148702] >fff00000c78ca300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.148795]                                      ^
[   21.148900]  fff00000c78ca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.149044]  fff00000c78ca400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.149173] ==================================================================

[   16.684351] ==================================================================
[   16.684727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   16.685597] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.686107] 
[   16.686278] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.686338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.686354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.686537] Call Trace:
[   16.686566]  <TASK>
[   16.686591]  dump_stack_lvl+0x73/0xb0
[   16.686633]  print_report+0xd1/0x650
[   16.686663]  ? __virt_addr_valid+0x1db/0x2d0
[   16.686692]  ? kasan_atomics_helper+0x992/0x5450
[   16.686719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.686747]  ? kasan_atomics_helper+0x992/0x5450
[   16.686773]  kasan_report+0x141/0x180
[   16.686815]  ? kasan_atomics_helper+0x992/0x5450
[   16.686848]  kasan_check_range+0x10c/0x1c0
[   16.686878]  __kasan_check_write+0x18/0x20
[   16.686901]  kasan_atomics_helper+0x992/0x5450
[   16.686929]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.686956]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.686986]  ? kasan_atomics+0x152/0x310
[   16.687018]  kasan_atomics+0x1dc/0x310
[   16.687045]  ? __pfx_kasan_atomics+0x10/0x10
[   16.687075]  ? __pfx_read_tsc+0x10/0x10
[   16.687116]  ? ktime_get_ts64+0x86/0x230
[   16.687148]  kunit_try_run_case+0x1a5/0x480
[   16.687180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.687208]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.687238]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.687267]  ? __kthread_parkme+0x82/0x180
[   16.687293]  ? preempt_count_sub+0x50/0x80
[   16.687323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.687351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.687379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.687407]  kthread+0x337/0x6f0
[   16.687431]  ? trace_preempt_on+0x20/0xc0
[   16.687461]  ? __pfx_kthread+0x10/0x10
[   16.687486]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.687512]  ? calculate_sigpending+0x7b/0xa0
[   16.687541]  ? __pfx_kthread+0x10/0x10
[   16.687568]  ret_from_fork+0x116/0x1d0
[   16.687591]  ? __pfx_kthread+0x10/0x10
[   16.687616]  ret_from_fork_asm+0x1a/0x30
[   16.687654]  </TASK>
[   16.687670] 
[   16.699047] Allocated by task 283:
[   16.699403]  kasan_save_stack+0x45/0x70
[   16.699589]  kasan_save_track+0x18/0x40
[   16.699940]  kasan_save_alloc_info+0x3b/0x50
[   16.700214]  __kasan_kmalloc+0xb7/0xc0
[   16.700429]  __kmalloc_cache_noprof+0x189/0x420
[   16.700651]  kasan_atomics+0x95/0x310
[   16.700872]  kunit_try_run_case+0x1a5/0x480
[   16.701099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.701690]  kthread+0x337/0x6f0
[   16.701898]  ret_from_fork+0x116/0x1d0
[   16.702280]  ret_from_fork_asm+0x1a/0x30
[   16.702517] 
[   16.702759] The buggy address belongs to the object at ffff88810392bb00
[   16.702759]  which belongs to the cache kmalloc-64 of size 64
[   16.703413] The buggy address is located 0 bytes to the right of
[   16.703413]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.704174] 
[   16.704486] The buggy address belongs to the physical page:
[   16.704859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.705353] flags: 0x200000000000000(node=0|zone=2)
[   16.705594] page_type: f5(slab)
[   16.705807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.706451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.706816] page dumped because: kasan: bad access detected
[   16.707194] 
[   16.707283] Memory state around the buggy address:
[   16.707530]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.708034]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.708511] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.708853]                                      ^
[   16.709086]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.709626]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.710094] ==================================================================
[   16.970483] ==================================================================
[   16.970881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   16.971330] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.971648] 
[   16.971753] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.971817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.971832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.971860] Call Trace:
[   16.971882]  <TASK>
[   16.971903]  dump_stack_lvl+0x73/0xb0
[   16.971936]  print_report+0xd1/0x650
[   16.971964]  ? __virt_addr_valid+0x1db/0x2d0
[   16.971992]  ? kasan_atomics_helper+0x1079/0x5450
[   16.972018]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.972044]  ? kasan_atomics_helper+0x1079/0x5450
[   16.972070]  kasan_report+0x141/0x180
[   16.972110]  ? kasan_atomics_helper+0x1079/0x5450
[   16.972143]  kasan_check_range+0x10c/0x1c0
[   16.972172]  __kasan_check_write+0x18/0x20
[   16.972195]  kasan_atomics_helper+0x1079/0x5450
[   16.972223]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.972249]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.972280]  ? kasan_atomics+0x152/0x310
[   16.972312]  kasan_atomics+0x1dc/0x310
[   16.972340]  ? __pfx_kasan_atomics+0x10/0x10
[   16.972370]  ? __pfx_read_tsc+0x10/0x10
[   16.972396]  ? ktime_get_ts64+0x86/0x230
[   16.972425]  kunit_try_run_case+0x1a5/0x480
[   16.972454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.972481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.972510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.972538]  ? __kthread_parkme+0x82/0x180
[   16.972564]  ? preempt_count_sub+0x50/0x80
[   16.972592]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.972620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.972649]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.972676]  kthread+0x337/0x6f0
[   16.972702]  ? trace_preempt_on+0x20/0xc0
[   16.972732]  ? __pfx_kthread+0x10/0x10
[   16.972757]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.972783]  ? calculate_sigpending+0x7b/0xa0
[   16.972826]  ? __pfx_kthread+0x10/0x10
[   16.972853]  ret_from_fork+0x116/0x1d0
[   16.972877]  ? __pfx_kthread+0x10/0x10
[   16.972903]  ret_from_fork_asm+0x1a/0x30
[   16.972939]  </TASK>
[   16.972954] 
[   16.981550] Allocated by task 283:
[   16.981755]  kasan_save_stack+0x45/0x70
[   16.981980]  kasan_save_track+0x18/0x40
[   16.982243]  kasan_save_alloc_info+0x3b/0x50
[   16.982450]  __kasan_kmalloc+0xb7/0xc0
[   16.982672]  __kmalloc_cache_noprof+0x189/0x420
[   16.982918]  kasan_atomics+0x95/0x310
[   16.983125]  kunit_try_run_case+0x1a5/0x480
[   16.983299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.983500]  kthread+0x337/0x6f0
[   16.983649]  ret_from_fork+0x116/0x1d0
[   16.983962]  ret_from_fork_asm+0x1a/0x30
[   16.984190] 
[   16.984349] The buggy address belongs to the object at ffff88810392bb00
[   16.984349]  which belongs to the cache kmalloc-64 of size 64
[   16.984910] The buggy address is located 0 bytes to the right of
[   16.984910]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.985601] 
[   16.985698] The buggy address belongs to the physical page:
[   16.985908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.986183] flags: 0x200000000000000(node=0|zone=2)
[   16.986372] page_type: f5(slab)
[   16.986512] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.986957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.987654] page dumped because: kasan: bad access detected
[   16.988053] 
[   16.988198] Memory state around the buggy address:
[   16.988384]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.988639]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.988903] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.989305]                                      ^
[   16.989577]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.989973]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.990696] ==================================================================
[   17.318540] ==================================================================
[   17.318876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   17.319527] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.319955] 
[   17.320117] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.320210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.320226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.320255] Call Trace:
[   17.320278]  <TASK>
[   17.320331]  dump_stack_lvl+0x73/0xb0
[   17.320368]  print_report+0xd1/0x650
[   17.320395]  ? __virt_addr_valid+0x1db/0x2d0
[   17.320423]  ? kasan_atomics_helper+0x164f/0x5450
[   17.320450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.320477]  ? kasan_atomics_helper+0x164f/0x5450
[   17.320538]  kasan_report+0x141/0x180
[   17.320565]  ? kasan_atomics_helper+0x164f/0x5450
[   17.320597]  kasan_check_range+0x10c/0x1c0
[   17.320625]  __kasan_check_write+0x18/0x20
[   17.320648]  kasan_atomics_helper+0x164f/0x5450
[   17.320676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.320703]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.320733]  ? kasan_atomics+0x152/0x310
[   17.320766]  kasan_atomics+0x1dc/0x310
[   17.320805]  ? __pfx_kasan_atomics+0x10/0x10
[   17.320835]  ? __pfx_read_tsc+0x10/0x10
[   17.320861]  ? ktime_get_ts64+0x86/0x230
[   17.320891]  kunit_try_run_case+0x1a5/0x480
[   17.320920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.320947]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.320977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.321005]  ? __kthread_parkme+0x82/0x180
[   17.321032]  ? preempt_count_sub+0x50/0x80
[   17.321062]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.321146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.321174]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.321203]  kthread+0x337/0x6f0
[   17.321228]  ? trace_preempt_on+0x20/0xc0
[   17.321257]  ? __pfx_kthread+0x10/0x10
[   17.321283]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.321309]  ? calculate_sigpending+0x7b/0xa0
[   17.321344]  ? __pfx_kthread+0x10/0x10
[   17.321371]  ret_from_fork+0x116/0x1d0
[   17.321394]  ? __pfx_kthread+0x10/0x10
[   17.321420]  ret_from_fork_asm+0x1a/0x30
[   17.321458]  </TASK>
[   17.321473] 
[   17.330800] Allocated by task 283:
[   17.331021]  kasan_save_stack+0x45/0x70
[   17.331324]  kasan_save_track+0x18/0x40
[   17.331558]  kasan_save_alloc_info+0x3b/0x50
[   17.331733]  __kasan_kmalloc+0xb7/0xc0
[   17.331902]  __kmalloc_cache_noprof+0x189/0x420
[   17.332268]  kasan_atomics+0x95/0x310
[   17.332563]  kunit_try_run_case+0x1a5/0x480
[   17.332857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.333228]  kthread+0x337/0x6f0
[   17.333428]  ret_from_fork+0x116/0x1d0
[   17.333591]  ret_from_fork_asm+0x1a/0x30
[   17.333878] 
[   17.334000] The buggy address belongs to the object at ffff88810392bb00
[   17.334000]  which belongs to the cache kmalloc-64 of size 64
[   17.334657] The buggy address is located 0 bytes to the right of
[   17.334657]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.335375] 
[   17.335497] The buggy address belongs to the physical page:
[   17.335811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.336288] flags: 0x200000000000000(node=0|zone=2)
[   17.336499] page_type: f5(slab)
[   17.336642] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.337053] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.337494] page dumped because: kasan: bad access detected
[   17.337804] 
[   17.337909] Memory state around the buggy address:
[   17.338255]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.338626]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.338997] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.339418]                                      ^
[   17.339680]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.340020]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.340385] ==================================================================
[   16.873199] ==================================================================
[   16.873667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   16.874067] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.874418] 
[   16.874567] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.874614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.874630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.874656] Call Trace:
[   16.874676]  <TASK>
[   16.874696]  dump_stack_lvl+0x73/0xb0
[   16.874731]  print_report+0xd1/0x650
[   16.874758]  ? __virt_addr_valid+0x1db/0x2d0
[   16.874786]  ? kasan_atomics_helper+0xe78/0x5450
[   16.874828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.874855]  ? kasan_atomics_helper+0xe78/0x5450
[   16.874881]  kasan_report+0x141/0x180
[   16.874908]  ? kasan_atomics_helper+0xe78/0x5450
[   16.874940]  kasan_check_range+0x10c/0x1c0
[   16.874970]  __kasan_check_write+0x18/0x20
[   16.874993]  kasan_atomics_helper+0xe78/0x5450
[   16.875023]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.875050]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.875080]  ? kasan_atomics+0x152/0x310
[   16.875125]  kasan_atomics+0x1dc/0x310
[   16.875152]  ? __pfx_kasan_atomics+0x10/0x10
[   16.875182]  ? __pfx_read_tsc+0x10/0x10
[   16.875207]  ? ktime_get_ts64+0x86/0x230
[   16.875236]  kunit_try_run_case+0x1a5/0x480
[   16.875265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.875291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.875321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.875349]  ? __kthread_parkme+0x82/0x180
[   16.875374]  ? preempt_count_sub+0x50/0x80
[   16.875402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.875430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.875459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.875486]  kthread+0x337/0x6f0
[   16.875510]  ? trace_preempt_on+0x20/0xc0
[   16.875539]  ? __pfx_kthread+0x10/0x10
[   16.875563]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.875588]  ? calculate_sigpending+0x7b/0xa0
[   16.875617]  ? __pfx_kthread+0x10/0x10
[   16.875643]  ret_from_fork+0x116/0x1d0
[   16.875665]  ? __pfx_kthread+0x10/0x10
[   16.875690]  ret_from_fork_asm+0x1a/0x30
[   16.875727]  </TASK>
[   16.875741] 
[   16.884115] Allocated by task 283:
[   16.884279]  kasan_save_stack+0x45/0x70
[   16.884449]  kasan_save_track+0x18/0x40
[   16.884619]  kasan_save_alloc_info+0x3b/0x50
[   16.884879]  __kasan_kmalloc+0xb7/0xc0
[   16.885104]  __kmalloc_cache_noprof+0x189/0x420
[   16.885372]  kasan_atomics+0x95/0x310
[   16.885594]  kunit_try_run_case+0x1a5/0x480
[   16.885843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.886360]  kthread+0x337/0x6f0
[   16.886516]  ret_from_fork+0x116/0x1d0
[   16.886715]  ret_from_fork_asm+0x1a/0x30
[   16.886893] 
[   16.886977] The buggy address belongs to the object at ffff88810392bb00
[   16.886977]  which belongs to the cache kmalloc-64 of size 64
[   16.887413] The buggy address is located 0 bytes to the right of
[   16.887413]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.888512] 
[   16.888628] The buggy address belongs to the physical page:
[   16.888905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.889287] flags: 0x200000000000000(node=0|zone=2)
[   16.889544] page_type: f5(slab)
[   16.889731] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.890080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.890470] page dumped because: kasan: bad access detected
[   16.890735] 
[   16.890838] Memory state around the buggy address:
[   16.891088]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.891408]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.891760] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.892107]                                      ^
[   16.892325]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.892579]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.892898] ==================================================================
[   16.852921] ==================================================================
[   16.853225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   16.853683] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.853984] 
[   16.854118] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.854170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.854189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.854218] Call Trace:
[   16.854238]  <TASK>
[   16.854260]  dump_stack_lvl+0x73/0xb0
[   16.854295]  print_report+0xd1/0x650
[   16.854323]  ? __virt_addr_valid+0x1db/0x2d0
[   16.854350]  ? kasan_atomics_helper+0xde0/0x5450
[   16.854376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.854402]  ? kasan_atomics_helper+0xde0/0x5450
[   16.854428]  kasan_report+0x141/0x180
[   16.854454]  ? kasan_atomics_helper+0xde0/0x5450
[   16.854485]  kasan_check_range+0x10c/0x1c0
[   16.854513]  __kasan_check_write+0x18/0x20
[   16.854536]  kasan_atomics_helper+0xde0/0x5450
[   16.854563]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.854589]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.854619]  ? kasan_atomics+0x152/0x310
[   16.854651]  kasan_atomics+0x1dc/0x310
[   16.854678]  ? __pfx_kasan_atomics+0x10/0x10
[   16.854708]  ? __pfx_read_tsc+0x10/0x10
[   16.854733]  ? ktime_get_ts64+0x86/0x230
[   16.854762]  kunit_try_run_case+0x1a5/0x480
[   16.854806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.854833]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.854863]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.854891]  ? __kthread_parkme+0x82/0x180
[   16.854916]  ? preempt_count_sub+0x50/0x80
[   16.854946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.854976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.855004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.855033]  kthread+0x337/0x6f0
[   16.855057]  ? trace_preempt_on+0x20/0xc0
[   16.855085]  ? __pfx_kthread+0x10/0x10
[   16.855111]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.855136]  ? calculate_sigpending+0x7b/0xa0
[   16.855166]  ? __pfx_kthread+0x10/0x10
[   16.855192]  ret_from_fork+0x116/0x1d0
[   16.855216]  ? __pfx_kthread+0x10/0x10
[   16.855241]  ret_from_fork_asm+0x1a/0x30
[   16.855278]  </TASK>
[   16.855294] 
[   16.863826] Allocated by task 283:
[   16.863999]  kasan_save_stack+0x45/0x70
[   16.864354]  kasan_save_track+0x18/0x40
[   16.864543]  kasan_save_alloc_info+0x3b/0x50
[   16.864732]  __kasan_kmalloc+0xb7/0xc0
[   16.864890]  __kmalloc_cache_noprof+0x189/0x420
[   16.865064]  kasan_atomics+0x95/0x310
[   16.865254]  kunit_try_run_case+0x1a5/0x480
[   16.865499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.865781]  kthread+0x337/0x6f0
[   16.866000]  ret_from_fork+0x116/0x1d0
[   16.866215]  ret_from_fork_asm+0x1a/0x30
[   16.866480] 
[   16.866560] The buggy address belongs to the object at ffff88810392bb00
[   16.866560]  which belongs to the cache kmalloc-64 of size 64
[   16.866960] The buggy address is located 0 bytes to the right of
[   16.866960]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.867972] 
[   16.868060] The buggy address belongs to the physical page:
[   16.868368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.868647] flags: 0x200000000000000(node=0|zone=2)
[   16.868854] page_type: f5(slab)
[   16.869049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.869730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.870115] page dumped because: kasan: bad access detected
[   16.870307] 
[   16.870387] Memory state around the buggy address:
[   16.870558]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.870898]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.871373] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.871626]                                      ^
[   16.871807]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.872274]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.872636] ==================================================================
[   16.425739] ==================================================================
[   16.426172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   16.426849] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.427587] 
[   16.427899] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.428129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.428359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.428402] Call Trace:
[   16.428425]  <TASK>
[   16.428448]  dump_stack_lvl+0x73/0xb0
[   16.428491]  print_report+0xd1/0x650
[   16.428519]  ? __virt_addr_valid+0x1db/0x2d0
[   16.428551]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.428579]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.428611]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.428641]  kasan_report+0x141/0x180
[   16.428671]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.428705]  __asan_report_load4_noabort+0x18/0x20
[   16.428738]  kasan_atomics_helper+0x4b54/0x5450
[   16.428769]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.428816]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.428851]  ? kasan_atomics+0x152/0x310
[   16.428885]  kasan_atomics+0x1dc/0x310
[   16.428914]  ? __pfx_kasan_atomics+0x10/0x10
[   16.428945]  ? __pfx_read_tsc+0x10/0x10
[   16.428973]  ? ktime_get_ts64+0x86/0x230
[   16.429004]  kunit_try_run_case+0x1a5/0x480
[   16.429035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.429066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.429098]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.429129]  ? __kthread_parkme+0x82/0x180
[   16.429157]  ? preempt_count_sub+0x50/0x80
[   16.429188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.429221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.429253]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.429287]  kthread+0x337/0x6f0
[   16.429311]  ? trace_preempt_on+0x20/0xc0
[   16.429349]  ? __pfx_kthread+0x10/0x10
[   16.429377]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.429407]  ? calculate_sigpending+0x7b/0xa0
[   16.429439]  ? __pfx_kthread+0x10/0x10
[   16.429467]  ret_from_fork+0x116/0x1d0
[   16.429492]  ? __pfx_kthread+0x10/0x10
[   16.429519]  ret_from_fork_asm+0x1a/0x30
[   16.429558]  </TASK>
[   16.429573] 
[   16.442243] Allocated by task 283:
[   16.442576]  kasan_save_stack+0x45/0x70
[   16.442971]  kasan_save_track+0x18/0x40
[   16.443401]  kasan_save_alloc_info+0x3b/0x50
[   16.443760]  __kasan_kmalloc+0xb7/0xc0
[   16.444031]  __kmalloc_cache_noprof+0x189/0x420
[   16.444554]  kasan_atomics+0x95/0x310
[   16.444812]  kunit_try_run_case+0x1a5/0x480
[   16.445253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.445561]  kthread+0x337/0x6f0
[   16.445753]  ret_from_fork+0x116/0x1d0
[   16.446233]  ret_from_fork_asm+0x1a/0x30
[   16.446504] 
[   16.446619] The buggy address belongs to the object at ffff88810392bb00
[   16.446619]  which belongs to the cache kmalloc-64 of size 64
[   16.447632] The buggy address is located 0 bytes to the right of
[   16.447632]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.448460] 
[   16.448564] The buggy address belongs to the physical page:
[   16.448878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.449648] flags: 0x200000000000000(node=0|zone=2)
[   16.450107] page_type: f5(slab)
[   16.450259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.450711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.451334] page dumped because: kasan: bad access detected
[   16.451661] 
[   16.451769] Memory state around the buggy address:
[   16.452006]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.452684]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.453180] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.453490]                                      ^
[   16.453765]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.454421]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.454742] ==================================================================
[   16.575523] ==================================================================
[   16.576039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   16.576477] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.576871] 
[   16.577099] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.577205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.577298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.577326] Call Trace:
[   16.577350]  <TASK>
[   16.577384]  dump_stack_lvl+0x73/0xb0
[   16.577421]  print_report+0xd1/0x650
[   16.577448]  ? __virt_addr_valid+0x1db/0x2d0
[   16.577477]  ? kasan_atomics_helper+0x72f/0x5450
[   16.577503]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.577581]  ? kasan_atomics_helper+0x72f/0x5450
[   16.577610]  kasan_report+0x141/0x180
[   16.577651]  ? kasan_atomics_helper+0x72f/0x5450
[   16.577725]  kasan_check_range+0x10c/0x1c0
[   16.577755]  __kasan_check_write+0x18/0x20
[   16.577801]  kasan_atomics_helper+0x72f/0x5450
[   16.577829]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.577856]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.577887]  ? kasan_atomics+0x152/0x310
[   16.577920]  kasan_atomics+0x1dc/0x310
[   16.577948]  ? __pfx_kasan_atomics+0x10/0x10
[   16.577978]  ? __pfx_read_tsc+0x10/0x10
[   16.578005]  ? ktime_get_ts64+0x86/0x230
[   16.578036]  kunit_try_run_case+0x1a5/0x480
[   16.578091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.578118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.578147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.578175]  ? __kthread_parkme+0x82/0x180
[   16.578200]  ? preempt_count_sub+0x50/0x80
[   16.578229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.578258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.578285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.578314]  kthread+0x337/0x6f0
[   16.578339]  ? trace_preempt_on+0x20/0xc0
[   16.578369]  ? __pfx_kthread+0x10/0x10
[   16.578394]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.578421]  ? calculate_sigpending+0x7b/0xa0
[   16.578449]  ? __pfx_kthread+0x10/0x10
[   16.578475]  ret_from_fork+0x116/0x1d0
[   16.578497]  ? __pfx_kthread+0x10/0x10
[   16.578524]  ret_from_fork_asm+0x1a/0x30
[   16.578561]  </TASK>
[   16.578576] 
[   16.588962] Allocated by task 283:
[   16.589272]  kasan_save_stack+0x45/0x70
[   16.589607]  kasan_save_track+0x18/0x40
[   16.589856]  kasan_save_alloc_info+0x3b/0x50
[   16.590258]  __kasan_kmalloc+0xb7/0xc0
[   16.590483]  __kmalloc_cache_noprof+0x189/0x420
[   16.590688]  kasan_atomics+0x95/0x310
[   16.591004]  kunit_try_run_case+0x1a5/0x480
[   16.591339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.591665]  kthread+0x337/0x6f0
[   16.591850]  ret_from_fork+0x116/0x1d0
[   16.592216]  ret_from_fork_asm+0x1a/0x30
[   16.592395] 
[   16.592576] The buggy address belongs to the object at ffff88810392bb00
[   16.592576]  which belongs to the cache kmalloc-64 of size 64
[   16.593345] The buggy address is located 0 bytes to the right of
[   16.593345]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.593978] 
[   16.594185] The buggy address belongs to the physical page:
[   16.594461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.594956] flags: 0x200000000000000(node=0|zone=2)
[   16.595253] page_type: f5(slab)
[   16.595465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.595986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.596463] page dumped because: kasan: bad access detected
[   16.596800] 
[   16.596908] Memory state around the buggy address:
[   16.597321]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.597690]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.598056] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.598448]                                      ^
[   16.598693]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.599036]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.599426] ==================================================================
[   16.923405] ==================================================================
[   16.923776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   16.924165] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.924584] 
[   16.924699] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.924754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.924773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.924821] Call Trace:
[   16.924846]  <TASK>
[   16.924870]  dump_stack_lvl+0x73/0xb0
[   16.924909]  print_report+0xd1/0x650
[   16.924939]  ? __virt_addr_valid+0x1db/0x2d0
[   16.924970]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.924997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.925024]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.925052]  kasan_report+0x141/0x180
[   16.925080]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.925112]  kasan_check_range+0x10c/0x1c0
[   16.925141]  __kasan_check_write+0x18/0x20
[   16.925166]  kasan_atomics_helper+0xfa9/0x5450
[   16.925193]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.925220]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.925251]  ? kasan_atomics+0x152/0x310
[   16.925284]  kasan_atomics+0x1dc/0x310
[   16.925312]  ? __pfx_kasan_atomics+0x10/0x10
[   16.925347]  ? __pfx_read_tsc+0x10/0x10
[   16.925374]  ? ktime_get_ts64+0x86/0x230
[   16.925404]  kunit_try_run_case+0x1a5/0x480
[   16.925433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.925461]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.925490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.925521]  ? __kthread_parkme+0x82/0x180
[   16.925548]  ? preempt_count_sub+0x50/0x80
[   16.925578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.925607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.925635]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.925664]  kthread+0x337/0x6f0
[   16.925687]  ? trace_preempt_on+0x20/0xc0
[   16.925717]  ? __pfx_kthread+0x10/0x10
[   16.925742]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.925768]  ? calculate_sigpending+0x7b/0xa0
[   16.925808]  ? __pfx_kthread+0x10/0x10
[   16.925835]  ret_from_fork+0x116/0x1d0
[   16.925859]  ? __pfx_kthread+0x10/0x10
[   16.925884]  ret_from_fork_asm+0x1a/0x30
[   16.925922]  </TASK>
[   16.925940] 
[   16.936998] Allocated by task 283:
[   16.937569]  kasan_save_stack+0x45/0x70
[   16.937759]  kasan_save_track+0x18/0x40
[   16.938159]  kasan_save_alloc_info+0x3b/0x50
[   16.938487]  __kasan_kmalloc+0xb7/0xc0
[   16.938780]  __kmalloc_cache_noprof+0x189/0x420
[   16.939118]  kasan_atomics+0x95/0x310
[   16.939487]  kunit_try_run_case+0x1a5/0x480
[   16.939817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.940192]  kthread+0x337/0x6f0
[   16.940347]  ret_from_fork+0x116/0x1d0
[   16.940569]  ret_from_fork_asm+0x1a/0x30
[   16.940785] 
[   16.940915] The buggy address belongs to the object at ffff88810392bb00
[   16.940915]  which belongs to the cache kmalloc-64 of size 64
[   16.941757] The buggy address is located 0 bytes to the right of
[   16.941757]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.942610] 
[   16.942712] The buggy address belongs to the physical page:
[   16.943183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.943554] flags: 0x200000000000000(node=0|zone=2)
[   16.943944] page_type: f5(slab)
[   16.944212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.944576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.944971] page dumped because: kasan: bad access detected
[   16.945467] 
[   16.945592] Memory state around the buggy address:
[   16.945918]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.946414]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.946836] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.947334]                                      ^
[   16.947719]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.948167]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.948599] ==================================================================
[   17.341329] ==================================================================
[   17.341785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   17.342263] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.342691] 
[   17.342829] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.342922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.342939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.342966] Call Trace:
[   17.342988]  <TASK>
[   17.343010]  dump_stack_lvl+0x73/0xb0
[   17.343107]  print_report+0xd1/0x650
[   17.343136]  ? __virt_addr_valid+0x1db/0x2d0
[   17.343163]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.343189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.343253]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.343279]  kasan_report+0x141/0x180
[   17.343308]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.343339]  kasan_check_range+0x10c/0x1c0
[   17.343367]  __kasan_check_write+0x18/0x20
[   17.343422]  kasan_atomics_helper+0x16e7/0x5450
[   17.343450]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.343477]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.343508]  ? kasan_atomics+0x152/0x310
[   17.343540]  kasan_atomics+0x1dc/0x310
[   17.343568]  ? __pfx_kasan_atomics+0x10/0x10
[   17.343598]  ? __pfx_read_tsc+0x10/0x10
[   17.343623]  ? ktime_get_ts64+0x86/0x230
[   17.343708]  kunit_try_run_case+0x1a5/0x480
[   17.343739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.343765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.343804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.343833]  ? __kthread_parkme+0x82/0x180
[   17.343860]  ? preempt_count_sub+0x50/0x80
[   17.343889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.343918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.343945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.343974]  kthread+0x337/0x6f0
[   17.343999]  ? trace_preempt_on+0x20/0xc0
[   17.344027]  ? __pfx_kthread+0x10/0x10
[   17.344054]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.344103]  ? calculate_sigpending+0x7b/0xa0
[   17.344133]  ? __pfx_kthread+0x10/0x10
[   17.344159]  ret_from_fork+0x116/0x1d0
[   17.344182]  ? __pfx_kthread+0x10/0x10
[   17.344209]  ret_from_fork_asm+0x1a/0x30
[   17.344250]  </TASK>
[   17.344267] 
[   17.353685] Allocated by task 283:
[   17.353913]  kasan_save_stack+0x45/0x70
[   17.354219]  kasan_save_track+0x18/0x40
[   17.354480]  kasan_save_alloc_info+0x3b/0x50
[   17.354747]  __kasan_kmalloc+0xb7/0xc0
[   17.355015]  __kmalloc_cache_noprof+0x189/0x420
[   17.355336]  kasan_atomics+0x95/0x310
[   17.355540]  kunit_try_run_case+0x1a5/0x480
[   17.355774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.356100]  kthread+0x337/0x6f0
[   17.356330]  ret_from_fork+0x116/0x1d0
[   17.356596]  ret_from_fork_asm+0x1a/0x30
[   17.356854] 
[   17.357216] The buggy address belongs to the object at ffff88810392bb00
[   17.357216]  which belongs to the cache kmalloc-64 of size 64
[   17.357917] The buggy address is located 0 bytes to the right of
[   17.357917]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.358476] 
[   17.358569] The buggy address belongs to the physical page:
[   17.358770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.359264] flags: 0x200000000000000(node=0|zone=2)
[   17.359610] page_type: f5(slab)
[   17.359932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.360402] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.360739] page dumped because: kasan: bad access detected
[   17.361033] 
[   17.361233] Memory state around the buggy address:
[   17.361519]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.361898]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.362240] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.362500]                                      ^
[   17.362806]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.363241]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.363598] ==================================================================
[   16.829929] ==================================================================
[   16.830803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   16.831877] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.832596] 
[   16.832831] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.832885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.832903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.832932] Call Trace:
[   16.832954]  <TASK>
[   16.832977]  dump_stack_lvl+0x73/0xb0
[   16.833014]  print_report+0xd1/0x650
[   16.833042]  ? __virt_addr_valid+0x1db/0x2d0
[   16.833071]  ? kasan_atomics_helper+0xd47/0x5450
[   16.833096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.833122]  ? kasan_atomics_helper+0xd47/0x5450
[   16.833148]  kasan_report+0x141/0x180
[   16.833175]  ? kasan_atomics_helper+0xd47/0x5450
[   16.833206]  kasan_check_range+0x10c/0x1c0
[   16.833234]  __kasan_check_write+0x18/0x20
[   16.833259]  kasan_atomics_helper+0xd47/0x5450
[   16.833287]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.833315]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.833350]  ? kasan_atomics+0x152/0x310
[   16.833382]  kasan_atomics+0x1dc/0x310
[   16.833410]  ? __pfx_kasan_atomics+0x10/0x10
[   16.833439]  ? __pfx_read_tsc+0x10/0x10
[   16.833465]  ? ktime_get_ts64+0x86/0x230
[   16.833494]  kunit_try_run_case+0x1a5/0x480
[   16.833523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.833550]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.833578]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.833606]  ? __kthread_parkme+0x82/0x180
[   16.833632]  ? preempt_count_sub+0x50/0x80
[   16.833660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.833690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.833717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.833745]  kthread+0x337/0x6f0
[   16.833767]  ? trace_preempt_on+0x20/0xc0
[   16.833806]  ? __pfx_kthread+0x10/0x10
[   16.833832]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.833858]  ? calculate_sigpending+0x7b/0xa0
[   16.833887]  ? __pfx_kthread+0x10/0x10
[   16.833913]  ret_from_fork+0x116/0x1d0
[   16.833935]  ? __pfx_kthread+0x10/0x10
[   16.833959]  ret_from_fork_asm+0x1a/0x30
[   16.833996]  </TASK>
[   16.834011] 
[   16.843740] Allocated by task 283:
[   16.843916]  kasan_save_stack+0x45/0x70
[   16.844174]  kasan_save_track+0x18/0x40
[   16.844399]  kasan_save_alloc_info+0x3b/0x50
[   16.844646]  __kasan_kmalloc+0xb7/0xc0
[   16.844873]  __kmalloc_cache_noprof+0x189/0x420
[   16.845161]  kasan_atomics+0x95/0x310
[   16.845348]  kunit_try_run_case+0x1a5/0x480
[   16.845564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.845779]  kthread+0x337/0x6f0
[   16.845932]  ret_from_fork+0x116/0x1d0
[   16.846126]  ret_from_fork_asm+0x1a/0x30
[   16.846362] 
[   16.846473] The buggy address belongs to the object at ffff88810392bb00
[   16.846473]  which belongs to the cache kmalloc-64 of size 64
[   16.847130] The buggy address is located 0 bytes to the right of
[   16.847130]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.847618] 
[   16.847704] The buggy address belongs to the physical page:
[   16.847914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.848321] flags: 0x200000000000000(node=0|zone=2)
[   16.848594] page_type: f5(slab)
[   16.848753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.849031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.849419] page dumped because: kasan: bad access detected
[   16.849719] 
[   16.849845] Memory state around the buggy address:
[   16.850103]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.850704]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.850981] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.851255]                                      ^
[   16.851524]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.851899]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.852278] ==================================================================
[   17.663837] ==================================================================
[   17.664291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   17.664679] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.664948] 
[   17.665057] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.665110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.665137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.665166] Call Trace:
[   17.665191]  <TASK>
[   17.665213]  dump_stack_lvl+0x73/0xb0
[   17.665253]  print_report+0xd1/0x650
[   17.665295]  ? __virt_addr_valid+0x1db/0x2d0
[   17.665325]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.665356]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.665398]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.665425]  kasan_report+0x141/0x180
[   17.665453]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.665485]  kasan_check_range+0x10c/0x1c0
[   17.665514]  __kasan_check_write+0x18/0x20
[   17.665542]  kasan_atomics_helper+0x1eaa/0x5450
[   17.665572]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.665611]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.665644]  ? kasan_atomics+0x152/0x310
[   17.665689]  kasan_atomics+0x1dc/0x310
[   17.665718]  ? __pfx_kasan_atomics+0x10/0x10
[   17.665749]  ? __pfx_read_tsc+0x10/0x10
[   17.665776]  ? ktime_get_ts64+0x86/0x230
[   17.665818]  kunit_try_run_case+0x1a5/0x480
[   17.665849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.665877]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.665908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.665936]  ? __kthread_parkme+0x82/0x180
[   17.665963]  ? preempt_count_sub+0x50/0x80
[   17.665993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.666022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.666050]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.666079]  kthread+0x337/0x6f0
[   17.666116]  ? trace_preempt_on+0x20/0xc0
[   17.666145]  ? __pfx_kthread+0x10/0x10
[   17.666171]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.666196]  ? calculate_sigpending+0x7b/0xa0
[   17.666236]  ? __pfx_kthread+0x10/0x10
[   17.666262]  ret_from_fork+0x116/0x1d0
[   17.666285]  ? __pfx_kthread+0x10/0x10
[   17.666322]  ret_from_fork_asm+0x1a/0x30
[   17.666361]  </TASK>
[   17.666377] 
[   17.675802] Allocated by task 283:
[   17.676064]  kasan_save_stack+0x45/0x70
[   17.676301]  kasan_save_track+0x18/0x40
[   17.676523]  kasan_save_alloc_info+0x3b/0x50
[   17.676765]  __kasan_kmalloc+0xb7/0xc0
[   17.677225]  __kmalloc_cache_noprof+0x189/0x420
[   17.677490]  kasan_atomics+0x95/0x310
[   17.677683]  kunit_try_run_case+0x1a5/0x480
[   17.677951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.678237]  kthread+0x337/0x6f0
[   17.678387]  ret_from_fork+0x116/0x1d0
[   17.678544]  ret_from_fork_asm+0x1a/0x30
[   17.678708] 
[   17.678826] The buggy address belongs to the object at ffff88810392bb00
[   17.678826]  which belongs to the cache kmalloc-64 of size 64
[   17.679669] The buggy address is located 0 bytes to the right of
[   17.679669]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.680341] 
[   17.680465] The buggy address belongs to the physical page:
[   17.680745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.681218] flags: 0x200000000000000(node=0|zone=2)
[   17.681481] page_type: f5(slab)
[   17.681681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.682073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.682455] page dumped because: kasan: bad access detected
[   17.682657] 
[   17.682743] Memory state around the buggy address:
[   17.682935]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.683348]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.683727] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.684094]                                      ^
[   17.684354]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.684948]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.685494] ==================================================================
[   17.774186] ==================================================================
[   17.774519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   17.774921] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.775244] 
[   17.775419] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.775473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.775506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.775535] Call Trace:
[   17.775558]  <TASK>
[   17.775582]  dump_stack_lvl+0x73/0xb0
[   17.775619]  print_report+0xd1/0x650
[   17.775649]  ? __virt_addr_valid+0x1db/0x2d0
[   17.775678]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.775704]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.775732]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.775760]  kasan_report+0x141/0x180
[   17.775801]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.775833]  __asan_report_load8_noabort+0x18/0x20
[   17.775863]  kasan_atomics_helper+0x4f98/0x5450
[   17.775891]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.775917]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.775950]  ? kasan_atomics+0x152/0x310
[   17.775982]  kasan_atomics+0x1dc/0x310
[   17.776010]  ? __pfx_kasan_atomics+0x10/0x10
[   17.776040]  ? __pfx_read_tsc+0x10/0x10
[   17.776067]  ? ktime_get_ts64+0x86/0x230
[   17.776111]  kunit_try_run_case+0x1a5/0x480
[   17.776141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.776168]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.776197]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.776226]  ? __kthread_parkme+0x82/0x180
[   17.776252]  ? preempt_count_sub+0x50/0x80
[   17.776281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.776310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.776337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.776365]  kthread+0x337/0x6f0
[   17.776390]  ? trace_preempt_on+0x20/0xc0
[   17.776418]  ? __pfx_kthread+0x10/0x10
[   17.776444]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.776470]  ? calculate_sigpending+0x7b/0xa0
[   17.776499]  ? __pfx_kthread+0x10/0x10
[   17.776526]  ret_from_fork+0x116/0x1d0
[   17.776550]  ? __pfx_kthread+0x10/0x10
[   17.776576]  ret_from_fork_asm+0x1a/0x30
[   17.776613]  </TASK>
[   17.776629] 
[   17.788127] Allocated by task 283:
[   17.788359]  kasan_save_stack+0x45/0x70
[   17.788594]  kasan_save_track+0x18/0x40
[   17.788814]  kasan_save_alloc_info+0x3b/0x50
[   17.789068]  __kasan_kmalloc+0xb7/0xc0
[   17.789660]  __kmalloc_cache_noprof+0x189/0x420
[   17.789924]  kasan_atomics+0x95/0x310
[   17.790285]  kunit_try_run_case+0x1a5/0x480
[   17.790618]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.790885]  kthread+0x337/0x6f0
[   17.791331]  ret_from_fork+0x116/0x1d0
[   17.791639]  ret_from_fork_asm+0x1a/0x30
[   17.791839] 
[   17.791940] The buggy address belongs to the object at ffff88810392bb00
[   17.791940]  which belongs to the cache kmalloc-64 of size 64
[   17.792875] The buggy address is located 0 bytes to the right of
[   17.792875]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.793817] 
[   17.794017] The buggy address belongs to the physical page:
[   17.794367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.794846] flags: 0x200000000000000(node=0|zone=2)
[   17.795236] page_type: f5(slab)
[   17.795435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.795825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.796405] page dumped because: kasan: bad access detected
[   17.796643] 
[   17.796730] Memory state around the buggy address:
[   17.796979]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.797726]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.798020] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.798274]                                      ^
[   17.798454]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.798702]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.798960] ==================================================================
[   16.753592] ==================================================================
[   16.754026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   16.754541] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.754893] 
[   16.754998] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.755049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.755065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.755112] Call Trace:
[   16.755132]  <TASK>
[   16.755153]  dump_stack_lvl+0x73/0xb0
[   16.755187]  print_report+0xd1/0x650
[   16.755213]  ? __virt_addr_valid+0x1db/0x2d0
[   16.755241]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.755266]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.755294]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.755319]  kasan_report+0x141/0x180
[   16.755346]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.755379]  kasan_check_range+0x10c/0x1c0
[   16.755413]  __kasan_check_write+0x18/0x20
[   16.755438]  kasan_atomics_helper+0xb6a/0x5450
[   16.755465]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.755491]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.755521]  ? kasan_atomics+0x152/0x310
[   16.755554]  kasan_atomics+0x1dc/0x310
[   16.755580]  ? __pfx_kasan_atomics+0x10/0x10
[   16.755610]  ? __pfx_read_tsc+0x10/0x10
[   16.755637]  ? ktime_get_ts64+0x86/0x230
[   16.755666]  kunit_try_run_case+0x1a5/0x480
[   16.755695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.755721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.755749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.755777]  ? __kthread_parkme+0x82/0x180
[   16.755815]  ? preempt_count_sub+0x50/0x80
[   16.755843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.755872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.755899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.755927]  kthread+0x337/0x6f0
[   16.755951]  ? trace_preempt_on+0x20/0xc0
[   16.755980]  ? __pfx_kthread+0x10/0x10
[   16.756005]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.756030]  ? calculate_sigpending+0x7b/0xa0
[   16.756059]  ? __pfx_kthread+0x10/0x10
[   16.756085]  ret_from_fork+0x116/0x1d0
[   16.756121]  ? __pfx_kthread+0x10/0x10
[   16.756146]  ret_from_fork_asm+0x1a/0x30
[   16.756182]  </TASK>
[   16.756198] 
[   16.764620] Allocated by task 283:
[   16.764802]  kasan_save_stack+0x45/0x70
[   16.765034]  kasan_save_track+0x18/0x40
[   16.765510]  kasan_save_alloc_info+0x3b/0x50
[   16.765758]  __kasan_kmalloc+0xb7/0xc0
[   16.765991]  __kmalloc_cache_noprof+0x189/0x420
[   16.766266]  kasan_atomics+0x95/0x310
[   16.766425]  kunit_try_run_case+0x1a5/0x480
[   16.766598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.766812]  kthread+0x337/0x6f0
[   16.766979]  ret_from_fork+0x116/0x1d0
[   16.767255]  ret_from_fork_asm+0x1a/0x30
[   16.767488] 
[   16.767602] The buggy address belongs to the object at ffff88810392bb00
[   16.767602]  which belongs to the cache kmalloc-64 of size 64
[   16.768418] The buggy address is located 0 bytes to the right of
[   16.768418]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.769013] 
[   16.769122] The buggy address belongs to the physical page:
[   16.769416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.769697] flags: 0x200000000000000(node=0|zone=2)
[   16.769903] page_type: f5(slab)
[   16.770047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.770439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.770873] page dumped because: kasan: bad access detected
[   16.771263] 
[   16.771375] Memory state around the buggy address:
[   16.771606]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.771867]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.772121] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.772813]                                      ^
[   16.773078]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.773454]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.773805] ==================================================================
[   17.295675] ==================================================================
[   17.296001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   17.296509] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.296939] 
[   17.297133] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.297187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.297203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.297231] Call Trace:
[   17.297253]  <TASK>
[   17.297275]  dump_stack_lvl+0x73/0xb0
[   17.297311]  print_report+0xd1/0x650
[   17.297343]  ? __virt_addr_valid+0x1db/0x2d0
[   17.297371]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.297397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.297423]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.297450]  kasan_report+0x141/0x180
[   17.297477]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.297508]  kasan_check_range+0x10c/0x1c0
[   17.297536]  __kasan_check_write+0x18/0x20
[   17.297562]  kasan_atomics_helper+0x15b6/0x5450
[   17.297634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.297690]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.297721]  ? kasan_atomics+0x152/0x310
[   17.297781]  kasan_atomics+0x1dc/0x310
[   17.297821]  ? __pfx_kasan_atomics+0x10/0x10
[   17.297851]  ? __pfx_read_tsc+0x10/0x10
[   17.297877]  ? ktime_get_ts64+0x86/0x230
[   17.297907]  kunit_try_run_case+0x1a5/0x480
[   17.297936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.297962]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.297993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.298021]  ? __kthread_parkme+0x82/0x180
[   17.298047]  ? preempt_count_sub+0x50/0x80
[   17.298099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.298129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.298156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.298185]  kthread+0x337/0x6f0
[   17.298208]  ? trace_preempt_on+0x20/0xc0
[   17.298236]  ? __pfx_kthread+0x10/0x10
[   17.298262]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.298288]  ? calculate_sigpending+0x7b/0xa0
[   17.298316]  ? __pfx_kthread+0x10/0x10
[   17.298342]  ret_from_fork+0x116/0x1d0
[   17.298365]  ? __pfx_kthread+0x10/0x10
[   17.298390]  ret_from_fork_asm+0x1a/0x30
[   17.298427]  </TASK>
[   17.298443] 
[   17.308042] Allocated by task 283:
[   17.308341]  kasan_save_stack+0x45/0x70
[   17.308566]  kasan_save_track+0x18/0x40
[   17.308813]  kasan_save_alloc_info+0x3b/0x50
[   17.309099]  __kasan_kmalloc+0xb7/0xc0
[   17.309317]  __kmalloc_cache_noprof+0x189/0x420
[   17.309598]  kasan_atomics+0x95/0x310
[   17.309890]  kunit_try_run_case+0x1a5/0x480
[   17.310183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.310499]  kthread+0x337/0x6f0
[   17.310686]  ret_from_fork+0x116/0x1d0
[   17.310988]  ret_from_fork_asm+0x1a/0x30
[   17.311283] 
[   17.311391] The buggy address belongs to the object at ffff88810392bb00
[   17.311391]  which belongs to the cache kmalloc-64 of size 64
[   17.312028] The buggy address is located 0 bytes to the right of
[   17.312028]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.312683] 
[   17.312814] The buggy address belongs to the physical page:
[   17.313139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.313606] flags: 0x200000000000000(node=0|zone=2)
[   17.313903] page_type: f5(slab)
[   17.314155] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.314579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.314952] page dumped because: kasan: bad access detected
[   17.315266] 
[   17.315370] Memory state around the buggy address:
[   17.315652]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.315941]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.316278] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.316730]                                      ^
[   17.317029]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.317440]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.317852] ==================================================================
[   16.710885] ==================================================================
[   16.711577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   16.711946] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.712467] 
[   16.712579] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.712631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.712848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.712880] Call Trace:
[   16.712965]  <TASK>
[   16.712987]  dump_stack_lvl+0x73/0xb0
[   16.713025]  print_report+0xd1/0x650
[   16.713052]  ? __virt_addr_valid+0x1db/0x2d0
[   16.713081]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.713118]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.713145]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.713171]  kasan_report+0x141/0x180
[   16.713197]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.713229]  kasan_check_range+0x10c/0x1c0
[   16.713257]  __kasan_check_write+0x18/0x20
[   16.713281]  kasan_atomics_helper+0xa2b/0x5450
[   16.713307]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.713339]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.713370]  ? kasan_atomics+0x152/0x310
[   16.713401]  kasan_atomics+0x1dc/0x310
[   16.713429]  ? __pfx_kasan_atomics+0x10/0x10
[   16.713458]  ? __pfx_read_tsc+0x10/0x10
[   16.713484]  ? ktime_get_ts64+0x86/0x230
[   16.713513]  kunit_try_run_case+0x1a5/0x480
[   16.713541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.713566]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.713596]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.713623]  ? __kthread_parkme+0x82/0x180
[   16.713648]  ? preempt_count_sub+0x50/0x80
[   16.713677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.713704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.713731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.713759]  kthread+0x337/0x6f0
[   16.713784]  ? trace_preempt_on+0x20/0xc0
[   16.713825]  ? __pfx_kthread+0x10/0x10
[   16.713850]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.713875]  ? calculate_sigpending+0x7b/0xa0
[   16.713903]  ? __pfx_kthread+0x10/0x10
[   16.713929]  ret_from_fork+0x116/0x1d0
[   16.713952]  ? __pfx_kthread+0x10/0x10
[   16.713977]  ret_from_fork_asm+0x1a/0x30
[   16.714014]  </TASK>
[   16.714030] 
[   16.723700] Allocated by task 283:
[   16.724019]  kasan_save_stack+0x45/0x70
[   16.724322]  kasan_save_track+0x18/0x40
[   16.724477]  kasan_save_alloc_info+0x3b/0x50
[   16.724645]  __kasan_kmalloc+0xb7/0xc0
[   16.724831]  __kmalloc_cache_noprof+0x189/0x420
[   16.725098]  kasan_atomics+0x95/0x310
[   16.725319]  kunit_try_run_case+0x1a5/0x480
[   16.725565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.725873]  kthread+0x337/0x6f0
[   16.726053]  ret_from_fork+0x116/0x1d0
[   16.726240]  ret_from_fork_asm+0x1a/0x30
[   16.726417] 
[   16.726532] The buggy address belongs to the object at ffff88810392bb00
[   16.726532]  which belongs to the cache kmalloc-64 of size 64
[   16.727194] The buggy address is located 0 bytes to the right of
[   16.727194]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.727735] 
[   16.727861] The buggy address belongs to the physical page:
[   16.728082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.728497] flags: 0x200000000000000(node=0|zone=2)
[   16.728732] page_type: f5(slab)
[   16.728936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.729223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.729569] page dumped because: kasan: bad access detected
[   16.729940] 
[   16.730052] Memory state around the buggy address:
[   16.730242]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.730500]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.730880] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.731391]                                      ^
[   16.731588]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.731849]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.732223] ==================================================================
[   16.503295] ==================================================================
[   16.503683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   16.504154] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.504654] 
[   16.504843] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.504898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.504915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.504944] Call Trace:
[   16.504962]  <TASK>
[   16.505016]  dump_stack_lvl+0x73/0xb0
[   16.505053]  print_report+0xd1/0x650
[   16.505081]  ? __virt_addr_valid+0x1db/0x2d0
[   16.505109]  ? kasan_atomics_helper+0x565/0x5450
[   16.505147]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.505175]  ? kasan_atomics_helper+0x565/0x5450
[   16.505238]  kasan_report+0x141/0x180
[   16.505266]  ? kasan_atomics_helper+0x565/0x5450
[   16.505298]  kasan_check_range+0x10c/0x1c0
[   16.505328]  __kasan_check_write+0x18/0x20
[   16.505371]  kasan_atomics_helper+0x565/0x5450
[   16.505399]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.505426]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.505457]  ? kasan_atomics+0x152/0x310
[   16.505492]  kasan_atomics+0x1dc/0x310
[   16.505559]  ? __pfx_kasan_atomics+0x10/0x10
[   16.505590]  ? __pfx_read_tsc+0x10/0x10
[   16.505617]  ? ktime_get_ts64+0x86/0x230
[   16.505646]  kunit_try_run_case+0x1a5/0x480
[   16.505676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.505704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.505770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.505808]  ? __kthread_parkme+0x82/0x180
[   16.505833]  ? preempt_count_sub+0x50/0x80
[   16.505862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.505925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.505954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.505982]  kthread+0x337/0x6f0
[   16.506007]  ? trace_preempt_on+0x20/0xc0
[   16.506070]  ? __pfx_kthread+0x10/0x10
[   16.506097]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.506124]  ? calculate_sigpending+0x7b/0xa0
[   16.506167]  ? __pfx_kthread+0x10/0x10
[   16.506194]  ret_from_fork+0x116/0x1d0
[   16.506217]  ? __pfx_kthread+0x10/0x10
[   16.506242]  ret_from_fork_asm+0x1a/0x30
[   16.506314]  </TASK>
[   16.506332] 
[   16.515850] Allocated by task 283:
[   16.516072]  kasan_save_stack+0x45/0x70
[   16.516444]  kasan_save_track+0x18/0x40
[   16.516641]  kasan_save_alloc_info+0x3b/0x50
[   16.516897]  __kasan_kmalloc+0xb7/0xc0
[   16.517054]  __kmalloc_cache_noprof+0x189/0x420
[   16.517237]  kasan_atomics+0x95/0x310
[   16.517408]  kunit_try_run_case+0x1a5/0x480
[   16.517582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.517784]  kthread+0x337/0x6f0
[   16.518041]  ret_from_fork+0x116/0x1d0
[   16.518454]  ret_from_fork_asm+0x1a/0x30
[   16.518682] 
[   16.518803] The buggy address belongs to the object at ffff88810392bb00
[   16.518803]  which belongs to the cache kmalloc-64 of size 64
[   16.519857] The buggy address is located 0 bytes to the right of
[   16.519857]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.520629] 
[   16.520716] The buggy address belongs to the physical page:
[   16.520923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.521261] flags: 0x200000000000000(node=0|zone=2)
[   16.521573] page_type: f5(slab)
[   16.521796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.522385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.522768] page dumped because: kasan: bad access detected
[   16.523037] 
[   16.523120] Memory state around the buggy address:
[   16.523300]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.523540]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.524200] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.525656]                                      ^
[   16.525954]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.526979]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.527621] ==================================================================
[   17.746554] ==================================================================
[   17.746900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   17.747624] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.747997] 
[   17.748135] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.748192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.748209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.748238] Call Trace:
[   17.748260]  <TASK>
[   17.748281]  dump_stack_lvl+0x73/0xb0
[   17.748319]  print_report+0xd1/0x650
[   17.748349]  ? __virt_addr_valid+0x1db/0x2d0
[   17.748377]  ? kasan_atomics_helper+0x2006/0x5450
[   17.748403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.748430]  ? kasan_atomics_helper+0x2006/0x5450
[   17.748456]  kasan_report+0x141/0x180
[   17.748482]  ? kasan_atomics_helper+0x2006/0x5450
[   17.748515]  kasan_check_range+0x10c/0x1c0
[   17.748544]  __kasan_check_write+0x18/0x20
[   17.748567]  kasan_atomics_helper+0x2006/0x5450
[   17.748595]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.748621]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.748652]  ? kasan_atomics+0x152/0x310
[   17.748684]  kasan_atomics+0x1dc/0x310
[   17.748713]  ? __pfx_kasan_atomics+0x10/0x10
[   17.748741]  ? __pfx_read_tsc+0x10/0x10
[   17.748767]  ? ktime_get_ts64+0x86/0x230
[   17.748810]  kunit_try_run_case+0x1a5/0x480
[   17.748839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.748865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.748894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.748921]  ? __kthread_parkme+0x82/0x180
[   17.748948]  ? preempt_count_sub+0x50/0x80
[   17.748977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.749006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.749033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.749061]  kthread+0x337/0x6f0
[   17.749103]  ? trace_preempt_on+0x20/0xc0
[   17.749133]  ? __pfx_kthread+0x10/0x10
[   17.749158]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.749184]  ? calculate_sigpending+0x7b/0xa0
[   17.749214]  ? __pfx_kthread+0x10/0x10
[   17.749240]  ret_from_fork+0x116/0x1d0
[   17.749262]  ? __pfx_kthread+0x10/0x10
[   17.749288]  ret_from_fork_asm+0x1a/0x30
[   17.749325]  </TASK>
[   17.749347] 
[   17.762239] Allocated by task 283:
[   17.762621]  kasan_save_stack+0x45/0x70
[   17.763039]  kasan_save_track+0x18/0x40
[   17.763472]  kasan_save_alloc_info+0x3b/0x50
[   17.763996]  __kasan_kmalloc+0xb7/0xc0
[   17.764479]  __kmalloc_cache_noprof+0x189/0x420
[   17.764944]  kasan_atomics+0x95/0x310
[   17.765410]  kunit_try_run_case+0x1a5/0x480
[   17.765831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.766034]  kthread+0x337/0x6f0
[   17.766263]  ret_from_fork+0x116/0x1d0
[   17.766657]  ret_from_fork_asm+0x1a/0x30
[   17.767078] 
[   17.767273] The buggy address belongs to the object at ffff88810392bb00
[   17.767273]  which belongs to the cache kmalloc-64 of size 64
[   17.768249] The buggy address is located 0 bytes to the right of
[   17.768249]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.768663] 
[   17.768748] The buggy address belongs to the physical page:
[   17.768971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.769438] flags: 0x200000000000000(node=0|zone=2)
[   17.769673] page_type: f5(slab)
[   17.769885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.770203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.770573] page dumped because: kasan: bad access detected
[   17.770924] 
[   17.771022] Memory state around the buggy address:
[   17.771340]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.771670]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.772029] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.772341]                                      ^
[   17.772531]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.772890]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.773138] ==================================================================
[   16.652055] ==================================================================
[   16.652359] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   16.652635] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.652909] 
[   16.653018] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.653073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.653089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.653117] Call Trace:
[   16.653142]  <TASK>
[   16.653164]  dump_stack_lvl+0x73/0xb0
[   16.653201]  print_report+0xd1/0x650
[   16.653229]  ? __virt_addr_valid+0x1db/0x2d0
[   16.653256]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.653281]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.653308]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.653339]  kasan_report+0x141/0x180
[   16.653366]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.653397]  kasan_check_range+0x10c/0x1c0
[   16.653425]  __kasan_check_write+0x18/0x20
[   16.653448]  kasan_atomics_helper+0x8f9/0x5450
[   16.653475]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.653503]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.653534]  ? kasan_atomics+0x152/0x310
[   16.653566]  kasan_atomics+0x1dc/0x310
[   16.653593]  ? __pfx_kasan_atomics+0x10/0x10
[   16.653622]  ? __pfx_read_tsc+0x10/0x10
[   16.653650]  ? ktime_get_ts64+0x86/0x230
[   16.653680]  kunit_try_run_case+0x1a5/0x480
[   16.653709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.653738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.653769]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.656139]  ? __kthread_parkme+0x82/0x180
[   16.656188]  ? preempt_count_sub+0x50/0x80
[   16.656220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.656253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.656283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.656313]  kthread+0x337/0x6f0
[   16.656340]  ? trace_preempt_on+0x20/0xc0
[   16.656370]  ? __pfx_kthread+0x10/0x10
[   16.656396]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.656424]  ? calculate_sigpending+0x7b/0xa0
[   16.656453]  ? __pfx_kthread+0x10/0x10
[   16.656480]  ret_from_fork+0x116/0x1d0
[   16.656506]  ? __pfx_kthread+0x10/0x10
[   16.656533]  ret_from_fork_asm+0x1a/0x30
[   16.656572]  </TASK>
[   16.656589] 
[   16.671633] Allocated by task 283:
[   16.671869]  kasan_save_stack+0x45/0x70
[   16.672419]  kasan_save_track+0x18/0x40
[   16.672676]  kasan_save_alloc_info+0x3b/0x50
[   16.673326]  __kasan_kmalloc+0xb7/0xc0
[   16.673554]  __kmalloc_cache_noprof+0x189/0x420
[   16.673837]  kasan_atomics+0x95/0x310
[   16.674031]  kunit_try_run_case+0x1a5/0x480
[   16.674207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.674533]  kthread+0x337/0x6f0
[   16.674712]  ret_from_fork+0x116/0x1d0
[   16.674962]  ret_from_fork_asm+0x1a/0x30
[   16.675220] 
[   16.675306] The buggy address belongs to the object at ffff88810392bb00
[   16.675306]  which belongs to the cache kmalloc-64 of size 64
[   16.675858] The buggy address is located 0 bytes to the right of
[   16.675858]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.676450] 
[   16.676536] The buggy address belongs to the physical page:
[   16.676990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.677526] flags: 0x200000000000000(node=0|zone=2)
[   16.677782] page_type: f5(slab)
[   16.677984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.678750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.679293] page dumped because: kasan: bad access detected
[   16.679655] 
[   16.679748] Memory state around the buggy address:
[   16.680191]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.680641]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.681223] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.682005]                                      ^
[   16.682539]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.683191]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.683441] ==================================================================
[   17.424817] ==================================================================
[   17.425377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   17.425749] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.426067] 
[   17.426194] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.426245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.426263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.426291] Call Trace:
[   17.426312]  <TASK>
[   17.426333]  dump_stack_lvl+0x73/0xb0
[   17.426366]  print_report+0xd1/0x650
[   17.426395]  ? __virt_addr_valid+0x1db/0x2d0
[   17.426423]  ? kasan_atomics_helper+0x194a/0x5450
[   17.426449]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.426478]  ? kasan_atomics_helper+0x194a/0x5450
[   17.426508]  kasan_report+0x141/0x180
[   17.426536]  ? kasan_atomics_helper+0x194a/0x5450
[   17.426566]  kasan_check_range+0x10c/0x1c0
[   17.426596]  __kasan_check_write+0x18/0x20
[   17.426619]  kasan_atomics_helper+0x194a/0x5450
[   17.426647]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.426673]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.426704]  ? kasan_atomics+0x152/0x310
[   17.426737]  kasan_atomics+0x1dc/0x310
[   17.426764]  ? __pfx_kasan_atomics+0x10/0x10
[   17.426806]  ? __pfx_read_tsc+0x10/0x10
[   17.426832]  ? ktime_get_ts64+0x86/0x230
[   17.426862]  kunit_try_run_case+0x1a5/0x480
[   17.426891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.426919]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.426947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.426977]  ? __kthread_parkme+0x82/0x180
[   17.427002]  ? preempt_count_sub+0x50/0x80
[   17.427031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.427058]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.427109]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.427138]  kthread+0x337/0x6f0
[   17.427161]  ? trace_preempt_on+0x20/0xc0
[   17.427190]  ? __pfx_kthread+0x10/0x10
[   17.427215]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.427241]  ? calculate_sigpending+0x7b/0xa0
[   17.427269]  ? __pfx_kthread+0x10/0x10
[   17.427295]  ret_from_fork+0x116/0x1d0
[   17.427318]  ? __pfx_kthread+0x10/0x10
[   17.427344]  ret_from_fork_asm+0x1a/0x30
[   17.427380]  </TASK>
[   17.427395] 
[   17.443527] Allocated by task 283:
[   17.443829]  kasan_save_stack+0x45/0x70
[   17.444088]  kasan_save_track+0x18/0x40
[   17.444508]  kasan_save_alloc_info+0x3b/0x50
[   17.444816]  __kasan_kmalloc+0xb7/0xc0
[   17.445248]  __kmalloc_cache_noprof+0x189/0x420
[   17.445642]  kasan_atomics+0x95/0x310
[   17.445893]  kunit_try_run_case+0x1a5/0x480
[   17.446344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.446758]  kthread+0x337/0x6f0
[   17.446965]  ret_from_fork+0x116/0x1d0
[   17.447584]  ret_from_fork_asm+0x1a/0x30
[   17.447840] 
[   17.447936] The buggy address belongs to the object at ffff88810392bb00
[   17.447936]  which belongs to the cache kmalloc-64 of size 64
[   17.449004] The buggy address is located 0 bytes to the right of
[   17.449004]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.449785] 
[   17.450035] The buggy address belongs to the physical page:
[   17.450494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.451000] flags: 0x200000000000000(node=0|zone=2)
[   17.451372] page_type: f5(slab)
[   17.451659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.452081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.452457] page dumped because: kasan: bad access detected
[   17.452748] 
[   17.452861] Memory state around the buggy address:
[   17.453540]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.453892]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.454484] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.454932]                                      ^
[   17.455384]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.455874]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.456405] ==================================================================
[   16.455509] ==================================================================
[   16.455844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   16.456740] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.457512] 
[   16.457671] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.457859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.457882] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.457912] Call Trace:
[   16.457936]  <TASK>
[   16.457961]  dump_stack_lvl+0x73/0xb0
[   16.458002]  print_report+0xd1/0x650
[   16.458031]  ? __virt_addr_valid+0x1db/0x2d0
[   16.458060]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.458087]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.458115]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.458141]  kasan_report+0x141/0x180
[   16.458169]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.458201]  kasan_check_range+0x10c/0x1c0
[   16.458232]  __kasan_check_write+0x18/0x20
[   16.458255]  kasan_atomics_helper+0x4a0/0x5450
[   16.458311]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.458338]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.458370]  ? kasan_atomics+0x152/0x310
[   16.458404]  kasan_atomics+0x1dc/0x310
[   16.458431]  ? __pfx_kasan_atomics+0x10/0x10
[   16.458461]  ? __pfx_read_tsc+0x10/0x10
[   16.458486]  ? ktime_get_ts64+0x86/0x230
[   16.458516]  kunit_try_run_case+0x1a5/0x480
[   16.458546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.458572]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.458601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.458629]  ? __kthread_parkme+0x82/0x180
[   16.458655]  ? preempt_count_sub+0x50/0x80
[   16.458684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.458714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.458742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.458770]  kthread+0x337/0x6f0
[   16.458809]  ? trace_preempt_on+0x20/0xc0
[   16.458839]  ? __pfx_kthread+0x10/0x10
[   16.458865]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.458890]  ? calculate_sigpending+0x7b/0xa0
[   16.458919]  ? __pfx_kthread+0x10/0x10
[   16.458945]  ret_from_fork+0x116/0x1d0
[   16.458969]  ? __pfx_kthread+0x10/0x10
[   16.458994]  ret_from_fork_asm+0x1a/0x30
[   16.459031]  </TASK>
[   16.459045] 
[   16.469474] Allocated by task 283:
[   16.469694]  kasan_save_stack+0x45/0x70
[   16.469941]  kasan_save_track+0x18/0x40
[   16.470160]  kasan_save_alloc_info+0x3b/0x50
[   16.470483]  __kasan_kmalloc+0xb7/0xc0
[   16.470676]  __kmalloc_cache_noprof+0x189/0x420
[   16.470935]  kasan_atomics+0x95/0x310
[   16.471133]  kunit_try_run_case+0x1a5/0x480
[   16.471396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.471593]  kthread+0x337/0x6f0
[   16.471730]  ret_from_fork+0x116/0x1d0
[   16.471910]  ret_from_fork_asm+0x1a/0x30
[   16.472195] 
[   16.472369] The buggy address belongs to the object at ffff88810392bb00
[   16.472369]  which belongs to the cache kmalloc-64 of size 64
[   16.473018] The buggy address is located 0 bytes to the right of
[   16.473018]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.473745] 
[   16.473854] The buggy address belongs to the physical page:
[   16.474185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.474635] flags: 0x200000000000000(node=0|zone=2)
[   16.475045] page_type: f5(slab)
[   16.475449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.475848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.476358] page dumped because: kasan: bad access detected
[   16.476551] 
[   16.476633] Memory state around the buggy address:
[   16.476819]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.477067]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.477505] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.477886]                                      ^
[   16.478280]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.478651]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.479028] ==================================================================
[   17.272952] ==================================================================
[   17.273825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   17.274131] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.274521] 
[   17.274707] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.274765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.274784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.274862] Call Trace:
[   17.274887]  <TASK>
[   17.274911]  dump_stack_lvl+0x73/0xb0
[   17.274949]  print_report+0xd1/0x650
[   17.274977]  ? __virt_addr_valid+0x1db/0x2d0
[   17.275042]  ? kasan_atomics_helper+0x151d/0x5450
[   17.275068]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.275111]  ? kasan_atomics_helper+0x151d/0x5450
[   17.275138]  kasan_report+0x141/0x180
[   17.275200]  ? kasan_atomics_helper+0x151d/0x5450
[   17.275233]  kasan_check_range+0x10c/0x1c0
[   17.275333]  __kasan_check_write+0x18/0x20
[   17.275362]  kasan_atomics_helper+0x151d/0x5450
[   17.275391]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.275418]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.275450]  ? kasan_atomics+0x152/0x310
[   17.275528]  kasan_atomics+0x1dc/0x310
[   17.275557]  ? __pfx_kasan_atomics+0x10/0x10
[   17.275588]  ? __pfx_read_tsc+0x10/0x10
[   17.275614]  ? ktime_get_ts64+0x86/0x230
[   17.275681]  kunit_try_run_case+0x1a5/0x480
[   17.275712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.275739]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.275768]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.275809]  ? __kthread_parkme+0x82/0x180
[   17.275836]  ? preempt_count_sub+0x50/0x80
[   17.275866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.275896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.275924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.275953]  kthread+0x337/0x6f0
[   17.275977]  ? trace_preempt_on+0x20/0xc0
[   17.276007]  ? __pfx_kthread+0x10/0x10
[   17.276032]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.276059]  ? calculate_sigpending+0x7b/0xa0
[   17.276089]  ? __pfx_kthread+0x10/0x10
[   17.276128]  ret_from_fork+0x116/0x1d0
[   17.276153]  ? __pfx_kthread+0x10/0x10
[   17.276178]  ret_from_fork_asm+0x1a/0x30
[   17.276216]  </TASK>
[   17.276231] 
[   17.285386] Allocated by task 283:
[   17.285617]  kasan_save_stack+0x45/0x70
[   17.285876]  kasan_save_track+0x18/0x40
[   17.286159]  kasan_save_alloc_info+0x3b/0x50
[   17.286431]  __kasan_kmalloc+0xb7/0xc0
[   17.286660]  __kmalloc_cache_noprof+0x189/0x420
[   17.286966]  kasan_atomics+0x95/0x310
[   17.287313]  kunit_try_run_case+0x1a5/0x480
[   17.287565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.287877]  kthread+0x337/0x6f0
[   17.288094]  ret_from_fork+0x116/0x1d0
[   17.288312]  ret_from_fork_asm+0x1a/0x30
[   17.288536] 
[   17.288652] The buggy address belongs to the object at ffff88810392bb00
[   17.288652]  which belongs to the cache kmalloc-64 of size 64
[   17.289192] The buggy address is located 0 bytes to the right of
[   17.289192]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.289882] 
[   17.290002] The buggy address belongs to the physical page:
[   17.290357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.290706] flags: 0x200000000000000(node=0|zone=2)
[   17.290911] page_type: f5(slab)
[   17.291184] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.291586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.291957] page dumped because: kasan: bad access detected
[   17.292193] 
[   17.292343] Memory state around the buggy address:
[   17.292606]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.292996]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.293431] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.293806]                                      ^
[   17.294013]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.294347]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.294715] ==================================================================
[   16.395651] ==================================================================
[   16.396014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   16.396302] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.396557] 
[   16.396691] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.396743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.396759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.397692] Call Trace:
[   16.397726]  <TASK>
[   16.397748]  dump_stack_lvl+0x73/0xb0
[   16.397804]  print_report+0xd1/0x650
[   16.397833]  ? __virt_addr_valid+0x1db/0x2d0
[   16.397861]  ? kasan_atomics_helper+0x3df/0x5450
[   16.397885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.397912]  ? kasan_atomics_helper+0x3df/0x5450
[   16.397937]  kasan_report+0x141/0x180
[   16.397964]  ? kasan_atomics_helper+0x3df/0x5450
[   16.397994]  kasan_check_range+0x10c/0x1c0
[   16.398022]  __kasan_check_read+0x15/0x20
[   16.398044]  kasan_atomics_helper+0x3df/0x5450
[   16.398071]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.398097]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.398127]  ? kasan_atomics+0x152/0x310
[   16.398158]  kasan_atomics+0x1dc/0x310
[   16.398184]  ? __pfx_kasan_atomics+0x10/0x10
[   16.398213]  ? __pfx_read_tsc+0x10/0x10
[   16.398239]  ? ktime_get_ts64+0x86/0x230
[   16.398267]  kunit_try_run_case+0x1a5/0x480
[   16.398294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.398322]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.398350]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.398377]  ? __kthread_parkme+0x82/0x180
[   16.398403]  ? preempt_count_sub+0x50/0x80
[   16.398467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.398496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.398523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.398552]  kthread+0x337/0x6f0
[   16.398576]  ? trace_preempt_on+0x20/0xc0
[   16.398605]  ? __pfx_kthread+0x10/0x10
[   16.398631]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.398657]  ? calculate_sigpending+0x7b/0xa0
[   16.398686]  ? __pfx_kthread+0x10/0x10
[   16.398711]  ret_from_fork+0x116/0x1d0
[   16.398735]  ? __pfx_kthread+0x10/0x10
[   16.398760]  ret_from_fork_asm+0x1a/0x30
[   16.398807]  </TASK>
[   16.398823] 
[   16.411813] Allocated by task 283:
[   16.412037]  kasan_save_stack+0x45/0x70
[   16.412482]  kasan_save_track+0x18/0x40
[   16.413018]  kasan_save_alloc_info+0x3b/0x50
[   16.413587]  __kasan_kmalloc+0xb7/0xc0
[   16.413873]  __kmalloc_cache_noprof+0x189/0x420
[   16.414512]  kasan_atomics+0x95/0x310
[   16.414779]  kunit_try_run_case+0x1a5/0x480
[   16.415344]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.415617]  kthread+0x337/0x6f0
[   16.415812]  ret_from_fork+0x116/0x1d0
[   16.416018]  ret_from_fork_asm+0x1a/0x30
[   16.416668] 
[   16.416943] The buggy address belongs to the object at ffff88810392bb00
[   16.416943]  which belongs to the cache kmalloc-64 of size 64
[   16.417961] The buggy address is located 0 bytes to the right of
[   16.417961]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.419058] 
[   16.419180] The buggy address belongs to the physical page:
[   16.419662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.420323] flags: 0x200000000000000(node=0|zone=2)
[   16.420598] page_type: f5(slab)
[   16.420784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.421103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.421572] page dumped because: kasan: bad access detected
[   16.421847] 
[   16.421934] Memory state around the buggy address:
[   16.422175]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.422920]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.423351] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.423815]                                      ^
[   16.424053]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.424559]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.424896] ==================================================================
[   17.405250] ==================================================================
[   17.405661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   17.406027] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.406433] 
[   17.406569] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.406623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.406639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.406667] Call Trace:
[   17.406688]  <TASK>
[   17.406708]  dump_stack_lvl+0x73/0xb0
[   17.406744]  print_report+0xd1/0x650
[   17.406772]  ? __virt_addr_valid+0x1db/0x2d0
[   17.406812]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.406839]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.406865]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.406892]  kasan_report+0x141/0x180
[   17.406920]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.406952]  kasan_check_range+0x10c/0x1c0
[   17.406979]  __kasan_check_write+0x18/0x20
[   17.407003]  kasan_atomics_helper+0x18b1/0x5450
[   17.407030]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.407056]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.407111]  ? kasan_atomics+0x152/0x310
[   17.407142]  kasan_atomics+0x1dc/0x310
[   17.407169]  ? __pfx_kasan_atomics+0x10/0x10
[   17.407197]  ? __pfx_read_tsc+0x10/0x10
[   17.407224]  ? ktime_get_ts64+0x86/0x230
[   17.407252]  kunit_try_run_case+0x1a5/0x480
[   17.407282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.407309]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.407338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.407366]  ? __kthread_parkme+0x82/0x180
[   17.407392]  ? preempt_count_sub+0x50/0x80
[   17.407421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.407448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.407476]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.407504]  kthread+0x337/0x6f0
[   17.407527]  ? trace_preempt_on+0x20/0xc0
[   17.407555]  ? __pfx_kthread+0x10/0x10
[   17.407580]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.407605]  ? calculate_sigpending+0x7b/0xa0
[   17.407634]  ? __pfx_kthread+0x10/0x10
[   17.407660]  ret_from_fork+0x116/0x1d0
[   17.407683]  ? __pfx_kthread+0x10/0x10
[   17.407708]  ret_from_fork_asm+0x1a/0x30
[   17.407744]  </TASK>
[   17.407760] 
[   17.415992] Allocated by task 283:
[   17.416226]  kasan_save_stack+0x45/0x70
[   17.416434]  kasan_save_track+0x18/0x40
[   17.416617]  kasan_save_alloc_info+0x3b/0x50
[   17.416800]  __kasan_kmalloc+0xb7/0xc0
[   17.416954]  __kmalloc_cache_noprof+0x189/0x420
[   17.417164]  kasan_atomics+0x95/0x310
[   17.417387]  kunit_try_run_case+0x1a5/0x480
[   17.417634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.417962]  kthread+0x337/0x6f0
[   17.418172]  ret_from_fork+0x116/0x1d0
[   17.418330]  ret_from_fork_asm+0x1a/0x30
[   17.418492] 
[   17.418578] The buggy address belongs to the object at ffff88810392bb00
[   17.418578]  which belongs to the cache kmalloc-64 of size 64
[   17.419223] The buggy address is located 0 bytes to the right of
[   17.419223]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.419873] 
[   17.419961] The buggy address belongs to the physical page:
[   17.420262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.420618] flags: 0x200000000000000(node=0|zone=2)
[   17.420821] page_type: f5(slab)
[   17.421017] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.421440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.421723] page dumped because: kasan: bad access detected
[   17.422030] 
[   17.422168] Memory state around the buggy address:
[   17.422396]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.422736]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.423064] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.423362]                                      ^
[   17.423548]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.423808]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.424199] ==================================================================
[   17.503678] ==================================================================
[   17.504299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   17.505313] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.505995] 
[   17.506115] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.506171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.506187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.506215] Call Trace:
[   17.506237]  <TASK>
[   17.506259]  dump_stack_lvl+0x73/0xb0
[   17.506299]  print_report+0xd1/0x650
[   17.506342]  ? __virt_addr_valid+0x1db/0x2d0
[   17.506370]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.506396]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.506422]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.506489]  kasan_report+0x141/0x180
[   17.506517]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.506593]  kasan_check_range+0x10c/0x1c0
[   17.506623]  __kasan_check_write+0x18/0x20
[   17.506659]  kasan_atomics_helper+0x1b22/0x5450
[   17.506687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.506714]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.506743]  ? kasan_atomics+0x152/0x310
[   17.506775]  kasan_atomics+0x1dc/0x310
[   17.506812]  ? __pfx_kasan_atomics+0x10/0x10
[   17.506841]  ? __pfx_read_tsc+0x10/0x10
[   17.506867]  ? ktime_get_ts64+0x86/0x230
[   17.506896]  kunit_try_run_case+0x1a5/0x480
[   17.506924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.506952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.506982]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.507010]  ? __kthread_parkme+0x82/0x180
[   17.507036]  ? preempt_count_sub+0x50/0x80
[   17.507066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.507108]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.507136]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.507164]  kthread+0x337/0x6f0
[   17.507188]  ? trace_preempt_on+0x20/0xc0
[   17.507216]  ? __pfx_kthread+0x10/0x10
[   17.507241]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.507267]  ? calculate_sigpending+0x7b/0xa0
[   17.507295]  ? __pfx_kthread+0x10/0x10
[   17.507321]  ret_from_fork+0x116/0x1d0
[   17.507344]  ? __pfx_kthread+0x10/0x10
[   17.507368]  ret_from_fork_asm+0x1a/0x30
[   17.507406]  </TASK>
[   17.507421] 
[   17.521121] Allocated by task 283:
[   17.521491]  kasan_save_stack+0x45/0x70
[   17.521741]  kasan_save_track+0x18/0x40
[   17.521975]  kasan_save_alloc_info+0x3b/0x50
[   17.522572]  __kasan_kmalloc+0xb7/0xc0
[   17.522749]  __kmalloc_cache_noprof+0x189/0x420
[   17.523287]  kasan_atomics+0x95/0x310
[   17.523677]  kunit_try_run_case+0x1a5/0x480
[   17.523951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.524390]  kthread+0x337/0x6f0
[   17.524728]  ret_from_fork+0x116/0x1d0
[   17.524918]  ret_from_fork_asm+0x1a/0x30
[   17.525464] 
[   17.525620] The buggy address belongs to the object at ffff88810392bb00
[   17.525620]  which belongs to the cache kmalloc-64 of size 64
[   17.526271] The buggy address is located 0 bytes to the right of
[   17.526271]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.527031] 
[   17.527399] The buggy address belongs to the physical page:
[   17.527701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.528234] flags: 0x200000000000000(node=0|zone=2)
[   17.528516] page_type: f5(slab)
[   17.528762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.529153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.529594] page dumped because: kasan: bad access detected
[   17.529904] 
[   17.530033] Memory state around the buggy address:
[   17.530249]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.530627]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.531130] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.531418]                                      ^
[   17.531703]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.532026]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.532508] ==================================================================
[   17.717980] ==================================================================
[   17.718459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   17.718882] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.719566] 
[   17.719714] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.720060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.720083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.720127] Call Trace:
[   17.720153]  <TASK>
[   17.720177]  dump_stack_lvl+0x73/0xb0
[   17.720217]  print_report+0xd1/0x650
[   17.720245]  ? __virt_addr_valid+0x1db/0x2d0
[   17.720274]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.720302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.720330]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.720357]  kasan_report+0x141/0x180
[   17.720384]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.720415]  __asan_report_load8_noabort+0x18/0x20
[   17.720445]  kasan_atomics_helper+0x4f71/0x5450
[   17.720472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.720499]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.720530]  ? kasan_atomics+0x152/0x310
[   17.720563]  kasan_atomics+0x1dc/0x310
[   17.720590]  ? __pfx_kasan_atomics+0x10/0x10
[   17.720620]  ? __pfx_read_tsc+0x10/0x10
[   17.720645]  ? ktime_get_ts64+0x86/0x230
[   17.720676]  kunit_try_run_case+0x1a5/0x480
[   17.720706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.720733]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.720763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.720805]  ? __kthread_parkme+0x82/0x180
[   17.720832]  ? preempt_count_sub+0x50/0x80
[   17.720861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.720891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.720919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.720948]  kthread+0x337/0x6f0
[   17.720972]  ? trace_preempt_on+0x20/0xc0
[   17.721001]  ? __pfx_kthread+0x10/0x10
[   17.721026]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.721053]  ? calculate_sigpending+0x7b/0xa0
[   17.721200]  ? __pfx_kthread+0x10/0x10
[   17.721232]  ret_from_fork+0x116/0x1d0
[   17.721260]  ? __pfx_kthread+0x10/0x10
[   17.721286]  ret_from_fork_asm+0x1a/0x30
[   17.721325]  </TASK>
[   17.721347] 
[   17.732828] Allocated by task 283:
[   17.733323]  kasan_save_stack+0x45/0x70
[   17.733676]  kasan_save_track+0x18/0x40
[   17.734025]  kasan_save_alloc_info+0x3b/0x50
[   17.734353]  __kasan_kmalloc+0xb7/0xc0
[   17.734568]  __kmalloc_cache_noprof+0x189/0x420
[   17.734828]  kasan_atomics+0x95/0x310
[   17.735035]  kunit_try_run_case+0x1a5/0x480
[   17.735554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.735784]  kthread+0x337/0x6f0
[   17.736183]  ret_from_fork+0x116/0x1d0
[   17.736497]  ret_from_fork_asm+0x1a/0x30
[   17.736836] 
[   17.736932] The buggy address belongs to the object at ffff88810392bb00
[   17.736932]  which belongs to the cache kmalloc-64 of size 64
[   17.737841] The buggy address is located 0 bytes to the right of
[   17.737841]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.738659] 
[   17.738889] The buggy address belongs to the physical page:
[   17.739330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.739808] flags: 0x200000000000000(node=0|zone=2)
[   17.740070] page_type: f5(slab)
[   17.740411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.740901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.741465] page dumped because: kasan: bad access detected
[   17.741822] 
[   17.741944] Memory state around the buggy address:
[   17.742363]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.742866]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.743382] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.743820]                                      ^
[   17.744254]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.744696]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.745210] ==================================================================
[   16.949401] ==================================================================
[   16.949703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   16.950469] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.950860] 
[   16.950997] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.951050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.951067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.951282] Call Trace:
[   16.951307]  <TASK>
[   16.951331]  dump_stack_lvl+0x73/0xb0
[   16.951370]  print_report+0xd1/0x650
[   16.951469]  ? __virt_addr_valid+0x1db/0x2d0
[   16.951499]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.951525]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.951552]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.951579]  kasan_report+0x141/0x180
[   16.951607]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.951639]  __asan_report_load4_noabort+0x18/0x20
[   16.951668]  kasan_atomics_helper+0x4a36/0x5450
[   16.951695]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.951723]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.951754]  ? kasan_atomics+0x152/0x310
[   16.951800]  kasan_atomics+0x1dc/0x310
[   16.951829]  ? __pfx_kasan_atomics+0x10/0x10
[   16.951861]  ? __pfx_read_tsc+0x10/0x10
[   16.951890]  ? ktime_get_ts64+0x86/0x230
[   16.951923]  kunit_try_run_case+0x1a5/0x480
[   16.951953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.951981]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.952011]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.952041]  ? __kthread_parkme+0x82/0x180
[   16.952068]  ? preempt_count_sub+0x50/0x80
[   16.952098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.952129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.952157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.952185]  kthread+0x337/0x6f0
[   16.952210]  ? trace_preempt_on+0x20/0xc0
[   16.952239]  ? __pfx_kthread+0x10/0x10
[   16.952264]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.952291]  ? calculate_sigpending+0x7b/0xa0
[   16.952320]  ? __pfx_kthread+0x10/0x10
[   16.952347]  ret_from_fork+0x116/0x1d0
[   16.952370]  ? __pfx_kthread+0x10/0x10
[   16.952395]  ret_from_fork_asm+0x1a/0x30
[   16.952433]  </TASK>
[   16.952450] 
[   16.960933] Allocated by task 283:
[   16.961108]  kasan_save_stack+0x45/0x70
[   16.961298]  kasan_save_track+0x18/0x40
[   16.961526]  kasan_save_alloc_info+0x3b/0x50
[   16.961773]  __kasan_kmalloc+0xb7/0xc0
[   16.961958]  __kmalloc_cache_noprof+0x189/0x420
[   16.962274]  kasan_atomics+0x95/0x310
[   16.962500]  kunit_try_run_case+0x1a5/0x480
[   16.962694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.962998]  kthread+0x337/0x6f0
[   16.963217]  ret_from_fork+0x116/0x1d0
[   16.963409]  ret_from_fork_asm+0x1a/0x30
[   16.963597] 
[   16.963716] The buggy address belongs to the object at ffff88810392bb00
[   16.963716]  which belongs to the cache kmalloc-64 of size 64
[   16.964293] The buggy address is located 0 bytes to the right of
[   16.964293]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.964807] 
[   16.964895] The buggy address belongs to the physical page:
[   16.965098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.965395] flags: 0x200000000000000(node=0|zone=2)
[   16.965671] page_type: f5(slab)
[   16.965878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.966501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.966767] page dumped because: kasan: bad access detected
[   16.967095] 
[   16.967213] Memory state around the buggy address:
[   16.967477]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.967826]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.968087] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.968336]                                      ^
[   16.968619]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.969015]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.969645] ==================================================================
[   16.625171] ==================================================================
[   16.625575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   16.626135] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.626543] 
[   16.626672] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.626765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.626782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.626870] Call Trace:
[   16.626894]  <TASK>
[   16.626929]  dump_stack_lvl+0x73/0xb0
[   16.626966]  print_report+0xd1/0x650
[   16.626994]  ? __virt_addr_valid+0x1db/0x2d0
[   16.627053]  ? kasan_atomics_helper+0x860/0x5450
[   16.627080]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.627153]  ? kasan_atomics_helper+0x860/0x5450
[   16.627193]  kasan_report+0x141/0x180
[   16.627220]  ? kasan_atomics_helper+0x860/0x5450
[   16.627251]  kasan_check_range+0x10c/0x1c0
[   16.627281]  __kasan_check_write+0x18/0x20
[   16.627306]  kasan_atomics_helper+0x860/0x5450
[   16.627333]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.627360]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.627391]  ? kasan_atomics+0x152/0x310
[   16.627424]  kasan_atomics+0x1dc/0x310
[   16.627453]  ? __pfx_kasan_atomics+0x10/0x10
[   16.627483]  ? __pfx_read_tsc+0x10/0x10
[   16.627509]  ? ktime_get_ts64+0x86/0x230
[   16.627539]  kunit_try_run_case+0x1a5/0x480
[   16.627569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.627597]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.627627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.627656]  ? __kthread_parkme+0x82/0x180
[   16.627681]  ? preempt_count_sub+0x50/0x80
[   16.627711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.627741]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.627770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.627810]  kthread+0x337/0x6f0
[   16.627835]  ? trace_preempt_on+0x20/0xc0
[   16.627864]  ? __pfx_kthread+0x10/0x10
[   16.627889]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.627916]  ? calculate_sigpending+0x7b/0xa0
[   16.627944]  ? __pfx_kthread+0x10/0x10
[   16.627970]  ret_from_fork+0x116/0x1d0
[   16.627995]  ? __pfx_kthread+0x10/0x10
[   16.628021]  ret_from_fork_asm+0x1a/0x30
[   16.628058]  </TASK>
[   16.628074] 
[   16.638874] Allocated by task 283:
[   16.639223]  kasan_save_stack+0x45/0x70
[   16.639533]  kasan_save_track+0x18/0x40
[   16.639695]  kasan_save_alloc_info+0x3b/0x50
[   16.639921]  __kasan_kmalloc+0xb7/0xc0
[   16.640145]  __kmalloc_cache_noprof+0x189/0x420
[   16.640629]  kasan_atomics+0x95/0x310
[   16.640863]  kunit_try_run_case+0x1a5/0x480
[   16.641066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.641436]  kthread+0x337/0x6f0
[   16.641662]  ret_from_fork+0x116/0x1d0
[   16.642051]  ret_from_fork_asm+0x1a/0x30
[   16.642306] 
[   16.642409] The buggy address belongs to the object at ffff88810392bb00
[   16.642409]  which belongs to the cache kmalloc-64 of size 64
[   16.643179] The buggy address is located 0 bytes to the right of
[   16.643179]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.643894] 
[   16.643986] The buggy address belongs to the physical page:
[   16.644430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.644931] flags: 0x200000000000000(node=0|zone=2)
[   16.645284] page_type: f5(slab)
[   16.645479] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.645859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.646364] page dumped because: kasan: bad access detected
[   16.646674] 
[   16.646798] Memory state around the buggy address:
[   16.647183]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.647584]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.648006] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.648421]                                      ^
[   16.649279]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.649703]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.650588] ==================================================================
[   17.480251] ==================================================================
[   17.480719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   17.481300] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.481735] 
[   17.481898] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.481955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.481972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.482002] Call Trace:
[   17.482028]  <TASK>
[   17.482052]  dump_stack_lvl+0x73/0xb0
[   17.482103]  print_report+0xd1/0x650
[   17.482133]  ? __virt_addr_valid+0x1db/0x2d0
[   17.482164]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.482191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.482246]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.482274]  kasan_report+0x141/0x180
[   17.482302]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.482335]  kasan_check_range+0x10c/0x1c0
[   17.482364]  __kasan_check_write+0x18/0x20
[   17.482387]  kasan_atomics_helper+0x1a7f/0x5450
[   17.482436]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.482462]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.482493]  ? kasan_atomics+0x152/0x310
[   17.482527]  kasan_atomics+0x1dc/0x310
[   17.482555]  ? __pfx_kasan_atomics+0x10/0x10
[   17.482586]  ? __pfx_read_tsc+0x10/0x10
[   17.482612]  ? ktime_get_ts64+0x86/0x230
[   17.482642]  kunit_try_run_case+0x1a5/0x480
[   17.482673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.482719]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.482766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.482825]  ? __kthread_parkme+0x82/0x180
[   17.482868]  ? preempt_count_sub+0x50/0x80
[   17.482898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.482927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.482972]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.483016]  kthread+0x337/0x6f0
[   17.483042]  ? trace_preempt_on+0x20/0xc0
[   17.483070]  ? __pfx_kthread+0x10/0x10
[   17.483108]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.483135]  ? calculate_sigpending+0x7b/0xa0
[   17.483164]  ? __pfx_kthread+0x10/0x10
[   17.483191]  ret_from_fork+0x116/0x1d0
[   17.483215]  ? __pfx_kthread+0x10/0x10
[   17.483241]  ret_from_fork_asm+0x1a/0x30
[   17.483278]  </TASK>
[   17.483294] 
[   17.492571] Allocated by task 283:
[   17.492761]  kasan_save_stack+0x45/0x70
[   17.493033]  kasan_save_track+0x18/0x40
[   17.493304]  kasan_save_alloc_info+0x3b/0x50
[   17.493555]  __kasan_kmalloc+0xb7/0xc0
[   17.493774]  __kmalloc_cache_noprof+0x189/0x420
[   17.494005]  kasan_atomics+0x95/0x310
[   17.494189]  kunit_try_run_case+0x1a5/0x480
[   17.494498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.494845]  kthread+0x337/0x6f0
[   17.495048]  ret_from_fork+0x116/0x1d0
[   17.495272]  ret_from_fork_asm+0x1a/0x30
[   17.495449] 
[   17.495567] The buggy address belongs to the object at ffff88810392bb00
[   17.495567]  which belongs to the cache kmalloc-64 of size 64
[   17.496253] The buggy address is located 0 bytes to the right of
[   17.496253]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.497113] 
[   17.497205] The buggy address belongs to the physical page:
[   17.497415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.497881] flags: 0x200000000000000(node=0|zone=2)
[   17.498261] page_type: f5(slab)
[   17.498465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.498829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.499121] page dumped because: kasan: bad access detected
[   17.499444] 
[   17.499597] Memory state around the buggy address:
[   17.499915]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.500575]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.501672] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.501965]                                      ^
[   17.502161]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.502415]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.502671] ==================================================================
[   16.600385] ==================================================================
[   16.600959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   16.601388] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.602016] 
[   16.602208] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.602262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.602278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.602306] Call Trace:
[   16.602328]  <TASK>
[   16.602350]  dump_stack_lvl+0x73/0xb0
[   16.602440]  print_report+0xd1/0x650
[   16.602469]  ? __virt_addr_valid+0x1db/0x2d0
[   16.602510]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.602537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.602565]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.602591]  kasan_report+0x141/0x180
[   16.602619]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.602695]  kasan_check_range+0x10c/0x1c0
[   16.602724]  __kasan_check_write+0x18/0x20
[   16.602809]  kasan_atomics_helper+0x7c7/0x5450
[   16.602836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.602876]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.602908]  ? kasan_atomics+0x152/0x310
[   16.602940]  kasan_atomics+0x1dc/0x310
[   16.602968]  ? __pfx_kasan_atomics+0x10/0x10
[   16.602998]  ? __pfx_read_tsc+0x10/0x10
[   16.603025]  ? ktime_get_ts64+0x86/0x230
[   16.603054]  kunit_try_run_case+0x1a5/0x480
[   16.603084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.603125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.603155]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.603184]  ? __kthread_parkme+0x82/0x180
[   16.603209]  ? preempt_count_sub+0x50/0x80
[   16.603238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.603267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.603297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.603326]  kthread+0x337/0x6f0
[   16.603350]  ? trace_preempt_on+0x20/0xc0
[   16.603380]  ? __pfx_kthread+0x10/0x10
[   16.603405]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.603430]  ? calculate_sigpending+0x7b/0xa0
[   16.603459]  ? __pfx_kthread+0x10/0x10
[   16.603484]  ret_from_fork+0x116/0x1d0
[   16.603508]  ? __pfx_kthread+0x10/0x10
[   16.603532]  ret_from_fork_asm+0x1a/0x30
[   16.603569]  </TASK>
[   16.603584] 
[   16.613717] Allocated by task 283:
[   16.613998]  kasan_save_stack+0x45/0x70
[   16.614537]  kasan_save_track+0x18/0x40
[   16.614770]  kasan_save_alloc_info+0x3b/0x50
[   16.615153]  __kasan_kmalloc+0xb7/0xc0
[   16.615387]  __kmalloc_cache_noprof+0x189/0x420
[   16.615610]  kasan_atomics+0x95/0x310
[   16.615766]  kunit_try_run_case+0x1a5/0x480
[   16.616073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.616538]  kthread+0x337/0x6f0
[   16.616708]  ret_from_fork+0x116/0x1d0
[   16.616997]  ret_from_fork_asm+0x1a/0x30
[   16.617259] 
[   16.617352] The buggy address belongs to the object at ffff88810392bb00
[   16.617352]  which belongs to the cache kmalloc-64 of size 64
[   16.617956] The buggy address is located 0 bytes to the right of
[   16.617956]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.618803] 
[   16.618908] The buggy address belongs to the physical page:
[   16.619189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.619704] flags: 0x200000000000000(node=0|zone=2)
[   16.620021] page_type: f5(slab)
[   16.620232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.620673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.621079] page dumped because: kasan: bad access detected
[   16.621458] 
[   16.621672] Memory state around the buggy address:
[   16.621913]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.622259]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.622696] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.623048]                                      ^
[   16.623473]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.623874]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.624302] ==================================================================
[   17.094840] ==================================================================
[   17.095439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   17.095735] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.096151] 
[   17.096284] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.096335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.096350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.096377] Call Trace:
[   17.096399]  <TASK>
[   17.096418]  dump_stack_lvl+0x73/0xb0
[   17.096454]  print_report+0xd1/0x650
[   17.096481]  ? __virt_addr_valid+0x1db/0x2d0
[   17.096509]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.096535]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.096563]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.096590]  kasan_report+0x141/0x180
[   17.096617]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.096648]  __asan_report_load4_noabort+0x18/0x20
[   17.096677]  kasan_atomics_helper+0x49e8/0x5450
[   17.096703]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.096729]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.096760]  ? kasan_atomics+0x152/0x310
[   17.096803]  kasan_atomics+0x1dc/0x310
[   17.096831]  ? __pfx_kasan_atomics+0x10/0x10
[   17.096859]  ? __pfx_read_tsc+0x10/0x10
[   17.096885]  ? ktime_get_ts64+0x86/0x230
[   17.096913]  kunit_try_run_case+0x1a5/0x480
[   17.096941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.096979]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.097008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.097034]  ? __kthread_parkme+0x82/0x180
[   17.097067]  ? preempt_count_sub+0x50/0x80
[   17.097117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.097146]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.097188]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.097216]  kthread+0x337/0x6f0
[   17.097240]  ? trace_preempt_on+0x20/0xc0
[   17.097268]  ? __pfx_kthread+0x10/0x10
[   17.097294]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.097318]  ? calculate_sigpending+0x7b/0xa0
[   17.097352]  ? __pfx_kthread+0x10/0x10
[   17.097379]  ret_from_fork+0x116/0x1d0
[   17.097402]  ? __pfx_kthread+0x10/0x10
[   17.097427]  ret_from_fork_asm+0x1a/0x30
[   17.097464]  </TASK>
[   17.097480] 
[   17.106259] Allocated by task 283:
[   17.106484]  kasan_save_stack+0x45/0x70
[   17.106711]  kasan_save_track+0x18/0x40
[   17.106930]  kasan_save_alloc_info+0x3b/0x50
[   17.107117]  __kasan_kmalloc+0xb7/0xc0
[   17.107362]  __kmalloc_cache_noprof+0x189/0x420
[   17.107614]  kasan_atomics+0x95/0x310
[   17.107769]  kunit_try_run_case+0x1a5/0x480
[   17.108018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.108365]  kthread+0x337/0x6f0
[   17.108505]  ret_from_fork+0x116/0x1d0
[   17.108728]  ret_from_fork_asm+0x1a/0x30
[   17.108985] 
[   17.109099] The buggy address belongs to the object at ffff88810392bb00
[   17.109099]  which belongs to the cache kmalloc-64 of size 64
[   17.109679] The buggy address is located 0 bytes to the right of
[   17.109679]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.110297] 
[   17.110415] The buggy address belongs to the physical page:
[   17.110622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.111013] flags: 0x200000000000000(node=0|zone=2)
[   17.111215] page_type: f5(slab)
[   17.111357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.111778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.112224] page dumped because: kasan: bad access detected
[   17.112546] 
[   17.112672] Memory state around the buggy address:
[   17.112867]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.113117]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.113368] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.113611]                                      ^
[   17.113809]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.114171]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.114529] ==================================================================
[   17.226027] ==================================================================
[   17.226531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   17.226975] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.227420] 
[   17.227527] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.227582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.227598] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.227627] Call Trace:
[   17.227648]  <TASK>
[   17.227667]  dump_stack_lvl+0x73/0xb0
[   17.227704]  print_report+0xd1/0x650
[   17.227732]  ? __virt_addr_valid+0x1db/0x2d0
[   17.227762]  ? kasan_atomics_helper+0x1467/0x5450
[   17.227801]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.227829]  ? kasan_atomics_helper+0x1467/0x5450
[   17.227856]  kasan_report+0x141/0x180
[   17.227883]  ? kasan_atomics_helper+0x1467/0x5450
[   17.227916]  kasan_check_range+0x10c/0x1c0
[   17.227947]  __kasan_check_write+0x18/0x20
[   17.228017]  kasan_atomics_helper+0x1467/0x5450
[   17.228068]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.228111]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.228144]  ? kasan_atomics+0x152/0x310
[   17.228176]  kasan_atomics+0x1dc/0x310
[   17.228204]  ? __pfx_kasan_atomics+0x10/0x10
[   17.228234]  ? __pfx_read_tsc+0x10/0x10
[   17.228260]  ? ktime_get_ts64+0x86/0x230
[   17.228327]  kunit_try_run_case+0x1a5/0x480
[   17.228357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.228384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.228414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.228443]  ? __kthread_parkme+0x82/0x180
[   17.228469]  ? preempt_count_sub+0x50/0x80
[   17.228498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.228527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.228581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.228610]  kthread+0x337/0x6f0
[   17.228636]  ? trace_preempt_on+0x20/0xc0
[   17.228666]  ? __pfx_kthread+0x10/0x10
[   17.228691]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.228717]  ? calculate_sigpending+0x7b/0xa0
[   17.228747]  ? __pfx_kthread+0x10/0x10
[   17.228773]  ret_from_fork+0x116/0x1d0
[   17.228808]  ? __pfx_kthread+0x10/0x10
[   17.228833]  ret_from_fork_asm+0x1a/0x30
[   17.228872]  </TASK>
[   17.228887] 
[   17.238701] Allocated by task 283:
[   17.238981]  kasan_save_stack+0x45/0x70
[   17.239281]  kasan_save_track+0x18/0x40
[   17.239469]  kasan_save_alloc_info+0x3b/0x50
[   17.239672]  __kasan_kmalloc+0xb7/0xc0
[   17.239896]  __kmalloc_cache_noprof+0x189/0x420
[   17.240257]  kasan_atomics+0x95/0x310
[   17.240457]  kunit_try_run_case+0x1a5/0x480
[   17.240624]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.240923]  kthread+0x337/0x6f0
[   17.241218]  ret_from_fork+0x116/0x1d0
[   17.241585]  ret_from_fork_asm+0x1a/0x30
[   17.241749] 
[   17.241915] The buggy address belongs to the object at ffff88810392bb00
[   17.241915]  which belongs to the cache kmalloc-64 of size 64
[   17.242713] The buggy address is located 0 bytes to the right of
[   17.242713]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.243380] 
[   17.243495] The buggy address belongs to the physical page:
[   17.243846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.244310] flags: 0x200000000000000(node=0|zone=2)
[   17.244596] page_type: f5(slab)
[   17.244800] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.245237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.245615] page dumped because: kasan: bad access detected
[   17.245939] 
[   17.246085] Memory state around the buggy address:
[   17.246447]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.246829]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.247215] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.247567]                                      ^
[   17.247846]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.248272]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.248670] ==================================================================
[   16.315980] ==================================================================
[   16.316616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   16.317068] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.317579] 
[   16.317762] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.317919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.317935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.317961] Call Trace:
[   16.317979]  <TASK>
[   16.317999]  dump_stack_lvl+0x73/0xb0
[   16.318034]  print_report+0xd1/0x650
[   16.318061]  ? __virt_addr_valid+0x1db/0x2d0
[   16.318087]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.318235]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.318262]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.318287]  kasan_report+0x141/0x180
[   16.318313]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.318342]  __asan_report_store4_noabort+0x1b/0x30
[   16.318365]  kasan_atomics_helper+0x4ba2/0x5450
[   16.318389]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.318415]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.318444]  ? kasan_atomics+0x152/0x310
[   16.318473]  kasan_atomics+0x1dc/0x310
[   16.318499]  ? __pfx_kasan_atomics+0x10/0x10
[   16.318526]  ? __pfx_read_tsc+0x10/0x10
[   16.318550]  ? ktime_get_ts64+0x86/0x230
[   16.318578]  kunit_try_run_case+0x1a5/0x480
[   16.318607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.318631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.318660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.318687]  ? __kthread_parkme+0x82/0x180
[   16.318711]  ? preempt_count_sub+0x50/0x80
[   16.318738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.318765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.318802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.318828]  kthread+0x337/0x6f0
[   16.318850]  ? trace_preempt_on+0x20/0xc0
[   16.318876]  ? __pfx_kthread+0x10/0x10
[   16.318900]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.318924]  ? calculate_sigpending+0x7b/0xa0
[   16.318951]  ? __pfx_kthread+0x10/0x10
[   16.318976]  ret_from_fork+0x116/0x1d0
[   16.318998]  ? __pfx_kthread+0x10/0x10
[   16.319021]  ret_from_fork_asm+0x1a/0x30
[   16.319055]  </TASK>
[   16.319069] 
[   16.334578] Allocated by task 283:
[   16.334979]  kasan_save_stack+0x45/0x70
[   16.335289]  kasan_save_track+0x18/0x40
[   16.335708]  kasan_save_alloc_info+0x3b/0x50
[   16.336021]  __kasan_kmalloc+0xb7/0xc0
[   16.336201]  __kmalloc_cache_noprof+0x189/0x420
[   16.336384]  kasan_atomics+0x95/0x310
[   16.336799]  kunit_try_run_case+0x1a5/0x480
[   16.337353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.337931]  kthread+0x337/0x6f0
[   16.338324]  ret_from_fork+0x116/0x1d0
[   16.338624]  ret_from_fork_asm+0x1a/0x30
[   16.338804] 
[   16.338889] The buggy address belongs to the object at ffff88810392bb00
[   16.338889]  which belongs to the cache kmalloc-64 of size 64
[   16.339333] The buggy address is located 0 bytes to the right of
[   16.339333]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.340042] 
[   16.340401] The buggy address belongs to the physical page:
[   16.340706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.341054] flags: 0x200000000000000(node=0|zone=2)
[   16.341371] page_type: f5(slab)
[   16.341571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.341962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.342502] page dumped because: kasan: bad access detected
[   16.342749] 
[   16.342870] Memory state around the buggy address:
[   16.343117]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.343536]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.343823] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.344160]                                      ^
[   16.344547]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.344912]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.345386] ==================================================================
[   16.528301] ==================================================================
[   16.528782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   16.529071] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.530851] 
[   16.531191] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.531420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.531444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.531517] Call Trace:
[   16.531540]  <TASK>
[   16.531565]  dump_stack_lvl+0x73/0xb0
[   16.531608]  print_report+0xd1/0x650
[   16.531639]  ? __virt_addr_valid+0x1db/0x2d0
[   16.531669]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.531695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.531721]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.531748]  kasan_report+0x141/0x180
[   16.531775]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.531819]  kasan_check_range+0x10c/0x1c0
[   16.531849]  __kasan_check_write+0x18/0x20
[   16.531872]  kasan_atomics_helper+0x5fe/0x5450
[   16.531899]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.531926]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.531957]  ? kasan_atomics+0x152/0x310
[   16.531989]  kasan_atomics+0x1dc/0x310
[   16.532017]  ? __pfx_kasan_atomics+0x10/0x10
[   16.532046]  ? __pfx_read_tsc+0x10/0x10
[   16.532080]  ? ktime_get_ts64+0x86/0x230
[   16.532123]  kunit_try_run_case+0x1a5/0x480
[   16.532155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.532183]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.532212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.532239]  ? __kthread_parkme+0x82/0x180
[   16.532265]  ? preempt_count_sub+0x50/0x80
[   16.532293]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.532322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.532349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.532377]  kthread+0x337/0x6f0
[   16.532401]  ? trace_preempt_on+0x20/0xc0
[   16.532430]  ? __pfx_kthread+0x10/0x10
[   16.532458]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.532485]  ? calculate_sigpending+0x7b/0xa0
[   16.532514]  ? __pfx_kthread+0x10/0x10
[   16.532539]  ret_from_fork+0x116/0x1d0
[   16.532563]  ? __pfx_kthread+0x10/0x10
[   16.532588]  ret_from_fork_asm+0x1a/0x30
[   16.532626]  </TASK>
[   16.532641] 
[   16.541925] Allocated by task 283:
[   16.542182]  kasan_save_stack+0x45/0x70
[   16.542452]  kasan_save_track+0x18/0x40
[   16.542708]  kasan_save_alloc_info+0x3b/0x50
[   16.542904]  __kasan_kmalloc+0xb7/0xc0
[   16.543056]  __kmalloc_cache_noprof+0x189/0x420
[   16.543232]  kasan_atomics+0x95/0x310
[   16.543690]  kunit_try_run_case+0x1a5/0x480
[   16.543944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.544445]  kthread+0x337/0x6f0
[   16.544627]  ret_from_fork+0x116/0x1d0
[   16.545010]  ret_from_fork_asm+0x1a/0x30
[   16.545384] 
[   16.545496] The buggy address belongs to the object at ffff88810392bb00
[   16.545496]  which belongs to the cache kmalloc-64 of size 64
[   16.546189] The buggy address is located 0 bytes to the right of
[   16.546189]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.546712] 
[   16.546811] The buggy address belongs to the physical page:
[   16.547120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.547593] flags: 0x200000000000000(node=0|zone=2)
[   16.547918] page_type: f5(slab)
[   16.548166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.548526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.548782] page dumped because: kasan: bad access detected
[   16.549128] 
[   16.549278] Memory state around the buggy address:
[   16.549575]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.549956]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.550387] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.550742]                                      ^
[   16.551020]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.551396]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.551635] ==================================================================
[   17.074064] ==================================================================
[   17.074397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   17.075040] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.075468] 
[   17.075606] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.075658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.075675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.075704] Call Trace:
[   17.075725]  <TASK>
[   17.075754]  dump_stack_lvl+0x73/0xb0
[   17.075811]  print_report+0xd1/0x650
[   17.075839]  ? __virt_addr_valid+0x1db/0x2d0
[   17.075868]  ? kasan_atomics_helper+0x1217/0x5450
[   17.075894]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.075922]  ? kasan_atomics_helper+0x1217/0x5450
[   17.075950]  kasan_report+0x141/0x180
[   17.075977]  ? kasan_atomics_helper+0x1217/0x5450
[   17.076009]  kasan_check_range+0x10c/0x1c0
[   17.076038]  __kasan_check_write+0x18/0x20
[   17.076063]  kasan_atomics_helper+0x1217/0x5450
[   17.076104]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.076132]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.076173]  ? kasan_atomics+0x152/0x310
[   17.076205]  kasan_atomics+0x1dc/0x310
[   17.076245]  ? __pfx_kasan_atomics+0x10/0x10
[   17.076274]  ? __pfx_read_tsc+0x10/0x10
[   17.076299]  ? ktime_get_ts64+0x86/0x230
[   17.076330]  kunit_try_run_case+0x1a5/0x480
[   17.076370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.076396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.076437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.076465]  ? __kthread_parkme+0x82/0x180
[   17.076491]  ? preempt_count_sub+0x50/0x80
[   17.076519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.076557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.076585]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.076625]  kthread+0x337/0x6f0
[   17.076649]  ? trace_preempt_on+0x20/0xc0
[   17.076678]  ? __pfx_kthread+0x10/0x10
[   17.076703]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.076736]  ? calculate_sigpending+0x7b/0xa0
[   17.076765]  ? __pfx_kthread+0x10/0x10
[   17.076808]  ret_from_fork+0x116/0x1d0
[   17.076832]  ? __pfx_kthread+0x10/0x10
[   17.076857]  ret_from_fork_asm+0x1a/0x30
[   17.076893]  </TASK>
[   17.076909] 
[   17.085689] Allocated by task 283:
[   17.085914]  kasan_save_stack+0x45/0x70
[   17.086116]  kasan_save_track+0x18/0x40
[   17.086367]  kasan_save_alloc_info+0x3b/0x50
[   17.086578]  __kasan_kmalloc+0xb7/0xc0
[   17.086730]  __kmalloc_cache_noprof+0x189/0x420
[   17.086914]  kasan_atomics+0x95/0x310
[   17.087065]  kunit_try_run_case+0x1a5/0x480
[   17.087230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.087424]  kthread+0x337/0x6f0
[   17.087625]  ret_from_fork+0x116/0x1d0
[   17.087882]  ret_from_fork_asm+0x1a/0x30
[   17.088106] 
[   17.088214] The buggy address belongs to the object at ffff88810392bb00
[   17.088214]  which belongs to the cache kmalloc-64 of size 64
[   17.088864] The buggy address is located 0 bytes to the right of
[   17.088864]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.089493] 
[   17.089577] The buggy address belongs to the physical page:
[   17.089772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.090061] flags: 0x200000000000000(node=0|zone=2)
[   17.090345] page_type: f5(slab)
[   17.090576] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.090992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.091456] page dumped because: kasan: bad access detected
[   17.091752] 
[   17.091883] Memory state around the buggy address:
[   17.092164]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.092501]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.092869] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.093327]                                      ^
[   17.093565]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.093917]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.094323] ==================================================================
[   16.345902] ==================================================================
[   16.346251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   16.346591] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.346970] 
[   16.347104] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.347155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.347170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.347196] Call Trace:
[   16.347216]  <TASK>
[   16.347235]  dump_stack_lvl+0x73/0xb0
[   16.347269]  print_report+0xd1/0x650
[   16.347295]  ? __virt_addr_valid+0x1db/0x2d0
[   16.347321]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.347345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.347370]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.347393]  kasan_report+0x141/0x180
[   16.347419]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.347449]  __asan_report_load4_noabort+0x18/0x20
[   16.347475]  kasan_atomics_helper+0x4b88/0x5450
[   16.347502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.347526]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.347555]  ? kasan_atomics+0x152/0x310
[   16.347585]  kasan_atomics+0x1dc/0x310
[   16.347611]  ? __pfx_kasan_atomics+0x10/0x10
[   16.347637]  ? __pfx_read_tsc+0x10/0x10
[   16.347662]  ? ktime_get_ts64+0x86/0x230
[   16.347690]  kunit_try_run_case+0x1a5/0x480
[   16.347718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.347743]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.347770]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.347868]  ? __kthread_parkme+0x82/0x180
[   16.347895]  ? preempt_count_sub+0x50/0x80
[   16.347923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.347950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.347977]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.348003]  kthread+0x337/0x6f0
[   16.348025]  ? trace_preempt_on+0x20/0xc0
[   16.348053]  ? __pfx_kthread+0x10/0x10
[   16.348076]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.348111]  ? calculate_sigpending+0x7b/0xa0
[   16.348139]  ? __pfx_kthread+0x10/0x10
[   16.348331]  ret_from_fork+0x116/0x1d0
[   16.348357]  ? __pfx_kthread+0x10/0x10
[   16.348381]  ret_from_fork_asm+0x1a/0x30
[   16.348417]  </TASK>
[   16.348431] 
[   16.357753] Allocated by task 283:
[   16.357937]  kasan_save_stack+0x45/0x70
[   16.358337]  kasan_save_track+0x18/0x40
[   16.358543]  kasan_save_alloc_info+0x3b/0x50
[   16.358739]  __kasan_kmalloc+0xb7/0xc0
[   16.358909]  __kmalloc_cache_noprof+0x189/0x420
[   16.359126]  kasan_atomics+0x95/0x310
[   16.359342]  kunit_try_run_case+0x1a5/0x480
[   16.359582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.359856]  kthread+0x337/0x6f0
[   16.359998]  ret_from_fork+0x116/0x1d0
[   16.360154]  ret_from_fork_asm+0x1a/0x30
[   16.360390] 
[   16.360508] The buggy address belongs to the object at ffff88810392bb00
[   16.360508]  which belongs to the cache kmalloc-64 of size 64
[   16.361135] The buggy address is located 0 bytes to the right of
[   16.361135]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.361865] 
[   16.361950] The buggy address belongs to the physical page:
[   16.362150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.362424] flags: 0x200000000000000(node=0|zone=2)
[   16.363057] page_type: f5(slab)
[   16.363275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.363630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.364238] page dumped because: kasan: bad access detected
[   16.364508] 
[   16.364592] Memory state around the buggy address:
[   16.364777]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.365229]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.365613] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.366005]                                      ^
[   16.366456]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.366830]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.367109] ==================================================================
[   17.148065] ==================================================================
[   17.149169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   17.149607] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.149943] 
[   17.150060] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.150117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.150134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.150165] Call Trace:
[   17.150189]  <TASK>
[   17.150213]  dump_stack_lvl+0x73/0xb0
[   17.150251]  print_report+0xd1/0x650
[   17.150279]  ? __virt_addr_valid+0x1db/0x2d0
[   17.150307]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.150333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.150360]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.150388]  kasan_report+0x141/0x180
[   17.150417]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.150449]  __asan_report_load4_noabort+0x18/0x20
[   17.150480]  kasan_atomics_helper+0x49ce/0x5450
[   17.150507]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.150533]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.150564]  ? kasan_atomics+0x152/0x310
[   17.150596]  kasan_atomics+0x1dc/0x310
[   17.150624]  ? __pfx_kasan_atomics+0x10/0x10
[   17.150652]  ? __pfx_read_tsc+0x10/0x10
[   17.150679]  ? ktime_get_ts64+0x86/0x230
[   17.150708]  kunit_try_run_case+0x1a5/0x480
[   17.150738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.150765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.150808]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.150836]  ? __kthread_parkme+0x82/0x180
[   17.150861]  ? preempt_count_sub+0x50/0x80
[   17.150891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.150920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.150948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.150975]  kthread+0x337/0x6f0
[   17.150999]  ? trace_preempt_on+0x20/0xc0
[   17.151028]  ? __pfx_kthread+0x10/0x10
[   17.151055]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.151082]  ? calculate_sigpending+0x7b/0xa0
[   17.151125]  ? __pfx_kthread+0x10/0x10
[   17.151151]  ret_from_fork+0x116/0x1d0
[   17.151175]  ? __pfx_kthread+0x10/0x10
[   17.151199]  ret_from_fork_asm+0x1a/0x30
[   17.151236]  </TASK>
[   17.151253] 
[   17.160690] Allocated by task 283:
[   17.160857]  kasan_save_stack+0x45/0x70
[   17.161025]  kasan_save_track+0x18/0x40
[   17.161182]  kasan_save_alloc_info+0x3b/0x50
[   17.161467]  __kasan_kmalloc+0xb7/0xc0
[   17.161683]  __kmalloc_cache_noprof+0x189/0x420
[   17.162195]  kasan_atomics+0x95/0x310
[   17.162428]  kunit_try_run_case+0x1a5/0x480
[   17.162663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.162911]  kthread+0x337/0x6f0
[   17.163651]  ret_from_fork+0x116/0x1d0
[   17.163982]  ret_from_fork_asm+0x1a/0x30
[   17.164385] 
[   17.164504] The buggy address belongs to the object at ffff88810392bb00
[   17.164504]  which belongs to the cache kmalloc-64 of size 64
[   17.164970] The buggy address is located 0 bytes to the right of
[   17.164970]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.165608] 
[   17.165710] The buggy address belongs to the physical page:
[   17.166025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.166568] flags: 0x200000000000000(node=0|zone=2)
[   17.166815] page_type: f5(slab)
[   17.167006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.167316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.167854] page dumped because: kasan: bad access detected
[   17.168060] 
[   17.168156] Memory state around the buggy address:
[   17.168422]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.168779]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.169038] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.170929]                                      ^
[   17.171167]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.171431]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.171684] ==================================================================
[   16.479634] ==================================================================
[   16.480031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   16.480412] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.480816] 
[   16.480925] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.480976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.480993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.481021] Call Trace:
[   16.481042]  <TASK>
[   16.481062]  dump_stack_lvl+0x73/0xb0
[   16.481097]  print_report+0xd1/0x650
[   16.481141]  ? __virt_addr_valid+0x1db/0x2d0
[   16.481170]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.481196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.481225]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.481252]  kasan_report+0x141/0x180
[   16.481279]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.481348]  __asan_report_store4_noabort+0x1b/0x30
[   16.481377]  kasan_atomics_helper+0x4b3a/0x5450
[   16.481422]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.481466]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.481513]  ? kasan_atomics+0x152/0x310
[   16.481560]  kasan_atomics+0x1dc/0x310
[   16.481602]  ? __pfx_kasan_atomics+0x10/0x10
[   16.481647]  ? __pfx_read_tsc+0x10/0x10
[   16.481687]  ? ktime_get_ts64+0x86/0x230
[   16.481732]  kunit_try_run_case+0x1a5/0x480
[   16.481770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.481808]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.481838]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.481865]  ? __kthread_parkme+0x82/0x180
[   16.481890]  ? preempt_count_sub+0x50/0x80
[   16.481919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.481947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.481974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.482002]  kthread+0x337/0x6f0
[   16.482025]  ? trace_preempt_on+0x20/0xc0
[   16.482054]  ? __pfx_kthread+0x10/0x10
[   16.482078]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.482104]  ? calculate_sigpending+0x7b/0xa0
[   16.482133]  ? __pfx_kthread+0x10/0x10
[   16.482159]  ret_from_fork+0x116/0x1d0
[   16.482181]  ? __pfx_kthread+0x10/0x10
[   16.482206]  ret_from_fork_asm+0x1a/0x30
[   16.482242]  </TASK>
[   16.482258] 
[   16.491669] Allocated by task 283:
[   16.491943]  kasan_save_stack+0x45/0x70
[   16.492126]  kasan_save_track+0x18/0x40
[   16.492281]  kasan_save_alloc_info+0x3b/0x50
[   16.492674]  __kasan_kmalloc+0xb7/0xc0
[   16.493095]  __kmalloc_cache_noprof+0x189/0x420
[   16.493346]  kasan_atomics+0x95/0x310
[   16.494177]  kunit_try_run_case+0x1a5/0x480
[   16.494450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.494647]  kthread+0x337/0x6f0
[   16.494863]  ret_from_fork+0x116/0x1d0
[   16.495023]  ret_from_fork_asm+0x1a/0x30
[   16.495237] 
[   16.495879] The buggy address belongs to the object at ffff88810392bb00
[   16.495879]  which belongs to the cache kmalloc-64 of size 64
[   16.496492] The buggy address is located 0 bytes to the right of
[   16.496492]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.497188] 
[   16.497300] The buggy address belongs to the physical page:
[   16.497596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.497992] flags: 0x200000000000000(node=0|zone=2)
[   16.498408] page_type: f5(slab)
[   16.498550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.498818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.499342] page dumped because: kasan: bad access detected
[   16.499759] 
[   16.499860] Memory state around the buggy address:
[   16.500154]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.500709]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.501090] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.501510]                                      ^
[   16.501770]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.502194]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.502542] ==================================================================
[   17.614506] ==================================================================
[   17.614845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   17.615166] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.615830] 
[   17.616044] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.616095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.616112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.616139] Call Trace:
[   17.616159]  <TASK>
[   17.616179]  dump_stack_lvl+0x73/0xb0
[   17.616216]  print_report+0xd1/0x650
[   17.616243]  ? __virt_addr_valid+0x1db/0x2d0
[   17.616271]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.616297]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.616324]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.616351]  kasan_report+0x141/0x180
[   17.616378]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.616410]  kasan_check_range+0x10c/0x1c0
[   17.616439]  __kasan_check_write+0x18/0x20
[   17.616463]  kasan_atomics_helper+0x1d7a/0x5450
[   17.616491]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.616519]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.616550]  ? kasan_atomics+0x152/0x310
[   17.616582]  kasan_atomics+0x1dc/0x310
[   17.616609]  ? __pfx_kasan_atomics+0x10/0x10
[   17.616660]  ? __pfx_read_tsc+0x10/0x10
[   17.616686]  ? ktime_get_ts64+0x86/0x230
[   17.616716]  kunit_try_run_case+0x1a5/0x480
[   17.616746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.616796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.616835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.616876]  ? __kthread_parkme+0x82/0x180
[   17.616904]  ? preempt_count_sub+0x50/0x80
[   17.616933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.616961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.616989]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.617017]  kthread+0x337/0x6f0
[   17.617041]  ? trace_preempt_on+0x20/0xc0
[   17.617071]  ? __pfx_kthread+0x10/0x10
[   17.617102]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.617129]  ? calculate_sigpending+0x7b/0xa0
[   17.617157]  ? __pfx_kthread+0x10/0x10
[   17.617195]  ret_from_fork+0x116/0x1d0
[   17.617218]  ? __pfx_kthread+0x10/0x10
[   17.617242]  ret_from_fork_asm+0x1a/0x30
[   17.617292]  </TASK>
[   17.617307] 
[   17.627037] Allocated by task 283:
[   17.627328]  kasan_save_stack+0x45/0x70
[   17.627563]  kasan_save_track+0x18/0x40
[   17.627781]  kasan_save_alloc_info+0x3b/0x50
[   17.628047]  __kasan_kmalloc+0xb7/0xc0
[   17.628206]  __kmalloc_cache_noprof+0x189/0x420
[   17.628390]  kasan_atomics+0x95/0x310
[   17.628549]  kunit_try_run_case+0x1a5/0x480
[   17.628722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.629247]  kthread+0x337/0x6f0
[   17.629492]  ret_from_fork+0x116/0x1d0
[   17.629712]  ret_from_fork_asm+0x1a/0x30
[   17.629950] 
[   17.630058] The buggy address belongs to the object at ffff88810392bb00
[   17.630058]  which belongs to the cache kmalloc-64 of size 64
[   17.630466] The buggy address is located 0 bytes to the right of
[   17.630466]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.630901] 
[   17.631130] The buggy address belongs to the physical page:
[   17.631484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.631924] flags: 0x200000000000000(node=0|zone=2)
[   17.632210] page_type: f5(slab)
[   17.632414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.632976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.633474] page dumped because: kasan: bad access detected
[   17.633818] 
[   17.633999] Memory state around the buggy address:
[   17.634281]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.634594]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.634944] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.635535]                                      ^
[   17.635813]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.636444]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.636953] ==================================================================
[   16.774719] ==================================================================
[   16.775708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   16.776112] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.776377] 
[   16.776588] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.776643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.776660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.776688] Call Trace:
[   16.776711]  <TASK>
[   16.776734]  dump_stack_lvl+0x73/0xb0
[   16.776771]  print_report+0xd1/0x650
[   16.776814]  ? __virt_addr_valid+0x1db/0x2d0
[   16.776843]  ? kasan_atomics_helper+0xc70/0x5450
[   16.776870]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.776898]  ? kasan_atomics_helper+0xc70/0x5450
[   16.776924]  kasan_report+0x141/0x180
[   16.776951]  ? kasan_atomics_helper+0xc70/0x5450
[   16.776983]  kasan_check_range+0x10c/0x1c0
[   16.777011]  __kasan_check_write+0x18/0x20
[   16.777035]  kasan_atomics_helper+0xc70/0x5450
[   16.777062]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.777100]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.777131]  ? kasan_atomics+0x152/0x310
[   16.777164]  kasan_atomics+0x1dc/0x310
[   16.777191]  ? __pfx_kasan_atomics+0x10/0x10
[   16.777219]  ? __pfx_read_tsc+0x10/0x10
[   16.777245]  ? ktime_get_ts64+0x86/0x230
[   16.777274]  kunit_try_run_case+0x1a5/0x480
[   16.777304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.777330]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.777365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.777393]  ? __kthread_parkme+0x82/0x180
[   16.777417]  ? preempt_count_sub+0x50/0x80
[   16.777447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.777474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.777501]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.777528]  kthread+0x337/0x6f0
[   16.777552]  ? trace_preempt_on+0x20/0xc0
[   16.777581]  ? __pfx_kthread+0x10/0x10
[   16.777606]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.777631]  ? calculate_sigpending+0x7b/0xa0
[   16.777660]  ? __pfx_kthread+0x10/0x10
[   16.777685]  ret_from_fork+0x116/0x1d0
[   16.777708]  ? __pfx_kthread+0x10/0x10
[   16.777732]  ret_from_fork_asm+0x1a/0x30
[   16.777769]  </TASK>
[   16.777784] 
[   16.786452] Allocated by task 283:
[   16.786613]  kasan_save_stack+0x45/0x70
[   16.786838]  kasan_save_track+0x18/0x40
[   16.787062]  kasan_save_alloc_info+0x3b/0x50
[   16.787324]  __kasan_kmalloc+0xb7/0xc0
[   16.787543]  __kmalloc_cache_noprof+0x189/0x420
[   16.787817]  kasan_atomics+0x95/0x310
[   16.788016]  kunit_try_run_case+0x1a5/0x480
[   16.788253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.788517]  kthread+0x337/0x6f0
[   16.788714]  ret_from_fork+0x116/0x1d0
[   16.788893]  ret_from_fork_asm+0x1a/0x30
[   16.789159] 
[   16.789259] The buggy address belongs to the object at ffff88810392bb00
[   16.789259]  which belongs to the cache kmalloc-64 of size 64
[   16.789667] The buggy address is located 0 bytes to the right of
[   16.789667]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.790099] 
[   16.790188] The buggy address belongs to the physical page:
[   16.790451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.790881] flags: 0x200000000000000(node=0|zone=2)
[   16.791210] page_type: f5(slab)
[   16.791404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.791822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.792101] page dumped because: kasan: bad access detected
[   16.792392] 
[   16.792504] Memory state around the buggy address:
[   16.792764]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.793140]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.793409] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.793663]                                      ^
[   16.793910]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.794509]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.794882] ==================================================================
[   17.799725] ==================================================================
[   17.800245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   17.801233] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.801640] 
[   17.801782] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.801852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.801868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.801897] Call Trace:
[   17.801920]  <TASK>
[   17.801943]  dump_stack_lvl+0x73/0xb0
[   17.801980]  print_report+0xd1/0x650
[   17.802009]  ? __virt_addr_valid+0x1db/0x2d0
[   17.802036]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.802062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.802089]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.802115]  kasan_report+0x141/0x180
[   17.802142]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.802174]  kasan_check_range+0x10c/0x1c0
[   17.802204]  __kasan_check_write+0x18/0x20
[   17.802229]  kasan_atomics_helper+0x20c8/0x5450
[   17.802256]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.802283]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.802313]  ? kasan_atomics+0x152/0x310
[   17.802346]  kasan_atomics+0x1dc/0x310
[   17.802373]  ? __pfx_kasan_atomics+0x10/0x10
[   17.802404]  ? __pfx_read_tsc+0x10/0x10
[   17.802433]  ? ktime_get_ts64+0x86/0x230
[   17.802464]  kunit_try_run_case+0x1a5/0x480
[   17.802493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.802521]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.802552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.802581]  ? __kthread_parkme+0x82/0x180
[   17.802607]  ? preempt_count_sub+0x50/0x80
[   17.802638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.802667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.802697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.802724]  kthread+0x337/0x6f0
[   17.802748]  ? trace_preempt_on+0x20/0xc0
[   17.802776]  ? __pfx_kthread+0x10/0x10
[   17.802969]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.803000]  ? calculate_sigpending+0x7b/0xa0
[   17.803030]  ? __pfx_kthread+0x10/0x10
[   17.803056]  ret_from_fork+0x116/0x1d0
[   17.803081]  ? __pfx_kthread+0x10/0x10
[   17.803107]  ret_from_fork_asm+0x1a/0x30
[   17.803145]  </TASK>
[   17.803160] 
[   17.812021] Allocated by task 283:
[   17.812179]  kasan_save_stack+0x45/0x70
[   17.812346]  kasan_save_track+0x18/0x40
[   17.812495]  kasan_save_alloc_info+0x3b/0x50
[   17.812658]  __kasan_kmalloc+0xb7/0xc0
[   17.812833]  __kmalloc_cache_noprof+0x189/0x420
[   17.814022]  kasan_atomics+0x95/0x310
[   17.814445]  kunit_try_run_case+0x1a5/0x480
[   17.814779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.815114]  kthread+0x337/0x6f0
[   17.815318]  ret_from_fork+0x116/0x1d0
[   17.815540]  ret_from_fork_asm+0x1a/0x30
[   17.815877] 
[   17.815995] The buggy address belongs to the object at ffff88810392bb00
[   17.815995]  which belongs to the cache kmalloc-64 of size 64
[   17.816537] The buggy address is located 0 bytes to the right of
[   17.816537]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.817079] 
[   17.817620] The buggy address belongs to the physical page:
[   17.818194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.818989] flags: 0x200000000000000(node=0|zone=2)
[   17.819245] page_type: f5(slab)
[   17.819430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.819735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.820736] page dumped because: kasan: bad access detected
[   17.821015] 
[   17.821218] Memory state around the buggy address:
[   17.821591]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.821951]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.822439] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.822846]                                      ^
[   17.823134]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.823651]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.824007] ==================================================================
[   16.991219] ==================================================================
[   16.991558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   16.991933] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.992346] 
[   16.992475] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.992524] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.992540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.992566] Call Trace:
[   16.992584]  <TASK>
[   16.992603]  dump_stack_lvl+0x73/0xb0
[   16.992637]  print_report+0xd1/0x650
[   16.992665]  ? __virt_addr_valid+0x1db/0x2d0
[   16.992693]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.992718]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.992745]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.992771]  kasan_report+0x141/0x180
[   16.992811]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.992844]  __asan_report_load4_noabort+0x18/0x20
[   16.992873]  kasan_atomics_helper+0x4a1c/0x5450
[   16.992900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.992927]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.992957]  ? kasan_atomics+0x152/0x310
[   16.992991]  kasan_atomics+0x1dc/0x310
[   16.993018]  ? __pfx_kasan_atomics+0x10/0x10
[   16.993047]  ? __pfx_read_tsc+0x10/0x10
[   16.993073]  ? ktime_get_ts64+0x86/0x230
[   16.993102]  kunit_try_run_case+0x1a5/0x480
[   16.993131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.993157]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.993185]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.993229]  ? __kthread_parkme+0x82/0x180
[   16.993254]  ? preempt_count_sub+0x50/0x80
[   16.993282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.993311]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.993343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.993373]  kthread+0x337/0x6f0
[   16.993399]  ? trace_preempt_on+0x20/0xc0
[   16.993428]  ? __pfx_kthread+0x10/0x10
[   16.993453]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.993479]  ? calculate_sigpending+0x7b/0xa0
[   16.993508]  ? __pfx_kthread+0x10/0x10
[   16.993535]  ret_from_fork+0x116/0x1d0
[   16.993558]  ? __pfx_kthread+0x10/0x10
[   16.993583]  ret_from_fork_asm+0x1a/0x30
[   16.993620]  </TASK>
[   16.993636] 
[   17.006186] Allocated by task 283:
[   17.006673]  kasan_save_stack+0x45/0x70
[   17.007150]  kasan_save_track+0x18/0x40
[   17.007626]  kasan_save_alloc_info+0x3b/0x50
[   17.008071]  __kasan_kmalloc+0xb7/0xc0
[   17.008308]  __kmalloc_cache_noprof+0x189/0x420
[   17.008496]  kasan_atomics+0x95/0x310
[   17.008657]  kunit_try_run_case+0x1a5/0x480
[   17.008871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.009479]  kthread+0x337/0x6f0
[   17.009868]  ret_from_fork+0x116/0x1d0
[   17.010327]  ret_from_fork_asm+0x1a/0x30
[   17.010756] 
[   17.010962] The buggy address belongs to the object at ffff88810392bb00
[   17.010962]  which belongs to the cache kmalloc-64 of size 64
[   17.012399] The buggy address is located 0 bytes to the right of
[   17.012399]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.013721] 
[   17.013823] The buggy address belongs to the physical page:
[   17.014025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.014675] flags: 0x200000000000000(node=0|zone=2)
[   17.015268] page_type: f5(slab)
[   17.015687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.016528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.017343] page dumped because: kasan: bad access detected
[   17.018018] 
[   17.018207] Memory state around the buggy address:
[   17.018681]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.019082]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.019828] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.020448]                                      ^
[   17.020645]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.020920]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.021191] ==================================================================
[   17.825146] ==================================================================
[   17.825779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   17.826315] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.826596] 
[   17.826740] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.826807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.826824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.826854] Call Trace:
[   17.826876]  <TASK>
[   17.826895]  dump_stack_lvl+0x73/0xb0
[   17.826931]  print_report+0xd1/0x650
[   17.826960]  ? __virt_addr_valid+0x1db/0x2d0
[   17.826990]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.827016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.827043]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.827070]  kasan_report+0x141/0x180
[   17.827098]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.827130]  __asan_report_load8_noabort+0x18/0x20
[   17.827158]  kasan_atomics_helper+0x4fb2/0x5450
[   17.827186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.827212]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.827243]  ? kasan_atomics+0x152/0x310
[   17.827276]  kasan_atomics+0x1dc/0x310
[   17.827303]  ? __pfx_kasan_atomics+0x10/0x10
[   17.827332]  ? __pfx_read_tsc+0x10/0x10
[   17.827360]  ? ktime_get_ts64+0x86/0x230
[   17.827389]  kunit_try_run_case+0x1a5/0x480
[   17.827418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.827446]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.827475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.827503]  ? __kthread_parkme+0x82/0x180
[   17.827529]  ? preempt_count_sub+0x50/0x80
[   17.827559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.827587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.827615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.827645]  kthread+0x337/0x6f0
[   17.827669]  ? trace_preempt_on+0x20/0xc0
[   17.827698]  ? __pfx_kthread+0x10/0x10
[   17.827724]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.827751]  ? calculate_sigpending+0x7b/0xa0
[   17.827780]  ? __pfx_kthread+0x10/0x10
[   17.827818]  ret_from_fork+0x116/0x1d0
[   17.827842]  ? __pfx_kthread+0x10/0x10
[   17.827868]  ret_from_fork_asm+0x1a/0x30
[   17.827905]  </TASK>
[   17.827921] 
[   17.836569] Allocated by task 283:
[   17.836757]  kasan_save_stack+0x45/0x70
[   17.836939]  kasan_save_track+0x18/0x40
[   17.837107]  kasan_save_alloc_info+0x3b/0x50
[   17.837371]  __kasan_kmalloc+0xb7/0xc0
[   17.837606]  __kmalloc_cache_noprof+0x189/0x420
[   17.837875]  kasan_atomics+0x95/0x310
[   17.838098]  kunit_try_run_case+0x1a5/0x480
[   17.838329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.838569]  kthread+0x337/0x6f0
[   17.838750]  ret_from_fork+0x116/0x1d0
[   17.838989]  ret_from_fork_asm+0x1a/0x30
[   17.839217] 
[   17.839334] The buggy address belongs to the object at ffff88810392bb00
[   17.839334]  which belongs to the cache kmalloc-64 of size 64
[   17.839859] The buggy address is located 0 bytes to the right of
[   17.839859]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.840479] 
[   17.840582] The buggy address belongs to the physical page:
[   17.840839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.841124] flags: 0x200000000000000(node=0|zone=2)
[   17.841319] page_type: f5(slab)
[   17.841468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.841843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.842286] page dumped because: kasan: bad access detected
[   17.842578] 
[   17.842669] Memory state around the buggy address:
[   17.842863]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.843157]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.843530] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.843914]                                      ^
[   17.844195]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.844512]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.844816] ==================================================================
[   17.592611] ==================================================================
[   17.592996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   17.594203] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.594583] 
[   17.594719] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.594774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.594801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.594828] Call Trace:
[   17.594850]  <TASK>
[   17.594872]  dump_stack_lvl+0x73/0xb0
[   17.594910]  print_report+0xd1/0x650
[   17.594938]  ? __virt_addr_valid+0x1db/0x2d0
[   17.594966]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.594992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.595032]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.595060]  kasan_report+0x141/0x180
[   17.595111]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.595145]  kasan_check_range+0x10c/0x1c0
[   17.595174]  __kasan_check_write+0x18/0x20
[   17.595198]  kasan_atomics_helper+0x1ce1/0x5450
[   17.595226]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.595252]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.595283]  ? kasan_atomics+0x152/0x310
[   17.595314]  kasan_atomics+0x1dc/0x310
[   17.595342]  ? __pfx_kasan_atomics+0x10/0x10
[   17.595371]  ? __pfx_read_tsc+0x10/0x10
[   17.595397]  ? ktime_get_ts64+0x86/0x230
[   17.595429]  kunit_try_run_case+0x1a5/0x480
[   17.595460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.595487]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.595517]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.595545]  ? __kthread_parkme+0x82/0x180
[   17.595570]  ? preempt_count_sub+0x50/0x80
[   17.595598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.595627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.595655]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.595684]  kthread+0x337/0x6f0
[   17.595708]  ? trace_preempt_on+0x20/0xc0
[   17.595737]  ? __pfx_kthread+0x10/0x10
[   17.595762]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.595799]  ? calculate_sigpending+0x7b/0xa0
[   17.595829]  ? __pfx_kthread+0x10/0x10
[   17.595856]  ret_from_fork+0x116/0x1d0
[   17.595881]  ? __pfx_kthread+0x10/0x10
[   17.595909]  ret_from_fork_asm+0x1a/0x30
[   17.595946]  </TASK>
[   17.595963] 
[   17.604882] Allocated by task 283:
[   17.605062]  kasan_save_stack+0x45/0x70
[   17.605321]  kasan_save_track+0x18/0x40
[   17.605538]  kasan_save_alloc_info+0x3b/0x50
[   17.605808]  __kasan_kmalloc+0xb7/0xc0
[   17.606013]  __kmalloc_cache_noprof+0x189/0x420
[   17.606345]  kasan_atomics+0x95/0x310
[   17.606543]  kunit_try_run_case+0x1a5/0x480
[   17.606806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.607080]  kthread+0x337/0x6f0
[   17.607281]  ret_from_fork+0x116/0x1d0
[   17.607492]  ret_from_fork_asm+0x1a/0x30
[   17.607711] 
[   17.607814] The buggy address belongs to the object at ffff88810392bb00
[   17.607814]  which belongs to the cache kmalloc-64 of size 64
[   17.608217] The buggy address is located 0 bytes to the right of
[   17.608217]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.608768] 
[   17.608944] The buggy address belongs to the physical page:
[   17.609379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.609655] flags: 0x200000000000000(node=0|zone=2)
[   17.609884] page_type: f5(slab)
[   17.610081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.610502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.610913] page dumped because: kasan: bad access detected
[   17.611237] 
[   17.611320] Memory state around the buggy address:
[   17.611499]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.611839]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.612426] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.612772]                                      ^
[   17.613006]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.613394]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.613758] ==================================================================
[   17.364538] ==================================================================
[   17.364964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   17.365395] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.365777] 
[   17.365952] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.366039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.366056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.366106] Call Trace:
[   17.366125]  <TASK>
[   17.366146]  dump_stack_lvl+0x73/0xb0
[   17.366184]  print_report+0xd1/0x650
[   17.366211]  ? __virt_addr_valid+0x1db/0x2d0
[   17.366239]  ? kasan_atomics_helper+0x177f/0x5450
[   17.366263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.366290]  ? kasan_atomics_helper+0x177f/0x5450
[   17.366317]  kasan_report+0x141/0x180
[   17.366343]  ? kasan_atomics_helper+0x177f/0x5450
[   17.366374]  kasan_check_range+0x10c/0x1c0
[   17.366403]  __kasan_check_write+0x18/0x20
[   17.366425]  kasan_atomics_helper+0x177f/0x5450
[   17.366452]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.366479]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.366509]  ? kasan_atomics+0x152/0x310
[   17.366539]  kasan_atomics+0x1dc/0x310
[   17.366566]  ? __pfx_kasan_atomics+0x10/0x10
[   17.366595]  ? __pfx_read_tsc+0x10/0x10
[   17.366620]  ? ktime_get_ts64+0x86/0x230
[   17.366648]  kunit_try_run_case+0x1a5/0x480
[   17.366677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.366704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.366758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.366795]  ? __kthread_parkme+0x82/0x180
[   17.366821]  ? preempt_count_sub+0x50/0x80
[   17.366849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.366876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.366903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.366930]  kthread+0x337/0x6f0
[   17.366954]  ? trace_preempt_on+0x20/0xc0
[   17.366983]  ? __pfx_kthread+0x10/0x10
[   17.367008]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.367033]  ? calculate_sigpending+0x7b/0xa0
[   17.367062]  ? __pfx_kthread+0x10/0x10
[   17.367110]  ret_from_fork+0x116/0x1d0
[   17.367133]  ? __pfx_kthread+0x10/0x10
[   17.367158]  ret_from_fork_asm+0x1a/0x30
[   17.367195]  </TASK>
[   17.367210] 
[   17.375890] Allocated by task 283:
[   17.376118]  kasan_save_stack+0x45/0x70
[   17.376288]  kasan_save_track+0x18/0x40
[   17.376533]  kasan_save_alloc_info+0x3b/0x50
[   17.376776]  __kasan_kmalloc+0xb7/0xc0
[   17.376996]  __kmalloc_cache_noprof+0x189/0x420
[   17.377249]  kasan_atomics+0x95/0x310
[   17.377477]  kunit_try_run_case+0x1a5/0x480
[   17.377721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.378019]  kthread+0x337/0x6f0
[   17.378264]  ret_from_fork+0x116/0x1d0
[   17.378455]  ret_from_fork_asm+0x1a/0x30
[   17.378621] 
[   17.378710] The buggy address belongs to the object at ffff88810392bb00
[   17.378710]  which belongs to the cache kmalloc-64 of size 64
[   17.379290] The buggy address is located 0 bytes to the right of
[   17.379290]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.379935] 
[   17.380050] The buggy address belongs to the physical page:
[   17.380343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.380629] flags: 0x200000000000000(node=0|zone=2)
[   17.380918] page_type: f5(slab)
[   17.381179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.381591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.381965] page dumped because: kasan: bad access detected
[   17.382229] 
[   17.382342] Memory state around the buggy address:
[   17.382610]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.382959]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.383366] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.383715]                                      ^
[   17.383976]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.384281]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.384615] ==================================================================
[   16.287936] ==================================================================
[   16.288845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   16.289670] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.290425] 
[   16.290609] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.290667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.290684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.290711] Call Trace:
[   16.290726]  <TASK>
[   16.290748]  dump_stack_lvl+0x73/0xb0
[   16.290802]  print_report+0xd1/0x650
[   16.290829]  ? __virt_addr_valid+0x1db/0x2d0
[   16.290895]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.290920]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.290958]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.290984]  kasan_report+0x141/0x180
[   16.291009]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.291039]  __asan_report_load4_noabort+0x18/0x20
[   16.291065]  kasan_atomics_helper+0x4bbc/0x5450
[   16.291113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.291205]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.291240]  ? kasan_atomics+0x152/0x310
[   16.291270]  kasan_atomics+0x1dc/0x310
[   16.291297]  ? __pfx_kasan_atomics+0x10/0x10
[   16.291326]  ? __pfx_read_tsc+0x10/0x10
[   16.291351]  ? ktime_get_ts64+0x86/0x230
[   16.291380]  kunit_try_run_case+0x1a5/0x480
[   16.291410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.291435]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.291465]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.291491]  ? __kthread_parkme+0x82/0x180
[   16.291515]  ? preempt_count_sub+0x50/0x80
[   16.291542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.291569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.291594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.291621]  kthread+0x337/0x6f0
[   16.291642]  ? trace_preempt_on+0x20/0xc0
[   16.291669]  ? __pfx_kthread+0x10/0x10
[   16.291692]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.291716]  ? calculate_sigpending+0x7b/0xa0
[   16.291745]  ? __pfx_kthread+0x10/0x10
[   16.291769]  ret_from_fork+0x116/0x1d0
[   16.291803]  ? __pfx_kthread+0x10/0x10
[   16.291827]  ret_from_fork_asm+0x1a/0x30
[   16.291864]  </TASK>
[   16.291878] 
[   16.302971] Allocated by task 283:
[   16.303471]  kasan_save_stack+0x45/0x70
[   16.303710]  kasan_save_track+0x18/0x40
[   16.304001]  kasan_save_alloc_info+0x3b/0x50
[   16.304195]  __kasan_kmalloc+0xb7/0xc0
[   16.304731]  __kmalloc_cache_noprof+0x189/0x420
[   16.304989]  kasan_atomics+0x95/0x310
[   16.305347]  kunit_try_run_case+0x1a5/0x480
[   16.305552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.305810]  kthread+0x337/0x6f0
[   16.306006]  ret_from_fork+0x116/0x1d0
[   16.306459]  ret_from_fork_asm+0x1a/0x30
[   16.306740] 
[   16.306847] The buggy address belongs to the object at ffff88810392bb00
[   16.306847]  which belongs to the cache kmalloc-64 of size 64
[   16.307755] The buggy address is located 0 bytes to the right of
[   16.307755]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.308578] 
[   16.308703] The buggy address belongs to the physical page:
[   16.309011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.309540] flags: 0x200000000000000(node=0|zone=2)
[   16.309894] page_type: f5(slab)
[   16.310103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.310611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.311023] page dumped because: kasan: bad access detected
[   16.311510] 
[   16.311632] Memory state around the buggy address:
[   16.311995]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.312391]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.313007] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.313560]                                      ^
[   16.313840]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.314379]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.314706] ==================================================================
[   17.913940] ==================================================================
[   17.914677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   17.915005] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.915509] 
[   17.915635] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.915686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.915702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.915730] Call Trace:
[   17.915751]  <TASK>
[   17.915772]  dump_stack_lvl+0x73/0xb0
[   17.915821]  print_report+0xd1/0x650
[   17.915848]  ? __virt_addr_valid+0x1db/0x2d0
[   17.915875]  ? kasan_atomics_helper+0x5115/0x5450
[   17.915902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.915927]  ? kasan_atomics_helper+0x5115/0x5450
[   17.915953]  kasan_report+0x141/0x180
[   17.915981]  ? kasan_atomics_helper+0x5115/0x5450
[   17.916013]  __asan_report_load8_noabort+0x18/0x20
[   17.916042]  kasan_atomics_helper+0x5115/0x5450
[   17.916070]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.916096]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.916130]  ? kasan_atomics+0x152/0x310
[   17.916163]  kasan_atomics+0x1dc/0x310
[   17.916190]  ? __pfx_kasan_atomics+0x10/0x10
[   17.916219]  ? __pfx_read_tsc+0x10/0x10
[   17.916244]  ? ktime_get_ts64+0x86/0x230
[   17.916273]  kunit_try_run_case+0x1a5/0x480
[   17.916302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.916329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.916357]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.916385]  ? __kthread_parkme+0x82/0x180
[   17.916411]  ? preempt_count_sub+0x50/0x80
[   17.916440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.916469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.916497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.916525]  kthread+0x337/0x6f0
[   17.916548]  ? trace_preempt_on+0x20/0xc0
[   17.916577]  ? __pfx_kthread+0x10/0x10
[   17.916602]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.916629]  ? calculate_sigpending+0x7b/0xa0
[   17.916658]  ? __pfx_kthread+0x10/0x10
[   17.916683]  ret_from_fork+0x116/0x1d0
[   17.916707]  ? __pfx_kthread+0x10/0x10
[   17.916732]  ret_from_fork_asm+0x1a/0x30
[   17.916769]  </TASK>
[   17.916783] 
[   17.928953] Allocated by task 283:
[   17.929429]  kasan_save_stack+0x45/0x70
[   17.929670]  kasan_save_track+0x18/0x40
[   17.929905]  kasan_save_alloc_info+0x3b/0x50
[   17.930407]  __kasan_kmalloc+0xb7/0xc0
[   17.930667]  __kmalloc_cache_noprof+0x189/0x420
[   17.931106]  kasan_atomics+0x95/0x310
[   17.931457]  kunit_try_run_case+0x1a5/0x480
[   17.931854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.932336]  kthread+0x337/0x6f0
[   17.932631]  ret_from_fork+0x116/0x1d0
[   17.932977]  ret_from_fork_asm+0x1a/0x30
[   17.933322] 
[   17.933592] The buggy address belongs to the object at ffff88810392bb00
[   17.933592]  which belongs to the cache kmalloc-64 of size 64
[   17.934401] The buggy address is located 0 bytes to the right of
[   17.934401]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.935481] 
[   17.935604] The buggy address belongs to the physical page:
[   17.935889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.936568] flags: 0x200000000000000(node=0|zone=2)
[   17.937075] page_type: f5(slab)
[   17.937435] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.937825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.938453] page dumped because: kasan: bad access detected
[   17.938975] 
[   17.939273] Memory state around the buggy address:
[   17.939725]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.940287]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.940802] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.941406]                                      ^
[   17.941742]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.942379]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.942730] ==================================================================
[   16.732986] ==================================================================
[   16.733400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   16.733700] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.734088] 
[   16.734225] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.734277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.734293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.734320] Call Trace:
[   16.734340]  <TASK>
[   16.734357]  dump_stack_lvl+0x73/0xb0
[   16.734393]  print_report+0xd1/0x650
[   16.734420]  ? __virt_addr_valid+0x1db/0x2d0
[   16.734449]  ? kasan_atomics_helper+0xac7/0x5450
[   16.734473]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.734500]  ? kasan_atomics_helper+0xac7/0x5450
[   16.734525]  kasan_report+0x141/0x180
[   16.734552]  ? kasan_atomics_helper+0xac7/0x5450
[   16.734584]  kasan_check_range+0x10c/0x1c0
[   16.734612]  __kasan_check_write+0x18/0x20
[   16.734636]  kasan_atomics_helper+0xac7/0x5450
[   16.734663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.734690]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.734721]  ? kasan_atomics+0x152/0x310
[   16.734752]  kasan_atomics+0x1dc/0x310
[   16.734780]  ? __pfx_kasan_atomics+0x10/0x10
[   16.734822]  ? __pfx_read_tsc+0x10/0x10
[   16.734848]  ? ktime_get_ts64+0x86/0x230
[   16.734876]  kunit_try_run_case+0x1a5/0x480
[   16.734907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.734933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.734962]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.734990]  ? __kthread_parkme+0x82/0x180
[   16.735015]  ? preempt_count_sub+0x50/0x80
[   16.735043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.735072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.735114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.735142]  kthread+0x337/0x6f0
[   16.735166]  ? trace_preempt_on+0x20/0xc0
[   16.735194]  ? __pfx_kthread+0x10/0x10
[   16.735219]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.735245]  ? calculate_sigpending+0x7b/0xa0
[   16.735275]  ? __pfx_kthread+0x10/0x10
[   16.735300]  ret_from_fork+0x116/0x1d0
[   16.735323]  ? __pfx_kthread+0x10/0x10
[   16.735348]  ret_from_fork_asm+0x1a/0x30
[   16.735385]  </TASK>
[   16.735399] 
[   16.744040] Allocated by task 283:
[   16.744276]  kasan_save_stack+0x45/0x70
[   16.744440]  kasan_save_track+0x18/0x40
[   16.744663]  kasan_save_alloc_info+0x3b/0x50
[   16.744921]  __kasan_kmalloc+0xb7/0xc0
[   16.745151]  __kmalloc_cache_noprof+0x189/0x420
[   16.745350]  kasan_atomics+0x95/0x310
[   16.745506]  kunit_try_run_case+0x1a5/0x480
[   16.745676]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.745889]  kthread+0x337/0x6f0
[   16.746050]  ret_from_fork+0x116/0x1d0
[   16.746426]  ret_from_fork_asm+0x1a/0x30
[   16.746664] 
[   16.746784] The buggy address belongs to the object at ffff88810392bb00
[   16.746784]  which belongs to the cache kmalloc-64 of size 64
[   16.747425] The buggy address is located 0 bytes to the right of
[   16.747425]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.748204] 
[   16.748326] The buggy address belongs to the physical page:
[   16.748564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.748880] flags: 0x200000000000000(node=0|zone=2)
[   16.749070] page_type: f5(slab)
[   16.749456] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.750101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.750483] page dumped because: kasan: bad access detected
[   16.750684] 
[   16.750767] Memory state around the buggy address:
[   16.750957]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.751277]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.751641] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.752124]                                      ^
[   16.752318]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.752566]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.752819] ==================================================================
[   17.022308] ==================================================================
[   17.023053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   17.023916] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.024778] 
[   17.025128] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.025200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.025216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.025258] Call Trace:
[   17.025283]  <TASK>
[   17.025306]  dump_stack_lvl+0x73/0xb0
[   17.025350]  print_report+0xd1/0x650
[   17.025391]  ? __virt_addr_valid+0x1db/0x2d0
[   17.025421]  ? kasan_atomics_helper+0x1148/0x5450
[   17.025447]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.025488]  ? kasan_atomics_helper+0x1148/0x5450
[   17.025515]  kasan_report+0x141/0x180
[   17.025542]  ? kasan_atomics_helper+0x1148/0x5450
[   17.025573]  kasan_check_range+0x10c/0x1c0
[   17.025603]  __kasan_check_write+0x18/0x20
[   17.025627]  kasan_atomics_helper+0x1148/0x5450
[   17.025656]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.025683]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.025714]  ? kasan_atomics+0x152/0x310
[   17.025748]  kasan_atomics+0x1dc/0x310
[   17.025775]  ? __pfx_kasan_atomics+0x10/0x10
[   17.025818]  ? __pfx_read_tsc+0x10/0x10
[   17.025844]  ? ktime_get_ts64+0x86/0x230
[   17.025874]  kunit_try_run_case+0x1a5/0x480
[   17.025904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.025931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.025960]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.025989]  ? __kthread_parkme+0x82/0x180
[   17.026014]  ? preempt_count_sub+0x50/0x80
[   17.026044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.026073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.026113]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.026141]  kthread+0x337/0x6f0
[   17.026165]  ? trace_preempt_on+0x20/0xc0
[   17.026194]  ? __pfx_kthread+0x10/0x10
[   17.026219]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.026245]  ? calculate_sigpending+0x7b/0xa0
[   17.026274]  ? __pfx_kthread+0x10/0x10
[   17.026300]  ret_from_fork+0x116/0x1d0
[   17.026323]  ? __pfx_kthread+0x10/0x10
[   17.026348]  ret_from_fork_asm+0x1a/0x30
[   17.026386]  </TASK>
[   17.026402] 
[   17.039155] Allocated by task 283:
[   17.039379]  kasan_save_stack+0x45/0x70
[   17.039604]  kasan_save_track+0x18/0x40
[   17.039831]  kasan_save_alloc_info+0x3b/0x50
[   17.040062]  __kasan_kmalloc+0xb7/0xc0
[   17.040645]  __kmalloc_cache_noprof+0x189/0x420
[   17.041107]  kasan_atomics+0x95/0x310
[   17.041323]  kunit_try_run_case+0x1a5/0x480
[   17.041554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.041836]  kthread+0x337/0x6f0
[   17.042021]  ret_from_fork+0x116/0x1d0
[   17.042696]  ret_from_fork_asm+0x1a/0x30
[   17.043005] 
[   17.043299] The buggy address belongs to the object at ffff88810392bb00
[   17.043299]  which belongs to the cache kmalloc-64 of size 64
[   17.044399] The buggy address is located 0 bytes to the right of
[   17.044399]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.045012] 
[   17.045422] The buggy address belongs to the physical page:
[   17.045937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.046601] flags: 0x200000000000000(node=0|zone=2)
[   17.046883] page_type: f5(slab)
[   17.047071] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.047443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.048112] page dumped because: kasan: bad access detected
[   17.048635] 
[   17.048917] Memory state around the buggy address:
[   17.049429]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.050108]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.050852] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.051369]                                      ^
[   17.051621]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.051971]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.052607] ==================================================================
[   17.865995] ==================================================================
[   17.867300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   17.867681] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.868034] 
[   17.868200] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.868251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.868266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.868292] Call Trace:
[   17.868314]  <TASK>
[   17.868334]  dump_stack_lvl+0x73/0xb0
[   17.868370]  print_report+0xd1/0x650
[   17.868398]  ? __virt_addr_valid+0x1db/0x2d0
[   17.868424]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.868450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.868477]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.868502]  kasan_report+0x141/0x180
[   17.868529]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.868561]  __asan_report_load8_noabort+0x18/0x20
[   17.868591]  kasan_atomics_helper+0x4fa5/0x5450
[   17.868618]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.868644]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.868674]  ? kasan_atomics+0x152/0x310
[   17.868706]  kasan_atomics+0x1dc/0x310
[   17.868733]  ? __pfx_kasan_atomics+0x10/0x10
[   17.868762]  ? __pfx_read_tsc+0x10/0x10
[   17.868802]  ? ktime_get_ts64+0x86/0x230
[   17.868832]  kunit_try_run_case+0x1a5/0x480
[   17.868861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.868887]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.868917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.868945]  ? __kthread_parkme+0x82/0x180
[   17.868970]  ? preempt_count_sub+0x50/0x80
[   17.868999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.869027]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.869055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.869094]  kthread+0x337/0x6f0
[   17.869119]  ? trace_preempt_on+0x20/0xc0
[   17.869146]  ? __pfx_kthread+0x10/0x10
[   17.869172]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.869197]  ? calculate_sigpending+0x7b/0xa0
[   17.869226]  ? __pfx_kthread+0x10/0x10
[   17.869251]  ret_from_fork+0x116/0x1d0
[   17.869274]  ? __pfx_kthread+0x10/0x10
[   17.869299]  ret_from_fork_asm+0x1a/0x30
[   17.869342]  </TASK>
[   17.869356] 
[   17.880945] Allocated by task 283:
[   17.881306]  kasan_save_stack+0x45/0x70
[   17.881509]  kasan_save_track+0x18/0x40
[   17.881740]  kasan_save_alloc_info+0x3b/0x50
[   17.881989]  __kasan_kmalloc+0xb7/0xc0
[   17.882184]  __kmalloc_cache_noprof+0x189/0x420
[   17.882699]  kasan_atomics+0x95/0x310
[   17.882986]  kunit_try_run_case+0x1a5/0x480
[   17.883299]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.883648]  kthread+0x337/0x6f0
[   17.883876]  ret_from_fork+0x116/0x1d0
[   17.884249]  ret_from_fork_asm+0x1a/0x30
[   17.884476] 
[   17.884577] The buggy address belongs to the object at ffff88810392bb00
[   17.884577]  which belongs to the cache kmalloc-64 of size 64
[   17.885474] The buggy address is located 0 bytes to the right of
[   17.885474]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.886148] 
[   17.886245] The buggy address belongs to the physical page:
[   17.886541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.886949] flags: 0x200000000000000(node=0|zone=2)
[   17.887510] page_type: f5(slab)
[   17.887682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.888303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.888751] page dumped because: kasan: bad access detected
[   17.889024] 
[   17.889329] Memory state around the buggy address:
[   17.889581]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.890103]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.890562] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.890949]                                      ^
[   17.891319]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.891810]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.892285] ==================================================================
[   17.385598] ==================================================================
[   17.385993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   17.386358] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.386702] 
[   17.386852] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.386905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.386922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.386949] Call Trace:
[   17.386971]  <TASK>
[   17.386992]  dump_stack_lvl+0x73/0xb0
[   17.387028]  print_report+0xd1/0x650
[   17.387055]  ? __virt_addr_valid+0x1db/0x2d0
[   17.387081]  ? kasan_atomics_helper+0x1818/0x5450
[   17.387107]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.387133]  ? kasan_atomics_helper+0x1818/0x5450
[   17.387158]  kasan_report+0x141/0x180
[   17.387185]  ? kasan_atomics_helper+0x1818/0x5450
[   17.387216]  kasan_check_range+0x10c/0x1c0
[   17.387244]  __kasan_check_write+0x18/0x20
[   17.387267]  kasan_atomics_helper+0x1818/0x5450
[   17.387293]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.387319]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.387349]  ? kasan_atomics+0x152/0x310
[   17.387421]  kasan_atomics+0x1dc/0x310
[   17.387449]  ? __pfx_kasan_atomics+0x10/0x10
[   17.387492]  ? __pfx_read_tsc+0x10/0x10
[   17.387518]  ? ktime_get_ts64+0x86/0x230
[   17.387546]  kunit_try_run_case+0x1a5/0x480
[   17.387574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.387601]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.387630]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.387656]  ? __kthread_parkme+0x82/0x180
[   17.387681]  ? preempt_count_sub+0x50/0x80
[   17.387710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.387737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.387808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.387838]  kthread+0x337/0x6f0
[   17.387864]  ? trace_preempt_on+0x20/0xc0
[   17.387893]  ? __pfx_kthread+0x10/0x10
[   17.387919]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.387945]  ? calculate_sigpending+0x7b/0xa0
[   17.387974]  ? __pfx_kthread+0x10/0x10
[   17.387999]  ret_from_fork+0x116/0x1d0
[   17.388022]  ? __pfx_kthread+0x10/0x10
[   17.388048]  ret_from_fork_asm+0x1a/0x30
[   17.388105]  </TASK>
[   17.388119] 
[   17.396293] Allocated by task 283:
[   17.396445]  kasan_save_stack+0x45/0x70
[   17.396615]  kasan_save_track+0x18/0x40
[   17.396822]  kasan_save_alloc_info+0x3b/0x50
[   17.397067]  __kasan_kmalloc+0xb7/0xc0
[   17.397308]  __kmalloc_cache_noprof+0x189/0x420
[   17.397577]  kasan_atomics+0x95/0x310
[   17.397809]  kunit_try_run_case+0x1a5/0x480
[   17.398021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.398313]  kthread+0x337/0x6f0
[   17.398511]  ret_from_fork+0x116/0x1d0
[   17.398715]  ret_from_fork_asm+0x1a/0x30
[   17.398917] 
[   17.399036] The buggy address belongs to the object at ffff88810392bb00
[   17.399036]  which belongs to the cache kmalloc-64 of size 64
[   17.399557] The buggy address is located 0 bytes to the right of
[   17.399557]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.400158] 
[   17.400250] The buggy address belongs to the physical page:
[   17.400451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.400730] flags: 0x200000000000000(node=0|zone=2)
[   17.400933] page_type: f5(slab)
[   17.401134] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.401536] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.401928] page dumped because: kasan: bad access detected
[   17.402251] 
[   17.402365] Memory state around the buggy address:
[   17.402551]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.402809]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.403062] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.403447]                                      ^
[   17.403708]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.404104]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.404473] ==================================================================
[   16.795665] ==================================================================
[   16.796055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   16.798033] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.800605] 
[   16.800740] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.800817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.800834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.800863] Call Trace:
[   16.800888]  <TASK>
[   16.800912]  dump_stack_lvl+0x73/0xb0
[   16.800955]  print_report+0xd1/0x650
[   16.800983]  ? __virt_addr_valid+0x1db/0x2d0
[   16.801012]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.801039]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.801066]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.801502]  kasan_report+0x141/0x180
[   16.801535]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.801569]  __asan_report_load4_noabort+0x18/0x20
[   16.801600]  kasan_atomics_helper+0x4a84/0x5450
[   16.801628]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.801656]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.801689]  ? kasan_atomics+0x152/0x310
[   16.801722]  kasan_atomics+0x1dc/0x310
[   16.801749]  ? __pfx_kasan_atomics+0x10/0x10
[   16.801778]  ? __pfx_read_tsc+0x10/0x10
[   16.801819]  ? ktime_get_ts64+0x86/0x230
[   16.801849]  kunit_try_run_case+0x1a5/0x480
[   16.801877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.801906]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.801937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.801964]  ? __kthread_parkme+0x82/0x180
[   16.801990]  ? preempt_count_sub+0x50/0x80
[   16.802022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.802051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.802125]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.802285]  kthread+0x337/0x6f0
[   16.802313]  ? trace_preempt_on+0x20/0xc0
[   16.802343]  ? __pfx_kthread+0x10/0x10
[   16.802368]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.802395]  ? calculate_sigpending+0x7b/0xa0
[   16.802425]  ? __pfx_kthread+0x10/0x10
[   16.802450]  ret_from_fork+0x116/0x1d0
[   16.802477]  ? __pfx_kthread+0x10/0x10
[   16.802503]  ret_from_fork_asm+0x1a/0x30
[   16.802540]  </TASK>
[   16.802558] 
[   16.814698] Allocated by task 283:
[   16.815116]  kasan_save_stack+0x45/0x70
[   16.815373]  kasan_save_track+0x18/0x40
[   16.815531]  kasan_save_alloc_info+0x3b/0x50
[   16.815701]  __kasan_kmalloc+0xb7/0xc0
[   16.815869]  __kmalloc_cache_noprof+0x189/0x420
[   16.816051]  kasan_atomics+0x95/0x310
[   16.816769]  kunit_try_run_case+0x1a5/0x480
[   16.817349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.818001]  kthread+0x337/0x6f0
[   16.818479]  ret_from_fork+0x116/0x1d0
[   16.819032]  ret_from_fork_asm+0x1a/0x30
[   16.819641] 
[   16.819968] The buggy address belongs to the object at ffff88810392bb00
[   16.819968]  which belongs to the cache kmalloc-64 of size 64
[   16.821286] The buggy address is located 0 bytes to the right of
[   16.821286]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.822022] 
[   16.822137] The buggy address belongs to the physical page:
[   16.822692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.823521] flags: 0x200000000000000(node=0|zone=2)
[   16.824062] page_type: f5(slab)
[   16.824365] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.824625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.825620] page dumped because: kasan: bad access detected
[   16.826202] 
[   16.826408] Memory state around the buggy address:
[   16.826902]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.827169]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.827415] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.827653]                                      ^
[   16.827842]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.828083]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.828753] ==================================================================
[   17.686156] ==================================================================
[   17.686577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   17.686865] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.687272] 
[   17.687410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.687476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.687491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.687532] Call Trace:
[   17.687555]  <TASK>
[   17.687576]  dump_stack_lvl+0x73/0xb0
[   17.687612]  print_report+0xd1/0x650
[   17.687640]  ? __virt_addr_valid+0x1db/0x2d0
[   17.687669]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.687695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.687724]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.687762]  kasan_report+0x141/0x180
[   17.687807]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.687840]  kasan_check_range+0x10c/0x1c0
[   17.687869]  __kasan_check_write+0x18/0x20
[   17.687893]  kasan_atomics_helper+0x1f43/0x5450
[   17.687920]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.687947]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.687978]  ? kasan_atomics+0x152/0x310
[   17.688011]  kasan_atomics+0x1dc/0x310
[   17.688039]  ? __pfx_kasan_atomics+0x10/0x10
[   17.688069]  ? __pfx_read_tsc+0x10/0x10
[   17.688095]  ? ktime_get_ts64+0x86/0x230
[   17.688125]  kunit_try_run_case+0x1a5/0x480
[   17.688156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.688184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.688213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.688243]  ? __kthread_parkme+0x82/0x180
[   17.688270]  ? preempt_count_sub+0x50/0x80
[   17.688300]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.688330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.688358]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.688387]  kthread+0x337/0x6f0
[   17.688410]  ? trace_preempt_on+0x20/0xc0
[   17.688439]  ? __pfx_kthread+0x10/0x10
[   17.688465]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.688491]  ? calculate_sigpending+0x7b/0xa0
[   17.688520]  ? __pfx_kthread+0x10/0x10
[   17.688548]  ret_from_fork+0x116/0x1d0
[   17.688572]  ? __pfx_kthread+0x10/0x10
[   17.688596]  ret_from_fork_asm+0x1a/0x30
[   17.688645]  </TASK>
[   17.688659] 
[   17.705069] Allocated by task 283:
[   17.705846]  kasan_save_stack+0x45/0x70
[   17.706235]  kasan_save_track+0x18/0x40
[   17.706556]  kasan_save_alloc_info+0x3b/0x50
[   17.706920]  __kasan_kmalloc+0xb7/0xc0
[   17.707263]  __kmalloc_cache_noprof+0x189/0x420
[   17.707529]  kasan_atomics+0x95/0x310
[   17.707943]  kunit_try_run_case+0x1a5/0x480
[   17.708281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.708566]  kthread+0x337/0x6f0
[   17.708903]  ret_from_fork+0x116/0x1d0
[   17.709273]  ret_from_fork_asm+0x1a/0x30
[   17.709595] 
[   17.709739] The buggy address belongs to the object at ffff88810392bb00
[   17.709739]  which belongs to the cache kmalloc-64 of size 64
[   17.710686] The buggy address is located 0 bytes to the right of
[   17.710686]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.711505] 
[   17.711631] The buggy address belongs to the physical page:
[   17.712097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.712632] flags: 0x200000000000000(node=0|zone=2)
[   17.713025] page_type: f5(slab)
[   17.713284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.713842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.714352] page dumped because: kasan: bad access detected
[   17.714612] 
[   17.714734] Memory state around the buggy address:
[   17.715012]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.715415]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.715746] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.716105]                                      ^
[   17.716313]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.716659]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.717019] ==================================================================
[   17.845575] ==================================================================
[   17.846007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   17.846657] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.847027] 
[   17.847209] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.847262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.847278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.847305] Call Trace:
[   17.847326]  <TASK>
[   17.847347]  dump_stack_lvl+0x73/0xb0
[   17.847381]  print_report+0xd1/0x650
[   17.847410]  ? __virt_addr_valid+0x1db/0x2d0
[   17.847438]  ? kasan_atomics_helper+0x218a/0x5450
[   17.847463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.847492]  ? kasan_atomics_helper+0x218a/0x5450
[   17.847519]  kasan_report+0x141/0x180
[   17.847548]  ? kasan_atomics_helper+0x218a/0x5450
[   17.847583]  kasan_check_range+0x10c/0x1c0
[   17.847613]  __kasan_check_write+0x18/0x20
[   17.847637]  kasan_atomics_helper+0x218a/0x5450
[   17.847666]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.847695]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.847726]  ? kasan_atomics+0x152/0x310
[   17.847759]  kasan_atomics+0x1dc/0x310
[   17.847800]  ? __pfx_kasan_atomics+0x10/0x10
[   17.847833]  ? __pfx_read_tsc+0x10/0x10
[   17.847860]  ? ktime_get_ts64+0x86/0x230
[   17.847889]  kunit_try_run_case+0x1a5/0x480
[   17.847918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.847945]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.847975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.848003]  ? __kthread_parkme+0x82/0x180
[   17.848029]  ? preempt_count_sub+0x50/0x80
[   17.848059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.848088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.848130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.848159]  kthread+0x337/0x6f0
[   17.848184]  ? trace_preempt_on+0x20/0xc0
[   17.848212]  ? __pfx_kthread+0x10/0x10
[   17.848237]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.848263]  ? calculate_sigpending+0x7b/0xa0
[   17.848292]  ? __pfx_kthread+0x10/0x10
[   17.848319]  ret_from_fork+0x116/0x1d0
[   17.848342]  ? __pfx_kthread+0x10/0x10
[   17.848367]  ret_from_fork_asm+0x1a/0x30
[   17.848405]  </TASK>
[   17.848420] 
[   17.857248] Allocated by task 283:
[   17.857469]  kasan_save_stack+0x45/0x70
[   17.857686]  kasan_save_track+0x18/0x40
[   17.857891]  kasan_save_alloc_info+0x3b/0x50
[   17.858120]  __kasan_kmalloc+0xb7/0xc0
[   17.858289]  __kmalloc_cache_noprof+0x189/0x420
[   17.858543]  kasan_atomics+0x95/0x310
[   17.858728]  kunit_try_run_case+0x1a5/0x480
[   17.858923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.859126]  kthread+0x337/0x6f0
[   17.859317]  ret_from_fork+0x116/0x1d0
[   17.859539]  ret_from_fork_asm+0x1a/0x30
[   17.859771] 
[   17.859991] The buggy address belongs to the object at ffff88810392bb00
[   17.859991]  which belongs to the cache kmalloc-64 of size 64
[   17.860455] The buggy address is located 0 bytes to the right of
[   17.860455]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.861076] 
[   17.861197] The buggy address belongs to the physical page:
[   17.861466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.861774] flags: 0x200000000000000(node=0|zone=2)
[   17.861972] page_type: f5(slab)
[   17.862113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.862375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.862743] page dumped because: kasan: bad access detected
[   17.863053] 
[   17.863226] Memory state around the buggy address:
[   17.863481]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.863749]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.864136] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.864436]                                      ^
[   17.864612]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.864870]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.865299] ==================================================================
[   16.552809] ==================================================================
[   16.553120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   16.553530] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.554354] 
[   16.554468] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.554521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.554538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.554564] Call Trace:
[   16.554582]  <TASK>
[   16.554654]  dump_stack_lvl+0x73/0xb0
[   16.554723]  print_report+0xd1/0x650
[   16.554781]  ? __virt_addr_valid+0x1db/0x2d0
[   16.554850]  ? kasan_atomics_helper+0x697/0x5450
[   16.554876]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.554957]  ? kasan_atomics_helper+0x697/0x5450
[   16.554983]  kasan_report+0x141/0x180
[   16.555036]  ? kasan_atomics_helper+0x697/0x5450
[   16.555112]  kasan_check_range+0x10c/0x1c0
[   16.555141]  __kasan_check_write+0x18/0x20
[   16.555166]  kasan_atomics_helper+0x697/0x5450
[   16.555193]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.555220]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.555252]  ? kasan_atomics+0x152/0x310
[   16.555283]  kasan_atomics+0x1dc/0x310
[   16.555311]  ? __pfx_kasan_atomics+0x10/0x10
[   16.555341]  ? __pfx_read_tsc+0x10/0x10
[   16.555367]  ? ktime_get_ts64+0x86/0x230
[   16.555396]  kunit_try_run_case+0x1a5/0x480
[   16.555426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.555453]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.555482]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.555510]  ? __kthread_parkme+0x82/0x180
[   16.555534]  ? preempt_count_sub+0x50/0x80
[   16.555562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.555591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.555618]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.555646]  kthread+0x337/0x6f0
[   16.555669]  ? trace_preempt_on+0x20/0xc0
[   16.555697]  ? __pfx_kthread+0x10/0x10
[   16.555722]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.555747]  ? calculate_sigpending+0x7b/0xa0
[   16.555776]  ? __pfx_kthread+0x10/0x10
[   16.555815]  ret_from_fork+0x116/0x1d0
[   16.555838]  ? __pfx_kthread+0x10/0x10
[   16.555864]  ret_from_fork_asm+0x1a/0x30
[   16.555900]  </TASK>
[   16.555916] 
[   16.564716] Allocated by task 283:
[   16.565197]  kasan_save_stack+0x45/0x70
[   16.565508]  kasan_save_track+0x18/0x40
[   16.565837]  kasan_save_alloc_info+0x3b/0x50
[   16.566104]  __kasan_kmalloc+0xb7/0xc0
[   16.566320]  __kmalloc_cache_noprof+0x189/0x420
[   16.566578]  kasan_atomics+0x95/0x310
[   16.566898]  kunit_try_run_case+0x1a5/0x480
[   16.567107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.567305]  kthread+0x337/0x6f0
[   16.567442]  ret_from_fork+0x116/0x1d0
[   16.567708]  ret_from_fork_asm+0x1a/0x30
[   16.568210] 
[   16.568327] The buggy address belongs to the object at ffff88810392bb00
[   16.568327]  which belongs to the cache kmalloc-64 of size 64
[   16.569039] The buggy address is located 0 bytes to the right of
[   16.569039]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.569775] 
[   16.569921] The buggy address belongs to the physical page:
[   16.570144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.570546] flags: 0x200000000000000(node=0|zone=2)
[   16.571055] page_type: f5(slab)
[   16.571326] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.571645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.572157] page dumped because: kasan: bad access detected
[   16.572463] 
[   16.572574] Memory state around the buggy address:
[   16.572869]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.573212]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.573541] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.573883]                                      ^
[   16.574119]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.574449]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.574856] ==================================================================
[   17.637962] ==================================================================
[   17.638867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   17.639897] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.640718] 
[   17.640953] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.641008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.641024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.641052] Call Trace:
[   17.641074]  <TASK>
[   17.641137]  dump_stack_lvl+0x73/0xb0
[   17.641175]  print_report+0xd1/0x650
[   17.641218]  ? __virt_addr_valid+0x1db/0x2d0
[   17.641246]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.641272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.641299]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.641326]  kasan_report+0x141/0x180
[   17.641359]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.641390]  kasan_check_range+0x10c/0x1c0
[   17.641419]  __kasan_check_write+0x18/0x20
[   17.641443]  kasan_atomics_helper+0x1e12/0x5450
[   17.641470]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.641498]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.641527]  ? kasan_atomics+0x152/0x310
[   17.641560]  kasan_atomics+0x1dc/0x310
[   17.641588]  ? __pfx_kasan_atomics+0x10/0x10
[   17.641617]  ? __pfx_read_tsc+0x10/0x10
[   17.641642]  ? ktime_get_ts64+0x86/0x230
[   17.641672]  kunit_try_run_case+0x1a5/0x480
[   17.641701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.641728]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.641757]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.641785]  ? __kthread_parkme+0x82/0x180
[   17.641821]  ? preempt_count_sub+0x50/0x80
[   17.641850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.641878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.641909]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.641935]  kthread+0x337/0x6f0
[   17.641958]  ? trace_preempt_on+0x20/0xc0
[   17.641987]  ? __pfx_kthread+0x10/0x10
[   17.642011]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.642036]  ? calculate_sigpending+0x7b/0xa0
[   17.642066]  ? __pfx_kthread+0x10/0x10
[   17.642105]  ret_from_fork+0x116/0x1d0
[   17.642129]  ? __pfx_kthread+0x10/0x10
[   17.642153]  ret_from_fork_asm+0x1a/0x30
[   17.642191]  </TASK>
[   17.642207] 
[   17.654005] Allocated by task 283:
[   17.654266]  kasan_save_stack+0x45/0x70
[   17.654504]  kasan_save_track+0x18/0x40
[   17.654664]  kasan_save_alloc_info+0x3b/0x50
[   17.654848]  __kasan_kmalloc+0xb7/0xc0
[   17.655065]  __kmalloc_cache_noprof+0x189/0x420
[   17.655344]  kasan_atomics+0x95/0x310
[   17.655558]  kunit_try_run_case+0x1a5/0x480
[   17.655810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.656138]  kthread+0x337/0x6f0
[   17.656323]  ret_from_fork+0x116/0x1d0
[   17.656499]  ret_from_fork_asm+0x1a/0x30
[   17.656758] 
[   17.656873] The buggy address belongs to the object at ffff88810392bb00
[   17.656873]  which belongs to the cache kmalloc-64 of size 64
[   17.657482] The buggy address is located 0 bytes to the right of
[   17.657482]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.657975] 
[   17.658097] The buggy address belongs to the physical page:
[   17.658385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.659069] flags: 0x200000000000000(node=0|zone=2)
[   17.659327] page_type: f5(slab)
[   17.659473] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.659865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.660313] page dumped because: kasan: bad access detected
[   17.660611] 
[   17.660724] Memory state around the buggy address:
[   17.660984]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.661368]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.661799] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.662140]                                      ^
[   17.662413]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.662716]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.663093] ==================================================================
[   17.053255] ==================================================================
[   17.053699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   17.054112] Read of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.054442] 
[   17.054585] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.054639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.054656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.054683] Call Trace:
[   17.054706]  <TASK>
[   17.054728]  dump_stack_lvl+0x73/0xb0
[   17.054774]  print_report+0xd1/0x650
[   17.054820]  ? __virt_addr_valid+0x1db/0x2d0
[   17.054848]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.054873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.054900]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.054928]  kasan_report+0x141/0x180
[   17.054956]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.054990]  __asan_report_load4_noabort+0x18/0x20
[   17.055021]  kasan_atomics_helper+0x4a02/0x5450
[   17.055048]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.055075]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.055118]  ? kasan_atomics+0x152/0x310
[   17.055162]  kasan_atomics+0x1dc/0x310
[   17.055189]  ? __pfx_kasan_atomics+0x10/0x10
[   17.055219]  ? __pfx_read_tsc+0x10/0x10
[   17.055258]  ? ktime_get_ts64+0x86/0x230
[   17.055287]  kunit_try_run_case+0x1a5/0x480
[   17.055315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.055343]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.055372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.055400]  ? __kthread_parkme+0x82/0x180
[   17.055426]  ? preempt_count_sub+0x50/0x80
[   17.055454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.055484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.055511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.055539]  kthread+0x337/0x6f0
[   17.055564]  ? trace_preempt_on+0x20/0xc0
[   17.055592]  ? __pfx_kthread+0x10/0x10
[   17.055618]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.055655]  ? calculate_sigpending+0x7b/0xa0
[   17.055684]  ? __pfx_kthread+0x10/0x10
[   17.055723]  ret_from_fork+0x116/0x1d0
[   17.055747]  ? __pfx_kthread+0x10/0x10
[   17.055772]  ret_from_fork_asm+0x1a/0x30
[   17.055819]  </TASK>
[   17.055834] 
[   17.064707] Allocated by task 283:
[   17.064923]  kasan_save_stack+0x45/0x70
[   17.065204]  kasan_save_track+0x18/0x40
[   17.065387]  kasan_save_alloc_info+0x3b/0x50
[   17.065644]  __kasan_kmalloc+0xb7/0xc0
[   17.065888]  __kmalloc_cache_noprof+0x189/0x420
[   17.066135]  kasan_atomics+0x95/0x310
[   17.066352]  kunit_try_run_case+0x1a5/0x480
[   17.066522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.066764]  kthread+0x337/0x6f0
[   17.066979]  ret_from_fork+0x116/0x1d0
[   17.067194]  ret_from_fork_asm+0x1a/0x30
[   17.067424] 
[   17.067626] The buggy address belongs to the object at ffff88810392bb00
[   17.067626]  which belongs to the cache kmalloc-64 of size 64
[   17.068210] The buggy address is located 0 bytes to the right of
[   17.068210]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.068838] 
[   17.068945] The buggy address belongs to the physical page:
[   17.069301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.069695] flags: 0x200000000000000(node=0|zone=2)
[   17.069972] page_type: f5(slab)
[   17.070202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.070577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.070963] page dumped because: kasan: bad access detected
[   17.071312] 
[   17.071414] Memory state around the buggy address:
[   17.071594]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.071858]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.072109] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.072492]                                      ^
[   17.072751]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.073161]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.073503] ==================================================================
[   16.367738] ==================================================================
[   16.368089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   16.368474] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.368760] 
[   16.368988] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.369043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.369056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.369082] Call Trace:
[   16.369104]  <TASK>
[   16.369127]  dump_stack_lvl+0x73/0xb0
[   16.369206]  print_report+0xd1/0x650
[   16.369233]  ? __virt_addr_valid+0x1db/0x2d0
[   16.369258]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.369282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.369307]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.369338]  kasan_report+0x141/0x180
[   16.369362]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.369393]  __asan_report_store4_noabort+0x1b/0x30
[   16.369417]  kasan_atomics_helper+0x4b6e/0x5450
[   16.369443]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.369467]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.369497]  ? kasan_atomics+0x152/0x310
[   16.369529]  kasan_atomics+0x1dc/0x310
[   16.369554]  ? __pfx_kasan_atomics+0x10/0x10
[   16.369582]  ? __pfx_read_tsc+0x10/0x10
[   16.369608]  ? ktime_get_ts64+0x86/0x230
[   16.369636]  kunit_try_run_case+0x1a5/0x480
[   16.369665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.369690]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.369719]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.369890]  ? __kthread_parkme+0x82/0x180
[   16.369918]  ? preempt_count_sub+0x50/0x80
[   16.369990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.370020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.370048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.370077]  kthread+0x337/0x6f0
[   16.370115]  ? trace_preempt_on+0x20/0xc0
[   16.370358]  ? __pfx_kthread+0x10/0x10
[   16.370394]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.370423]  ? calculate_sigpending+0x7b/0xa0
[   16.370453]  ? __pfx_kthread+0x10/0x10
[   16.370480]  ret_from_fork+0x116/0x1d0
[   16.370505]  ? __pfx_kthread+0x10/0x10
[   16.370530]  ret_from_fork_asm+0x1a/0x30
[   16.370568]  </TASK>
[   16.370585] 
[   16.379954] Allocated by task 283:
[   16.380339]  kasan_save_stack+0x45/0x70
[   16.380588]  kasan_save_track+0x18/0x40
[   16.380841]  kasan_save_alloc_info+0x3b/0x50
[   16.381079]  __kasan_kmalloc+0xb7/0xc0
[   16.381322]  __kmalloc_cache_noprof+0x189/0x420
[   16.381577]  kasan_atomics+0x95/0x310
[   16.381809]  kunit_try_run_case+0x1a5/0x480
[   16.382073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.382415]  kthread+0x337/0x6f0
[   16.382883]  ret_from_fork+0x116/0x1d0
[   16.383059]  ret_from_fork_asm+0x1a/0x30
[   16.383382] 
[   16.383523] The buggy address belongs to the object at ffff88810392bb00
[   16.383523]  which belongs to the cache kmalloc-64 of size 64
[   16.384013] The buggy address is located 0 bytes to the right of
[   16.384013]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.384522] 
[   16.384623] The buggy address belongs to the physical page:
[   16.386855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.387266] flags: 0x200000000000000(node=0|zone=2)
[   16.388116] page_type: f5(slab)
[   16.388304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.388566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.388883] page dumped because: kasan: bad access detected
[   16.389112] 
[   16.389196] Memory state around the buggy address:
[   16.389379]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.389711]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.390836] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.391104]                                      ^
[   16.391579]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.392746]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.394989] ==================================================================
[   17.457938] ==================================================================
[   17.458426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   17.458784] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.459197] 
[   17.459354] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.459410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.459451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.459481] Call Trace:
[   17.459507]  <TASK>
[   17.459530]  dump_stack_lvl+0x73/0xb0
[   17.459585]  print_report+0xd1/0x650
[   17.459614]  ? __virt_addr_valid+0x1db/0x2d0
[   17.459642]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.459667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.459694]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.459721]  kasan_report+0x141/0x180
[   17.459747]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.459777]  kasan_check_range+0x10c/0x1c0
[   17.459818]  __kasan_check_write+0x18/0x20
[   17.459862]  kasan_atomics_helper+0x19e3/0x5450
[   17.459889]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.459916]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.459946]  ? kasan_atomics+0x152/0x310
[   17.459977]  kasan_atomics+0x1dc/0x310
[   17.460004]  ? __pfx_kasan_atomics+0x10/0x10
[   17.460052]  ? __pfx_read_tsc+0x10/0x10
[   17.460077]  ? ktime_get_ts64+0x86/0x230
[   17.460106]  kunit_try_run_case+0x1a5/0x480
[   17.460135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.460161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.460204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.460232]  ? __kthread_parkme+0x82/0x180
[   17.460257]  ? preempt_count_sub+0x50/0x80
[   17.460285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.460314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.460340]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.460367]  kthread+0x337/0x6f0
[   17.460390]  ? trace_preempt_on+0x20/0xc0
[   17.460418]  ? __pfx_kthread+0x10/0x10
[   17.460443]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.460468]  ? calculate_sigpending+0x7b/0xa0
[   17.460497]  ? __pfx_kthread+0x10/0x10
[   17.460522]  ret_from_fork+0x116/0x1d0
[   17.460544]  ? __pfx_kthread+0x10/0x10
[   17.460568]  ret_from_fork_asm+0x1a/0x30
[   17.460605]  </TASK>
[   17.460620] 
[   17.469662] Allocated by task 283:
[   17.469879]  kasan_save_stack+0x45/0x70
[   17.470140]  kasan_save_track+0x18/0x40
[   17.470365]  kasan_save_alloc_info+0x3b/0x50
[   17.470613]  __kasan_kmalloc+0xb7/0xc0
[   17.470813]  __kmalloc_cache_noprof+0x189/0x420
[   17.471094]  kasan_atomics+0x95/0x310
[   17.471356]  kunit_try_run_case+0x1a5/0x480
[   17.471590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.471874]  kthread+0x337/0x6f0
[   17.472089]  ret_from_fork+0x116/0x1d0
[   17.472313]  ret_from_fork_asm+0x1a/0x30
[   17.472548] 
[   17.472635] The buggy address belongs to the object at ffff88810392bb00
[   17.472635]  which belongs to the cache kmalloc-64 of size 64
[   17.473336] The buggy address is located 0 bytes to the right of
[   17.473336]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.473982] 
[   17.474123] The buggy address belongs to the physical page:
[   17.474476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.474948] flags: 0x200000000000000(node=0|zone=2)
[   17.475225] page_type: f5(slab)
[   17.475424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.476061] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.476338] page dumped because: kasan: bad access detected
[   17.476536] 
[   17.476620] Memory state around the buggy address:
[   17.476813]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.477138]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.477516] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.477959]                                      ^
[   17.478403]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.478799]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.479264] ==================================================================
[   17.203432] ==================================================================
[   17.203903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   17.204223] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.204642] 
[   17.204809] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.204864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.204881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.204908] Call Trace:
[   17.204931]  <TASK>
[   17.204953]  dump_stack_lvl+0x73/0xb0
[   17.204990]  print_report+0xd1/0x650
[   17.205017]  ? __virt_addr_valid+0x1db/0x2d0
[   17.205046]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.205072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.205140]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.205169]  kasan_report+0x141/0x180
[   17.205196]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.205248]  __asan_report_load8_noabort+0x18/0x20
[   17.205278]  kasan_atomics_helper+0x4eae/0x5450
[   17.205306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.205338]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.205370]  ? kasan_atomics+0x152/0x310
[   17.205403]  kasan_atomics+0x1dc/0x310
[   17.205431]  ? __pfx_kasan_atomics+0x10/0x10
[   17.205480]  ? __pfx_read_tsc+0x10/0x10
[   17.205521]  ? ktime_get_ts64+0x86/0x230
[   17.205552]  kunit_try_run_case+0x1a5/0x480
[   17.205582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.205610]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.205639]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.205668]  ? __kthread_parkme+0x82/0x180
[   17.205693]  ? preempt_count_sub+0x50/0x80
[   17.205724]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.205753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.205781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.205821]  kthread+0x337/0x6f0
[   17.205845]  ? trace_preempt_on+0x20/0xc0
[   17.205874]  ? __pfx_kthread+0x10/0x10
[   17.205900]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.205926]  ? calculate_sigpending+0x7b/0xa0
[   17.205956]  ? __pfx_kthread+0x10/0x10
[   17.205982]  ret_from_fork+0x116/0x1d0
[   17.206006]  ? __pfx_kthread+0x10/0x10
[   17.206031]  ret_from_fork_asm+0x1a/0x30
[   17.206069]  </TASK>
[   17.206086] 
[   17.215338] Allocated by task 283:
[   17.215599]  kasan_save_stack+0x45/0x70
[   17.215893]  kasan_save_track+0x18/0x40
[   17.216119]  kasan_save_alloc_info+0x3b/0x50
[   17.216440]  __kasan_kmalloc+0xb7/0xc0
[   17.216626]  __kmalloc_cache_noprof+0x189/0x420
[   17.216874]  kasan_atomics+0x95/0x310
[   17.217172]  kunit_try_run_case+0x1a5/0x480
[   17.217465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.217751]  kthread+0x337/0x6f0
[   17.218010]  ret_from_fork+0x116/0x1d0
[   17.218284]  ret_from_fork_asm+0x1a/0x30
[   17.218613] 
[   17.218731] The buggy address belongs to the object at ffff88810392bb00
[   17.218731]  which belongs to the cache kmalloc-64 of size 64
[   17.219288] The buggy address is located 0 bytes to the right of
[   17.219288]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.219976] 
[   17.220130] The buggy address belongs to the physical page:
[   17.220371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.220655] flags: 0x200000000000000(node=0|zone=2)
[   17.220891] page_type: f5(slab)
[   17.221096] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.221504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.221948] page dumped because: kasan: bad access detected
[   17.222213] 
[   17.222296] Memory state around the buggy address:
[   17.222479]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.222733]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.222998] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.223580]                                      ^
[   17.224111]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.224589]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.225084] ==================================================================
[   17.893423] ==================================================================
[   17.893723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   17.894133] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.894521] 
[   17.894659] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.894714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.894730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.894757] Call Trace:
[   17.894782]  <TASK>
[   17.894817]  dump_stack_lvl+0x73/0xb0
[   17.894853]  print_report+0xd1/0x650
[   17.894881]  ? __virt_addr_valid+0x1db/0x2d0
[   17.894909]  ? kasan_atomics_helper+0x224c/0x5450
[   17.894934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.894962]  ? kasan_atomics_helper+0x224c/0x5450
[   17.894988]  kasan_report+0x141/0x180
[   17.895015]  ? kasan_atomics_helper+0x224c/0x5450
[   17.895049]  kasan_check_range+0x10c/0x1c0
[   17.895078]  __kasan_check_write+0x18/0x20
[   17.895102]  kasan_atomics_helper+0x224c/0x5450
[   17.895130]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.895171]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.895201]  ? kasan_atomics+0x152/0x310
[   17.895234]  kasan_atomics+0x1dc/0x310
[   17.895262]  ? __pfx_kasan_atomics+0x10/0x10
[   17.895292]  ? __pfx_read_tsc+0x10/0x10
[   17.895318]  ? ktime_get_ts64+0x86/0x230
[   17.895348]  kunit_try_run_case+0x1a5/0x480
[   17.895377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.895404]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.895434]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.895464]  ? __kthread_parkme+0x82/0x180
[   17.895489]  ? preempt_count_sub+0x50/0x80
[   17.895519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.895548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.895576]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.895604]  kthread+0x337/0x6f0
[   17.895628]  ? trace_preempt_on+0x20/0xc0
[   17.895657]  ? __pfx_kthread+0x10/0x10
[   17.895682]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.895709]  ? calculate_sigpending+0x7b/0xa0
[   17.895739]  ? __pfx_kthread+0x10/0x10
[   17.895764]  ret_from_fork+0x116/0x1d0
[   17.895801]  ? __pfx_kthread+0x10/0x10
[   17.895826]  ret_from_fork_asm+0x1a/0x30
[   17.895864]  </TASK>
[   17.895879] 
[   17.904599] Allocated by task 283:
[   17.904823]  kasan_save_stack+0x45/0x70
[   17.905054]  kasan_save_track+0x18/0x40
[   17.905236]  kasan_save_alloc_info+0x3b/0x50
[   17.905420]  __kasan_kmalloc+0xb7/0xc0
[   17.905577]  __kmalloc_cache_noprof+0x189/0x420
[   17.905818]  kasan_atomics+0x95/0x310
[   17.906003]  kunit_try_run_case+0x1a5/0x480
[   17.906300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.906578]  kthread+0x337/0x6f0
[   17.906748]  ret_from_fork+0x116/0x1d0
[   17.906918]  ret_from_fork_asm+0x1a/0x30
[   17.907083] 
[   17.907168] The buggy address belongs to the object at ffff88810392bb00
[   17.907168]  which belongs to the cache kmalloc-64 of size 64
[   17.907733] The buggy address is located 0 bytes to the right of
[   17.907733]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.908240] 
[   17.908325] The buggy address belongs to the physical page:
[   17.908525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.909276] flags: 0x200000000000000(node=0|zone=2)
[   17.909558] page_type: f5(slab)
[   17.909758] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.910249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.910620] page dumped because: kasan: bad access detected
[   17.910899] 
[   17.911012] Memory state around the buggy address:
[   17.911325]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.911619]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.911883] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.912242]                                      ^
[   17.912523]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.912822]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.913305] ==================================================================
[   17.249555] ==================================================================
[   17.249907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   17.250407] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.250777] 
[   17.250934] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.250994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.251010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.251037] Call Trace:
[   17.251058]  <TASK>
[   17.251079]  dump_stack_lvl+0x73/0xb0
[   17.251117]  print_report+0xd1/0x650
[   17.251146]  ? __virt_addr_valid+0x1db/0x2d0
[   17.251213]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.251238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.251266]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.251293]  kasan_report+0x141/0x180
[   17.251353]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.251387]  __asan_report_store8_noabort+0x1b/0x30
[   17.251414]  kasan_atomics_helper+0x50d4/0x5450
[   17.251441]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.251500]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.251531]  ? kasan_atomics+0x152/0x310
[   17.251564]  kasan_atomics+0x1dc/0x310
[   17.251592]  ? __pfx_kasan_atomics+0x10/0x10
[   17.251653]  ? __pfx_read_tsc+0x10/0x10
[   17.251681]  ? ktime_get_ts64+0x86/0x230
[   17.251711]  kunit_try_run_case+0x1a5/0x480
[   17.251739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.251809]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.251841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.251869]  ? __kthread_parkme+0x82/0x180
[   17.251895]  ? preempt_count_sub+0x50/0x80
[   17.251925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.251982]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.252009]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.252038]  kthread+0x337/0x6f0
[   17.252063]  ? trace_preempt_on+0x20/0xc0
[   17.252092]  ? __pfx_kthread+0x10/0x10
[   17.252118]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.252144]  ? calculate_sigpending+0x7b/0xa0
[   17.252208]  ? __pfx_kthread+0x10/0x10
[   17.252236]  ret_from_fork+0x116/0x1d0
[   17.252259]  ? __pfx_kthread+0x10/0x10
[   17.252285]  ret_from_fork_asm+0x1a/0x30
[   17.252323]  </TASK>
[   17.252339] 
[   17.261462] Allocated by task 283:
[   17.261693]  kasan_save_stack+0x45/0x70
[   17.261986]  kasan_save_track+0x18/0x40
[   17.262292]  kasan_save_alloc_info+0x3b/0x50
[   17.262695]  __kasan_kmalloc+0xb7/0xc0
[   17.262925]  __kmalloc_cache_noprof+0x189/0x420
[   17.263179]  kasan_atomics+0x95/0x310
[   17.263508]  kunit_try_run_case+0x1a5/0x480
[   17.263675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.263879]  kthread+0x337/0x6f0
[   17.264017]  ret_from_fork+0x116/0x1d0
[   17.264453]  ret_from_fork_asm+0x1a/0x30
[   17.264685] 
[   17.264859] The buggy address belongs to the object at ffff88810392bb00
[   17.264859]  which belongs to the cache kmalloc-64 of size 64
[   17.265544] The buggy address is located 0 bytes to the right of
[   17.265544]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.265962] 
[   17.266130] The buggy address belongs to the physical page:
[   17.266420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.266831] flags: 0x200000000000000(node=0|zone=2)
[   17.267118] page_type: f5(slab)
[   17.267315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.267724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.267996] page dumped because: kasan: bad access detected
[   17.268471] 
[   17.268626] Memory state around the buggy address:
[   17.268999]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.269591]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.269934] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.270331]                                      ^
[   17.270507]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.270749]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.271160] ==================================================================
[   17.533259] ==================================================================
[   17.533643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   17.534056] Write of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.534527] 
[   17.534680] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.534747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.534764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.534802] Call Trace:
[   17.534824]  <TASK>
[   17.534846]  dump_stack_lvl+0x73/0xb0
[   17.534896]  print_report+0xd1/0x650
[   17.534925]  ? __virt_addr_valid+0x1db/0x2d0
[   17.534953]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.534979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.535007]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.535033]  kasan_report+0x141/0x180
[   17.535059]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.535103]  kasan_check_range+0x10c/0x1c0
[   17.535131]  __kasan_check_write+0x18/0x20
[   17.535166]  kasan_atomics_helper+0x1c18/0x5450
[   17.535194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.535221]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.535274]  ? kasan_atomics+0x152/0x310
[   17.535305]  kasan_atomics+0x1dc/0x310
[   17.535344]  ? __pfx_kasan_atomics+0x10/0x10
[   17.535374]  ? __pfx_read_tsc+0x10/0x10
[   17.535399]  ? ktime_get_ts64+0x86/0x230
[   17.535428]  kunit_try_run_case+0x1a5/0x480
[   17.535457]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.535484]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.535514]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.535542]  ? __kthread_parkme+0x82/0x180
[   17.535567]  ? preempt_count_sub+0x50/0x80
[   17.535596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.535634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.535663]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.535697]  kthread+0x337/0x6f0
[   17.535721]  ? trace_preempt_on+0x20/0xc0
[   17.535750]  ? __pfx_kthread+0x10/0x10
[   17.535775]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.535810]  ? calculate_sigpending+0x7b/0xa0
[   17.535840]  ? __pfx_kthread+0x10/0x10
[   17.535865]  ret_from_fork+0x116/0x1d0
[   17.535888]  ? __pfx_kthread+0x10/0x10
[   17.535913]  ret_from_fork_asm+0x1a/0x30
[   17.535950]  </TASK>
[   17.535966] 
[   17.544635] Allocated by task 283:
[   17.544885]  kasan_save_stack+0x45/0x70
[   17.545199]  kasan_save_track+0x18/0x40
[   17.545377]  kasan_save_alloc_info+0x3b/0x50
[   17.545633]  __kasan_kmalloc+0xb7/0xc0
[   17.545839]  __kmalloc_cache_noprof+0x189/0x420
[   17.546055]  kasan_atomics+0x95/0x310
[   17.546296]  kunit_try_run_case+0x1a5/0x480
[   17.546525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.546826]  kthread+0x337/0x6f0
[   17.547057]  ret_from_fork+0x116/0x1d0
[   17.547278]  ret_from_fork_asm+0x1a/0x30
[   17.547474] 
[   17.547561] The buggy address belongs to the object at ffff88810392bb00
[   17.547561]  which belongs to the cache kmalloc-64 of size 64
[   17.548080] The buggy address is located 0 bytes to the right of
[   17.548080]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.548711] 
[   17.548841] The buggy address belongs to the physical page:
[   17.549190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.549484] flags: 0x200000000000000(node=0|zone=2)
[   17.549675] page_type: f5(slab)
[   17.549825] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.550242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.550627] page dumped because: kasan: bad access detected
[   17.551444] 
[   17.551653] Memory state around the buggy address:
[   17.551859]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.552947]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.553372] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.553708]                                      ^
[   17.553967]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.554963]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.555685] ==================================================================
[   17.115372] ==================================================================
[   17.115750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   17.116223] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.116484] 
[   17.116588] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.116638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.116654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.116682] Call Trace:
[   17.116702]  <TASK>
[   17.116722]  dump_stack_lvl+0x73/0xb0
[   17.116758]  print_report+0xd1/0x650
[   17.116801]  ? __virt_addr_valid+0x1db/0x2d0
[   17.116829]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.116856]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.116883]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.116910]  kasan_report+0x141/0x180
[   17.116949]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.116981]  kasan_check_range+0x10c/0x1c0
[   17.117022]  __kasan_check_write+0x18/0x20
[   17.117046]  kasan_atomics_helper+0x12e6/0x5450
[   17.117074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.117114]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.117145]  ? kasan_atomics+0x152/0x310
[   17.117178]  kasan_atomics+0x1dc/0x310
[   17.117206]  ? __pfx_kasan_atomics+0x10/0x10
[   17.117234]  ? __pfx_read_tsc+0x10/0x10
[   17.117261]  ? ktime_get_ts64+0x86/0x230
[   17.117300]  kunit_try_run_case+0x1a5/0x480
[   17.117328]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.117372]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.117401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.117429]  ? __kthread_parkme+0x82/0x180
[   17.117454]  ? preempt_count_sub+0x50/0x80
[   17.117483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.117511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.117539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.117566]  kthread+0x337/0x6f0
[   17.117590]  ? trace_preempt_on+0x20/0xc0
[   17.117618]  ? __pfx_kthread+0x10/0x10
[   17.117654]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.117680]  ? calculate_sigpending+0x7b/0xa0
[   17.117721]  ? __pfx_kthread+0x10/0x10
[   17.117747]  ret_from_fork+0x116/0x1d0
[   17.117770]  ? __pfx_kthread+0x10/0x10
[   17.117804]  ret_from_fork_asm+0x1a/0x30
[   17.117841]  </TASK>
[   17.117855] 
[   17.130535] Allocated by task 283:
[   17.131219]  kasan_save_stack+0x45/0x70
[   17.131559]  kasan_save_track+0x18/0x40
[   17.131735]  kasan_save_alloc_info+0x3b/0x50
[   17.131969]  __kasan_kmalloc+0xb7/0xc0
[   17.132469]  __kmalloc_cache_noprof+0x189/0x420
[   17.132990]  kasan_atomics+0x95/0x310
[   17.133563]  kunit_try_run_case+0x1a5/0x480
[   17.134056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.134558]  kthread+0x337/0x6f0
[   17.134718]  ret_from_fork+0x116/0x1d0
[   17.134899]  ret_from_fork_asm+0x1a/0x30
[   17.135069] 
[   17.135604] The buggy address belongs to the object at ffff88810392bb00
[   17.135604]  which belongs to the cache kmalloc-64 of size 64
[   17.137251] The buggy address is located 0 bytes to the right of
[   17.137251]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.138877] 
[   17.138991] The buggy address belongs to the physical page:
[   17.139549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.140744] flags: 0x200000000000000(node=0|zone=2)
[   17.141468] page_type: f5(slab)
[   17.141639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.141927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.142635] page dumped because: kasan: bad access detected
[   17.143116] 
[   17.143241] Memory state around the buggy address:
[   17.143501]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.143868]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.144585] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.145390]                                      ^
[   17.145735]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.146606]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.147142] ==================================================================
[   17.172272] ==================================================================
[   17.172554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   17.174899] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.175982] 
[   17.176558] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.176627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.176647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.176678] Call Trace:
[   17.176704]  <TASK>
[   17.176730]  dump_stack_lvl+0x73/0xb0
[   17.176774]  print_report+0xd1/0x650
[   17.176820]  ? __virt_addr_valid+0x1db/0x2d0
[   17.176850]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.176878]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.176907]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.176934]  kasan_report+0x141/0x180
[   17.176961]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.176993]  kasan_check_range+0x10c/0x1c0
[   17.177021]  __kasan_check_read+0x15/0x20
[   17.177045]  kasan_atomics_helper+0x13b5/0x5450
[   17.177433]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.177480]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.177514]  ? kasan_atomics+0x152/0x310
[   17.177547]  kasan_atomics+0x1dc/0x310
[   17.177576]  ? __pfx_kasan_atomics+0x10/0x10
[   17.177606]  ? __pfx_read_tsc+0x10/0x10
[   17.177634]  ? ktime_get_ts64+0x86/0x230
[   17.177665]  kunit_try_run_case+0x1a5/0x480
[   17.177695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.177722]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.177753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.177781]  ? __kthread_parkme+0x82/0x180
[   17.177828]  ? preempt_count_sub+0x50/0x80
[   17.177859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.177888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.177914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.177943]  kthread+0x337/0x6f0
[   17.177968]  ? trace_preempt_on+0x20/0xc0
[   17.177996]  ? __pfx_kthread+0x10/0x10
[   17.178022]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.178049]  ? calculate_sigpending+0x7b/0xa0
[   17.178107]  ? __pfx_kthread+0x10/0x10
[   17.178133]  ret_from_fork+0x116/0x1d0
[   17.178160]  ? __pfx_kthread+0x10/0x10
[   17.178185]  ret_from_fork_asm+0x1a/0x30
[   17.178224]  </TASK>
[   17.178242] 
[   17.191170] Allocated by task 283:
[   17.191410]  kasan_save_stack+0x45/0x70
[   17.191802]  kasan_save_track+0x18/0x40
[   17.192115]  kasan_save_alloc_info+0x3b/0x50
[   17.192373]  __kasan_kmalloc+0xb7/0xc0
[   17.192745]  __kmalloc_cache_noprof+0x189/0x420
[   17.193103]  kasan_atomics+0x95/0x310
[   17.193519]  kunit_try_run_case+0x1a5/0x480
[   17.193739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.194267]  kthread+0x337/0x6f0
[   17.194481]  ret_from_fork+0x116/0x1d0
[   17.194774]  ret_from_fork_asm+0x1a/0x30
[   17.195037] 
[   17.195157] The buggy address belongs to the object at ffff88810392bb00
[   17.195157]  which belongs to the cache kmalloc-64 of size 64
[   17.195941] The buggy address is located 0 bytes to the right of
[   17.195941]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.196700] 
[   17.197056] The buggy address belongs to the physical page:
[   17.197386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.197805] flags: 0x200000000000000(node=0|zone=2)
[   17.198390] page_type: f5(slab)
[   17.198767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.199253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.199514] page dumped because: kasan: bad access detected
[   17.199711] 
[   17.199806] Memory state around the buggy address:
[   17.200052]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.200399]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.200873] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.201168]                                      ^
[   17.201440]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.201815]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.202163] ==================================================================
[   17.556948] ==================================================================
[   17.557915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   17.558515] Read of size 8 at addr ffff88810392bb30 by task kunit_try_catch/283
[   17.559108] 
[   17.559246] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   17.559301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.559319] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.559348] Call Trace:
[   17.559372]  <TASK>
[   17.559395]  dump_stack_lvl+0x73/0xb0
[   17.559434]  print_report+0xd1/0x650
[   17.559463]  ? __virt_addr_valid+0x1db/0x2d0
[   17.559491]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.559518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.559546]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.559575]  kasan_report+0x141/0x180
[   17.559604]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.559636]  __asan_report_load8_noabort+0x18/0x20
[   17.559667]  kasan_atomics_helper+0x4f30/0x5450
[   17.559695]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.559723]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.559754]  ? kasan_atomics+0x152/0x310
[   17.560011]  kasan_atomics+0x1dc/0x310
[   17.560056]  ? __pfx_kasan_atomics+0x10/0x10
[   17.560105]  ? __pfx_read_tsc+0x10/0x10
[   17.560189]  ? ktime_get_ts64+0x86/0x230
[   17.560222]  kunit_try_run_case+0x1a5/0x480
[   17.560252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.560280]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.560310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.560339]  ? __kthread_parkme+0x82/0x180
[   17.560364]  ? preempt_count_sub+0x50/0x80
[   17.560394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.560422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.560451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.560480]  kthread+0x337/0x6f0
[   17.560504]  ? trace_preempt_on+0x20/0xc0
[   17.560533]  ? __pfx_kthread+0x10/0x10
[   17.560558]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.560585]  ? calculate_sigpending+0x7b/0xa0
[   17.560616]  ? __pfx_kthread+0x10/0x10
[   17.560642]  ret_from_fork+0x116/0x1d0
[   17.560667]  ? __pfx_kthread+0x10/0x10
[   17.560692]  ret_from_fork_asm+0x1a/0x30
[   17.560730]  </TASK>
[   17.560745] 
[   17.575555] Allocated by task 283:
[   17.575979]  kasan_save_stack+0x45/0x70
[   17.576644]  kasan_save_track+0x18/0x40
[   17.576967]  kasan_save_alloc_info+0x3b/0x50
[   17.577494]  __kasan_kmalloc+0xb7/0xc0
[   17.577856]  __kmalloc_cache_noprof+0x189/0x420
[   17.578703]  kasan_atomics+0x95/0x310
[   17.578945]  kunit_try_run_case+0x1a5/0x480
[   17.579317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.579749]  kthread+0x337/0x6f0
[   17.579950]  ret_from_fork+0x116/0x1d0
[   17.580464]  ret_from_fork_asm+0x1a/0x30
[   17.580930] 
[   17.581209] The buggy address belongs to the object at ffff88810392bb00
[   17.581209]  which belongs to the cache kmalloc-64 of size 64
[   17.581828] The buggy address is located 0 bytes to the right of
[   17.581828]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   17.582983] 
[   17.583253] The buggy address belongs to the physical page:
[   17.583685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   17.584583] flags: 0x200000000000000(node=0|zone=2)
[   17.584953] page_type: f5(slab)
[   17.585300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.585870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.586584] page dumped because: kasan: bad access detected
[   17.586907] 
[   17.587014] Memory state around the buggy address:
[   17.587525]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.588247]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.588781] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.589726]                                      ^
[   17.590184]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.590846]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.591531] ==================================================================
[   16.893741] ==================================================================
[   16.894247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   16.894763] Write of size 4 at addr ffff88810392bb30 by task kunit_try_catch/283
[   16.895070] 
[   16.895178] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   16.895229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.895246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.895273] Call Trace:
[   16.895296]  <TASK>
[   16.895316]  dump_stack_lvl+0x73/0xb0
[   16.895351]  print_report+0xd1/0x650
[   16.895378]  ? __virt_addr_valid+0x1db/0x2d0
[   16.895407]  ? kasan_atomics_helper+0xf10/0x5450
[   16.895432]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.895459]  ? kasan_atomics_helper+0xf10/0x5450
[   16.895498]  kasan_report+0x141/0x180
[   16.895524]  ? kasan_atomics_helper+0xf10/0x5450
[   16.895556]  kasan_check_range+0x10c/0x1c0
[   16.895586]  __kasan_check_write+0x18/0x20
[   16.895614]  kasan_atomics_helper+0xf10/0x5450
[   16.895642]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.895670]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.895702]  ? kasan_atomics+0x152/0x310
[   16.895735]  kasan_atomics+0x1dc/0x310
[   16.895763]  ? __pfx_kasan_atomics+0x10/0x10
[   16.895806]  ? __pfx_read_tsc+0x10/0x10
[   16.895833]  ? ktime_get_ts64+0x86/0x230
[   16.895863]  kunit_try_run_case+0x1a5/0x480
[   16.895891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.895919]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.895949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.895978]  ? __kthread_parkme+0x82/0x180
[   16.896002]  ? preempt_count_sub+0x50/0x80
[   16.896034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.896064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.896093]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.896121]  kthread+0x337/0x6f0
[   16.896146]  ? trace_preempt_on+0x20/0xc0
[   16.896174]  ? __pfx_kthread+0x10/0x10
[   16.896200]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.896236]  ? calculate_sigpending+0x7b/0xa0
[   16.896265]  ? __pfx_kthread+0x10/0x10
[   16.896292]  ret_from_fork+0x116/0x1d0
[   16.896316]  ? __pfx_kthread+0x10/0x10
[   16.896342]  ret_from_fork_asm+0x1a/0x30
[   16.896380]  </TASK>
[   16.896395] 
[   16.905760] Allocated by task 283:
[   16.905935]  kasan_save_stack+0x45/0x70
[   16.906131]  kasan_save_track+0x18/0x40
[   16.906363]  kasan_save_alloc_info+0x3b/0x50
[   16.906607]  __kasan_kmalloc+0xb7/0xc0
[   16.906837]  __kmalloc_cache_noprof+0x189/0x420
[   16.907069]  kasan_atomics+0x95/0x310
[   16.907270]  kunit_try_run_case+0x1a5/0x480
[   16.907462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.907761]  kthread+0x337/0x6f0
[   16.907923]  ret_from_fork+0x116/0x1d0
[   16.908084]  ret_from_fork_asm+0x1a/0x30
[   16.908246] 
[   16.908333] The buggy address belongs to the object at ffff88810392bb00
[   16.908333]  which belongs to the cache kmalloc-64 of size 64
[   16.908742] The buggy address is located 0 bytes to the right of
[   16.908742]  allocated 48-byte region [ffff88810392bb00, ffff88810392bb30)
[   16.913257] 
[   16.913721] The buggy address belongs to the physical page:
[   16.914876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10392b
[   16.915938] flags: 0x200000000000000(node=0|zone=2)
[   16.916846] page_type: f5(slab)
[   16.918148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.919234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.919932] page dumped because: kasan: bad access detected
[   16.920261] 
[   16.920361] Memory state around the buggy address:
[   16.920605]  ffff88810392ba00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.920956]  ffff88810392ba80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.921323] >ffff88810392bb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.921693]                                      ^
[   16.921951]  ffff88810392bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.922351]  ffff88810392bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.922627] ==================================================================