Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   19.846855] ==================================================================
[   19.846900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.846949] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.847015] 
[   19.847045] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.847128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.847155] Hardware name: linux,dummy-virt (DT)
[   19.847188] Call trace:
[   19.847220]  show_stack+0x20/0x38 (C)
[   19.847268]  dump_stack_lvl+0x8c/0xd0
[   19.847352]  print_report+0x118/0x608
[   19.847401]  kasan_report+0xdc/0x128
[   19.848439]  __asan_report_load8_noabort+0x20/0x30
[   19.848508]  kasan_atomics_helper+0x3f04/0x4858
[   19.848566]  kasan_atomics+0x198/0x2e0
[   19.848847]  kunit_try_run_case+0x170/0x3f0
[   19.849014]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.849168]  kthread+0x328/0x630
[   19.849275]  ret_from_fork+0x10/0x20
[   19.849396] 
[   19.849415] Allocated by task 266:
[   19.849443]  kasan_save_stack+0x3c/0x68
[   19.849486]  kasan_save_track+0x20/0x40
[   19.849523]  kasan_save_alloc_info+0x40/0x58
[   19.849565]  __kasan_kmalloc+0xd4/0xd8
[   19.849602]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.849648]  kasan_atomics+0xb8/0x2e0
[   19.849687]  kunit_try_run_case+0x170/0x3f0
[   19.849726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.849803]  kthread+0x328/0x630
[   19.849938]  ret_from_fork+0x10/0x20
[   19.849985] 
[   19.850014] The buggy address belongs to the object at fff00000c77bfc80
[   19.850014]  which belongs to the cache kmalloc-64 of size 64
[   19.850189] The buggy address is located 0 bytes to the right of
[   19.850189]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.850256] 
[   19.850275] The buggy address belongs to the physical page:
[   19.850308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.850363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.850419] page_type: f5(slab)
[   19.850613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.850668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.850711] page dumped because: kasan: bad access detected
[   19.850776] 
[   19.850798] Memory state around the buggy address:
[   19.850833]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.850881]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.850930] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.850986]                                      ^
[   19.851019]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.851074]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.851226] ==================================================================
[   19.865358] ==================================================================
[   19.865409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.865458] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.865732] 
[   19.865937] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.866393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.866825] Hardware name: linux,dummy-virt (DT)
[   19.866866] Call trace:
[   19.866889]  show_stack+0x20/0x38 (C)
[   19.867149]  dump_stack_lvl+0x8c/0xd0
[   19.867336]  print_report+0x118/0x608
[   19.867385]  kasan_report+0xdc/0x128
[   19.867463]  kasan_check_range+0x100/0x1a8
[   19.867594]  __kasan_check_write+0x20/0x30
[   19.867662]  kasan_atomics_helper+0x15b4/0x4858
[   19.867711]  kasan_atomics+0x198/0x2e0
[   19.867757]  kunit_try_run_case+0x170/0x3f0
[   19.867805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.868228]  kthread+0x328/0x630
[   19.868283]  ret_from_fork+0x10/0x20
[   19.868330] 
[   19.868549] Allocated by task 266:
[   19.868586]  kasan_save_stack+0x3c/0x68
[   19.868654]  kasan_save_track+0x20/0x40
[   19.869006]  kasan_save_alloc_info+0x40/0x58
[   19.869320]  __kasan_kmalloc+0xd4/0xd8
[   19.869362]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.869403]  kasan_atomics+0xb8/0x2e0
[   19.869443]  kunit_try_run_case+0x170/0x3f0
[   19.869481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.869527]  kthread+0x328/0x630
[   19.870406]  ret_from_fork+0x10/0x20
[   19.870459] 
[   19.870575] The buggy address belongs to the object at fff00000c77bfc80
[   19.870575]  which belongs to the cache kmalloc-64 of size 64
[   19.870694] The buggy address is located 0 bytes to the right of
[   19.870694]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.871230] 
[   19.871951] The buggy address belongs to the physical page:
[   19.872283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.872483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.873023] page_type: f5(slab)
[   19.873314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.873381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.873469] page dumped because: kasan: bad access detected
[   19.873591] 
[   19.873789] Memory state around the buggy address:
[   19.873831]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.873878]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.874353] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.874628]                                      ^
[   19.874766]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.874816]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.875079] ==================================================================
[   19.819384] ==================================================================
[   19.819462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.819553] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.819744] 
[   19.819781] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.819965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.820083] Hardware name: linux,dummy-virt (DT)
[   19.820118] Call trace:
[   19.820169]  show_stack+0x20/0x38 (C)
[   19.820222]  dump_stack_lvl+0x8c/0xd0
[   19.820298]  print_report+0x118/0x608
[   19.820371]  kasan_report+0xdc/0x128
[   19.820423]  kasan_check_range+0x100/0x1a8
[   19.820473]  __kasan_check_write+0x20/0x30
[   19.820529]  kasan_atomics_helper+0x10c0/0x4858
[   19.820880]  kasan_atomics+0x198/0x2e0
[   19.820944]  kunit_try_run_case+0x170/0x3f0
[   19.821005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.821059]  kthread+0x328/0x630
[   19.821101]  ret_from_fork+0x10/0x20
[   19.821148] 
[   19.821169] Allocated by task 266:
[   19.821197]  kasan_save_stack+0x3c/0x68
[   19.821242]  kasan_save_track+0x20/0x40
[   19.821280]  kasan_save_alloc_info+0x40/0x58
[   19.822296]  __kasan_kmalloc+0xd4/0xd8
[   19.822371]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.822415]  kasan_atomics+0xb8/0x2e0
[   19.822459]  kunit_try_run_case+0x170/0x3f0
[   19.822521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.822567]  kthread+0x328/0x630
[   19.822682]  ret_from_fork+0x10/0x20
[   19.822720] 
[   19.822743] The buggy address belongs to the object at fff00000c77bfc80
[   19.822743]  which belongs to the cache kmalloc-64 of size 64
[   19.822810] The buggy address is located 0 bytes to the right of
[   19.822810]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.823128] 
[   19.823161] The buggy address belongs to the physical page:
[   19.823195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.823454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.823567] page_type: f5(slab)
[   19.823605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.823664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.823755] page dumped because: kasan: bad access detected
[   19.823789] 
[   19.823871] Memory state around the buggy address:
[   19.823997]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.824043]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.824088] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.824130]                                      ^
[   19.824162]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824206]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.824247] ==================================================================
[   19.752598] ==================================================================
[   19.752653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.752703] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.752755] 
[   19.752787] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.752869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.752898] Hardware name: linux,dummy-virt (DT)
[   19.752930] Call trace:
[   19.752953]  show_stack+0x20/0x38 (C)
[   19.753016]  dump_stack_lvl+0x8c/0xd0
[   19.753079]  print_report+0x118/0x608
[   19.753128]  kasan_report+0xdc/0x128
[   19.753173]  kasan_check_range+0x100/0x1a8
[   19.753222]  __kasan_check_read+0x20/0x30
[   19.753267]  kasan_atomics_helper+0xdd4/0x4858
[   19.753314]  kasan_atomics+0x198/0x2e0
[   19.753360]  kunit_try_run_case+0x170/0x3f0
[   19.753406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.753459]  kthread+0x328/0x630
[   19.753510]  ret_from_fork+0x10/0x20
[   19.753559] 
[   19.753588] Allocated by task 266:
[   19.753624]  kasan_save_stack+0x3c/0x68
[   19.753667]  kasan_save_track+0x20/0x40
[   19.753705]  kasan_save_alloc_info+0x40/0x58
[   19.753747]  __kasan_kmalloc+0xd4/0xd8
[   19.753785]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.753825]  kasan_atomics+0xb8/0x2e0
[   19.753870]  kunit_try_run_case+0x170/0x3f0
[   19.753910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.753955]  kthread+0x328/0x630
[   19.754320]  ret_from_fork+0x10/0x20
[   19.754393] 
[   19.754759] The buggy address belongs to the object at fff00000c77bfc80
[   19.754759]  which belongs to the cache kmalloc-64 of size 64
[   19.754840] The buggy address is located 0 bytes to the right of
[   19.754840]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.754960] 
[   19.755310] The buggy address belongs to the physical page:
[   19.755704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.756071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.756388] page_type: f5(slab)
[   19.756596] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.756921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.757114] page dumped because: kasan: bad access detected
[   19.757450] 
[   19.757510] Memory state around the buggy address:
[   19.757659]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.757727]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.757935] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.758195]                                      ^
[   19.758436]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.759246]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.759393] ==================================================================
[   19.759804] ==================================================================
[   19.759854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.760229] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.760497] 
[   19.760685] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.760781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.760809] Hardware name: linux,dummy-virt (DT)
[   19.760843] Call trace:
[   19.760866]  show_stack+0x20/0x38 (C)
[   19.761128]  dump_stack_lvl+0x8c/0xd0
[   19.761438]  print_report+0x118/0x608
[   19.761668]  kasan_report+0xdc/0x128
[   19.761913]  __asan_report_load8_noabort+0x20/0x30
[   19.762116]  kasan_atomics_helper+0x3f58/0x4858
[   19.762178]  kasan_atomics+0x198/0x2e0
[   19.762444]  kunit_try_run_case+0x170/0x3f0
[   19.762595]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.762838]  kthread+0x328/0x630
[   19.762893]  ret_from_fork+0x10/0x20
[   19.762946] 
[   19.762966] Allocated by task 266:
[   19.763005]  kasan_save_stack+0x3c/0x68
[   19.763550]  kasan_save_track+0x20/0x40
[   19.763751]  kasan_save_alloc_info+0x40/0x58
[   19.764015]  __kasan_kmalloc+0xd4/0xd8
[   19.764323]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.764621]  kasan_atomics+0xb8/0x2e0
[   19.764812]  kunit_try_run_case+0x170/0x3f0
[   19.765041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.765152]  kthread+0x328/0x630
[   19.765246]  ret_from_fork+0x10/0x20
[   19.765896] 
[   19.765952] The buggy address belongs to the object at fff00000c77bfc80
[   19.765952]  which belongs to the cache kmalloc-64 of size 64
[   19.766262] The buggy address is located 0 bytes to the right of
[   19.766262]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.766661] 
[   19.766698] The buggy address belongs to the physical page:
[   19.766860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.767094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.767187] page_type: f5(slab)
[   19.767553] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.767631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.767862] page dumped because: kasan: bad access detected
[   19.768040] 
[   19.768256] Memory state around the buggy address:
[   19.768302]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.768543]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.768668] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.769064]                                      ^
[   19.769573]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.769986]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.770077] ==================================================================
[   19.722331] ==================================================================
[   19.722400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.722454] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.722515] 
[   19.722549] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.723239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.723315] Hardware name: linux,dummy-virt (DT)
[   19.723378] Call trace:
[   19.723531]  show_stack+0x20/0x38 (C)
[   19.723673]  dump_stack_lvl+0x8c/0xd0
[   19.723737]  print_report+0x118/0x608
[   19.724143]  kasan_report+0xdc/0x128
[   19.724223]  __asan_report_load4_noabort+0x20/0x30
[   19.724466]  kasan_atomics_helper+0x3dd8/0x4858
[   19.724672]  kasan_atomics+0x198/0x2e0
[   19.724839]  kunit_try_run_case+0x170/0x3f0
[   19.725140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.725316]  kthread+0x328/0x630
[   19.725612]  ret_from_fork+0x10/0x20
[   19.726061] 
[   19.726131] Allocated by task 266:
[   19.726208]  kasan_save_stack+0x3c/0x68
[   19.726278]  kasan_save_track+0x20/0x40
[   19.726318]  kasan_save_alloc_info+0x40/0x58
[   19.726910]  __kasan_kmalloc+0xd4/0xd8
[   19.727086]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.727240]  kasan_atomics+0xb8/0x2e0
[   19.727286]  kunit_try_run_case+0x170/0x3f0
[   19.727349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.727715]  kthread+0x328/0x630
[   19.728105]  ret_from_fork+0x10/0x20
[   19.728176] 
[   19.728382] The buggy address belongs to the object at fff00000c77bfc80
[   19.728382]  which belongs to the cache kmalloc-64 of size 64
[   19.728486] The buggy address is located 0 bytes to the right of
[   19.728486]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.728743] 
[   19.728836] The buggy address belongs to the physical page:
[   19.729213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.729280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.729895] page_type: f5(slab)
[   19.730099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.730334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.730743] page dumped because: kasan: bad access detected
[   19.730811] 
[   19.730949] Memory state around the buggy address:
[   19.731072]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.731327]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.731558] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.731625]                                      ^
[   19.731918]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.732045]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.732121] ==================================================================
[   19.923147] ==================================================================
[   19.923205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.924462] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.924534] 
[   19.924571] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.924662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.924690] Hardware name: linux,dummy-virt (DT)
[   19.925133] Call trace:
[   19.925362]  show_stack+0x20/0x38 (C)
[   19.925420]  dump_stack_lvl+0x8c/0xd0
[   19.925468]  print_report+0x118/0x608
[   19.926048]  kasan_report+0xdc/0x128
[   19.926118]  __asan_report_load8_noabort+0x20/0x30
[   19.926325]  kasan_atomics_helper+0x3e10/0x4858
[   19.926453]  kasan_atomics+0x198/0x2e0
[   19.926602]  kunit_try_run_case+0x170/0x3f0
[   19.926944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.927379]  kthread+0x328/0x630
[   19.927638]  ret_from_fork+0x10/0x20
[   19.927701] 
[   19.927721] Allocated by task 266:
[   19.927758]  kasan_save_stack+0x3c/0x68
[   19.927894]  kasan_save_track+0x20/0x40
[   19.927986]  kasan_save_alloc_info+0x40/0x58
[   19.928046]  __kasan_kmalloc+0xd4/0xd8
[   19.928087]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.928528]  kasan_atomics+0xb8/0x2e0
[   19.928577]  kunit_try_run_case+0x170/0x3f0
[   19.928913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.929259]  kthread+0x328/0x630
[   19.929458]  ret_from_fork+0x10/0x20
[   19.929498] 
[   19.929765] The buggy address belongs to the object at fff00000c77bfc80
[   19.929765]  which belongs to the cache kmalloc-64 of size 64
[   19.929834] The buggy address is located 0 bytes to the right of
[   19.929834]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.930120] 
[   19.930147] The buggy address belongs to the physical page:
[   19.930183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.930387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.930439] page_type: f5(slab)
[   19.930479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.930813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.930871] page dumped because: kasan: bad access detected
[   19.930992] 
[   19.931016] Memory state around the buggy address:
[   19.931179]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.931430]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.931751] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.931800]                                      ^
[   19.931836]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.932098]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.932293] ==================================================================
[   19.950232] ==================================================================
[   19.950287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.950337] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.950388] 
[   19.950421] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.953099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.953131] Hardware name: linux,dummy-virt (DT)
[   19.953164] Call trace:
[   19.953189]  show_stack+0x20/0x38 (C)
[   19.953240]  dump_stack_lvl+0x8c/0xd0
[   19.953291]  print_report+0x118/0x608
[   19.953337]  kasan_report+0xdc/0x128
[   19.953384]  __asan_report_load8_noabort+0x20/0x30
[   19.953436]  kasan_atomics_helper+0x3e20/0x4858
[   19.953484]  kasan_atomics+0x198/0x2e0
[   19.953531]  kunit_try_run_case+0x170/0x3f0
[   19.953578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.953637]  kthread+0x328/0x630
[   19.953680]  ret_from_fork+0x10/0x20
[   19.953727] 
[   19.953747] Allocated by task 266:
[   19.953777]  kasan_save_stack+0x3c/0x68
[   19.953818]  kasan_save_track+0x20/0x40
[   19.953857]  kasan_save_alloc_info+0x40/0x58
[   19.953920]  __kasan_kmalloc+0xd4/0xd8
[   19.953996]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.954039]  kasan_atomics+0xb8/0x2e0
[   19.954075]  kunit_try_run_case+0x170/0x3f0
[   19.954114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.954157]  kthread+0x328/0x630
[   19.954193]  ret_from_fork+0x10/0x20
[   19.954239] 
[   19.954268] The buggy address belongs to the object at fff00000c77bfc80
[   19.954268]  which belongs to the cache kmalloc-64 of size 64
[   19.954336] The buggy address is located 0 bytes to the right of
[   19.954336]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.954414] 
[   19.954451] The buggy address belongs to the physical page:
[   19.954491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.954545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.954604] page_type: f5(slab)
[   19.954926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.955214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.955375] page dumped because: kasan: bad access detected
[   19.955447] 
[   19.955624] Memory state around the buggy address:
[   19.955824]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.955941]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.956074] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.956116]                                      ^
[   19.956150]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.956196]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.956236] ==================================================================
[   19.862241] ==================================================================
[   19.862287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.862334] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.862384] 
[   19.862413] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.862495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.862521] Hardware name: linux,dummy-virt (DT)
[   19.862554] Call trace:
[   19.862575]  show_stack+0x20/0x38 (C)
[   19.862634]  dump_stack_lvl+0x8c/0xd0
[   19.862681]  print_report+0x118/0x608
[   19.862727]  kasan_report+0xdc/0x128
[   19.862772]  kasan_check_range+0x100/0x1a8
[   19.862823]  __kasan_check_write+0x20/0x30
[   19.862868]  kasan_atomics_helper+0x154c/0x4858
[   19.862915]  kasan_atomics+0x198/0x2e0
[   19.862961]  kunit_try_run_case+0x170/0x3f0
[   19.863019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.863070]  kthread+0x328/0x630
[   19.863112]  ret_from_fork+0x10/0x20
[   19.863158] 
[   19.863211] Allocated by task 266:
[   19.863245]  kasan_save_stack+0x3c/0x68
[   19.863286]  kasan_save_track+0x20/0x40
[   19.863325]  kasan_save_alloc_info+0x40/0x58
[   19.863367]  __kasan_kmalloc+0xd4/0xd8
[   19.863405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.863493]  kasan_atomics+0xb8/0x2e0
[   19.863531]  kunit_try_run_case+0x170/0x3f0
[   19.863569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.863636]  kthread+0x328/0x630
[   19.863672]  ret_from_fork+0x10/0x20
[   19.863710] 
[   19.863730] The buggy address belongs to the object at fff00000c77bfc80
[   19.863730]  which belongs to the cache kmalloc-64 of size 64
[   19.863790] The buggy address is located 0 bytes to the right of
[   19.863790]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.863855] 
[   19.863876] The buggy address belongs to the physical page:
[   19.863909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.863961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.864021] page_type: f5(slab)
[   19.864057] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.864110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.864152] page dumped because: kasan: bad access detected
[   19.864186] 
[   19.864205] Memory state around the buggy address:
[   19.864238]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.864283]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.864329] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.864370]                                      ^
[   19.864484]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.864582]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.864728] ==================================================================
[   19.883414] ==================================================================
[   19.883522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.883571] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.883623] 
[   19.883654] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.883737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.883766] Hardware name: linux,dummy-virt (DT)
[   19.883797] Call trace:
[   19.883823]  show_stack+0x20/0x38 (C)
[   19.883869]  dump_stack_lvl+0x8c/0xd0
[   19.884203]  print_report+0x118/0x608
[   19.884282]  kasan_report+0xdc/0x128
[   19.884937]  kasan_check_range+0x100/0x1a8
[   19.885209]  __kasan_check_write+0x20/0x30
[   19.885258]  kasan_atomics_helper+0x1644/0x4858
[   19.886714]  kasan_atomics+0x198/0x2e0
[   19.887216]  kunit_try_run_case+0x170/0x3f0
[   19.887410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.887484]  kthread+0x328/0x630
[   19.887843]  ret_from_fork+0x10/0x20
[   19.888098] 
[   19.888137] Allocated by task 266:
[   19.888283]  kasan_save_stack+0x3c/0x68
[   19.888601]  kasan_save_track+0x20/0x40
[   19.888644]  kasan_save_alloc_info+0x40/0x58
[   19.888846]  __kasan_kmalloc+0xd4/0xd8
[   19.888887]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.889440]  kasan_atomics+0xb8/0x2e0
[   19.889522]  kunit_try_run_case+0x170/0x3f0
[   19.889736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.889852]  kthread+0x328/0x630
[   19.890061]  ret_from_fork+0x10/0x20
[   19.890501] 
[   19.890599] The buggy address belongs to the object at fff00000c77bfc80
[   19.890599]  which belongs to the cache kmalloc-64 of size 64
[   19.890671] The buggy address is located 0 bytes to the right of
[   19.890671]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.890739] 
[   19.890760] The buggy address belongs to the physical page:
[   19.890795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.891373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.891430] page_type: f5(slab)
[   19.891471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.892257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.892701] page dumped because: kasan: bad access detected
[   19.892941] 
[   19.892963] Memory state around the buggy address:
[   19.893011]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.893060]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.893106] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.893829]                                      ^
[   19.894187]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.894237]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.894344] ==================================================================
[   19.827331] ==================================================================
[   19.827380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.827492] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.827670] 
[   19.827701] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.827791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.828178] Hardware name: linux,dummy-virt (DT)
[   19.828251] Call trace:
[   19.828435]  show_stack+0x20/0x38 (C)
[   19.828487]  dump_stack_lvl+0x8c/0xd0
[   19.828532]  print_report+0x118/0x608
[   19.828648]  kasan_report+0xdc/0x128
[   19.828718]  kasan_check_range+0x100/0x1a8
[   19.829106]  __kasan_check_write+0x20/0x30
[   19.829154]  kasan_atomics_helper+0x1190/0x4858
[   19.829201]  kasan_atomics+0x198/0x2e0
[   19.829328]  kunit_try_run_case+0x170/0x3f0
[   19.829538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.829804]  kthread+0x328/0x630
[   19.829854]  ret_from_fork+0x10/0x20
[   19.829958] 
[   19.829987] Allocated by task 266:
[   19.830017]  kasan_save_stack+0x3c/0x68
[   19.830057]  kasan_save_track+0x20/0x40
[   19.830097]  kasan_save_alloc_info+0x40/0x58
[   19.830138]  __kasan_kmalloc+0xd4/0xd8
[   19.830175]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.830216]  kasan_atomics+0xb8/0x2e0
[   19.830251]  kunit_try_run_case+0x170/0x3f0
[   19.830292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.830335]  kthread+0x328/0x630
[   19.830368]  ret_from_fork+0x10/0x20
[   19.830405] 
[   19.830425] The buggy address belongs to the object at fff00000c77bfc80
[   19.830425]  which belongs to the cache kmalloc-64 of size 64
[   19.830498] The buggy address is located 0 bytes to the right of
[   19.830498]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.830756] 
[   19.830778] The buggy address belongs to the physical page:
[   19.830812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.830890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.830939] page_type: f5(slab)
[   19.830986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.831039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.831081] page dumped because: kasan: bad access detected
[   19.831115] 
[   19.831135] Memory state around the buggy address:
[   19.831174]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.831219]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.831265] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.831364]                                      ^
[   19.831588]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.831639]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.831753] ==================================================================
[   19.734107] ==================================================================
[   19.734466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.734849] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.735010] 
[   19.735209] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.735346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.735387] Hardware name: linux,dummy-virt (DT)
[   19.735426] Call trace:
[   19.735451]  show_stack+0x20/0x38 (C)
[   19.735510]  dump_stack_lvl+0x8c/0xd0
[   19.735744]  print_report+0x118/0x608
[   19.735962]  kasan_report+0xdc/0x128
[   19.736234]  kasan_check_range+0x100/0x1a8
[   19.736484]  __kasan_check_write+0x20/0x30
[   19.736637]  kasan_atomics_helper+0xd3c/0x4858
[   19.736898]  kasan_atomics+0x198/0x2e0
[   19.736956]  kunit_try_run_case+0x170/0x3f0
[   19.737020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.737074]  kthread+0x328/0x630
[   19.737116]  ret_from_fork+0x10/0x20
[   19.737306] 
[   19.737339] Allocated by task 266:
[   19.737395]  kasan_save_stack+0x3c/0x68
[   19.737443]  kasan_save_track+0x20/0x40
[   19.737484]  kasan_save_alloc_info+0x40/0x58
[   19.737528]  __kasan_kmalloc+0xd4/0xd8
[   19.737578]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.737646]  kasan_atomics+0xb8/0x2e0
[   19.737692]  kunit_try_run_case+0x170/0x3f0
[   19.737732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.737786]  kthread+0x328/0x630
[   19.737831]  ret_from_fork+0x10/0x20
[   19.737869] 
[   19.737898] The buggy address belongs to the object at fff00000c77bfc80
[   19.737898]  which belongs to the cache kmalloc-64 of size 64
[   19.737957] The buggy address is located 0 bytes to the right of
[   19.737957]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.738035] 
[   19.738067] The buggy address belongs to the physical page:
[   19.738109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.738181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.738231] page_type: f5(slab)
[   19.738300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.738371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.738425] page dumped because: kasan: bad access detected
[   19.738471] 
[   19.738501] Memory state around the buggy address:
[   19.738534]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.738579]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.738883] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.739184]                                      ^
[   19.739230]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.739278]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.739689] ==================================================================
[   19.648160] ==================================================================
[   19.648364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.648418] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.648994] 
[   19.649199] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.649421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.649536] Hardware name: linux,dummy-virt (DT)
[   19.649717] Call trace:
[   19.649759]  show_stack+0x20/0x38 (C)
[   19.649812]  dump_stack_lvl+0x8c/0xd0
[   19.650141]  print_report+0x118/0x608
[   19.650469]  kasan_report+0xdc/0x128
[   19.650539]  kasan_check_range+0x100/0x1a8
[   19.650591]  __kasan_check_write+0x20/0x30
[   19.650702]  kasan_atomics_helper+0xa6c/0x4858
[   19.650782]  kasan_atomics+0x198/0x2e0
[   19.650927]  kunit_try_run_case+0x170/0x3f0
[   19.650992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.651341]  kthread+0x328/0x630
[   19.651509]  ret_from_fork+0x10/0x20
[   19.651598] 
[   19.651812] Allocated by task 266:
[   19.651850]  kasan_save_stack+0x3c/0x68
[   19.651905]  kasan_save_track+0x20/0x40
[   19.651944]  kasan_save_alloc_info+0x40/0x58
[   19.651996]  __kasan_kmalloc+0xd4/0xd8
[   19.652034]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.652077]  kasan_atomics+0xb8/0x2e0
[   19.652114]  kunit_try_run_case+0x170/0x3f0
[   19.652155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.652200]  kthread+0x328/0x630
[   19.652235]  ret_from_fork+0x10/0x20
[   19.652274] 
[   19.652294] The buggy address belongs to the object at fff00000c77bfc80
[   19.652294]  which belongs to the cache kmalloc-64 of size 64
[   19.652354] The buggy address is located 0 bytes to the right of
[   19.652354]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.652421] 
[   19.652441] The buggy address belongs to the physical page:
[   19.652474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.652529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.652578] page_type: f5(slab)
[   19.652617] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.652669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.652711] page dumped because: kasan: bad access detected
[   19.652909] 
[   19.652934] Memory state around the buggy address:
[   19.652971]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.653381]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.653541] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.653917]                                      ^
[   19.654096]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.654191]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.654233] ==================================================================
[   19.673254] ==================================================================
[   19.673578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   19.673656] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.673709] 
[   19.673745] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.674328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.674429] Hardware name: linux,dummy-virt (DT)
[   19.674490] Call trace:
[   19.674527]  show_stack+0x20/0x38 (C)
[   19.674581]  dump_stack_lvl+0x8c/0xd0
[   19.674913]  print_report+0x118/0x608
[   19.674993]  kasan_report+0xdc/0x128
[   19.675448]  kasan_check_range+0x100/0x1a8
[   19.675610]  __kasan_check_write+0x20/0x30
[   19.675825]  kasan_atomics_helper+0xb70/0x4858
[   19.676061]  kasan_atomics+0x198/0x2e0
[   19.676183]  kunit_try_run_case+0x170/0x3f0
[   19.676270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.676340]  kthread+0x328/0x630
[   19.677335]  ret_from_fork+0x10/0x20
[   19.677434] 
[   19.677488] Allocated by task 266:
[   19.677639]  kasan_save_stack+0x3c/0x68
[   19.677851]  kasan_save_track+0x20/0x40
[   19.677994]  kasan_save_alloc_info+0x40/0x58
[   19.678086]  __kasan_kmalloc+0xd4/0xd8
[   19.678186]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.678252]  kasan_atomics+0xb8/0x2e0
[   19.678358]  kunit_try_run_case+0x170/0x3f0
[   19.678434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.678628]  kthread+0x328/0x630
[   19.678824]  ret_from_fork+0x10/0x20
[   19.678894] 
[   19.679161] The buggy address belongs to the object at fff00000c77bfc80
[   19.679161]  which belongs to the cache kmalloc-64 of size 64
[   19.679246] The buggy address is located 0 bytes to the right of
[   19.679246]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.679446] 
[   19.679474] The buggy address belongs to the physical page:
[   19.679508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.679720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.680035] page_type: f5(slab)
[   19.680462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.680547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.680591] page dumped because: kasan: bad access detected
[   19.680778] 
[   19.681304] Memory state around the buggy address:
[   19.681425]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.681543]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.681652] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.682106]                                      ^
[   19.682171]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.682236]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.682279] ==================================================================
[   19.639300] ==================================================================
[   19.639373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   19.639444] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.639514] 
[   19.639547] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.639631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.640358] Hardware name: linux,dummy-virt (DT)
[   19.640412] Call trace:
[   19.640528]  show_stack+0x20/0x38 (C)
[   19.640634]  dump_stack_lvl+0x8c/0xd0
[   19.640687]  print_report+0x118/0x608
[   19.640733]  kasan_report+0xdc/0x128
[   19.640926]  kasan_check_range+0x100/0x1a8
[   19.641154]  __kasan_check_write+0x20/0x30
[   19.641224]  kasan_atomics_helper+0xa04/0x4858
[   19.641542]  kasan_atomics+0x198/0x2e0
[   19.641645]  kunit_try_run_case+0x170/0x3f0
[   19.641697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.642175]  kthread+0x328/0x630
[   19.642287]  ret_from_fork+0x10/0x20
[   19.642352] 
[   19.642372] Allocated by task 266:
[   19.642403]  kasan_save_stack+0x3c/0x68
[   19.642450]  kasan_save_track+0x20/0x40
[   19.642900]  kasan_save_alloc_info+0x40/0x58
[   19.643159]  __kasan_kmalloc+0xd4/0xd8
[   19.643296]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.643410]  kasan_atomics+0xb8/0x2e0
[   19.643452]  kunit_try_run_case+0x170/0x3f0
[   19.643611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.643829]  kthread+0x328/0x630
[   19.644048]  ret_from_fork+0x10/0x20
[   19.644107] 
[   19.644397] The buggy address belongs to the object at fff00000c77bfc80
[   19.644397]  which belongs to the cache kmalloc-64 of size 64
[   19.644523] The buggy address is located 0 bytes to the right of
[   19.644523]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.644593] 
[   19.644636] The buggy address belongs to the physical page:
[   19.644679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.644754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.644812] page_type: f5(slab)
[   19.644866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.644919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.644971] page dumped because: kasan: bad access detected
[   19.645040] 
[   19.645094] Memory state around the buggy address:
[   19.645156]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.645636]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.645716] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.646001]                                      ^
[   19.646044]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.646479]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.646762] ==================================================================
[   19.839131] ==================================================================
[   19.839186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.839352] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.839474] 
[   19.839504] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.839607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.839636] Hardware name: linux,dummy-virt (DT)
[   19.839666] Call trace:
[   19.839691]  show_stack+0x20/0x38 (C)
[   19.839738]  dump_stack_lvl+0x8c/0xd0
[   19.839785]  print_report+0x118/0x608
[   19.839830]  kasan_report+0xdc/0x128
[   19.839876]  kasan_check_range+0x100/0x1a8
[   19.839945]  __kasan_check_write+0x20/0x30
[   19.840056]  kasan_atomics_helper+0x12d8/0x4858
[   19.840195]  kasan_atomics+0x198/0x2e0
[   19.840267]  kunit_try_run_case+0x170/0x3f0
[   19.840321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.840549]  kthread+0x328/0x630
[   19.840700]  ret_from_fork+0x10/0x20
[   19.840747] 
[   19.840767] Allocated by task 266:
[   19.840795]  kasan_save_stack+0x3c/0x68
[   19.840837]  kasan_save_track+0x20/0x40
[   19.840874]  kasan_save_alloc_info+0x40/0x58
[   19.840916]  __kasan_kmalloc+0xd4/0xd8
[   19.840954]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.841001]  kasan_atomics+0xb8/0x2e0
[   19.841039]  kunit_try_run_case+0x170/0x3f0
[   19.841085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.841304]  kthread+0x328/0x630
[   19.841485]  ret_from_fork+0x10/0x20
[   19.841562] 
[   19.841582] The buggy address belongs to the object at fff00000c77bfc80
[   19.841582]  which belongs to the cache kmalloc-64 of size 64
[   19.841818] The buggy address is located 0 bytes to the right of
[   19.841818]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.842666] 
[   19.842692] The buggy address belongs to the physical page:
[   19.842725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.842779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.842828] page_type: f5(slab)
[   19.842866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.842919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.842961] page dumped because: kasan: bad access detected
[   19.843005] 
[   19.843025] Memory state around the buggy address:
[   19.843059]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.843111]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.843156] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.843198]                                      ^
[   19.843230]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.843273]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.843312] ==================================================================
[   19.683299] ==================================================================
[   19.683587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   19.683894] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.683963] 
[   19.684010] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.684093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.684483] Hardware name: linux,dummy-virt (DT)
[   19.684537] Call trace:
[   19.684768]  show_stack+0x20/0x38 (C)
[   19.684836]  dump_stack_lvl+0x8c/0xd0
[   19.685089]  print_report+0x118/0x608
[   19.685165]  kasan_report+0xdc/0x128
[   19.685417]  __asan_report_load4_noabort+0x20/0x30
[   19.685665]  kasan_atomics_helper+0x3dbc/0x4858
[   19.685819]  kasan_atomics+0x198/0x2e0
[   19.685872]  kunit_try_run_case+0x170/0x3f0
[   19.685956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.686027]  kthread+0x328/0x630
[   19.686071]  ret_from_fork+0x10/0x20
[   19.686326] 
[   19.686631] Allocated by task 266:
[   19.686920]  kasan_save_stack+0x3c/0x68
[   19.687019]  kasan_save_track+0x20/0x40
[   19.687372]  kasan_save_alloc_info+0x40/0x58
[   19.687447]  __kasan_kmalloc+0xd4/0xd8
[   19.687606]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.687856]  kasan_atomics+0xb8/0x2e0
[   19.688038]  kunit_try_run_case+0x170/0x3f0
[   19.688259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.688440]  kthread+0x328/0x630
[   19.688517]  ret_from_fork+0x10/0x20
[   19.688865] 
[   19.689173] The buggy address belongs to the object at fff00000c77bfc80
[   19.689173]  which belongs to the cache kmalloc-64 of size 64
[   19.689726] The buggy address is located 0 bytes to the right of
[   19.689726]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.689906] 
[   19.689987] The buggy address belongs to the physical page:
[   19.690064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.690225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.690297] page_type: f5(slab)
[   19.690346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.690418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.690463] page dumped because: kasan: bad access detected
[   19.690495] 
[   19.690523] Memory state around the buggy address:
[   19.690558]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.690612]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.690998] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.691182]                                      ^
[   19.691225]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.691271]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.691313] ==================================================================
[   19.600758] ==================================================================
[   19.600813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   19.600865] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.600918] 
[   19.600950] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.601431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.601715] Hardware name: linux,dummy-virt (DT)
[   19.601803] Call trace:
[   19.603030]  kasan_check_range+0x100/0x1a8
[   19.603500]  kasan_atomics+0x198/0x2e0
[   19.603664]  kunit_try_run_case+0x170/0x3f0
[   19.603721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.603777]  kthread+0x328/0x630
[   19.604323] 
[   19.604752]  kasan_save_stack+0x3c/0x68
[   19.605219]  kasan_save_alloc_info+0x40/0x58
[   19.605859]  kasan_atomics+0xb8/0x2e0
[   19.606721]  ret_from_fork+0x10/0x20
[   19.607141] 
[   19.607291] The buggy address belongs to the physical page:
[   19.607338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.607454] page_type: f5(slab)
[   19.607652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.608021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.608300] page dumped because: kasan: bad access detected
[   19.610579] 
[   19.613585]  __kasan_check_write+0x20/0x30
[   19.616403] 
[   19.617620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.619337]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.620807] Call trace:
[   19.621912]  kthread+0x328/0x630
[   19.622759]  ret_from_fork+0x10/0x20
[   19.623311] 
[   19.623380] The buggy address belongs to the physical page:
[   19.623473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.623571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.623633] page_type: f5(slab)
[   19.623673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.623876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.624149] page dumped because: kasan: bad access detected
[   19.624235] 
[   19.624311] Memory state around the buggy address:
[   19.624435]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.624519]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.624592] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.625660] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.626761]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.627238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.628126] 
[   19.629317]  dump_stack_lvl+0x8c/0xd0
[   19.629518]  print_report+0x118/0x608
[   19.629639]  kasan_report+0xdc/0x128
[   19.629718]  kasan_check_range+0x100/0x1a8
[   19.630728]  __kasan_check_write+0x20/0x30
[   19.630796]  kasan_atomics_helper+0x934/0x4858
[   19.630847]  kasan_atomics+0x198/0x2e0
[   19.631076]  kunit_try_run_case+0x170/0x3f0
[   19.631161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.631266]  kthread+0x328/0x630
[   19.631318]  ret_from_fork+0x10/0x20
[   19.631460] 
[   19.631532] Allocated by task 266:
[   19.631612]  kasan_save_stack+0x3c/0x68
[   19.631722]  kasan_save_track+0x20/0x40
[   19.631763]  kasan_save_alloc_info+0x40/0x58
[   19.631814]  __kasan_kmalloc+0xd4/0xd8
[   19.631854]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.631893]  kasan_atomics+0xb8/0x2e0
[   19.632146]  kunit_try_run_case+0x170/0x3f0
[   19.632232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.632344]  kthread+0x328/0x630
[   19.632411]  ret_from_fork+0x10/0x20
[   19.632483] 
[   19.632523] The buggy address belongs to the object at fff00000c77bfc80
[   19.632523]  which belongs to the cache kmalloc-64 of size 64
[   19.632592] The buggy address is located 0 bytes to the right of
[   19.632592]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.632657] 
[   19.632842] The buggy address belongs to the physical page:
[   19.632924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.633026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.633074] page_type: f5(slab)
[   19.633131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.633183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.633225] page dumped because: kasan: bad access detected
[   19.633450] 
[   19.633521] Memory state around the buggy address:
[   19.633610]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.633674]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.633727] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.634141]                                      ^
[   19.634206]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.634269]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.634332] ==================================================================
[   19.855562] ==================================================================
[   19.855600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.855645] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.855694] 
[   19.855724] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.855805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.855831] Hardware name: linux,dummy-virt (DT)
[   19.855864] Call trace:
[   19.855886]  show_stack+0x20/0x38 (C)
[   19.855933]  dump_stack_lvl+0x8c/0xd0
[   19.855990]  print_report+0x118/0x608
[   19.856038]  kasan_report+0xdc/0x128
[   19.856083]  kasan_check_range+0x100/0x1a8
[   19.856131]  __kasan_check_write+0x20/0x30
[   19.856176]  kasan_atomics_helper+0x147c/0x4858
[   19.856223]  kasan_atomics+0x198/0x2e0
[   19.856269]  kunit_try_run_case+0x170/0x3f0
[   19.856318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.856370]  kthread+0x328/0x630
[   19.856412]  ret_from_fork+0x10/0x20
[   19.856458] 
[   19.856477] Allocated by task 266:
[   19.856506]  kasan_save_stack+0x3c/0x68
[   19.856545]  kasan_save_track+0x20/0x40
[   19.856585]  kasan_save_alloc_info+0x40/0x58
[   19.856626]  __kasan_kmalloc+0xd4/0xd8
[   19.856663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.856704]  kasan_atomics+0xb8/0x2e0
[   19.856741]  kunit_try_run_case+0x170/0x3f0
[   19.856779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.856824]  kthread+0x328/0x630
[   19.856858]  ret_from_fork+0x10/0x20
[   19.856895] 
[   19.856914] The buggy address belongs to the object at fff00000c77bfc80
[   19.856914]  which belongs to the cache kmalloc-64 of size 64
[   19.857349] The buggy address is located 0 bytes to the right of
[   19.857349]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.857424] 
[   19.857446] The buggy address belongs to the physical page:
[   19.857478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.857531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.857579] page_type: f5(slab)
[   19.857622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.857675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.857717] page dumped because: kasan: bad access detected
[   19.857751] 
[   19.857770] Memory state around the buggy address:
[   19.857803]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.857848]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.857894] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.857935]                                      ^
[   19.857967]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.858023]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.858064] ==================================================================
[   19.801908] ==================================================================
[   19.801998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.802082] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.802135] 
[   19.802168] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.802261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.802293] Hardware name: linux,dummy-virt (DT)
[   19.802325] Call trace:
[   19.802348]  show_stack+0x20/0x38 (C)
[   19.802394]  dump_stack_lvl+0x8c/0xd0
[   19.802442]  print_report+0x118/0x608
[   19.802488]  kasan_report+0xdc/0x128
[   19.802546]  kasan_check_range+0x100/0x1a8
[   19.802594]  __kasan_check_write+0x20/0x30
[   19.802674]  kasan_atomics_helper+0xf88/0x4858
[   19.802721]  kasan_atomics+0x198/0x2e0
[   19.802769]  kunit_try_run_case+0x170/0x3f0
[   19.803084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.803153]  kthread+0x328/0x630
[   19.803221]  ret_from_fork+0x10/0x20
[   19.803322] 
[   19.803398] Allocated by task 266:
[   19.803476]  kasan_save_stack+0x3c/0x68
[   19.803528]  kasan_save_track+0x20/0x40
[   19.803566]  kasan_save_alloc_info+0x40/0x58
[   19.803643]  __kasan_kmalloc+0xd4/0xd8
[   19.803844]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.803891]  kasan_atomics+0xb8/0x2e0
[   19.803928]  kunit_try_run_case+0x170/0x3f0
[   19.803967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.804025]  kthread+0x328/0x630
[   19.804211]  ret_from_fork+0x10/0x20
[   19.804307] 
[   19.804427] The buggy address belongs to the object at fff00000c77bfc80
[   19.804427]  which belongs to the cache kmalloc-64 of size 64
[   19.804553] The buggy address is located 0 bytes to the right of
[   19.804553]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.805033] 
[   19.805093] The buggy address belongs to the physical page:
[   19.805153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.805230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.805280] page_type: f5(slab)
[   19.805556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.805736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.805854] page dumped because: kasan: bad access detected
[   19.805919] 
[   19.806177] Memory state around the buggy address:
[   19.806314]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.806399]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.806446] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.806487]                                      ^
[   19.806552]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.806718]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.806884] ==================================================================
[   19.876026] ==================================================================
[   19.876076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.876242] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.876293] 
[   19.876324] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.876899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.876931] Hardware name: linux,dummy-virt (DT)
[   19.876966] Call trace:
[   19.877000]  show_stack+0x20/0x38 (C)
[   19.877052]  dump_stack_lvl+0x8c/0xd0
[   19.877098]  print_report+0x118/0x608
[   19.877146]  kasan_report+0xdc/0x128
[   19.877191]  __asan_report_load8_noabort+0x20/0x30
[   19.877244]  kasan_atomics_helper+0x3db0/0x4858
[   19.877999]  kasan_atomics+0x198/0x2e0
[   19.878075]  kunit_try_run_case+0x170/0x3f0
[   19.878188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.878244]  kthread+0x328/0x630
[   19.878286]  ret_from_fork+0x10/0x20
[   19.878771] 
[   19.878803] Allocated by task 266:
[   19.878863]  kasan_save_stack+0x3c/0x68
[   19.879153]  kasan_save_track+0x20/0x40
[   19.879194]  kasan_save_alloc_info+0x40/0x58
[   19.879236]  __kasan_kmalloc+0xd4/0xd8
[   19.879387]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.879437]  kasan_atomics+0xb8/0x2e0
[   19.879747]  kunit_try_run_case+0x170/0x3f0
[   19.879917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.879961]  kthread+0x328/0x630
[   19.880510]  ret_from_fork+0x10/0x20
[   19.880791] 
[   19.880822] The buggy address belongs to the object at fff00000c77bfc80
[   19.880822]  which belongs to the cache kmalloc-64 of size 64
[   19.880902] The buggy address is located 0 bytes to the right of
[   19.880902]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.881001] 
[   19.881262] The buggy address belongs to the physical page:
[   19.881322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.881379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.881816] page_type: f5(slab)
[   19.881864] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.882024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.882068] page dumped because: kasan: bad access detected
[   19.882354] 
[   19.882389] Memory state around the buggy address:
[   19.882426]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.882515]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.882561] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.882603]                                      ^
[   19.882636]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.882681]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.883069] ==================================================================
[   19.775819] ==================================================================
[   19.775859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.777073] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.777243] 
[   19.777300] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.777456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.777486] Hardware name: linux,dummy-virt (DT)
[   19.777519] Call trace:
[   19.777569]  show_stack+0x20/0x38 (C)
[   19.777910]  dump_stack_lvl+0x8c/0xd0
[   19.778279]  print_report+0x118/0x608
[   19.778391]  kasan_report+0xdc/0x128
[   19.778526]  __asan_report_store8_noabort+0x20/0x30
[   19.778612]  kasan_atomics_helper+0x3e5c/0x4858
[   19.778800]  kasan_atomics+0x198/0x2e0
[   19.778858]  kunit_try_run_case+0x170/0x3f0
[   19.778906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.779273]  kthread+0x328/0x630
[   19.779379]  ret_from_fork+0x10/0x20
[   19.779739] 
[   19.779787] Allocated by task 266:
[   19.779966]  kasan_save_stack+0x3c/0x68
[   19.780094]  kasan_save_track+0x20/0x40
[   19.780181]  kasan_save_alloc_info+0x40/0x58
[   19.780227]  __kasan_kmalloc+0xd4/0xd8
[   19.780516]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.780800]  kasan_atomics+0xb8/0x2e0
[   19.781035]  kunit_try_run_case+0x170/0x3f0
[   19.781085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.781353]  kthread+0x328/0x630
[   19.781652]  ret_from_fork+0x10/0x20
[   19.781723] 
[   19.781744] The buggy address belongs to the object at fff00000c77bfc80
[   19.781744]  which belongs to the cache kmalloc-64 of size 64
[   19.782274] The buggy address is located 0 bytes to the right of
[   19.782274]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.782501] 
[   19.782538] The buggy address belongs to the physical page:
[   19.782892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.783181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.783361] page_type: f5(slab)
[   19.783536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.783605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.783669] page dumped because: kasan: bad access detected
[   19.783708] 
[   19.783729] Memory state around the buggy address:
[   19.783765]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.784288]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.784529] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.784576]                                      ^
[   19.784638]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.784877]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.785006] ==================================================================
[   19.812387] ==================================================================
[   19.812472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.812551] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.812603] 
[   19.812837] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.812933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.812960] Hardware name: linux,dummy-virt (DT)
[   19.813122] Call trace:
[   19.813156]  show_stack+0x20/0x38 (C)
[   19.813210]  dump_stack_lvl+0x8c/0xd0
[   19.813286]  print_report+0x118/0x608
[   19.813369]  kasan_report+0xdc/0x128
[   19.813441]  kasan_check_range+0x100/0x1a8
[   19.813491]  __kasan_check_write+0x20/0x30
[   19.813547]  kasan_atomics_helper+0x1058/0x4858
[   19.813854]  kasan_atomics+0x198/0x2e0
[   19.813919]  kunit_try_run_case+0x170/0x3f0
[   19.814027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.814299]  kthread+0x328/0x630
[   19.814356]  ret_from_fork+0x10/0x20
[   19.814513] 
[   19.814541] Allocated by task 266:
[   19.814578]  kasan_save_stack+0x3c/0x68
[   19.814656]  kasan_save_track+0x20/0x40
[   19.814694]  kasan_save_alloc_info+0x40/0x58
[   19.814749]  __kasan_kmalloc+0xd4/0xd8
[   19.814789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.815072]  kasan_atomics+0xb8/0x2e0
[   19.815220]  kunit_try_run_case+0x170/0x3f0
[   19.815325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.815521]  kthread+0x328/0x630
[   19.815685]  ret_from_fork+0x10/0x20
[   19.815793] 
[   19.815938] The buggy address belongs to the object at fff00000c77bfc80
[   19.815938]  which belongs to the cache kmalloc-64 of size 64
[   19.816102] The buggy address is located 0 bytes to the right of
[   19.816102]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.816239] 
[   19.816315] The buggy address belongs to the physical page:
[   19.816446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.816513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.816562] page_type: f5(slab)
[   19.816937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.817119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.817194] page dumped because: kasan: bad access detected
[   19.817261] 
[   19.817452] Memory state around the buggy address:
[   19.817490]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.817691]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.818031] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.818138]                                      ^
[   19.818292]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.818508]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.818706] ==================================================================
[   19.824389] ==================================================================
[   19.824431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.824477] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.824527] 
[   19.824558] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.824639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.824666] Hardware name: linux,dummy-virt (DT)
[   19.824699] Call trace:
[   19.824721]  show_stack+0x20/0x38 (C)
[   19.824769]  dump_stack_lvl+0x8c/0xd0
[   19.824814]  print_report+0x118/0x608
[   19.824861]  kasan_report+0xdc/0x128
[   19.824906]  kasan_check_range+0x100/0x1a8
[   19.825079]  __kasan_check_write+0x20/0x30
[   19.825136]  kasan_atomics_helper+0x1128/0x4858
[   19.825186]  kasan_atomics+0x198/0x2e0
[   19.825230]  kunit_try_run_case+0x170/0x3f0
[   19.825283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.825336]  kthread+0x328/0x630
[   19.825377]  ret_from_fork+0x10/0x20
[   19.825424] 
[   19.825445] Allocated by task 266:
[   19.825474]  kasan_save_stack+0x3c/0x68
[   19.825515]  kasan_save_track+0x20/0x40
[   19.825553]  kasan_save_alloc_info+0x40/0x58
[   19.825606]  __kasan_kmalloc+0xd4/0xd8
[   19.825652]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.825691]  kasan_atomics+0xb8/0x2e0
[   19.825728]  kunit_try_run_case+0x170/0x3f0
[   19.825766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.825824]  kthread+0x328/0x630
[   19.825857]  ret_from_fork+0x10/0x20
[   19.825926] 
[   19.825946] The buggy address belongs to the object at fff00000c77bfc80
[   19.825946]  which belongs to the cache kmalloc-64 of size 64
[   19.826018] The buggy address is located 0 bytes to the right of
[   19.826018]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.826085] 
[   19.826106] The buggy address belongs to the physical page:
[   19.826138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.826405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.826467] page_type: f5(slab)
[   19.826568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.826735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.826791] page dumped because: kasan: bad access detected
[   19.826825] 
[   19.826845] Memory state around the buggy address:
[   19.826879]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.826923]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.826969] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.827020]                                      ^
[   19.827055]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.827097]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.827138] ==================================================================
[   19.843452] ==================================================================
[   19.843494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.843539] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.843589] 
[   19.843620] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.843699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.843727] Hardware name: linux,dummy-virt (DT)
[   19.843758] Call trace:
[   19.843783]  show_stack+0x20/0x38 (C)
[   19.843829]  dump_stack_lvl+0x8c/0xd0
[   19.843876]  print_report+0x118/0x608
[   19.843921]  kasan_report+0xdc/0x128
[   19.843969]  kasan_check_range+0x100/0x1a8
[   19.844103]  __kasan_check_write+0x20/0x30
[   19.844152]  kasan_atomics_helper+0x1384/0x4858
[   19.844201]  kasan_atomics+0x198/0x2e0
[   19.844246]  kunit_try_run_case+0x170/0x3f0
[   19.844294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.844347]  kthread+0x328/0x630
[   19.844388]  ret_from_fork+0x10/0x20
[   19.844436] 
[   19.844455] Allocated by task 266:
[   19.844509]  kasan_save_stack+0x3c/0x68
[   19.844553]  kasan_save_track+0x20/0x40
[   19.844591]  kasan_save_alloc_info+0x40/0x58
[   19.844633]  __kasan_kmalloc+0xd4/0xd8
[   19.844672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.844724]  kasan_atomics+0xb8/0x2e0
[   19.844764]  kunit_try_run_case+0x170/0x3f0
[   19.844851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.844934]  kthread+0x328/0x630
[   19.844969]  ret_from_fork+0x10/0x20
[   19.845017] 
[   19.845306] The buggy address belongs to the object at fff00000c77bfc80
[   19.845306]  which belongs to the cache kmalloc-64 of size 64
[   19.845368] The buggy address is located 0 bytes to the right of
[   19.845368]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.845440] 
[   19.845507] The buggy address belongs to the physical page:
[   19.845675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.845747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.845830] page_type: f5(slab)
[   19.845900] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.845953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.846005] page dumped because: kasan: bad access detected
[   19.846085] 
[   19.846174] Memory state around the buggy address:
[   19.846274]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.846344]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.846389] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.846432]                                      ^
[   19.846464]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.846510]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.846597] ==================================================================
[   19.654569] ==================================================================
[   19.654620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.654669] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.654721] 
[   19.654751] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.654833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.654860] Hardware name: linux,dummy-virt (DT)
[   19.654893] Call trace:
[   19.654915]  show_stack+0x20/0x38 (C)
[   19.654961]  dump_stack_lvl+0x8c/0xd0
[   19.655025]  print_report+0x118/0x608
[   19.655071]  kasan_report+0xdc/0x128
[   19.655117]  kasan_check_range+0x100/0x1a8
[   19.655167]  __kasan_check_write+0x20/0x30
[   19.655212]  kasan_atomics_helper+0xad4/0x4858
[   19.655261]  kasan_atomics+0x198/0x2e0
[   19.655306]  kunit_try_run_case+0x170/0x3f0
[   19.655354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.655408]  kthread+0x328/0x630
[   19.655448]  ret_from_fork+0x10/0x20
[   19.655496] 
[   19.655536] Allocated by task 266:
[   19.655573]  kasan_save_stack+0x3c/0x68
[   19.655617]  kasan_save_track+0x20/0x40
[   19.655656]  kasan_save_alloc_info+0x40/0x58
[   19.655699]  __kasan_kmalloc+0xd4/0xd8
[   19.655737]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.655778]  kasan_atomics+0xb8/0x2e0
[   19.655816]  kunit_try_run_case+0x170/0x3f0
[   19.655864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.655909]  kthread+0x328/0x630
[   19.655944]  ret_from_fork+0x10/0x20
[   19.656221] 
[   19.656516] The buggy address belongs to the object at fff00000c77bfc80
[   19.656516]  which belongs to the cache kmalloc-64 of size 64
[   19.656819] The buggy address is located 0 bytes to the right of
[   19.656819]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.657712] 
[   19.657758] The buggy address belongs to the physical page:
[   19.657818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.657896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.657967] page_type: f5(slab)
[   19.658407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.658498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.658641] page dumped because: kasan: bad access detected
[   19.659072] 
[   19.659098] Memory state around the buggy address:
[   19.659356]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.659729]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.660172] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.660237]                                      ^
[   19.660653]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660720]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660851] ==================================================================
[   19.957033] ==================================================================
[   19.957091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.957191] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.957428] 
[   19.957473] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.957568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.957655] Hardware name: linux,dummy-virt (DT)
[   19.957709] Call trace:
[   19.957759]  show_stack+0x20/0x38 (C)
[   19.957830]  dump_stack_lvl+0x8c/0xd0
[   19.958129]  print_report+0x118/0x608
[   19.958234]  kasan_report+0xdc/0x128
[   19.958300]  kasan_check_range+0x100/0x1a8
[   19.958376]  __kasan_check_write+0x20/0x30
[   19.958459]  kasan_atomics_helper+0x17ec/0x4858
[   19.958513]  kasan_atomics+0x198/0x2e0
[   19.958579]  kunit_try_run_case+0x170/0x3f0
[   19.958643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.958697]  kthread+0x328/0x630
[   19.959048]  ret_from_fork+0x10/0x20
[   19.959166] 
[   19.959209] Allocated by task 266:
[   19.959536]  kasan_save_stack+0x3c/0x68
[   19.959665]  kasan_save_track+0x20/0x40
[   19.959753]  kasan_save_alloc_info+0x40/0x58
[   19.959834]  __kasan_kmalloc+0xd4/0xd8
[   19.959923]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.960031]  kasan_atomics+0xb8/0x2e0
[   19.960147]  kunit_try_run_case+0x170/0x3f0
[   19.960234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.960307]  kthread+0x328/0x630
[   19.960343]  ret_from_fork+0x10/0x20
[   19.960380] 
[   19.960411] The buggy address belongs to the object at fff00000c77bfc80
[   19.960411]  which belongs to the cache kmalloc-64 of size 64
[   19.960472] The buggy address is located 0 bytes to the right of
[   19.960472]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.960783] 
[   19.960844] The buggy address belongs to the physical page:
[   19.960899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.961035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.961139] page_type: f5(slab)
[   19.961413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.961471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.961757] page dumped because: kasan: bad access detected
[   19.961821] 
[   19.961851] Memory state around the buggy address:
[   19.961899]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.961947]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.962001] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.962043]                                      ^
[   19.962077]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.962124]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.962163] ==================================================================
[   19.895295] ==================================================================
[   19.895349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.896083] Read of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.896255] 
[   19.896526] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.896613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.896642] Hardware name: linux,dummy-virt (DT)
[   19.896675] Call trace:
[   19.896942]  show_stack+0x20/0x38 (C)
[   19.897369]  dump_stack_lvl+0x8c/0xd0
[   19.897690]  print_report+0x118/0x608
[   19.897861]  kasan_report+0xdc/0x128
[   19.897911]  __asan_report_load8_noabort+0x20/0x30
[   19.897965]  kasan_atomics_helper+0x3df4/0x4858
[   19.898024]  kasan_atomics+0x198/0x2e0
[   19.898071]  kunit_try_run_case+0x170/0x3f0
[   19.898119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.899145]  kthread+0x328/0x630
[   19.899265]  ret_from_fork+0x10/0x20
[   19.899413] 
[   19.899479] Allocated by task 266:
[   19.899572]  kasan_save_stack+0x3c/0x68
[   19.899699]  kasan_save_track+0x20/0x40
[   19.899903]  kasan_save_alloc_info+0x40/0x58
[   19.900116]  __kasan_kmalloc+0xd4/0xd8
[   19.900334]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.900393]  kasan_atomics+0xb8/0x2e0
[   19.900715]  kunit_try_run_case+0x170/0x3f0
[   19.900937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.901148]  kthread+0x328/0x630
[   19.901413]  ret_from_fork+0x10/0x20
[   19.901535] 
[   19.901759] The buggy address belongs to the object at fff00000c77bfc80
[   19.901759]  which belongs to the cache kmalloc-64 of size 64
[   19.902208] The buggy address is located 0 bytes to the right of
[   19.902208]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.902284] 
[   19.902306] The buggy address belongs to the physical page:
[   19.902343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.902857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.903239] page_type: f5(slab)
[   19.903292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.903405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.903849] page dumped because: kasan: bad access detected
[   19.904204] 
[   19.904293] Memory state around the buggy address:
[   19.904333]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.904380]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.904427] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.904469]                                      ^
[   19.904505]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.905110]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.905755] ==================================================================
[   19.635488] ==================================================================
[   19.635548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.635646] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.635717] 
[   19.635764] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.635849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.635885] Hardware name: linux,dummy-virt (DT)
[   19.635917] Call trace:
[   19.636182]  show_stack+0x20/0x38 (C)
[   19.636246]  dump_stack_lvl+0x8c/0xd0
[   19.636375]  print_report+0x118/0x608
[   19.636444]  kasan_report+0xdc/0x128
[   19.636492]  kasan_check_range+0x100/0x1a8
[   19.636541]  __kasan_check_write+0x20/0x30
[   19.636587]  kasan_atomics_helper+0x99c/0x4858
[   19.636637]  kasan_atomics+0x198/0x2e0
[   19.636691]  kunit_try_run_case+0x170/0x3f0
[   19.636739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.636793]  kthread+0x328/0x630
[   19.636835]  ret_from_fork+0x10/0x20
[   19.636884] 
[   19.636913] Allocated by task 266:
[   19.636945]  kasan_save_stack+0x3c/0x68
[   19.636996]  kasan_save_track+0x20/0x40
[   19.637034]  kasan_save_alloc_info+0x40/0x58
[   19.637114]  __kasan_kmalloc+0xd4/0xd8
[   19.637153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.637512]  kasan_atomics+0xb8/0x2e0
[   19.637589]  kunit_try_run_case+0x170/0x3f0
[   19.637653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.637700]  kthread+0x328/0x630
[   19.637733]  ret_from_fork+0x10/0x20
[   19.637787] 
[   19.637827] The buggy address belongs to the object at fff00000c77bfc80
[   19.637827]  which belongs to the cache kmalloc-64 of size 64
[   19.637889] The buggy address is located 0 bytes to the right of
[   19.637889]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.638107] 
[   19.638133] The buggy address belongs to the physical page:
[   19.638189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.638262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.638342] page_type: f5(slab)
[   19.638385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.638437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.638481] page dumped because: kasan: bad access detected
[   19.638519] 
[   19.638557] Memory state around the buggy address:
[   19.638591]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.638655]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.638729] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.638770]                                      ^
[   19.638805]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.638848]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.638900] ==================================================================
[   19.712860] ==================================================================
[   19.712914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   19.712968] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.713039] 
[   19.713071] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.713154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.713181] Hardware name: linux,dummy-virt (DT)
[   19.713213] Call trace:
[   19.713237]  show_stack+0x20/0x38 (C)
[   19.713284]  dump_stack_lvl+0x8c/0xd0
[   19.713332]  print_report+0x118/0x608
[   19.713378]  kasan_report+0xdc/0x128
[   19.713424]  kasan_check_range+0x100/0x1a8
[   19.713472]  __kasan_check_write+0x20/0x30
[   19.713519]  kasan_atomics_helper+0xca0/0x4858
[   19.713569]  kasan_atomics+0x198/0x2e0
[   19.713613]  kunit_try_run_case+0x170/0x3f0
[   19.713666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.714418]  kthread+0x328/0x630
[   19.714489]  ret_from_fork+0x10/0x20
[   19.714542] 
[   19.714562] Allocated by task 266:
[   19.715287]  kasan_save_stack+0x3c/0x68
[   19.715393]  kasan_save_track+0x20/0x40
[   19.715685]  kasan_save_alloc_info+0x40/0x58
[   19.715794]  __kasan_kmalloc+0xd4/0xd8
[   19.715893]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.716254]  kasan_atomics+0xb8/0x2e0
[   19.716318]  kunit_try_run_case+0x170/0x3f0
[   19.716620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.716919]  kthread+0x328/0x630
[   19.717045]  ret_from_fork+0x10/0x20
[   19.717091] 
[   19.717121] The buggy address belongs to the object at fff00000c77bfc80
[   19.717121]  which belongs to the cache kmalloc-64 of size 64
[   19.717519] The buggy address is located 0 bytes to the right of
[   19.717519]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.717876] 
[   19.717920] The buggy address belongs to the physical page:
[   19.717964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.718149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.718389] page_type: f5(slab)
[   19.718775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.719022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.719420] page dumped because: kasan: bad access detected
[   19.719602] 
[   19.719649] Memory state around the buggy address:
[   19.719790]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.719840]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.720323] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.720373]                                      ^
[   19.720408]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.721016]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.721206] ==================================================================
[   19.771468] ==================================================================
[   19.771524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.771577] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.772075] 
[   19.772292] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.772419] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.772541] Hardware name: linux,dummy-virt (DT)
[   19.772579] Call trace:
[   19.772603]  show_stack+0x20/0x38 (C)
[   19.772683]  dump_stack_lvl+0x8c/0xd0
[   19.772916]  print_report+0x118/0x608
[   19.773009]  kasan_report+0xdc/0x128
[   19.773284]  kasan_check_range+0x100/0x1a8
[   19.773367]  __kasan_check_write+0x20/0x30
[   19.773415]  kasan_atomics_helper+0xe44/0x4858
[   19.773465]  kasan_atomics+0x198/0x2e0
[   19.773509]  kunit_try_run_case+0x170/0x3f0
[   19.773696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.773763]  kthread+0x328/0x630
[   19.773805]  ret_from_fork+0x10/0x20
[   19.773870] 
[   19.773900] Allocated by task 266:
[   19.773932]  kasan_save_stack+0x3c/0x68
[   19.773993]  kasan_save_track+0x20/0x40
[   19.774035]  kasan_save_alloc_info+0x40/0x58
[   19.774083]  __kasan_kmalloc+0xd4/0xd8
[   19.774123]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.774167]  kasan_atomics+0xb8/0x2e0
[   19.774211]  kunit_try_run_case+0x170/0x3f0
[   19.774252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.774297]  kthread+0x328/0x630
[   19.774332]  ret_from_fork+0x10/0x20
[   19.774370] 
[   19.774391] The buggy address belongs to the object at fff00000c77bfc80
[   19.774391]  which belongs to the cache kmalloc-64 of size 64
[   19.774450] The buggy address is located 0 bytes to the right of
[   19.774450]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.774517] 
[   19.774538] The buggy address belongs to the physical page:
[   19.774571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.775012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.775251] page_type: f5(slab)
[   19.775297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.775349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.775392] page dumped because: kasan: bad access detected
[   19.775426] 
[   19.775445] Memory state around the buggy address:
[   19.775479]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.775525]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.775568] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.775608]                                      ^
[   19.775643]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.775690]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.775728] ==================================================================
[   19.705758] ==================================================================
[   19.705885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   19.705993] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.706295] 
[   19.706644] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.706748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.706932] Hardware name: linux,dummy-virt (DT)
[   19.707010] Call trace:
[   19.707149]  show_stack+0x20/0x38 (C)
[   19.707243]  dump_stack_lvl+0x8c/0xd0
[   19.707299]  print_report+0x118/0x608
[   19.707347]  kasan_report+0xdc/0x128
[   19.707393]  __asan_report_load4_noabort+0x20/0x30
[   19.707918]  kasan_atomics_helper+0x3de4/0x4858
[   19.708071]  kasan_atomics+0x198/0x2e0
[   19.708207]  kunit_try_run_case+0x170/0x3f0
[   19.708262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.708337]  kthread+0x328/0x630
[   19.708418]  ret_from_fork+0x10/0x20
[   19.708482] 
[   19.708519] Allocated by task 266:
[   19.708548]  kasan_save_stack+0x3c/0x68
[   19.708607]  kasan_save_track+0x20/0x40
[   19.708655]  kasan_save_alloc_info+0x40/0x58
[   19.708708]  __kasan_kmalloc+0xd4/0xd8
[   19.708746]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.708787]  kasan_atomics+0xb8/0x2e0
[   19.708834]  kunit_try_run_case+0x170/0x3f0
[   19.708874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.708927]  kthread+0x328/0x630
[   19.708969]  ret_from_fork+0x10/0x20
[   19.709035] 
[   19.709090] The buggy address belongs to the object at fff00000c77bfc80
[   19.709090]  which belongs to the cache kmalloc-64 of size 64
[   19.709642] The buggy address is located 0 bytes to the right of
[   19.709642]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.709904] 
[   19.710271] The buggy address belongs to the physical page:
[   19.710504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.711137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.711316] page_type: f5(slab)
[   19.711434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.711498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.711698] page dumped because: kasan: bad access detected
[   19.711804] 
[   19.711826] Memory state around the buggy address:
[   19.711972]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.712056]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.712126] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.712167]                                      ^
[   19.712211]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712277]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712319] ==================================================================
[   19.835586] ==================================================================
[   19.835634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.835805] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.836016] 
[   19.836127] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.836265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.836400] Hardware name: linux,dummy-virt (DT)
[   19.836431] Call trace:
[   19.836455]  show_stack+0x20/0x38 (C)
[   19.836527]  dump_stack_lvl+0x8c/0xd0
[   19.836576]  print_report+0x118/0x608
[   19.836621]  kasan_report+0xdc/0x128
[   19.836667]  kasan_check_range+0x100/0x1a8
[   19.836714]  __kasan_check_write+0x20/0x30
[   19.836760]  kasan_atomics_helper+0x126c/0x4858
[   19.836809]  kasan_atomics+0x198/0x2e0
[   19.836854]  kunit_try_run_case+0x170/0x3f0
[   19.836902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.836970]  kthread+0x328/0x630
[   19.837134]  ret_from_fork+0x10/0x20
[   19.837211] 
[   19.837231] Allocated by task 266:
[   19.837259]  kasan_save_stack+0x3c/0x68
[   19.837302]  kasan_save_track+0x20/0x40
[   19.837340]  kasan_save_alloc_info+0x40/0x58
[   19.837381]  __kasan_kmalloc+0xd4/0xd8
[   19.837429]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.837469]  kasan_atomics+0xb8/0x2e0
[   19.837506]  kunit_try_run_case+0x170/0x3f0
[   19.837546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.837589]  kthread+0x328/0x630
[   19.837632]  ret_from_fork+0x10/0x20
[   19.837670] 
[   19.837690] The buggy address belongs to the object at fff00000c77bfc80
[   19.837690]  which belongs to the cache kmalloc-64 of size 64
[   19.837904] The buggy address is located 0 bytes to the right of
[   19.837904]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.837972] 
[   19.838008] The buggy address belongs to the physical page:
[   19.838058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.838111] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.838158] page_type: f5(slab)
[   19.838196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.838249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.838291] page dumped because: kasan: bad access detected
[   19.838324] 
[   19.838343] Memory state around the buggy address:
[   19.838377]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.838422]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.838544] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.838772]                                      ^
[   19.838813]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.838859]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.838898] ==================================================================
[   19.795456] ==================================================================
[   19.795670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.795733] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.795786] 
[   19.795820] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.796106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.796170] Hardware name: linux,dummy-virt (DT)
[   19.796205] Call trace:
[   19.796231]  show_stack+0x20/0x38 (C)
[   19.796283]  dump_stack_lvl+0x8c/0xd0
[   19.796350]  print_report+0x118/0x608
[   19.796415]  kasan_report+0xdc/0x128
[   19.796486]  kasan_check_range+0x100/0x1a8
[   19.796535]  __kasan_check_write+0x20/0x30
[   19.796581]  kasan_atomics_helper+0xf20/0x4858
[   19.796867]  kasan_atomics+0x198/0x2e0
[   19.796996]  kunit_try_run_case+0x170/0x3f0
[   19.797051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.797370]  kthread+0x328/0x630
[   19.797498]  ret_from_fork+0x10/0x20
[   19.797589] 
[   19.797636] Allocated by task 266:
[   19.797694]  kasan_save_stack+0x3c/0x68
[   19.797757]  kasan_save_track+0x20/0x40
[   19.797827]  kasan_save_alloc_info+0x40/0x58
[   19.797885]  __kasan_kmalloc+0xd4/0xd8
[   19.797928]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.798004]  kasan_atomics+0xb8/0x2e0
[   19.798056]  kunit_try_run_case+0x170/0x3f0
[   19.798114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.798161]  kthread+0x328/0x630
[   19.798197]  ret_from_fork+0x10/0x20
[   19.798513] 
[   19.798547] The buggy address belongs to the object at fff00000c77bfc80
[   19.798547]  which belongs to the cache kmalloc-64 of size 64
[   19.798688] The buggy address is located 0 bytes to the right of
[   19.798688]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.798776] 
[   19.798874] The buggy address belongs to the physical page:
[   19.799052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.799249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.799558] page_type: f5(slab)
[   19.799607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.799774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.799867] page dumped because: kasan: bad access detected
[   19.799972] 
[   19.800043] Memory state around the buggy address:
[   19.800107]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.800292]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.800526] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.800643]                                      ^
[   19.800707]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.800750]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.800792] ==================================================================
[   19.832134] ==================================================================
[   19.832184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.832230] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.832282] 
[   19.832311] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.832392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.832420] Hardware name: linux,dummy-virt (DT)
[   19.832450] Call trace:
[   19.832488]  show_stack+0x20/0x38 (C)
[   19.832536]  dump_stack_lvl+0x8c/0xd0
[   19.832583]  print_report+0x118/0x608
[   19.832629]  kasan_report+0xdc/0x128
[   19.832714]  kasan_check_range+0x100/0x1a8
[   19.832804]  __kasan_check_write+0x20/0x30
[   19.833010]  kasan_atomics_helper+0x11f8/0x4858
[   19.833063]  kasan_atomics+0x198/0x2e0
[   19.833113]  kunit_try_run_case+0x170/0x3f0
[   19.833168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.833227]  kthread+0x328/0x630
[   19.833277]  ret_from_fork+0x10/0x20
[   19.833481] 
[   19.833580] Allocated by task 266:
[   19.833712]  kasan_save_stack+0x3c/0x68
[   19.833754]  kasan_save_track+0x20/0x40
[   19.833792]  kasan_save_alloc_info+0x40/0x58
[   19.833834]  __kasan_kmalloc+0xd4/0xd8
[   19.833872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.833918]  kasan_atomics+0xb8/0x2e0
[   19.834103]  kunit_try_run_case+0x170/0x3f0
[   19.834305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.834355]  kthread+0x328/0x630
[   19.834528]  ret_from_fork+0x10/0x20
[   19.834582] 
[   19.834602] The buggy address belongs to the object at fff00000c77bfc80
[   19.834602]  which belongs to the cache kmalloc-64 of size 64
[   19.834692] The buggy address is located 0 bytes to the right of
[   19.834692]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.834758] 
[   19.834778] The buggy address belongs to the physical page:
[   19.834811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.834862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.834910] page_type: f5(slab)
[   19.834948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.835010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.835052] page dumped because: kasan: bad access detected
[   19.835086] 
[   19.835105] Memory state around the buggy address:
[   19.835139]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.835184]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.835229] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.835271]                                      ^
[   19.835303]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.835347]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.835386] ==================================================================
[   19.787452] ==================================================================
[   19.787509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.787559] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.787610] 
[   19.787642] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.787726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.787753] Hardware name: linux,dummy-virt (DT)
[   19.787784] Call trace:
[   19.787807]  show_stack+0x20/0x38 (C)
[   19.787855]  dump_stack_lvl+0x8c/0xd0
[   19.787902]  print_report+0x118/0x608
[   19.787949]  kasan_report+0xdc/0x128
[   19.788010]  kasan_check_range+0x100/0x1a8
[   19.788060]  __kasan_check_write+0x20/0x30
[   19.788105]  kasan_atomics_helper+0xeb8/0x4858
[   19.788154]  kasan_atomics+0x198/0x2e0
[   19.788198]  kunit_try_run_case+0x170/0x3f0
[   19.788247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.788300]  kthread+0x328/0x630
[   19.788341]  ret_from_fork+0x10/0x20
[   19.788387] 
[   19.788408] Allocated by task 266:
[   19.788436]  kasan_save_stack+0x3c/0x68
[   19.788477]  kasan_save_track+0x20/0x40
[   19.788516]  kasan_save_alloc_info+0x40/0x58
[   19.788556]  __kasan_kmalloc+0xd4/0xd8
[   19.788596]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.788636]  kasan_atomics+0xb8/0x2e0
[   19.788672]  kunit_try_run_case+0x170/0x3f0
[   19.788712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.788758]  kthread+0x328/0x630
[   19.788792]  ret_from_fork+0x10/0x20
[   19.788830] 
[   19.788850] The buggy address belongs to the object at fff00000c77bfc80
[   19.788850]  which belongs to the cache kmalloc-64 of size 64
[   19.788910] The buggy address is located 0 bytes to the right of
[   19.788910]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.791232] 
[   19.791271] The buggy address belongs to the physical page:
[   19.791307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.791366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.791416] page_type: f5(slab)
[   19.791456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.791509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.791555] page dumped because: kasan: bad access detected
[   19.791590] 
[   19.791612] Memory state around the buggy address:
[   19.791647]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.791693]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.791738] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.791777]                                      ^
[   19.791811]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.791857]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.791898] ==================================================================
[   19.693006] ==================================================================
[   19.693582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   19.693657] Write of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.693710] 
[   19.694085] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.694183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.694254] Hardware name: linux,dummy-virt (DT)
[   19.694290] Call trace:
[   19.694314]  show_stack+0x20/0x38 (C)
[   19.694393]  dump_stack_lvl+0x8c/0xd0
[   19.694990]  print_report+0x118/0x608
[   19.695069]  kasan_report+0xdc/0x128
[   19.695134]  kasan_check_range+0x100/0x1a8
[   19.695232]  __kasan_check_write+0x20/0x30
[   19.695427]  kasan_atomics_helper+0xc08/0x4858
[   19.695788]  kasan_atomics+0x198/0x2e0
[   19.695870]  kunit_try_run_case+0x170/0x3f0
[   19.696042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.696126]  kthread+0x328/0x630
[   19.696483]  ret_from_fork+0x10/0x20
[   19.696668] 
[   19.696728] Allocated by task 266:
[   19.696838]  kasan_save_stack+0x3c/0x68
[   19.696913]  kasan_save_track+0x20/0x40
[   19.696953]  kasan_save_alloc_info+0x40/0x58
[   19.697307]  __kasan_kmalloc+0xd4/0xd8
[   19.697664]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.697945]  kasan_atomics+0xb8/0x2e0
[   19.698020]  kunit_try_run_case+0x170/0x3f0
[   19.698270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.698477]  kthread+0x328/0x630
[   19.698604]  ret_from_fork+0x10/0x20
[   19.698894] 
[   19.699036] The buggy address belongs to the object at fff00000c77bfc80
[   19.699036]  which belongs to the cache kmalloc-64 of size 64
[   19.699246] The buggy address is located 0 bytes to the right of
[   19.699246]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.700169] 
[   19.700242] The buggy address belongs to the physical page:
[   19.700759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.700993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.701340] page_type: f5(slab)
[   19.701464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.701725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.701905] page dumped because: kasan: bad access detected
[   19.702158] 
[   19.702391] Memory state around the buggy address:
[   19.702450]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.702498]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.703122] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.703180]                                      ^
[   19.703339]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.703399]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.703531] ==================================================================
[   19.741514] ==================================================================
[   19.741567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.741780] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.742241] 
[   19.742298] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.742544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.742581] Hardware name: linux,dummy-virt (DT)
[   19.742656] Call trace:
[   19.742922]  show_stack+0x20/0x38 (C)
[   19.743175]  dump_stack_lvl+0x8c/0xd0
[   19.743299]  print_report+0x118/0x608
[   19.743396]  kasan_report+0xdc/0x128
[   19.743582]  __asan_report_load4_noabort+0x20/0x30
[   19.743861]  kasan_atomics_helper+0x3e04/0x4858
[   19.743987]  kasan_atomics+0x198/0x2e0
[   19.744093]  kunit_try_run_case+0x170/0x3f0
[   19.744434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.744792]  kthread+0x328/0x630
[   19.745012]  ret_from_fork+0x10/0x20
[   19.745116] 
[   19.745211] Allocated by task 266:
[   19.745281]  kasan_save_stack+0x3c/0x68
[   19.745405]  kasan_save_track+0x20/0x40
[   19.745473]  kasan_save_alloc_info+0x40/0x58
[   19.745517]  __kasan_kmalloc+0xd4/0xd8
[   19.745678]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.745914]  kasan_atomics+0xb8/0x2e0
[   19.746205]  kunit_try_run_case+0x170/0x3f0
[   19.746405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.746729]  kthread+0x328/0x630
[   19.747016]  ret_from_fork+0x10/0x20
[   19.747154] 
[   19.747274] The buggy address belongs to the object at fff00000c77bfc80
[   19.747274]  which belongs to the cache kmalloc-64 of size 64
[   19.747515] The buggy address is located 0 bytes to the right of
[   19.747515]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.747990] 
[   19.748127] The buggy address belongs to the physical page:
[   19.748263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.748345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.748733] page_type: f5(slab)
[   19.749112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.749191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.749239] page dumped because: kasan: bad access detected
[   19.749509] 
[   19.749636] Memory state around the buggy address:
[   19.749698]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.749931]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.750144] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.750389]                                      ^
[   19.750555]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.750607]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.750860] ==================================================================
[   19.807677] ==================================================================
[   19.807731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.807783] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.807860] 
[   19.807893] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.807990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.808022] Hardware name: linux,dummy-virt (DT)
[   19.808058] Call trace:
[   19.808081]  show_stack+0x20/0x38 (C)
[   19.808129]  dump_stack_lvl+0x8c/0xd0
[   19.808176]  print_report+0x118/0x608
[   19.808222]  kasan_report+0xdc/0x128
[   19.808268]  kasan_check_range+0x100/0x1a8
[   19.808315]  __kasan_check_write+0x20/0x30
[   19.808362]  kasan_atomics_helper+0xff0/0x4858
[   19.808409]  kasan_atomics+0x198/0x2e0
[   19.808454]  kunit_try_run_case+0x170/0x3f0
[   19.808500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.808576]  kthread+0x328/0x630
[   19.808620]  ret_from_fork+0x10/0x20
[   19.808668] 
[   19.808687] Allocated by task 266:
[   19.808717]  kasan_save_stack+0x3c/0x68
[   19.808758]  kasan_save_track+0x20/0x40
[   19.808923]  kasan_save_alloc_info+0x40/0x58
[   19.808997]  __kasan_kmalloc+0xd4/0xd8
[   19.809476]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.809541]  kasan_atomics+0xb8/0x2e0
[   19.809579]  kunit_try_run_case+0x170/0x3f0
[   19.809626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.809829]  kthread+0x328/0x630
[   19.809903]  ret_from_fork+0x10/0x20
[   19.809968] 
[   19.810034] The buggy address belongs to the object at fff00000c77bfc80
[   19.810034]  which belongs to the cache kmalloc-64 of size 64
[   19.810107] The buggy address is located 0 bytes to the right of
[   19.810107]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.810175] 
[   19.810197] The buggy address belongs to the physical page:
[   19.810231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.810422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.810478] page_type: f5(slab)
[   19.810542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.810597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.810685] page dumped because: kasan: bad access detected
[   19.810722] 
[   19.810773] Memory state around the buggy address:
[   19.810811]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.811021]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.811174] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.811253]                                      ^
[   19.811321]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.811365]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.811542] ==================================================================
[   19.933658] ==================================================================
[   19.933713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.934322] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.934392] 
[   19.934427] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.935048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.935145] Hardware name: linux,dummy-virt (DT)
[   19.935177] Call trace:
[   19.935203]  show_stack+0x20/0x38 (C)
[   19.935522]  dump_stack_lvl+0x8c/0xd0
[   19.935833]  print_report+0x118/0x608
[   19.936192]  kasan_report+0xdc/0x128
[   19.936598]  kasan_check_range+0x100/0x1a8
[   19.936791]  __kasan_check_write+0x20/0x30
[   19.936839]  kasan_atomics_helper+0x175c/0x4858
[   19.936888]  kasan_atomics+0x198/0x2e0
[   19.937819]  kunit_try_run_case+0x170/0x3f0
[   19.938036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.938092]  kthread+0x328/0x630
[   19.938133]  ret_from_fork+0x10/0x20
[   19.938185] 
[   19.938628] Allocated by task 266:
[   19.939325]  kasan_save_stack+0x3c/0x68
[   19.939779]  kasan_save_track+0x20/0x40
[   19.939930]  kasan_save_alloc_info+0x40/0x58
[   19.940369]  __kasan_kmalloc+0xd4/0xd8
[   19.940606]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.941291]  kasan_atomics+0xb8/0x2e0
[   19.941607]  kunit_try_run_case+0x170/0x3f0
[   19.942220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.942797]  kthread+0x328/0x630
[   19.943228]  ret_from_fork+0x10/0x20
[   19.943270] 
[   19.943292] The buggy address belongs to the object at fff00000c77bfc80
[   19.943292]  which belongs to the cache kmalloc-64 of size 64
[   19.943357] The buggy address is located 0 bytes to the right of
[   19.943357]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.943424] 
[   19.943445] The buggy address belongs to the physical page:
[   19.943482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.945058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.945481] page_type: f5(slab)
[   19.945845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.945952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.946547] page dumped because: kasan: bad access detected
[   19.946931] 
[   19.947144] Memory state around the buggy address:
[   19.947281]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.947776]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.948074] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.948399]                                      ^
[   19.948609]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.948657]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.948698] ==================================================================
[   19.662269] ==================================================================
[   19.662432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   19.662528] Read of size 4 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.662601] 
[   19.662811] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.663139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.663352] Hardware name: linux,dummy-virt (DT)
[   19.663426] Call trace:
[   19.663593]  show_stack+0x20/0x38 (C)
[   19.663652]  dump_stack_lvl+0x8c/0xd0
[   19.663953]  print_report+0x118/0x608
[   19.664281]  kasan_report+0xdc/0x128
[   19.664484]  __asan_report_load4_noabort+0x20/0x30
[   19.664580]  kasan_atomics_helper+0x3dcc/0x4858
[   19.664787]  kasan_atomics+0x198/0x2e0
[   19.665040]  kunit_try_run_case+0x170/0x3f0
[   19.665132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.665400]  kthread+0x328/0x630
[   19.665580]  ret_from_fork+0x10/0x20
[   19.665708] 
[   19.665812] Allocated by task 266:
[   19.665846]  kasan_save_stack+0x3c/0x68
[   19.666237]  kasan_save_track+0x20/0x40
[   19.666654]  kasan_save_alloc_info+0x40/0x58
[   19.666887]  __kasan_kmalloc+0xd4/0xd8
[   19.666936]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.666991]  kasan_atomics+0xb8/0x2e0
[   19.667291]  kunit_try_run_case+0x170/0x3f0
[   19.667409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.667769]  kthread+0x328/0x630
[   19.667815]  ret_from_fork+0x10/0x20
[   19.668123] 
[   19.668364] The buggy address belongs to the object at fff00000c77bfc80
[   19.668364]  which belongs to the cache kmalloc-64 of size 64
[   19.668554] The buggy address is located 0 bytes to the right of
[   19.668554]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.668841] 
[   19.669030] The buggy address belongs to the physical page:
[   19.669097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.669296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.669543] page_type: f5(slab)
[   19.669601] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.670018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.670307] page dumped because: kasan: bad access detected
[   19.670387] 
[   19.670407] Memory state around the buggy address:
[   19.670727]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.671086]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.671327] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.671553]                                      ^
[   19.671758]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671828]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.671927] ==================================================================
[   19.909902] ==================================================================
[   19.910387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.910457] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.910825] 
[   19.910907] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.911179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.911332] Hardware name: linux,dummy-virt (DT)
[   19.911554] Call trace:
[   19.911584]  show_stack+0x20/0x38 (C)
[   19.911836]  dump_stack_lvl+0x8c/0xd0
[   19.911895]  print_report+0x118/0x608
[   19.912156]  kasan_report+0xdc/0x128
[   19.912662]  kasan_check_range+0x100/0x1a8
[   19.912889]  __kasan_check_write+0x20/0x30
[   19.913237]  kasan_atomics_helper+0x16d0/0x4858
[   19.913562]  kasan_atomics+0x198/0x2e0
[   19.913612]  kunit_try_run_case+0x170/0x3f0
[   19.913666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.913718]  kthread+0x328/0x630
[   19.913761]  ret_from_fork+0x10/0x20
[   19.914615] 
[   19.914817] Allocated by task 266:
[   19.914852]  kasan_save_stack+0x3c/0x68
[   19.914994]  kasan_save_track+0x20/0x40
[   19.915093]  kasan_save_alloc_info+0x40/0x58
[   19.915135]  __kasan_kmalloc+0xd4/0xd8
[   19.915633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.915828]  kasan_atomics+0xb8/0x2e0
[   19.917052]  kunit_try_run_case+0x170/0x3f0
[   19.917376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.917470]  kthread+0x328/0x630
[   19.917794]  ret_from_fork+0x10/0x20
[   19.918030] 
[   19.918324] The buggy address belongs to the object at fff00000c77bfc80
[   19.918324]  which belongs to the cache kmalloc-64 of size 64
[   19.918548] The buggy address is located 0 bytes to the right of
[   19.918548]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.918900] 
[   19.918927] The buggy address belongs to the physical page:
[   19.919118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.919228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.919289] page_type: f5(slab)
[   19.919328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.919659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.920168] page dumped because: kasan: bad access detected
[   19.920214] 
[   19.920235] Memory state around the buggy address:
[   19.920618]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.920967]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.921376] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.921564]                                      ^
[   19.921839]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.921887]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.922270] ==================================================================
[   19.851569] ==================================================================
[   19.851618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.851714] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.851767] 
[   19.851798] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.851879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.851908] Hardware name: linux,dummy-virt (DT)
[   19.851938] Call trace:
[   19.851963]  show_stack+0x20/0x38 (C)
[   19.852048]  dump_stack_lvl+0x8c/0xd0
[   19.852096]  print_report+0x118/0x608
[   19.852142]  kasan_report+0xdc/0x128
[   19.852188]  kasan_check_range+0x100/0x1a8
[   19.852236]  __kasan_check_write+0x20/0x30
[   19.852283]  kasan_atomics_helper+0x1414/0x4858
[   19.852333]  kasan_atomics+0x198/0x2e0
[   19.852443]  kunit_try_run_case+0x170/0x3f0
[   19.852499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.852723]  kthread+0x328/0x630
[   19.852782]  ret_from_fork+0x10/0x20
[   19.852830] 
[   19.852855] Allocated by task 266:
[   19.853025]  kasan_save_stack+0x3c/0x68
[   19.853193]  kasan_save_track+0x20/0x40
[   19.853231]  kasan_save_alloc_info+0x40/0x58
[   19.853350]  __kasan_kmalloc+0xd4/0xd8
[   19.853396]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.853561]  kasan_atomics+0xb8/0x2e0
[   19.853599]  kunit_try_run_case+0x170/0x3f0
[   19.853643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.853686]  kthread+0x328/0x630
[   19.853727]  ret_from_fork+0x10/0x20
[   19.853909] 
[   19.854665] The buggy address belongs to the object at fff00000c77bfc80
[   19.854665]  which belongs to the cache kmalloc-64 of size 64
[   19.854736] The buggy address is located 0 bytes to the right of
[   19.854736]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.854801] 
[   19.854823] The buggy address belongs to the physical page:
[   19.854856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.854909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.854960] page_type: f5(slab)
[   19.855011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.855069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.855110] page dumped because: kasan: bad access detected
[   19.855144] 
[   19.855163] Memory state around the buggy address:
[   19.855196]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.855247]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.855293] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.855334]                                      ^
[   19.855366]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.855411]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.855451] ==================================================================
[   19.858446] ==================================================================
[   19.858565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.858612] Write of size 8 at addr fff00000c77bfcb0 by task kunit_try_catch/266
[   19.858662] 
[   19.858692] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.858773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.858800] Hardware name: linux,dummy-virt (DT)
[   19.858832] Call trace:
[   19.858855]  show_stack+0x20/0x38 (C)
[   19.858902]  dump_stack_lvl+0x8c/0xd0
[   19.858956]  print_report+0x118/0x608
[   19.859195]  kasan_report+0xdc/0x128
[   19.859241]  kasan_check_range+0x100/0x1a8
[   19.859290]  __kasan_check_write+0x20/0x30
[   19.859336]  kasan_atomics_helper+0x14e4/0x4858
[   19.859392]  kasan_atomics+0x198/0x2e0
[   19.859438]  kunit_try_run_case+0x170/0x3f0
[   19.859486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.859537]  kthread+0x328/0x630
[   19.859579]  ret_from_fork+0x10/0x20
[   19.859625] 
[   19.859644] Allocated by task 266:
[   19.859716]  kasan_save_stack+0x3c/0x68
[   19.859928]  kasan_save_track+0x20/0x40
[   19.860601]  kasan_save_alloc_info+0x40/0x58
[   19.860768]  __kasan_kmalloc+0xd4/0xd8
[   19.860869]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.860910]  kasan_atomics+0xb8/0x2e0
[   19.861008]  kunit_try_run_case+0x170/0x3f0
[   19.861050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.861095]  kthread+0x328/0x630
[   19.861130]  ret_from_fork+0x10/0x20
[   19.861168] 
[   19.861199] The buggy address belongs to the object at fff00000c77bfc80
[   19.861199]  which belongs to the cache kmalloc-64 of size 64
[   19.861266] The buggy address is located 0 bytes to the right of
[   19.861266]  allocated 48-byte region [fff00000c77bfc80, fff00000c77bfcb0)
[   19.861331] 
[   19.861353] The buggy address belongs to the physical page:
[   19.861385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bf
[   19.861437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.861486] page_type: f5(slab)
[   19.861523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.861575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.861627] page dumped because: kasan: bad access detected
[   19.861661] 
[   19.861680] Memory state around the buggy address:
[   19.861713]  fff00000c77bfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.861759]  fff00000c77bfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.861804] >fff00000c77bfc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.861846]                                      ^
[   19.861878]  fff00000c77bfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.861921]  fff00000c77bfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.861994] ==================================================================

[   19.440256] ==================================================================
[   19.440413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.440486] Read of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.440539] 
[   19.440599] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.440764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.440801] Hardware name: linux,dummy-virt (DT)
[   19.441123] Call trace:
[   19.441178]  show_stack+0x20/0x38 (C)
[   19.441257]  dump_stack_lvl+0x8c/0xd0
[   19.441458]  print_report+0x118/0x608
[   19.441622]  kasan_report+0xdc/0x128
[   19.441702]  __asan_report_load4_noabort+0x20/0x30
[   19.441857]  kasan_atomics_helper+0x3e04/0x4858
[   19.441929]  kasan_atomics+0x198/0x2e0
[   19.441975]  kunit_try_run_case+0x170/0x3f0
[   19.442086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.442170]  kthread+0x328/0x630
[   19.442534]  ret_from_fork+0x10/0x20
[   19.443083] 
[   19.443136] Allocated by task 266:
[   19.443199]  kasan_save_stack+0x3c/0x68
[   19.443415]  kasan_save_track+0x20/0x40
[   19.443470]  kasan_save_alloc_info+0x40/0x58
[   19.443813]  __kasan_kmalloc+0xd4/0xd8
[   19.443948]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.444275]  kasan_atomics+0xb8/0x2e0
[   19.444412]  kunit_try_run_case+0x170/0x3f0
[   19.444458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.444847]  kthread+0x328/0x630
[   19.444952]  ret_from_fork+0x10/0x20
[   19.445215] 
[   19.445246] The buggy address belongs to the object at fff00000c76cc400
[   19.445246]  which belongs to the cache kmalloc-64 of size 64
[   19.445580] The buggy address is located 0 bytes to the right of
[   19.445580]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.445684] 
[   19.445821] The buggy address belongs to the physical page:
[   19.445887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.445961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.446013] page_type: f5(slab)
[   19.446061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.446111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.446154] page dumped because: kasan: bad access detected
[   19.446193] 
[   19.446222] Memory state around the buggy address:
[   19.446265]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.446310]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.446354] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.446394]                                      ^
[   19.446435]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.446479]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.446520] ==================================================================
[   19.591721] ==================================================================
[   19.591776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.591827] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.591966] 
[   19.592013] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.592158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.592204] Hardware name: linux,dummy-virt (DT)
[   19.592239] Call trace:
[   19.592267]  show_stack+0x20/0x38 (C)
[   19.592364]  dump_stack_lvl+0x8c/0xd0
[   19.592413]  print_report+0x118/0x608
[   19.592622]  kasan_report+0xdc/0x128
[   19.592729]  kasan_check_range+0x100/0x1a8
[   19.592820]  __kasan_check_write+0x20/0x30
[   19.592882]  kasan_atomics_helper+0x147c/0x4858
[   19.593107]  kasan_atomics+0x198/0x2e0
[   19.593503]  kunit_try_run_case+0x170/0x3f0
[   19.593586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.593649]  kthread+0x328/0x630
[   19.593692]  ret_from_fork+0x10/0x20
[   19.593788] 
[   19.593828] Allocated by task 266:
[   19.593862]  kasan_save_stack+0x3c/0x68
[   19.593984]  kasan_save_track+0x20/0x40
[   19.594050]  kasan_save_alloc_info+0x40/0x58
[   19.594101]  __kasan_kmalloc+0xd4/0xd8
[   19.594263]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.594314]  kasan_atomics+0xb8/0x2e0
[   19.594352]  kunit_try_run_case+0x170/0x3f0
[   19.594421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.594523]  kthread+0x328/0x630
[   19.594694]  ret_from_fork+0x10/0x20
[   19.594768] 
[   19.594935] The buggy address belongs to the object at fff00000c76cc400
[   19.594935]  which belongs to the cache kmalloc-64 of size 64
[   19.595265] The buggy address is located 0 bytes to the right of
[   19.595265]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.595417] 
[   19.595481] The buggy address belongs to the physical page:
[   19.595547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.595812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.595987] page_type: f5(slab)
[   19.596053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.596108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.596151] page dumped because: kasan: bad access detected
[   19.596305] 
[   19.596328] Memory state around the buggy address:
[   19.596409]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.596475]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.596682] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.596730]                                      ^
[   19.596793]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.596873]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.596994] ==================================================================
[   19.361380] ==================================================================
[   19.361435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.361487] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.361540] 
[   19.361692] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.362485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.362533] Hardware name: linux,dummy-virt (DT)
[   19.362573] Call trace:
[   19.362597]  show_stack+0x20/0x38 (C)
[   19.362979]  dump_stack_lvl+0x8c/0xd0
[   19.364158]  kunit_try_run_case+0x170/0x3f0
[   19.365499]  kasan_save_alloc_info+0x40/0x58
[   19.365610]  __kasan_kmalloc+0xd4/0xd8
[   19.365692]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.365770]  kasan_atomics+0xb8/0x2e0
[   19.366225]  kunit_try_run_case+0x170/0x3f0
[   19.366281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.366352]  kthread+0x328/0x630
[   19.366751]  ret_from_fork+0x10/0x20
[   19.366933] 
[   19.366982] The buggy address belongs to the object at fff00000c76cc400
[   19.366982]  which belongs to the cache kmalloc-64 of size 64
[   19.368240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.369501] ==================================================================
[   19.579299] ==================================================================
[   19.579351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.579436] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.579515] 
[   19.579556] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.579650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.579691] Hardware name: linux,dummy-virt (DT)
[   19.579725] Call trace:
[   19.579757]  show_stack+0x20/0x38 (C)
[   19.579817]  dump_stack_lvl+0x8c/0xd0
[   19.579932]  print_report+0x118/0x608
[   19.579990]  kasan_report+0xdc/0x128
[   19.580244]  __asan_report_load8_noabort+0x20/0x30
[   19.580394]  kasan_atomics_helper+0x3f04/0x4858
[   19.580466]  kasan_atomics+0x198/0x2e0
[   19.580635]  kunit_try_run_case+0x170/0x3f0
[   19.580716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.580831]  kthread+0x328/0x630
[   19.580878]  ret_from_fork+0x10/0x20
[   19.581058] 
[   19.581124] Allocated by task 266:
[   19.581198]  kasan_save_stack+0x3c/0x68
[   19.581310]  kasan_save_track+0x20/0x40
[   19.581354]  kasan_save_alloc_info+0x40/0x58
[   19.581396]  __kasan_kmalloc+0xd4/0xd8
[   19.581434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.581617]  kasan_atomics+0xb8/0x2e0
[   19.581727]  kunit_try_run_case+0x170/0x3f0
[   19.581848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.581892]  kthread+0x328/0x630
[   19.581999]  ret_from_fork+0x10/0x20
[   19.582102] 
[   19.582164] The buggy address belongs to the object at fff00000c76cc400
[   19.582164]  which belongs to the cache kmalloc-64 of size 64
[   19.582321] The buggy address is located 0 bytes to the right of
[   19.582321]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.582397] 
[   19.582531] The buggy address belongs to the physical page:
[   19.582569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.582625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.582674] page_type: f5(slab)
[   19.582788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.582871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.583371] page dumped because: kasan: bad access detected
[   19.583443] 
[   19.583478] Memory state around the buggy address:
[   19.583669]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.583776]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.583843] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.583884]                                      ^
[   19.584198]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.584312]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.584411] ==================================================================
[   19.584994] ==================================================================
[   19.585074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.585125] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.585227] 
[   19.585261] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.585349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.585378] Hardware name: linux,dummy-virt (DT)
[   19.585616] Call trace:
[   19.585654]  show_stack+0x20/0x38 (C)
[   19.585783]  dump_stack_lvl+0x8c/0xd0
[   19.585847]  print_report+0x118/0x608
[   19.585902]  kasan_report+0xdc/0x128
[   19.586009]  kasan_check_range+0x100/0x1a8
[   19.586088]  __kasan_check_write+0x20/0x30
[   19.586136]  kasan_atomics_helper+0x1414/0x4858
[   19.586451]  kasan_atomics+0x198/0x2e0
[   19.586570]  kunit_try_run_case+0x170/0x3f0
[   19.586636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.586749]  kthread+0x328/0x630
[   19.586818]  ret_from_fork+0x10/0x20
[   19.586997] 
[   19.587134] Allocated by task 266:
[   19.587183]  kasan_save_stack+0x3c/0x68
[   19.587330]  kasan_save_track+0x20/0x40
[   19.587387]  kasan_save_alloc_info+0x40/0x58
[   19.587431]  __kasan_kmalloc+0xd4/0xd8
[   19.587618]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.587766]  kasan_atomics+0xb8/0x2e0
[   19.587822]  kunit_try_run_case+0x170/0x3f0
[   19.587992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.588058]  kthread+0x328/0x630
[   19.588317]  ret_from_fork+0x10/0x20
[   19.588394] 
[   19.588502] The buggy address belongs to the object at fff00000c76cc400
[   19.588502]  which belongs to the cache kmalloc-64 of size 64
[   19.588585] The buggy address is located 0 bytes to the right of
[   19.588585]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.588714] 
[   19.588775] The buggy address belongs to the physical page:
[   19.588866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.588933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.588981] page_type: f5(slab)
[   19.589173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.589314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.589381] page dumped because: kasan: bad access detected
[   19.589725] 
[   19.589803] Memory state around the buggy address:
[   19.589882]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.590039]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.590086] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.590127]                                      ^
[   19.590317]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.590589]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.590695] ==================================================================
[   19.637313] ==================================================================
[   19.637479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.637552] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.637606] 
[   19.637645] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.637726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.638030] Hardware name: linux,dummy-virt (DT)
[   19.638828] Call trace:
[   19.638877]  show_stack+0x20/0x38 (C)
[   19.638958]  dump_stack_lvl+0x8c/0xd0
[   19.639009]  print_report+0x118/0x608
[   19.639056]  kasan_report+0xdc/0x128
[   19.639105]  __asan_report_load8_noabort+0x20/0x30
[   19.639156]  kasan_atomics_helper+0x3df4/0x4858
[   19.639206]  kasan_atomics+0x198/0x2e0
[   19.639254]  kunit_try_run_case+0x170/0x3f0
[   19.639302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.640004]  kthread+0x328/0x630
[   19.640076]  ret_from_fork+0x10/0x20
[   19.640191] 
[   19.640262] Allocated by task 266:
[   19.640330]  kasan_save_stack+0x3c/0x68
[   19.640451]  kasan_save_track+0x20/0x40
[   19.640535]  kasan_save_alloc_info+0x40/0x58
[   19.640585]  __kasan_kmalloc+0xd4/0xd8
[   19.640789]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.641094]  kasan_atomics+0xb8/0x2e0
[   19.641247]  kunit_try_run_case+0x170/0x3f0
[   19.641380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.641480]  kthread+0x328/0x630
[   19.641810]  ret_from_fork+0x10/0x20
[   19.641865] 
[   19.642042] The buggy address belongs to the object at fff00000c76cc400
[   19.642042]  which belongs to the cache kmalloc-64 of size 64
[   19.642156] The buggy address is located 0 bytes to the right of
[   19.642156]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.642582] 
[   19.642647] The buggy address belongs to the physical page:
[   19.642791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.642852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.642904] page_type: f5(slab)
[   19.642953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.643327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.643712] page dumped because: kasan: bad access detected
[   19.643932] 
[   19.644089] Memory state around the buggy address:
[   19.644220]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.644284]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.644356] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.644688]                                      ^
[   19.644744]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.644923]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.645158] ==================================================================
[   19.447067] ==================================================================
[   19.447136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.447190] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.447245] 
[   19.447316] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.447399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.447427] Hardware name: linux,dummy-virt (DT)
[   19.447471] Call trace:
[   19.447503]  show_stack+0x20/0x38 (C)
[   19.447553]  dump_stack_lvl+0x8c/0xd0
[   19.447599]  print_report+0x118/0x608
[   19.447646]  kasan_report+0xdc/0x128
[   19.447700]  kasan_check_range+0x100/0x1a8
[   19.447749]  __kasan_check_read+0x20/0x30
[   19.447801]  kasan_atomics_helper+0xdd4/0x4858
[   19.447861]  kasan_atomics+0x198/0x2e0
[   19.447905]  kunit_try_run_case+0x170/0x3f0
[   19.447964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.448543]  kthread+0x328/0x630
[   19.449052]  ret_from_fork+0x10/0x20
[   19.449143] 
[   19.449183] Allocated by task 266:
[   19.449218]  kasan_save_stack+0x3c/0x68
[   19.449273]  kasan_save_track+0x20/0x40
[   19.449317]  kasan_save_alloc_info+0x40/0x58
[   19.449377]  __kasan_kmalloc+0xd4/0xd8
[   19.449427]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.449477]  kasan_atomics+0xb8/0x2e0
[   19.449752]  kunit_try_run_case+0x170/0x3f0
[   19.449832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.449931]  kthread+0x328/0x630
[   19.449983]  ret_from_fork+0x10/0x20
[   19.450290] 
[   19.450627] The buggy address belongs to the object at fff00000c76cc400
[   19.450627]  which belongs to the cache kmalloc-64 of size 64
[   19.450796] The buggy address is located 0 bytes to the right of
[   19.450796]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.450887] 
[   19.451187] The buggy address belongs to the physical page:
[   19.451247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.451623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.451744] page_type: f5(slab)
[   19.451835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.451894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.452229] page dumped because: kasan: bad access detected
[   19.452338] 
[   19.452577] Memory state around the buggy address:
[   19.452888]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.452974]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.453329] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.453426]                                      ^
[   19.453515]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.453643]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.453712] ==================================================================
[   19.571251] ==================================================================
[   19.571311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.571411] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.571476] 
[   19.571525] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.571668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.571716] Hardware name: linux,dummy-virt (DT)
[   19.571764] Call trace:
[   19.571790]  show_stack+0x20/0x38 (C)
[   19.571897]  dump_stack_lvl+0x8c/0xd0
[   19.571974]  print_report+0x118/0x608
[   19.572021]  kasan_report+0xdc/0x128
[   19.572068]  kasan_check_range+0x100/0x1a8
[   19.572115]  __kasan_check_write+0x20/0x30
[   19.572160]  kasan_atomics_helper+0x12d8/0x4858
[   19.572209]  kasan_atomics+0x198/0x2e0
[   19.572281]  kunit_try_run_case+0x170/0x3f0
[   19.572340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.572394]  kthread+0x328/0x630
[   19.572441]  ret_from_fork+0x10/0x20
[   19.572491] 
[   19.572519] Allocated by task 266:
[   19.572549]  kasan_save_stack+0x3c/0x68
[   19.572600]  kasan_save_track+0x20/0x40
[   19.572639]  kasan_save_alloc_info+0x40/0x58
[   19.572682]  __kasan_kmalloc+0xd4/0xd8
[   19.572719]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.572760]  kasan_atomics+0xb8/0x2e0
[   19.572797]  kunit_try_run_case+0x170/0x3f0
[   19.572837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.572881]  kthread+0x328/0x630
[   19.573311]  ret_from_fork+0x10/0x20
[   19.573618] 
[   19.573674] The buggy address belongs to the object at fff00000c76cc400
[   19.573674]  which belongs to the cache kmalloc-64 of size 64
[   19.573881] The buggy address is located 0 bytes to the right of
[   19.573881]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.573964] 
[   19.574033] The buggy address belongs to the physical page:
[   19.574086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.574155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.574212] page_type: f5(slab)
[   19.574257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.574311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.574530] page dumped because: kasan: bad access detected
[   19.574591] 
[   19.574731] Memory state around the buggy address:
[   19.574897]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.575059]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.575128] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.575237]                                      ^
[   19.575301]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.575374]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.575417] ==================================================================
[   19.575702] ==================================================================
[   19.575752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.575801] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.575852] 
[   19.575882] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.575985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.576014] Hardware name: linux,dummy-virt (DT)
[   19.576045] Call trace:
[   19.576070]  show_stack+0x20/0x38 (C)
[   19.576135]  dump_stack_lvl+0x8c/0xd0
[   19.576185]  print_report+0x118/0x608
[   19.576230]  kasan_report+0xdc/0x128
[   19.576276]  kasan_check_range+0x100/0x1a8
[   19.576324]  __kasan_check_write+0x20/0x30
[   19.576378]  kasan_atomics_helper+0x1384/0x4858
[   19.576428]  kasan_atomics+0x198/0x2e0
[   19.576478]  kunit_try_run_case+0x170/0x3f0
[   19.576526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.576587]  kthread+0x328/0x630
[   19.576634]  ret_from_fork+0x10/0x20
[   19.576683] 
[   19.576703] Allocated by task 266:
[   19.576731]  kasan_save_stack+0x3c/0x68
[   19.576773]  kasan_save_track+0x20/0x40
[   19.576819]  kasan_save_alloc_info+0x40/0x58
[   19.576862]  __kasan_kmalloc+0xd4/0xd8
[   19.576899]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.576949]  kasan_atomics+0xb8/0x2e0
[   19.576988]  kunit_try_run_case+0x170/0x3f0
[   19.577027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.577083]  kthread+0x328/0x630
[   19.577126]  ret_from_fork+0x10/0x20
[   19.577172] 
[   19.577193] The buggy address belongs to the object at fff00000c76cc400
[   19.577193]  which belongs to the cache kmalloc-64 of size 64
[   19.577253] The buggy address is located 0 bytes to the right of
[   19.577253]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.577327] 
[   19.577350] The buggy address belongs to the physical page:
[   19.577382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.577433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.577488] page_type: f5(slab)
[   19.577527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.577580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.577631] page dumped because: kasan: bad access detected
[   19.577674] 
[   19.577695] Memory state around the buggy address:
[   19.577729]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.577774]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.577827] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.577869]                                      ^
[   19.577901]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.578090]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.578131] ==================================================================
[   19.679479] ==================================================================
[   19.679547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.679610] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.679671] 
[   19.679714] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.679797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.679824] Hardware name: linux,dummy-virt (DT)
[   19.679857] Call trace:
[   19.679879]  show_stack+0x20/0x38 (C)
[   19.679940]  dump_stack_lvl+0x8c/0xd0
[   19.679990]  print_report+0x118/0x608
[   19.680037]  kasan_report+0xdc/0x128
[   19.680083]  kasan_check_range+0x100/0x1a8
[   19.680132]  __kasan_check_write+0x20/0x30
[   19.680176]  kasan_atomics_helper+0x17ec/0x4858
[   19.680237]  kasan_atomics+0x198/0x2e0
[   19.680283]  kunit_try_run_case+0x170/0x3f0
[   19.680329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.680391]  kthread+0x328/0x630
[   19.680443]  ret_from_fork+0x10/0x20
[   19.680503] 
[   19.680523] Allocated by task 266:
[   19.680559]  kasan_save_stack+0x3c/0x68
[   19.680600]  kasan_save_track+0x20/0x40
[   19.680640]  kasan_save_alloc_info+0x40/0x58
[   19.680688]  __kasan_kmalloc+0xd4/0xd8
[   19.680727]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.680768]  kasan_atomics+0xb8/0x2e0
[   19.680812]  kunit_try_run_case+0x170/0x3f0
[   19.680853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.680896]  kthread+0x328/0x630
[   19.681500]  ret_from_fork+0x10/0x20
[   19.681553] 
[   19.681992] The buggy address belongs to the object at fff00000c76cc400
[   19.681992]  which belongs to the cache kmalloc-64 of size 64
[   19.682338] The buggy address is located 0 bytes to the right of
[   19.682338]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.682793] 
[   19.682843] The buggy address belongs to the physical page:
[   19.682934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.682990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.683040] page_type: f5(slab)
[   19.683228] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.683507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.683583] page dumped because: kasan: bad access detected
[   19.683765] 
[   19.683960] Memory state around the buggy address:
[   19.684027]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.684199]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.684428] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.685387]                                      ^
[   19.685873]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.685953]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.686115] ==================================================================
[   19.488338] ==================================================================
[   19.488400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.488808] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.488969] 
[   19.489053] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.489218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.489267] Hardware name: linux,dummy-virt (DT)
[   19.489305] Call trace:
[   19.489339]  show_stack+0x20/0x38 (C)
[   19.489397]  dump_stack_lvl+0x8c/0xd0
[   19.489597]  print_report+0x118/0x608
[   19.489658]  kasan_report+0xdc/0x128
[   19.489719]  kasan_check_range+0x100/0x1a8
[   19.490111]  __kasan_check_write+0x20/0x30
[   19.490228]  kasan_atomics_helper+0xf20/0x4858
[   19.490300]  kasan_atomics+0x198/0x2e0
[   19.490474]  kunit_try_run_case+0x170/0x3f0
[   19.490558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.490761]  kthread+0x328/0x630
[   19.490939]  ret_from_fork+0x10/0x20
[   19.491037] 
[   19.491134] Allocated by task 266:
[   19.491447]  kasan_save_stack+0x3c/0x68
[   19.491598]  kasan_save_track+0x20/0x40
[   19.491687]  kasan_save_alloc_info+0x40/0x58
[   19.491766]  __kasan_kmalloc+0xd4/0xd8
[   19.491947]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.492023]  kasan_atomics+0xb8/0x2e0
[   19.492305]  kunit_try_run_case+0x170/0x3f0
[   19.492445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.492743]  kthread+0x328/0x630
[   19.492876]  ret_from_fork+0x10/0x20
[   19.492946] 
[   19.492970] The buggy address belongs to the object at fff00000c76cc400
[   19.492970]  which belongs to the cache kmalloc-64 of size 64
[   19.493055] The buggy address is located 0 bytes to the right of
[   19.493055]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.493131] 
[   19.493162] The buggy address belongs to the physical page:
[   19.493200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.493257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.493313] page_type: f5(slab)
[   19.493353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.493407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.493449] page dumped because: kasan: bad access detected
[   19.493493] 
[   19.493527] Memory state around the buggy address:
[   19.493563]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.493609]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.493662] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.493700]                                      ^
[   19.493735]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.493788]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.493829] ==================================================================
[   19.327077] ==================================================================
[   19.327342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.327493] 
[   19.328238]  print_report+0x118/0x608
[   19.332278]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.332564]  kasan_atomics+0xb8/0x2e0
[   19.332643]  kunit_try_run_case+0x170/0x3f0
[   19.333161]  ret_from_fork+0x10/0x20
[   19.333892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.334502] page dumped because: kasan: bad access detected
[   19.337442] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.337767]  dump_stack_lvl+0x8c/0xd0
[   19.337815]  print_report+0x118/0x608
[   19.337862]  kasan_report+0xdc/0x128
[   19.337923]  kasan_check_range+0x100/0x1a8
[   19.337971]  __kasan_check_write+0x20/0x30
[   19.338521]  kasan_atomics_helper+0x934/0x4858
[   19.338585]  kasan_atomics+0x198/0x2e0
[   19.338661]  kunit_try_run_case+0x170/0x3f0
[   19.338757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.339005]  kthread+0x328/0x630
[   19.339177]  ret_from_fork+0x10/0x20
[   19.339496] 
[   19.339549] Allocated by task 266:
[   19.339661]  kasan_save_stack+0x3c/0x68
[   19.339757]  kasan_save_track+0x20/0x40
[   19.339887]  kasan_save_alloc_info+0x40/0x58
[   19.340017]  __kasan_kmalloc+0xd4/0xd8
[   19.340354]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.340432]  kasan_atomics+0xb8/0x2e0
[   19.340611]  kunit_try_run_case+0x170/0x3f0
[   19.340776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.340824]  kthread+0x328/0x630
[   19.341093]  ret_from_fork+0x10/0x20
[   19.341243] 
[   19.341287] The buggy address belongs to the object at fff00000c76cc400
[   19.341287]  which belongs to the cache kmalloc-64 of size 64
[   19.341653] The buggy address is located 0 bytes to the right of
[   19.341653]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.341757] 
[   19.342138] The buggy address belongs to the physical page:
[   19.342187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.342374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.342555] page_type: f5(slab)
[   19.342664] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.342803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.342874] page dumped because: kasan: bad access detected
[   19.342986] 
[   19.343012] Memory state around the buggy address:
[   19.343276]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.343428]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.343521] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.343637]                                      ^
[   19.343737]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.344136]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.344244] ==================================================================
[   19.514376] ==================================================================
[   19.514430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.514746] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.514986] 
[   19.515218] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.515322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.515351] Hardware name: linux,dummy-virt (DT)
[   19.515390] Call trace:
[   19.515414]  show_stack+0x20/0x38 (C)
[   19.515476]  dump_stack_lvl+0x8c/0xd0
[   19.515544]  print_report+0x118/0x608
[   19.515602]  kasan_report+0xdc/0x128
[   19.515648]  kasan_check_range+0x100/0x1a8
[   19.515698]  __kasan_check_write+0x20/0x30
[   19.515754]  kasan_atomics_helper+0x1058/0x4858
[   19.515804]  kasan_atomics+0x198/0x2e0
[   19.515851]  kunit_try_run_case+0x170/0x3f0
[   19.515935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.515990]  kthread+0x328/0x630
[   19.516040]  ret_from_fork+0x10/0x20
[   19.516103] 
[   19.516133] Allocated by task 266:
[   19.516174]  kasan_save_stack+0x3c/0x68
[   19.516215]  kasan_save_track+0x20/0x40
[   19.516257]  kasan_save_alloc_info+0x40/0x58
[   19.516299]  __kasan_kmalloc+0xd4/0xd8
[   19.516339]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.516380]  kasan_atomics+0xb8/0x2e0
[   19.516417]  kunit_try_run_case+0x170/0x3f0
[   19.516458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.516505]  kthread+0x328/0x630
[   19.516540]  ret_from_fork+0x10/0x20
[   19.516589] 
[   19.516611] The buggy address belongs to the object at fff00000c76cc400
[   19.516611]  which belongs to the cache kmalloc-64 of size 64
[   19.516672] The buggy address is located 0 bytes to the right of
[   19.516672]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.516747] 
[   19.516777] The buggy address belongs to the physical page:
[   19.516823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.516885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.516965] page_type: f5(slab)
[   19.517931] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.518058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.518132] page dumped because: kasan: bad access detected
[   19.518196] 
[   19.518225] Memory state around the buggy address:
[   19.518262]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.518541]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.518595] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.518634]                                      ^
[   19.518678]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.518721]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.518761] ==================================================================
[   19.549710] ==================================================================
[   19.549984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.550179] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.550363] 
[   19.550448] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.550567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.550755] Hardware name: linux,dummy-virt (DT)
[   19.550972] Call trace:
[   19.551313]  show_stack+0x20/0x38 (C)
[   19.551677]  dump_stack_lvl+0x8c/0xd0
[   19.551754]  print_report+0x118/0x608
[   19.551927]  kasan_report+0xdc/0x128
[   19.552364]  kasan_check_range+0x100/0x1a8
[   19.552792]  __kasan_check_write+0x20/0x30
[   19.552947]  kasan_atomics_helper+0x11f8/0x4858
[   19.553033]  kasan_atomics+0x198/0x2e0
[   19.553154]  kunit_try_run_case+0x170/0x3f0
[   19.553360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.553573]  kthread+0x328/0x630
[   19.553966]  ret_from_fork+0x10/0x20
[   19.554150] 
[   19.554231] Allocated by task 266:
[   19.554447]  kasan_save_stack+0x3c/0x68
[   19.555202]  kasan_save_track+0x20/0x40
[   19.555251]  kasan_save_alloc_info+0x40/0x58
[   19.555321]  __kasan_kmalloc+0xd4/0xd8
[   19.555513]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.555558]  kasan_atomics+0xb8/0x2e0
[   19.555597]  kunit_try_run_case+0x170/0x3f0
[   19.556488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.557113]  kthread+0x328/0x630
[   19.557268]  ret_from_fork+0x10/0x20
[   19.558606] 
[   19.558647] The buggy address belongs to the object at fff00000c76cc400
[   19.558647]  which belongs to the cache kmalloc-64 of size 64
[   19.558712] The buggy address is located 0 bytes to the right of
[   19.558712]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.558779] 
[   19.558801] The buggy address belongs to the physical page:
[   19.558833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.558888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.558948] page_type: f5(slab)
[   19.558988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.559042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.559086] page dumped because: kasan: bad access detected
[   19.559121] 
[   19.559141] Memory state around the buggy address:
[   19.559175]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.559221]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.559265] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.559305]                                      ^
[   19.559340]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.559383]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.559421] ==================================================================
[   19.607348] ==================================================================
[   19.607410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.607461] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.607674] 
[   19.607718] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.607972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.608121] Hardware name: linux,dummy-virt (DT)
[   19.608212] Call trace:
[   19.608238]  show_stack+0x20/0x38 (C)
[   19.608291]  dump_stack_lvl+0x8c/0xd0
[   19.608366]  print_report+0x118/0x608
[   19.608475]  kasan_report+0xdc/0x128
[   19.608527]  kasan_check_range+0x100/0x1a8
[   19.608577]  __kasan_check_write+0x20/0x30
[   19.608663]  kasan_atomics_helper+0x154c/0x4858
[   19.608714]  kasan_atomics+0x198/0x2e0
[   19.608759]  kunit_try_run_case+0x170/0x3f0
[   19.608805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.608858]  kthread+0x328/0x630
[   19.608901]  ret_from_fork+0x10/0x20
[   19.608960] 
[   19.609086] Allocated by task 266:
[   19.609133]  kasan_save_stack+0x3c/0x68
[   19.609179]  kasan_save_track+0x20/0x40
[   19.609481]  kasan_save_alloc_info+0x40/0x58
[   19.609731]  __kasan_kmalloc+0xd4/0xd8
[   19.609791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.609987]  kasan_atomics+0xb8/0x2e0
[   19.610190]  kunit_try_run_case+0x170/0x3f0
[   19.610268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.610582]  kthread+0x328/0x630
[   19.610675]  ret_from_fork+0x10/0x20
[   19.610990] 
[   19.611047] The buggy address belongs to the object at fff00000c76cc400
[   19.611047]  which belongs to the cache kmalloc-64 of size 64
[   19.611142] The buggy address is located 0 bytes to the right of
[   19.611142]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.611450] 
[   19.611570] The buggy address belongs to the physical page:
[   19.611633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.611690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.611923] page_type: f5(slab)
[   19.612108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.612193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.612513] page dumped because: kasan: bad access detected
[   19.612587] 
[   19.612891] Memory state around the buggy address:
[   19.612971]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.613367]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.613431] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.613473]                                      ^
[   19.613557]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.613618]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.613680] ==================================================================
[   19.480430] ==================================================================
[   19.480485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.480546] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.480879] 
[   19.481110] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.481202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.481230] Hardware name: linux,dummy-virt (DT)
[   19.481263] Call trace:
[   19.481308]  show_stack+0x20/0x38 (C)
[   19.481361]  dump_stack_lvl+0x8c/0xd0
[   19.481413]  print_report+0x118/0x608
[   19.481467]  kasan_report+0xdc/0x128
[   19.481513]  kasan_check_range+0x100/0x1a8
[   19.481562]  __kasan_check_write+0x20/0x30
[   19.481615]  kasan_atomics_helper+0xeb8/0x4858
[   19.481664]  kasan_atomics+0x198/0x2e0
[   19.481709]  kunit_try_run_case+0x170/0x3f0
[   19.481756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.481817]  kthread+0x328/0x630
[   19.481858]  ret_from_fork+0x10/0x20
[   19.481925] 
[   19.482242] Allocated by task 266:
[   19.482327]  kasan_save_stack+0x3c/0x68
[   19.482599]  kasan_save_track+0x20/0x40
[   19.482683]  kasan_save_alloc_info+0x40/0x58
[   19.482800]  __kasan_kmalloc+0xd4/0xd8
[   19.482905]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.482979]  kasan_atomics+0xb8/0x2e0
[   19.483258]  kunit_try_run_case+0x170/0x3f0
[   19.483487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.483837]  kthread+0x328/0x630
[   19.483933]  ret_from_fork+0x10/0x20
[   19.483976] 
[   19.483998] The buggy address belongs to the object at fff00000c76cc400
[   19.483998]  which belongs to the cache kmalloc-64 of size 64
[   19.484343] The buggy address is located 0 bytes to the right of
[   19.484343]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.484757] 
[   19.484804] The buggy address belongs to the physical page:
[   19.484907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.484979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.485031] page_type: f5(slab)
[   19.485391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.485744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.485883] page dumped because: kasan: bad access detected
[   19.485954] 
[   19.486004] Memory state around the buggy address:
[   19.486059]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.486392]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.486458] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.486802]                                      ^
[   19.487129]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.487568]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.487642] ==================================================================
[   19.532566] ==================================================================
[   19.532622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.532676] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.533096] 
[   19.533203] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.533370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.533419] Hardware name: linux,dummy-virt (DT)
[   19.533453] Call trace:
[   19.533485]  show_stack+0x20/0x38 (C)
[   19.533693]  dump_stack_lvl+0x8c/0xd0
[   19.533931]  print_report+0x118/0x608
[   19.534002]  kasan_report+0xdc/0x128
[   19.534252]  kasan_check_range+0x100/0x1a8
[   19.534513]  __kasan_check_write+0x20/0x30
[   19.534715]  kasan_atomics_helper+0x1128/0x4858
[   19.534941]  kasan_atomics+0x198/0x2e0
[   19.535093]  kunit_try_run_case+0x170/0x3f0
[   19.535155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.535216]  kthread+0x328/0x630
[   19.535269]  ret_from_fork+0x10/0x20
[   19.535331] 
[   19.535364] Allocated by task 266:
[   19.535411]  kasan_save_stack+0x3c/0x68
[   19.535465]  kasan_save_track+0x20/0x40
[   19.535503]  kasan_save_alloc_info+0x40/0x58
[   19.535553]  __kasan_kmalloc+0xd4/0xd8
[   19.535602]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.535654]  kasan_atomics+0xb8/0x2e0
[   19.535693]  kunit_try_run_case+0x170/0x3f0
[   19.535732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.535789]  kthread+0x328/0x630
[   19.535832]  ret_from_fork+0x10/0x20
[   19.535869] 
[   19.535889] The buggy address belongs to the object at fff00000c76cc400
[   19.535889]  which belongs to the cache kmalloc-64 of size 64
[   19.535970] The buggy address is located 0 bytes to the right of
[   19.535970]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.536038] 
[   19.536065] The buggy address belongs to the physical page:
[   19.536108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.536164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.536213] page_type: f5(slab)
[   19.536257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.536315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.536359] page dumped because: kasan: bad access detected
[   19.536399] 
[   19.536434] Memory state around the buggy address:
[   19.536468]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.536513]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.536572] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.536613]                                      ^
[   19.536647]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536699]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536753] ==================================================================
[   19.630517] ==================================================================
[   19.630572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.630624] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.630675] 
[   19.630744] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.630831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.630879] Hardware name: linux,dummy-virt (DT)
[   19.630926] Call trace:
[   19.630951]  show_stack+0x20/0x38 (C)
[   19.631001]  dump_stack_lvl+0x8c/0xd0
[   19.631056]  print_report+0x118/0x608
[   19.631112]  kasan_report+0xdc/0x128
[   19.631163]  kasan_check_range+0x100/0x1a8
[   19.631215]  __kasan_check_write+0x20/0x30
[   19.631262]  kasan_atomics_helper+0x1644/0x4858
[   19.631310]  kasan_atomics+0x198/0x2e0
[   19.631369]  kunit_try_run_case+0x170/0x3f0
[   19.631426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.631480]  kthread+0x328/0x630
[   19.631521]  ret_from_fork+0x10/0x20
[   19.631579] 
[   19.631600] Allocated by task 266:
[   19.631629]  kasan_save_stack+0x3c/0x68
[   19.631672]  kasan_save_track+0x20/0x40
[   19.631710]  kasan_save_alloc_info+0x40/0x58
[   19.631753]  __kasan_kmalloc+0xd4/0xd8
[   19.631791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.631837]  kasan_atomics+0xb8/0x2e0
[   19.631876]  kunit_try_run_case+0x170/0x3f0
[   19.632423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.632560]  kthread+0x328/0x630
[   19.632609]  ret_from_fork+0x10/0x20
[   19.632649] 
[   19.633111] The buggy address belongs to the object at fff00000c76cc400
[   19.633111]  which belongs to the cache kmalloc-64 of size 64
[   19.633379] The buggy address is located 0 bytes to the right of
[   19.633379]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.633460] 
[   19.633484] The buggy address belongs to the physical page:
[   19.633515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.633569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.633862] page_type: f5(slab)
[   19.634246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.634322] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.634389] page dumped because: kasan: bad access detected
[   19.634573] 
[   19.634598] Memory state around the buggy address:
[   19.634635]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.634906]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.635024] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.635115]                                      ^
[   19.635436]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.635547]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.635587] ==================================================================
[   19.661992] ==================================================================
[   19.662476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.662547] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.662610] 
[   19.663028] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.663148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.663518] Hardware name: linux,dummy-virt (DT)
[   19.663689] Call trace:
[   19.663900]  show_stack+0x20/0x38 (C)
[   19.664198]  dump_stack_lvl+0x8c/0xd0
[   19.664324]  print_report+0x118/0x608
[   19.664427]  kasan_report+0xdc/0x128
[   19.664577]  kasan_check_range+0x100/0x1a8
[   19.664631]  __kasan_check_write+0x20/0x30
[   19.664693]  kasan_atomics_helper+0x175c/0x4858
[   19.664984]  kasan_atomics+0x198/0x2e0
[   19.665395]  kunit_try_run_case+0x170/0x3f0
[   19.665584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.665660]  kthread+0x328/0x630
[   19.665776]  ret_from_fork+0x10/0x20
[   19.665889] 
[   19.666041] Allocated by task 266:
[   19.666231]  kasan_save_stack+0x3c/0x68
[   19.666324]  kasan_save_track+0x20/0x40
[   19.666659]  kasan_save_alloc_info+0x40/0x58
[   19.666769]  __kasan_kmalloc+0xd4/0xd8
[   19.666867]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.666991]  kasan_atomics+0xb8/0x2e0
[   19.667103]  kunit_try_run_case+0x170/0x3f0
[   19.667166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.667355]  kthread+0x328/0x630
[   19.667396]  ret_from_fork+0x10/0x20
[   19.667800] 
[   19.667851] The buggy address belongs to the object at fff00000c76cc400
[   19.667851]  which belongs to the cache kmalloc-64 of size 64
[   19.668529] The buggy address is located 0 bytes to the right of
[   19.668529]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.668640] 
[   19.668759] The buggy address belongs to the physical page:
[   19.668973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.669059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.669366] page_type: f5(slab)
[   19.669439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.669947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.670123] page dumped because: kasan: bad access detected
[   19.670186] 
[   19.670262] Memory state around the buggy address:
[   19.670327]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.670392]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.670542] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.670587]                                      ^
[   19.670623]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.670845]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.670952] ==================================================================
[   19.537855] ==================================================================
[   19.537928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.537981] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.538070] 
[   19.538415] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.538519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.538547] Hardware name: linux,dummy-virt (DT)
[   19.539003] Call trace:
[   19.539250]  show_stack+0x20/0x38 (C)
[   19.539524]  dump_stack_lvl+0x8c/0xd0
[   19.539611]  print_report+0x118/0x608
[   19.539688]  kasan_report+0xdc/0x128
[   19.540126]  kasan_check_range+0x100/0x1a8
[   19.540577]  __kasan_check_write+0x20/0x30
[   19.540672]  kasan_atomics_helper+0x1190/0x4858
[   19.540812]  kasan_atomics+0x198/0x2e0
[   19.540926]  kunit_try_run_case+0x170/0x3f0
[   19.540978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.541437]  kthread+0x328/0x630
[   19.541722]  ret_from_fork+0x10/0x20
[   19.541944] 
[   19.542165] Allocated by task 266:
[   19.542219]  kasan_save_stack+0x3c/0x68
[   19.542265]  kasan_save_track+0x20/0x40
[   19.542314]  kasan_save_alloc_info+0x40/0x58
[   19.542758]  __kasan_kmalloc+0xd4/0xd8
[   19.542828]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.543018]  kasan_atomics+0xb8/0x2e0
[   19.543232]  kunit_try_run_case+0x170/0x3f0
[   19.543629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.543709]  kthread+0x328/0x630
[   19.543889]  ret_from_fork+0x10/0x20
[   19.543974] 
[   19.544196] The buggy address belongs to the object at fff00000c76cc400
[   19.544196]  which belongs to the cache kmalloc-64 of size 64
[   19.544553] The buggy address is located 0 bytes to the right of
[   19.544553]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.544638] 
[   19.545434] The buggy address belongs to the physical page:
[   19.545484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.546018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.546392] page_type: f5(slab)
[   19.546507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.546680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.546727] page dumped because: kasan: bad access detected
[   19.546782] 
[   19.546809] Memory state around the buggy address:
[   19.546844]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.547343]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.547560] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.547626]                                      ^
[   19.547675]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.547956]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.548123] ==================================================================
[   19.657241] ==================================================================
[   19.657479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.657677] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.657748] 
[   19.657783] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.657865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.657892] Hardware name: linux,dummy-virt (DT)
[   19.657937] Call trace:
[   19.658249]  show_stack+0x20/0x38 (C)
[   19.658352]  dump_stack_lvl+0x8c/0xd0
[   19.658433]  print_report+0x118/0x608
[   19.658858]  kasan_report+0xdc/0x128
[   19.658944]  __asan_report_load8_noabort+0x20/0x30
[   19.658998]  kasan_atomics_helper+0x3e10/0x4858
[   19.659049]  kasan_atomics+0x198/0x2e0
[   19.659095]  kunit_try_run_case+0x170/0x3f0
[   19.659145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.659200]  kthread+0x328/0x630
[   19.659246]  ret_from_fork+0x10/0x20
[   19.659301] 
[   19.659345] Allocated by task 266:
[   19.659386]  kasan_save_stack+0x3c/0x68
[   19.659462]  kasan_save_track+0x20/0x40
[   19.659500]  kasan_save_alloc_info+0x40/0x58
[   19.659548]  __kasan_kmalloc+0xd4/0xd8
[   19.659594]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.659635]  kasan_atomics+0xb8/0x2e0
[   19.659673]  kunit_try_run_case+0x170/0x3f0
[   19.659720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.659774]  kthread+0x328/0x630
[   19.659808]  ret_from_fork+0x10/0x20
[   19.659845] 
[   19.659864] The buggy address belongs to the object at fff00000c76cc400
[   19.659864]  which belongs to the cache kmalloc-64 of size 64
[   19.659935] The buggy address is located 0 bytes to the right of
[   19.659935]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.660003] 
[   19.660024] The buggy address belongs to the physical page:
[   19.660074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.660128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.660178] page_type: f5(slab)
[   19.660217] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.660276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.660326] page dumped because: kasan: bad access detected
[   19.660369] 
[   19.660397] Memory state around the buggy address:
[   19.660430]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.660475]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.660520] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.660578]                                      ^
[   19.660613]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660666]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.660715] ==================================================================
[   19.472310] ==================================================================
[   19.472369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.472429] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.472809] 
[   19.472865] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.473042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.473081] Hardware name: linux,dummy-virt (DT)
[   19.473128] Call trace:
[   19.473170]  show_stack+0x20/0x38 (C)
[   19.473223]  dump_stack_lvl+0x8c/0xd0
[   19.473272]  print_report+0x118/0x608
[   19.473578]  kasan_report+0xdc/0x128
[   19.473692]  __asan_report_store8_noabort+0x20/0x30
[   19.473846]  kasan_atomics_helper+0x3e5c/0x4858
[   19.474080]  kasan_atomics+0x198/0x2e0
[   19.474196]  kunit_try_run_case+0x170/0x3f0
[   19.474264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.474384]  kthread+0x328/0x630
[   19.474460]  ret_from_fork+0x10/0x20
[   19.474585] 
[   19.474790] Allocated by task 266:
[   19.474873]  kasan_save_stack+0x3c/0x68
[   19.475041]  kasan_save_track+0x20/0x40
[   19.475108]  kasan_save_alloc_info+0x40/0x58
[   19.475446]  __kasan_kmalloc+0xd4/0xd8
[   19.475517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.475653]  kasan_atomics+0xb8/0x2e0
[   19.475696]  kunit_try_run_case+0x170/0x3f0
[   19.475753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.476097]  kthread+0x328/0x630
[   19.476182]  ret_from_fork+0x10/0x20
[   19.476244] 
[   19.476558] The buggy address belongs to the object at fff00000c76cc400
[   19.476558]  which belongs to the cache kmalloc-64 of size 64
[   19.476841] The buggy address is located 0 bytes to the right of
[   19.476841]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.477011] 
[   19.477318] The buggy address belongs to the physical page:
[   19.477370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.477451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.477503] page_type: f5(slab)
[   19.477543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.477863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.478134] page dumped because: kasan: bad access detected
[   19.478316] 
[   19.478500] Memory state around the buggy address:
[   19.478645]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.478708]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.478885] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.478967]                                      ^
[   19.479013]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.479338]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.479413] ==================================================================
[   19.384100] ==================================================================
[   19.384173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   19.384307] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.384517] 
[   19.384597] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.387653]  kasan_atomics+0xb8/0x2e0
[   19.387798]  kunit_try_run_case+0x170/0x3f0
[   19.389547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.390174]  kthread+0x328/0x630
[   19.390546]  ret_from_fork+0x10/0x20
[   19.390595] 
[   19.390619] The buggy address belongs to the object at fff00000c76cc400
[   19.390619]  which belongs to the cache kmalloc-64 of size 64
[   19.391966] Memory state around the buggy address:
[   19.392740]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.395934]  print_report+0x118/0x608
[   19.396475]  kasan_save_stack+0x3c/0x68
[   19.396688]  kasan_atomics+0xb8/0x2e0
[   19.397870] 
[   19.398122] page_type: f5(slab)
[   19.399084] 
[   19.399605]                                      ^
[   19.399832]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.401743] Hardware name: linux,dummy-virt (DT)
[   19.403135]  kunit_try_run_case+0x170/0x3f0
[   19.404887]  kunit_try_run_case+0x170/0x3f0
[   19.406100] 
[   19.406268] page_type: f5(slab)
[   19.407203]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.409997]  show_stack+0x20/0x38 (C)
[   19.411593]  kasan_save_track+0x20/0x40
[   19.411981]  kthread+0x328/0x630
[   19.412274] 
[   19.412398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.412772]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.417361] 
[   19.417835] Call trace:
[   19.419136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.421254]  ret_from_fork+0x10/0x20
[   19.421432] 
[   19.421483] The buggy address belongs to the object at fff00000c76cc400
[   19.421483]  which belongs to the cache kmalloc-64 of size 64
[   19.421649] The buggy address is located 0 bytes to the right of
[   19.421649]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.421729] 
[   19.421786] The buggy address belongs to the physical page:
[   19.422113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.422368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.422530] page_type: f5(slab)
[   19.422604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.422956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.423184] page dumped because: kasan: bad access detected
[   19.423339] 
[   19.423426] Memory state around the buggy address:
[   19.423540]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.423956]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.424018] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.424091]                                      ^
[   19.424181]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.424272]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.424358] ==================================================================
[   19.620429] ==================================================================
[   19.620540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.620592] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.620659] 
[   19.620759] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.620852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.620890] Hardware name: linux,dummy-virt (DT)
[   19.621061] Call trace:
[   19.621121]  show_stack+0x20/0x38 (C)
[   19.621303]  dump_stack_lvl+0x8c/0xd0
[   19.621365]  print_report+0x118/0x608
[   19.621539]  kasan_report+0xdc/0x128
[   19.621643]  __asan_report_load8_noabort+0x20/0x30
[   19.622000]  kasan_atomics_helper+0x3db0/0x4858
[   19.622202]  kasan_atomics+0x198/0x2e0
[   19.622285]  kunit_try_run_case+0x170/0x3f0
[   19.622617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.622718]  kthread+0x328/0x630
[   19.622858]  ret_from_fork+0x10/0x20
[   19.622925] 
[   19.622946] Allocated by task 266:
[   19.623180]  kasan_save_stack+0x3c/0x68
[   19.623383]  kasan_save_track+0x20/0x40
[   19.623469]  kasan_save_alloc_info+0x40/0x58
[   19.623537]  __kasan_kmalloc+0xd4/0xd8
[   19.624384]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.624481]  kasan_atomics+0xb8/0x2e0
[   19.624632]  kunit_try_run_case+0x170/0x3f0
[   19.624707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.624768]  kthread+0x328/0x630
[   19.624804]  ret_from_fork+0x10/0x20
[   19.624977] 
[   19.625139] The buggy address belongs to the object at fff00000c76cc400
[   19.625139]  which belongs to the cache kmalloc-64 of size 64
[   19.625966] The buggy address is located 0 bytes to the right of
[   19.625966]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.626077] 
[   19.626125] The buggy address belongs to the physical page:
[   19.626199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.626491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.626731] page_type: f5(slab)
[   19.627105] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.627183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.627503] page dumped because: kasan: bad access detected
[   19.627636] 
[   19.627684] Memory state around the buggy address:
[   19.627722]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.627959]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.628157] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.628498]                                      ^
[   19.628576]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.628750]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.629014] ==================================================================
[   19.615121] ==================================================================
[   19.615243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.615299] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.615350] 
[   19.615383] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.615465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.615493] Hardware name: linux,dummy-virt (DT)
[   19.615527] Call trace:
[   19.615800]  show_stack+0x20/0x38 (C)
[   19.616080]  dump_stack_lvl+0x8c/0xd0
[   19.616294]  print_report+0x118/0x608
[   19.616350]  kasan_report+0xdc/0x128
[   19.616404]  kasan_check_range+0x100/0x1a8
[   19.616507]  __kasan_check_write+0x20/0x30
[   19.616574]  kasan_atomics_helper+0x15b4/0x4858
[   19.616624]  kasan_atomics+0x198/0x2e0
[   19.616697]  kunit_try_run_case+0x170/0x3f0
[   19.616743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.616797]  kthread+0x328/0x630
[   19.616842]  ret_from_fork+0x10/0x20
[   19.616891] 
[   19.616923] Allocated by task 266:
[   19.616966]  kasan_save_stack+0x3c/0x68
[   19.617009]  kasan_save_track+0x20/0x40
[   19.617059]  kasan_save_alloc_info+0x40/0x58
[   19.617109]  __kasan_kmalloc+0xd4/0xd8
[   19.617156]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.617198]  kasan_atomics+0xb8/0x2e0
[   19.617245]  kunit_try_run_case+0x170/0x3f0
[   19.617284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.617329]  kthread+0x328/0x630
[   19.617369]  ret_from_fork+0x10/0x20
[   19.617405] 
[   19.617427] The buggy address belongs to the object at fff00000c76cc400
[   19.617427]  which belongs to the cache kmalloc-64 of size 64
[   19.617492] The buggy address is located 0 bytes to the right of
[   19.617492]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.617559] 
[   19.617582] The buggy address belongs to the physical page:
[   19.617614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.617675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.617724] page_type: f5(slab)
[   19.617764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.617818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.617884] page dumped because: kasan: bad access detected
[   19.617930] 
[   19.617958] Memory state around the buggy address:
[   19.617993]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.618572]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.618636] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.618683]                                      ^
[   19.618717]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.619422]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.619531] ==================================================================
[   19.645955] ==================================================================
[   19.646418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.646481] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.646696] 
[   19.646766] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.647149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.647238] Hardware name: linux,dummy-virt (DT)
[   19.647285] Call trace:
[   19.647330]  show_stack+0x20/0x38 (C)
[   19.647432]  dump_stack_lvl+0x8c/0xd0
[   19.647509]  print_report+0x118/0x608
[   19.647633]  kasan_report+0xdc/0x128
[   19.647682]  kasan_check_range+0x100/0x1a8
[   19.647903]  __kasan_check_write+0x20/0x30
[   19.648450]  kasan_atomics_helper+0x16d0/0x4858
[   19.648613]  kasan_atomics+0x198/0x2e0
[   19.648699]  kunit_try_run_case+0x170/0x3f0
[   19.648836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.648925]  kthread+0x328/0x630
[   19.648969]  ret_from_fork+0x10/0x20
[   19.649017] 
[   19.649217] Allocated by task 266:
[   19.649408]  kasan_save_stack+0x3c/0x68
[   19.649765]  kasan_save_track+0x20/0x40
[   19.650781]  kasan_save_alloc_info+0x40/0x58
[   19.650997]  __kasan_kmalloc+0xd4/0xd8
[   19.651082]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.651144]  kasan_atomics+0xb8/0x2e0
[   19.651730]  kunit_try_run_case+0x170/0x3f0
[   19.651811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.652559]  kthread+0x328/0x630
[   19.652894]  ret_from_fork+0x10/0x20
[   19.653196] 
[   19.653255] The buggy address belongs to the object at fff00000c76cc400
[   19.653255]  which belongs to the cache kmalloc-64 of size 64
[   19.653406] The buggy address is located 0 bytes to the right of
[   19.653406]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.653522] 
[   19.653737] The buggy address belongs to the physical page:
[   19.653930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.654262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.654538] page_type: f5(slab)
[   19.654734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.654815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.655146] page dumped because: kasan: bad access detected
[   19.655194] 
[   19.655360] Memory state around the buggy address:
[   19.655587]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.655751]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.655802] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.655843]                                      ^
[   19.656215]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.656481]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.656696] ==================================================================
[   19.425491] ==================================================================
[   19.425576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.425630] Read of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.425931] 
[   19.425968] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.426351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.426429] Hardware name: linux,dummy-virt (DT)
[   19.426480] Call trace:
[   19.426532]  show_stack+0x20/0x38 (C)
[   19.426665]  dump_stack_lvl+0x8c/0xd0
[   19.426752]  print_report+0x118/0x608
[   19.426891]  kasan_report+0xdc/0x128
[   19.426970]  __asan_report_load4_noabort+0x20/0x30
[   19.427324]  kasan_atomics_helper+0x3dd8/0x4858
[   19.427615]  kasan_atomics+0x198/0x2e0
[   19.427739]  kunit_try_run_case+0x170/0x3f0
[   19.427883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.427956]  kthread+0x328/0x630
[   19.428006]  ret_from_fork+0x10/0x20
[   19.428331] 
[   19.428393] Allocated by task 266:
[   19.428727]  kasan_save_stack+0x3c/0x68
[   19.428953]  kasan_save_track+0x20/0x40
[   19.429176]  kasan_save_alloc_info+0x40/0x58
[   19.429318]  __kasan_kmalloc+0xd4/0xd8
[   19.429387]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.429799]  kasan_atomics+0xb8/0x2e0
[   19.429867]  kunit_try_run_case+0x170/0x3f0
[   19.430150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.430364]  kthread+0x328/0x630
[   19.430428]  ret_from_fork+0x10/0x20
[   19.430672] 
[   19.430928] The buggy address belongs to the object at fff00000c76cc400
[   19.430928]  which belongs to the cache kmalloc-64 of size 64
[   19.431268] The buggy address is located 0 bytes to the right of
[   19.431268]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.431418] 
[   19.431450] The buggy address belongs to the physical page:
[   19.431485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.431543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.431664] page_type: f5(slab)
[   19.431714] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.431782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.431839] page dumped because: kasan: bad access detected
[   19.431870] 
[   19.431900] Memory state around the buggy address:
[   19.431973]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.432036]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.432089] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.432129]                                      ^
[   19.432165]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.432210]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.432259] ==================================================================
[   19.495751] ==================================================================
[   19.495950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.496014] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.496075] 
[   19.496187] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.496289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.496327] Hardware name: linux,dummy-virt (DT)
[   19.496963] Call trace:
[   19.497007]  show_stack+0x20/0x38 (C)
[   19.497064]  dump_stack_lvl+0x8c/0xd0
[   19.497115]  print_report+0x118/0x608
[   19.497161]  kasan_report+0xdc/0x128
[   19.497208]  kasan_check_range+0x100/0x1a8
[   19.497256]  __kasan_check_write+0x20/0x30
[   19.497303]  kasan_atomics_helper+0xf88/0x4858
[   19.497352]  kasan_atomics+0x198/0x2e0
[   19.497396]  kunit_try_run_case+0x170/0x3f0
[   19.497443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.497496]  kthread+0x328/0x630
[   19.497537]  ret_from_fork+0x10/0x20
[   19.497584] 
[   19.497604] Allocated by task 266:
[   19.497635]  kasan_save_stack+0x3c/0x68
[   19.497676]  kasan_save_track+0x20/0x40
[   19.497716]  kasan_save_alloc_info+0x40/0x58
[   19.497757]  __kasan_kmalloc+0xd4/0xd8
[   19.497795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.497836]  kasan_atomics+0xb8/0x2e0
[   19.497873]  kunit_try_run_case+0x170/0x3f0
[   19.497926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.497972]  kthread+0x328/0x630
[   19.498985]  ret_from_fork+0x10/0x20
[   19.499257] 
[   19.499331] The buggy address belongs to the object at fff00000c76cc400
[   19.499331]  which belongs to the cache kmalloc-64 of size 64
[   19.499510] The buggy address is located 0 bytes to the right of
[   19.499510]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.499582] 
[   19.499925] The buggy address belongs to the physical page:
[   19.500394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.500612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.500834] page_type: f5(slab)
[   19.501254] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.501348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.501680] page dumped because: kasan: bad access detected
[   19.501804] 
[   19.501848] Memory state around the buggy address:
[   19.502205]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.502415]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.502867] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.503043]                                      ^
[   19.503223]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.503402]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.503446] ==================================================================
[   19.565471] ==================================================================
[   19.565532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.565587] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.565638] 
[   19.565670] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.565752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.565781] Hardware name: linux,dummy-virt (DT)
[   19.565812] Call trace:
[   19.565838]  show_stack+0x20/0x38 (C)
[   19.565887]  dump_stack_lvl+0x8c/0xd0
[   19.565950]  print_report+0x118/0x608
[   19.566004]  kasan_report+0xdc/0x128
[   19.566051]  kasan_check_range+0x100/0x1a8
[   19.566098]  __kasan_check_write+0x20/0x30
[   19.566144]  kasan_atomics_helper+0x126c/0x4858
[   19.566193]  kasan_atomics+0x198/0x2e0
[   19.566237]  kunit_try_run_case+0x170/0x3f0
[   19.566285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.566338]  kthread+0x328/0x630
[   19.566379]  ret_from_fork+0x10/0x20
[   19.566427] 
[   19.566447] Allocated by task 266:
[   19.566476]  kasan_save_stack+0x3c/0x68
[   19.566519]  kasan_save_track+0x20/0x40
[   19.566557]  kasan_save_alloc_info+0x40/0x58
[   19.566599]  __kasan_kmalloc+0xd4/0xd8
[   19.566636]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.566677]  kasan_atomics+0xb8/0x2e0
[   19.566716]  kunit_try_run_case+0x170/0x3f0
[   19.566757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.566801]  kthread+0x328/0x630
[   19.566835]  ret_from_fork+0x10/0x20
[   19.566873] 
[   19.566893] The buggy address belongs to the object at fff00000c76cc400
[   19.566893]  which belongs to the cache kmalloc-64 of size 64
[   19.567801] The buggy address is located 0 bytes to the right of
[   19.567801]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.568069] 
[   19.568100] The buggy address belongs to the physical page:
[   19.568134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.568200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.568250] page_type: f5(slab)
[   19.568464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.568525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.568663] page dumped because: kasan: bad access detected
[   19.568799] 
[   19.569080] Memory state around the buggy address:
[   19.569202]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.569250]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.569569] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.569635]                                      ^
[   19.569774]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.569989]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.570035] ==================================================================
[   19.276176] ==================================================================
[   19.279296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   19.279404] 
[   19.279520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.279549] Hardware name: linux,dummy-virt (DT)
[   19.279848]  __kasan_check_write+0x20/0x30
[   19.280273]  kthread+0x328/0x630
[   19.282394]  __kasan_kmalloc+0xd4/0xd8
[   19.285465] 
[   19.285977] 
[   19.286000] The buggy address belongs to the physical page:
[   19.287978] page dumped because: kasan: bad access detected
[   19.291496]                                      ^
[   19.294382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   19.295183]  kthread+0x328/0x630
[   19.295722] 
[   19.295865] 
[   19.295885] The buggy address belongs to the physical page:
[   19.299538] page_type: f5(slab)
[   19.300225] page dumped because: kasan: bad access detected
[   19.303368]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.303678] ==================================================================
[   19.464822] ==================================================================
[   19.464876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.464941] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.465281] 
[   19.465379] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.465482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.465744] Hardware name: linux,dummy-virt (DT)
[   19.465801] Call trace:
[   19.465826]  show_stack+0x20/0x38 (C)
[   19.466137]  dump_stack_lvl+0x8c/0xd0
[   19.466291]  print_report+0x118/0x608
[   19.466351]  kasan_report+0xdc/0x128
[   19.466414]  kasan_check_range+0x100/0x1a8
[   19.466481]  __kasan_check_write+0x20/0x30
[   19.466561]  kasan_atomics_helper+0xe44/0x4858
[   19.466785]  kasan_atomics+0x198/0x2e0
[   19.466993]  kunit_try_run_case+0x170/0x3f0
[   19.467075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.467177]  kthread+0x328/0x630
[   19.467460]  ret_from_fork+0x10/0x20
[   19.467634] 
[   19.467673] Allocated by task 266:
[   19.467731]  kasan_save_stack+0x3c/0x68
[   19.467879]  kasan_save_track+0x20/0x40
[   19.467943]  kasan_save_alloc_info+0x40/0x58
[   19.468327]  __kasan_kmalloc+0xd4/0xd8
[   19.468450]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.468537]  kasan_atomics+0xb8/0x2e0
[   19.468600]  kunit_try_run_case+0x170/0x3f0
[   19.468940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.469139]  kthread+0x328/0x630
[   19.469218]  ret_from_fork+0x10/0x20
[   19.469264] 
[   19.469288] The buggy address belongs to the object at fff00000c76cc400
[   19.469288]  which belongs to the cache kmalloc-64 of size 64
[   19.469355] The buggy address is located 0 bytes to the right of
[   19.469355]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.469422] 
[   19.469455] The buggy address belongs to the physical page:
[   19.469488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.469544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.469604] page_type: f5(slab)
[   19.469648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.469701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.469753] page dumped because: kasan: bad access detected
[   19.469815] 
[   19.469850] Memory state around the buggy address:
[   19.469890]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.469948]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.470100] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.470654]                                      ^
[   19.470737]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.470814]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.470896] ==================================================================
[   19.597691] ==================================================================
[   19.597763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.597827] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.598030] 
[   19.598176] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.598280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.598346] Hardware name: linux,dummy-virt (DT)
[   19.598391] Call trace:
[   19.598416]  show_stack+0x20/0x38 (C)
[   19.598476]  dump_stack_lvl+0x8c/0xd0
[   19.598525]  print_report+0x118/0x608
[   19.598934]  kasan_report+0xdc/0x128
[   19.599059]  kasan_check_range+0x100/0x1a8
[   19.599282]  __kasan_check_write+0x20/0x30
[   19.599441]  kasan_atomics_helper+0x14e4/0x4858
[   19.599625]  kasan_atomics+0x198/0x2e0
[   19.599700]  kunit_try_run_case+0x170/0x3f0
[   19.599846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.599908]  kthread+0x328/0x630
[   19.599963]  ret_from_fork+0x10/0x20
[   19.600290] 
[   19.600343] Allocated by task 266:
[   19.600516]  kasan_save_stack+0x3c/0x68
[   19.600736]  kasan_save_track+0x20/0x40
[   19.600886]  kasan_save_alloc_info+0x40/0x58
[   19.600985]  __kasan_kmalloc+0xd4/0xd8
[   19.601134]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.601199]  kasan_atomics+0xb8/0x2e0
[   19.601245]  kunit_try_run_case+0x170/0x3f0
[   19.601284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.601602]  kthread+0x328/0x630
[   19.601660]  ret_from_fork+0x10/0x20
[   19.601837] 
[   19.601898] The buggy address belongs to the object at fff00000c76cc400
[   19.601898]  which belongs to the cache kmalloc-64 of size 64
[   19.601976] The buggy address is located 0 bytes to the right of
[   19.601976]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.602042] 
[   19.602066] The buggy address belongs to the physical page:
[   19.602098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.602159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.602243] page_type: f5(slab)
[   19.602292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.602359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.603708] page dumped because: kasan: bad access detected
[   19.603801] 
[   19.603997] Memory state around the buggy address:
[   19.604282]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.604894]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.605009] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.605078]                                      ^
[   19.605270]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.605436]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.605552] ==================================================================
[   19.345226] ==================================================================
[   19.345335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.345610] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.345805] 
[   19.345863] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.346088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.346167] Hardware name: linux,dummy-virt (DT)
[   19.346278] Call trace:
[   19.346336]  show_stack+0x20/0x38 (C)
[   19.346388]  dump_stack_lvl+0x8c/0xd0
[   19.346770]  print_report+0x118/0x608
[   19.347007]  kasan_report+0xdc/0x128
[   19.347063]  kasan_check_range+0x100/0x1a8
[   19.347133]  __kasan_check_write+0x20/0x30
[   19.347181]  kasan_atomics_helper+0x99c/0x4858
[   19.347446]  ret_from_fork+0x10/0x20
[   19.347496] 
[   19.347773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.348202] The buggy address is located 0 bytes to the right of
[   19.348202]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.348753]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.351653] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.355187] 
[   19.355497] Allocated by task 266:
[   19.355586]  kasan_save_stack+0x3c/0x68
[   19.355741]  kasan_save_track+0x20/0x40
[   19.355849]  kasan_save_alloc_info+0x40/0x58
[   19.355984]  __kasan_kmalloc+0xd4/0xd8
[   19.356027]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.356603]  kasan_atomics+0xb8/0x2e0
[   19.356703]  kunit_try_run_case+0x170/0x3f0
[   19.356846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.356999]  kthread+0x328/0x630
[   19.357132]  ret_from_fork+0x10/0x20
[   19.357234] 
[   19.357305] The buggy address belongs to the object at fff00000c76cc400
[   19.357305]  which belongs to the cache kmalloc-64 of size 64
[   19.357459] The buggy address is located 0 bytes to the right of
[   19.357459]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.357556] 
[   19.357822] The buggy address belongs to the physical page:
[   19.357889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.358031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.358138] page_type: f5(slab)
[   19.358467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.358558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.358677] page dumped because: kasan: bad access detected
[   19.358770] 
[   19.358851] Memory state around the buggy address:
[   19.358888]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.359155]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.359246] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.359619]                                      ^
[   19.359757]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.360047]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.360116] ==================================================================
[   19.504957] ==================================================================
[   19.505223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.505291] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.505344] 
[   19.505376] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.505459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.505631] Hardware name: linux,dummy-virt (DT)
[   19.505864] Call trace:
[   19.505903]  show_stack+0x20/0x38 (C)
[   19.506215]  dump_stack_lvl+0x8c/0xd0
[   19.506369]  print_report+0x118/0x608
[   19.506533]  kasan_report+0xdc/0x128
[   19.506665]  kasan_check_range+0x100/0x1a8
[   19.506723]  __kasan_check_write+0x20/0x30
[   19.506770]  kasan_atomics_helper+0xff0/0x4858
[   19.507163]  kasan_atomics+0x198/0x2e0
[   19.507326]  kunit_try_run_case+0x170/0x3f0
[   19.507516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.507671]  kthread+0x328/0x630
[   19.507826]  ret_from_fork+0x10/0x20
[   19.508005] 
[   19.508028] Allocated by task 266:
[   19.508060]  kasan_save_stack+0x3c/0x68
[   19.508412]  kasan_save_track+0x20/0x40
[   19.508490]  kasan_save_alloc_info+0x40/0x58
[   19.508699]  __kasan_kmalloc+0xd4/0xd8
[   19.508933]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.509077]  kasan_atomics+0xb8/0x2e0
[   19.509195]  kunit_try_run_case+0x170/0x3f0
[   19.509295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.509343]  kthread+0x328/0x630
[   19.509656]  ret_from_fork+0x10/0x20
[   19.509707] 
[   19.509771] The buggy address belongs to the object at fff00000c76cc400
[   19.509771]  which belongs to the cache kmalloc-64 of size 64
[   19.509833] The buggy address is located 0 bytes to the right of
[   19.509833]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.509899] 
[   19.509952] The buggy address belongs to the physical page:
[   19.510219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.510723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.510787] page_type: f5(slab)
[   19.511256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.511341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.511654] page dumped because: kasan: bad access detected
[   19.511711] 
[   19.511764] Memory state around the buggy address:
[   19.512118]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.512564]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.512752] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.512805]                                      ^
[   19.512841]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.513130]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.513305] ==================================================================
[   19.455127] ==================================================================
[   19.455180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.455290] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.455379] 
[   19.455415] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.455509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.455640] Hardware name: linux,dummy-virt (DT)
[   19.455779] Call trace:
[   19.455963]  show_stack+0x20/0x38 (C)
[   19.456315]  dump_stack_lvl+0x8c/0xd0
[   19.456454]  print_report+0x118/0x608
[   19.456529]  kasan_report+0xdc/0x128
[   19.456585]  __asan_report_load8_noabort+0x20/0x30
[   19.456647]  kasan_atomics_helper+0x3f58/0x4858
[   19.456745]  kasan_atomics+0x198/0x2e0
[   19.456796]  kunit_try_run_case+0x170/0x3f0
[   19.456844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.457164]  kthread+0x328/0x630
[   19.457229]  ret_from_fork+0x10/0x20
[   19.457629] 
[   19.457663] Allocated by task 266:
[   19.457699]  kasan_save_stack+0x3c/0x68
[   19.458017]  kasan_save_track+0x20/0x40
[   19.458105]  kasan_save_alloc_info+0x40/0x58
[   19.458193]  __kasan_kmalloc+0xd4/0xd8
[   19.458383]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.458713]  kasan_atomics+0xb8/0x2e0
[   19.458770]  kunit_try_run_case+0x170/0x3f0
[   19.458810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.458856]  kthread+0x328/0x630
[   19.459175]  ret_from_fork+0x10/0x20
[   19.460779] 
[   19.460852] The buggy address belongs to the object at fff00000c76cc400
[   19.460852]  which belongs to the cache kmalloc-64 of size 64
[   19.461203] The buggy address is located 0 bytes to the right of
[   19.461203]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.461651] 
[   19.461857] The buggy address belongs to the physical page:
[   19.461904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.461975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.462027] page_type: f5(slab)
[   19.462071] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.462570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.462752] page dumped because: kasan: bad access detected
[   19.462840] 
[   19.462861] Memory state around the buggy address:
[   19.462902]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.463119]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.463312] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.463616]                                      ^
[   19.463697]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.463805]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.463875] ==================================================================
[   19.434233] ==================================================================
[   19.434286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.434336] Write of size 4 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.434386] 
[   19.434417] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.434500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.434527] Hardware name: linux,dummy-virt (DT)
[   19.434559] Call trace:
[   19.434582]  show_stack+0x20/0x38 (C)
[   19.434628]  dump_stack_lvl+0x8c/0xd0
[   19.434676]  print_report+0x118/0x608
[   19.434721]  kasan_report+0xdc/0x128
[   19.434769]  kasan_check_range+0x100/0x1a8
[   19.434816]  __kasan_check_write+0x20/0x30
[   19.434860]  kasan_atomics_helper+0xd3c/0x4858
[   19.434922]  kasan_atomics+0x198/0x2e0
[   19.434969]  kunit_try_run_case+0x170/0x3f0
[   19.435018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.435071]  kthread+0x328/0x630
[   19.435114]  ret_from_fork+0x10/0x20
[   19.435162] 
[   19.435185] Allocated by task 266:
[   19.435214]  kasan_save_stack+0x3c/0x68
[   19.435267]  kasan_save_track+0x20/0x40
[   19.435311]  kasan_save_alloc_info+0x40/0x58
[   19.435440]  __kasan_kmalloc+0xd4/0xd8
[   19.435485]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.435548]  kasan_atomics+0xb8/0x2e0
[   19.435586]  kunit_try_run_case+0x170/0x3f0
[   19.435627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.435692]  kthread+0x328/0x630
[   19.435726]  ret_from_fork+0x10/0x20
[   19.435765] 
[   19.435788] The buggy address belongs to the object at fff00000c76cc400
[   19.435788]  which belongs to the cache kmalloc-64 of size 64
[   19.436486] The buggy address is located 0 bytes to the right of
[   19.436486]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.436679] 
[   19.436704] The buggy address belongs to the physical page:
[   19.436996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.437176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.437477] page_type: f5(slab)
[   19.437772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.437834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.437887] page dumped because: kasan: bad access detected
[   19.437943] 
[   19.437974] Memory state around the buggy address:
[   19.438055]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.438394]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.438510] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.438640]                                      ^
[   19.438701]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.439003]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.439078] ==================================================================
[   19.672485] ==================================================================
[   19.672653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.672714] Read of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.672851] 
[   19.672905] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.673150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.673297] Hardware name: linux,dummy-virt (DT)
[   19.673339] Call trace:
[   19.673371]  show_stack+0x20/0x38 (C)
[   19.673585]  dump_stack_lvl+0x8c/0xd0
[   19.673803]  print_report+0x118/0x608
[   19.673940]  kasan_report+0xdc/0x128
[   19.673994]  __asan_report_load8_noabort+0x20/0x30
[   19.674142]  kasan_atomics_helper+0x3e20/0x4858
[   19.674216]  kasan_atomics+0x198/0x2e0
[   19.674401]  kunit_try_run_case+0x170/0x3f0
[   19.674656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.674820]  kthread+0x328/0x630
[   19.675166]  ret_from_fork+0x10/0x20
[   19.675308] 
[   19.675359] Allocated by task 266:
[   19.675541]  kasan_save_stack+0x3c/0x68
[   19.675787]  kasan_save_track+0x20/0x40
[   19.675858]  kasan_save_alloc_info+0x40/0x58
[   19.676205]  __kasan_kmalloc+0xd4/0xd8
[   19.676246]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.676287]  kasan_atomics+0xb8/0x2e0
[   19.676323]  kunit_try_run_case+0x170/0x3f0
[   19.676362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.676406]  kthread+0x328/0x630
[   19.676442]  ret_from_fork+0x10/0x20
[   19.676479] 
[   19.676500] The buggy address belongs to the object at fff00000c76cc400
[   19.676500]  which belongs to the cache kmalloc-64 of size 64
[   19.676561] The buggy address is located 0 bytes to the right of
[   19.676561]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.676674] 
[   19.676722] The buggy address belongs to the physical page:
[   19.676779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.676997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.677066] page_type: f5(slab)
[   19.677219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.677356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.677414] page dumped because: kasan: bad access detected
[   19.677448] 
[   19.677468] Memory state around the buggy address:
[   19.677765]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.678192]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.678266] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.678330]                                      ^
[   19.678366]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.678773]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.678862] ==================================================================
[   19.520094] ==================================================================
[   19.520159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.520211] Write of size 8 at addr fff00000c76cc430 by task kunit_try_catch/266
[   19.520758] 
[   19.520811] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.520896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.521225] Hardware name: linux,dummy-virt (DT)
[   19.521276] Call trace:
[   19.521356]  show_stack+0x20/0x38 (C)
[   19.521498]  dump_stack_lvl+0x8c/0xd0
[   19.521546]  print_report+0x118/0x608
[   19.521594]  kasan_report+0xdc/0x128
[   19.521639]  kasan_check_range+0x100/0x1a8
[   19.522024]  __kasan_check_write+0x20/0x30
[   19.522094]  kasan_atomics_helper+0x10c0/0x4858
[   19.522146]  kasan_atomics+0x198/0x2e0
[   19.522193]  kunit_try_run_case+0x170/0x3f0
[   19.522532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.522863]  kthread+0x328/0x630
[   19.522927]  ret_from_fork+0x10/0x20
[   19.523130] 
[   19.523205] Allocated by task 266:
[   19.523297]  kasan_save_stack+0x3c/0x68
[   19.523555]  kasan_save_track+0x20/0x40
[   19.523758]  kasan_save_alloc_info+0x40/0x58
[   19.523834]  __kasan_kmalloc+0xd4/0xd8
[   19.524037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.524452]  kasan_atomics+0xb8/0x2e0
[   19.524524]  kunit_try_run_case+0x170/0x3f0
[   19.524704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.525098]  kthread+0x328/0x630
[   19.525170]  ret_from_fork+0x10/0x20
[   19.525241] 
[   19.525322] The buggy address belongs to the object at fff00000c76cc400
[   19.525322]  which belongs to the cache kmalloc-64 of size 64
[   19.525635] The buggy address is located 0 bytes to the right of
[   19.525635]  allocated 48-byte region [fff00000c76cc400, fff00000c76cc430)
[   19.525850] 
[   19.525875] The buggy address belongs to the physical page:
[   19.526281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc
[   19.526667] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.526794] page_type: f5(slab)
[   19.526839] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.526931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.526976] page dumped because: kasan: bad access detected
[   19.527433] 
[   19.527518] Memory state around the buggy address:
[   19.527717]  fff00000c76cc300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.528094]  fff00000c76cc380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.528219] >fff00000c76cc400: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.528585]                                      ^
[   19.528655]  fff00000c76cc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.529060]  fff00000c76cc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.529132] ==================================================================

[   17.042392] ==================================================================
[   17.043016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   17.043752] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.044281] 
[   17.044426] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.044511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.044539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.044578] Call Trace:
[   17.044608]  <TASK>
[   17.044653]  dump_stack_lvl+0x73/0xb0
[   17.044712]  print_report+0xd1/0x650
[   17.044756]  ? __virt_addr_valid+0x1db/0x2d0
[   17.044791]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.044829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.044872]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.044908]  kasan_report+0x141/0x180
[   17.044993]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.045055]  kasan_check_range+0x10c/0x1c0
[   17.045131]  __kasan_check_write+0x18/0x20
[   17.045174]  kasan_atomics_helper+0x12e6/0x5450
[   17.045240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.045297]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.045345]  ? trace_hardirqs_on+0x37/0xe0
[   17.045389]  ? kasan_atomics+0x152/0x310
[   17.045448]  kasan_atomics+0x1dc/0x310
[   17.045493]  ? __pfx_kasan_atomics+0x10/0x10
[   17.045539]  ? __pfx_kasan_atomics+0x10/0x10
[   17.045589]  kunit_try_run_case+0x1a5/0x480
[   17.045638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.045668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.045698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.045729]  ? __kthread_parkme+0x82/0x180
[   17.045755]  ? preempt_count_sub+0x50/0x80
[   17.045785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.045813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.045835]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.045857]  kthread+0x337/0x6f0
[   17.045877]  ? trace_preempt_on+0x20/0xc0
[   17.045899]  ? __pfx_kthread+0x10/0x10
[   17.045930]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.045951]  ? calculate_sigpending+0x7b/0xa0
[   17.045975]  ? __pfx_kthread+0x10/0x10
[   17.045996]  ret_from_fork+0x116/0x1d0
[   17.046015]  ? __pfx_kthread+0x10/0x10
[   17.046035]  ret_from_fork_asm+0x1a/0x30
[   17.046065]  </TASK>
[   17.046079] 
[   17.056393] Allocated by task 283:
[   17.056576]  kasan_save_stack+0x45/0x70
[   17.056867]  kasan_save_track+0x18/0x40
[   17.057168]  kasan_save_alloc_info+0x3b/0x50
[   17.057443]  __kasan_kmalloc+0xb7/0xc0
[   17.057736]  __kmalloc_cache_noprof+0x189/0x420
[   17.057935]  kasan_atomics+0x95/0x310
[   17.058102]  kunit_try_run_case+0x1a5/0x480
[   17.058281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.058487]  kthread+0x337/0x6f0
[   17.058759]  ret_from_fork+0x116/0x1d0
[   17.059068]  ret_from_fork_asm+0x1a/0x30
[   17.059408] 
[   17.059678] The buggy address belongs to the object at ffff888102ac4100
[   17.059678]  which belongs to the cache kmalloc-64 of size 64
[   17.061358] The buggy address is located 0 bytes to the right of
[   17.061358]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.061810] 
[   17.062499] The buggy address belongs to the physical page:
[   17.062834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.063110] flags: 0x200000000000000(node=0|zone=2)
[   17.063743] page_type: f5(slab)
[   17.064119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.064820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.065127] page dumped because: kasan: bad access detected
[   17.065580] 
[   17.065759] Memory state around the buggy address:
[   17.066039]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.066479]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.067382] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.067792]                                      ^
[   17.068289]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.068688]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.069077] ==================================================================
[   17.277736] ==================================================================
[   17.278475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   17.278748] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.279394] 
[   17.279565] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.279678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.279706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.279740] Call Trace:
[   17.279774]  <TASK>
[   17.279804]  dump_stack_lvl+0x73/0xb0
[   17.279871]  print_report+0xd1/0x650
[   17.279933]  ? __virt_addr_valid+0x1db/0x2d0
[   17.279972]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.280007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.280033]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.280055]  kasan_report+0x141/0x180
[   17.280077]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.280110]  kasan_check_range+0x10c/0x1c0
[   17.280148]  __kasan_check_write+0x18/0x20
[   17.280185]  kasan_atomics_helper+0x16e7/0x5450
[   17.280230]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.280277]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.280321]  ? trace_hardirqs_on+0x37/0xe0
[   17.280359]  ? kasan_atomics+0x152/0x310
[   17.280404]  kasan_atomics+0x1dc/0x310
[   17.280447]  ? __pfx_kasan_atomics+0x10/0x10
[   17.280493]  ? __pfx_kasan_atomics+0x10/0x10
[   17.280547]  kunit_try_run_case+0x1a5/0x480
[   17.280588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.280611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.280665]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.280687]  ? __kthread_parkme+0x82/0x180
[   17.280708]  ? preempt_count_sub+0x50/0x80
[   17.280732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.280756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.280778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.280800]  kthread+0x337/0x6f0
[   17.280820]  ? trace_preempt_on+0x20/0xc0
[   17.280841]  ? __pfx_kthread+0x10/0x10
[   17.280862]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.280882]  ? calculate_sigpending+0x7b/0xa0
[   17.280905]  ? __pfx_kthread+0x10/0x10
[   17.280926]  ret_from_fork+0x116/0x1d0
[   17.280945]  ? __pfx_kthread+0x10/0x10
[   17.280965]  ret_from_fork_asm+0x1a/0x30
[   17.280995]  </TASK>
[   17.281008] 
[   17.289708] Allocated by task 283:
[   17.289963]  kasan_save_stack+0x45/0x70
[   17.290144]  kasan_save_track+0x18/0x40
[   17.290314]  kasan_save_alloc_info+0x3b/0x50
[   17.290493]  __kasan_kmalloc+0xb7/0xc0
[   17.290668]  __kmalloc_cache_noprof+0x189/0x420
[   17.291006]  kasan_atomics+0x95/0x310
[   17.291291]  kunit_try_run_case+0x1a5/0x480
[   17.291711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.292091]  kthread+0x337/0x6f0
[   17.292405]  ret_from_fork+0x116/0x1d0
[   17.292667]  ret_from_fork_asm+0x1a/0x30
[   17.292857] 
[   17.293017] The buggy address belongs to the object at ffff888102ac4100
[   17.293017]  which belongs to the cache kmalloc-64 of size 64
[   17.293372] The buggy address is located 0 bytes to the right of
[   17.293372]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.293904] 
[   17.294070] The buggy address belongs to the physical page:
[   17.294573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.295200] flags: 0x200000000000000(node=0|zone=2)
[   17.295463] page_type: f5(slab)
[   17.295633] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.295890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.296131] page dumped because: kasan: bad access detected
[   17.296504] 
[   17.296667] Memory state around the buggy address:
[   17.297126]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.297578]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.298053] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.298372]                                      ^
[   17.298632]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.298949]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.299506] ==================================================================
[   16.497858] ==================================================================
[   16.499028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   16.499514] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.499822] 
[   16.500029] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.500154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.500183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.500221] Call Trace:
[   16.500257]  <TASK>
[   16.500290]  dump_stack_lvl+0x73/0xb0
[   16.500362]  print_report+0xd1/0x650
[   16.500403]  ? __virt_addr_valid+0x1db/0x2d0
[   16.500446]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.500494]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.500557]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.500603]  kasan_report+0x141/0x180
[   16.500664]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.500712]  kasan_check_range+0x10c/0x1c0
[   16.500759]  __kasan_check_write+0x18/0x20
[   16.500800]  kasan_atomics_helper+0x7c7/0x5450
[   16.500842]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.500875]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.500901]  ? trace_hardirqs_on+0x37/0xe0
[   16.500925]  ? kasan_atomics+0x152/0x310
[   16.500951]  kasan_atomics+0x1dc/0x310
[   16.500975]  ? __pfx_kasan_atomics+0x10/0x10
[   16.500997]  ? __pfx_kasan_atomics+0x10/0x10
[   16.501024]  kunit_try_run_case+0x1a5/0x480
[   16.501047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.501069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.501092]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.501151]  ? __kthread_parkme+0x82/0x180
[   16.501171]  ? preempt_count_sub+0x50/0x80
[   16.501196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.501219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.501242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.501263]  kthread+0x337/0x6f0
[   16.501283]  ? trace_preempt_on+0x20/0xc0
[   16.501304]  ? __pfx_kthread+0x10/0x10
[   16.501324]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.501345]  ? calculate_sigpending+0x7b/0xa0
[   16.501368]  ? __pfx_kthread+0x10/0x10
[   16.501389]  ret_from_fork+0x116/0x1d0
[   16.501407]  ? __pfx_kthread+0x10/0x10
[   16.501427]  ret_from_fork_asm+0x1a/0x30
[   16.501457]  </TASK>
[   16.501470] 
[   16.510740] Allocated by task 283:
[   16.510963]  kasan_save_stack+0x45/0x70
[   16.511206]  kasan_save_track+0x18/0x40
[   16.511481]  kasan_save_alloc_info+0x3b/0x50
[   16.511806]  __kasan_kmalloc+0xb7/0xc0
[   16.512079]  __kmalloc_cache_noprof+0x189/0x420
[   16.512380]  kasan_atomics+0x95/0x310
[   16.512554]  kunit_try_run_case+0x1a5/0x480
[   16.512850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.513137]  kthread+0x337/0x6f0
[   16.513402]  ret_from_fork+0x116/0x1d0
[   16.513573]  ret_from_fork_asm+0x1a/0x30
[   16.513756] 
[   16.513900] The buggy address belongs to the object at ffff888102ac4100
[   16.513900]  which belongs to the cache kmalloc-64 of size 64
[   16.514703] The buggy address is located 0 bytes to the right of
[   16.514703]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.515217] 
[   16.515329] The buggy address belongs to the physical page:
[   16.515701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.516227] flags: 0x200000000000000(node=0|zone=2)
[   16.516556] page_type: f5(slab)
[   16.516788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.517257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.517609] page dumped because: kasan: bad access detected
[   16.517837] 
[   16.517996] Memory state around the buggy address:
[   16.518305]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.518545]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.518792] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.519024]                                      ^
[   16.519379]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.519871]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.520372] ==================================================================
[   17.092347] ==================================================================
[   17.092800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   17.093280] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.093581] 
[   17.093778] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.093858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.093885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.093925] Call Trace:
[   17.093955]  <TASK>
[   17.093983]  dump_stack_lvl+0x73/0xb0
[   17.094035]  print_report+0xd1/0x650
[   17.094074]  ? __virt_addr_valid+0x1db/0x2d0
[   17.094148]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.094186]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.094231]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.094272]  kasan_report+0x141/0x180
[   17.094310]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.094356]  kasan_check_range+0x10c/0x1c0
[   17.094400]  __kasan_check_read+0x15/0x20
[   17.094436]  kasan_atomics_helper+0x13b5/0x5450
[   17.094480]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.094523]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.094571]  ? trace_hardirqs_on+0x37/0xe0
[   17.094628]  ? kasan_atomics+0x152/0x310
[   17.094684]  kasan_atomics+0x1dc/0x310
[   17.094730]  ? __pfx_kasan_atomics+0x10/0x10
[   17.094778]  ? __pfx_kasan_atomics+0x10/0x10
[   17.094833]  kunit_try_run_case+0x1a5/0x480
[   17.094879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.094923]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.094970]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.095015]  ? __kthread_parkme+0x82/0x180
[   17.095057]  ? preempt_count_sub+0x50/0x80
[   17.095125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.095169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.095210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.095256]  kthread+0x337/0x6f0
[   17.095296]  ? trace_preempt_on+0x20/0xc0
[   17.095341]  ? __pfx_kthread+0x10/0x10
[   17.095386]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.095429]  ? calculate_sigpending+0x7b/0xa0
[   17.095477]  ? __pfx_kthread+0x10/0x10
[   17.095523]  ret_from_fork+0x116/0x1d0
[   17.095562]  ? __pfx_kthread+0x10/0x10
[   17.095605]  ret_from_fork_asm+0x1a/0x30
[   17.095683]  </TASK>
[   17.095709] 
[   17.104438] Allocated by task 283:
[   17.104677]  kasan_save_stack+0x45/0x70
[   17.104901]  kasan_save_track+0x18/0x40
[   17.105183]  kasan_save_alloc_info+0x3b/0x50
[   17.105425]  __kasan_kmalloc+0xb7/0xc0
[   17.105612]  __kmalloc_cache_noprof+0x189/0x420
[   17.105923]  kasan_atomics+0x95/0x310
[   17.106190]  kunit_try_run_case+0x1a5/0x480
[   17.106463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.106675]  kthread+0x337/0x6f0
[   17.106930]  ret_from_fork+0x116/0x1d0
[   17.107185]  ret_from_fork_asm+0x1a/0x30
[   17.107388] 
[   17.107541] The buggy address belongs to the object at ffff888102ac4100
[   17.107541]  which belongs to the cache kmalloc-64 of size 64
[   17.108006] The buggy address is located 0 bytes to the right of
[   17.108006]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.108709] 
[   17.108861] The buggy address belongs to the physical page:
[   17.109049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.109331] flags: 0x200000000000000(node=0|zone=2)
[   17.109531] page_type: f5(slab)
[   17.109699] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.109957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.110223] page dumped because: kasan: bad access detected
[   17.110420] 
[   17.110525] Memory state around the buggy address:
[   17.110793]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.111284]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.111768] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.112262]                                      ^
[   17.112542]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.113010]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.113507] ==================================================================
[   17.195082] ==================================================================
[   17.195439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   17.196137] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.196473] 
[   17.196696] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.196776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.196801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.196839] Call Trace:
[   17.196881]  <TASK>
[   17.196910]  dump_stack_lvl+0x73/0xb0
[   17.196977]  print_report+0xd1/0x650
[   17.197033]  ? __virt_addr_valid+0x1db/0x2d0
[   17.197085]  ? kasan_atomics_helper+0x151d/0x5450
[   17.197126]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.197185]  ? kasan_atomics_helper+0x151d/0x5450
[   17.197237]  kasan_report+0x141/0x180
[   17.197291]  ? kasan_atomics_helper+0x151d/0x5450
[   17.197354]  kasan_check_range+0x10c/0x1c0
[   17.197411]  __kasan_check_write+0x18/0x20
[   17.197451]  kasan_atomics_helper+0x151d/0x5450
[   17.197506]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.197560]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.197629]  ? trace_hardirqs_on+0x37/0xe0
[   17.197672]  ? kasan_atomics+0x152/0x310
[   17.197725]  kasan_atomics+0x1dc/0x310
[   17.197789]  ? __pfx_kasan_atomics+0x10/0x10
[   17.197829]  ? __pfx_kasan_atomics+0x10/0x10
[   17.197880]  kunit_try_run_case+0x1a5/0x480
[   17.197935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.197980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.198028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.198075]  ? __kthread_parkme+0x82/0x180
[   17.198114]  ? preempt_count_sub+0x50/0x80
[   17.198161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.198208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.198254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.198299]  kthread+0x337/0x6f0
[   17.198339]  ? trace_preempt_on+0x20/0xc0
[   17.198387]  ? __pfx_kthread+0x10/0x10
[   17.198431]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.198473]  ? calculate_sigpending+0x7b/0xa0
[   17.198520]  ? __pfx_kthread+0x10/0x10
[   17.198564]  ret_from_fork+0x116/0x1d0
[   17.198604]  ? __pfx_kthread+0x10/0x10
[   17.198660]  ret_from_fork_asm+0x1a/0x30
[   17.198723]  </TASK>
[   17.198751] 
[   17.210390] Allocated by task 283:
[   17.210728]  kasan_save_stack+0x45/0x70
[   17.211040]  kasan_save_track+0x18/0x40
[   17.211409]  kasan_save_alloc_info+0x3b/0x50
[   17.211752]  __kasan_kmalloc+0xb7/0xc0
[   17.211936]  __kmalloc_cache_noprof+0x189/0x420
[   17.212195]  kasan_atomics+0x95/0x310
[   17.212365]  kunit_try_run_case+0x1a5/0x480
[   17.212547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.212961]  kthread+0x337/0x6f0
[   17.213303]  ret_from_fork+0x116/0x1d0
[   17.213691]  ret_from_fork_asm+0x1a/0x30
[   17.214033] 
[   17.214230] The buggy address belongs to the object at ffff888102ac4100
[   17.214230]  which belongs to the cache kmalloc-64 of size 64
[   17.215015] The buggy address is located 0 bytes to the right of
[   17.215015]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.215594] 
[   17.215782] The buggy address belongs to the physical page:
[   17.216193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.216653] flags: 0x200000000000000(node=0|zone=2)
[   17.216946] page_type: f5(slab)
[   17.217269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.217647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.217980] page dumped because: kasan: bad access detected
[   17.218423] 
[   17.218584] Memory state around the buggy address:
[   17.218896]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.219427]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.219777] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.220214]                                      ^
[   17.220576]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.220969]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.221440] ==================================================================
[   17.069989] ==================================================================
[   17.070539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   17.071166] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.071706] 
[   17.071902] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.071979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.072006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.072046] Call Trace:
[   17.072074]  <TASK>
[   17.072138]  dump_stack_lvl+0x73/0xb0
[   17.072198]  print_report+0xd1/0x650
[   17.072240]  ? __virt_addr_valid+0x1db/0x2d0
[   17.072280]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.072320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.072360]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.072404]  kasan_report+0x141/0x180
[   17.072448]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.072501]  __asan_report_load4_noabort+0x18/0x20
[   17.072549]  kasan_atomics_helper+0x49ce/0x5450
[   17.072596]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.072655]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.072701]  ? trace_hardirqs_on+0x37/0xe0
[   17.072738]  ? kasan_atomics+0x152/0x310
[   17.072787]  kasan_atomics+0x1dc/0x310
[   17.072827]  ? __pfx_kasan_atomics+0x10/0x10
[   17.072865]  ? __pfx_kasan_atomics+0x10/0x10
[   17.072914]  kunit_try_run_case+0x1a5/0x480
[   17.072957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.073000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.073044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.073081]  ? __kthread_parkme+0x82/0x180
[   17.073150]  ? preempt_count_sub+0x50/0x80
[   17.073194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.073240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.073288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.073332]  kthread+0x337/0x6f0
[   17.073360]  ? trace_preempt_on+0x20/0xc0
[   17.073383]  ? __pfx_kthread+0x10/0x10
[   17.073403]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.073424]  ? calculate_sigpending+0x7b/0xa0
[   17.073448]  ? __pfx_kthread+0x10/0x10
[   17.073469]  ret_from_fork+0x116/0x1d0
[   17.073488]  ? __pfx_kthread+0x10/0x10
[   17.073508]  ret_from_fork_asm+0x1a/0x30
[   17.073539]  </TASK>
[   17.073553] 
[   17.081812] Allocated by task 283:
[   17.081997]  kasan_save_stack+0x45/0x70
[   17.082317]  kasan_save_track+0x18/0x40
[   17.082606]  kasan_save_alloc_info+0x3b/0x50
[   17.082934]  __kasan_kmalloc+0xb7/0xc0
[   17.083233]  __kmalloc_cache_noprof+0x189/0x420
[   17.083537]  kasan_atomics+0x95/0x310
[   17.083842]  kunit_try_run_case+0x1a5/0x480
[   17.084051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.084424]  kthread+0x337/0x6f0
[   17.084696]  ret_from_fork+0x116/0x1d0
[   17.084881]  ret_from_fork_asm+0x1a/0x30
[   17.085175] 
[   17.085334] The buggy address belongs to the object at ffff888102ac4100
[   17.085334]  which belongs to the cache kmalloc-64 of size 64
[   17.085921] The buggy address is located 0 bytes to the right of
[   17.085921]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.086378] 
[   17.086541] The buggy address belongs to the physical page:
[   17.086901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.087195] flags: 0x200000000000000(node=0|zone=2)
[   17.087393] page_type: f5(slab)
[   17.087552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.087919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.088421] page dumped because: kasan: bad access detected
[   17.088816] 
[   17.088978] Memory state around the buggy address:
[   17.089347]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.089820]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.090130] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.090475]                                      ^
[   17.090753]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.090994]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.091465] ==================================================================
[   16.521212] ==================================================================
[   16.521594] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   16.522131] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.522513] 
[   16.522723] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.522802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.522827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.522866] Call Trace:
[   16.522895]  <TASK>
[   16.522924]  dump_stack_lvl+0x73/0xb0
[   16.522980]  print_report+0xd1/0x650
[   16.523022]  ? __virt_addr_valid+0x1db/0x2d0
[   16.523059]  ? kasan_atomics_helper+0x860/0x5450
[   16.523131]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.523183]  ? kasan_atomics_helper+0x860/0x5450
[   16.523225]  kasan_report+0x141/0x180
[   16.523266]  ? kasan_atomics_helper+0x860/0x5450
[   16.523316]  kasan_check_range+0x10c/0x1c0
[   16.523363]  __kasan_check_write+0x18/0x20
[   16.523403]  kasan_atomics_helper+0x860/0x5450
[   16.523446]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.523489]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.523529]  ? trace_hardirqs_on+0x37/0xe0
[   16.523570]  ? kasan_atomics+0x152/0x310
[   16.523634]  kasan_atomics+0x1dc/0x310
[   16.523681]  ? __pfx_kasan_atomics+0x10/0x10
[   16.523726]  ? __pfx_kasan_atomics+0x10/0x10
[   16.523776]  kunit_try_run_case+0x1a5/0x480
[   16.523820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.523860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.523906]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.523952]  ? __kthread_parkme+0x82/0x180
[   16.523990]  ? preempt_count_sub+0x50/0x80
[   16.524034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.524078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.524154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.524200]  kthread+0x337/0x6f0
[   16.524241]  ? trace_preempt_on+0x20/0xc0
[   16.524285]  ? __pfx_kthread+0x10/0x10
[   16.524322]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.524359]  ? calculate_sigpending+0x7b/0xa0
[   16.524400]  ? __pfx_kthread+0x10/0x10
[   16.524443]  ret_from_fork+0x116/0x1d0
[   16.524481]  ? __pfx_kthread+0x10/0x10
[   16.524523]  ret_from_fork_asm+0x1a/0x30
[   16.524582]  </TASK>
[   16.524602] 
[   16.533132] Allocated by task 283:
[   16.533315]  kasan_save_stack+0x45/0x70
[   16.533500]  kasan_save_track+0x18/0x40
[   16.533714]  kasan_save_alloc_info+0x3b/0x50
[   16.534046]  __kasan_kmalloc+0xb7/0xc0
[   16.534364]  __kmalloc_cache_noprof+0x189/0x420
[   16.534728]  kasan_atomics+0x95/0x310
[   16.535028]  kunit_try_run_case+0x1a5/0x480
[   16.535949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.536397]  kthread+0x337/0x6f0
[   16.536658]  ret_from_fork+0x116/0x1d0
[   16.536932]  ret_from_fork_asm+0x1a/0x30
[   16.537198] 
[   16.537311] The buggy address belongs to the object at ffff888102ac4100
[   16.537311]  which belongs to the cache kmalloc-64 of size 64
[   16.537682] The buggy address is located 0 bytes to the right of
[   16.537682]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.538057] 
[   16.538196] The buggy address belongs to the physical page:
[   16.538548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.539093] flags: 0x200000000000000(node=0|zone=2)
[   16.539484] page_type: f5(slab)
[   16.539746] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.540283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.540784] page dumped because: kasan: bad access detected
[   16.541187] 
[   16.541344] Memory state around the buggy address:
[   16.541675]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.542163]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.542450] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.542811]                                      ^
[   16.543095]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.543380]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.543827] ==================================================================
[   16.404735] ==================================================================
[   16.404907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   16.405175] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.405609] 
[   16.405856] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.405947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.406002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.406043] Call Trace:
[   16.406073]  <TASK>
[   16.406103]  dump_stack_lvl+0x73/0xb0
[   16.406159]  print_report+0xd1/0x650
[   16.406204]  ? __virt_addr_valid+0x1db/0x2d0
[   16.406248]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.406290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.406344]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.406385]  kasan_report+0x141/0x180
[   16.406459]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.406514]  kasan_check_range+0x10c/0x1c0
[   16.406557]  __kasan_check_write+0x18/0x20
[   16.406594]  kasan_atomics_helper+0x5fe/0x5450
[   16.406653]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.406696]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.406881]  ? trace_hardirqs_on+0x37/0xe0
[   16.406924]  ? kasan_atomics+0x152/0x310
[   16.406974]  kasan_atomics+0x1dc/0x310
[   16.407017]  ? __pfx_kasan_atomics+0x10/0x10
[   16.407063]  ? __pfx_kasan_atomics+0x10/0x10
[   16.407111]  kunit_try_run_case+0x1a5/0x480
[   16.407174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.407217]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.407260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.407307]  ? __kthread_parkme+0x82/0x180
[   16.407350]  ? preempt_count_sub+0x50/0x80
[   16.407397]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.407441]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.407506]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.407635]  kthread+0x337/0x6f0
[   16.407676]  ? trace_preempt_on+0x20/0xc0
[   16.407719]  ? __pfx_kthread+0x10/0x10
[   16.407761]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.407804]  ? calculate_sigpending+0x7b/0xa0
[   16.407851]  ? __pfx_kthread+0x10/0x10
[   16.407889]  ret_from_fork+0x116/0x1d0
[   16.407924]  ? __pfx_kthread+0x10/0x10
[   16.407964]  ret_from_fork_asm+0x1a/0x30
[   16.408026]  </TASK>
[   16.408053] 
[   16.420405] Allocated by task 283:
[   16.420837]  kasan_save_stack+0x45/0x70
[   16.421159]  kasan_save_track+0x18/0x40
[   16.421327]  kasan_save_alloc_info+0x3b/0x50
[   16.421790]  __kasan_kmalloc+0xb7/0xc0
[   16.421991]  __kmalloc_cache_noprof+0x189/0x420
[   16.422344]  kasan_atomics+0x95/0x310
[   16.422677]  kunit_try_run_case+0x1a5/0x480
[   16.422882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.423275]  kthread+0x337/0x6f0
[   16.423955]  ret_from_fork+0x116/0x1d0
[   16.424236]  ret_from_fork_asm+0x1a/0x30
[   16.424552] 
[   16.424734] The buggy address belongs to the object at ffff888102ac4100
[   16.424734]  which belongs to the cache kmalloc-64 of size 64
[   16.425223] The buggy address is located 0 bytes to the right of
[   16.425223]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.425963] 
[   16.426164] The buggy address belongs to the physical page:
[   16.426375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.426983] flags: 0x200000000000000(node=0|zone=2)
[   16.427329] page_type: f5(slab)
[   16.428007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.428362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.429143] page dumped because: kasan: bad access detected
[   16.429539] 
[   16.429985] Memory state around the buggy address:
[   16.430393]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.431007]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.431435] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.432171]                                      ^
[   16.432479]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.433022]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.433395] ==================================================================
[   16.434475] ==================================================================
[   16.435027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   16.435372] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.436069] 
[   16.436413] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.436507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.436540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.436574] Call Trace:
[   16.436600]  <TASK>
[   16.436642]  dump_stack_lvl+0x73/0xb0
[   16.436693]  print_report+0xd1/0x650
[   16.436727]  ? __virt_addr_valid+0x1db/0x2d0
[   16.436763]  ? kasan_atomics_helper+0x697/0x5450
[   16.436795]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.436833]  ? kasan_atomics_helper+0x697/0x5450
[   16.436864]  kasan_report+0x141/0x180
[   16.436899]  ? kasan_atomics_helper+0x697/0x5450
[   16.436948]  kasan_check_range+0x10c/0x1c0
[   16.436989]  __kasan_check_write+0x18/0x20
[   16.437020]  kasan_atomics_helper+0x697/0x5450
[   16.437081]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.437109]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.437168]  ? trace_hardirqs_on+0x37/0xe0
[   16.437201]  ? kasan_atomics+0x152/0x310
[   16.437228]  kasan_atomics+0x1dc/0x310
[   16.437251]  ? __pfx_kasan_atomics+0x10/0x10
[   16.437274]  ? __pfx_kasan_atomics+0x10/0x10
[   16.437300]  kunit_try_run_case+0x1a5/0x480
[   16.437327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.437349]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.437371]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.437393]  ? __kthread_parkme+0x82/0x180
[   16.437413]  ? preempt_count_sub+0x50/0x80
[   16.437435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.437459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.437481]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.437504]  kthread+0x337/0x6f0
[   16.437523]  ? trace_preempt_on+0x20/0xc0
[   16.437545]  ? __pfx_kthread+0x10/0x10
[   16.437564]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.437585]  ? calculate_sigpending+0x7b/0xa0
[   16.437607]  ? __pfx_kthread+0x10/0x10
[   16.437654]  ret_from_fork+0x116/0x1d0
[   16.437685]  ? __pfx_kthread+0x10/0x10
[   16.437723]  ret_from_fork_asm+0x1a/0x30
[   16.437777]  </TASK>
[   16.437793] 
[   16.451272] Allocated by task 283:
[   16.451458]  kasan_save_stack+0x45/0x70
[   16.451645]  kasan_save_track+0x18/0x40
[   16.452348]  kasan_save_alloc_info+0x3b/0x50
[   16.453132]  __kasan_kmalloc+0xb7/0xc0
[   16.453416]  __kmalloc_cache_noprof+0x189/0x420
[   16.453799]  kasan_atomics+0x95/0x310
[   16.454024]  kunit_try_run_case+0x1a5/0x480
[   16.454409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.454963]  kthread+0x337/0x6f0
[   16.455262]  ret_from_fork+0x116/0x1d0
[   16.455451]  ret_from_fork_asm+0x1a/0x30
[   16.455816] 
[   16.455990] The buggy address belongs to the object at ffff888102ac4100
[   16.455990]  which belongs to the cache kmalloc-64 of size 64
[   16.456873] The buggy address is located 0 bytes to the right of
[   16.456873]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.457698] 
[   16.457862] The buggy address belongs to the physical page:
[   16.458608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.458942] flags: 0x200000000000000(node=0|zone=2)
[   16.459281] page_type: f5(slab)
[   16.459465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.460288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.460781] page dumped because: kasan: bad access detected
[   16.461307] 
[   16.461424] Memory state around the buggy address:
[   16.461591]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.462072]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.462520] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.462858]                                      ^
[   16.463035]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.463238]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.465191] ==================================================================
[   17.374059] ==================================================================
[   17.374633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   17.375092] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.375644] 
[   17.375873] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.375949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.375970] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.376011] Call Trace:
[   17.376040]  <TASK>
[   17.376094]  dump_stack_lvl+0x73/0xb0
[   17.376211]  print_report+0xd1/0x650
[   17.376288]  ? __virt_addr_valid+0x1db/0x2d0
[   17.376352]  ? kasan_atomics_helper+0x194a/0x5450
[   17.376403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.376454]  ? kasan_atomics_helper+0x194a/0x5450
[   17.376496]  kasan_report+0x141/0x180
[   17.376544]  ? kasan_atomics_helper+0x194a/0x5450
[   17.376600]  kasan_check_range+0x10c/0x1c0
[   17.376661]  __kasan_check_write+0x18/0x20
[   17.376703]  kasan_atomics_helper+0x194a/0x5450
[   17.376750]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.376796]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.376844]  ? trace_hardirqs_on+0x37/0xe0
[   17.376888]  ? kasan_atomics+0x152/0x310
[   17.376943]  kasan_atomics+0x1dc/0x310
[   17.376990]  ? __pfx_kasan_atomics+0x10/0x10
[   17.377039]  ? __pfx_kasan_atomics+0x10/0x10
[   17.377084]  kunit_try_run_case+0x1a5/0x480
[   17.377157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.377196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.377276]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.377331]  ? __kthread_parkme+0x82/0x180
[   17.377374]  ? preempt_count_sub+0x50/0x80
[   17.377442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.377491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.377550]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.377588]  kthread+0x337/0x6f0
[   17.377640]  ? trace_preempt_on+0x20/0xc0
[   17.377685]  ? __pfx_kthread+0x10/0x10
[   17.377729]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.377771]  ? calculate_sigpending+0x7b/0xa0
[   17.377799]  ? __pfx_kthread+0x10/0x10
[   17.377821]  ret_from_fork+0x116/0x1d0
[   17.377841]  ? __pfx_kthread+0x10/0x10
[   17.377861]  ret_from_fork_asm+0x1a/0x30
[   17.377892]  </TASK>
[   17.377905] 
[   17.388883] Allocated by task 283:
[   17.389258]  kasan_save_stack+0x45/0x70
[   17.389442]  kasan_save_track+0x18/0x40
[   17.389791]  kasan_save_alloc_info+0x3b/0x50
[   17.390186]  __kasan_kmalloc+0xb7/0xc0
[   17.390357]  __kmalloc_cache_noprof+0x189/0x420
[   17.390698]  kasan_atomics+0x95/0x310
[   17.390949]  kunit_try_run_case+0x1a5/0x480
[   17.391245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.391584]  kthread+0x337/0x6f0
[   17.391890]  ret_from_fork+0x116/0x1d0
[   17.392144]  ret_from_fork_asm+0x1a/0x30
[   17.392485] 
[   17.392633] The buggy address belongs to the object at ffff888102ac4100
[   17.392633]  which belongs to the cache kmalloc-64 of size 64
[   17.393230] The buggy address is located 0 bytes to the right of
[   17.393230]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.393748] 
[   17.393943] The buggy address belongs to the physical page:
[   17.394324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.394741] flags: 0x200000000000000(node=0|zone=2)
[   17.394954] page_type: f5(slab)
[   17.395281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.395734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.396133] page dumped because: kasan: bad access detected
[   17.396450] 
[   17.396611] Memory state around the buggy address:
[   17.396888]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.397234]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.397744] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.398047]                                      ^
[   17.398398]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.398783]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.399228] ==================================================================
[   17.694822] ==================================================================
[   17.695388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   17.696418] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.696679] 
[   17.696813] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.696895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.696913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.696936] Call Trace:
[   17.696954]  <TASK>
[   17.696972]  dump_stack_lvl+0x73/0xb0
[   17.697008]  print_report+0xd1/0x650
[   17.697041]  ? __virt_addr_valid+0x1db/0x2d0
[   17.697076]  ? kasan_atomics_helper+0x2006/0x5450
[   17.697109]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.697566]  ? kasan_atomics_helper+0x2006/0x5450
[   17.697639]  kasan_report+0x141/0x180
[   17.697694]  ? kasan_atomics_helper+0x2006/0x5450
[   17.697737]  kasan_check_range+0x10c/0x1c0
[   17.697762]  __kasan_check_write+0x18/0x20
[   17.697781]  kasan_atomics_helper+0x2006/0x5450
[   17.697811]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.697835]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.697859]  ? trace_hardirqs_on+0x37/0xe0
[   17.697882]  ? kasan_atomics+0x152/0x310
[   17.697908]  kasan_atomics+0x1dc/0x310
[   17.697941]  ? __pfx_kasan_atomics+0x10/0x10
[   17.697964]  ? __pfx_kasan_atomics+0x10/0x10
[   17.698007]  kunit_try_run_case+0x1a5/0x480
[   17.698032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.698054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.698127]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.698168]  ? __kthread_parkme+0x82/0x180
[   17.698200]  ? preempt_count_sub+0x50/0x80
[   17.698228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.698250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.698273]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.698296]  kthread+0x337/0x6f0
[   17.698315]  ? trace_preempt_on+0x20/0xc0
[   17.698336]  ? __pfx_kthread+0x10/0x10
[   17.698357]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.698377]  ? calculate_sigpending+0x7b/0xa0
[   17.698400]  ? __pfx_kthread+0x10/0x10
[   17.698421]  ret_from_fork+0x116/0x1d0
[   17.698439]  ? __pfx_kthread+0x10/0x10
[   17.698459]  ret_from_fork_asm+0x1a/0x30
[   17.698489]  </TASK>
[   17.698502] 
[   17.708971] Allocated by task 283:
[   17.709177]  kasan_save_stack+0x45/0x70
[   17.709364]  kasan_save_track+0x18/0x40
[   17.709529]  kasan_save_alloc_info+0x3b/0x50
[   17.709847]  __kasan_kmalloc+0xb7/0xc0
[   17.710180]  __kmalloc_cache_noprof+0x189/0x420
[   17.710523]  kasan_atomics+0x95/0x310
[   17.710705]  kunit_try_run_case+0x1a5/0x480
[   17.711016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.711386]  kthread+0x337/0x6f0
[   17.711546]  ret_from_fork+0x116/0x1d0
[   17.711723]  ret_from_fork_asm+0x1a/0x30
[   17.712038] 
[   17.712239] The buggy address belongs to the object at ffff888102ac4100
[   17.712239]  which belongs to the cache kmalloc-64 of size 64
[   17.712913] The buggy address is located 0 bytes to the right of
[   17.712913]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.713322] 
[   17.713434] The buggy address belongs to the physical page:
[   17.713787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.714380] flags: 0x200000000000000(node=0|zone=2)
[   17.714757] page_type: f5(slab)
[   17.715024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.715543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.715836] page dumped because: kasan: bad access detected
[   17.716136] 
[   17.716290] Memory state around the buggy address:
[   17.716664]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.717033]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.717478] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.717867]                                      ^
[   17.718198]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.718536]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.719017] ==================================================================
[   16.279879] ==================================================================
[   16.280266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   16.280841] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.281211] 
[   16.281418] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.281904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.281961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.282006] Call Trace:
[   16.282042]  <TASK>
[   16.282075]  dump_stack_lvl+0x73/0xb0
[   16.282140]  print_report+0xd1/0x650
[   16.282185]  ? __virt_addr_valid+0x1db/0x2d0
[   16.282222]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.282258]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.282332]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.282374]  kasan_report+0x141/0x180
[   16.282415]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.282490]  __asan_report_load4_noabort+0x18/0x20
[   16.282704]  kasan_atomics_helper+0x4b54/0x5450
[   16.282749]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.282792]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.282834]  ? trace_hardirqs_on+0x37/0xe0
[   16.282858]  ? kasan_atomics+0x152/0x310
[   16.282886]  kasan_atomics+0x1dc/0x310
[   16.282908]  ? __pfx_kasan_atomics+0x10/0x10
[   16.282931]  ? __pfx_kasan_atomics+0x10/0x10
[   16.282957]  kunit_try_run_case+0x1a5/0x480
[   16.282981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.283002]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.283026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.283047]  ? __kthread_parkme+0x82/0x180
[   16.283068]  ? preempt_count_sub+0x50/0x80
[   16.283092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.283115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.283138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.283159]  kthread+0x337/0x6f0
[   16.283179]  ? trace_preempt_on+0x20/0xc0
[   16.283201]  ? __pfx_kthread+0x10/0x10
[   16.283232]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.283260]  ? calculate_sigpending+0x7b/0xa0
[   16.283287]  ? __pfx_kthread+0x10/0x10
[   16.283308]  ret_from_fork+0x116/0x1d0
[   16.283327]  ? __pfx_kthread+0x10/0x10
[   16.283346]  ret_from_fork_asm+0x1a/0x30
[   16.283376]  </TASK>
[   16.283389] 
[   16.294687] Allocated by task 283:
[   16.294868]  kasan_save_stack+0x45/0x70
[   16.295169]  kasan_save_track+0x18/0x40
[   16.295482]  kasan_save_alloc_info+0x3b/0x50
[   16.295991]  __kasan_kmalloc+0xb7/0xc0
[   16.296321]  __kmalloc_cache_noprof+0x189/0x420
[   16.296817]  kasan_atomics+0x95/0x310
[   16.297181]  kunit_try_run_case+0x1a5/0x480
[   16.297895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.298388]  kthread+0x337/0x6f0
[   16.298636]  ret_from_fork+0x116/0x1d0
[   16.298874]  ret_from_fork_asm+0x1a/0x30
[   16.299296] 
[   16.299471] The buggy address belongs to the object at ffff888102ac4100
[   16.299471]  which belongs to the cache kmalloc-64 of size 64
[   16.300283] The buggy address is located 0 bytes to the right of
[   16.300283]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.301056] 
[   16.301274] The buggy address belongs to the physical page:
[   16.302026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.302717] flags: 0x200000000000000(node=0|zone=2)
[   16.303043] page_type: f5(slab)
[   16.303366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.303955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.304347] page dumped because: kasan: bad access detected
[   16.304780] 
[   16.304943] Memory state around the buggy address:
[   16.305263]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.305674]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.306089] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.307090]                                      ^
[   16.307392]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.307994]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.308640] ==================================================================
[   16.852897] ==================================================================
[   16.853479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   16.854005] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.854513] 
[   16.854731] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.854816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.854840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.854879] Call Trace:
[   16.854926]  <TASK>
[   16.854956]  dump_stack_lvl+0x73/0xb0
[   16.855010]  print_report+0xd1/0x650
[   16.855055]  ? __virt_addr_valid+0x1db/0x2d0
[   16.855143]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.855190]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.855238]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.855282]  kasan_report+0x141/0x180
[   16.855326]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.855393]  __asan_report_load4_noabort+0x18/0x20
[   16.855442]  kasan_atomics_helper+0x4a36/0x5450
[   16.855486]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.855544]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.855593]  ? trace_hardirqs_on+0x37/0xe0
[   16.855649]  ? kasan_atomics+0x152/0x310
[   16.855718]  kasan_atomics+0x1dc/0x310
[   16.855763]  ? __pfx_kasan_atomics+0x10/0x10
[   16.855807]  ? __pfx_kasan_atomics+0x10/0x10
[   16.855856]  kunit_try_run_case+0x1a5/0x480
[   16.855916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.855961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.856017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.856069]  ? __kthread_parkme+0x82/0x180
[   16.856136]  ? preempt_count_sub+0x50/0x80
[   16.856188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.856235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.856283]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.856330]  kthread+0x337/0x6f0
[   16.856372]  ? trace_preempt_on+0x20/0xc0
[   16.856418]  ? __pfx_kthread+0x10/0x10
[   16.856460]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.856499]  ? calculate_sigpending+0x7b/0xa0
[   16.856536]  ? __pfx_kthread+0x10/0x10
[   16.856571]  ret_from_fork+0x116/0x1d0
[   16.856606]  ? __pfx_kthread+0x10/0x10
[   16.856659]  ret_from_fork_asm+0x1a/0x30
[   16.856737]  </TASK>
[   16.856763] 
[   16.866422] Allocated by task 283:
[   16.866604]  kasan_save_stack+0x45/0x70
[   16.866921]  kasan_save_track+0x18/0x40
[   16.867254]  kasan_save_alloc_info+0x3b/0x50
[   16.867518]  __kasan_kmalloc+0xb7/0xc0
[   16.867774]  __kmalloc_cache_noprof+0x189/0x420
[   16.867981]  kasan_atomics+0x95/0x310
[   16.868311]  kunit_try_run_case+0x1a5/0x480
[   16.868567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.868912]  kthread+0x337/0x6f0
[   16.869122]  ret_from_fork+0x116/0x1d0
[   16.869418]  ret_from_fork_asm+0x1a/0x30
[   16.869656] 
[   16.869820] The buggy address belongs to the object at ffff888102ac4100
[   16.869820]  which belongs to the cache kmalloc-64 of size 64
[   16.870447] The buggy address is located 0 bytes to the right of
[   16.870447]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.871017] 
[   16.871194] The buggy address belongs to the physical page:
[   16.871429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.871747] flags: 0x200000000000000(node=0|zone=2)
[   16.871968] page_type: f5(slab)
[   16.872272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.872821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.873359] page dumped because: kasan: bad access detected
[   16.873750] 
[   16.873924] Memory state around the buggy address:
[   16.874298]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.874778]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.875298] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.875791]                                      ^
[   16.876167]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.876539]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.876863] ==================================================================
[   17.866036] ==================================================================
[   17.866729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   17.867428] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.867946] 
[   17.868117] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.868197] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.868225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.868265] Call Trace:
[   17.868296]  <TASK>
[   17.868326]  dump_stack_lvl+0x73/0xb0
[   17.868387]  print_report+0xd1/0x650
[   17.868434]  ? __virt_addr_valid+0x1db/0x2d0
[   17.868479]  ? kasan_atomics_helper+0x5115/0x5450
[   17.868523]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.868577]  ? kasan_atomics_helper+0x5115/0x5450
[   17.868635]  kasan_report+0x141/0x180
[   17.868684]  ? kasan_atomics_helper+0x5115/0x5450
[   17.868740]  __asan_report_load8_noabort+0x18/0x20
[   17.868790]  kasan_atomics_helper+0x5115/0x5450
[   17.868837]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.868883]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.868931]  ? trace_hardirqs_on+0x37/0xe0
[   17.868974]  ? kasan_atomics+0x152/0x310
[   17.869031]  kasan_atomics+0x1dc/0x310
[   17.869080]  ? __pfx_kasan_atomics+0x10/0x10
[   17.869129]  ? __pfx_kasan_atomics+0x10/0x10
[   17.869174]  kunit_try_run_case+0x1a5/0x480
[   17.869218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.869257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.869301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.869344]  ? __kthread_parkme+0x82/0x180
[   17.869378]  ? preempt_count_sub+0x50/0x80
[   17.869421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.869464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.869504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.869540]  kthread+0x337/0x6f0
[   17.869575]  ? trace_preempt_on+0x20/0xc0
[   17.869632]  ? __pfx_kthread+0x10/0x10
[   17.869675]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.869718]  ? calculate_sigpending+0x7b/0xa0
[   17.869764]  ? __pfx_kthread+0x10/0x10
[   17.869809]  ret_from_fork+0x116/0x1d0
[   17.869850]  ? __pfx_kthread+0x10/0x10
[   17.869892]  ret_from_fork_asm+0x1a/0x30
[   17.869961]  </TASK>
[   17.869987] 
[   17.878268] Allocated by task 283:
[   17.878564]  kasan_save_stack+0x45/0x70
[   17.878872]  kasan_save_track+0x18/0x40
[   17.879182]  kasan_save_alloc_info+0x3b/0x50
[   17.879505]  __kasan_kmalloc+0xb7/0xc0
[   17.879803]  __kmalloc_cache_noprof+0x189/0x420
[   17.880147]  kasan_atomics+0x95/0x310
[   17.880414]  kunit_try_run_case+0x1a5/0x480
[   17.880745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.881104]  kthread+0x337/0x6f0
[   17.881324]  ret_from_fork+0x116/0x1d0
[   17.881488]  ret_from_fork_asm+0x1a/0x30
[   17.882943] 
[   17.883145] The buggy address belongs to the object at ffff888102ac4100
[   17.883145]  which belongs to the cache kmalloc-64 of size 64
[   17.883928] The buggy address is located 0 bytes to the right of
[   17.883928]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.886833] 
[   17.887025] The buggy address belongs to the physical page:
[   17.887522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.887804] flags: 0x200000000000000(node=0|zone=2)
[   17.888005] page_type: f5(slab)
[   17.889372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.889945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.890876] page dumped because: kasan: bad access detected
[   17.891533] 
[   17.891801] Memory state around the buggy address:
[   17.892391]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.892664]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.893138] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.893576]                                      ^
[   17.893810]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.894142]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.894497] ==================================================================
[   17.503817] ==================================================================
[   17.504025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   17.505343] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.506044] 
[   17.506835] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.506957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.506987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.507026] Call Trace:
[   17.507057]  <TASK>
[   17.507083]  dump_stack_lvl+0x73/0xb0
[   17.507152]  print_report+0xd1/0x650
[   17.507176]  ? __virt_addr_valid+0x1db/0x2d0
[   17.507199]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.507219]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.507244]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.507266]  kasan_report+0x141/0x180
[   17.507287]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.507313]  __asan_report_load8_noabort+0x18/0x20
[   17.507336]  kasan_atomics_helper+0x4f30/0x5450
[   17.507358]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.507380]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.507403]  ? trace_hardirqs_on+0x37/0xe0
[   17.507424]  ? kasan_atomics+0x152/0x310
[   17.507451]  kasan_atomics+0x1dc/0x310
[   17.507473]  ? __pfx_kasan_atomics+0x10/0x10
[   17.507495]  ? __pfx_kasan_atomics+0x10/0x10
[   17.507521]  kunit_try_run_case+0x1a5/0x480
[   17.507544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.507566]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.507589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.507611]  ? __kthread_parkme+0x82/0x180
[   17.507649]  ? preempt_count_sub+0x50/0x80
[   17.507672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.507696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.507718]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.507741]  kthread+0x337/0x6f0
[   17.507760]  ? trace_preempt_on+0x20/0xc0
[   17.507782]  ? __pfx_kthread+0x10/0x10
[   17.507802]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.507823]  ? calculate_sigpending+0x7b/0xa0
[   17.507846]  ? __pfx_kthread+0x10/0x10
[   17.507867]  ret_from_fork+0x116/0x1d0
[   17.507885]  ? __pfx_kthread+0x10/0x10
[   17.507905]  ret_from_fork_asm+0x1a/0x30
[   17.507935]  </TASK>
[   17.507948] 
[   17.519158] Allocated by task 283:
[   17.519435]  kasan_save_stack+0x45/0x70
[   17.519850]  kasan_save_track+0x18/0x40
[   17.520171]  kasan_save_alloc_info+0x3b/0x50
[   17.520570]  __kasan_kmalloc+0xb7/0xc0
[   17.520916]  __kmalloc_cache_noprof+0x189/0x420
[   17.521267]  kasan_atomics+0x95/0x310
[   17.521583]  kunit_try_run_case+0x1a5/0x480
[   17.521944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.522220]  kthread+0x337/0x6f0
[   17.522483]  ret_from_fork+0x116/0x1d0
[   17.522732]  ret_from_fork_asm+0x1a/0x30
[   17.523064] 
[   17.523296] The buggy address belongs to the object at ffff888102ac4100
[   17.523296]  which belongs to the cache kmalloc-64 of size 64
[   17.524285] The buggy address is located 0 bytes to the right of
[   17.524285]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.525694] 
[   17.525945] The buggy address belongs to the physical page:
[   17.527027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.528055] flags: 0x200000000000000(node=0|zone=2)
[   17.528653] page_type: f5(slab)
[   17.528818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.529052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.530803] page dumped because: kasan: bad access detected
[   17.531021] 
[   17.531130] Memory state around the buggy address:
[   17.531291]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.531504]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.531858] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.532260]                                      ^
[   17.532534]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.534052]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.534686] ==================================================================
[   17.248164] ==================================================================
[   17.248555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   17.249086] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.249515] 
[   17.249682] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.249772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.249801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.249843] Call Trace:
[   17.249875]  <TASK>
[   17.249906]  dump_stack_lvl+0x73/0xb0
[   17.249973]  print_report+0xd1/0x650
[   17.250019]  ? __virt_addr_valid+0x1db/0x2d0
[   17.250064]  ? kasan_atomics_helper+0x164f/0x5450
[   17.250137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.250193]  ? kasan_atomics_helper+0x164f/0x5450
[   17.250230]  kasan_report+0x141/0x180
[   17.250270]  ? kasan_atomics_helper+0x164f/0x5450
[   17.250317]  kasan_check_range+0x10c/0x1c0
[   17.250360]  __kasan_check_write+0x18/0x20
[   17.250400]  kasan_atomics_helper+0x164f/0x5450
[   17.250443]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.250486]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.250530]  ? trace_hardirqs_on+0x37/0xe0
[   17.250575]  ? kasan_atomics+0x152/0x310
[   17.250641]  kasan_atomics+0x1dc/0x310
[   17.250687]  ? __pfx_kasan_atomics+0x10/0x10
[   17.250734]  ? __pfx_kasan_atomics+0x10/0x10
[   17.250789]  kunit_try_run_case+0x1a5/0x480
[   17.250838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.250879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.250913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.250944]  ? __kthread_parkme+0x82/0x180
[   17.250970]  ? preempt_count_sub+0x50/0x80
[   17.251001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.251031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.251055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.251078]  kthread+0x337/0x6f0
[   17.251105]  ? trace_preempt_on+0x20/0xc0
[   17.251152]  ? __pfx_kthread+0x10/0x10
[   17.251173]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.251194]  ? calculate_sigpending+0x7b/0xa0
[   17.251218]  ? __pfx_kthread+0x10/0x10
[   17.251239]  ret_from_fork+0x116/0x1d0
[   17.251258]  ? __pfx_kthread+0x10/0x10
[   17.251278]  ret_from_fork_asm+0x1a/0x30
[   17.251309]  </TASK>
[   17.251322] 
[   17.261844] Allocated by task 283:
[   17.262086]  kasan_save_stack+0x45/0x70
[   17.263041]  kasan_save_track+0x18/0x40
[   17.263357]  kasan_save_alloc_info+0x3b/0x50
[   17.264805]  __kasan_kmalloc+0xb7/0xc0
[   17.265139]  __kmalloc_cache_noprof+0x189/0x420
[   17.265468]  kasan_atomics+0x95/0x310
[   17.265733]  kunit_try_run_case+0x1a5/0x480
[   17.266041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.266380]  kthread+0x337/0x6f0
[   17.267258]  ret_from_fork+0x116/0x1d0
[   17.267784]  ret_from_fork_asm+0x1a/0x30
[   17.268878] 
[   17.269667] The buggy address belongs to the object at ffff888102ac4100
[   17.269667]  which belongs to the cache kmalloc-64 of size 64
[   17.270439] The buggy address is located 0 bytes to the right of
[   17.270439]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.271246] 
[   17.271358] The buggy address belongs to the physical page:
[   17.271554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.271857] flags: 0x200000000000000(node=0|zone=2)
[   17.272045] page_type: f5(slab)
[   17.272272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.272723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.272970] page dumped because: kasan: bad access detected
[   17.273217] 
[   17.273305] Memory state around the buggy address:
[   17.273471]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.273770]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.274328] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.274850]                                      ^
[   17.275226]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.275566]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.275944] ==================================================================
[   17.668057] ==================================================================
[   17.668357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   17.668991] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.669517] 
[   17.669697] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.669759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.669776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.669799] Call Trace:
[   17.669816]  <TASK>
[   17.669834]  dump_stack_lvl+0x73/0xb0
[   17.669867]  print_report+0xd1/0x650
[   17.669889]  ? __virt_addr_valid+0x1db/0x2d0
[   17.669919]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.669944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.669969]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.669991]  kasan_report+0x141/0x180
[   17.670013]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.670038]  __asan_report_load8_noabort+0x18/0x20
[   17.670062]  kasan_atomics_helper+0x4f71/0x5450
[   17.670084]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.670111]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.670148]  ? trace_hardirqs_on+0x37/0xe0
[   17.670186]  ? kasan_atomics+0x152/0x310
[   17.670232]  kasan_atomics+0x1dc/0x310
[   17.670275]  ? __pfx_kasan_atomics+0x10/0x10
[   17.670322]  ? __pfx_kasan_atomics+0x10/0x10
[   17.670378]  kunit_try_run_case+0x1a5/0x480
[   17.670426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.670469]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.670512]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.670555]  ? __kthread_parkme+0x82/0x180
[   17.670597]  ? preempt_count_sub+0x50/0x80
[   17.670659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.670707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.670755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.670794]  kthread+0x337/0x6f0
[   17.670845]  ? trace_preempt_on+0x20/0xc0
[   17.670885]  ? __pfx_kthread+0x10/0x10
[   17.670928]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.670969]  ? calculate_sigpending+0x7b/0xa0
[   17.671017]  ? __pfx_kthread+0x10/0x10
[   17.671064]  ret_from_fork+0x116/0x1d0
[   17.671101]  ? __pfx_kthread+0x10/0x10
[   17.671142]  ret_from_fork_asm+0x1a/0x30
[   17.671205]  </TASK>
[   17.671231] 
[   17.682410] Allocated by task 283:
[   17.682758]  kasan_save_stack+0x45/0x70
[   17.683113]  kasan_save_track+0x18/0x40
[   17.683479]  kasan_save_alloc_info+0x3b/0x50
[   17.683843]  __kasan_kmalloc+0xb7/0xc0
[   17.684079]  __kmalloc_cache_noprof+0x189/0x420
[   17.684269]  kasan_atomics+0x95/0x310
[   17.684568]  kunit_try_run_case+0x1a5/0x480
[   17.684890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.685096]  kthread+0x337/0x6f0
[   17.685520]  ret_from_fork+0x116/0x1d0
[   17.685851]  ret_from_fork_asm+0x1a/0x30
[   17.686167] 
[   17.686385] The buggy address belongs to the object at ffff888102ac4100
[   17.686385]  which belongs to the cache kmalloc-64 of size 64
[   17.687112] The buggy address is located 0 bytes to the right of
[   17.687112]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.687723] 
[   17.687929] The buggy address belongs to the physical page:
[   17.688359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.688817] flags: 0x200000000000000(node=0|zone=2)
[   17.689267] page_type: f5(slab)
[   17.689500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.689768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.690389] page dumped because: kasan: bad access detected
[   17.690659] 
[   17.690763] Memory state around the buggy address:
[   17.690974]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.691681]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.692054] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.692641]                                      ^
[   17.692973]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.693378]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.693802] ==================================================================
[   17.842057] ==================================================================
[   17.842710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   17.843257] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.843752] 
[   17.843930] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.844011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.844038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.844079] Call Trace:
[   17.844107]  <TASK>
[   17.845190]  dump_stack_lvl+0x73/0xb0
[   17.845262]  print_report+0xd1/0x650
[   17.845302]  ? __virt_addr_valid+0x1db/0x2d0
[   17.845344]  ? kasan_atomics_helper+0x224c/0x5450
[   17.845384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.845427]  ? kasan_atomics_helper+0x224c/0x5450
[   17.845469]  kasan_report+0x141/0x180
[   17.845510]  ? kasan_atomics_helper+0x224c/0x5450
[   17.845562]  kasan_check_range+0x10c/0x1c0
[   17.845606]  __kasan_check_write+0x18/0x20
[   17.845660]  kasan_atomics_helper+0x224c/0x5450
[   17.845701]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.845738]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.845784]  ? trace_hardirqs_on+0x37/0xe0
[   17.845826]  ? kasan_atomics+0x152/0x310
[   17.845881]  kasan_atomics+0x1dc/0x310
[   17.845940]  ? __pfx_kasan_atomics+0x10/0x10
[   17.845989]  ? __pfx_kasan_atomics+0x10/0x10
[   17.846045]  kunit_try_run_case+0x1a5/0x480
[   17.846094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.846133]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.846173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.846215]  ? __kthread_parkme+0x82/0x180
[   17.846257]  ? preempt_count_sub+0x50/0x80
[   17.846308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.846355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.846402]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.846444]  kthread+0x337/0x6f0
[   17.846477]  ? trace_preempt_on+0x20/0xc0
[   17.846519]  ? __pfx_kthread+0x10/0x10
[   17.846556]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.846592]  ? calculate_sigpending+0x7b/0xa0
[   17.846644]  ? __pfx_kthread+0x10/0x10
[   17.846684]  ret_from_fork+0x116/0x1d0
[   17.846722]  ? __pfx_kthread+0x10/0x10
[   17.846758]  ret_from_fork_asm+0x1a/0x30
[   17.846817]  </TASK>
[   17.846839] 
[   17.856443] Allocated by task 283:
[   17.856736]  kasan_save_stack+0x45/0x70
[   17.857001]  kasan_save_track+0x18/0x40
[   17.857321]  kasan_save_alloc_info+0x3b/0x50
[   17.857507]  __kasan_kmalloc+0xb7/0xc0
[   17.857687]  __kmalloc_cache_noprof+0x189/0x420
[   17.857878]  kasan_atomics+0x95/0x310
[   17.858056]  kunit_try_run_case+0x1a5/0x480
[   17.858365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.858831]  kthread+0x337/0x6f0
[   17.859100]  ret_from_fork+0x116/0x1d0
[   17.859381]  ret_from_fork_asm+0x1a/0x30
[   17.859611] 
[   17.859784] The buggy address belongs to the object at ffff888102ac4100
[   17.859784]  which belongs to the cache kmalloc-64 of size 64
[   17.860180] The buggy address is located 0 bytes to the right of
[   17.860180]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.860843] 
[   17.860957] The buggy address belongs to the physical page:
[   17.861180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.861710] flags: 0x200000000000000(node=0|zone=2)
[   17.862014] page_type: f5(slab)
[   17.862293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.862683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.862966] page dumped because: kasan: bad access detected
[   17.863255] 
[   17.863412] Memory state around the buggy address:
[   17.863758]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.864246]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.864559] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.864805]                                      ^
[   17.864990]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.865222]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.865454] ==================================================================
[   16.904852] ==================================================================
[   16.905264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   16.905759] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.906140] 
[   16.906310] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.906413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.906441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.906475] Call Trace:
[   16.906505]  <TASK>
[   16.906536]  dump_stack_lvl+0x73/0xb0
[   16.906592]  print_report+0xd1/0x650
[   16.906645]  ? __virt_addr_valid+0x1db/0x2d0
[   16.906686]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.906722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.906769]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.906811]  kasan_report+0x141/0x180
[   16.906848]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.906931]  __asan_report_load4_noabort+0x18/0x20
[   16.906979]  kasan_atomics_helper+0x4a1c/0x5450
[   16.907028]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.907075]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.907109]  ? trace_hardirqs_on+0x37/0xe0
[   16.907154]  ? kasan_atomics+0x152/0x310
[   16.907182]  kasan_atomics+0x1dc/0x310
[   16.907206]  ? __pfx_kasan_atomics+0x10/0x10
[   16.907229]  ? __pfx_kasan_atomics+0x10/0x10
[   16.907255]  kunit_try_run_case+0x1a5/0x480
[   16.907278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.907300]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.907323]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.907345]  ? __kthread_parkme+0x82/0x180
[   16.907364]  ? preempt_count_sub+0x50/0x80
[   16.907387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.907410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.907432]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.907455]  kthread+0x337/0x6f0
[   16.907474]  ? trace_preempt_on+0x20/0xc0
[   16.907495]  ? __pfx_kthread+0x10/0x10
[   16.907516]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.907536]  ? calculate_sigpending+0x7b/0xa0
[   16.907559]  ? __pfx_kthread+0x10/0x10
[   16.907580]  ret_from_fork+0x116/0x1d0
[   16.907599]  ? __pfx_kthread+0x10/0x10
[   16.907636]  ret_from_fork_asm+0x1a/0x30
[   16.907668]  </TASK>
[   16.907681] 
[   16.919479] Allocated by task 283:
[   16.919655]  kasan_save_stack+0x45/0x70
[   16.919951]  kasan_save_track+0x18/0x40
[   16.920636]  kasan_save_alloc_info+0x3b/0x50
[   16.920850]  __kasan_kmalloc+0xb7/0xc0
[   16.920995]  __kmalloc_cache_noprof+0x189/0x420
[   16.921628]  kasan_atomics+0x95/0x310
[   16.921797]  kunit_try_run_case+0x1a5/0x480
[   16.922071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.922650]  kthread+0x337/0x6f0
[   16.922867]  ret_from_fork+0x116/0x1d0
[   16.923018]  ret_from_fork_asm+0x1a/0x30
[   16.923653] 
[   16.923771] The buggy address belongs to the object at ffff888102ac4100
[   16.923771]  which belongs to the cache kmalloc-64 of size 64
[   16.924098] The buggy address is located 0 bytes to the right of
[   16.924098]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.924994] 
[   16.925301] The buggy address belongs to the physical page:
[   16.925523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.925843] flags: 0x200000000000000(node=0|zone=2)
[   16.926086] page_type: f5(slab)
[   16.926702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.927059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.927667] page dumped because: kasan: bad access detected
[   16.927847] 
[   16.927970] Memory state around the buggy address:
[   16.928298]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.928662]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.929192] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.929457]                                      ^
[   16.929900]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.930471]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.930797] ==================================================================
[   17.563464] ==================================================================
[   17.563882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   17.564403] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.564848] 
[   17.564987] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.565073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.565129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.565175] Call Trace:
[   17.565206]  <TASK>
[   17.565240]  dump_stack_lvl+0x73/0xb0
[   17.565300]  print_report+0xd1/0x650
[   17.565347]  ? __virt_addr_valid+0x1db/0x2d0
[   17.565390]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.565424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.565501]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.565556]  kasan_report+0x141/0x180
[   17.565625]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.565681]  kasan_check_range+0x10c/0x1c0
[   17.565737]  __kasan_check_write+0x18/0x20
[   17.565785]  kasan_atomics_helper+0x1d7a/0x5450
[   17.565835]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.565889]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.565946]  ? trace_hardirqs_on+0x37/0xe0
[   17.565990]  ? kasan_atomics+0x152/0x310
[   17.566047]  kasan_atomics+0x1dc/0x310
[   17.566093]  ? __pfx_kasan_atomics+0x10/0x10
[   17.566170]  ? __pfx_kasan_atomics+0x10/0x10
[   17.566210]  kunit_try_run_case+0x1a5/0x480
[   17.566236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.566258]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.566281]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.566303]  ? __kthread_parkme+0x82/0x180
[   17.566323]  ? preempt_count_sub+0x50/0x80
[   17.566346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.566368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.566390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.566413]  kthread+0x337/0x6f0
[   17.566432]  ? trace_preempt_on+0x20/0xc0
[   17.566454]  ? __pfx_kthread+0x10/0x10
[   17.566474]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.566494]  ? calculate_sigpending+0x7b/0xa0
[   17.566517]  ? __pfx_kthread+0x10/0x10
[   17.566537]  ret_from_fork+0x116/0x1d0
[   17.566556]  ? __pfx_kthread+0x10/0x10
[   17.566576]  ret_from_fork_asm+0x1a/0x30
[   17.566605]  </TASK>
[   17.566634] 
[   17.576771] Allocated by task 283:
[   17.577078]  kasan_save_stack+0x45/0x70
[   17.577352]  kasan_save_track+0x18/0x40
[   17.577528]  kasan_save_alloc_info+0x3b/0x50
[   17.577717]  __kasan_kmalloc+0xb7/0xc0
[   17.577881]  __kmalloc_cache_noprof+0x189/0x420
[   17.578297]  kasan_atomics+0x95/0x310
[   17.578647]  kunit_try_run_case+0x1a5/0x480
[   17.578990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.579401]  kthread+0x337/0x6f0
[   17.579729]  ret_from_fork+0x116/0x1d0
[   17.580051]  ret_from_fork_asm+0x1a/0x30
[   17.580434] 
[   17.580632] The buggy address belongs to the object at ffff888102ac4100
[   17.580632]  which belongs to the cache kmalloc-64 of size 64
[   17.581044] The buggy address is located 0 bytes to the right of
[   17.581044]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.581447] 
[   17.581551] The buggy address belongs to the physical page:
[   17.582035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.582635] flags: 0x200000000000000(node=0|zone=2)
[   17.582999] page_type: f5(slab)
[   17.583339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.583911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.584498] page dumped because: kasan: bad access detected
[   17.584716] 
[   17.584821] Memory state around the buggy address:
[   17.585010]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.585496]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.586038] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.586588]                                      ^
[   17.586986]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.587530]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.588308] ==================================================================
[   17.114247] ==================================================================
[   17.115445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   17.115955] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.116336] 
[   17.116505] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.116583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.116607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.116655] Call Trace:
[   17.116684]  <TASK>
[   17.116714]  dump_stack_lvl+0x73/0xb0
[   17.116763]  print_report+0xd1/0x650
[   17.116806]  ? __virt_addr_valid+0x1db/0x2d0
[   17.116845]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.116879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.116914]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.116937]  kasan_report+0x141/0x180
[   17.116959]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.116985]  __asan_report_load8_noabort+0x18/0x20
[   17.117008]  kasan_atomics_helper+0x4eae/0x5450
[   17.117036]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.117075]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.117111]  ? trace_hardirqs_on+0x37/0xe0
[   17.117152]  ? kasan_atomics+0x152/0x310
[   17.117203]  kasan_atomics+0x1dc/0x310
[   17.117245]  ? __pfx_kasan_atomics+0x10/0x10
[   17.117290]  ? __pfx_kasan_atomics+0x10/0x10
[   17.117340]  kunit_try_run_case+0x1a5/0x480
[   17.117386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.117427]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.117471]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.117514]  ? __kthread_parkme+0x82/0x180
[   17.117555]  ? preempt_count_sub+0x50/0x80
[   17.117604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.118675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.118736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.118787]  kthread+0x337/0x6f0
[   17.118833]  ? trace_preempt_on+0x20/0xc0
[   17.118883]  ? __pfx_kthread+0x10/0x10
[   17.118929]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.118972]  ? calculate_sigpending+0x7b/0xa0
[   17.119020]  ? __pfx_kthread+0x10/0x10
[   17.119066]  ret_from_fork+0x116/0x1d0
[   17.119106]  ? __pfx_kthread+0x10/0x10
[   17.119152]  ret_from_fork_asm+0x1a/0x30
[   17.119218]  </TASK>
[   17.119244] 
[   17.130440] Allocated by task 283:
[   17.130687]  kasan_save_stack+0x45/0x70
[   17.131024]  kasan_save_track+0x18/0x40
[   17.131341]  kasan_save_alloc_info+0x3b/0x50
[   17.131604]  __kasan_kmalloc+0xb7/0xc0
[   17.132655]  __kmalloc_cache_noprof+0x189/0x420
[   17.133044]  kasan_atomics+0x95/0x310
[   17.133280]  kunit_try_run_case+0x1a5/0x480
[   17.133468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.133866]  kthread+0x337/0x6f0
[   17.134129]  ret_from_fork+0x116/0x1d0
[   17.134680]  ret_from_fork_asm+0x1a/0x30
[   17.134902] 
[   17.135013] The buggy address belongs to the object at ffff888102ac4100
[   17.135013]  which belongs to the cache kmalloc-64 of size 64
[   17.136238] The buggy address is located 0 bytes to the right of
[   17.136238]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.136805] 
[   17.136965] The buggy address belongs to the physical page:
[   17.137396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.138062] flags: 0x200000000000000(node=0|zone=2)
[   17.138439] page_type: f5(slab)
[   17.138585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.139001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.139773] page dumped because: kasan: bad access detected
[   17.139992] 
[   17.140080] Memory state around the buggy address:
[   17.140331]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.140944]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.141512] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.141814]                                      ^
[   17.142146]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.143110]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.143407] ==================================================================
[   16.250640] ==================================================================
[   16.251375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   16.252276] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.253079] 
[   16.253453] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.253516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.253577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.253632] Call Trace:
[   16.253666]  <TASK>
[   16.253931]  dump_stack_lvl+0x73/0xb0
[   16.254021]  print_report+0xd1/0x650
[   16.254062]  ? __virt_addr_valid+0x1db/0x2d0
[   16.254091]  ? kasan_atomics_helper+0x3df/0x5450
[   16.254133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.254160]  ? kasan_atomics_helper+0x3df/0x5450
[   16.254181]  kasan_report+0x141/0x180
[   16.254203]  ? kasan_atomics_helper+0x3df/0x5450
[   16.254228]  kasan_check_range+0x10c/0x1c0
[   16.254251]  __kasan_check_read+0x15/0x20
[   16.254271]  kasan_atomics_helper+0x3df/0x5450
[   16.254293]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.254314]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.254338]  ? trace_hardirqs_on+0x37/0xe0
[   16.254360]  ? kasan_atomics+0x152/0x310
[   16.254387]  kasan_atomics+0x1dc/0x310
[   16.254409]  ? __pfx_kasan_atomics+0x10/0x10
[   16.254432]  ? __pfx_kasan_atomics+0x10/0x10
[   16.254458]  kunit_try_run_case+0x1a5/0x480
[   16.254482]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.254507]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.254550]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.254583]  ? __kthread_parkme+0x82/0x180
[   16.254631]  ? preempt_count_sub+0x50/0x80
[   16.254668]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.254699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.254722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.254746]  kthread+0x337/0x6f0
[   16.254767]  ? trace_preempt_on+0x20/0xc0
[   16.254788]  ? __pfx_kthread+0x10/0x10
[   16.254809]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.254829]  ? calculate_sigpending+0x7b/0xa0
[   16.254852]  ? __pfx_kthread+0x10/0x10
[   16.254873]  ret_from_fork+0x116/0x1d0
[   16.254892]  ? __pfx_kthread+0x10/0x10
[   16.254914]  ret_from_fork_asm+0x1a/0x30
[   16.254944]  </TASK>
[   16.254958] 
[   16.266860] Allocated by task 283:
[   16.267057]  kasan_save_stack+0x45/0x70
[   16.267256]  kasan_save_track+0x18/0x40
[   16.267528]  kasan_save_alloc_info+0x3b/0x50
[   16.267906]  __kasan_kmalloc+0xb7/0xc0
[   16.268094]  __kmalloc_cache_noprof+0x189/0x420
[   16.268320]  kasan_atomics+0x95/0x310
[   16.268489]  kunit_try_run_case+0x1a5/0x480
[   16.268923]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.269335]  kthread+0x337/0x6f0
[   16.270028]  ret_from_fork+0x116/0x1d0
[   16.270375]  ret_from_fork_asm+0x1a/0x30
[   16.270827] 
[   16.270986] The buggy address belongs to the object at ffff888102ac4100
[   16.270986]  which belongs to the cache kmalloc-64 of size 64
[   16.271856] The buggy address is located 0 bytes to the right of
[   16.271856]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.272289] 
[   16.272485] The buggy address belongs to the physical page:
[   16.272983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.273933] flags: 0x200000000000000(node=0|zone=2)
[   16.274344] page_type: f5(slab)
[   16.274634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.274895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.275385] page dumped because: kasan: bad access detected
[   16.275632] 
[   16.275798] Memory state around the buggy address:
[   16.276089]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.276455]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.276971] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.277434]                                      ^
[   16.278133]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.278656]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.279093] ==================================================================
[   16.545461] ==================================================================
[   16.546375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   16.546713] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.546966] 
[   16.547128] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.547214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.547242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.547282] Call Trace:
[   16.547308]  <TASK>
[   16.547334]  dump_stack_lvl+0x73/0xb0
[   16.547391]  print_report+0xd1/0x650
[   16.547437]  ? __virt_addr_valid+0x1db/0x2d0
[   16.547481]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.547526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.547576]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.547635]  kasan_report+0x141/0x180
[   16.547684]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.547741]  kasan_check_range+0x10c/0x1c0
[   16.547791]  __kasan_check_write+0x18/0x20
[   16.547829]  kasan_atomics_helper+0x8f9/0x5450
[   16.547875]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.547920]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.547961]  ? trace_hardirqs_on+0x37/0xe0
[   16.547997]  ? kasan_atomics+0x152/0x310
[   16.548045]  kasan_atomics+0x1dc/0x310
[   16.548085]  ? __pfx_kasan_atomics+0x10/0x10
[   16.548154]  ? __pfx_kasan_atomics+0x10/0x10
[   16.548205]  kunit_try_run_case+0x1a5/0x480
[   16.548250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.548291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.548333]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.548374]  ? __kthread_parkme+0x82/0x180
[   16.548413]  ? preempt_count_sub+0x50/0x80
[   16.548462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.548509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.548552]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.548595]  kthread+0x337/0x6f0
[   16.548649]  ? trace_preempt_on+0x20/0xc0
[   16.548695]  ? __pfx_kthread+0x10/0x10
[   16.548737]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.548773]  ? calculate_sigpending+0x7b/0xa0
[   16.548899]  ? __pfx_kthread+0x10/0x10
[   16.548952]  ret_from_fork+0x116/0x1d0
[   16.548993]  ? __pfx_kthread+0x10/0x10
[   16.549308]  ret_from_fork_asm+0x1a/0x30
[   16.549423]  </TASK>
[   16.549493] 
[   16.559453] Allocated by task 283:
[   16.559657]  kasan_save_stack+0x45/0x70
[   16.559988]  kasan_save_track+0x18/0x40
[   16.560318]  kasan_save_alloc_info+0x3b/0x50
[   16.560800]  __kasan_kmalloc+0xb7/0xc0
[   16.561203]  __kmalloc_cache_noprof+0x189/0x420
[   16.561577]  kasan_atomics+0x95/0x310
[   16.561889]  kunit_try_run_case+0x1a5/0x480
[   16.562331]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.562602]  kthread+0x337/0x6f0
[   16.562954]  ret_from_fork+0x116/0x1d0
[   16.563343]  ret_from_fork_asm+0x1a/0x30
[   16.563724] 
[   16.563920] The buggy address belongs to the object at ffff888102ac4100
[   16.563920]  which belongs to the cache kmalloc-64 of size 64
[   16.564649] The buggy address is located 0 bytes to the right of
[   16.564649]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.565306] 
[   16.565480] The buggy address belongs to the physical page:
[   16.565732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.566266] flags: 0x200000000000000(node=0|zone=2)
[   16.566626] page_type: f5(slab)
[   16.566923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.567370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.567790] page dumped because: kasan: bad access detected
[   16.568139] 
[   16.568310] Memory state around the buggy address:
[   16.568564]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.569038]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.569394] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.569787]                                      ^
[   16.570213]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.570557]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.570985] ==================================================================
[   16.958951] ==================================================================
[   16.959512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   16.960505] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.960871] 
[   16.960998] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.961057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.961074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.961101] Call Trace:
[   16.961517]  <TASK>
[   16.961571]  dump_stack_lvl+0x73/0xb0
[   16.961659]  print_report+0xd1/0x650
[   16.961697]  ? __virt_addr_valid+0x1db/0x2d0
[   16.961721]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.961742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.961767]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.961788]  kasan_report+0x141/0x180
[   16.961810]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.961835]  __asan_report_load4_noabort+0x18/0x20
[   16.961858]  kasan_atomics_helper+0x4a02/0x5450
[   16.961879]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.961901]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.961936]  ? trace_hardirqs_on+0x37/0xe0
[   16.961959]  ? kasan_atomics+0x152/0x310
[   16.961986]  kasan_atomics+0x1dc/0x310
[   16.962009]  ? __pfx_kasan_atomics+0x10/0x10
[   16.962033]  ? __pfx_kasan_atomics+0x10/0x10
[   16.962059]  kunit_try_run_case+0x1a5/0x480
[   16.962082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.962109]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.962143]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.962165]  ? __kthread_parkme+0x82/0x180
[   16.962185]  ? preempt_count_sub+0x50/0x80
[   16.962208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.962231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.962254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.962276]  kthread+0x337/0x6f0
[   16.962296]  ? trace_preempt_on+0x20/0xc0
[   16.962344]  ? __pfx_kthread+0x10/0x10
[   16.962367]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.962387]  ? calculate_sigpending+0x7b/0xa0
[   16.962411]  ? __pfx_kthread+0x10/0x10
[   16.962432]  ret_from_fork+0x116/0x1d0
[   16.962452]  ? __pfx_kthread+0x10/0x10
[   16.962473]  ret_from_fork_asm+0x1a/0x30
[   16.962502]  </TASK>
[   16.962515] 
[   16.973825] Allocated by task 283:
[   16.974025]  kasan_save_stack+0x45/0x70
[   16.974744]  kasan_save_track+0x18/0x40
[   16.975009]  kasan_save_alloc_info+0x3b/0x50
[   16.975446]  __kasan_kmalloc+0xb7/0xc0
[   16.975628]  __kmalloc_cache_noprof+0x189/0x420
[   16.975932]  kasan_atomics+0x95/0x310
[   16.976199]  kunit_try_run_case+0x1a5/0x480
[   16.976412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.976689]  kthread+0x337/0x6f0
[   16.976895]  ret_from_fork+0x116/0x1d0
[   16.977474]  ret_from_fork_asm+0x1a/0x30
[   16.977762] 
[   16.977861] The buggy address belongs to the object at ffff888102ac4100
[   16.977861]  which belongs to the cache kmalloc-64 of size 64
[   16.978766] The buggy address is located 0 bytes to the right of
[   16.978766]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.979604] 
[   16.979734] The buggy address belongs to the physical page:
[   16.980042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.980338] flags: 0x200000000000000(node=0|zone=2)
[   16.980732] page_type: f5(slab)
[   16.980923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.981496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.981856] page dumped because: kasan: bad access detected
[   16.982275] 
[   16.982564] Memory state around the buggy address:
[   16.982819]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.983441]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.983812] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.984097]                                      ^
[   16.984644]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.985308]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.985636] ==================================================================
[   17.820238] ==================================================================
[   17.820512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   17.820942] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.821356] 
[   17.821532] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.821605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.821639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.821667] Call Trace:
[   17.821689]  <TASK>
[   17.821711]  dump_stack_lvl+0x73/0xb0
[   17.821756]  print_report+0xd1/0x650
[   17.821788]  ? __virt_addr_valid+0x1db/0x2d0
[   17.821819]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.821847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.821881]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.821919]  kasan_report+0x141/0x180
[   17.821953]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.821991]  __asan_report_load8_noabort+0x18/0x20
[   17.822025]  kasan_atomics_helper+0x4fa5/0x5450
[   17.822171]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.822210]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.822250]  ? trace_hardirqs_on+0x37/0xe0
[   17.822284]  ? kasan_atomics+0x152/0x310
[   17.822361]  kasan_atomics+0x1dc/0x310
[   17.822406]  ? __pfx_kasan_atomics+0x10/0x10
[   17.822448]  ? __pfx_kasan_atomics+0x10/0x10
[   17.822494]  kunit_try_run_case+0x1a5/0x480
[   17.822542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.822587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.822647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.822695]  ? __kthread_parkme+0x82/0x180
[   17.822733]  ? preempt_count_sub+0x50/0x80
[   17.822780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.822822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.822861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.822904]  kthread+0x337/0x6f0
[   17.822940]  ? trace_preempt_on+0x20/0xc0
[   17.822985]  ? __pfx_kthread+0x10/0x10
[   17.823023]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.823064]  ? calculate_sigpending+0x7b/0xa0
[   17.823104]  ? __pfx_kthread+0x10/0x10
[   17.823156]  ret_from_fork+0x116/0x1d0
[   17.823192]  ? __pfx_kthread+0x10/0x10
[   17.823233]  ret_from_fork_asm+0x1a/0x30
[   17.823289]  </TASK>
[   17.823313] 
[   17.831632] Allocated by task 283:
[   17.832012]  kasan_save_stack+0x45/0x70
[   17.832414]  kasan_save_track+0x18/0x40
[   17.832730]  kasan_save_alloc_info+0x3b/0x50
[   17.832924]  __kasan_kmalloc+0xb7/0xc0
[   17.833090]  __kmalloc_cache_noprof+0x189/0x420
[   17.833409]  kasan_atomics+0x95/0x310
[   17.833661]  kunit_try_run_case+0x1a5/0x480
[   17.833976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.834306]  kthread+0x337/0x6f0
[   17.834555]  ret_from_fork+0x116/0x1d0
[   17.834730]  ret_from_fork_asm+0x1a/0x30
[   17.834963] 
[   17.835077] The buggy address belongs to the object at ffff888102ac4100
[   17.835077]  which belongs to the cache kmalloc-64 of size 64
[   17.835746] The buggy address is located 0 bytes to the right of
[   17.835746]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.836374] 
[   17.836506] The buggy address belongs to the physical page:
[   17.836825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.837091] flags: 0x200000000000000(node=0|zone=2)
[   17.837451] page_type: f5(slab)
[   17.837705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.838168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.838472] page dumped because: kasan: bad access detected
[   17.838730] 
[   17.838837] Memory state around the buggy address:
[   17.839023]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.839598]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.840064] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.840489]                                      ^
[   17.840757]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.841075]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.841354] ==================================================================
[   17.588968] ==================================================================
[   17.589504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   17.589962] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.590206] 
[   17.590332] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.590411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.590439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.590480] Call Trace:
[   17.590510]  <TASK>
[   17.590538]  dump_stack_lvl+0x73/0xb0
[   17.590590]  print_report+0xd1/0x650
[   17.590649]  ? __virt_addr_valid+0x1db/0x2d0
[   17.590691]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.590733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.590783]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.590825]  kasan_report+0x141/0x180
[   17.590860]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.590901]  kasan_check_range+0x10c/0x1c0
[   17.590945]  __kasan_check_write+0x18/0x20
[   17.590979]  kasan_atomics_helper+0x1e12/0x5450
[   17.591022]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.591068]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.591138]  ? trace_hardirqs_on+0x37/0xe0
[   17.591178]  ? kasan_atomics+0x152/0x310
[   17.591278]  kasan_atomics+0x1dc/0x310
[   17.591346]  ? __pfx_kasan_atomics+0x10/0x10
[   17.591400]  ? __pfx_kasan_atomics+0x10/0x10
[   17.591451]  kunit_try_run_case+0x1a5/0x480
[   17.591514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.591560]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.591605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.591669]  ? __kthread_parkme+0x82/0x180
[   17.591713]  ? preempt_count_sub+0x50/0x80
[   17.591761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.591807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.591854]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.591901]  kthread+0x337/0x6f0
[   17.591941]  ? trace_preempt_on+0x20/0xc0
[   17.591967]  ? __pfx_kthread+0x10/0x10
[   17.591987]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.592008]  ? calculate_sigpending+0x7b/0xa0
[   17.592032]  ? __pfx_kthread+0x10/0x10
[   17.592052]  ret_from_fork+0x116/0x1d0
[   17.592071]  ? __pfx_kthread+0x10/0x10
[   17.592090]  ret_from_fork_asm+0x1a/0x30
[   17.592138]  </TASK>
[   17.592151] 
[   17.601744] Allocated by task 283:
[   17.601985]  kasan_save_stack+0x45/0x70
[   17.602203]  kasan_save_track+0x18/0x40
[   17.602449]  kasan_save_alloc_info+0x3b/0x50
[   17.602991]  __kasan_kmalloc+0xb7/0xc0
[   17.603300]  __kmalloc_cache_noprof+0x189/0x420
[   17.603769]  kasan_atomics+0x95/0x310
[   17.604141]  kunit_try_run_case+0x1a5/0x480
[   17.604540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.604953]  kthread+0x337/0x6f0
[   17.605279]  ret_from_fork+0x116/0x1d0
[   17.605502]  ret_from_fork_asm+0x1a/0x30
[   17.605864] 
[   17.606006] The buggy address belongs to the object at ffff888102ac4100
[   17.606006]  which belongs to the cache kmalloc-64 of size 64
[   17.606546] The buggy address is located 0 bytes to the right of
[   17.606546]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.606973] 
[   17.607098] The buggy address belongs to the physical page:
[   17.607317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.607900] flags: 0x200000000000000(node=0|zone=2)
[   17.608310] page_type: f5(slab)
[   17.608572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.609082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.609639] page dumped because: kasan: bad access detected
[   17.610070] 
[   17.610282] Memory state around the buggy address:
[   17.610587]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.611052]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.611320] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.611550]                                      ^
[   17.611746]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.612195]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.612901] ==================================================================
[   17.720336] ==================================================================
[   17.721718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   17.722037] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.722573] 
[   17.722781] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.722908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.722938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.722978] Call Trace:
[   17.723010]  <TASK>
[   17.723042]  dump_stack_lvl+0x73/0xb0
[   17.723144]  print_report+0xd1/0x650
[   17.723202]  ? __virt_addr_valid+0x1db/0x2d0
[   17.723259]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.723298]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.723344]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.723412]  kasan_report+0x141/0x180
[   17.723456]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.723524]  __asan_report_load8_noabort+0x18/0x20
[   17.723589]  kasan_atomics_helper+0x4f98/0x5450
[   17.723655]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.723701]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.723734]  ? trace_hardirqs_on+0x37/0xe0
[   17.723757]  ? kasan_atomics+0x152/0x310
[   17.723785]  kasan_atomics+0x1dc/0x310
[   17.723808]  ? __pfx_kasan_atomics+0x10/0x10
[   17.723831]  ? __pfx_kasan_atomics+0x10/0x10
[   17.723863]  kunit_try_run_case+0x1a5/0x480
[   17.723899]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.723922]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.723945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.723968]  ? __kthread_parkme+0x82/0x180
[   17.723988]  ? preempt_count_sub+0x50/0x80
[   17.724012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.724035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.724058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.724080]  kthread+0x337/0x6f0
[   17.724111]  ? trace_preempt_on+0x20/0xc0
[   17.724140]  ? __pfx_kthread+0x10/0x10
[   17.724160]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.724181]  ? calculate_sigpending+0x7b/0xa0
[   17.724204]  ? __pfx_kthread+0x10/0x10
[   17.724225]  ret_from_fork+0x116/0x1d0
[   17.724243]  ? __pfx_kthread+0x10/0x10
[   17.724263]  ret_from_fork_asm+0x1a/0x30
[   17.724293]  </TASK>
[   17.724306] 
[   17.733213] Allocated by task 283:
[   17.733391]  kasan_save_stack+0x45/0x70
[   17.733771]  kasan_save_track+0x18/0x40
[   17.734076]  kasan_save_alloc_info+0x3b/0x50
[   17.734448]  __kasan_kmalloc+0xb7/0xc0
[   17.734757]  __kmalloc_cache_noprof+0x189/0x420
[   17.735146]  kasan_atomics+0x95/0x310
[   17.735449]  kunit_try_run_case+0x1a5/0x480
[   17.735799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.736066]  kthread+0x337/0x6f0
[   17.736329]  ret_from_fork+0x116/0x1d0
[   17.736497]  ret_from_fork_asm+0x1a/0x30
[   17.736769] 
[   17.736938] The buggy address belongs to the object at ffff888102ac4100
[   17.736938]  which belongs to the cache kmalloc-64 of size 64
[   17.737584] The buggy address is located 0 bytes to the right of
[   17.737584]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.738214] 
[   17.738329] The buggy address belongs to the physical page:
[   17.738532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.739049] flags: 0x200000000000000(node=0|zone=2)
[   17.739442] page_type: f5(slab)
[   17.739742] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.740281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.740686] page dumped because: kasan: bad access detected
[   17.740891] 
[   17.740994] Memory state around the buggy address:
[   17.741306]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.741801]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.742223] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.742651]                                      ^
[   17.742846]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.743300]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.743828] ==================================================================
[   17.613954] ==================================================================
[   17.614341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   17.615340] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.616005] 
[   17.616227] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.616431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.616458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.616502] Call Trace:
[   17.616532]  <TASK>
[   17.616564]  dump_stack_lvl+0x73/0xb0
[   17.616638]  print_report+0xd1/0x650
[   17.616678]  ? __virt_addr_valid+0x1db/0x2d0
[   17.616719]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.617200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.617334]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.617383]  kasan_report+0x141/0x180
[   17.617430]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.617482]  kasan_check_range+0x10c/0x1c0
[   17.617548]  __kasan_check_write+0x18/0x20
[   17.617604]  kasan_atomics_helper+0x1eaa/0x5450
[   17.617660]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.617700]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.617745]  ? trace_hardirqs_on+0x37/0xe0
[   17.617814]  ? kasan_atomics+0x152/0x310
[   17.617882]  kasan_atomics+0x1dc/0x310
[   17.617933]  ? __pfx_kasan_atomics+0x10/0x10
[   17.618001]  ? __pfx_kasan_atomics+0x10/0x10
[   17.618065]  kunit_try_run_case+0x1a5/0x480
[   17.618111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.618149]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.618192]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.618259]  ? __kthread_parkme+0x82/0x180
[   17.618311]  ? preempt_count_sub+0x50/0x80
[   17.618360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.618406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.618474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.618533]  kthread+0x337/0x6f0
[   17.618567]  ? trace_preempt_on+0x20/0xc0
[   17.618598]  ? __pfx_kthread+0x10/0x10
[   17.618641]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.618670]  ? calculate_sigpending+0x7b/0xa0
[   17.618699]  ? __pfx_kthread+0x10/0x10
[   17.618727]  ret_from_fork+0x116/0x1d0
[   17.618750]  ? __pfx_kthread+0x10/0x10
[   17.618775]  ret_from_fork_asm+0x1a/0x30
[   17.618804]  </TASK>
[   17.618818] 
[   17.628917] Allocated by task 283:
[   17.629173]  kasan_save_stack+0x45/0x70
[   17.629520]  kasan_save_track+0x18/0x40
[   17.629805]  kasan_save_alloc_info+0x3b/0x50
[   17.630082]  __kasan_kmalloc+0xb7/0xc0
[   17.630461]  __kmalloc_cache_noprof+0x189/0x420
[   17.630850]  kasan_atomics+0x95/0x310
[   17.631104]  kunit_try_run_case+0x1a5/0x480
[   17.631596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.631878]  kthread+0x337/0x6f0
[   17.632156]  ret_from_fork+0x116/0x1d0
[   17.632334]  ret_from_fork_asm+0x1a/0x30
[   17.632680] 
[   17.632845] The buggy address belongs to the object at ffff888102ac4100
[   17.632845]  which belongs to the cache kmalloc-64 of size 64
[   17.633562] The buggy address is located 0 bytes to the right of
[   17.633562]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.634313] 
[   17.634518] The buggy address belongs to the physical page:
[   17.634916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.635284] flags: 0x200000000000000(node=0|zone=2)
[   17.635485] page_type: f5(slab)
[   17.635683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.636202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.636911] page dumped because: kasan: bad access detected
[   17.637368] 
[   17.637535] Memory state around the buggy address:
[   17.637926]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.638168]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.638535] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.639176]                                      ^
[   17.639586]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.639948]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.640179] ==================================================================
[   16.828899] ==================================================================
[   16.829354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   16.829820] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.830295] 
[   16.830474] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.830573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.830602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.830654] Call Trace:
[   16.830685]  <TASK>
[   16.830715]  dump_stack_lvl+0x73/0xb0
[   16.830772]  print_report+0xd1/0x650
[   16.830832]  ? __virt_addr_valid+0x1db/0x2d0
[   16.830876]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.830916]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.830956]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.830984]  kasan_report+0x141/0x180
[   16.831023]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.831065]  kasan_check_range+0x10c/0x1c0
[   16.831136]  __kasan_check_write+0x18/0x20
[   16.831196]  kasan_atomics_helper+0xfa9/0x5450
[   16.831239]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.831282]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.831328]  ? trace_hardirqs_on+0x37/0xe0
[   16.831382]  ? kasan_atomics+0x152/0x310
[   16.831444]  kasan_atomics+0x1dc/0x310
[   16.831499]  ? __pfx_kasan_atomics+0x10/0x10
[   16.831545]  ? __pfx_kasan_atomics+0x10/0x10
[   16.831598]  kunit_try_run_case+0x1a5/0x480
[   16.831672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.831725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.831766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.831809]  ? __kthread_parkme+0x82/0x180
[   16.831846]  ? preempt_count_sub+0x50/0x80
[   16.831891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.831937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.831984]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.832032]  kthread+0x337/0x6f0
[   16.832072]  ? trace_preempt_on+0x20/0xc0
[   16.832153]  ? __pfx_kthread+0x10/0x10
[   16.832198]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.832237]  ? calculate_sigpending+0x7b/0xa0
[   16.832262]  ? __pfx_kthread+0x10/0x10
[   16.832284]  ret_from_fork+0x116/0x1d0
[   16.832303]  ? __pfx_kthread+0x10/0x10
[   16.832353]  ret_from_fork_asm+0x1a/0x30
[   16.832386]  </TASK>
[   16.832399] 
[   16.841447] Allocated by task 283:
[   16.841677]  kasan_save_stack+0x45/0x70
[   16.841993]  kasan_save_track+0x18/0x40
[   16.842369]  kasan_save_alloc_info+0x3b/0x50
[   16.842731]  __kasan_kmalloc+0xb7/0xc0
[   16.843030]  __kmalloc_cache_noprof+0x189/0x420
[   16.843403]  kasan_atomics+0x95/0x310
[   16.843581]  kunit_try_run_case+0x1a5/0x480
[   16.843914]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.844242]  kthread+0x337/0x6f0
[   16.844425]  ret_from_fork+0x116/0x1d0
[   16.844633]  ret_from_fork_asm+0x1a/0x30
[   16.844843] 
[   16.844961] The buggy address belongs to the object at ffff888102ac4100
[   16.844961]  which belongs to the cache kmalloc-64 of size 64
[   16.845410] The buggy address is located 0 bytes to the right of
[   16.845410]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.846231] 
[   16.846403] The buggy address belongs to the physical page:
[   16.846799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.847345] flags: 0x200000000000000(node=0|zone=2)
[   16.847712] page_type: f5(slab)
[   16.847971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.848507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.849015] page dumped because: kasan: bad access detected
[   16.849241] 
[   16.849409] Memory state around the buggy address:
[   16.849770]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.850218]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.850508] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.850765]                                      ^
[   16.850949]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.851394]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.851856] ==================================================================
[   17.172017] ==================================================================
[   17.172377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   17.172652] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.173208] 
[   17.173417] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.173497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.173521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.173557] Call Trace:
[   17.173584]  <TASK>
[   17.173651]  dump_stack_lvl+0x73/0xb0
[   17.173716]  print_report+0xd1/0x650
[   17.173753]  ? __virt_addr_valid+0x1db/0x2d0
[   17.173792]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.173831]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.173879]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.173931]  kasan_report+0x141/0x180
[   17.173976]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.174023]  __asan_report_store8_noabort+0x1b/0x30
[   17.174068]  kasan_atomics_helper+0x50d4/0x5450
[   17.174159]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.174205]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.174252]  ? trace_hardirqs_on+0x37/0xe0
[   17.174294]  ? kasan_atomics+0x152/0x310
[   17.174360]  kasan_atomics+0x1dc/0x310
[   17.174405]  ? __pfx_kasan_atomics+0x10/0x10
[   17.174450]  ? __pfx_kasan_atomics+0x10/0x10
[   17.174498]  kunit_try_run_case+0x1a5/0x480
[   17.174531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.174553]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.174576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.174599]  ? __kthread_parkme+0x82/0x180
[   17.174635]  ? preempt_count_sub+0x50/0x80
[   17.174663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.174687]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.174709]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.174732]  kthread+0x337/0x6f0
[   17.174752]  ? trace_preempt_on+0x20/0xc0
[   17.174774]  ? __pfx_kthread+0x10/0x10
[   17.174795]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.174816]  ? calculate_sigpending+0x7b/0xa0
[   17.174838]  ? __pfx_kthread+0x10/0x10
[   17.174859]  ret_from_fork+0x116/0x1d0
[   17.174877]  ? __pfx_kthread+0x10/0x10
[   17.174898]  ret_from_fork_asm+0x1a/0x30
[   17.174927]  </TASK>
[   17.174940] 
[   17.184119] Allocated by task 283:
[   17.184431]  kasan_save_stack+0x45/0x70
[   17.184704]  kasan_save_track+0x18/0x40
[   17.184901]  kasan_save_alloc_info+0x3b/0x50
[   17.185106]  __kasan_kmalloc+0xb7/0xc0
[   17.185292]  __kmalloc_cache_noprof+0x189/0x420
[   17.185511]  kasan_atomics+0x95/0x310
[   17.185793]  kunit_try_run_case+0x1a5/0x480
[   17.186124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.186594]  kthread+0x337/0x6f0
[   17.186873]  ret_from_fork+0x116/0x1d0
[   17.187166]  ret_from_fork_asm+0x1a/0x30
[   17.187407] 
[   17.187518] The buggy address belongs to the object at ffff888102ac4100
[   17.187518]  which belongs to the cache kmalloc-64 of size 64
[   17.188206] The buggy address is located 0 bytes to the right of
[   17.188206]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.188839] 
[   17.189022] The buggy address belongs to the physical page:
[   17.189502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.189898] flags: 0x200000000000000(node=0|zone=2)
[   17.190162] page_type: f5(slab)
[   17.190428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.190730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.191212] page dumped because: kasan: bad access detected
[   17.191440] 
[   17.191594] Memory state around the buggy address:
[   17.191892]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.192496]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.192758] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.193252]                                      ^
[   17.193510]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.193883]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.194351] ==================================================================
[   17.641263] ==================================================================
[   17.641799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   17.642146] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.642385] 
[   17.642514] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.642600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.642863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.642930] Call Trace:
[   17.642965]  <TASK>
[   17.642997]  dump_stack_lvl+0x73/0xb0
[   17.643063]  print_report+0xd1/0x650
[   17.643110]  ? __virt_addr_valid+0x1db/0x2d0
[   17.643165]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.643209]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.643263]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.643310]  kasan_report+0x141/0x180
[   17.643355]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.643411]  kasan_check_range+0x10c/0x1c0
[   17.643460]  __kasan_check_write+0x18/0x20
[   17.643502]  kasan_atomics_helper+0x1f43/0x5450
[   17.643550]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.643598]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.643664]  ? trace_hardirqs_on+0x37/0xe0
[   17.643711]  ? kasan_atomics+0x152/0x310
[   17.643767]  kasan_atomics+0x1dc/0x310
[   17.643817]  ? __pfx_kasan_atomics+0x10/0x10
[   17.643865]  ? __pfx_kasan_atomics+0x10/0x10
[   17.643920]  kunit_try_run_case+0x1a5/0x480
[   17.643966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.644012]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.644058]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.644104]  ? __kthread_parkme+0x82/0x180
[   17.644147]  ? preempt_count_sub+0x50/0x80
[   17.644190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.644231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.644305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.644346]  kthread+0x337/0x6f0
[   17.644403]  ? trace_preempt_on+0x20/0xc0
[   17.644447]  ? __pfx_kthread+0x10/0x10
[   17.644485]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.644519]  ? calculate_sigpending+0x7b/0xa0
[   17.644557]  ? __pfx_kthread+0x10/0x10
[   17.644598]  ret_from_fork+0x116/0x1d0
[   17.644674]  ? __pfx_kthread+0x10/0x10
[   17.644716]  ret_from_fork_asm+0x1a/0x30
[   17.644792]  </TASK>
[   17.644819] 
[   17.655537] Allocated by task 283:
[   17.655847]  kasan_save_stack+0x45/0x70
[   17.656045]  kasan_save_track+0x18/0x40
[   17.656209]  kasan_save_alloc_info+0x3b/0x50
[   17.656392]  __kasan_kmalloc+0xb7/0xc0
[   17.656711]  __kmalloc_cache_noprof+0x189/0x420
[   17.657071]  kasan_atomics+0x95/0x310
[   17.657417]  kunit_try_run_case+0x1a5/0x480
[   17.657742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.658145]  kthread+0x337/0x6f0
[   17.658345]  ret_from_fork+0x116/0x1d0
[   17.658515]  ret_from_fork_asm+0x1a/0x30
[   17.658710] 
[   17.658894] The buggy address belongs to the object at ffff888102ac4100
[   17.658894]  which belongs to the cache kmalloc-64 of size 64
[   17.659893] The buggy address is located 0 bytes to the right of
[   17.659893]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.660895] 
[   17.661071] The buggy address belongs to the physical page:
[   17.661520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.662033] flags: 0x200000000000000(node=0|zone=2)
[   17.662237] page_type: f5(slab)
[   17.662389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.662654] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.663189] page dumped because: kasan: bad access detected
[   17.663627] 
[   17.663840] Memory state around the buggy address:
[   17.664232]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.664836]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.665079] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.665313]                                      ^
[   17.665530]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.666118]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.666606] ==================================================================
[   17.346391] ==================================================================
[   17.347008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   17.347388] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.347739] 
[   17.347902] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.347986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.348014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.348054] Call Trace:
[   17.348085]  <TASK>
[   17.348113]  dump_stack_lvl+0x73/0xb0
[   17.348164]  print_report+0xd1/0x650
[   17.348206]  ? __virt_addr_valid+0x1db/0x2d0
[   17.348246]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.348279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.348325]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.348364]  kasan_report+0x141/0x180
[   17.348405]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.348459]  kasan_check_range+0x10c/0x1c0
[   17.348508]  __kasan_check_write+0x18/0x20
[   17.348547]  kasan_atomics_helper+0x18b1/0x5450
[   17.348595]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.348653]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.348704]  ? trace_hardirqs_on+0x37/0xe0
[   17.348751]  ? kasan_atomics+0x152/0x310
[   17.348805]  kasan_atomics+0x1dc/0x310
[   17.348850]  ? __pfx_kasan_atomics+0x10/0x10
[   17.348897]  ? __pfx_kasan_atomics+0x10/0x10
[   17.348953]  kunit_try_run_case+0x1a5/0x480
[   17.349000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.349045]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.349094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.349138]  ? __kthread_parkme+0x82/0x180
[   17.349180]  ? preempt_count_sub+0x50/0x80
[   17.349230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.349278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.349324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.349371]  kthread+0x337/0x6f0
[   17.349413]  ? trace_preempt_on+0x20/0xc0
[   17.349461]  ? __pfx_kthread+0x10/0x10
[   17.349504]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.349548]  ? calculate_sigpending+0x7b/0xa0
[   17.349594]  ? __pfx_kthread+0x10/0x10
[   17.349648]  ret_from_fork+0x116/0x1d0
[   17.349683]  ? __pfx_kthread+0x10/0x10
[   17.349728]  ret_from_fork_asm+0x1a/0x30
[   17.349786]  </TASK>
[   17.349812] 
[   17.362429] Allocated by task 283:
[   17.362753]  kasan_save_stack+0x45/0x70
[   17.363068]  kasan_save_track+0x18/0x40
[   17.363418]  kasan_save_alloc_info+0x3b/0x50
[   17.363695]  __kasan_kmalloc+0xb7/0xc0
[   17.363870]  __kmalloc_cache_noprof+0x189/0x420
[   17.364058]  kasan_atomics+0x95/0x310
[   17.364288]  kunit_try_run_case+0x1a5/0x480
[   17.364666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.365057]  kthread+0x337/0x6f0
[   17.365388]  ret_from_fork+0x116/0x1d0
[   17.365696]  ret_from_fork_asm+0x1a/0x30
[   17.365998] 
[   17.366234] The buggy address belongs to the object at ffff888102ac4100
[   17.366234]  which belongs to the cache kmalloc-64 of size 64
[   17.366778] The buggy address is located 0 bytes to the right of
[   17.366778]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.367192] 
[   17.367304] The buggy address belongs to the physical page:
[   17.367520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.368086] flags: 0x200000000000000(node=0|zone=2)
[   17.368506] page_type: f5(slab)
[   17.368806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.369380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.369971] page dumped because: kasan: bad access detected
[   17.370388] 
[   17.370565] Memory state around the buggy address:
[   17.370783]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.371028]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.371439] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.371982]                                      ^
[   17.372480]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.372980]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.373417] ==================================================================
[   17.479690] ==================================================================
[   17.480306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   17.480652] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.481153] 
[   17.481308] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.481376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.481399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.481440] Call Trace:
[   17.481470]  <TASK>
[   17.481503]  dump_stack_lvl+0x73/0xb0
[   17.481556]  print_report+0xd1/0x650
[   17.481599]  ? __virt_addr_valid+0x1db/0x2d0
[   17.481711]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.481750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.481791]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.481831]  kasan_report+0x141/0x180
[   17.481875]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.481936]  kasan_check_range+0x10c/0x1c0
[   17.481987]  __kasan_check_write+0x18/0x20
[   17.482029]  kasan_atomics_helper+0x1c18/0x5450
[   17.482072]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.482145]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.482197]  ? trace_hardirqs_on+0x37/0xe0
[   17.482241]  ? kasan_atomics+0x152/0x310
[   17.482298]  kasan_atomics+0x1dc/0x310
[   17.482339]  ? __pfx_kasan_atomics+0x10/0x10
[   17.482383]  ? __pfx_kasan_atomics+0x10/0x10
[   17.482438]  kunit_try_run_case+0x1a5/0x480
[   17.482484]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.482522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.482547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.482569]  ? __kthread_parkme+0x82/0x180
[   17.482589]  ? preempt_count_sub+0x50/0x80
[   17.482611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.482652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.482676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.482697]  kthread+0x337/0x6f0
[   17.482716]  ? trace_preempt_on+0x20/0xc0
[   17.482738]  ? __pfx_kthread+0x10/0x10
[   17.482759]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.482779]  ? calculate_sigpending+0x7b/0xa0
[   17.482803]  ? __pfx_kthread+0x10/0x10
[   17.482825]  ret_from_fork+0x116/0x1d0
[   17.482844]  ? __pfx_kthread+0x10/0x10
[   17.482864]  ret_from_fork_asm+0x1a/0x30
[   17.482895]  </TASK>
[   17.482907] 
[   17.491431] Allocated by task 283:
[   17.491758]  kasan_save_stack+0x45/0x70
[   17.491977]  kasan_save_track+0x18/0x40
[   17.492290]  kasan_save_alloc_info+0x3b/0x50
[   17.492528]  __kasan_kmalloc+0xb7/0xc0
[   17.492790]  __kmalloc_cache_noprof+0x189/0x420
[   17.493137]  kasan_atomics+0x95/0x310
[   17.493370]  kunit_try_run_case+0x1a5/0x480
[   17.493701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.493929]  kthread+0x337/0x6f0
[   17.494181]  ret_from_fork+0x116/0x1d0
[   17.494585]  ret_from_fork_asm+0x1a/0x30
[   17.494807] 
[   17.494907] The buggy address belongs to the object at ffff888102ac4100
[   17.494907]  which belongs to the cache kmalloc-64 of size 64
[   17.495256] The buggy address is located 0 bytes to the right of
[   17.495256]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.495633] 
[   17.495741] The buggy address belongs to the physical page:
[   17.495936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.496594] flags: 0x200000000000000(node=0|zone=2)
[   17.496985] page_type: f5(slab)
[   17.497248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.497962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.498572] page dumped because: kasan: bad access detected
[   17.498842] 
[   17.498947] Memory state around the buggy address:
[   17.499130]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.499679]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.500501] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.501091]                                      ^
[   17.501737]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.502217]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.502604] ==================================================================
[   16.153508] ==================================================================
[   16.154054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   16.154518] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.154925] 
[   16.155490] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.155832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.155862] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.155892] Call Trace:
[   16.155910]  <TASK>
[   16.155929]  dump_stack_lvl+0x73/0xb0
[   16.155962]  print_report+0xd1/0x650
[   16.155983]  ? __virt_addr_valid+0x1db/0x2d0
[   16.156004]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.156024]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.156048]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.156067]  kasan_report+0x141/0x180
[   16.156087]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.156119]  __asan_report_store4_noabort+0x1b/0x30
[   16.156153]  kasan_atomics_helper+0x4ba2/0x5450
[   16.156185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.156214]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.156248]  ? trace_hardirqs_on+0x37/0xe0
[   16.156280]  ? kasan_atomics+0x152/0x310
[   16.156313]  kasan_atomics+0x1dc/0x310
[   16.156334]  ? __pfx_kasan_atomics+0x10/0x10
[   16.156356]  ? __pfx_kasan_atomics+0x10/0x10
[   16.156381]  kunit_try_run_case+0x1a5/0x480
[   16.156403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.156424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.156452]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.156484]  ? __kthread_parkme+0x82/0x180
[   16.156515]  ? preempt_count_sub+0x50/0x80
[   16.156556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.156594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.156678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.156729]  kthread+0x337/0x6f0
[   16.156763]  ? trace_preempt_on+0x20/0xc0
[   16.156797]  ? __pfx_kthread+0x10/0x10
[   16.156828]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.156857]  ? calculate_sigpending+0x7b/0xa0
[   16.156891]  ? __pfx_kthread+0x10/0x10
[   16.156923]  ret_from_fork+0x116/0x1d0
[   16.156951]  ? __pfx_kthread+0x10/0x10
[   16.156981]  ret_from_fork_asm+0x1a/0x30
[   16.157031]  </TASK>
[   16.157051] 
[   16.168679] Allocated by task 283:
[   16.168972]  kasan_save_stack+0x45/0x70
[   16.169323]  kasan_save_track+0x18/0x40
[   16.169779]  kasan_save_alloc_info+0x3b/0x50
[   16.170058]  __kasan_kmalloc+0xb7/0xc0
[   16.170383]  __kmalloc_cache_noprof+0x189/0x420
[   16.170774]  kasan_atomics+0x95/0x310
[   16.171133]  kunit_try_run_case+0x1a5/0x480
[   16.171399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.172078]  kthread+0x337/0x6f0
[   16.172365]  ret_from_fork+0x116/0x1d0
[   16.172648]  ret_from_fork_asm+0x1a/0x30
[   16.172957] 
[   16.173085] The buggy address belongs to the object at ffff888102ac4100
[   16.173085]  which belongs to the cache kmalloc-64 of size 64
[   16.174032] The buggy address is located 0 bytes to the right of
[   16.174032]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.174818] 
[   16.175012] The buggy address belongs to the physical page:
[   16.175426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.176261] flags: 0x200000000000000(node=0|zone=2)
[   16.176559] page_type: f5(slab)
[   16.177024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.177777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.178059] page dumped because: kasan: bad access detected
[   16.178488] 
[   16.178773] Memory state around the buggy address:
[   16.179043]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.179482]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.179938] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.180394]                                      ^
[   16.180632]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.180946]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.181217] ==================================================================
[   16.121054] ==================================================================
[   16.121982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   16.122502] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.123061] 
[   16.123348] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.123430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.123454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.123520] Call Trace:
[   16.123560]  <TASK>
[   16.123589]  dump_stack_lvl+0x73/0xb0
[   16.123807]  print_report+0xd1/0x650
[   16.124129]  ? __virt_addr_valid+0x1db/0x2d0
[   16.124171]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.124241]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.124283]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.124334]  kasan_report+0x141/0x180
[   16.124379]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.124426]  __asan_report_load4_noabort+0x18/0x20
[   16.124493]  kasan_atomics_helper+0x4bbc/0x5450
[   16.124535]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.124591]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.124646]  ? trace_hardirqs_on+0x37/0xe0
[   16.124682]  ? kasan_atomics+0x152/0x310
[   16.124721]  kasan_atomics+0x1dc/0x310
[   16.124754]  ? __pfx_kasan_atomics+0x10/0x10
[   16.124789]  ? __pfx_kasan_atomics+0x10/0x10
[   16.124816]  kunit_try_run_case+0x1a5/0x480
[   16.124839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.124859]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.124882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.124903]  ? __kthread_parkme+0x82/0x180
[   16.124922]  ? preempt_count_sub+0x50/0x80
[   16.124944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.124966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.124987]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.125009]  kthread+0x337/0x6f0
[   16.125028]  ? trace_preempt_on+0x20/0xc0
[   16.125048]  ? __pfx_kthread+0x10/0x10
[   16.125067]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.125086]  ? calculate_sigpending+0x7b/0xa0
[   16.125113]  ? __pfx_kthread+0x10/0x10
[   16.125139]  ret_from_fork+0x116/0x1d0
[   16.125157]  ? __pfx_kthread+0x10/0x10
[   16.125175]  ret_from_fork_asm+0x1a/0x30
[   16.125204]  </TASK>
[   16.125215] 
[   16.137738] Allocated by task 283:
[   16.138257]  kasan_save_stack+0x45/0x70
[   16.138986]  kasan_save_track+0x18/0x40
[   16.139307]  kasan_save_alloc_info+0x3b/0x50
[   16.139692]  __kasan_kmalloc+0xb7/0xc0
[   16.140079]  __kmalloc_cache_noprof+0x189/0x420
[   16.140482]  kasan_atomics+0x95/0x310
[   16.140992]  kunit_try_run_case+0x1a5/0x480
[   16.141329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.141758]  kthread+0x337/0x6f0
[   16.142178]  ret_from_fork+0x116/0x1d0
[   16.142418]  ret_from_fork_asm+0x1a/0x30
[   16.142690] 
[   16.143342] The buggy address belongs to the object at ffff888102ac4100
[   16.143342]  which belongs to the cache kmalloc-64 of size 64
[   16.144295] The buggy address is located 0 bytes to the right of
[   16.144295]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.145113] 
[   16.145310] The buggy address belongs to the physical page:
[   16.145802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.146085] flags: 0x200000000000000(node=0|zone=2)
[   16.146359] page_type: f5(slab)
[   16.147004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.147525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.147785] page dumped because: kasan: bad access detected
[   16.148408] 
[   16.148743] Memory state around the buggy address:
[   16.149792]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.150101]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.150655] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.151351]                                      ^
[   16.151526]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.152129]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.152786] ==================================================================
[   17.016979] ==================================================================
[   17.017446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   17.017905] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.018472] 
[   17.018744] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.018853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.018881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.018921] Call Trace:
[   17.018949]  <TASK>
[   17.018980]  dump_stack_lvl+0x73/0xb0
[   17.019041]  print_report+0xd1/0x650
[   17.019087]  ? __virt_addr_valid+0x1db/0x2d0
[   17.019144]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.019780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.019884]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.019928]  kasan_report+0x141/0x180
[   17.019974]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.020022]  __asan_report_load4_noabort+0x18/0x20
[   17.020068]  kasan_atomics_helper+0x49e8/0x5450
[   17.020146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.020189]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.020225]  ? trace_hardirqs_on+0x37/0xe0
[   17.020256]  ? kasan_atomics+0x152/0x310
[   17.020290]  kasan_atomics+0x1dc/0x310
[   17.020319]  ? __pfx_kasan_atomics+0x10/0x10
[   17.020348]  ? __pfx_kasan_atomics+0x10/0x10
[   17.020383]  kunit_try_run_case+0x1a5/0x480
[   17.020412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.020439]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.020468]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.020496]  ? __kthread_parkme+0x82/0x180
[   17.020522]  ? preempt_count_sub+0x50/0x80
[   17.020553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.020581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.020610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.020655]  kthread+0x337/0x6f0
[   17.020680]  ? trace_preempt_on+0x20/0xc0
[   17.020701]  ? __pfx_kthread+0x10/0x10
[   17.020721]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.020741]  ? calculate_sigpending+0x7b/0xa0
[   17.020764]  ? __pfx_kthread+0x10/0x10
[   17.020784]  ret_from_fork+0x116/0x1d0
[   17.020802]  ? __pfx_kthread+0x10/0x10
[   17.020822]  ret_from_fork_asm+0x1a/0x30
[   17.020853]  </TASK>
[   17.020866] 
[   17.029847] Allocated by task 283:
[   17.030032]  kasan_save_stack+0x45/0x70
[   17.030247]  kasan_save_track+0x18/0x40
[   17.030569]  kasan_save_alloc_info+0x3b/0x50
[   17.030919]  __kasan_kmalloc+0xb7/0xc0
[   17.031256]  __kmalloc_cache_noprof+0x189/0x420
[   17.031603]  kasan_atomics+0x95/0x310
[   17.031907]  kunit_try_run_case+0x1a5/0x480
[   17.032181]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.032451]  kthread+0x337/0x6f0
[   17.032652]  ret_from_fork+0x116/0x1d0
[   17.032820]  ret_from_fork_asm+0x1a/0x30
[   17.032996] 
[   17.033112] The buggy address belongs to the object at ffff888102ac4100
[   17.033112]  which belongs to the cache kmalloc-64 of size 64
[   17.033467] The buggy address is located 0 bytes to the right of
[   17.033467]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.034426] 
[   17.034802] The buggy address belongs to the physical page:
[   17.035255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.035880] flags: 0x200000000000000(node=0|zone=2)
[   17.036333] page_type: f5(slab)
[   17.036571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.036983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.037267] page dumped because: kasan: bad access detected
[   17.037465] 
[   17.037570] Memory state around the buggy address:
[   17.037923]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.038424]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.038996] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.039500]                                      ^
[   17.039930]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.040388]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.040840] ==================================================================
[   17.145089] ==================================================================
[   17.145391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   17.145604] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.146310] 
[   17.146498] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.146584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.146610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.146666] Call Trace:
[   17.146692]  <TASK>
[   17.146717]  dump_stack_lvl+0x73/0xb0
[   17.146773]  print_report+0xd1/0x650
[   17.146840]  ? __virt_addr_valid+0x1db/0x2d0
[   17.146895]  ? kasan_atomics_helper+0x1467/0x5450
[   17.146934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.146984]  ? kasan_atomics_helper+0x1467/0x5450
[   17.147038]  kasan_report+0x141/0x180
[   17.147090]  ? kasan_atomics_helper+0x1467/0x5450
[   17.147162]  kasan_check_range+0x10c/0x1c0
[   17.147207]  __kasan_check_write+0x18/0x20
[   17.147244]  kasan_atomics_helper+0x1467/0x5450
[   17.147290]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.147334]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.147385]  ? trace_hardirqs_on+0x37/0xe0
[   17.147429]  ? kasan_atomics+0x152/0x310
[   17.147484]  kasan_atomics+0x1dc/0x310
[   17.147527]  ? __pfx_kasan_atomics+0x10/0x10
[   17.147563]  ? __pfx_kasan_atomics+0x10/0x10
[   17.147591]  kunit_try_run_case+0x1a5/0x480
[   17.147633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.147658]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.147682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.147704]  ? __kthread_parkme+0x82/0x180
[   17.147724]  ? preempt_count_sub+0x50/0x80
[   17.147747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.147770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.147794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.147816]  kthread+0x337/0x6f0
[   17.147835]  ? trace_preempt_on+0x20/0xc0
[   17.147857]  ? __pfx_kthread+0x10/0x10
[   17.147878]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.147898]  ? calculate_sigpending+0x7b/0xa0
[   17.147921]  ? __pfx_kthread+0x10/0x10
[   17.147942]  ret_from_fork+0x116/0x1d0
[   17.147961]  ? __pfx_kthread+0x10/0x10
[   17.147981]  ret_from_fork_asm+0x1a/0x30
[   17.148010]  </TASK>
[   17.148022] 
[   17.158823] Allocated by task 283:
[   17.159008]  kasan_save_stack+0x45/0x70
[   17.159335]  kasan_save_track+0x18/0x40
[   17.159634]  kasan_save_alloc_info+0x3b/0x50
[   17.160034]  __kasan_kmalloc+0xb7/0xc0
[   17.160384]  __kmalloc_cache_noprof+0x189/0x420
[   17.160594]  kasan_atomics+0x95/0x310
[   17.160782]  kunit_try_run_case+0x1a5/0x480
[   17.160972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.161633]  kthread+0x337/0x6f0
[   17.161906]  ret_from_fork+0x116/0x1d0
[   17.162086]  ret_from_fork_asm+0x1a/0x30
[   17.162675] 
[   17.162886] The buggy address belongs to the object at ffff888102ac4100
[   17.162886]  which belongs to the cache kmalloc-64 of size 64
[   17.163586] The buggy address is located 0 bytes to the right of
[   17.163586]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.164525] 
[   17.164718] The buggy address belongs to the physical page:
[   17.165118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.165583] flags: 0x200000000000000(node=0|zone=2)
[   17.165903] page_type: f5(slab)
[   17.166232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.166762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.167425] page dumped because: kasan: bad access detected
[   17.167738] 
[   17.167887] Memory state around the buggy address:
[   17.168469]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.168777]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.169053] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.170075]                                      ^
[   17.170352]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.170802]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.171138] ==================================================================
[   16.753337] ==================================================================
[   16.753779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   16.754046] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.755130] 
[   16.755367] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.755460] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.755487] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.755529] Call Trace:
[   16.755563]  <TASK>
[   16.755595]  dump_stack_lvl+0x73/0xb0
[   16.755656]  print_report+0xd1/0x650
[   16.755688]  ? __virt_addr_valid+0x1db/0x2d0
[   16.755717]  ? kasan_atomics_helper+0xde0/0x5450
[   16.755742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.755767]  ? kasan_atomics_helper+0xde0/0x5450
[   16.755788]  kasan_report+0x141/0x180
[   16.755810]  ? kasan_atomics_helper+0xde0/0x5450
[   16.755834]  kasan_check_range+0x10c/0x1c0
[   16.755857]  __kasan_check_write+0x18/0x20
[   16.755876]  kasan_atomics_helper+0xde0/0x5450
[   16.755898]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.755919]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.755942]  ? trace_hardirqs_on+0x37/0xe0
[   16.755964]  ? kasan_atomics+0x152/0x310
[   16.755990]  kasan_atomics+0x1dc/0x310
[   16.756012]  ? __pfx_kasan_atomics+0x10/0x10
[   16.756035]  ? __pfx_kasan_atomics+0x10/0x10
[   16.756061]  kunit_try_run_case+0x1a5/0x480
[   16.756084]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.756110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.756147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.756186]  ? __kthread_parkme+0x82/0x180
[   16.756216]  ? preempt_count_sub+0x50/0x80
[   16.756253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.756293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.756334]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.756372]  kthread+0x337/0x6f0
[   16.756403]  ? trace_preempt_on+0x20/0xc0
[   16.756440]  ? __pfx_kthread+0x10/0x10
[   16.756478]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.756517]  ? calculate_sigpending+0x7b/0xa0
[   16.756560]  ? __pfx_kthread+0x10/0x10
[   16.756599]  ret_from_fork+0x116/0x1d0
[   16.756650]  ? __pfx_kthread+0x10/0x10
[   16.756689]  ret_from_fork_asm+0x1a/0x30
[   16.756745]  </TASK>
[   16.756770] 
[   16.767037] Allocated by task 283:
[   16.767342]  kasan_save_stack+0x45/0x70
[   16.767675]  kasan_save_track+0x18/0x40
[   16.767973]  kasan_save_alloc_info+0x3b/0x50
[   16.768268]  __kasan_kmalloc+0xb7/0xc0
[   16.768560]  __kmalloc_cache_noprof+0x189/0x420
[   16.768930]  kasan_atomics+0x95/0x310
[   16.769232]  kunit_try_run_case+0x1a5/0x480
[   16.769513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.769797]  kthread+0x337/0x6f0
[   16.769960]  ret_from_fork+0x116/0x1d0
[   16.770161]  ret_from_fork_asm+0x1a/0x30
[   16.770336] 
[   16.770447] The buggy address belongs to the object at ffff888102ac4100
[   16.770447]  which belongs to the cache kmalloc-64 of size 64
[   16.771046] The buggy address is located 0 bytes to the right of
[   16.771046]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.771882] 
[   16.772033] The buggy address belongs to the physical page:
[   16.772257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.772798] flags: 0x200000000000000(node=0|zone=2)
[   16.773152] page_type: f5(slab)
[   16.773368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.773635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.773885] page dumped because: kasan: bad access detected
[   16.774088] 
[   16.774235] Memory state around the buggy address:
[   16.774527]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.775007]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.775498] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.775959]                                      ^
[   16.776311]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.776789]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.777152] ==================================================================
[   16.597835] ==================================================================
[   16.598172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   16.598696] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.599027] 
[   16.599194] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.599278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.599306] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.599347] Call Trace:
[   16.599375]  <TASK>
[   16.599402]  dump_stack_lvl+0x73/0xb0
[   16.599454]  print_report+0xd1/0x650
[   16.599496]  ? __virt_addr_valid+0x1db/0x2d0
[   16.599544]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.599584]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.599659]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.599701]  kasan_report+0x141/0x180
[   16.599744]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.599798]  kasan_check_range+0x10c/0x1c0
[   16.599850]  __kasan_check_write+0x18/0x20
[   16.599889]  kasan_atomics_helper+0xa2b/0x5450
[   16.599945]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.599990]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.600039]  ? trace_hardirqs_on+0x37/0xe0
[   16.600083]  ? kasan_atomics+0x152/0x310
[   16.600170]  kasan_atomics+0x1dc/0x310
[   16.600214]  ? __pfx_kasan_atomics+0x10/0x10
[   16.600252]  ? __pfx_kasan_atomics+0x10/0x10
[   16.600287]  kunit_try_run_case+0x1a5/0x480
[   16.600318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.600339]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.600363]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.600386]  ? __kthread_parkme+0x82/0x180
[   16.600406]  ? preempt_count_sub+0x50/0x80
[   16.600429]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.600452]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.600474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.600496]  kthread+0x337/0x6f0
[   16.600515]  ? trace_preempt_on+0x20/0xc0
[   16.600537]  ? __pfx_kthread+0x10/0x10
[   16.600558]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.600578]  ? calculate_sigpending+0x7b/0xa0
[   16.600601]  ? __pfx_kthread+0x10/0x10
[   16.600642]  ret_from_fork+0x116/0x1d0
[   16.600663]  ? __pfx_kthread+0x10/0x10
[   16.600684]  ret_from_fork_asm+0x1a/0x30
[   16.600714]  </TASK>
[   16.600728] 
[   16.609871] Allocated by task 283:
[   16.610191]  kasan_save_stack+0x45/0x70
[   16.610389]  kasan_save_track+0x18/0x40
[   16.610551]  kasan_save_alloc_info+0x3b/0x50
[   16.610900]  __kasan_kmalloc+0xb7/0xc0
[   16.611232]  __kmalloc_cache_noprof+0x189/0x420
[   16.611581]  kasan_atomics+0x95/0x310
[   16.611884]  kunit_try_run_case+0x1a5/0x480
[   16.612221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.612652]  kthread+0x337/0x6f0
[   16.612829]  ret_from_fork+0x116/0x1d0
[   16.612975]  ret_from_fork_asm+0x1a/0x30
[   16.613326] 
[   16.613468] The buggy address belongs to the object at ffff888102ac4100
[   16.613468]  which belongs to the cache kmalloc-64 of size 64
[   16.614133] The buggy address is located 0 bytes to the right of
[   16.614133]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.614746] 
[   16.614934] The buggy address belongs to the physical page:
[   16.615235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.615627] flags: 0x200000000000000(node=0|zone=2)
[   16.616015] page_type: f5(slab)
[   16.616315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.616625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.617170] page dumped because: kasan: bad access detected
[   16.617455] 
[   16.617639] Memory state around the buggy address:
[   16.617924]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.618384]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.618721] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.619084]                                      ^
[   16.619303]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.619542]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.620000] ==================================================================
[   17.400183] ==================================================================
[   17.400732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   17.401054] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.401537] 
[   17.401686] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.401777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.401803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.401842] Call Trace:
[   17.401871]  <TASK>
[   17.401904]  dump_stack_lvl+0x73/0xb0
[   17.401969]  print_report+0xd1/0x650
[   17.402009]  ? __virt_addr_valid+0x1db/0x2d0
[   17.402041]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.402072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.402142]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.402189]  kasan_report+0x141/0x180
[   17.402232]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.402289]  kasan_check_range+0x10c/0x1c0
[   17.402325]  __kasan_check_write+0x18/0x20
[   17.402353]  kasan_atomics_helper+0x19e3/0x5450
[   17.402385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.402417]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.402450]  ? trace_hardirqs_on+0x37/0xe0
[   17.402485]  ? kasan_atomics+0x152/0x310
[   17.402554]  kasan_atomics+0x1dc/0x310
[   17.402601]  ? __pfx_kasan_atomics+0x10/0x10
[   17.402661]  ? __pfx_kasan_atomics+0x10/0x10
[   17.402716]  kunit_try_run_case+0x1a5/0x480
[   17.402766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.402811]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.402856]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.402901]  ? __kthread_parkme+0x82/0x180
[   17.402944]  ? preempt_count_sub+0x50/0x80
[   17.402986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.403024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.403063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.403128]  kthread+0x337/0x6f0
[   17.403176]  ? trace_preempt_on+0x20/0xc0
[   17.403220]  ? __pfx_kthread+0x10/0x10
[   17.403280]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.403319]  ? calculate_sigpending+0x7b/0xa0
[   17.403376]  ? __pfx_kthread+0x10/0x10
[   17.403418]  ret_from_fork+0x116/0x1d0
[   17.403451]  ? __pfx_kthread+0x10/0x10
[   17.403491]  ret_from_fork_asm+0x1a/0x30
[   17.403554]  </TASK>
[   17.403580] 
[   17.413036] Allocated by task 283:
[   17.413303]  kasan_save_stack+0x45/0x70
[   17.413641]  kasan_save_track+0x18/0x40
[   17.413928]  kasan_save_alloc_info+0x3b/0x50
[   17.414285]  __kasan_kmalloc+0xb7/0xc0
[   17.414596]  __kmalloc_cache_noprof+0x189/0x420
[   17.414852]  kasan_atomics+0x95/0x310
[   17.415027]  kunit_try_run_case+0x1a5/0x480
[   17.415374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.415779]  kthread+0x337/0x6f0
[   17.416047]  ret_from_fork+0x116/0x1d0
[   17.416319]  ret_from_fork_asm+0x1a/0x30
[   17.416497] 
[   17.416604] The buggy address belongs to the object at ffff888102ac4100
[   17.416604]  which belongs to the cache kmalloc-64 of size 64
[   17.417430] The buggy address is located 0 bytes to the right of
[   17.417430]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.417941] 
[   17.418167] The buggy address belongs to the physical page:
[   17.418546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.418825] flags: 0x200000000000000(node=0|zone=2)
[   17.419020] page_type: f5(slab)
[   17.419212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.419465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.420058] page dumped because: kasan: bad access detected
[   17.420552] 
[   17.420754] Memory state around the buggy address:
[   17.421131]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.421607]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.422157] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.422606]                                      ^
[   17.422910]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.423417]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.423841] ==================================================================
[   16.571836] ==================================================================
[   16.572447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   16.573021] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.573330] 
[   16.573520] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.573635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.573664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.573704] Call Trace:
[   16.573733]  <TASK>
[   16.573765]  dump_stack_lvl+0x73/0xb0
[   16.573824]  print_report+0xd1/0x650
[   16.573865]  ? __virt_addr_valid+0x1db/0x2d0
[   16.573906]  ? kasan_atomics_helper+0x992/0x5450
[   16.573952]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.574015]  ? kasan_atomics_helper+0x992/0x5450
[   16.574058]  kasan_report+0x141/0x180
[   16.574130]  ? kasan_atomics_helper+0x992/0x5450
[   16.574179]  kasan_check_range+0x10c/0x1c0
[   16.574225]  __kasan_check_write+0x18/0x20
[   16.574280]  kasan_atomics_helper+0x992/0x5450
[   16.574323]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.574364]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.574406]  ? trace_hardirqs_on+0x37/0xe0
[   16.574450]  ? kasan_atomics+0x152/0x310
[   16.574517]  kasan_atomics+0x1dc/0x310
[   16.574560]  ? __pfx_kasan_atomics+0x10/0x10
[   16.574601]  ? __pfx_kasan_atomics+0x10/0x10
[   16.574664]  kunit_try_run_case+0x1a5/0x480
[   16.574701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.574723]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.574747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.574769]  ? __kthread_parkme+0x82/0x180
[   16.574789]  ? preempt_count_sub+0x50/0x80
[   16.574812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.574835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.574857]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.574880]  kthread+0x337/0x6f0
[   16.574899]  ? trace_preempt_on+0x20/0xc0
[   16.574922]  ? __pfx_kthread+0x10/0x10
[   16.574942]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.574962]  ? calculate_sigpending+0x7b/0xa0
[   16.574985]  ? __pfx_kthread+0x10/0x10
[   16.575006]  ret_from_fork+0x116/0x1d0
[   16.575025]  ? __pfx_kthread+0x10/0x10
[   16.575044]  ret_from_fork_asm+0x1a/0x30
[   16.575075]  </TASK>
[   16.575088] 
[   16.585544] Allocated by task 283:
[   16.585795]  kasan_save_stack+0x45/0x70
[   16.586195]  kasan_save_track+0x18/0x40
[   16.586374]  kasan_save_alloc_info+0x3b/0x50
[   16.586560]  __kasan_kmalloc+0xb7/0xc0
[   16.586905]  __kmalloc_cache_noprof+0x189/0x420
[   16.587282]  kasan_atomics+0x95/0x310
[   16.587671]  kunit_try_run_case+0x1a5/0x480
[   16.588011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.588386]  kthread+0x337/0x6f0
[   16.588658]  ret_from_fork+0x116/0x1d0
[   16.589007]  ret_from_fork_asm+0x1a/0x30
[   16.589328] 
[   16.589516] The buggy address belongs to the object at ffff888102ac4100
[   16.589516]  which belongs to the cache kmalloc-64 of size 64
[   16.590155] The buggy address is located 0 bytes to the right of
[   16.590155]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.590781] 
[   16.590952] The buggy address belongs to the physical page:
[   16.591338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.591787] flags: 0x200000000000000(node=0|zone=2)
[   16.592134] page_type: f5(slab)
[   16.592421] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.592727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.593300] page dumped because: kasan: bad access detected
[   16.593643] 
[   16.593752] Memory state around the buggy address:
[   16.593948]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.594473]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.594978] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.595413]                                      ^
[   16.595690]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.596162]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.596560] ==================================================================
[   17.452141] ==================================================================
[   17.452695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   17.453524] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.453844] 
[   17.454046] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.454164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.454192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.454227] Call Trace:
[   17.454257]  <TASK>
[   17.454284]  dump_stack_lvl+0x73/0xb0
[   17.454355]  print_report+0xd1/0x650
[   17.454414]  ? __virt_addr_valid+0x1db/0x2d0
[   17.454453]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.454493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.454540]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.454585]  kasan_report+0x141/0x180
[   17.454647]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.454700]  kasan_check_range+0x10c/0x1c0
[   17.454746]  __kasan_check_write+0x18/0x20
[   17.454790]  kasan_atomics_helper+0x1b22/0x5450
[   17.454837]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.454894]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.454929]  ? trace_hardirqs_on+0x37/0xe0
[   17.454953]  ? kasan_atomics+0x152/0x310
[   17.454980]  kasan_atomics+0x1dc/0x310
[   17.455003]  ? __pfx_kasan_atomics+0x10/0x10
[   17.455026]  ? __pfx_kasan_atomics+0x10/0x10
[   17.455058]  kunit_try_run_case+0x1a5/0x480
[   17.455105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.455152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.455177]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.455199]  ? __kthread_parkme+0x82/0x180
[   17.455219]  ? preempt_count_sub+0x50/0x80
[   17.455243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.455266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.455288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.455311]  kthread+0x337/0x6f0
[   17.455330]  ? trace_preempt_on+0x20/0xc0
[   17.455352]  ? __pfx_kthread+0x10/0x10
[   17.455373]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.455394]  ? calculate_sigpending+0x7b/0xa0
[   17.455417]  ? __pfx_kthread+0x10/0x10
[   17.455438]  ret_from_fork+0x116/0x1d0
[   17.455456]  ? __pfx_kthread+0x10/0x10
[   17.455476]  ret_from_fork_asm+0x1a/0x30
[   17.455505]  </TASK>
[   17.455519] 
[   17.468060] Allocated by task 283:
[   17.468653]  kasan_save_stack+0x45/0x70
[   17.468907]  kasan_save_track+0x18/0x40
[   17.469055]  kasan_save_alloc_info+0x3b/0x50
[   17.469389]  __kasan_kmalloc+0xb7/0xc0
[   17.469584]  __kmalloc_cache_noprof+0x189/0x420
[   17.469805]  kasan_atomics+0x95/0x310
[   17.470006]  kunit_try_run_case+0x1a5/0x480
[   17.470206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.470439]  kthread+0x337/0x6f0
[   17.470780]  ret_from_fork+0x116/0x1d0
[   17.470956]  ret_from_fork_asm+0x1a/0x30
[   17.471159] 
[   17.471270] The buggy address belongs to the object at ffff888102ac4100
[   17.471270]  which belongs to the cache kmalloc-64 of size 64
[   17.471936] The buggy address is located 0 bytes to the right of
[   17.471936]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.472870] 
[   17.473066] The buggy address belongs to the physical page:
[   17.473378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.473731] flags: 0x200000000000000(node=0|zone=2)
[   17.473944] page_type: f5(slab)
[   17.474132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.474586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.475175] page dumped because: kasan: bad access detected
[   17.475565] 
[   17.475733] Memory state around the buggy address:
[   17.476158]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.476658]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.476937] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.477445]                                      ^
[   17.477850]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.478264]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.478660] ==================================================================
[   16.620884] ==================================================================
[   16.621391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   16.621900] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.622242] 
[   16.622464] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.622545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.622573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.622828] Call Trace:
[   16.622879]  <TASK>
[   16.622927]  dump_stack_lvl+0x73/0xb0
[   16.622999]  print_report+0xd1/0x650
[   16.623059]  ? __virt_addr_valid+0x1db/0x2d0
[   16.623094]  ? kasan_atomics_helper+0xac7/0x5450
[   16.623150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.623176]  ? kasan_atomics_helper+0xac7/0x5450
[   16.623197]  kasan_report+0x141/0x180
[   16.623220]  ? kasan_atomics_helper+0xac7/0x5450
[   16.623264]  kasan_check_range+0x10c/0x1c0
[   16.623303]  __kasan_check_write+0x18/0x20
[   16.623334]  kasan_atomics_helper+0xac7/0x5450
[   16.623375]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.623416]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.623467]  ? trace_hardirqs_on+0x37/0xe0
[   16.623511]  ? kasan_atomics+0x152/0x310
[   16.623577]  kasan_atomics+0x1dc/0x310
[   16.623635]  ? __pfx_kasan_atomics+0x10/0x10
[   16.623678]  ? __pfx_kasan_atomics+0x10/0x10
[   16.623740]  kunit_try_run_case+0x1a5/0x480
[   16.623802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.623844]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.623895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.623941]  ? __kthread_parkme+0x82/0x180
[   16.623994]  ? preempt_count_sub+0x50/0x80
[   16.624040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.624085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.624128]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.624173]  kthread+0x337/0x6f0
[   16.624215]  ? trace_preempt_on+0x20/0xc0
[   16.624260]  ? __pfx_kthread+0x10/0x10
[   16.624303]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.624345]  ? calculate_sigpending+0x7b/0xa0
[   16.624394]  ? __pfx_kthread+0x10/0x10
[   16.624437]  ret_from_fork+0x116/0x1d0
[   16.624475]  ? __pfx_kthread+0x10/0x10
[   16.624514]  ret_from_fork_asm+0x1a/0x30
[   16.624578]  </TASK>
[   16.624626] 
[   16.636036] Allocated by task 283:
[   16.636597]  kasan_save_stack+0x45/0x70
[   16.637007]  kasan_save_track+0x18/0x40
[   16.637357]  kasan_save_alloc_info+0x3b/0x50
[   16.637712]  __kasan_kmalloc+0xb7/0xc0
[   16.637969]  __kmalloc_cache_noprof+0x189/0x420
[   16.638360]  kasan_atomics+0x95/0x310
[   16.638534]  kunit_try_run_case+0x1a5/0x480
[   16.638863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.639080]  kthread+0x337/0x6f0
[   16.639348]  ret_from_fork+0x116/0x1d0
[   16.639570]  ret_from_fork_asm+0x1a/0x30
[   16.639897] 
[   16.640023] The buggy address belongs to the object at ffff888102ac4100
[   16.640023]  which belongs to the cache kmalloc-64 of size 64
[   16.640641] The buggy address is located 0 bytes to the right of
[   16.640641]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.641344] 
[   16.641477] The buggy address belongs to the physical page:
[   16.641820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.642387] flags: 0x200000000000000(node=0|zone=2)
[   16.642699] page_type: f5(slab)
[   16.642860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.643357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.643749] page dumped because: kasan: bad access detected
[   16.644056] 
[   16.644243] Memory state around the buggy address:
[   16.644583]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.644944]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.645423] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.645806]                                      ^
[   16.646085]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646362]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646628] ==================================================================
[   16.372231] ==================================================================
[   16.372548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   16.372945] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.373709] 
[   16.373926] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.374017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.374046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.374085] Call Trace:
[   16.374115]  <TASK>
[   16.374144]  dump_stack_lvl+0x73/0xb0
[   16.374198]  print_report+0xd1/0x650
[   16.374237]  ? __virt_addr_valid+0x1db/0x2d0
[   16.374278]  ? kasan_atomics_helper+0x565/0x5450
[   16.374318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.374369]  ? kasan_atomics_helper+0x565/0x5450
[   16.374406]  kasan_report+0x141/0x180
[   16.374453]  ? kasan_atomics_helper+0x565/0x5450
[   16.374502]  kasan_check_range+0x10c/0x1c0
[   16.374965]  __kasan_check_write+0x18/0x20
[   16.375016]  kasan_atomics_helper+0x565/0x5450
[   16.375063]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.375109]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.375154]  ? trace_hardirqs_on+0x37/0xe0
[   16.375199]  ? kasan_atomics+0x152/0x310
[   16.375253]  kasan_atomics+0x1dc/0x310
[   16.375279]  ? __pfx_kasan_atomics+0x10/0x10
[   16.375302]  ? __pfx_kasan_atomics+0x10/0x10
[   16.375329]  kunit_try_run_case+0x1a5/0x480
[   16.375352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.375375]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.375398]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.375420]  ? __kthread_parkme+0x82/0x180
[   16.375440]  ? preempt_count_sub+0x50/0x80
[   16.375464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.375486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.375541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.375586]  kthread+0x337/0x6f0
[   16.375635]  ? trace_preempt_on+0x20/0xc0
[   16.375662]  ? __pfx_kthread+0x10/0x10
[   16.375683]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.375705]  ? calculate_sigpending+0x7b/0xa0
[   16.375728]  ? __pfx_kthread+0x10/0x10
[   16.375749]  ret_from_fork+0x116/0x1d0
[   16.375767]  ? __pfx_kthread+0x10/0x10
[   16.375787]  ret_from_fork_asm+0x1a/0x30
[   16.375816]  </TASK>
[   16.375830] 
[   16.389391] Allocated by task 283:
[   16.389856]  kasan_save_stack+0x45/0x70
[   16.390243]  kasan_save_track+0x18/0x40
[   16.390755]  kasan_save_alloc_info+0x3b/0x50
[   16.391067]  __kasan_kmalloc+0xb7/0xc0
[   16.391257]  __kmalloc_cache_noprof+0x189/0x420
[   16.391910]  kasan_atomics+0x95/0x310
[   16.392468]  kunit_try_run_case+0x1a5/0x480
[   16.392956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.393185]  kthread+0x337/0x6f0
[   16.393538]  ret_from_fork+0x116/0x1d0
[   16.394026]  ret_from_fork_asm+0x1a/0x30
[   16.394225] 
[   16.394325] The buggy address belongs to the object at ffff888102ac4100
[   16.394325]  which belongs to the cache kmalloc-64 of size 64
[   16.395419] The buggy address is located 0 bytes to the right of
[   16.395419]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.396709] 
[   16.396857] The buggy address belongs to the physical page:
[   16.397303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.397957] flags: 0x200000000000000(node=0|zone=2)
[   16.398528] page_type: f5(slab)
[   16.398940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.399301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.399945] page dumped because: kasan: bad access detected
[   16.400676] 
[   16.400866] Memory state around the buggy address:
[   16.401091]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.401389]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.401787] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.402160]                                      ^
[   16.402563]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.403326]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.404045] ==================================================================
[   16.182353] ==================================================================
[   16.182837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   16.183137] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.183453] 
[   16.183817] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.183903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.183926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.183962] Call Trace:
[   16.183991]  <TASK>
[   16.184022]  dump_stack_lvl+0x73/0xb0
[   16.184077]  print_report+0xd1/0x650
[   16.184151]  ? __virt_addr_valid+0x1db/0x2d0
[   16.184195]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.184235]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.184300]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.184337]  kasan_report+0x141/0x180
[   16.184373]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.184418]  __asan_report_load4_noabort+0x18/0x20
[   16.184461]  kasan_atomics_helper+0x4b88/0x5450
[   16.184659]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.184714]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.184763]  ? trace_hardirqs_on+0x37/0xe0
[   16.184793]  ? kasan_atomics+0x152/0x310
[   16.184821]  kasan_atomics+0x1dc/0x310
[   16.184843]  ? __pfx_kasan_atomics+0x10/0x10
[   16.184866]  ? __pfx_kasan_atomics+0x10/0x10
[   16.184891]  kunit_try_run_case+0x1a5/0x480
[   16.184914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.184934]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.184956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.184977]  ? __kthread_parkme+0x82/0x180
[   16.184997]  ? preempt_count_sub+0x50/0x80
[   16.185020]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.185041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.185063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.185083]  kthread+0x337/0x6f0
[   16.185102]  ? trace_preempt_on+0x20/0xc0
[   16.185122]  ? __pfx_kthread+0x10/0x10
[   16.185142]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.185161]  ? calculate_sigpending+0x7b/0xa0
[   16.185183]  ? __pfx_kthread+0x10/0x10
[   16.185203]  ret_from_fork+0x116/0x1d0
[   16.185230]  ? __pfx_kthread+0x10/0x10
[   16.185258]  ret_from_fork_asm+0x1a/0x30
[   16.185287]  </TASK>
[   16.185299] 
[   16.198046] Allocated by task 283:
[   16.198501]  kasan_save_stack+0x45/0x70
[   16.199435]  kasan_save_track+0x18/0x40
[   16.199809]  kasan_save_alloc_info+0x3b/0x50
[   16.200116]  __kasan_kmalloc+0xb7/0xc0
[   16.200376]  __kmalloc_cache_noprof+0x189/0x420
[   16.200572]  kasan_atomics+0x95/0x310
[   16.200724]  kunit_try_run_case+0x1a5/0x480
[   16.200870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.201092]  kthread+0x337/0x6f0
[   16.201271]  ret_from_fork+0x116/0x1d0
[   16.201462]  ret_from_fork_asm+0x1a/0x30
[   16.203424] 
[   16.203541] The buggy address belongs to the object at ffff888102ac4100
[   16.203541]  which belongs to the cache kmalloc-64 of size 64
[   16.203893] The buggy address is located 0 bytes to the right of
[   16.203893]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.207431] 
[   16.207560] The buggy address belongs to the physical page:
[   16.207756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.207980] flags: 0x200000000000000(node=0|zone=2)
[   16.208153] page_type: f5(slab)
[   16.209542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.209852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.211451] page dumped because: kasan: bad access detected
[   16.212346] 
[   16.212808] Memory state around the buggy address:
[   16.213045]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.213423]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.214101] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.214697]                                      ^
[   16.215051]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.215577]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.216387] ==================================================================
[   17.793376] ==================================================================
[   17.796846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   17.797130] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.797361] 
[   17.797476] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.797552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.797575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.797646] Call Trace:
[   17.797676]  <TASK>
[   17.797706]  dump_stack_lvl+0x73/0xb0
[   17.797748]  print_report+0xd1/0x650
[   17.797805]  ? __virt_addr_valid+0x1db/0x2d0
[   17.797845]  ? kasan_atomics_helper+0x218a/0x5450
[   17.797881]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.797936]  ? kasan_atomics_helper+0x218a/0x5450
[   17.797978]  kasan_report+0x141/0x180
[   17.798021]  ? kasan_atomics_helper+0x218a/0x5450
[   17.798075]  kasan_check_range+0x10c/0x1c0
[   17.798128]  __kasan_check_write+0x18/0x20
[   17.798162]  kasan_atomics_helper+0x218a/0x5450
[   17.798200]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.798234]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.798275]  ? trace_hardirqs_on+0x37/0xe0
[   17.798314]  ? kasan_atomics+0x152/0x310
[   17.798360]  kasan_atomics+0x1dc/0x310
[   17.798394]  ? __pfx_kasan_atomics+0x10/0x10
[   17.798431]  ? __pfx_kasan_atomics+0x10/0x10
[   17.798475]  kunit_try_run_case+0x1a5/0x480
[   17.798512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.798547]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.798587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.798656]  ? __kthread_parkme+0x82/0x180
[   17.798693]  ? preempt_count_sub+0x50/0x80
[   17.798739]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.798779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.798818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.798855]  kthread+0x337/0x6f0
[   17.798888]  ? trace_preempt_on+0x20/0xc0
[   17.799749]  ? __pfx_kthread+0x10/0x10
[   17.799796]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.799836]  ? calculate_sigpending+0x7b/0xa0
[   17.799884]  ? __pfx_kthread+0x10/0x10
[   17.799922]  ret_from_fork+0x116/0x1d0
[   17.799960]  ? __pfx_kthread+0x10/0x10
[   17.800003]  ret_from_fork_asm+0x1a/0x30
[   17.800066]  </TASK>
[   17.800090] 
[   17.809633] Allocated by task 283:
[   17.809883]  kasan_save_stack+0x45/0x70
[   17.810227]  kasan_save_track+0x18/0x40
[   17.810493]  kasan_save_alloc_info+0x3b/0x50
[   17.810826]  __kasan_kmalloc+0xb7/0xc0
[   17.811111]  __kmalloc_cache_noprof+0x189/0x420
[   17.811311]  kasan_atomics+0x95/0x310
[   17.811506]  kunit_try_run_case+0x1a5/0x480
[   17.811815]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.812209]  kthread+0x337/0x6f0
[   17.812469]  ret_from_fork+0x116/0x1d0
[   17.812699]  ret_from_fork_asm+0x1a/0x30
[   17.812899] 
[   17.813024] The buggy address belongs to the object at ffff888102ac4100
[   17.813024]  which belongs to the cache kmalloc-64 of size 64
[   17.813678] The buggy address is located 0 bytes to the right of
[   17.813678]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.814194] 
[   17.814303] The buggy address belongs to the physical page:
[   17.814491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.814764] flags: 0x200000000000000(node=0|zone=2)
[   17.814961] page_type: f5(slab)
[   17.815119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.815370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.815612] page dumped because: kasan: bad access detected
[   17.816014] 
[   17.816152] Memory state around the buggy address:
[   17.816497]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.816995]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.817568] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.818055]                                      ^
[   17.818475]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.818967]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.819550] ==================================================================
[   16.466774] ==================================================================
[   16.467734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   16.468400] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.468648] 
[   16.468776] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.468854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.468877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.468913] Call Trace:
[   16.468939]  <TASK>
[   16.468968]  dump_stack_lvl+0x73/0xb0
[   16.469021]  print_report+0xd1/0x650
[   16.469054]  ? __virt_addr_valid+0x1db/0x2d0
[   16.469089]  ? kasan_atomics_helper+0x72f/0x5450
[   16.469126]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.469170]  ? kasan_atomics_helper+0x72f/0x5450
[   16.469207]  kasan_report+0x141/0x180
[   16.469250]  ? kasan_atomics_helper+0x72f/0x5450
[   16.469304]  kasan_check_range+0x10c/0x1c0
[   16.469351]  __kasan_check_write+0x18/0x20
[   16.469387]  kasan_atomics_helper+0x72f/0x5450
[   16.469430]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.469471]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.469509]  ? trace_hardirqs_on+0x37/0xe0
[   16.469546]  ? kasan_atomics+0x152/0x310
[   16.469588]  kasan_atomics+0x1dc/0x310
[   16.469652]  ? __pfx_kasan_atomics+0x10/0x10
[   16.469692]  ? __pfx_kasan_atomics+0x10/0x10
[   16.469735]  kunit_try_run_case+0x1a5/0x480
[   16.469771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.469804]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.469846]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.469883]  ? __kthread_parkme+0x82/0x180
[   16.469924]  ? preempt_count_sub+0x50/0x80
[   16.469970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.470010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.470048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.470087]  kthread+0x337/0x6f0
[   16.470121]  ? trace_preempt_on+0x20/0xc0
[   16.470159]  ? __pfx_kthread+0x10/0x10
[   16.470195]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.470232]  ? calculate_sigpending+0x7b/0xa0
[   16.470272]  ? __pfx_kthread+0x10/0x10
[   16.470306]  ret_from_fork+0x116/0x1d0
[   16.470339]  ? __pfx_kthread+0x10/0x10
[   16.470374]  ret_from_fork_asm+0x1a/0x30
[   16.470429]  </TASK>
[   16.470450] 
[   16.486350] Allocated by task 283:
[   16.486594]  kasan_save_stack+0x45/0x70
[   16.486799]  kasan_save_track+0x18/0x40
[   16.487478]  kasan_save_alloc_info+0x3b/0x50
[   16.487931]  __kasan_kmalloc+0xb7/0xc0
[   16.488137]  __kmalloc_cache_noprof+0x189/0x420
[   16.488297]  kasan_atomics+0x95/0x310
[   16.488996]  kunit_try_run_case+0x1a5/0x480
[   16.489495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.489717]  kthread+0x337/0x6f0
[   16.489861]  ret_from_fork+0x116/0x1d0
[   16.490011]  ret_from_fork_asm+0x1a/0x30
[   16.490170] 
[   16.490263] The buggy address belongs to the object at ffff888102ac4100
[   16.490263]  which belongs to the cache kmalloc-64 of size 64
[   16.490582] The buggy address is located 0 bytes to the right of
[   16.490582]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.490927] 
[   16.491026] The buggy address belongs to the physical page:
[   16.491201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.491445] flags: 0x200000000000000(node=0|zone=2)
[   16.492465] page_type: f5(slab)
[   16.492665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.492924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.493211] page dumped because: kasan: bad access detected
[   16.493410] 
[   16.493512] Memory state around the buggy address:
[   16.493689]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.494106]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.494532] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.495121]                                      ^
[   16.495987]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.496649]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.496961] ==================================================================
[   17.300345] ==================================================================
[   17.300784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   17.301090] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.301551] 
[   17.301720] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.301797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.301824] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.301865] Call Trace:
[   17.301900]  <TASK>
[   17.301941]  dump_stack_lvl+0x73/0xb0
[   17.301998]  print_report+0xd1/0x650
[   17.302044]  ? __virt_addr_valid+0x1db/0x2d0
[   17.302088]  ? kasan_atomics_helper+0x177f/0x5450
[   17.302132]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.302182]  ? kasan_atomics_helper+0x177f/0x5450
[   17.302228]  kasan_report+0x141/0x180
[   17.302275]  ? kasan_atomics_helper+0x177f/0x5450
[   17.302358]  kasan_check_range+0x10c/0x1c0
[   17.302411]  __kasan_check_write+0x18/0x20
[   17.302455]  kasan_atomics_helper+0x177f/0x5450
[   17.302502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.302548]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.302597]  ? trace_hardirqs_on+0x37/0xe0
[   17.303383]  ? kasan_atomics+0x152/0x310
[   17.303440]  kasan_atomics+0x1dc/0x310
[   17.303487]  ? __pfx_kasan_atomics+0x10/0x10
[   17.303529]  ? __pfx_kasan_atomics+0x10/0x10
[   17.303583]  kunit_try_run_case+0x1a5/0x480
[   17.303646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.303692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.303741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.303787]  ? __kthread_parkme+0x82/0x180
[   17.303829]  ? preempt_count_sub+0x50/0x80
[   17.303879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.303928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.303977]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.304025]  kthread+0x337/0x6f0
[   17.304066]  ? trace_preempt_on+0x20/0xc0
[   17.304116]  ? __pfx_kthread+0x10/0x10
[   17.304150]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.304183]  ? calculate_sigpending+0x7b/0xa0
[   17.304225]  ? __pfx_kthread+0x10/0x10
[   17.304266]  ret_from_fork+0x116/0x1d0
[   17.304305]  ? __pfx_kthread+0x10/0x10
[   17.304345]  ret_from_fork_asm+0x1a/0x30
[   17.304409]  </TASK>
[   17.304436] 
[   17.313415] Allocated by task 283:
[   17.313596]  kasan_save_stack+0x45/0x70
[   17.313795]  kasan_save_track+0x18/0x40
[   17.313972]  kasan_save_alloc_info+0x3b/0x50
[   17.314166]  __kasan_kmalloc+0xb7/0xc0
[   17.314451]  __kmalloc_cache_noprof+0x189/0x420
[   17.314802]  kasan_atomics+0x95/0x310
[   17.315155]  kunit_try_run_case+0x1a5/0x480
[   17.315459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.315815]  kthread+0x337/0x6f0
[   17.316068]  ret_from_fork+0x116/0x1d0
[   17.316287]  ret_from_fork_asm+0x1a/0x30
[   17.316463] 
[   17.316572] The buggy address belongs to the object at ffff888102ac4100
[   17.316572]  which belongs to the cache kmalloc-64 of size 64
[   17.316950] The buggy address is located 0 bytes to the right of
[   17.316950]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.317344] 
[   17.317496] The buggy address belongs to the physical page:
[   17.317838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.318434] flags: 0x200000000000000(node=0|zone=2)
[   17.318780] page_type: f5(slab)
[   17.319042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.319688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.320160] page dumped because: kasan: bad access detected
[   17.320517] 
[   17.320689] Memory state around the buggy address:
[   17.320919]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.321338]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.321579] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.321825]                                      ^
[   17.322016]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.322251]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.322511] ==================================================================
[   16.217412] ==================================================================
[   16.218185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   16.218594] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.219111] 
[   16.219307] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.219395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.219418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.219453] Call Trace:
[   16.219482]  <TASK>
[   16.219514]  dump_stack_lvl+0x73/0xb0
[   16.219591]  print_report+0xd1/0x650
[   16.219656]  ? __virt_addr_valid+0x1db/0x2d0
[   16.219697]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.219737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.219768]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.219788]  kasan_report+0x141/0x180
[   16.219809]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.219834]  __asan_report_store4_noabort+0x1b/0x30
[   16.219857]  kasan_atomics_helper+0x4b6e/0x5450
[   16.219878]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.219907]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.219942]  ? trace_hardirqs_on+0x37/0xe0
[   16.219981]  ? kasan_atomics+0x152/0x310
[   16.220029]  kasan_atomics+0x1dc/0x310
[   16.220070]  ? __pfx_kasan_atomics+0x10/0x10
[   16.220111]  ? __pfx_kasan_atomics+0x10/0x10
[   16.220534]  kunit_try_run_case+0x1a5/0x480
[   16.220633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.220662]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.220686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.220708]  ? __kthread_parkme+0x82/0x180
[   16.220728]  ? preempt_count_sub+0x50/0x80
[   16.220751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.220773]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.220794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.220815]  kthread+0x337/0x6f0
[   16.220833]  ? trace_preempt_on+0x20/0xc0
[   16.220855]  ? __pfx_kthread+0x10/0x10
[   16.220874]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.220894]  ? calculate_sigpending+0x7b/0xa0
[   16.220916]  ? __pfx_kthread+0x10/0x10
[   16.220936]  ret_from_fork+0x116/0x1d0
[   16.220953]  ? __pfx_kthread+0x10/0x10
[   16.220971]  ret_from_fork_asm+0x1a/0x30
[   16.221000]  </TASK>
[   16.221012] 
[   16.234954] Allocated by task 283:
[   16.235431]  kasan_save_stack+0x45/0x70
[   16.235839]  kasan_save_track+0x18/0x40
[   16.236075]  kasan_save_alloc_info+0x3b/0x50
[   16.236661]  __kasan_kmalloc+0xb7/0xc0
[   16.236862]  __kmalloc_cache_noprof+0x189/0x420
[   16.237016]  kasan_atomics+0x95/0x310
[   16.237934]  kunit_try_run_case+0x1a5/0x480
[   16.238168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.238327]  kthread+0x337/0x6f0
[   16.238902]  ret_from_fork+0x116/0x1d0
[   16.239058]  ret_from_fork_asm+0x1a/0x30
[   16.239520] 
[   16.240067] The buggy address belongs to the object at ffff888102ac4100
[   16.240067]  which belongs to the cache kmalloc-64 of size 64
[   16.240804] The buggy address is located 0 bytes to the right of
[   16.240804]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.241849] 
[   16.242270] The buggy address belongs to the physical page:
[   16.242560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.243111] flags: 0x200000000000000(node=0|zone=2)
[   16.243516] page_type: f5(slab)
[   16.243959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.244450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.245014] page dumped because: kasan: bad access detected
[   16.245436] 
[   16.245799] Memory state around the buggy address:
[   16.246408]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.247047]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.247285] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.248017]                                      ^
[   16.248320]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.248907]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.249449] ==================================================================
[   16.803793] ==================================================================
[   16.804235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   16.804528] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.804871] 
[   16.805086] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.805224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.805251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.805308] Call Trace:
[   16.805340]  <TASK>
[   16.805385]  dump_stack_lvl+0x73/0xb0
[   16.805461]  print_report+0xd1/0x650
[   16.805516]  ? __virt_addr_valid+0x1db/0x2d0
[   16.805556]  ? kasan_atomics_helper+0xf10/0x5450
[   16.805595]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.805661]  ? kasan_atomics_helper+0xf10/0x5450
[   16.805706]  kasan_report+0x141/0x180
[   16.805752]  ? kasan_atomics_helper+0xf10/0x5450
[   16.805807]  kasan_check_range+0x10c/0x1c0
[   16.805854]  __kasan_check_write+0x18/0x20
[   16.805894]  kasan_atomics_helper+0xf10/0x5450
[   16.805947]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.805992]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.806041]  ? trace_hardirqs_on+0x37/0xe0
[   16.806086]  ? kasan_atomics+0x152/0x310
[   16.806174]  kasan_atomics+0x1dc/0x310
[   16.806216]  ? __pfx_kasan_atomics+0x10/0x10
[   16.806257]  ? __pfx_kasan_atomics+0x10/0x10
[   16.806306]  kunit_try_run_case+0x1a5/0x480
[   16.806393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.806433]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.806477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.806519]  ? __kthread_parkme+0x82/0x180
[   16.806587]  ? preempt_count_sub+0x50/0x80
[   16.806649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.806694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.806729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.806752]  kthread+0x337/0x6f0
[   16.806773]  ? trace_preempt_on+0x20/0xc0
[   16.806795]  ? __pfx_kthread+0x10/0x10
[   16.806815]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.806837]  ? calculate_sigpending+0x7b/0xa0
[   16.806860]  ? __pfx_kthread+0x10/0x10
[   16.806881]  ret_from_fork+0x116/0x1d0
[   16.806899]  ? __pfx_kthread+0x10/0x10
[   16.806920]  ret_from_fork_asm+0x1a/0x30
[   16.806950]  </TASK>
[   16.806963] 
[   16.817420] Allocated by task 283:
[   16.817991]  kasan_save_stack+0x45/0x70
[   16.818388]  kasan_save_track+0x18/0x40
[   16.818632]  kasan_save_alloc_info+0x3b/0x50
[   16.818823]  __kasan_kmalloc+0xb7/0xc0
[   16.819119]  __kmalloc_cache_noprof+0x189/0x420
[   16.819403]  kasan_atomics+0x95/0x310
[   16.819582]  kunit_try_run_case+0x1a5/0x480
[   16.819780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.820181]  kthread+0x337/0x6f0
[   16.820447]  ret_from_fork+0x116/0x1d0
[   16.820746]  ret_from_fork_asm+0x1a/0x30
[   16.821056] 
[   16.821232] The buggy address belongs to the object at ffff888102ac4100
[   16.821232]  which belongs to the cache kmalloc-64 of size 64
[   16.821766] The buggy address is located 0 bytes to the right of
[   16.821766]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.822242] 
[   16.822381] The buggy address belongs to the physical page:
[   16.822743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.823296] flags: 0x200000000000000(node=0|zone=2)
[   16.823694] page_type: f5(slab)
[   16.823912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.824286] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.824800] page dumped because: kasan: bad access detected
[   16.825027] 
[   16.825200] Memory state around the buggy address:
[   16.825555]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.825941]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.826313] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.826778]                                      ^
[   16.827030]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.827499]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.827815] ==================================================================
[   17.770404] ==================================================================
[   17.771035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   17.771409] Read of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.771774] 
[   17.771912] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.771995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.772022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.772063] Call Trace:
[   17.772090]  <TASK>
[   17.772148]  dump_stack_lvl+0x73/0xb0
[   17.772207]  print_report+0xd1/0x650
[   17.772247]  ? __virt_addr_valid+0x1db/0x2d0
[   17.772303]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.772392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.772446]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.772493]  kasan_report+0x141/0x180
[   17.772540]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.772596]  __asan_report_load8_noabort+0x18/0x20
[   17.772657]  kasan_atomics_helper+0x4fb2/0x5450
[   17.772696]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.772736]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.772777]  ? trace_hardirqs_on+0x37/0xe0
[   17.772826]  ? kasan_atomics+0x152/0x310
[   17.772886]  kasan_atomics+0x1dc/0x310
[   17.772933]  ? __pfx_kasan_atomics+0x10/0x10
[   17.772976]  ? __pfx_kasan_atomics+0x10/0x10
[   17.773026]  kunit_try_run_case+0x1a5/0x480
[   17.773074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.773128]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.773184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.773209]  ? __kthread_parkme+0x82/0x180
[   17.773229]  ? preempt_count_sub+0x50/0x80
[   17.773253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.773276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.773306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.773344]  kthread+0x337/0x6f0
[   17.773382]  ? trace_preempt_on+0x20/0xc0
[   17.773422]  ? __pfx_kthread+0x10/0x10
[   17.773455]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.773493]  ? calculate_sigpending+0x7b/0xa0
[   17.773535]  ? __pfx_kthread+0x10/0x10
[   17.773577]  ret_from_fork+0x116/0x1d0
[   17.773611]  ? __pfx_kthread+0x10/0x10
[   17.773665]  ret_from_fork_asm+0x1a/0x30
[   17.773725]  </TASK>
[   17.773750] 
[   17.782225] Allocated by task 283:
[   17.782445]  kasan_save_stack+0x45/0x70
[   17.782648]  kasan_save_track+0x18/0x40
[   17.782815]  kasan_save_alloc_info+0x3b/0x50
[   17.783108]  __kasan_kmalloc+0xb7/0xc0
[   17.783385]  __kmalloc_cache_noprof+0x189/0x420
[   17.783716]  kasan_atomics+0x95/0x310
[   17.784008]  kunit_try_run_case+0x1a5/0x480
[   17.784396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.784601]  kthread+0x337/0x6f0
[   17.784774]  ret_from_fork+0x116/0x1d0
[   17.784937]  ret_from_fork_asm+0x1a/0x30
[   17.785107] 
[   17.785215] The buggy address belongs to the object at ffff888102ac4100
[   17.785215]  which belongs to the cache kmalloc-64 of size 64
[   17.786004] The buggy address is located 0 bytes to the right of
[   17.786004]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.786720] 
[   17.786813] The buggy address belongs to the physical page:
[   17.786974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.787357] flags: 0x200000000000000(node=0|zone=2)
[   17.787657] page_type: f5(slab)
[   17.787818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.788073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.790687] page dumped because: kasan: bad access detected
[   17.791081] 
[   17.791182] Memory state around the buggy address:
[   17.791370]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.791605]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.791847] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.792062]                                      ^
[   17.792230]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.792481]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.792781] ==================================================================
[   16.931313] ==================================================================
[   16.932379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   16.932814] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.933304] 
[   16.934096] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.934177] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.934191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.934213] Call Trace:
[   16.934230]  <TASK>
[   16.934247]  dump_stack_lvl+0x73/0xb0
[   16.934281]  print_report+0xd1/0x650
[   16.934303]  ? __virt_addr_valid+0x1db/0x2d0
[   16.934325]  ? kasan_atomics_helper+0x1148/0x5450
[   16.934346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.934371]  ? kasan_atomics_helper+0x1148/0x5450
[   16.934392]  kasan_report+0x141/0x180
[   16.934414]  ? kasan_atomics_helper+0x1148/0x5450
[   16.934439]  kasan_check_range+0x10c/0x1c0
[   16.934461]  __kasan_check_write+0x18/0x20
[   16.934481]  kasan_atomics_helper+0x1148/0x5450
[   16.934502]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.934524]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.934547]  ? trace_hardirqs_on+0x37/0xe0
[   16.934569]  ? kasan_atomics+0x152/0x310
[   16.934595]  kasan_atomics+0x1dc/0x310
[   16.934634]  ? __pfx_kasan_atomics+0x10/0x10
[   16.934659]  ? __pfx_kasan_atomics+0x10/0x10
[   16.934686]  kunit_try_run_case+0x1a5/0x480
[   16.934710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.934731]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.934753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.934775]  ? __kthread_parkme+0x82/0x180
[   16.934795]  ? preempt_count_sub+0x50/0x80
[   16.934818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.934841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.934862]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.934885]  kthread+0x337/0x6f0
[   16.934904]  ? trace_preempt_on+0x20/0xc0
[   16.934926]  ? __pfx_kthread+0x10/0x10
[   16.934946]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.934967]  ? calculate_sigpending+0x7b/0xa0
[   16.934990]  ? __pfx_kthread+0x10/0x10
[   16.935010]  ret_from_fork+0x116/0x1d0
[   16.935029]  ? __pfx_kthread+0x10/0x10
[   16.935049]  ret_from_fork_asm+0x1a/0x30
[   16.935079]  </TASK>
[   16.935092] 
[   16.946084] Allocated by task 283:
[   16.946304]  kasan_save_stack+0x45/0x70
[   16.946517]  kasan_save_track+0x18/0x40
[   16.946712]  kasan_save_alloc_info+0x3b/0x50
[   16.946902]  __kasan_kmalloc+0xb7/0xc0
[   16.947073]  __kmalloc_cache_noprof+0x189/0x420
[   16.948105]  kasan_atomics+0x95/0x310
[   16.948307]  kunit_try_run_case+0x1a5/0x480
[   16.948523]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.948756]  kthread+0x337/0x6f0
[   16.948918]  ret_from_fork+0x116/0x1d0
[   16.949091]  ret_from_fork_asm+0x1a/0x30
[   16.949286] 
[   16.949387] The buggy address belongs to the object at ffff888102ac4100
[   16.949387]  which belongs to the cache kmalloc-64 of size 64
[   16.949859] The buggy address is located 0 bytes to the right of
[   16.949859]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.951275] 
[   16.951405] The buggy address belongs to the physical page:
[   16.952001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.952528] flags: 0x200000000000000(node=0|zone=2)
[   16.952909] page_type: f5(slab)
[   16.953114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.953712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.954034] page dumped because: kasan: bad access detected
[   16.954659] 
[   16.954900] Memory state around the buggy address:
[   16.955154]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.955662]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.956106] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.956380]                                      ^
[   16.956768]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.957157]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.957806] ==================================================================
[   17.744729] ==================================================================
[   17.745157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   17.745436] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.745806] 
[   17.745989] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.746072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.746125] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.746170] Call Trace:
[   17.746220]  <TASK>
[   17.746252]  dump_stack_lvl+0x73/0xb0
[   17.746306]  print_report+0xd1/0x650
[   17.746344]  ? __virt_addr_valid+0x1db/0x2d0
[   17.746381]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.746419]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.746467]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.746531]  kasan_report+0x141/0x180
[   17.746570]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.746631]  kasan_check_range+0x10c/0x1c0
[   17.746678]  __kasan_check_write+0x18/0x20
[   17.746736]  kasan_atomics_helper+0x20c8/0x5450
[   17.746781]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.746824]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.746874]  ? trace_hardirqs_on+0x37/0xe0
[   17.746920]  ? kasan_atomics+0x152/0x310
[   17.746977]  kasan_atomics+0x1dc/0x310
[   17.747024]  ? __pfx_kasan_atomics+0x10/0x10
[   17.747071]  ? __pfx_kasan_atomics+0x10/0x10
[   17.747159]  kunit_try_run_case+0x1a5/0x480
[   17.747212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.747259]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.747306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.747345]  ? __kthread_parkme+0x82/0x180
[   17.747383]  ? preempt_count_sub+0x50/0x80
[   17.747427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.747496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.747539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.747591]  kthread+0x337/0x6f0
[   17.747645]  ? trace_preempt_on+0x20/0xc0
[   17.747706]  ? __pfx_kthread+0x10/0x10
[   17.747745]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.747783]  ? calculate_sigpending+0x7b/0xa0
[   17.747826]  ? __pfx_kthread+0x10/0x10
[   17.747867]  ret_from_fork+0x116/0x1d0
[   17.747919]  ? __pfx_kthread+0x10/0x10
[   17.747961]  ret_from_fork_asm+0x1a/0x30
[   17.748018]  </TASK>
[   17.748043] 
[   17.758225] Allocated by task 283:
[   17.758402]  kasan_save_stack+0x45/0x70
[   17.758593]  kasan_save_track+0x18/0x40
[   17.758774]  kasan_save_alloc_info+0x3b/0x50
[   17.759159]  __kasan_kmalloc+0xb7/0xc0
[   17.759565]  __kmalloc_cache_noprof+0x189/0x420
[   17.759994]  kasan_atomics+0x95/0x310
[   17.760363]  kunit_try_run_case+0x1a5/0x480
[   17.760719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.761187]  kthread+0x337/0x6f0
[   17.761629]  ret_from_fork+0x116/0x1d0
[   17.761983]  ret_from_fork_asm+0x1a/0x30
[   17.762363] 
[   17.762552] The buggy address belongs to the object at ffff888102ac4100
[   17.762552]  which belongs to the cache kmalloc-64 of size 64
[   17.763345] The buggy address is located 0 bytes to the right of
[   17.763345]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.764140] 
[   17.764331] The buggy address belongs to the physical page:
[   17.764659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.765015] flags: 0x200000000000000(node=0|zone=2)
[   17.765268] page_type: f5(slab)
[   17.765521] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.765893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.766453] page dumped because: kasan: bad access detected
[   17.766982] 
[   17.767091] Memory state around the buggy address:
[   17.767463]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.767929]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.768456] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.768758]                                      ^
[   17.769163]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.769512]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.769783] ==================================================================
[   16.778236] ==================================================================
[   16.778806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   16.779993] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.780494] 
[   16.780691] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.780774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.780797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.780834] Call Trace:
[   16.780864]  <TASK>
[   16.780894]  dump_stack_lvl+0x73/0xb0
[   16.780953]  print_report+0xd1/0x650
[   16.780997]  ? __virt_addr_valid+0x1db/0x2d0
[   16.781041]  ? kasan_atomics_helper+0xe78/0x5450
[   16.781080]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.781166]  ? kasan_atomics_helper+0xe78/0x5450
[   16.781212]  kasan_report+0x141/0x180
[   16.781251]  ? kasan_atomics_helper+0xe78/0x5450
[   16.781295]  kasan_check_range+0x10c/0x1c0
[   16.781337]  __kasan_check_write+0x18/0x20
[   16.781376]  kasan_atomics_helper+0xe78/0x5450
[   16.781420]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.781465]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.781513]  ? trace_hardirqs_on+0x37/0xe0
[   16.781558]  ? kasan_atomics+0x152/0x310
[   16.781625]  kasan_atomics+0x1dc/0x310
[   16.781674]  ? __pfx_kasan_atomics+0x10/0x10
[   16.781724]  ? __pfx_kasan_atomics+0x10/0x10
[   16.781777]  kunit_try_run_case+0x1a5/0x480
[   16.781818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.781841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.781865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.781888]  ? __kthread_parkme+0x82/0x180
[   16.781908]  ? preempt_count_sub+0x50/0x80
[   16.781943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.781967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.781989]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.782011]  kthread+0x337/0x6f0
[   16.782031]  ? trace_preempt_on+0x20/0xc0
[   16.782053]  ? __pfx_kthread+0x10/0x10
[   16.782073]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.782094]  ? calculate_sigpending+0x7b/0xa0
[   16.782142]  ? __pfx_kthread+0x10/0x10
[   16.782164]  ret_from_fork+0x116/0x1d0
[   16.782183]  ? __pfx_kthread+0x10/0x10
[   16.782203]  ret_from_fork_asm+0x1a/0x30
[   16.782233]  </TASK>
[   16.782248] 
[   16.791725] Allocated by task 283:
[   16.792014]  kasan_save_stack+0x45/0x70
[   16.792416]  kasan_save_track+0x18/0x40
[   16.792726]  kasan_save_alloc_info+0x3b/0x50
[   16.793026]  __kasan_kmalloc+0xb7/0xc0
[   16.793353]  __kmalloc_cache_noprof+0x189/0x420
[   16.793591]  kasan_atomics+0x95/0x310
[   16.793779]  kunit_try_run_case+0x1a5/0x480
[   16.793966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.794166]  kthread+0x337/0x6f0
[   16.794322]  ret_from_fork+0x116/0x1d0
[   16.794485]  ret_from_fork_asm+0x1a/0x30
[   16.794684] 
[   16.794850] The buggy address belongs to the object at ffff888102ac4100
[   16.794850]  which belongs to the cache kmalloc-64 of size 64
[   16.795671] The buggy address is located 0 bytes to the right of
[   16.795671]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.797258] 
[   16.797388] The buggy address belongs to the physical page:
[   16.797714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.798094] flags: 0x200000000000000(node=0|zone=2)
[   16.798368] page_type: f5(slab)
[   16.798527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.799487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.800075] page dumped because: kasan: bad access detected
[   16.800484] 
[   16.800656] Memory state around the buggy address:
[   16.800968]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.801435]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.801759] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.802033]                                      ^
[   16.802391]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.802678]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.803103] ==================================================================
[   17.536483] ==================================================================
[   17.536955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   17.537419] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.537835] 
[   17.537930] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.537979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.537992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.538015] Call Trace:
[   17.538032]  <TASK>
[   17.538049]  dump_stack_lvl+0x73/0xb0
[   17.538081]  print_report+0xd1/0x650
[   17.538145]  ? __virt_addr_valid+0x1db/0x2d0
[   17.538192]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.538231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.538396]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.538450]  kasan_report+0x141/0x180
[   17.538494]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.538559]  kasan_check_range+0x10c/0x1c0
[   17.538598]  __kasan_check_write+0x18/0x20
[   17.538660]  kasan_atomics_helper+0x1ce1/0x5450
[   17.538698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.538736]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.538781]  ? trace_hardirqs_on+0x37/0xe0
[   17.538824]  ? kasan_atomics+0x152/0x310
[   17.538877]  kasan_atomics+0x1dc/0x310
[   17.538916]  ? __pfx_kasan_atomics+0x10/0x10
[   17.538950]  ? __pfx_kasan_atomics+0x10/0x10
[   17.538999]  kunit_try_run_case+0x1a5/0x480
[   17.539047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.539089]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.539130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.539182]  ? __kthread_parkme+0x82/0x180
[   17.539202]  ? preempt_count_sub+0x50/0x80
[   17.539227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.539250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.539272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.539295]  kthread+0x337/0x6f0
[   17.539315]  ? trace_preempt_on+0x20/0xc0
[   17.539336]  ? __pfx_kthread+0x10/0x10
[   17.539357]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.539377]  ? calculate_sigpending+0x7b/0xa0
[   17.539401]  ? __pfx_kthread+0x10/0x10
[   17.539422]  ret_from_fork+0x116/0x1d0
[   17.539440]  ? __pfx_kthread+0x10/0x10
[   17.539460]  ret_from_fork_asm+0x1a/0x30
[   17.539490]  </TASK>
[   17.539503] 
[   17.550558] Allocated by task 283:
[   17.550719]  kasan_save_stack+0x45/0x70
[   17.550905]  kasan_save_track+0x18/0x40
[   17.551076]  kasan_save_alloc_info+0x3b/0x50
[   17.551301]  __kasan_kmalloc+0xb7/0xc0
[   17.551598]  __kmalloc_cache_noprof+0x189/0x420
[   17.551945]  kasan_atomics+0x95/0x310
[   17.552231]  kunit_try_run_case+0x1a5/0x480
[   17.553153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.553397]  kthread+0x337/0x6f0
[   17.553665]  ret_from_fork+0x116/0x1d0
[   17.553873]  ret_from_fork_asm+0x1a/0x30
[   17.554043] 
[   17.554696] The buggy address belongs to the object at ffff888102ac4100
[   17.554696]  which belongs to the cache kmalloc-64 of size 64
[   17.555381] The buggy address is located 0 bytes to the right of
[   17.555381]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.556258] 
[   17.556362] The buggy address belongs to the physical page:
[   17.556836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.557555] flags: 0x200000000000000(node=0|zone=2)
[   17.557822] page_type: f5(slab)
[   17.557968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.558564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.558874] page dumped because: kasan: bad access detected
[   17.559130] 
[   17.559573] Memory state around the buggy address:
[   17.559975]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.560405]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.560830] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.561426]                                      ^
[   17.561686]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.562316]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.562692] ==================================================================
[   16.341114] ==================================================================
[   16.341750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   16.342000] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.342272] 
[   16.342530] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.342641] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.342664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.342703] Call Trace:
[   16.342730]  <TASK>
[   16.342759]  dump_stack_lvl+0x73/0xb0
[   16.342820]  print_report+0xd1/0x650
[   16.342864]  ? __virt_addr_valid+0x1db/0x2d0
[   16.342902]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.342940]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.342985]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.343310]  kasan_report+0x141/0x180
[   16.343354]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.343403]  __asan_report_store4_noabort+0x1b/0x30
[   16.343453]  kasan_atomics_helper+0x4b3a/0x5450
[   16.343500]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.343544]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.343588]  ? trace_hardirqs_on+0x37/0xe0
[   16.343651]  ? kasan_atomics+0x152/0x310
[   16.343705]  kasan_atomics+0x1dc/0x310
[   16.343743]  ? __pfx_kasan_atomics+0x10/0x10
[   16.343781]  ? __pfx_kasan_atomics+0x10/0x10
[   16.343822]  kunit_try_run_case+0x1a5/0x480
[   16.343862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.343886]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.343910]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.343933]  ? __kthread_parkme+0x82/0x180
[   16.343953]  ? preempt_count_sub+0x50/0x80
[   16.343977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.344000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.344022]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.344045]  kthread+0x337/0x6f0
[   16.344066]  ? trace_preempt_on+0x20/0xc0
[   16.344087]  ? __pfx_kthread+0x10/0x10
[   16.344114]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.344138]  ? calculate_sigpending+0x7b/0xa0
[   16.344161]  ? __pfx_kthread+0x10/0x10
[   16.344183]  ret_from_fork+0x116/0x1d0
[   16.344201]  ? __pfx_kthread+0x10/0x10
[   16.344222]  ret_from_fork_asm+0x1a/0x30
[   16.344251]  </TASK>
[   16.344264] 
[   16.355923] Allocated by task 283:
[   16.356178]  kasan_save_stack+0x45/0x70
[   16.356460]  kasan_save_track+0x18/0x40
[   16.357567]  kasan_save_alloc_info+0x3b/0x50
[   16.357755]  __kasan_kmalloc+0xb7/0xc0
[   16.358588]  __kmalloc_cache_noprof+0x189/0x420
[   16.358888]  kasan_atomics+0x95/0x310
[   16.359044]  kunit_try_run_case+0x1a5/0x480
[   16.359787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.360004]  kthread+0x337/0x6f0
[   16.360144]  ret_from_fork+0x116/0x1d0
[   16.360655]  ret_from_fork_asm+0x1a/0x30
[   16.361018] 
[   16.361226] The buggy address belongs to the object at ffff888102ac4100
[   16.361226]  which belongs to the cache kmalloc-64 of size 64
[   16.362007] The buggy address is located 0 bytes to the right of
[   16.362007]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.363572] 
[   16.363770] The buggy address belongs to the physical page:
[   16.364349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.364811] flags: 0x200000000000000(node=0|zone=2)
[   16.365142] page_type: f5(slab)
[   16.365725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.365977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.366664] page dumped because: kasan: bad access detected
[   16.367394] 
[   16.367569] Memory state around the buggy address:
[   16.368071]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.368446]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.369543] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.369848]                                      ^
[   16.370051]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.370838]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.371204] ==================================================================
[   17.323481] ==================================================================
[   17.324050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   17.324568] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.325069] 
[   17.325294] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.325380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.325407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.325447] Call Trace:
[   17.325477]  <TASK>
[   17.325509]  dump_stack_lvl+0x73/0xb0
[   17.325567]  print_report+0xd1/0x650
[   17.325612]  ? __virt_addr_valid+0x1db/0x2d0
[   17.325674]  ? kasan_atomics_helper+0x1818/0x5450
[   17.325717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.325769]  ? kasan_atomics_helper+0x1818/0x5450
[   17.325814]  kasan_report+0x141/0x180
[   17.325860]  ? kasan_atomics_helper+0x1818/0x5450
[   17.325922]  kasan_check_range+0x10c/0x1c0
[   17.325971]  __kasan_check_write+0x18/0x20
[   17.326013]  kasan_atomics_helper+0x1818/0x5450
[   17.326059]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.326105]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.326149]  ? trace_hardirqs_on+0x37/0xe0
[   17.326184]  ? kasan_atomics+0x152/0x310
[   17.326230]  kasan_atomics+0x1dc/0x310
[   17.326272]  ? __pfx_kasan_atomics+0x10/0x10
[   17.326313]  ? __pfx_kasan_atomics+0x10/0x10
[   17.326367]  kunit_try_run_case+0x1a5/0x480
[   17.326417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.326463]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.326511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.326556]  ? __kthread_parkme+0x82/0x180
[   17.326599]  ? preempt_count_sub+0x50/0x80
[   17.326664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.326705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.326742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.326783]  kthread+0x337/0x6f0
[   17.326817]  ? trace_preempt_on+0x20/0xc0
[   17.326857]  ? __pfx_kthread+0x10/0x10
[   17.326890]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.326927]  ? calculate_sigpending+0x7b/0xa0
[   17.326970]  ? __pfx_kthread+0x10/0x10
[   17.327011]  ret_from_fork+0x116/0x1d0
[   17.327050]  ? __pfx_kthread+0x10/0x10
[   17.327088]  ret_from_fork_asm+0x1a/0x30
[   17.327161]  </TASK>
[   17.327187] 
[   17.335573] Allocated by task 283:
[   17.335758]  kasan_save_stack+0x45/0x70
[   17.335947]  kasan_save_track+0x18/0x40
[   17.336113]  kasan_save_alloc_info+0x3b/0x50
[   17.336434]  __kasan_kmalloc+0xb7/0xc0
[   17.336747]  __kmalloc_cache_noprof+0x189/0x420
[   17.337091]  kasan_atomics+0x95/0x310
[   17.337386]  kunit_try_run_case+0x1a5/0x480
[   17.337696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.338085]  kthread+0x337/0x6f0
[   17.338351]  ret_from_fork+0x116/0x1d0
[   17.338642]  ret_from_fork_asm+0x1a/0x30
[   17.338820] 
[   17.338930] The buggy address belongs to the object at ffff888102ac4100
[   17.338930]  which belongs to the cache kmalloc-64 of size 64
[   17.339684] The buggy address is located 0 bytes to the right of
[   17.339684]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.340446] 
[   17.340605] The buggy address belongs to the physical page:
[   17.340848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.341114] flags: 0x200000000000000(node=0|zone=2)
[   17.341489] page_type: f5(slab)
[   17.341765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.342308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.342580] page dumped because: kasan: bad access detected
[   17.342796] 
[   17.342901] Memory state around the buggy address:
[   17.343088]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.343585]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.344065] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.344547]                                      ^
[   17.344895]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.345225]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.345521] ==================================================================
[   17.222041] ==================================================================
[   17.222672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   17.223271] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.223705] 
[   17.223911] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.223996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.224021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.224056] Call Trace:
[   17.224086]  <TASK>
[   17.224177]  dump_stack_lvl+0x73/0xb0
[   17.224239]  print_report+0xd1/0x650
[   17.224277]  ? __virt_addr_valid+0x1db/0x2d0
[   17.224316]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.224349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.224392]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.224432]  kasan_report+0x141/0x180
[   17.224473]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.224526]  kasan_check_range+0x10c/0x1c0
[   17.224573]  __kasan_check_write+0x18/0x20
[   17.224627]  kasan_atomics_helper+0x15b6/0x5450
[   17.224672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.224715]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.224761]  ? trace_hardirqs_on+0x37/0xe0
[   17.224805]  ? kasan_atomics+0x152/0x310
[   17.224859]  kasan_atomics+0x1dc/0x310
[   17.224901]  ? __pfx_kasan_atomics+0x10/0x10
[   17.224966]  ? __pfx_kasan_atomics+0x10/0x10
[   17.225014]  kunit_try_run_case+0x1a5/0x480
[   17.225058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.225132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.225183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.225231]  ? __kthread_parkme+0x82/0x180
[   17.225272]  ? preempt_count_sub+0x50/0x80
[   17.225322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.225370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.225416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.225455]  kthread+0x337/0x6f0
[   17.225477]  ? trace_preempt_on+0x20/0xc0
[   17.225499]  ? __pfx_kthread+0x10/0x10
[   17.225520]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.225542]  ? calculate_sigpending+0x7b/0xa0
[   17.225565]  ? __pfx_kthread+0x10/0x10
[   17.225587]  ret_from_fork+0x116/0x1d0
[   17.225606]  ? __pfx_kthread+0x10/0x10
[   17.225644]  ret_from_fork_asm+0x1a/0x30
[   17.225674]  </TASK>
[   17.225687] 
[   17.235403] Allocated by task 283:
[   17.235742]  kasan_save_stack+0x45/0x70
[   17.236143]  kasan_save_track+0x18/0x40
[   17.236495]  kasan_save_alloc_info+0x3b/0x50
[   17.236878]  __kasan_kmalloc+0xb7/0xc0
[   17.237220]  __kmalloc_cache_noprof+0x189/0x420
[   17.237522]  kasan_atomics+0x95/0x310
[   17.237822]  kunit_try_run_case+0x1a5/0x480
[   17.238172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.238533]  kthread+0x337/0x6f0
[   17.238841]  ret_from_fork+0x116/0x1d0
[   17.239140]  ret_from_fork_asm+0x1a/0x30
[   17.239410] 
[   17.239624] The buggy address belongs to the object at ffff888102ac4100
[   17.239624]  which belongs to the cache kmalloc-64 of size 64
[   17.240293] The buggy address is located 0 bytes to the right of
[   17.240293]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.240922] 
[   17.241094] The buggy address belongs to the physical page:
[   17.241573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.241989] flags: 0x200000000000000(node=0|zone=2)
[   17.242448] page_type: f5(slab)
[   17.242747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.243257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.243640] page dumped because: kasan: bad access detected
[   17.244027] 
[   17.244244] Memory state around the buggy address:
[   17.244588]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.245037]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.245489] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.245933]                                      ^
[   17.246307]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.246731]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.247022] ==================================================================
[   16.674025] ==================================================================
[   16.674511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   16.675110] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.675664] 
[   16.675883] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.675976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.676004] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.676058] Call Trace:
[   16.676084]  <TASK>
[   16.676112]  dump_stack_lvl+0x73/0xb0
[   16.676170]  print_report+0xd1/0x650
[   16.676210]  ? __virt_addr_valid+0x1db/0x2d0
[   16.676252]  ? kasan_atomics_helper+0xc70/0x5450
[   16.676293]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.676367]  ? kasan_atomics_helper+0xc70/0x5450
[   16.676411]  kasan_report+0x141/0x180
[   16.676463]  ? kasan_atomics_helper+0xc70/0x5450
[   16.676520]  kasan_check_range+0x10c/0x1c0
[   16.676570]  __kasan_check_write+0x18/0x20
[   16.676604]  kasan_atomics_helper+0xc70/0x5450
[   16.676652]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.676676]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.676699]  ? trace_hardirqs_on+0x37/0xe0
[   16.676722]  ? kasan_atomics+0x152/0x310
[   16.676749]  kasan_atomics+0x1dc/0x310
[   16.676771]  ? __pfx_kasan_atomics+0x10/0x10
[   16.676794]  ? __pfx_kasan_atomics+0x10/0x10
[   16.676820]  kunit_try_run_case+0x1a5/0x480
[   16.676844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.676865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.676887]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.676909]  ? __kthread_parkme+0x82/0x180
[   16.676929]  ? preempt_count_sub+0x50/0x80
[   16.676952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.676975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.676996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.677018]  kthread+0x337/0x6f0
[   16.677038]  ? trace_preempt_on+0x20/0xc0
[   16.677059]  ? __pfx_kthread+0x10/0x10
[   16.677079]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.677109]  ? calculate_sigpending+0x7b/0xa0
[   16.677147]  ? __pfx_kthread+0x10/0x10
[   16.677167]  ret_from_fork+0x116/0x1d0
[   16.677186]  ? __pfx_kthread+0x10/0x10
[   16.677205]  ret_from_fork_asm+0x1a/0x30
[   16.677235]  </TASK>
[   16.677247] 
[   16.687428] Allocated by task 283:
[   16.687666]  kasan_save_stack+0x45/0x70
[   16.687986]  kasan_save_track+0x18/0x40
[   16.688303]  kasan_save_alloc_info+0x3b/0x50
[   16.688567]  __kasan_kmalloc+0xb7/0xc0
[   16.688751]  __kmalloc_cache_noprof+0x189/0x420
[   16.688943]  kasan_atomics+0x95/0x310
[   16.689109]  kunit_try_run_case+0x1a5/0x480
[   16.689366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.689750]  kthread+0x337/0x6f0
[   16.690055]  ret_from_fork+0x116/0x1d0
[   16.690396]  ret_from_fork_asm+0x1a/0x30
[   16.690892] 
[   16.691246] The buggy address belongs to the object at ffff888102ac4100
[   16.691246]  which belongs to the cache kmalloc-64 of size 64
[   16.692130] The buggy address is located 0 bytes to the right of
[   16.692130]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.692737] 
[   16.692885] The buggy address belongs to the physical page:
[   16.693210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.693850] flags: 0x200000000000000(node=0|zone=2)
[   16.694090] page_type: f5(slab)
[   16.694362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.694777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.695230] page dumped because: kasan: bad access detected
[   16.695413] 
[   16.695569] Memory state around the buggy address:
[   16.695864]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.696300]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.696758] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.697756]                                      ^
[   16.698063]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.698519]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.699010] ==================================================================
[   16.309286] ==================================================================
[   16.310173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   16.310591] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.311277] 
[   16.311492] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.311737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.311766] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.311808] Call Trace:
[   16.311839]  <TASK>
[   16.311870]  dump_stack_lvl+0x73/0xb0
[   16.311922]  print_report+0xd1/0x650
[   16.311960]  ? __virt_addr_valid+0x1db/0x2d0
[   16.312001]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.312063]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.312139]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.312183]  kasan_report+0x141/0x180
[   16.312241]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.312289]  kasan_check_range+0x10c/0x1c0
[   16.312367]  __kasan_check_write+0x18/0x20
[   16.312406]  kasan_atomics_helper+0x4a0/0x5450
[   16.312448]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.312471]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.312495]  ? trace_hardirqs_on+0x37/0xe0
[   16.312556]  ? kasan_atomics+0x152/0x310
[   16.312594]  kasan_atomics+0x1dc/0x310
[   16.312645]  ? __pfx_kasan_atomics+0x10/0x10
[   16.312677]  ? __pfx_kasan_atomics+0x10/0x10
[   16.312703]  kunit_try_run_case+0x1a5/0x480
[   16.312727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.312748]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.312772]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.312794]  ? __kthread_parkme+0x82/0x180
[   16.312814]  ? preempt_count_sub+0x50/0x80
[   16.312837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.312860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.312882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.312904]  kthread+0x337/0x6f0
[   16.312924]  ? trace_preempt_on+0x20/0xc0
[   16.312946]  ? __pfx_kthread+0x10/0x10
[   16.312967]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.312986]  ? calculate_sigpending+0x7b/0xa0
[   16.313009]  ? __pfx_kthread+0x10/0x10
[   16.313030]  ret_from_fork+0x116/0x1d0
[   16.313048]  ? __pfx_kthread+0x10/0x10
[   16.313067]  ret_from_fork_asm+0x1a/0x30
[   16.313098]  </TASK>
[   16.313115] 
[   16.326476] Allocated by task 283:
[   16.327013]  kasan_save_stack+0x45/0x70
[   16.327343]  kasan_save_track+0x18/0x40
[   16.327510]  kasan_save_alloc_info+0x3b/0x50
[   16.327864]  __kasan_kmalloc+0xb7/0xc0
[   16.328065]  __kmalloc_cache_noprof+0x189/0x420
[   16.328654]  kasan_atomics+0x95/0x310
[   16.328873]  kunit_try_run_case+0x1a5/0x480
[   16.329217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.329451]  kthread+0x337/0x6f0
[   16.329963]  ret_from_fork+0x116/0x1d0
[   16.330212]  ret_from_fork_asm+0x1a/0x30
[   16.330500] 
[   16.330681] The buggy address belongs to the object at ffff888102ac4100
[   16.330681]  which belongs to the cache kmalloc-64 of size 64
[   16.331634] The buggy address is located 0 bytes to the right of
[   16.331634]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.332548] 
[   16.332701] The buggy address belongs to the physical page:
[   16.333028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.333863] flags: 0x200000000000000(node=0|zone=2)
[   16.334083] page_type: f5(slab)
[   16.334350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.335048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.335461] page dumped because: kasan: bad access detected
[   16.335713] 
[   16.335873] Memory state around the buggy address:
[   16.336189]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.336467]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.337393] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.337908]                                      ^
[   16.338561]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.338928]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.339688] ==================================================================
[   16.724031] ==================================================================
[   16.724791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   16.725096] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.725440] 
[   16.725640] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.725729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.725756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.725798] Call Trace:
[   16.725830]  <TASK>
[   16.725862]  dump_stack_lvl+0x73/0xb0
[   16.725919]  print_report+0xd1/0x650
[   16.725960]  ? __virt_addr_valid+0x1db/0x2d0
[   16.726000]  ? kasan_atomics_helper+0xd47/0x5450
[   16.726037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.726079]  ? kasan_atomics_helper+0xd47/0x5450
[   16.726152]  kasan_report+0x141/0x180
[   16.726198]  ? kasan_atomics_helper+0xd47/0x5450
[   16.726251]  kasan_check_range+0x10c/0x1c0
[   16.726294]  __kasan_check_write+0x18/0x20
[   16.726329]  kasan_atomics_helper+0xd47/0x5450
[   16.726372]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.726415]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.726461]  ? trace_hardirqs_on+0x37/0xe0
[   16.726502]  ? kasan_atomics+0x152/0x310
[   16.726552]  kasan_atomics+0x1dc/0x310
[   16.726596]  ? __pfx_kasan_atomics+0x10/0x10
[   16.726655]  ? __pfx_kasan_atomics+0x10/0x10
[   16.726689]  kunit_try_run_case+0x1a5/0x480
[   16.726714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.726737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.726760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.726781]  ? __kthread_parkme+0x82/0x180
[   16.726801]  ? preempt_count_sub+0x50/0x80
[   16.726837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.726879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.726923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.726963]  kthread+0x337/0x6f0
[   16.726996]  ? trace_preempt_on+0x20/0xc0
[   16.727038]  ? __pfx_kthread+0x10/0x10
[   16.727085]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.727158]  ? calculate_sigpending+0x7b/0xa0
[   16.727200]  ? __pfx_kthread+0x10/0x10
[   16.727237]  ret_from_fork+0x116/0x1d0
[   16.727273]  ? __pfx_kthread+0x10/0x10
[   16.727313]  ret_from_fork_asm+0x1a/0x30
[   16.727375]  </TASK>
[   16.727399] 
[   16.742527] Allocated by task 283:
[   16.742837]  kasan_save_stack+0x45/0x70
[   16.743060]  kasan_save_track+0x18/0x40
[   16.743314]  kasan_save_alloc_info+0x3b/0x50
[   16.743500]  __kasan_kmalloc+0xb7/0xc0
[   16.743722]  __kmalloc_cache_noprof+0x189/0x420
[   16.744022]  kasan_atomics+0x95/0x310
[   16.744320]  kunit_try_run_case+0x1a5/0x480
[   16.744658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.745016]  kthread+0x337/0x6f0
[   16.745275]  ret_from_fork+0x116/0x1d0
[   16.745508]  ret_from_fork_asm+0x1a/0x30
[   16.745694] 
[   16.745807] The buggy address belongs to the object at ffff888102ac4100
[   16.745807]  which belongs to the cache kmalloc-64 of size 64
[   16.746231] The buggy address is located 0 bytes to the right of
[   16.746231]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.747035] 
[   16.747216] The buggy address belongs to the physical page:
[   16.747606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.748052] flags: 0x200000000000000(node=0|zone=2)
[   16.748381] page_type: f5(slab)
[   16.748646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.748972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.749309] page dumped because: kasan: bad access detected
[   16.749645] 
[   16.749801] Memory state around the buggy address:
[   16.750179]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.750468]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.750812] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.751289]                                      ^
[   16.751523]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.751982]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.752280] ==================================================================
[   17.424704] ==================================================================
[   17.425310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   17.425760] Write of size 8 at addr ffff888102ac4130 by task kunit_try_catch/283
[   17.426188] 
[   17.426429] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.426539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.426581] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.426638] Call Trace:
[   17.426668]  <TASK>
[   17.426719]  dump_stack_lvl+0x73/0xb0
[   17.426795]  print_report+0xd1/0x650
[   17.426839]  ? __virt_addr_valid+0x1db/0x2d0
[   17.426911]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.426956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.427008]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.427052]  kasan_report+0x141/0x180
[   17.427095]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.427201]  kasan_check_range+0x10c/0x1c0
[   17.427263]  __kasan_check_write+0x18/0x20
[   17.427304]  kasan_atomics_helper+0x1a7f/0x5450
[   17.427363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.427419]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.427468]  ? trace_hardirqs_on+0x37/0xe0
[   17.427513]  ? kasan_atomics+0x152/0x310
[   17.427569]  kasan_atomics+0x1dc/0x310
[   17.427627]  ? __pfx_kasan_atomics+0x10/0x10
[   17.427677]  ? __pfx_kasan_atomics+0x10/0x10
[   17.427733]  kunit_try_run_case+0x1a5/0x480
[   17.427782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.427823]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.427862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.427899]  ? __kthread_parkme+0x82/0x180
[   17.427933]  ? preempt_count_sub+0x50/0x80
[   17.427976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.428052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.428152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.428214]  kthread+0x337/0x6f0
[   17.428259]  ? trace_preempt_on+0x20/0xc0
[   17.428304]  ? __pfx_kthread+0x10/0x10
[   17.428345]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.428410]  ? calculate_sigpending+0x7b/0xa0
[   17.428479]  ? __pfx_kthread+0x10/0x10
[   17.428522]  ret_from_fork+0x116/0x1d0
[   17.428560]  ? __pfx_kthread+0x10/0x10
[   17.428611]  ret_from_fork_asm+0x1a/0x30
[   17.428693]  </TASK>
[   17.428725] 
[   17.439676] Allocated by task 283:
[   17.440019]  kasan_save_stack+0x45/0x70
[   17.440242]  kasan_save_track+0x18/0x40
[   17.440414]  kasan_save_alloc_info+0x3b/0x50
[   17.440599]  __kasan_kmalloc+0xb7/0xc0
[   17.440987]  __kmalloc_cache_noprof+0x189/0x420
[   17.441533]  kasan_atomics+0x95/0x310
[   17.441848]  kunit_try_run_case+0x1a5/0x480
[   17.442266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.442755]  kthread+0x337/0x6f0
[   17.443035]  ret_from_fork+0x116/0x1d0
[   17.443364]  ret_from_fork_asm+0x1a/0x30
[   17.443631] 
[   17.443744] The buggy address belongs to the object at ffff888102ac4100
[   17.443744]  which belongs to the cache kmalloc-64 of size 64
[   17.444589] The buggy address is located 0 bytes to the right of
[   17.444589]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.445253] 
[   17.445367] The buggy address belongs to the physical page:
[   17.445711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.446421] flags: 0x200000000000000(node=0|zone=2)
[   17.446835] page_type: f5(slab)
[   17.447008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.447358] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.447901] page dumped because: kasan: bad access detected
[   17.448357] 
[   17.448481] Memory state around the buggy address:
[   17.448683]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.449324]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.449736] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.450230]                                      ^
[   17.450449]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.450981]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.451492] ==================================================================
[   16.986523] ==================================================================
[   16.987461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   16.988025] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.988461] 
[   16.988823] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.988885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.988903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.988937] Call Trace:
[   16.988968]  <TASK>
[   16.988994]  dump_stack_lvl+0x73/0xb0
[   16.989042]  print_report+0xd1/0x650
[   16.989073]  ? __virt_addr_valid+0x1db/0x2d0
[   16.989107]  ? kasan_atomics_helper+0x1217/0x5450
[   16.989144]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.989183]  ? kasan_atomics_helper+0x1217/0x5450
[   16.989215]  kasan_report+0x141/0x180
[   16.989248]  ? kasan_atomics_helper+0x1217/0x5450
[   16.989293]  kasan_check_range+0x10c/0x1c0
[   16.989333]  __kasan_check_write+0x18/0x20
[   16.989367]  kasan_atomics_helper+0x1217/0x5450
[   16.989400]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.989432]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.989749]  ? trace_hardirqs_on+0x37/0xe0
[   16.989791]  ? kasan_atomics+0x152/0x310
[   16.989834]  kasan_atomics+0x1dc/0x310
[   16.989868]  ? __pfx_kasan_atomics+0x10/0x10
[   16.989903]  ? __pfx_kasan_atomics+0x10/0x10
[   16.989959]  kunit_try_run_case+0x1a5/0x480
[   16.989997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.990034]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.990073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.990110]  ? __kthread_parkme+0x82/0x180
[   16.990703]  ? preempt_count_sub+0x50/0x80
[   16.990751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.990787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.990824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.990859]  kthread+0x337/0x6f0
[   16.990887]  ? trace_preempt_on+0x20/0xc0
[   16.990921]  ? __pfx_kthread+0x10/0x10
[   16.990954]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.990990]  ? calculate_sigpending+0x7b/0xa0
[   16.991029]  ? __pfx_kthread+0x10/0x10
[   16.991065]  ret_from_fork+0x116/0x1d0
[   16.991098]  ? __pfx_kthread+0x10/0x10
[   16.991141]  ret_from_fork_asm+0x1a/0x30
[   16.991193]  </TASK>
[   16.991211] 
[   17.003417] Allocated by task 283:
[   17.003721]  kasan_save_stack+0x45/0x70
[   17.004430]  kasan_save_track+0x18/0x40
[   17.005381]  kasan_save_alloc_info+0x3b/0x50
[   17.006162]  __kasan_kmalloc+0xb7/0xc0
[   17.006667]  __kmalloc_cache_noprof+0x189/0x420
[   17.006913]  kasan_atomics+0x95/0x310
[   17.007168]  kunit_try_run_case+0x1a5/0x480
[   17.007503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.007911]  kthread+0x337/0x6f0
[   17.008265]  ret_from_fork+0x116/0x1d0
[   17.008630]  ret_from_fork_asm+0x1a/0x30
[   17.008805] 
[   17.008904] The buggy address belongs to the object at ffff888102ac4100
[   17.008904]  which belongs to the cache kmalloc-64 of size 64
[   17.009612] The buggy address is located 0 bytes to the right of
[   17.009612]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   17.010272] 
[   17.010462] The buggy address belongs to the physical page:
[   17.010735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   17.011245] flags: 0x200000000000000(node=0|zone=2)
[   17.011648] page_type: f5(slab)
[   17.011812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.012261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.012608] page dumped because: kasan: bad access detected
[   17.012921] 
[   17.013125] Memory state around the buggy address:
[   17.013469]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.013859]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.014286] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.014769]                                      ^
[   17.015067]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.015435]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.015842] ==================================================================
[   16.699781] ==================================================================
[   16.700559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   16.701089] Read of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.701393] 
[   16.701523] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.701604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.701645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.701684] Call Trace:
[   16.701714]  <TASK>
[   16.701741]  dump_stack_lvl+0x73/0xb0
[   16.701794]  print_report+0xd1/0x650
[   16.701835]  ? __virt_addr_valid+0x1db/0x2d0
[   16.701877]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.701926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.701972]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.702011]  kasan_report+0x141/0x180
[   16.702053]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.702111]  __asan_report_load4_noabort+0x18/0x20
[   16.702157]  kasan_atomics_helper+0x4a84/0x5450
[   16.702200]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.702239]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.702278]  ? trace_hardirqs_on+0x37/0xe0
[   16.702319]  ? kasan_atomics+0x152/0x310
[   16.702366]  kasan_atomics+0x1dc/0x310
[   16.702407]  ? __pfx_kasan_atomics+0x10/0x10
[   16.702449]  ? __pfx_kasan_atomics+0x10/0x10
[   16.702500]  kunit_try_run_case+0x1a5/0x480
[   16.702560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.702586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.702612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.702651]  ? __kthread_parkme+0x82/0x180
[   16.702672]  ? preempt_count_sub+0x50/0x80
[   16.702695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.702718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.702742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.702764]  kthread+0x337/0x6f0
[   16.702783]  ? trace_preempt_on+0x20/0xc0
[   16.702806]  ? __pfx_kthread+0x10/0x10
[   16.702826]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.702846]  ? calculate_sigpending+0x7b/0xa0
[   16.702870]  ? __pfx_kthread+0x10/0x10
[   16.702891]  ret_from_fork+0x116/0x1d0
[   16.702909]  ? __pfx_kthread+0x10/0x10
[   16.702929]  ret_from_fork_asm+0x1a/0x30
[   16.702959]  </TASK>
[   16.702972] 
[   16.712636] Allocated by task 283:
[   16.712923]  kasan_save_stack+0x45/0x70
[   16.713110]  kasan_save_track+0x18/0x40
[   16.713408]  kasan_save_alloc_info+0x3b/0x50
[   16.713756]  __kasan_kmalloc+0xb7/0xc0
[   16.714012]  __kmalloc_cache_noprof+0x189/0x420
[   16.714191]  kasan_atomics+0x95/0x310
[   16.714459]  kunit_try_run_case+0x1a5/0x480
[   16.715101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.715518]  kthread+0x337/0x6f0
[   16.715740]  ret_from_fork+0x116/0x1d0
[   16.715906]  ret_from_fork_asm+0x1a/0x30
[   16.716272] 
[   16.716839] The buggy address belongs to the object at ffff888102ac4100
[   16.716839]  which belongs to the cache kmalloc-64 of size 64
[   16.717543] The buggy address is located 0 bytes to the right of
[   16.717543]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.718320] 
[   16.718451] The buggy address belongs to the physical page:
[   16.718773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.719087] flags: 0x200000000000000(node=0|zone=2)
[   16.719482] page_type: f5(slab)
[   16.719764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.720210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.720429] page dumped because: kasan: bad access detected
[   16.720736] 
[   16.720894] Memory state around the buggy address:
[   16.721153]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.721466]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.721819] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.722056]                                      ^
[   16.722411]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.722718]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.723204] ==================================================================
[   16.877835] ==================================================================
[   16.878437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   16.878779] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.879034] 
[   16.879189] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.879284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.879310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.879349] Call Trace:
[   16.879378]  <TASK>
[   16.879407]  dump_stack_lvl+0x73/0xb0
[   16.879458]  print_report+0xd1/0x650
[   16.879493]  ? __virt_addr_valid+0x1db/0x2d0
[   16.879527]  ? kasan_atomics_helper+0x1079/0x5450
[   16.879566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.879643]  ? kasan_atomics_helper+0x1079/0x5450
[   16.879685]  kasan_report+0x141/0x180
[   16.879725]  ? kasan_atomics_helper+0x1079/0x5450
[   16.879776]  kasan_check_range+0x10c/0x1c0
[   16.879823]  __kasan_check_write+0x18/0x20
[   16.879861]  kasan_atomics_helper+0x1079/0x5450
[   16.879921]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.879966]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.880011]  ? trace_hardirqs_on+0x37/0xe0
[   16.880053]  ? kasan_atomics+0x152/0x310
[   16.880151]  kasan_atomics+0x1dc/0x310
[   16.880197]  ? __pfx_kasan_atomics+0x10/0x10
[   16.880256]  ? __pfx_kasan_atomics+0x10/0x10
[   16.880312]  kunit_try_run_case+0x1a5/0x480
[   16.880359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.880399]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.880443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.880490]  ? __kthread_parkme+0x82/0x180
[   16.880545]  ? preempt_count_sub+0x50/0x80
[   16.880594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.880653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.880715]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.880759]  kthread+0x337/0x6f0
[   16.880800]  ? trace_preempt_on+0x20/0xc0
[   16.880841]  ? __pfx_kthread+0x10/0x10
[   16.880882]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.880923]  ? calculate_sigpending+0x7b/0xa0
[   16.880954]  ? __pfx_kthread+0x10/0x10
[   16.880992]  ret_from_fork+0x116/0x1d0
[   16.881024]  ? __pfx_kthread+0x10/0x10
[   16.881056]  ret_from_fork_asm+0x1a/0x30
[   16.881142]  </TASK>
[   16.881189] 
[   16.892663] Allocated by task 283:
[   16.892924]  kasan_save_stack+0x45/0x70
[   16.893323]  kasan_save_track+0x18/0x40
[   16.893669]  kasan_save_alloc_info+0x3b/0x50
[   16.894049]  __kasan_kmalloc+0xb7/0xc0
[   16.894427]  __kmalloc_cache_noprof+0x189/0x420
[   16.894779]  kasan_atomics+0x95/0x310
[   16.894939]  kunit_try_run_case+0x1a5/0x480
[   16.895233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.895586]  kthread+0x337/0x6f0
[   16.895780]  ret_from_fork+0x116/0x1d0
[   16.895926]  ret_from_fork_asm+0x1a/0x30
[   16.896229] 
[   16.896380] The buggy address belongs to the object at ffff888102ac4100
[   16.896380]  which belongs to the cache kmalloc-64 of size 64
[   16.896919] The buggy address is located 0 bytes to the right of
[   16.896919]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.897322] 
[   16.897426] The buggy address belongs to the physical page:
[   16.897825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.898405] flags: 0x200000000000000(node=0|zone=2)
[   16.898789] page_type: f5(slab)
[   16.899066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.899601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.899942] page dumped because: kasan: bad access detected
[   16.900360] 
[   16.900484] Memory state around the buggy address:
[   16.900820]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.901062]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.901345] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.901833]                                      ^
[   16.902220]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.902649]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.902900] ==================================================================
[   16.647635] ==================================================================
[   16.648205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   16.648492] Write of size 4 at addr ffff888102ac4130 by task kunit_try_catch/283
[   16.649005] 
[   16.649180] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.649265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.649309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.649347] Call Trace:
[   16.649375]  <TASK>
[   16.649401]  dump_stack_lvl+0x73/0xb0
[   16.649454]  print_report+0xd1/0x650
[   16.649498]  ? __virt_addr_valid+0x1db/0x2d0
[   16.649538]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.649580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.649642]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.649672]  kasan_report+0x141/0x180
[   16.649702]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.649734]  kasan_check_range+0x10c/0x1c0
[   16.649763]  __kasan_check_write+0x18/0x20
[   16.649788]  kasan_atomics_helper+0xb6a/0x5450
[   16.649826]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.649862]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.649905]  ? trace_hardirqs_on+0x37/0xe0
[   16.649956]  ? kasan_atomics+0x152/0x310
[   16.650007]  kasan_atomics+0x1dc/0x310
[   16.650052]  ? __pfx_kasan_atomics+0x10/0x10
[   16.650097]  ? __pfx_kasan_atomics+0x10/0x10
[   16.650143]  kunit_try_run_case+0x1a5/0x480
[   16.650190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.650234]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.650277]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.650321]  ? __kthread_parkme+0x82/0x180
[   16.650362]  ? preempt_count_sub+0x50/0x80
[   16.650409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.650456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.650494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.650531]  kthread+0x337/0x6f0
[   16.650563]  ? trace_preempt_on+0x20/0xc0
[   16.650601]  ? __pfx_kthread+0x10/0x10
[   16.650656]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.650697]  ? calculate_sigpending+0x7b/0xa0
[   16.650741]  ? __pfx_kthread+0x10/0x10
[   16.650786]  ret_from_fork+0x116/0x1d0
[   16.650825]  ? __pfx_kthread+0x10/0x10
[   16.650866]  ret_from_fork_asm+0x1a/0x30
[   16.650929]  </TASK>
[   16.650956] 
[   16.660603] Allocated by task 283:
[   16.660795]  kasan_save_stack+0x45/0x70
[   16.661110]  kasan_save_track+0x18/0x40
[   16.662490]  kasan_save_alloc_info+0x3b/0x50
[   16.662862]  __kasan_kmalloc+0xb7/0xc0
[   16.663078]  __kmalloc_cache_noprof+0x189/0x420
[   16.663433]  kasan_atomics+0x95/0x310
[   16.663752]  kunit_try_run_case+0x1a5/0x480
[   16.663968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.664224]  kthread+0x337/0x6f0
[   16.664403]  ret_from_fork+0x116/0x1d0
[   16.664550]  ret_from_fork_asm+0x1a/0x30
[   16.664933] 
[   16.665073] The buggy address belongs to the object at ffff888102ac4100
[   16.665073]  which belongs to the cache kmalloc-64 of size 64
[   16.665465] The buggy address is located 0 bytes to the right of
[   16.665465]  allocated 48-byte region [ffff888102ac4100, ffff888102ac4130)
[   16.666368] 
[   16.666591] The buggy address belongs to the physical page:
[   16.667033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac4
[   16.667458] flags: 0x200000000000000(node=0|zone=2)
[   16.667673] page_type: f5(slab)
[   16.667831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.668456] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.669001] page dumped because: kasan: bad access detected
[   16.669428] 
[   16.669589] Memory state around the buggy address:
[   16.669879]  ffff888102ac4000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.670311]  ffff888102ac4080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.670715] >ffff888102ac4100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.671010]                                      ^
[   16.671235]  ffff888102ac4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.671782]  ffff888102ac4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.672327] ==================================================================

[   16.924258] ==================================================================
[   16.924996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   16.925852] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.926558] 
[   16.926750] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.926813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.926828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.926850] Call Trace:
[   16.926867]  <TASK>
[   16.926884]  dump_stack_lvl+0x73/0xb0
[   16.926924]  print_report+0xd1/0x650
[   16.926949]  ? __virt_addr_valid+0x1db/0x2d0
[   16.926974]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.927008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.927036]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.927070]  kasan_report+0x141/0x180
[   16.927093]  ? kasan_atomics_helper+0x49e8/0x5450
[   16.927123]  __asan_report_load4_noabort+0x18/0x20
[   16.927149]  kasan_atomics_helper+0x49e8/0x5450
[   16.927173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.927197]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.927223]  ? kasan_atomics+0x152/0x310
[   16.927252]  kasan_atomics+0x1dc/0x310
[   16.927277]  ? __pfx_kasan_atomics+0x10/0x10
[   16.927303]  ? __pfx_read_tsc+0x10/0x10
[   16.927326]  ? ktime_get_ts64+0x86/0x230
[   16.927351]  kunit_try_run_case+0x1a5/0x480
[   16.927376]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.927400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.927425]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.927450]  ? __kthread_parkme+0x82/0x180
[   16.927472]  ? preempt_count_sub+0x50/0x80
[   16.927497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.927522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.927547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.927572]  kthread+0x337/0x6f0
[   16.927593]  ? trace_preempt_on+0x20/0xc0
[   16.927618]  ? __pfx_kthread+0x10/0x10
[   16.927640]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.927663]  ? calculate_sigpending+0x7b/0xa0
[   16.927687]  ? __pfx_kthread+0x10/0x10
[   16.927711]  ret_from_fork+0x116/0x1d0
[   16.927741]  ? __pfx_kthread+0x10/0x10
[   16.927765]  ret_from_fork_asm+0x1a/0x30
[   16.927799]  </TASK>
[   16.927812] 
[   16.941395] Allocated by task 282:
[   16.941713]  kasan_save_stack+0x45/0x70
[   16.942029]  kasan_save_track+0x18/0x40
[   16.942384]  kasan_save_alloc_info+0x3b/0x50
[   16.942549]  __kasan_kmalloc+0xb7/0xc0
[   16.942693]  __kmalloc_cache_noprof+0x189/0x420
[   16.943190]  kasan_atomics+0x95/0x310
[   16.943572]  kunit_try_run_case+0x1a5/0x480
[   16.944029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.944556]  kthread+0x337/0x6f0
[   16.944935]  ret_from_fork+0x116/0x1d0
[   16.945318]  ret_from_fork_asm+0x1a/0x30
[   16.945470] 
[   16.945557] The buggy address belongs to the object at ffff8881031d0c00
[   16.945557]  which belongs to the cache kmalloc-64 of size 64
[   16.946150] The buggy address is located 0 bytes to the right of
[   16.946150]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.946763] 
[   16.946858] The buggy address belongs to the physical page:
[   16.947400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.947658] flags: 0x200000000000000(node=0|zone=2)
[   16.947867] page_type: f5(slab)
[   16.948238] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.948781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.949024] page dumped because: kasan: bad access detected
[   16.949215] 
[   16.949290] Memory state around the buggy address:
[   16.949454]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.949687]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.950337] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.951024]                                      ^
[   16.951465]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.952199]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.952850] ==================================================================
[   17.068375] ==================================================================
[   17.068733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   17.069091] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.069432] 
[   17.069557] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.069602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.069628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.069650] Call Trace:
[   17.069666]  <TASK>
[   17.069681]  dump_stack_lvl+0x73/0xb0
[   17.069710]  print_report+0xd1/0x650
[   17.069734]  ? __virt_addr_valid+0x1db/0x2d0
[   17.069767]  ? kasan_atomics_helper+0x1467/0x5450
[   17.069790]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.069817]  ? kasan_atomics_helper+0x1467/0x5450
[   17.069852]  kasan_report+0x141/0x180
[   17.069876]  ? kasan_atomics_helper+0x1467/0x5450
[   17.069903]  kasan_check_range+0x10c/0x1c0
[   17.069927]  __kasan_check_write+0x18/0x20
[   17.069948]  kasan_atomics_helper+0x1467/0x5450
[   17.069971]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.069994]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.070019]  ? kasan_atomics+0x152/0x310
[   17.070056]  kasan_atomics+0x1dc/0x310
[   17.070080]  ? __pfx_kasan_atomics+0x10/0x10
[   17.070114]  ? __pfx_read_tsc+0x10/0x10
[   17.070136]  ? ktime_get_ts64+0x86/0x230
[   17.070162]  kunit_try_run_case+0x1a5/0x480
[   17.070197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.070220]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.070243]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.070268]  ? __kthread_parkme+0x82/0x180
[   17.070288]  ? preempt_count_sub+0x50/0x80
[   17.070313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.070338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.070361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.070385]  kthread+0x337/0x6f0
[   17.070405]  ? trace_preempt_on+0x20/0xc0
[   17.070430]  ? __pfx_kthread+0x10/0x10
[   17.070451]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.070473]  ? calculate_sigpending+0x7b/0xa0
[   17.070507]  ? __pfx_kthread+0x10/0x10
[   17.070530]  ret_from_fork+0x116/0x1d0
[   17.070549]  ? __pfx_kthread+0x10/0x10
[   17.070581]  ret_from_fork_asm+0x1a/0x30
[   17.070613]  </TASK>
[   17.070625] 
[   17.078872] Allocated by task 282:
[   17.079121]  kasan_save_stack+0x45/0x70
[   17.079347]  kasan_save_track+0x18/0x40
[   17.079553]  kasan_save_alloc_info+0x3b/0x50
[   17.079828]  __kasan_kmalloc+0xb7/0xc0
[   17.080028]  __kmalloc_cache_noprof+0x189/0x420
[   17.080257]  kasan_atomics+0x95/0x310
[   17.080406]  kunit_try_run_case+0x1a5/0x480
[   17.080593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.081034]  kthread+0x337/0x6f0
[   17.081194]  ret_from_fork+0x116/0x1d0
[   17.081416]  ret_from_fork_asm+0x1a/0x30
[   17.081630] 
[   17.081740] The buggy address belongs to the object at ffff8881031d0c00
[   17.081740]  which belongs to the cache kmalloc-64 of size 64
[   17.082288] The buggy address is located 0 bytes to the right of
[   17.082288]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.082880] 
[   17.082999] The buggy address belongs to the physical page:
[   17.083257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.083584] flags: 0x200000000000000(node=0|zone=2)
[   17.083761] page_type: f5(slab)
[   17.083892] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.088293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.089056] page dumped because: kasan: bad access detected
[   17.089867] 
[   17.090045] Memory state around the buggy address:
[   17.090801]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.091447]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.091688] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.092861]                                      ^
[   17.093327]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.093694]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.094292] ==================================================================
[   17.607524] ==================================================================
[   17.607771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   17.608014] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.610460] 
[   17.610960] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.611016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.611031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.611074] Call Trace:
[   17.611093]  <TASK>
[   17.611113]  dump_stack_lvl+0x73/0xb0
[   17.611149]  print_report+0xd1/0x650
[   17.611172]  ? __virt_addr_valid+0x1db/0x2d0
[   17.611197]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.611220]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.611247]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.611270]  kasan_report+0x141/0x180
[   17.611294]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.611322]  __asan_report_load8_noabort+0x18/0x20
[   17.611347]  kasan_atomics_helper+0x4f71/0x5450
[   17.611371]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.611394]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.611421]  ? kasan_atomics+0x152/0x310
[   17.611449]  kasan_atomics+0x1dc/0x310
[   17.611473]  ? __pfx_kasan_atomics+0x10/0x10
[   17.611499]  ? __pfx_read_tsc+0x10/0x10
[   17.611521]  ? ktime_get_ts64+0x86/0x230
[   17.611547]  kunit_try_run_case+0x1a5/0x480
[   17.611572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.611595]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.611619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.611643]  ? __kthread_parkme+0x82/0x180
[   17.611664]  ? preempt_count_sub+0x50/0x80
[   17.611689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.612018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.612070]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.612096]  kthread+0x337/0x6f0
[   17.612119]  ? trace_preempt_on+0x20/0xc0
[   17.612145]  ? __pfx_kthread+0x10/0x10
[   17.612167]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.612190]  ? calculate_sigpending+0x7b/0xa0
[   17.612216]  ? __pfx_kthread+0x10/0x10
[   17.612240]  ret_from_fork+0x116/0x1d0
[   17.612259]  ? __pfx_kthread+0x10/0x10
[   17.612281]  ret_from_fork_asm+0x1a/0x30
[   17.612314]  </TASK>
[   17.612327] 
[   17.624434] Allocated by task 282:
[   17.624652]  kasan_save_stack+0x45/0x70
[   17.624823]  kasan_save_track+0x18/0x40
[   17.625236]  kasan_save_alloc_info+0x3b/0x50
[   17.625464]  __kasan_kmalloc+0xb7/0xc0
[   17.625774]  __kmalloc_cache_noprof+0x189/0x420
[   17.626127]  kasan_atomics+0x95/0x310
[   17.626393]  kunit_try_run_case+0x1a5/0x480
[   17.626628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.627022]  kthread+0x337/0x6f0
[   17.627339]  ret_from_fork+0x116/0x1d0
[   17.627851]  ret_from_fork_asm+0x1a/0x30
[   17.628106] 
[   17.628373] The buggy address belongs to the object at ffff8881031d0c00
[   17.628373]  which belongs to the cache kmalloc-64 of size 64
[   17.629309] The buggy address is located 0 bytes to the right of
[   17.629309]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.629697] 
[   17.629903] The buggy address belongs to the physical page:
[   17.630611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.631471] flags: 0x200000000000000(node=0|zone=2)
[   17.632123] page_type: f5(slab)
[   17.632450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.632831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.633634] page dumped because: kasan: bad access detected
[   17.633946] 
[   17.634197] Memory state around the buggy address:
[   17.634530]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.634945]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.635679] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.636340]                                      ^
[   17.636510]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.636751]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.637641] ==================================================================
[   16.652651] ==================================================================
[   16.653042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   16.653936] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.654673] 
[   16.654919] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.654977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.654991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.655014] Call Trace:
[   16.655030]  <TASK>
[   16.655067]  dump_stack_lvl+0x73/0xb0
[   16.655096]  print_report+0xd1/0x650
[   16.655121]  ? __virt_addr_valid+0x1db/0x2d0
[   16.655145]  ? kasan_atomics_helper+0xd47/0x5450
[   16.655167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.655194]  ? kasan_atomics_helper+0xd47/0x5450
[   16.655216]  kasan_report+0x141/0x180
[   16.655239]  ? kasan_atomics_helper+0xd47/0x5450
[   16.655277]  kasan_check_range+0x10c/0x1c0
[   16.655302]  __kasan_check_write+0x18/0x20
[   16.655333]  kasan_atomics_helper+0xd47/0x5450
[   16.655357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.655381]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.655406]  ? kasan_atomics+0x152/0x310
[   16.655435]  kasan_atomics+0x1dc/0x310
[   16.655468]  ? __pfx_kasan_atomics+0x10/0x10
[   16.655494]  ? __pfx_read_tsc+0x10/0x10
[   16.655516]  ? ktime_get_ts64+0x86/0x230
[   16.655554]  kunit_try_run_case+0x1a5/0x480
[   16.655580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.655602]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.655627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.655650]  ? __kthread_parkme+0x82/0x180
[   16.655672]  ? preempt_count_sub+0x50/0x80
[   16.655696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.655721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.655755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.655779]  kthread+0x337/0x6f0
[   16.655800]  ? trace_preempt_on+0x20/0xc0
[   16.655825]  ? __pfx_kthread+0x10/0x10
[   16.655847]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.655869]  ? calculate_sigpending+0x7b/0xa0
[   16.655894]  ? __pfx_kthread+0x10/0x10
[   16.655917]  ret_from_fork+0x116/0x1d0
[   16.655936]  ? __pfx_kthread+0x10/0x10
[   16.655957]  ret_from_fork_asm+0x1a/0x30
[   16.655991]  </TASK>
[   16.656004] 
[   16.669512] Allocated by task 282:
[   16.669941]  kasan_save_stack+0x45/0x70
[   16.670245]  kasan_save_track+0x18/0x40
[   16.670388]  kasan_save_alloc_info+0x3b/0x50
[   16.670542]  __kasan_kmalloc+0xb7/0xc0
[   16.670680]  __kmalloc_cache_noprof+0x189/0x420
[   16.671035]  kasan_atomics+0x95/0x310
[   16.671403]  kunit_try_run_case+0x1a5/0x480
[   16.671848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.672443]  kthread+0x337/0x6f0
[   16.672768]  ret_from_fork+0x116/0x1d0
[   16.673207]  ret_from_fork_asm+0x1a/0x30
[   16.673672] 
[   16.673894] The buggy address belongs to the object at ffff8881031d0c00
[   16.673894]  which belongs to the cache kmalloc-64 of size 64
[   16.674535] The buggy address is located 0 bytes to the right of
[   16.674535]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.675219] 
[   16.675361] The buggy address belongs to the physical page:
[   16.675725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.676411] flags: 0x200000000000000(node=0|zone=2)
[   16.676590] page_type: f5(slab)
[   16.676720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.677479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.678278] page dumped because: kasan: bad access detected
[   16.678832] 
[   16.678961] Memory state around the buggy address:
[   16.679146]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.679382]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.679617] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.680108]                                      ^
[   16.680673]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.681609]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.682303] ==================================================================
[   16.421253] ==================================================================
[   16.422218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   16.422927] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.423489] 
[   16.423706] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.423753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.423767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.423790] Call Trace:
[   16.423807]  <TASK>
[   16.423825]  dump_stack_lvl+0x73/0xb0
[   16.423854]  print_report+0xd1/0x650
[   16.423879]  ? __virt_addr_valid+0x1db/0x2d0
[   16.423904]  ? kasan_atomics_helper+0x860/0x5450
[   16.423926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.423954]  ? kasan_atomics_helper+0x860/0x5450
[   16.423978]  kasan_report+0x141/0x180
[   16.424001]  ? kasan_atomics_helper+0x860/0x5450
[   16.424030]  kasan_check_range+0x10c/0x1c0
[   16.424068]  __kasan_check_write+0x18/0x20
[   16.424090]  kasan_atomics_helper+0x860/0x5450
[   16.424113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.424138]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.424164]  ? kasan_atomics+0x152/0x310
[   16.424193]  kasan_atomics+0x1dc/0x310
[   16.424218]  ? __pfx_kasan_atomics+0x10/0x10
[   16.424245]  ? __pfx_read_tsc+0x10/0x10
[   16.424268]  ? ktime_get_ts64+0x86/0x230
[   16.424295]  kunit_try_run_case+0x1a5/0x480
[   16.424321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.424345]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.424370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.424395]  ? __kthread_parkme+0x82/0x180
[   16.424416]  ? preempt_count_sub+0x50/0x80
[   16.424442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.424467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.424492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.424517]  kthread+0x337/0x6f0
[   16.424538]  ? trace_preempt_on+0x20/0xc0
[   16.424563]  ? __pfx_kthread+0x10/0x10
[   16.424586]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.424609]  ? calculate_sigpending+0x7b/0xa0
[   16.424634]  ? __pfx_kthread+0x10/0x10
[   16.424658]  ret_from_fork+0x116/0x1d0
[   16.424678]  ? __pfx_kthread+0x10/0x10
[   16.424701]  ret_from_fork_asm+0x1a/0x30
[   16.424770]  </TASK>
[   16.424785] 
[   16.433216] Allocated by task 282:
[   16.433455]  kasan_save_stack+0x45/0x70
[   16.433709]  kasan_save_track+0x18/0x40
[   16.433930]  kasan_save_alloc_info+0x3b/0x50
[   16.434211]  __kasan_kmalloc+0xb7/0xc0
[   16.434420]  __kmalloc_cache_noprof+0x189/0x420
[   16.434660]  kasan_atomics+0x95/0x310
[   16.434876]  kunit_try_run_case+0x1a5/0x480
[   16.435133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.435436]  kthread+0x337/0x6f0
[   16.435862]  ret_from_fork+0x116/0x1d0
[   16.436114]  ret_from_fork_asm+0x1a/0x30
[   16.436330] 
[   16.436434] The buggy address belongs to the object at ffff8881031d0c00
[   16.436434]  which belongs to the cache kmalloc-64 of size 64
[   16.437104] The buggy address is located 0 bytes to the right of
[   16.437104]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.437499] 
[   16.437613] The buggy address belongs to the physical page:
[   16.438150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.438586] flags: 0x200000000000000(node=0|zone=2)
[   16.438860] page_type: f5(slab)
[   16.439045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.439429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.439841] page dumped because: kasan: bad access detected
[   16.440027] 
[   16.440116] Memory state around the buggy address:
[   16.440344]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.440760]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.441145] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.441506]                                      ^
[   16.441778]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.442140]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.442444] ==================================================================
[   16.748906] ==================================================================
[   16.749206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   16.749580] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.749948] 
[   16.750100] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.750143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.750156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.750179] Call Trace:
[   16.750193]  <TASK>
[   16.750208]  dump_stack_lvl+0x73/0xb0
[   16.750248]  print_report+0xd1/0x650
[   16.750272]  ? __virt_addr_valid+0x1db/0x2d0
[   16.750295]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.750329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.750357]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.750379]  kasan_report+0x141/0x180
[   16.750412]  ? kasan_atomics_helper+0xfa9/0x5450
[   16.750440]  kasan_check_range+0x10c/0x1c0
[   16.750465]  __kasan_check_write+0x18/0x20
[   16.750496]  kasan_atomics_helper+0xfa9/0x5450
[   16.750520]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.750545]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.750581]  ? kasan_atomics+0x152/0x310
[   16.750609]  kasan_atomics+0x1dc/0x310
[   16.750645]  ? __pfx_kasan_atomics+0x10/0x10
[   16.750671]  ? __pfx_read_tsc+0x10/0x10
[   16.750693]  ? ktime_get_ts64+0x86/0x230
[   16.750739]  kunit_try_run_case+0x1a5/0x480
[   16.750774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.750797]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.750832]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.750857]  ? __kthread_parkme+0x82/0x180
[   16.750878]  ? preempt_count_sub+0x50/0x80
[   16.750903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.750938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.750962]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.750996]  kthread+0x337/0x6f0
[   16.751017]  ? trace_preempt_on+0x20/0xc0
[   16.751041]  ? __pfx_kthread+0x10/0x10
[   16.751087]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.751109]  ? calculate_sigpending+0x7b/0xa0
[   16.751133]  ? __pfx_kthread+0x10/0x10
[   16.751168]  ret_from_fork+0x116/0x1d0
[   16.751188]  ? __pfx_kthread+0x10/0x10
[   16.751210]  ret_from_fork_asm+0x1a/0x30
[   16.751255]  </TASK>
[   16.751267] 
[   16.759056] Allocated by task 282:
[   16.759200]  kasan_save_stack+0x45/0x70
[   16.759348]  kasan_save_track+0x18/0x40
[   16.759553]  kasan_save_alloc_info+0x3b/0x50
[   16.759808]  __kasan_kmalloc+0xb7/0xc0
[   16.760003]  __kmalloc_cache_noprof+0x189/0x420
[   16.760245]  kasan_atomics+0x95/0x310
[   16.760440]  kunit_try_run_case+0x1a5/0x480
[   16.760654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.760927]  kthread+0x337/0x6f0
[   16.761072]  ret_from_fork+0x116/0x1d0
[   16.761213]  ret_from_fork_asm+0x1a/0x30
[   16.761361] 
[   16.761438] The buggy address belongs to the object at ffff8881031d0c00
[   16.761438]  which belongs to the cache kmalloc-64 of size 64
[   16.761966] The buggy address is located 0 bytes to the right of
[   16.761966]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.762596] 
[   16.762735] The buggy address belongs to the physical page:
[   16.763003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.763397] flags: 0x200000000000000(node=0|zone=2)
[   16.763667] page_type: f5(slab)
[   16.763872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.764230] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.764529] page dumped because: kasan: bad access detected
[   16.764830] 
[   16.764911] Memory state around the buggy address:
[   16.765154]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.765461]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.765816] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.766108]                                      ^
[   16.766367]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.766667]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.767009] ==================================================================
[   16.621826] ==================================================================
[   16.622089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   16.622333] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.622567] 
[   16.622656] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.622700] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.622717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.622753] Call Trace:
[   16.622768]  <TASK>
[   16.622785]  dump_stack_lvl+0x73/0xb0
[   16.622812]  print_report+0xd1/0x650
[   16.622836]  ? __virt_addr_valid+0x1db/0x2d0
[   16.622873]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.622895]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.622923]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.622959]  kasan_report+0x141/0x180
[   16.622982]  ? kasan_atomics_helper+0x4a84/0x5450
[   16.623011]  __asan_report_load4_noabort+0x18/0x20
[   16.623037]  kasan_atomics_helper+0x4a84/0x5450
[   16.623069]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.623092]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.623120]  ? kasan_atomics+0x152/0x310
[   16.623148]  kasan_atomics+0x1dc/0x310
[   16.623172]  ? __pfx_kasan_atomics+0x10/0x10
[   16.623208]  ? __pfx_read_tsc+0x10/0x10
[   16.623231]  ? ktime_get_ts64+0x86/0x230
[   16.623256]  kunit_try_run_case+0x1a5/0x480
[   16.623296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.623319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.623343]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.623367]  ? __kthread_parkme+0x82/0x180
[   16.623389]  ? preempt_count_sub+0x50/0x80
[   16.623415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.623439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.623464]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.623489]  kthread+0x337/0x6f0
[   16.623509]  ? trace_preempt_on+0x20/0xc0
[   16.623534]  ? __pfx_kthread+0x10/0x10
[   16.623557]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.623579]  ? calculate_sigpending+0x7b/0xa0
[   16.623615]  ? __pfx_kthread+0x10/0x10
[   16.623638]  ret_from_fork+0x116/0x1d0
[   16.623658]  ? __pfx_kthread+0x10/0x10
[   16.623692]  ret_from_fork_asm+0x1a/0x30
[   16.623725]  </TASK>
[   16.623737] 
[   16.638160] Allocated by task 282:
[   16.638526]  kasan_save_stack+0x45/0x70
[   16.638940]  kasan_save_track+0x18/0x40
[   16.639350]  kasan_save_alloc_info+0x3b/0x50
[   16.639801]  __kasan_kmalloc+0xb7/0xc0
[   16.640223]  __kmalloc_cache_noprof+0x189/0x420
[   16.640674]  kasan_atomics+0x95/0x310
[   16.641133]  kunit_try_run_case+0x1a5/0x480
[   16.641569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.641996]  kthread+0x337/0x6f0
[   16.642252]  ret_from_fork+0x116/0x1d0
[   16.642562]  ret_from_fork_asm+0x1a/0x30
[   16.642717] 
[   16.642924] The buggy address belongs to the object at ffff8881031d0c00
[   16.642924]  which belongs to the cache kmalloc-64 of size 64
[   16.644014] The buggy address is located 0 bytes to the right of
[   16.644014]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.644426] 
[   16.644507] The buggy address belongs to the physical page:
[   16.644697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.645484] flags: 0x200000000000000(node=0|zone=2)
[   16.646026] page_type: f5(slab)
[   16.646367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.647159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.647861] page dumped because: kasan: bad access detected
[   16.648393] 
[   16.648579] Memory state around the buggy address:
[   16.649209]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.649510]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.649772] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.650443]                                      ^
[   16.650986]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.651658]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.652103] ==================================================================
[   16.953815] ==================================================================
[   16.954485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   16.955418] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.956197] 
[   16.956300] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.956345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.956359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.956395] Call Trace:
[   16.956410]  <TASK>
[   16.956427]  dump_stack_lvl+0x73/0xb0
[   16.956466]  print_report+0xd1/0x650
[   16.956491]  ? __virt_addr_valid+0x1db/0x2d0
[   16.956515]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.956537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.956574]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.956597]  kasan_report+0x141/0x180
[   16.956621]  ? kasan_atomics_helper+0x12e6/0x5450
[   16.956661]  kasan_check_range+0x10c/0x1c0
[   16.956686]  __kasan_check_write+0x18/0x20
[   16.956706]  kasan_atomics_helper+0x12e6/0x5450
[   16.956741]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.956764]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.956790]  ? kasan_atomics+0x152/0x310
[   16.956818]  kasan_atomics+0x1dc/0x310
[   16.956842]  ? __pfx_kasan_atomics+0x10/0x10
[   16.956868]  ? __pfx_read_tsc+0x10/0x10
[   16.956889]  ? ktime_get_ts64+0x86/0x230
[   16.956914]  kunit_try_run_case+0x1a5/0x480
[   16.956939]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.956961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.956985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.957010]  ? __kthread_parkme+0x82/0x180
[   16.957030]  ? preempt_count_sub+0x50/0x80
[   16.957067]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.957092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.957117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.957141]  kthread+0x337/0x6f0
[   16.957161]  ? trace_preempt_on+0x20/0xc0
[   16.957185]  ? __pfx_kthread+0x10/0x10
[   16.957207]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.957228]  ? calculate_sigpending+0x7b/0xa0
[   16.957253]  ? __pfx_kthread+0x10/0x10
[   16.957275]  ret_from_fork+0x116/0x1d0
[   16.957294]  ? __pfx_kthread+0x10/0x10
[   16.957315]  ret_from_fork_asm+0x1a/0x30
[   16.957349]  </TASK>
[   16.957361] 
[   16.970410] Allocated by task 282:
[   16.970551]  kasan_save_stack+0x45/0x70
[   16.970699]  kasan_save_track+0x18/0x40
[   16.971073]  kasan_save_alloc_info+0x3b/0x50
[   16.971463]  __kasan_kmalloc+0xb7/0xc0
[   16.971918]  __kmalloc_cache_noprof+0x189/0x420
[   16.972414]  kasan_atomics+0x95/0x310
[   16.972810]  kunit_try_run_case+0x1a5/0x480
[   16.973278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.973836]  kthread+0x337/0x6f0
[   16.974155]  ret_from_fork+0x116/0x1d0
[   16.974534]  ret_from_fork_asm+0x1a/0x30
[   16.974760] 
[   16.974950] The buggy address belongs to the object at ffff8881031d0c00
[   16.974950]  which belongs to the cache kmalloc-64 of size 64
[   16.975545] The buggy address is located 0 bytes to the right of
[   16.975545]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.976097] 
[   16.976283] The buggy address belongs to the physical page:
[   16.976621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.977013] flags: 0x200000000000000(node=0|zone=2)
[   16.977399] page_type: f5(slab)
[   16.977533] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.978174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.979132] page dumped because: kasan: bad access detected
[   16.979599] 
[   16.979676] Memory state around the buggy address:
[   16.980114]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.980656]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.980950] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.981471]                                      ^
[   16.981644]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.982008]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.982507] ==================================================================
[   16.710398] ==================================================================
[   16.710751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   16.711129] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.711504] 
[   16.711627] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.711671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.711685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.711717] Call Trace:
[   16.711733]  <TASK>
[   16.711749]  dump_stack_lvl+0x73/0xb0
[   16.711784]  print_report+0xd1/0x650
[   16.711807]  ? __virt_addr_valid+0x1db/0x2d0
[   16.711830]  ? kasan_atomics_helper+0xe78/0x5450
[   16.711851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.711878]  ? kasan_atomics_helper+0xe78/0x5450
[   16.711901]  kasan_report+0x141/0x180
[   16.711924]  ? kasan_atomics_helper+0xe78/0x5450
[   16.711950]  kasan_check_range+0x10c/0x1c0
[   16.711975]  __kasan_check_write+0x18/0x20
[   16.711994]  kasan_atomics_helper+0xe78/0x5450
[   16.712018]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.712041]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.712076]  ? kasan_atomics+0x152/0x310
[   16.712104]  kasan_atomics+0x1dc/0x310
[   16.712128]  ? __pfx_kasan_atomics+0x10/0x10
[   16.712153]  ? __pfx_read_tsc+0x10/0x10
[   16.712174]  ? ktime_get_ts64+0x86/0x230
[   16.712200]  kunit_try_run_case+0x1a5/0x480
[   16.712224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.712247]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.712272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.712295]  ? __kthread_parkme+0x82/0x180
[   16.712316]  ? preempt_count_sub+0x50/0x80
[   16.712341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.712365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.712389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.712412]  kthread+0x337/0x6f0
[   16.712433]  ? trace_preempt_on+0x20/0xc0
[   16.712457]  ? __pfx_kthread+0x10/0x10
[   16.712479]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.712500]  ? calculate_sigpending+0x7b/0xa0
[   16.712526]  ? __pfx_kthread+0x10/0x10
[   16.712548]  ret_from_fork+0x116/0x1d0
[   16.712568]  ? __pfx_kthread+0x10/0x10
[   16.712590]  ret_from_fork_asm+0x1a/0x30
[   16.712623]  </TASK>
[   16.712636] 
[   16.720295] Allocated by task 282:
[   16.720542]  kasan_save_stack+0x45/0x70
[   16.720828]  kasan_save_track+0x18/0x40
[   16.721070]  kasan_save_alloc_info+0x3b/0x50
[   16.721273]  __kasan_kmalloc+0xb7/0xc0
[   16.721415]  __kmalloc_cache_noprof+0x189/0x420
[   16.721648]  kasan_atomics+0x95/0x310
[   16.721891]  kunit_try_run_case+0x1a5/0x480
[   16.722120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.722384]  kthread+0x337/0x6f0
[   16.722558]  ret_from_fork+0x116/0x1d0
[   16.722780]  ret_from_fork_asm+0x1a/0x30
[   16.722989] 
[   16.723091] The buggy address belongs to the object at ffff8881031d0c00
[   16.723091]  which belongs to the cache kmalloc-64 of size 64
[   16.723594] The buggy address is located 0 bytes to the right of
[   16.723594]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.724193] 
[   16.724313] The buggy address belongs to the physical page:
[   16.724575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.724942] flags: 0x200000000000000(node=0|zone=2)
[   16.725128] page_type: f5(slab)
[   16.725260] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.725505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.725907] page dumped because: kasan: bad access detected
[   16.726185] 
[   16.726285] Memory state around the buggy address:
[   16.726527]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.726906]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.727275] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.727576]                                      ^
[   16.727796]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.728032]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.728274] ==================================================================
[   17.209958] ==================================================================
[   17.210617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   17.211180] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.211420] 
[   17.211511] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.211557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.211570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.211593] Call Trace:
[   17.211608]  <TASK>
[   17.211625]  dump_stack_lvl+0x73/0xb0
[   17.211652]  print_report+0xd1/0x650
[   17.211676]  ? __virt_addr_valid+0x1db/0x2d0
[   17.211700]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.211722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.211749]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.211771]  kasan_report+0x141/0x180
[   17.211795]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.211822]  kasan_check_range+0x10c/0x1c0
[   17.211846]  __kasan_check_write+0x18/0x20
[   17.211866]  kasan_atomics_helper+0x16e7/0x5450
[   17.211889]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.211912]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.211937]  ? kasan_atomics+0x152/0x310
[   17.211965]  kasan_atomics+0x1dc/0x310
[   17.211987]  ? __pfx_kasan_atomics+0x10/0x10
[   17.212013]  ? __pfx_read_tsc+0x10/0x10
[   17.212034]  ? ktime_get_ts64+0x86/0x230
[   17.212072]  kunit_try_run_case+0x1a5/0x480
[   17.212096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.212118]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.212141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.212165]  ? __kthread_parkme+0x82/0x180
[   17.212185]  ? preempt_count_sub+0x50/0x80
[   17.212210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.212235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.212259]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.212282]  kthread+0x337/0x6f0
[   17.212304]  ? trace_preempt_on+0x20/0xc0
[   17.212327]  ? __pfx_kthread+0x10/0x10
[   17.212348]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.212370]  ? calculate_sigpending+0x7b/0xa0
[   17.212394]  ? __pfx_kthread+0x10/0x10
[   17.212416]  ret_from_fork+0x116/0x1d0
[   17.212435]  ? __pfx_kthread+0x10/0x10
[   17.212457]  ret_from_fork_asm+0x1a/0x30
[   17.212489]  </TASK>
[   17.212501] 
[   17.222574] Allocated by task 282:
[   17.222784]  kasan_save_stack+0x45/0x70
[   17.222984]  kasan_save_track+0x18/0x40
[   17.223181]  kasan_save_alloc_info+0x3b/0x50
[   17.223391]  __kasan_kmalloc+0xb7/0xc0
[   17.223576]  __kmalloc_cache_noprof+0x189/0x420
[   17.224208]  kasan_atomics+0x95/0x310
[   17.224459]  kunit_try_run_case+0x1a5/0x480
[   17.224779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.225223]  kthread+0x337/0x6f0
[   17.225499]  ret_from_fork+0x116/0x1d0
[   17.225899]  ret_from_fork_asm+0x1a/0x30
[   17.226227] 
[   17.226473] The buggy address belongs to the object at ffff8881031d0c00
[   17.226473]  which belongs to the cache kmalloc-64 of size 64
[   17.227287] The buggy address is located 0 bytes to the right of
[   17.227287]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.228174] 
[   17.228281] The buggy address belongs to the physical page:
[   17.228532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.229353] flags: 0x200000000000000(node=0|zone=2)
[   17.229672] page_type: f5(slab)
[   17.229988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.230584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.230847] page dumped because: kasan: bad access detected
[   17.231036] 
[   17.231126] Memory state around the buggy address:
[   17.231346]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.231700]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.231987] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.233023]                                      ^
[   17.233669]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.234472]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.235279] ==================================================================
[   17.094880] ==================================================================
[   17.095798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   17.096390] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.096687] 
[   17.097188] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.097244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.097267] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.097291] Call Trace:
[   17.097309]  <TASK>
[   17.097329]  dump_stack_lvl+0x73/0xb0
[   17.097363]  print_report+0xd1/0x650
[   17.097387]  ? __virt_addr_valid+0x1db/0x2d0
[   17.097410]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.097433]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.097459]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.097482]  kasan_report+0x141/0x180
[   17.097506]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.097539]  __asan_report_store8_noabort+0x1b/0x30
[   17.097565]  kasan_atomics_helper+0x50d4/0x5450
[   17.097589]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.097612]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.097638]  ? kasan_atomics+0x152/0x310
[   17.097667]  kasan_atomics+0x1dc/0x310
[   17.097691]  ? __pfx_kasan_atomics+0x10/0x10
[   17.097717]  ? __pfx_read_tsc+0x10/0x10
[   17.097945]  ? ktime_get_ts64+0x86/0x230
[   17.097977]  kunit_try_run_case+0x1a5/0x480
[   17.098004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.098027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.098075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.098101]  ? __kthread_parkme+0x82/0x180
[   17.098122]  ? preempt_count_sub+0x50/0x80
[   17.098147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.098173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.098197]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.098222]  kthread+0x337/0x6f0
[   17.098243]  ? trace_preempt_on+0x20/0xc0
[   17.098269]  ? __pfx_kthread+0x10/0x10
[   17.098292]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.098314]  ? calculate_sigpending+0x7b/0xa0
[   17.098339]  ? __pfx_kthread+0x10/0x10
[   17.098363]  ret_from_fork+0x116/0x1d0
[   17.098383]  ? __pfx_kthread+0x10/0x10
[   17.098405]  ret_from_fork_asm+0x1a/0x30
[   17.098439]  </TASK>
[   17.098452] 
[   17.109854] Allocated by task 282:
[   17.110283]  kasan_save_stack+0x45/0x70
[   17.110550]  kasan_save_track+0x18/0x40
[   17.110851]  kasan_save_alloc_info+0x3b/0x50
[   17.111232]  __kasan_kmalloc+0xb7/0xc0
[   17.111433]  __kmalloc_cache_noprof+0x189/0x420
[   17.111642]  kasan_atomics+0x95/0x310
[   17.112167]  kunit_try_run_case+0x1a5/0x480
[   17.112442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.112904]  kthread+0x337/0x6f0
[   17.113190]  ret_from_fork+0x116/0x1d0
[   17.113351]  ret_from_fork_asm+0x1a/0x30
[   17.113496] 
[   17.113583] The buggy address belongs to the object at ffff8881031d0c00
[   17.113583]  which belongs to the cache kmalloc-64 of size 64
[   17.113967] The buggy address is located 0 bytes to the right of
[   17.113967]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.114990] 
[   17.115093] The buggy address belongs to the physical page:
[   17.115282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.115538] flags: 0x200000000000000(node=0|zone=2)
[   17.115742] page_type: f5(slab)
[   17.116417] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.117149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.117840] page dumped because: kasan: bad access detected
[   17.118347] 
[   17.118510] Memory state around the buggy address:
[   17.119018]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.119673]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.120324] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.120545]                                      ^
[   17.120706]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.121358]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.122038] ==================================================================
[   16.893999] ==================================================================
[   16.894739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   16.895528] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.896839] 
[   16.897031] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.897089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.897103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.897126] Call Trace:
[   16.897143]  <TASK>
[   16.897159]  dump_stack_lvl+0x73/0xb0
[   16.897188]  print_report+0xd1/0x650
[   16.897213]  ? __virt_addr_valid+0x1db/0x2d0
[   16.897237]  ? kasan_atomics_helper+0x1217/0x5450
[   16.897259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.897287]  ? kasan_atomics_helper+0x1217/0x5450
[   16.897311]  kasan_report+0x141/0x180
[   16.897336]  ? kasan_atomics_helper+0x1217/0x5450
[   16.897364]  kasan_check_range+0x10c/0x1c0
[   16.897391]  __kasan_check_write+0x18/0x20
[   16.897411]  kasan_atomics_helper+0x1217/0x5450
[   16.897437]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.897460]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.897487]  ? kasan_atomics+0x152/0x310
[   16.897517]  kasan_atomics+0x1dc/0x310
[   16.897546]  ? __pfx_kasan_atomics+0x10/0x10
[   16.897572]  ? __pfx_read_tsc+0x10/0x10
[   16.897595]  ? ktime_get_ts64+0x86/0x230
[   16.897622]  kunit_try_run_case+0x1a5/0x480
[   16.897648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.897672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.897697]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.897722]  ? __kthread_parkme+0x82/0x180
[   16.897745]  ? preempt_count_sub+0x50/0x80
[   16.897771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.897797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.897822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.897847]  kthread+0x337/0x6f0
[   16.897868]  ? trace_preempt_on+0x20/0xc0
[   16.897894]  ? __pfx_kthread+0x10/0x10
[   16.897916]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.897939]  ? calculate_sigpending+0x7b/0xa0
[   16.897963]  ? __pfx_kthread+0x10/0x10
[   16.897988]  ret_from_fork+0x116/0x1d0
[   16.898007]  ? __pfx_kthread+0x10/0x10
[   16.898030]  ret_from_fork_asm+0x1a/0x30
[   16.898073]  </TASK>
[   16.898086] 
[   16.910440] Allocated by task 282:
[   16.910811]  kasan_save_stack+0x45/0x70
[   16.911206]  kasan_save_track+0x18/0x40
[   16.911591]  kasan_save_alloc_info+0x3b/0x50
[   16.912022]  __kasan_kmalloc+0xb7/0xc0
[   16.912405]  __kmalloc_cache_noprof+0x189/0x420
[   16.912874]  kasan_atomics+0x95/0x310
[   16.913378]  kunit_try_run_case+0x1a5/0x480
[   16.913806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.914324]  kthread+0x337/0x6f0
[   16.914609]  ret_from_fork+0x116/0x1d0
[   16.914772]  ret_from_fork_asm+0x1a/0x30
[   16.915138] 
[   16.915324] The buggy address belongs to the object at ffff8881031d0c00
[   16.915324]  which belongs to the cache kmalloc-64 of size 64
[   16.916008] The buggy address is located 0 bytes to the right of
[   16.916008]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.917086] 
[   16.917165] The buggy address belongs to the physical page:
[   16.917348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.917605] flags: 0x200000000000000(node=0|zone=2)
[   16.917872] page_type: f5(slab)
[   16.918215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.918996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.919677] page dumped because: kasan: bad access detected
[   16.920269] 
[   16.920430] Memory state around the buggy address:
[   16.920939]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.921583]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.922124] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.922347]                                      ^
[   16.922506]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.922738]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.923380] ==================================================================
[   16.232483] ==================================================================
[   16.232749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   16.233151] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.233514] 
[   16.233638] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.233686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.233700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.233724] Call Trace:
[   16.233740]  <TASK>
[   16.233757]  dump_stack_lvl+0x73/0xb0
[   16.233786]  print_report+0xd1/0x650
[   16.233810]  ? __virt_addr_valid+0x1db/0x2d0
[   16.233835]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.233859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.233887]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.233912]  kasan_report+0x141/0x180
[   16.233937]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.233995]  __asan_report_load4_noabort+0x18/0x20
[   16.234024]  kasan_atomics_helper+0x4b54/0x5450
[   16.234061]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.234086]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.234133]  ? kasan_atomics+0x152/0x310
[   16.234164]  kasan_atomics+0x1dc/0x310
[   16.234207]  ? __pfx_kasan_atomics+0x10/0x10
[   16.234249]  ? __pfx_read_tsc+0x10/0x10
[   16.234287]  ? ktime_get_ts64+0x86/0x230
[   16.234329]  kunit_try_run_case+0x1a5/0x480
[   16.234371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.234425]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.234451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.234491]  ? __kthread_parkme+0x82/0x180
[   16.234513]  ? preempt_count_sub+0x50/0x80
[   16.234540]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.234566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.234591]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.234617]  kthread+0x337/0x6f0
[   16.234639]  ? trace_preempt_on+0x20/0xc0
[   16.234664]  ? __pfx_kthread+0x10/0x10
[   16.234687]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.234710]  ? calculate_sigpending+0x7b/0xa0
[   16.234736]  ? __pfx_kthread+0x10/0x10
[   16.234760]  ret_from_fork+0x116/0x1d0
[   16.234780]  ? __pfx_kthread+0x10/0x10
[   16.234803]  ret_from_fork_asm+0x1a/0x30
[   16.234838]  </TASK>
[   16.234851] 
[   16.243213] Allocated by task 282:
[   16.243509]  kasan_save_stack+0x45/0x70
[   16.243720]  kasan_save_track+0x18/0x40
[   16.243939]  kasan_save_alloc_info+0x3b/0x50
[   16.244282]  __kasan_kmalloc+0xb7/0xc0
[   16.244488]  __kmalloc_cache_noprof+0x189/0x420
[   16.244726]  kasan_atomics+0x95/0x310
[   16.244932]  kunit_try_run_case+0x1a5/0x480
[   16.245169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.245436]  kthread+0x337/0x6f0
[   16.245593]  ret_from_fork+0x116/0x1d0
[   16.245739]  ret_from_fork_asm+0x1a/0x30
[   16.245923] 
[   16.246094] The buggy address belongs to the object at ffff8881031d0c00
[   16.246094]  which belongs to the cache kmalloc-64 of size 64
[   16.246615] The buggy address is located 0 bytes to the right of
[   16.246615]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.247214] 
[   16.247321] The buggy address belongs to the physical page:
[   16.247585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.247961] flags: 0x200000000000000(node=0|zone=2)
[   16.248209] page_type: f5(slab)
[   16.248420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.248832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.249193] page dumped because: kasan: bad access detected
[   16.249465] 
[   16.249567] Memory state around the buggy address:
[   16.249798]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.250131]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.250507] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.250723]                                      ^
[   16.250964]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.251304]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.251623] ==================================================================
[   16.826929] ==================================================================
[   16.829036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   16.829426] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.830598] 
[   16.830854] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.830925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.830939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.830963] Call Trace:
[   16.830979]  <TASK>
[   16.831006]  dump_stack_lvl+0x73/0xb0
[   16.831038]  print_report+0xd1/0x650
[   16.831083]  ? __virt_addr_valid+0x1db/0x2d0
[   16.831108]  ? kasan_atomics_helper+0x1148/0x5450
[   16.831131]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.831159]  ? kasan_atomics_helper+0x1148/0x5450
[   16.831183]  kasan_report+0x141/0x180
[   16.831207]  ? kasan_atomics_helper+0x1148/0x5450
[   16.831237]  kasan_check_range+0x10c/0x1c0
[   16.831263]  __kasan_check_write+0x18/0x20
[   16.831285]  kasan_atomics_helper+0x1148/0x5450
[   16.831310]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.831333]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.831360]  ? kasan_atomics+0x152/0x310
[   16.831389]  kasan_atomics+0x1dc/0x310
[   16.831414]  ? __pfx_kasan_atomics+0x10/0x10
[   16.831440]  ? __pfx_read_tsc+0x10/0x10
[   16.831463]  ? ktime_get_ts64+0x86/0x230
[   16.831490]  kunit_try_run_case+0x1a5/0x480
[   16.831516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.831540]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.831565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.831589]  ? __kthread_parkme+0x82/0x180
[   16.831611]  ? preempt_count_sub+0x50/0x80
[   16.831636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.831662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.831687]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.833285]  kthread+0x337/0x6f0
[   16.833326]  ? trace_preempt_on+0x20/0xc0
[   16.833354]  ? __pfx_kthread+0x10/0x10
[   16.833380]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.833403]  ? calculate_sigpending+0x7b/0xa0
[   16.833427]  ? __pfx_kthread+0x10/0x10
[   16.833451]  ret_from_fork+0x116/0x1d0
[   16.833471]  ? __pfx_kthread+0x10/0x10
[   16.833493]  ret_from_fork_asm+0x1a/0x30
[   16.833534]  </TASK>
[   16.833547] 
[   16.848439] Allocated by task 282:
[   16.848800]  kasan_save_stack+0x45/0x70
[   16.849213]  kasan_save_track+0x18/0x40
[   16.849615]  kasan_save_alloc_info+0x3b/0x50
[   16.850124]  __kasan_kmalloc+0xb7/0xc0
[   16.850498]  __kmalloc_cache_noprof+0x189/0x420
[   16.850949]  kasan_atomics+0x95/0x310
[   16.851330]  kunit_try_run_case+0x1a5/0x480
[   16.851745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.852253]  kthread+0x337/0x6f0
[   16.852588]  ret_from_fork+0x116/0x1d0
[   16.853000]  ret_from_fork_asm+0x1a/0x30
[   16.853414] 
[   16.853504] The buggy address belongs to the object at ffff8881031d0c00
[   16.853504]  which belongs to the cache kmalloc-64 of size 64
[   16.854565] The buggy address is located 0 bytes to the right of
[   16.854565]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.855252] 
[   16.855334] The buggy address belongs to the physical page:
[   16.855517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.855858] flags: 0x200000000000000(node=0|zone=2)
[   16.856338] page_type: f5(slab)
[   16.856674] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.857385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.858159] page dumped because: kasan: bad access detected
[   16.858659] 
[   16.858846] Memory state around the buggy address:
[   16.859354]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.860162]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.860624] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.861018]                                      ^
[   16.861481]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.862220]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.862795] ==================================================================
[   16.212882] ==================================================================
[   16.213327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   16.213734] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.214394] 
[   16.214568] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.214635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.214649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.214671] Call Trace:
[   16.214687]  <TASK>
[   16.214702]  dump_stack_lvl+0x73/0xb0
[   16.214731]  print_report+0xd1/0x650
[   16.214755]  ? __virt_addr_valid+0x1db/0x2d0
[   16.214778]  ? kasan_atomics_helper+0x3df/0x5450
[   16.214799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.214827]  ? kasan_atomics_helper+0x3df/0x5450
[   16.214849]  kasan_report+0x141/0x180
[   16.214873]  ? kasan_atomics_helper+0x3df/0x5450
[   16.214900]  kasan_check_range+0x10c/0x1c0
[   16.214925]  __kasan_check_read+0x15/0x20
[   16.214966]  kasan_atomics_helper+0x3df/0x5450
[   16.214990]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.215014]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.215068]  ? kasan_atomics+0x152/0x310
[   16.215097]  kasan_atomics+0x1dc/0x310
[   16.215121]  ? __pfx_kasan_atomics+0x10/0x10
[   16.215164]  ? __pfx_read_tsc+0x10/0x10
[   16.215185]  ? ktime_get_ts64+0x86/0x230
[   16.215212]  kunit_try_run_case+0x1a5/0x480
[   16.215237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.215259]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.215284]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.215308]  ? __kthread_parkme+0x82/0x180
[   16.215329]  ? preempt_count_sub+0x50/0x80
[   16.215354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.215379]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.215403]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.215427]  kthread+0x337/0x6f0
[   16.215448]  ? trace_preempt_on+0x20/0xc0
[   16.215472]  ? __pfx_kthread+0x10/0x10
[   16.215494]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.215516]  ? calculate_sigpending+0x7b/0xa0
[   16.215541]  ? __pfx_kthread+0x10/0x10
[   16.215564]  ret_from_fork+0x116/0x1d0
[   16.215583]  ? __pfx_kthread+0x10/0x10
[   16.215604]  ret_from_fork_asm+0x1a/0x30
[   16.215638]  </TASK>
[   16.215650] 
[   16.223883] Allocated by task 282:
[   16.224061]  kasan_save_stack+0x45/0x70
[   16.224290]  kasan_save_track+0x18/0x40
[   16.224508]  kasan_save_alloc_info+0x3b/0x50
[   16.224749]  __kasan_kmalloc+0xb7/0xc0
[   16.224937]  __kmalloc_cache_noprof+0x189/0x420
[   16.225180]  kasan_atomics+0x95/0x310
[   16.225376]  kunit_try_run_case+0x1a5/0x480
[   16.225600]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.225855]  kthread+0x337/0x6f0
[   16.225985]  ret_from_fork+0x116/0x1d0
[   16.226136]  ret_from_fork_asm+0x1a/0x30
[   16.226295] 
[   16.226398] The buggy address belongs to the object at ffff8881031d0c00
[   16.226398]  which belongs to the cache kmalloc-64 of size 64
[   16.227038] The buggy address is located 0 bytes to the right of
[   16.227038]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.227615] 
[   16.227751] The buggy address belongs to the physical page:
[   16.227960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.228223] flags: 0x200000000000000(node=0|zone=2)
[   16.228396] page_type: f5(slab)
[   16.228524] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.228879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.229240] page dumped because: kasan: bad access detected
[   16.229504] 
[   16.229630] Memory state around the buggy address:
[   16.230041]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.230293]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.230521] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.230770]                                      ^
[   16.231015]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.231425]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.231864] ==================================================================
[   16.125574] ==================================================================
[   16.126554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   16.127943] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.128439] 
[   16.128538] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.128584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.128596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.128617] Call Trace:
[   16.128629]  <TASK>
[   16.128644]  dump_stack_lvl+0x73/0xb0
[   16.128676]  print_report+0xd1/0x650
[   16.128698]  ? __virt_addr_valid+0x1db/0x2d0
[   16.129267]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.129293]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.129321]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.129344]  kasan_report+0x141/0x180
[   16.129367]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.129394]  __asan_report_store4_noabort+0x1b/0x30
[   16.129419]  kasan_atomics_helper+0x4ba2/0x5450
[   16.129443]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.129466]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.129495]  ? kasan_atomics+0x152/0x310
[   16.129531]  kasan_atomics+0x1dc/0x310
[   16.129554]  ? __pfx_kasan_atomics+0x10/0x10
[   16.129579]  ? __pfx_read_tsc+0x10/0x10
[   16.129600]  ? ktime_get_ts64+0x86/0x230
[   16.129626]  kunit_try_run_case+0x1a5/0x480
[   16.129650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.129672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.129698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.129720]  ? __kthread_parkme+0x82/0x180
[   16.129742]  ? preempt_count_sub+0x50/0x80
[   16.129765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.129790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.129813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.129837]  kthread+0x337/0x6f0
[   16.129858]  ? trace_preempt_on+0x20/0xc0
[   16.129880]  ? __pfx_kthread+0x10/0x10
[   16.129901]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.129923]  ? calculate_sigpending+0x7b/0xa0
[   16.129947]  ? __pfx_kthread+0x10/0x10
[   16.129969]  ret_from_fork+0x116/0x1d0
[   16.129988]  ? __pfx_kthread+0x10/0x10
[   16.130010]  ret_from_fork_asm+0x1a/0x30
[   16.130043]  </TASK>
[   16.130066] 
[   16.147059] Allocated by task 282:
[   16.147362]  kasan_save_stack+0x45/0x70
[   16.147649]  kasan_save_track+0x18/0x40
[   16.148164]  kasan_save_alloc_info+0x3b/0x50
[   16.148617]  __kasan_kmalloc+0xb7/0xc0
[   16.148957]  __kmalloc_cache_noprof+0x189/0x420
[   16.149372]  kasan_atomics+0x95/0x310
[   16.149513]  kunit_try_run_case+0x1a5/0x480
[   16.149669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.150235]  kthread+0x337/0x6f0
[   16.150602]  ret_from_fork+0x116/0x1d0
[   16.151014]  ret_from_fork_asm+0x1a/0x30
[   16.151458] 
[   16.151643] The buggy address belongs to the object at ffff8881031d0c00
[   16.151643]  which belongs to the cache kmalloc-64 of size 64
[   16.152594] The buggy address is located 0 bytes to the right of
[   16.152594]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.153699] 
[   16.153809] The buggy address belongs to the physical page:
[   16.154309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.154984] flags: 0x200000000000000(node=0|zone=2)
[   16.155499] page_type: f5(slab)
[   16.155668] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.156331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.157087] page dumped because: kasan: bad access detected
[   16.157654] 
[   16.157762] Memory state around the buggy address:
[   16.158121]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.158347]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.158569] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.158814]                                      ^
[   16.159030]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.159682]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.160366] ==================================================================
[   17.717994] ==================================================================
[   17.718264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   17.718622] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.719159] 
[   17.719276] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.719321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.719333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.719356] Call Trace:
[   17.719372]  <TASK>
[   17.719388]  dump_stack_lvl+0x73/0xb0
[   17.719417]  print_report+0xd1/0x650
[   17.719440]  ? __virt_addr_valid+0x1db/0x2d0
[   17.719462]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.719485]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.719512]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.719535]  kasan_report+0x141/0x180
[   17.719558]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.719585]  __asan_report_load8_noabort+0x18/0x20
[   17.719610]  kasan_atomics_helper+0x4fb2/0x5450
[   17.719633]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.719656]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.719682]  ? kasan_atomics+0x152/0x310
[   17.719710]  kasan_atomics+0x1dc/0x310
[   17.719733]  ? __pfx_kasan_atomics+0x10/0x10
[   17.719758]  ? __pfx_read_tsc+0x10/0x10
[   17.719805]  ? ktime_get_ts64+0x86/0x230
[   17.719831]  kunit_try_run_case+0x1a5/0x480
[   17.719856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.719879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.719916]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.719940]  ? __kthread_parkme+0x82/0x180
[   17.719961]  ? preempt_count_sub+0x50/0x80
[   17.719985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.720010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.720033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.720068]  kthread+0x337/0x6f0
[   17.720089]  ? trace_preempt_on+0x20/0xc0
[   17.720113]  ? __pfx_kthread+0x10/0x10
[   17.720135]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.720156]  ? calculate_sigpending+0x7b/0xa0
[   17.720180]  ? __pfx_kthread+0x10/0x10
[   17.720203]  ret_from_fork+0x116/0x1d0
[   17.720221]  ? __pfx_kthread+0x10/0x10
[   17.720243]  ret_from_fork_asm+0x1a/0x30
[   17.720275]  </TASK>
[   17.720288] 
[   17.728118] Allocated by task 282:
[   17.728313]  kasan_save_stack+0x45/0x70
[   17.728520]  kasan_save_track+0x18/0x40
[   17.728709]  kasan_save_alloc_info+0x3b/0x50
[   17.728935]  __kasan_kmalloc+0xb7/0xc0
[   17.729087]  __kmalloc_cache_noprof+0x189/0x420
[   17.729291]  kasan_atomics+0x95/0x310
[   17.729487]  kunit_try_run_case+0x1a5/0x480
[   17.729722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.729930]  kthread+0x337/0x6f0
[   17.730076]  ret_from_fork+0x116/0x1d0
[   17.730218]  ret_from_fork_asm+0x1a/0x30
[   17.730399] 
[   17.730502] The buggy address belongs to the object at ffff8881031d0c00
[   17.730502]  which belongs to the cache kmalloc-64 of size 64
[   17.731106] The buggy address is located 0 bytes to the right of
[   17.731106]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.731918] 
[   17.732000] The buggy address belongs to the physical page:
[   17.732264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.732648] flags: 0x200000000000000(node=0|zone=2)
[   17.732906] page_type: f5(slab)
[   17.733033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.733400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.733737] page dumped because: kasan: bad access detected
[   17.733919] 
[   17.733993] Memory state around the buggy address:
[   17.734361]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.734734]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.735139] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.735361]                                      ^
[   17.735755]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.736119]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.736438] ==================================================================
[   17.793960] ==================================================================
[   17.794623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   17.795390] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.796446] 
[   17.796637] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.796683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.796697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.796720] Call Trace:
[   17.796736]  <TASK>
[   17.796754]  dump_stack_lvl+0x73/0xb0
[   17.796781]  print_report+0xd1/0x650
[   17.796806]  ? __virt_addr_valid+0x1db/0x2d0
[   17.796830]  ? kasan_atomics_helper+0x224c/0x5450
[   17.796851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.796880]  ? kasan_atomics_helper+0x224c/0x5450
[   17.796914]  kasan_report+0x141/0x180
[   17.796937]  ? kasan_atomics_helper+0x224c/0x5450
[   17.796967]  kasan_check_range+0x10c/0x1c0
[   17.796993]  __kasan_check_write+0x18/0x20
[   17.797014]  kasan_atomics_helper+0x224c/0x5450
[   17.797038]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.797074]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.797101]  ? kasan_atomics+0x152/0x310
[   17.797130]  kasan_atomics+0x1dc/0x310
[   17.797155]  ? __pfx_kasan_atomics+0x10/0x10
[   17.797181]  ? __pfx_read_tsc+0x10/0x10
[   17.797204]  ? ktime_get_ts64+0x86/0x230
[   17.797231]  kunit_try_run_case+0x1a5/0x480
[   17.797256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.797279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.797305]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.797330]  ? __kthread_parkme+0x82/0x180
[   17.797351]  ? preempt_count_sub+0x50/0x80
[   17.797378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.797404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.797428]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.797452]  kthread+0x337/0x6f0
[   17.797474]  ? trace_preempt_on+0x20/0xc0
[   17.797498]  ? __pfx_kthread+0x10/0x10
[   17.797525]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.797548]  ? calculate_sigpending+0x7b/0xa0
[   17.797572]  ? __pfx_kthread+0x10/0x10
[   17.797596]  ret_from_fork+0x116/0x1d0
[   17.797616]  ? __pfx_kthread+0x10/0x10
[   17.797639]  ret_from_fork_asm+0x1a/0x30
[   17.797673]  </TASK>
[   17.797690] 
[   17.806018] Allocated by task 282:
[   17.806203]  kasan_save_stack+0x45/0x70
[   17.806395]  kasan_save_track+0x18/0x40
[   17.806541]  kasan_save_alloc_info+0x3b/0x50
[   17.806811]  __kasan_kmalloc+0xb7/0xc0
[   17.807016]  __kmalloc_cache_noprof+0x189/0x420
[   17.807207]  kasan_atomics+0x95/0x310
[   17.807414]  kunit_try_run_case+0x1a5/0x480
[   17.807626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.807895]  kthread+0x337/0x6f0
[   17.808045]  ret_from_fork+0x116/0x1d0
[   17.808266]  ret_from_fork_asm+0x1a/0x30
[   17.808470] 
[   17.808549] The buggy address belongs to the object at ffff8881031d0c00
[   17.808549]  which belongs to the cache kmalloc-64 of size 64
[   17.809178] The buggy address is located 0 bytes to the right of
[   17.809178]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.809660] 
[   17.809754] The buggy address belongs to the physical page:
[   17.810027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.810399] flags: 0x200000000000000(node=0|zone=2)
[   17.810607] page_type: f5(slab)
[   17.810740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.811534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.811850] page dumped because: kasan: bad access detected
[   17.812036] 
[   17.812122] Memory state around the buggy address:
[   17.812289]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.812680]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.813135] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.813414]                                      ^
[   17.813580]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.813809]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.814038] ==================================================================
[   16.399010] ==================================================================
[   16.399284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   16.399630] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.400349] 
[   16.400566] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.400664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.400679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.400702] Call Trace:
[   16.400718]  <TASK>
[   16.400734]  dump_stack_lvl+0x73/0xb0
[   16.400764]  print_report+0xd1/0x650
[   16.400788]  ? __virt_addr_valid+0x1db/0x2d0
[   16.400812]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.400835]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.400862]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.400885]  kasan_report+0x141/0x180
[   16.400908]  ? kasan_atomics_helper+0x7c7/0x5450
[   16.400937]  kasan_check_range+0x10c/0x1c0
[   16.400962]  __kasan_check_write+0x18/0x20
[   16.400982]  kasan_atomics_helper+0x7c7/0x5450
[   16.401007]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.401030]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.401070]  ? kasan_atomics+0x152/0x310
[   16.401100]  kasan_atomics+0x1dc/0x310
[   16.401135]  ? __pfx_kasan_atomics+0x10/0x10
[   16.401161]  ? __pfx_read_tsc+0x10/0x10
[   16.401183]  ? ktime_get_ts64+0x86/0x230
[   16.401210]  kunit_try_run_case+0x1a5/0x480
[   16.401274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.401324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.401349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.401374]  ? __kthread_parkme+0x82/0x180
[   16.401395]  ? preempt_count_sub+0x50/0x80
[   16.401421]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.401446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.401471]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.401496]  kthread+0x337/0x6f0
[   16.401517]  ? trace_preempt_on+0x20/0xc0
[   16.401551]  ? __pfx_kthread+0x10/0x10
[   16.401574]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.401597]  ? calculate_sigpending+0x7b/0xa0
[   16.401622]  ? __pfx_kthread+0x10/0x10
[   16.401646]  ret_from_fork+0x116/0x1d0
[   16.401666]  ? __pfx_kthread+0x10/0x10
[   16.401687]  ret_from_fork_asm+0x1a/0x30
[   16.401722]  </TASK>
[   16.401741] 
[   16.410159] Allocated by task 282:
[   16.410368]  kasan_save_stack+0x45/0x70
[   16.410591]  kasan_save_track+0x18/0x40
[   16.410844]  kasan_save_alloc_info+0x3b/0x50
[   16.411113]  __kasan_kmalloc+0xb7/0xc0
[   16.411331]  __kmalloc_cache_noprof+0x189/0x420
[   16.411572]  kasan_atomics+0x95/0x310
[   16.411729]  kunit_try_run_case+0x1a5/0x480
[   16.411976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.412302]  kthread+0x337/0x6f0
[   16.412433]  ret_from_fork+0x116/0x1d0
[   16.412571]  ret_from_fork_asm+0x1a/0x30
[   16.412769] 
[   16.412870] The buggy address belongs to the object at ffff8881031d0c00
[   16.412870]  which belongs to the cache kmalloc-64 of size 64
[   16.413520] The buggy address is located 0 bytes to the right of
[   16.413520]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.414125] 
[   16.414202] The buggy address belongs to the physical page:
[   16.414430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.414967] flags: 0x200000000000000(node=0|zone=2)
[   16.415236] page_type: f5(slab)
[   16.415424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.415820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.416286] page dumped because: kasan: bad access detected
[   16.416473] 
[   16.416549] Memory state around the buggy address:
[   16.416711]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.416936]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.417317] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.418129]                                      ^
[   16.418738]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.419496]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.420326] ==================================================================
[   17.403221] ==================================================================
[   17.404158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   17.404691] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.405583] 
[   17.405688] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.405748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.405763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.405786] Call Trace:
[   17.405803]  <TASK>
[   17.405843]  dump_stack_lvl+0x73/0xb0
[   17.405874]  print_report+0xd1/0x650
[   17.405899]  ? __virt_addr_valid+0x1db/0x2d0
[   17.405923]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.405946]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.405975]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.405999]  kasan_report+0x141/0x180
[   17.406022]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.406063]  kasan_check_range+0x10c/0x1c0
[   17.406089]  __kasan_check_write+0x18/0x20
[   17.406110]  kasan_atomics_helper+0x1c18/0x5450
[   17.406135]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.406159]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.406186]  ? kasan_atomics+0x152/0x310
[   17.406215]  kasan_atomics+0x1dc/0x310
[   17.406240]  ? __pfx_kasan_atomics+0x10/0x10
[   17.406267]  ? __pfx_read_tsc+0x10/0x10
[   17.406289]  ? ktime_get_ts64+0x86/0x230
[   17.406316]  kunit_try_run_case+0x1a5/0x480
[   17.406341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.406366]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.406390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.406415]  ? __kthread_parkme+0x82/0x180
[   17.406437]  ? preempt_count_sub+0x50/0x80
[   17.406462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.406488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.406513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.406537]  kthread+0x337/0x6f0
[   17.406559]  ? trace_preempt_on+0x20/0xc0
[   17.406584]  ? __pfx_kthread+0x10/0x10
[   17.406606]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.406629]  ? calculate_sigpending+0x7b/0xa0
[   17.406655]  ? __pfx_kthread+0x10/0x10
[   17.406679]  ret_from_fork+0x116/0x1d0
[   17.406699]  ? __pfx_kthread+0x10/0x10
[   17.406721]  ret_from_fork_asm+0x1a/0x30
[   17.406905]  </TASK>
[   17.406919] 
[   17.421037] Allocated by task 282:
[   17.421517]  kasan_save_stack+0x45/0x70
[   17.422024]  kasan_save_track+0x18/0x40
[   17.422496]  kasan_save_alloc_info+0x3b/0x50
[   17.423016]  __kasan_kmalloc+0xb7/0xc0
[   17.423481]  __kmalloc_cache_noprof+0x189/0x420
[   17.424030]  kasan_atomics+0x95/0x310
[   17.424494]  kunit_try_run_case+0x1a5/0x480
[   17.425030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.425318]  kthread+0x337/0x6f0
[   17.425444]  ret_from_fork+0x116/0x1d0
[   17.425581]  ret_from_fork_asm+0x1a/0x30
[   17.425721] 
[   17.425797] The buggy address belongs to the object at ffff8881031d0c00
[   17.425797]  which belongs to the cache kmalloc-64 of size 64
[   17.426166] The buggy address is located 0 bytes to the right of
[   17.426166]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.426534] 
[   17.426610] The buggy address belongs to the physical page:
[   17.426968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.428207] flags: 0x200000000000000(node=0|zone=2)
[   17.428774] page_type: f5(slab)
[   17.429190] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.430002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.430776] page dumped because: kasan: bad access detected
[   17.431398] 
[   17.431566] Memory state around the buggy address:
[   17.432198]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.433179]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.433913] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.434492]                                      ^
[   17.434659]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.435370]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.436168] ==================================================================
[   17.498576] ==================================================================
[   17.498886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   17.499645] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.500171] 
[   17.500359] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.500429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.500443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.500467] Call Trace:
[   17.500482]  <TASK>
[   17.500500]  dump_stack_lvl+0x73/0xb0
[   17.500529]  print_report+0xd1/0x650
[   17.500553]  ? __virt_addr_valid+0x1db/0x2d0
[   17.500577]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.500619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.500647]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.500671]  kasan_report+0x141/0x180
[   17.500695]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.500724]  kasan_check_range+0x10c/0x1c0
[   17.500750]  __kasan_check_write+0x18/0x20
[   17.500772]  kasan_atomics_helper+0x1d7a/0x5450
[   17.500796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.500820]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.500846]  ? kasan_atomics+0x152/0x310
[   17.500876]  kasan_atomics+0x1dc/0x310
[   17.500901]  ? __pfx_kasan_atomics+0x10/0x10
[   17.500927]  ? __pfx_read_tsc+0x10/0x10
[   17.500950]  ? ktime_get_ts64+0x86/0x230
[   17.500977]  kunit_try_run_case+0x1a5/0x480
[   17.501002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.501027]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.501062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.501088]  ? __kthread_parkme+0x82/0x180
[   17.501109]  ? preempt_count_sub+0x50/0x80
[   17.501135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.501161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.501185]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.501210]  kthread+0x337/0x6f0
[   17.501231]  ? trace_preempt_on+0x20/0xc0
[   17.501256]  ? __pfx_kthread+0x10/0x10
[   17.501279]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.501302]  ? calculate_sigpending+0x7b/0xa0
[   17.501327]  ? __pfx_kthread+0x10/0x10
[   17.501351]  ret_from_fork+0x116/0x1d0
[   17.501370]  ? __pfx_kthread+0x10/0x10
[   17.501392]  ret_from_fork_asm+0x1a/0x30
[   17.501425]  </TASK>
[   17.501438] 
[   17.513184] Allocated by task 282:
[   17.513388]  kasan_save_stack+0x45/0x70
[   17.513795]  kasan_save_track+0x18/0x40
[   17.514191]  kasan_save_alloc_info+0x3b/0x50
[   17.514398]  __kasan_kmalloc+0xb7/0xc0
[   17.514536]  __kmalloc_cache_noprof+0x189/0x420
[   17.514694]  kasan_atomics+0x95/0x310
[   17.515103]  kunit_try_run_case+0x1a5/0x480
[   17.515520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.516186]  kthread+0x337/0x6f0
[   17.516592]  ret_from_fork+0x116/0x1d0
[   17.517011]  ret_from_fork_asm+0x1a/0x30
[   17.517399] 
[   17.517475] The buggy address belongs to the object at ffff8881031d0c00
[   17.517475]  which belongs to the cache kmalloc-64 of size 64
[   17.518083] The buggy address is located 0 bytes to the right of
[   17.518083]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.519264] 
[   17.519449] The buggy address belongs to the physical page:
[   17.519914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.520175] flags: 0x200000000000000(node=0|zone=2)
[   17.520347] page_type: f5(slab)
[   17.520475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.520710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.521466] page dumped because: kasan: bad access detected
[   17.522109] 
[   17.522309] Memory state around the buggy address:
[   17.522769]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.523422]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.524247] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.524827]                                      ^
[   17.524985]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.525214]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.525428] ==================================================================
[   17.763891] ==================================================================
[   17.764839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   17.765579] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.766390] 
[   17.766500] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.766566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.766583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.766605] Call Trace:
[   17.766621]  <TASK>
[   17.766640]  dump_stack_lvl+0x73/0xb0
[   17.766671]  print_report+0xd1/0x650
[   17.766729]  ? __virt_addr_valid+0x1db/0x2d0
[   17.766771]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.766792]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.766820]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.766842]  kasan_report+0x141/0x180
[   17.766865]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.766894]  __asan_report_load8_noabort+0x18/0x20
[   17.766920]  kasan_atomics_helper+0x4fa5/0x5450
[   17.766967]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.766990]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.767016]  ? kasan_atomics+0x152/0x310
[   17.767075]  kasan_atomics+0x1dc/0x310
[   17.767098]  ? __pfx_kasan_atomics+0x10/0x10
[   17.767124]  ? __pfx_read_tsc+0x10/0x10
[   17.767146]  ? ktime_get_ts64+0x86/0x230
[   17.767172]  kunit_try_run_case+0x1a5/0x480
[   17.767197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.767220]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.767245]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.767269]  ? __kthread_parkme+0x82/0x180
[   17.767290]  ? preempt_count_sub+0x50/0x80
[   17.767314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.767340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.767363]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.767387]  kthread+0x337/0x6f0
[   17.767408]  ? trace_preempt_on+0x20/0xc0
[   17.767432]  ? __pfx_kthread+0x10/0x10
[   17.767454]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.767476]  ? calculate_sigpending+0x7b/0xa0
[   17.767500]  ? __pfx_kthread+0x10/0x10
[   17.767523]  ret_from_fork+0x116/0x1d0
[   17.767543]  ? __pfx_kthread+0x10/0x10
[   17.767565]  ret_from_fork_asm+0x1a/0x30
[   17.767597]  </TASK>
[   17.767610] 
[   17.780439] Allocated by task 282:
[   17.780776]  kasan_save_stack+0x45/0x70
[   17.781212]  kasan_save_track+0x18/0x40
[   17.781582]  kasan_save_alloc_info+0x3b/0x50
[   17.782020]  __kasan_kmalloc+0xb7/0xc0
[   17.782269]  __kmalloc_cache_noprof+0x189/0x420
[   17.782432]  kasan_atomics+0x95/0x310
[   17.782572]  kunit_try_run_case+0x1a5/0x480
[   17.782723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.783211]  kthread+0x337/0x6f0
[   17.783513]  ret_from_fork+0x116/0x1d0
[   17.783864]  ret_from_fork_asm+0x1a/0x30
[   17.784229] 
[   17.784394] The buggy address belongs to the object at ffff8881031d0c00
[   17.784394]  which belongs to the cache kmalloc-64 of size 64
[   17.785480] The buggy address is located 0 bytes to the right of
[   17.785480]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.786308] 
[   17.786388] The buggy address belongs to the physical page:
[   17.786571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.786984] flags: 0x200000000000000(node=0|zone=2)
[   17.787431] page_type: f5(slab)
[   17.787782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.788684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.789375] page dumped because: kasan: bad access detected
[   17.789947] 
[   17.790122] Memory state around the buggy address:
[   17.790549]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.791107]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.791340] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.791570]                                      ^
[   17.791748]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.792376]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.793067] ==================================================================
[   16.160888] ==================================================================
[   16.161683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   16.162383] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.163110] 
[   16.163340] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.163384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.163396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.163416] Call Trace:
[   16.163427]  <TASK>
[   16.163442]  dump_stack_lvl+0x73/0xb0
[   16.163469]  print_report+0xd1/0x650
[   16.163490]  ? __virt_addr_valid+0x1db/0x2d0
[   16.163513]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.163556]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.163582]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.163603]  kasan_report+0x141/0x180
[   16.163624]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.163650]  __asan_report_load4_noabort+0x18/0x20
[   16.163675]  kasan_atomics_helper+0x4b88/0x5450
[   16.163696]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.163719]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.163743]  ? kasan_atomics+0x152/0x310
[   16.163769]  kasan_atomics+0x1dc/0x310
[   16.163791]  ? __pfx_kasan_atomics+0x10/0x10
[   16.163815]  ? __pfx_read_tsc+0x10/0x10
[   16.163834]  ? ktime_get_ts64+0x86/0x230
[   16.163860]  kunit_try_run_case+0x1a5/0x480
[   16.163882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.163903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.163927]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.163950]  ? __kthread_parkme+0x82/0x180
[   16.163977]  ? preempt_count_sub+0x50/0x80
[   16.164001]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.164024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.164057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.164080]  kthread+0x337/0x6f0
[   16.164099]  ? trace_preempt_on+0x20/0xc0
[   16.164122]  ? __pfx_kthread+0x10/0x10
[   16.164142]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.164162]  ? calculate_sigpending+0x7b/0xa0
[   16.164185]  ? __pfx_kthread+0x10/0x10
[   16.164206]  ret_from_fork+0x116/0x1d0
[   16.164225]  ? __pfx_kthread+0x10/0x10
[   16.164245]  ret_from_fork_asm+0x1a/0x30
[   16.164276]  </TASK>
[   16.164288] 
[   16.176271] Allocated by task 282:
[   16.176670]  kasan_save_stack+0x45/0x70
[   16.177177]  kasan_save_track+0x18/0x40
[   16.177658]  kasan_save_alloc_info+0x3b/0x50
[   16.177979]  __kasan_kmalloc+0xb7/0xc0
[   16.178406]  __kmalloc_cache_noprof+0x189/0x420
[   16.178807]  kasan_atomics+0x95/0x310
[   16.179078]  kunit_try_run_case+0x1a5/0x480
[   16.179570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.180130]  kthread+0x337/0x6f0
[   16.180265]  ret_from_fork+0x116/0x1d0
[   16.180452]  ret_from_fork_asm+0x1a/0x30
[   16.180612] 
[   16.180703] The buggy address belongs to the object at ffff8881031d0c00
[   16.180703]  which belongs to the cache kmalloc-64 of size 64
[   16.182106] The buggy address is located 0 bytes to the right of
[   16.182106]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.182978] 
[   16.183082] The buggy address belongs to the physical page:
[   16.183693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.184241] flags: 0x200000000000000(node=0|zone=2)
[   16.184825] page_type: f5(slab)
[   16.185243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.185612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.185991] page dumped because: kasan: bad access detected
[   16.186474] 
[   16.186556] Memory state around the buggy address:
[   16.186727]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.186971]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.187696] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.188547]                                      ^
[   16.189062]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.189830]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.190729] ==================================================================
[   17.289817] ==================================================================
[   17.290087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   17.290333] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.290674] 
[   17.290792] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.290836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.290849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.290871] Call Trace:
[   17.290915]  <TASK>
[   17.290931]  dump_stack_lvl+0x73/0xb0
[   17.290958]  print_report+0xd1/0x650
[   17.290982]  ? __virt_addr_valid+0x1db/0x2d0
[   17.291005]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.291028]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.291067]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.291091]  kasan_report+0x141/0x180
[   17.291114]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.291143]  kasan_check_range+0x10c/0x1c0
[   17.291169]  __kasan_check_write+0x18/0x20
[   17.291190]  kasan_atomics_helper+0x18b1/0x5450
[   17.291214]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.291237]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.291264]  ? kasan_atomics+0x152/0x310
[   17.291293]  kasan_atomics+0x1dc/0x310
[   17.291316]  ? __pfx_kasan_atomics+0x10/0x10
[   17.291342]  ? __pfx_read_tsc+0x10/0x10
[   17.291364]  ? ktime_get_ts64+0x86/0x230
[   17.291390]  kunit_try_run_case+0x1a5/0x480
[   17.291415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.291440]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.291464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.291488]  ? __kthread_parkme+0x82/0x180
[   17.291509]  ? preempt_count_sub+0x50/0x80
[   17.291534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.291559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.291582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.291607]  kthread+0x337/0x6f0
[   17.291628]  ? trace_preempt_on+0x20/0xc0
[   17.291652]  ? __pfx_kthread+0x10/0x10
[   17.291674]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.291696]  ? calculate_sigpending+0x7b/0xa0
[   17.291721]  ? __pfx_kthread+0x10/0x10
[   17.291744]  ret_from_fork+0x116/0x1d0
[   17.291763]  ? __pfx_kthread+0x10/0x10
[   17.291785]  ret_from_fork_asm+0x1a/0x30
[   17.291818]  </TASK>
[   17.291830] 
[   17.299829] Allocated by task 282:
[   17.300028]  kasan_save_stack+0x45/0x70
[   17.300252]  kasan_save_track+0x18/0x40
[   17.300461]  kasan_save_alloc_info+0x3b/0x50
[   17.300699]  __kasan_kmalloc+0xb7/0xc0
[   17.300911]  __kmalloc_cache_noprof+0x189/0x420
[   17.301121]  kasan_atomics+0x95/0x310
[   17.301282]  kunit_try_run_case+0x1a5/0x480
[   17.301508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.301769]  kthread+0x337/0x6f0
[   17.301936]  ret_from_fork+0x116/0x1d0
[   17.302089]  ret_from_fork_asm+0x1a/0x30
[   17.302238] 
[   17.302315] The buggy address belongs to the object at ffff8881031d0c00
[   17.302315]  which belongs to the cache kmalloc-64 of size 64
[   17.302693] The buggy address is located 0 bytes to the right of
[   17.302693]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.303447] 
[   17.303548] The buggy address belongs to the physical page:
[   17.303810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.304180] flags: 0x200000000000000(node=0|zone=2)
[   17.304358] page_type: f5(slab)
[   17.304487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.304733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.305197] page dumped because: kasan: bad access detected
[   17.305464] 
[   17.305569] Memory state around the buggy address:
[   17.305897]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.306245]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.306590] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.306892]                                      ^
[   17.307130]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.307362]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.307664] ==================================================================
[   16.335143] ==================================================================
[   16.335397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   16.335641] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.336403] 
[   16.336707] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.336782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.336823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.336847] Call Trace:
[   16.336862]  <TASK>
[   16.336880]  dump_stack_lvl+0x73/0xb0
[   16.336911]  print_report+0xd1/0x650
[   16.336936]  ? __virt_addr_valid+0x1db/0x2d0
[   16.336960]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.336985]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.337014]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.337038]  kasan_report+0x141/0x180
[   16.337073]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.337102]  kasan_check_range+0x10c/0x1c0
[   16.337128]  __kasan_check_write+0x18/0x20
[   16.337149]  kasan_atomics_helper+0x5fe/0x5450
[   16.337208]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.337235]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.337262]  ? kasan_atomics+0x152/0x310
[   16.337293]  kasan_atomics+0x1dc/0x310
[   16.337317]  ? __pfx_kasan_atomics+0x10/0x10
[   16.337344]  ? __pfx_read_tsc+0x10/0x10
[   16.337369]  ? ktime_get_ts64+0x86/0x230
[   16.337398]  kunit_try_run_case+0x1a5/0x480
[   16.337425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.337449]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.337475]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.337501]  ? __kthread_parkme+0x82/0x180
[   16.337529]  ? preempt_count_sub+0x50/0x80
[   16.337558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.337585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.337610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.337636]  kthread+0x337/0x6f0
[   16.337658]  ? trace_preempt_on+0x20/0xc0
[   16.337685]  ? __pfx_kthread+0x10/0x10
[   16.337709]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.337732]  ? calculate_sigpending+0x7b/0xa0
[   16.337759]  ? __pfx_kthread+0x10/0x10
[   16.337782]  ret_from_fork+0x116/0x1d0
[   16.337803]  ? __pfx_kthread+0x10/0x10
[   16.337827]  ret_from_fork_asm+0x1a/0x30
[   16.337861]  </TASK>
[   16.337876] 
[   16.348605] Allocated by task 282:
[   16.348816]  kasan_save_stack+0x45/0x70
[   16.349064]  kasan_save_track+0x18/0x40
[   16.349241]  kasan_save_alloc_info+0x3b/0x50
[   16.349489]  __kasan_kmalloc+0xb7/0xc0
[   16.349688]  __kmalloc_cache_noprof+0x189/0x420
[   16.349924]  kasan_atomics+0x95/0x310
[   16.350160]  kunit_try_run_case+0x1a5/0x480
[   16.350383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.350656]  kthread+0x337/0x6f0
[   16.350898]  ret_from_fork+0x116/0x1d0
[   16.351144]  ret_from_fork_asm+0x1a/0x30
[   16.351290] 
[   16.351365] The buggy address belongs to the object at ffff8881031d0c00
[   16.351365]  which belongs to the cache kmalloc-64 of size 64
[   16.351895] The buggy address is located 0 bytes to the right of
[   16.351895]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.352516] 
[   16.352611] The buggy address belongs to the physical page:
[   16.352941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.353302] flags: 0x200000000000000(node=0|zone=2)
[   16.353501] page_type: f5(slab)
[   16.353652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.354198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.354552] page dumped because: kasan: bad access detected
[   16.354801] 
[   16.354901] Memory state around the buggy address:
[   16.355146]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.355636]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.356030] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.356359]                                      ^
[   16.356595]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.356927]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.357167] ==================================================================
[   16.982971] ==================================================================
[   16.983700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   16.984504] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.985281] 
[   16.985375] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.985422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.985436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.985458] Call Trace:
[   16.985474]  <TASK>
[   16.985491]  dump_stack_lvl+0x73/0xb0
[   16.985520]  print_report+0xd1/0x650
[   16.985548]  ? __virt_addr_valid+0x1db/0x2d0
[   16.985572]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.985595]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.985623]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.985646]  kasan_report+0x141/0x180
[   16.985670]  ? kasan_atomics_helper+0x49ce/0x5450
[   16.985698]  __asan_report_load4_noabort+0x18/0x20
[   16.985736]  kasan_atomics_helper+0x49ce/0x5450
[   16.985760]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.985784]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.985810]  ? kasan_atomics+0x152/0x310
[   16.985840]  kasan_atomics+0x1dc/0x310
[   16.985864]  ? __pfx_kasan_atomics+0x10/0x10
[   16.985904]  ? __pfx_read_tsc+0x10/0x10
[   16.985927]  ? ktime_get_ts64+0x86/0x230
[   16.985954]  kunit_try_run_case+0x1a5/0x480
[   16.985991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.986015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.986039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.986074]  ? __kthread_parkme+0x82/0x180
[   16.986097]  ? preempt_count_sub+0x50/0x80
[   16.986122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.986148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.986172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.986198]  kthread+0x337/0x6f0
[   16.986219]  ? trace_preempt_on+0x20/0xc0
[   16.986245]  ? __pfx_kthread+0x10/0x10
[   16.986268]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.986290]  ? calculate_sigpending+0x7b/0xa0
[   16.986315]  ? __pfx_kthread+0x10/0x10
[   16.986338]  ret_from_fork+0x116/0x1d0
[   16.986358]  ? __pfx_kthread+0x10/0x10
[   16.986381]  ret_from_fork_asm+0x1a/0x30
[   16.986415]  </TASK>
[   16.986427] 
[   17.001070] Allocated by task 282:
[   17.001434]  kasan_save_stack+0x45/0x70
[   17.001835]  kasan_save_track+0x18/0x40
[   17.002032]  kasan_save_alloc_info+0x3b/0x50
[   17.002448]  __kasan_kmalloc+0xb7/0xc0
[   17.002589]  __kmalloc_cache_noprof+0x189/0x420
[   17.002772]  kasan_atomics+0x95/0x310
[   17.003066]  kunit_try_run_case+0x1a5/0x480
[   17.003230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.003412]  kthread+0x337/0x6f0
[   17.003540]  ret_from_fork+0x116/0x1d0
[   17.003677]  ret_from_fork_asm+0x1a/0x30
[   17.003926] 
[   17.004079] The buggy address belongs to the object at ffff8881031d0c00
[   17.004079]  which belongs to the cache kmalloc-64 of size 64
[   17.005290] The buggy address is located 0 bytes to the right of
[   17.005290]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.006535] 
[   17.006719] The buggy address belongs to the physical page:
[   17.007284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.007667] flags: 0x200000000000000(node=0|zone=2)
[   17.007991] page_type: f5(slab)
[   17.008324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.009079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.009716] page dumped because: kasan: bad access detected
[   17.010209] 
[   17.010344] Memory state around the buggy address:
[   17.010750]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.010995]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.011636] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.012180]                                      ^
[   17.012519]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.012975]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.013484] ==================================================================
[   17.236540] ==================================================================
[   17.237742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   17.238356] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.239493] 
[   17.239754] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.239808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.239823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.239846] Call Trace:
[   17.239864]  <TASK>
[   17.239880]  dump_stack_lvl+0x73/0xb0
[   17.239911]  print_report+0xd1/0x650
[   17.239935]  ? __virt_addr_valid+0x1db/0x2d0
[   17.239959]  ? kasan_atomics_helper+0x177f/0x5450
[   17.239982]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.240010]  ? kasan_atomics_helper+0x177f/0x5450
[   17.240034]  kasan_report+0x141/0x180
[   17.240068]  ? kasan_atomics_helper+0x177f/0x5450
[   17.240097]  kasan_check_range+0x10c/0x1c0
[   17.240123]  __kasan_check_write+0x18/0x20
[   17.240143]  kasan_atomics_helper+0x177f/0x5450
[   17.240168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.240192]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.240218]  ? kasan_atomics+0x152/0x310
[   17.240247]  kasan_atomics+0x1dc/0x310
[   17.240272]  ? __pfx_kasan_atomics+0x10/0x10
[   17.240297]  ? __pfx_read_tsc+0x10/0x10
[   17.240319]  ? ktime_get_ts64+0x86/0x230
[   17.240345]  kunit_try_run_case+0x1a5/0x480
[   17.240371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.240396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.240420]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.240444]  ? __kthread_parkme+0x82/0x180
[   17.240466]  ? preempt_count_sub+0x50/0x80
[   17.240491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.240517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.240543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.240567]  kthread+0x337/0x6f0
[   17.240588]  ? trace_preempt_on+0x20/0xc0
[   17.240613]  ? __pfx_kthread+0x10/0x10
[   17.240635]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.240658]  ? calculate_sigpending+0x7b/0xa0
[   17.240682]  ? __pfx_kthread+0x10/0x10
[   17.240706]  ret_from_fork+0x116/0x1d0
[   17.240892]  ? __pfx_kthread+0x10/0x10
[   17.240918]  ret_from_fork_asm+0x1a/0x30
[   17.240952]  </TASK>
[   17.240966] 
[   17.256509] Allocated by task 282:
[   17.256833]  kasan_save_stack+0x45/0x70
[   17.257179]  kasan_save_track+0x18/0x40
[   17.257325]  kasan_save_alloc_info+0x3b/0x50
[   17.257482]  __kasan_kmalloc+0xb7/0xc0
[   17.257627]  __kmalloc_cache_noprof+0x189/0x420
[   17.257971]  kasan_atomics+0x95/0x310
[   17.258356]  kunit_try_run_case+0x1a5/0x480
[   17.258807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.259329]  kthread+0x337/0x6f0
[   17.259676]  ret_from_fork+0x116/0x1d0
[   17.260088]  ret_from_fork_asm+0x1a/0x30
[   17.260484] 
[   17.260578] The buggy address belongs to the object at ffff8881031d0c00
[   17.260578]  which belongs to the cache kmalloc-64 of size 64
[   17.261567] The buggy address is located 0 bytes to the right of
[   17.261567]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.262467] 
[   17.262547] The buggy address belongs to the physical page:
[   17.262764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.263514] flags: 0x200000000000000(node=0|zone=2)
[   17.264014] page_type: f5(slab)
[   17.264191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.264432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.264674] page dumped because: kasan: bad access detected
[   17.265241] 
[   17.265404] Memory state around the buggy address:
[   17.265901]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.266517]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.266986] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.267834]                                      ^
[   17.268425]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.268955]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.269715] ==================================================================
[   17.376085] ==================================================================
[   17.376355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   17.376712] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.377759] 
[   17.377880] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.378080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.378098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.378121] Call Trace:
[   17.378137]  <TASK>
[   17.378155]  dump_stack_lvl+0x73/0xb0
[   17.378186]  print_report+0xd1/0x650
[   17.378209]  ? __virt_addr_valid+0x1db/0x2d0
[   17.378233]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.378258]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.378287]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.378309]  kasan_report+0x141/0x180
[   17.378333]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.378361]  kasan_check_range+0x10c/0x1c0
[   17.378386]  __kasan_check_write+0x18/0x20
[   17.378407]  kasan_atomics_helper+0x1b22/0x5450
[   17.378431]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.378454]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.378481]  ? kasan_atomics+0x152/0x310
[   17.378510]  kasan_atomics+0x1dc/0x310
[   17.378533]  ? __pfx_kasan_atomics+0x10/0x10
[   17.378559]  ? __pfx_read_tsc+0x10/0x10
[   17.378581]  ? ktime_get_ts64+0x86/0x230
[   17.378607]  kunit_try_run_case+0x1a5/0x480
[   17.378632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.378655]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.378679]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.378702]  ? __kthread_parkme+0x82/0x180
[   17.378734]  ? preempt_count_sub+0x50/0x80
[   17.378760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.378785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.378808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.378832]  kthread+0x337/0x6f0
[   17.378852]  ? trace_preempt_on+0x20/0xc0
[   17.378875]  ? __pfx_kthread+0x10/0x10
[   17.378897]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.378919]  ? calculate_sigpending+0x7b/0xa0
[   17.378944]  ? __pfx_kthread+0x10/0x10
[   17.378966]  ret_from_fork+0x116/0x1d0
[   17.379000]  ? __pfx_kthread+0x10/0x10
[   17.379022]  ret_from_fork_asm+0x1a/0x30
[   17.379064]  </TASK>
[   17.379077] 
[   17.389777] Allocated by task 282:
[   17.390268]  kasan_save_stack+0x45/0x70
[   17.390452]  kasan_save_track+0x18/0x40
[   17.390852]  kasan_save_alloc_info+0x3b/0x50
[   17.391210]  __kasan_kmalloc+0xb7/0xc0
[   17.391520]  __kmalloc_cache_noprof+0x189/0x420
[   17.391832]  kasan_atomics+0x95/0x310
[   17.392006]  kunit_try_run_case+0x1a5/0x480
[   17.392382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.392650]  kthread+0x337/0x6f0
[   17.392990]  ret_from_fork+0x116/0x1d0
[   17.393200]  ret_from_fork_asm+0x1a/0x30
[   17.393557] 
[   17.393754] The buggy address belongs to the object at ffff8881031d0c00
[   17.393754]  which belongs to the cache kmalloc-64 of size 64
[   17.394420] The buggy address is located 0 bytes to the right of
[   17.394420]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.395186] 
[   17.395418] The buggy address belongs to the physical page:
[   17.395675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.396174] flags: 0x200000000000000(node=0|zone=2)
[   17.396560] page_type: f5(slab)
[   17.396847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.397308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.397771] page dumped because: kasan: bad access detected
[   17.397967] 
[   17.398060] Memory state around the buggy address:
[   17.398235]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.398472]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.398704] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.399663]                                      ^
[   17.400281]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.401038]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.401806] ==================================================================
[   17.436932] ==================================================================
[   17.437905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   17.438555] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.439222] 
[   17.439432] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.439481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.439495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.439518] Call Trace:
[   17.439535]  <TASK>
[   17.439553]  dump_stack_lvl+0x73/0xb0
[   17.439603]  print_report+0xd1/0x650
[   17.439629]  ? __virt_addr_valid+0x1db/0x2d0
[   17.439655]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.439677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.439705]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.439739]  kasan_report+0x141/0x180
[   17.439763]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.439792]  __asan_report_load8_noabort+0x18/0x20
[   17.439818]  kasan_atomics_helper+0x4f30/0x5450
[   17.439842]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.439866]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.439893]  ? kasan_atomics+0x152/0x310
[   17.439923]  kasan_atomics+0x1dc/0x310
[   17.439947]  ? __pfx_kasan_atomics+0x10/0x10
[   17.439974]  ? __pfx_read_tsc+0x10/0x10
[   17.439997]  ? ktime_get_ts64+0x86/0x230
[   17.440025]  kunit_try_run_case+0x1a5/0x480
[   17.440063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.440088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.440115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.440140]  ? __kthread_parkme+0x82/0x180
[   17.440162]  ? preempt_count_sub+0x50/0x80
[   17.440188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.440213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.440237]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.440262]  kthread+0x337/0x6f0
[   17.440284]  ? trace_preempt_on+0x20/0xc0
[   17.440308]  ? __pfx_kthread+0x10/0x10
[   17.440330]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.440352]  ? calculate_sigpending+0x7b/0xa0
[   17.440377]  ? __pfx_kthread+0x10/0x10
[   17.440400]  ret_from_fork+0x116/0x1d0
[   17.440420]  ? __pfx_kthread+0x10/0x10
[   17.440442]  ret_from_fork_asm+0x1a/0x30
[   17.440476]  </TASK>
[   17.440489] 
[   17.452426] Allocated by task 282:
[   17.452758]  kasan_save_stack+0x45/0x70
[   17.453227]  kasan_save_track+0x18/0x40
[   17.453628]  kasan_save_alloc_info+0x3b/0x50
[   17.454112]  __kasan_kmalloc+0xb7/0xc0
[   17.454477]  __kmalloc_cache_noprof+0x189/0x420
[   17.454977]  kasan_atomics+0x95/0x310
[   17.455360]  kunit_try_run_case+0x1a5/0x480
[   17.455783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.456240]  kthread+0x337/0x6f0
[   17.456375]  ret_from_fork+0x116/0x1d0
[   17.456519]  ret_from_fork_asm+0x1a/0x30
[   17.456668] 
[   17.456763] The buggy address belongs to the object at ffff8881031d0c00
[   17.456763]  which belongs to the cache kmalloc-64 of size 64
[   17.457945] The buggy address is located 0 bytes to the right of
[   17.457945]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.459213] 
[   17.459383] The buggy address belongs to the physical page:
[   17.459811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.460082] flags: 0x200000000000000(node=0|zone=2)
[   17.460257] page_type: f5(slab)
[   17.460384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.460631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.461070] page dumped because: kasan: bad access detected
[   17.461575] 
[   17.461741] Memory state around the buggy address:
[   17.462256]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.463020]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.463695] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.464346]                                      ^
[   17.464824]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.465467]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.466241] ==================================================================
[   17.326399] ==================================================================
[   17.326817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   17.327141] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.327422] 
[   17.327510] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.327553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.327566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.327588] Call Trace:
[   17.327602]  <TASK>
[   17.327617]  dump_stack_lvl+0x73/0xb0
[   17.327643]  print_report+0xd1/0x650
[   17.327666]  ? __virt_addr_valid+0x1db/0x2d0
[   17.327688]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.327710]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.327748]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.327771]  kasan_report+0x141/0x180
[   17.327794]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.327822]  kasan_check_range+0x10c/0x1c0
[   17.327847]  __kasan_check_write+0x18/0x20
[   17.327867]  kasan_atomics_helper+0x19e3/0x5450
[   17.327890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.327914]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.327940]  ? kasan_atomics+0x152/0x310
[   17.327969]  kasan_atomics+0x1dc/0x310
[   17.327994]  ? __pfx_kasan_atomics+0x10/0x10
[   17.328019]  ? __pfx_read_tsc+0x10/0x10
[   17.328041]  ? ktime_get_ts64+0x86/0x230
[   17.328080]  kunit_try_run_case+0x1a5/0x480
[   17.328105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.328128]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.328152]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.328176]  ? __kthread_parkme+0x82/0x180
[   17.328197]  ? preempt_count_sub+0x50/0x80
[   17.328222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.328245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.328269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.328293]  kthread+0x337/0x6f0
[   17.328314]  ? trace_preempt_on+0x20/0xc0
[   17.328338]  ? __pfx_kthread+0x10/0x10
[   17.328359]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.328382]  ? calculate_sigpending+0x7b/0xa0
[   17.328406]  ? __pfx_kthread+0x10/0x10
[   17.328429]  ret_from_fork+0x116/0x1d0
[   17.328448]  ? __pfx_kthread+0x10/0x10
[   17.328470]  ret_from_fork_asm+0x1a/0x30
[   17.328502]  </TASK>
[   17.328514] 
[   17.336701] Allocated by task 282:
[   17.336899]  kasan_save_stack+0x45/0x70
[   17.337125]  kasan_save_track+0x18/0x40
[   17.337325]  kasan_save_alloc_info+0x3b/0x50
[   17.337534]  __kasan_kmalloc+0xb7/0xc0
[   17.337747]  __kmalloc_cache_noprof+0x189/0x420
[   17.337938]  kasan_atomics+0x95/0x310
[   17.338093]  kunit_try_run_case+0x1a5/0x480
[   17.338251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.338438]  kthread+0x337/0x6f0
[   17.338569]  ret_from_fork+0x116/0x1d0
[   17.338748]  ret_from_fork_asm+0x1a/0x30
[   17.338970] 
[   17.339083] The buggy address belongs to the object at ffff8881031d0c00
[   17.339083]  which belongs to the cache kmalloc-64 of size 64
[   17.339653] The buggy address is located 0 bytes to the right of
[   17.339653]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.340685] 
[   17.340841] The buggy address belongs to the physical page:
[   17.341035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.341304] flags: 0x200000000000000(node=0|zone=2)
[   17.341479] page_type: f5(slab)
[   17.341613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.342011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.342378] page dumped because: kasan: bad access detected
[   17.342650] 
[   17.342754] Memory state around the buggy address:
[   17.342961]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.343214]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.343453] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.343686]                                      ^
[   17.343854]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.344319]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.344676] ==================================================================
[   16.530315] ==================================================================
[   16.531258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   16.532073] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.532674] 
[   16.532956] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.533034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.533068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.533092] Call Trace:
[   16.533111]  <TASK>
[   16.533129]  dump_stack_lvl+0x73/0xb0
[   16.533161]  print_report+0xd1/0x650
[   16.533185]  ? __virt_addr_valid+0x1db/0x2d0
[   16.533210]  ? kasan_atomics_helper+0xac7/0x5450
[   16.533232]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.533262]  ? kasan_atomics_helper+0xac7/0x5450
[   16.533285]  kasan_report+0x141/0x180
[   16.533310]  ? kasan_atomics_helper+0xac7/0x5450
[   16.533338]  kasan_check_range+0x10c/0x1c0
[   16.533364]  __kasan_check_write+0x18/0x20
[   16.533386]  kasan_atomics_helper+0xac7/0x5450
[   16.533411]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.533435]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.533463]  ? kasan_atomics+0x152/0x310
[   16.533492]  kasan_atomics+0x1dc/0x310
[   16.533517]  ? __pfx_kasan_atomics+0x10/0x10
[   16.533548]  ? __pfx_read_tsc+0x10/0x10
[   16.533571]  ? ktime_get_ts64+0x86/0x230
[   16.533597]  kunit_try_run_case+0x1a5/0x480
[   16.533623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.533647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.533673]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.533698]  ? __kthread_parkme+0x82/0x180
[   16.533728]  ? preempt_count_sub+0x50/0x80
[   16.533754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.533780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.533804]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.533829]  kthread+0x337/0x6f0
[   16.533850]  ? trace_preempt_on+0x20/0xc0
[   16.533874]  ? __pfx_kthread+0x10/0x10
[   16.533898]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.533920]  ? calculate_sigpending+0x7b/0xa0
[   16.533946]  ? __pfx_kthread+0x10/0x10
[   16.533969]  ret_from_fork+0x116/0x1d0
[   16.533989]  ? __pfx_kthread+0x10/0x10
[   16.534012]  ret_from_fork_asm+0x1a/0x30
[   16.534046]  </TASK>
[   16.534067] 
[   16.547040] Allocated by task 282:
[   16.547417]  kasan_save_stack+0x45/0x70
[   16.547815]  kasan_save_track+0x18/0x40
[   16.548209]  kasan_save_alloc_info+0x3b/0x50
[   16.548514]  __kasan_kmalloc+0xb7/0xc0
[   16.548655]  __kmalloc_cache_noprof+0x189/0x420
[   16.549032]  kasan_atomics+0x95/0x310
[   16.549408]  kunit_try_run_case+0x1a5/0x480
[   16.549867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.550433]  kthread+0x337/0x6f0
[   16.550563]  ret_from_fork+0x116/0x1d0
[   16.550701]  ret_from_fork_asm+0x1a/0x30
[   16.551115] 
[   16.551289] The buggy address belongs to the object at ffff8881031d0c00
[   16.551289]  which belongs to the cache kmalloc-64 of size 64
[   16.552425] The buggy address is located 0 bytes to the right of
[   16.552425]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.553239] 
[   16.553318] The buggy address belongs to the physical page:
[   16.553501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.553776] flags: 0x200000000000000(node=0|zone=2)
[   16.553950] page_type: f5(slab)
[   16.554087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.554327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.554563] page dumped because: kasan: bad access detected
[   16.554765] 
[   16.554936] Memory state around the buggy address:
[   16.555380]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.556113]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.557262] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.557871]                                      ^
[   16.558297]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.558826]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.559956] ==================================================================
[   16.805559] ==================================================================
[   16.806234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   16.806613] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.806860] 
[   16.806950] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.806993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.807007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.807029] Call Trace:
[   16.807045]  <TASK>
[   16.807075]  dump_stack_lvl+0x73/0xb0
[   16.807127]  print_report+0xd1/0x650
[   16.807152]  ? __virt_addr_valid+0x1db/0x2d0
[   16.807176]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.807211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.807239]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.807262]  kasan_report+0x141/0x180
[   16.807286]  ? kasan_atomics_helper+0x4a1c/0x5450
[   16.807315]  __asan_report_load4_noabort+0x18/0x20
[   16.807342]  kasan_atomics_helper+0x4a1c/0x5450
[   16.807367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.807391]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.807417]  ? kasan_atomics+0x152/0x310
[   16.807446]  kasan_atomics+0x1dc/0x310
[   16.807470]  ? __pfx_kasan_atomics+0x10/0x10
[   16.807495]  ? __pfx_read_tsc+0x10/0x10
[   16.807517]  ? ktime_get_ts64+0x86/0x230
[   16.807553]  kunit_try_run_case+0x1a5/0x480
[   16.807578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.807611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.807636]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.807660]  ? __kthread_parkme+0x82/0x180
[   16.807681]  ? preempt_count_sub+0x50/0x80
[   16.807707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.807749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.807773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.807797]  kthread+0x337/0x6f0
[   16.807817]  ? trace_preempt_on+0x20/0xc0
[   16.807842]  ? __pfx_kthread+0x10/0x10
[   16.807864]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.807886]  ? calculate_sigpending+0x7b/0xa0
[   16.807911]  ? __pfx_kthread+0x10/0x10
[   16.807933]  ret_from_fork+0x116/0x1d0
[   16.807953]  ? __pfx_kthread+0x10/0x10
[   16.807974]  ret_from_fork_asm+0x1a/0x30
[   16.808007]  </TASK>
[   16.808019] 
[   16.816874] Allocated by task 282:
[   16.817021]  kasan_save_stack+0x45/0x70
[   16.817365]  kasan_save_track+0x18/0x40
[   16.817583]  kasan_save_alloc_info+0x3b/0x50
[   16.817860]  __kasan_kmalloc+0xb7/0xc0
[   16.818020]  __kmalloc_cache_noprof+0x189/0x420
[   16.818205]  kasan_atomics+0x95/0x310
[   16.818349]  kunit_try_run_case+0x1a5/0x480
[   16.818502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.818685]  kthread+0x337/0x6f0
[   16.818836]  ret_from_fork+0x116/0x1d0
[   16.818976]  ret_from_fork_asm+0x1a/0x30
[   16.819135] 
[   16.819214] The buggy address belongs to the object at ffff8881031d0c00
[   16.819214]  which belongs to the cache kmalloc-64 of size 64
[   16.820485] The buggy address is located 0 bytes to the right of
[   16.820485]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.820901] 
[   16.820997] The buggy address belongs to the physical page:
[   16.821258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.821802] flags: 0x200000000000000(node=0|zone=2)
[   16.822011] page_type: f5(slab)
[   16.822200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.822582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.822959] page dumped because: kasan: bad access detected
[   16.823240] 
[   16.823318] Memory state around the buggy address:
[   16.823533]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.823913]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.824268] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.824625]                                      ^
[   16.824897]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.825272]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.825616] ==================================================================
[   16.094822] ==================================================================
[   16.095708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   16.096318] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.096665] 
[   16.097011] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.097073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.097086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.097339] Call Trace:
[   16.097359]  <TASK>
[   16.097376]  dump_stack_lvl+0x73/0xb0
[   16.097406]  print_report+0xd1/0x650
[   16.097430]  ? __virt_addr_valid+0x1db/0x2d0
[   16.097452]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.097473]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.097499]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.097520]  kasan_report+0x141/0x180
[   16.097548]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.097574]  __asan_report_load4_noabort+0x18/0x20
[   16.097597]  kasan_atomics_helper+0x4bbc/0x5450
[   16.097619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.097641]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.097665]  ? kasan_atomics+0x152/0x310
[   16.097692]  kasan_atomics+0x1dc/0x310
[   16.097735]  ? __pfx_kasan_atomics+0x10/0x10
[   16.097759]  ? __pfx_read_tsc+0x10/0x10
[   16.097797]  ? ktime_get_ts64+0x86/0x230
[   16.097820]  kunit_try_run_case+0x1a5/0x480
[   16.097845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.097865]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.097889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.097911]  ? __kthread_parkme+0x82/0x180
[   16.097930]  ? preempt_count_sub+0x50/0x80
[   16.097953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.097976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.097998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.098021]  kthread+0x337/0x6f0
[   16.098039]  ? trace_preempt_on+0x20/0xc0
[   16.098072]  ? __pfx_kthread+0x10/0x10
[   16.098092]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.098113]  ? calculate_sigpending+0x7b/0xa0
[   16.098136]  ? __pfx_kthread+0x10/0x10
[   16.098157]  ret_from_fork+0x116/0x1d0
[   16.098174]  ? __pfx_kthread+0x10/0x10
[   16.098194]  ret_from_fork_asm+0x1a/0x30
[   16.098225]  </TASK>
[   16.098237] 
[   16.111176] Allocated by task 282:
[   16.111355]  kasan_save_stack+0x45/0x70
[   16.111571]  kasan_save_track+0x18/0x40
[   16.112086]  kasan_save_alloc_info+0x3b/0x50
[   16.112306]  __kasan_kmalloc+0xb7/0xc0
[   16.112579]  __kmalloc_cache_noprof+0x189/0x420
[   16.112990]  kasan_atomics+0x95/0x310
[   16.113385]  kunit_try_run_case+0x1a5/0x480
[   16.113598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.114275]  kthread+0x337/0x6f0
[   16.114468]  ret_from_fork+0x116/0x1d0
[   16.114622]  ret_from_fork_asm+0x1a/0x30
[   16.115113] 
[   16.115244] The buggy address belongs to the object at ffff8881031d0c00
[   16.115244]  which belongs to the cache kmalloc-64 of size 64
[   16.116089] The buggy address is located 0 bytes to the right of
[   16.116089]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.116744] 
[   16.117060] The buggy address belongs to the physical page:
[   16.117312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.117698] flags: 0x200000000000000(node=0|zone=2)
[   16.118490] page_type: f5(slab)
[   16.118663] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.119347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.119884] page dumped because: kasan: bad access detected
[   16.120230] 
[   16.120348] Memory state around the buggy address:
[   16.120623]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.121177]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.121507] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.122118]                                      ^
[   16.122602]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.123214]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.124070] ==================================================================
[   16.357963] ==================================================================
[   16.358373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   16.358738] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.359083] 
[   16.359240] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.359288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.359302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.359323] Call Trace:
[   16.359340]  <TASK>
[   16.359389]  dump_stack_lvl+0x73/0xb0
[   16.359420]  print_report+0xd1/0x650
[   16.359443]  ? __virt_addr_valid+0x1db/0x2d0
[   16.359466]  ? kasan_atomics_helper+0x697/0x5450
[   16.359488]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.359515]  ? kasan_atomics_helper+0x697/0x5450
[   16.359571]  kasan_report+0x141/0x180
[   16.359597]  ? kasan_atomics_helper+0x697/0x5450
[   16.359624]  kasan_check_range+0x10c/0x1c0
[   16.359650]  __kasan_check_write+0x18/0x20
[   16.359671]  kasan_atomics_helper+0x697/0x5450
[   16.359694]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.359717]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.359744]  ? kasan_atomics+0x152/0x310
[   16.359772]  kasan_atomics+0x1dc/0x310
[   16.359796]  ? __pfx_kasan_atomics+0x10/0x10
[   16.359821]  ? __pfx_read_tsc+0x10/0x10
[   16.359842]  ? ktime_get_ts64+0x86/0x230
[   16.359901]  kunit_try_run_case+0x1a5/0x480
[   16.359926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.359949]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.359973]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.359997]  ? __kthread_parkme+0x82/0x180
[   16.360018]  ? preempt_count_sub+0x50/0x80
[   16.360080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.360104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.360130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.360153]  kthread+0x337/0x6f0
[   16.360174]  ? trace_preempt_on+0x20/0xc0
[   16.360198]  ? __pfx_kthread+0x10/0x10
[   16.360220]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.360243]  ? calculate_sigpending+0x7b/0xa0
[   16.360267]  ? __pfx_kthread+0x10/0x10
[   16.360290]  ret_from_fork+0x116/0x1d0
[   16.360310]  ? __pfx_kthread+0x10/0x10
[   16.360331]  ret_from_fork_asm+0x1a/0x30
[   16.360363]  </TASK>
[   16.360376] 
[   16.368555] Allocated by task 282:
[   16.368701]  kasan_save_stack+0x45/0x70
[   16.368946]  kasan_save_track+0x18/0x40
[   16.369162]  kasan_save_alloc_info+0x3b/0x50
[   16.369470]  __kasan_kmalloc+0xb7/0xc0
[   16.369684]  __kmalloc_cache_noprof+0x189/0x420
[   16.369950]  kasan_atomics+0x95/0x310
[   16.370183]  kunit_try_run_case+0x1a5/0x480
[   16.370357]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.370601]  kthread+0x337/0x6f0
[   16.370825]  ret_from_fork+0x116/0x1d0
[   16.370962]  ret_from_fork_asm+0x1a/0x30
[   16.371206] 
[   16.371310] The buggy address belongs to the object at ffff8881031d0c00
[   16.371310]  which belongs to the cache kmalloc-64 of size 64
[   16.371914] The buggy address is located 0 bytes to the right of
[   16.371914]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.372496] 
[   16.372588] The buggy address belongs to the physical page:
[   16.372857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.373202] flags: 0x200000000000000(node=0|zone=2)
[   16.373381] page_type: f5(slab)
[   16.373597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.374149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.374488] page dumped because: kasan: bad access detected
[   16.374773] 
[   16.374862] Memory state around the buggy address:
[   16.375123]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.375467]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.375822] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.376216]                                      ^
[   16.376484]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.376811]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.377211] ==================================================================
[   17.525863] ==================================================================
[   17.526114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   17.526345] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.526572] 
[   17.526659] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.526705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.526736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.526758] Call Trace:
[   17.526775]  <TASK>
[   17.526792]  dump_stack_lvl+0x73/0xb0
[   17.526820]  print_report+0xd1/0x650
[   17.526843]  ? __virt_addr_valid+0x1db/0x2d0
[   17.526866]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.526888]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.526915]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.526938]  kasan_report+0x141/0x180
[   17.526961]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.526990]  kasan_check_range+0x10c/0x1c0
[   17.527015]  __kasan_check_write+0x18/0x20
[   17.527036]  kasan_atomics_helper+0x1e12/0x5450
[   17.527074]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.527098]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.527178]  ? kasan_atomics+0x152/0x310
[   17.527214]  kasan_atomics+0x1dc/0x310
[   17.527249]  ? __pfx_kasan_atomics+0x10/0x10
[   17.527276]  ? __pfx_read_tsc+0x10/0x10
[   17.527297]  ? ktime_get_ts64+0x86/0x230
[   17.527323]  kunit_try_run_case+0x1a5/0x480
[   17.527349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.527373]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.527398]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.527422]  ? __kthread_parkme+0x82/0x180
[   17.527443]  ? preempt_count_sub+0x50/0x80
[   17.527469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.527493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.527517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.527541]  kthread+0x337/0x6f0
[   17.527561]  ? trace_preempt_on+0x20/0xc0
[   17.527585]  ? __pfx_kthread+0x10/0x10
[   17.527607]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.527628]  ? calculate_sigpending+0x7b/0xa0
[   17.527653]  ? __pfx_kthread+0x10/0x10
[   17.527676]  ret_from_fork+0x116/0x1d0
[   17.527695]  ? __pfx_kthread+0x10/0x10
[   17.527724]  ret_from_fork_asm+0x1a/0x30
[   17.527757]  </TASK>
[   17.527769] 
[   17.538696] Allocated by task 282:
[   17.539152]  kasan_save_stack+0x45/0x70
[   17.539537]  kasan_save_track+0x18/0x40
[   17.539966]  kasan_save_alloc_info+0x3b/0x50
[   17.540388]  __kasan_kmalloc+0xb7/0xc0
[   17.540808]  __kmalloc_cache_noprof+0x189/0x420
[   17.541254]  kasan_atomics+0x95/0x310
[   17.541619]  kunit_try_run_case+0x1a5/0x480
[   17.541946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.542379]  kthread+0x337/0x6f0
[   17.542516]  ret_from_fork+0x116/0x1d0
[   17.542660]  ret_from_fork_asm+0x1a/0x30
[   17.543072] 
[   17.543267] The buggy address belongs to the object at ffff8881031d0c00
[   17.543267]  which belongs to the cache kmalloc-64 of size 64
[   17.544421] The buggy address is located 0 bytes to the right of
[   17.544421]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.545027] 
[   17.545121] The buggy address belongs to the physical page:
[   17.545312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.545585] flags: 0x200000000000000(node=0|zone=2)
[   17.545916] page_type: f5(slab)
[   17.546318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.547070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.547794] page dumped because: kasan: bad access detected
[   17.548326] 
[   17.548512] Memory state around the buggy address:
[   17.548996]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.549701]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.550406] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.550944]                                      ^
[   17.551193]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.551430]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.551661] ==================================================================
[   17.736946] ==================================================================
[   17.737280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   17.737627] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.737981] 
[   17.738110] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.738155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.738168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.738191] Call Trace:
[   17.738228]  <TASK>
[   17.738244]  dump_stack_lvl+0x73/0xb0
[   17.738272]  print_report+0xd1/0x650
[   17.738294]  ? __virt_addr_valid+0x1db/0x2d0
[   17.738318]  ? kasan_atomics_helper+0x218a/0x5450
[   17.738339]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.738366]  ? kasan_atomics_helper+0x218a/0x5450
[   17.738389]  kasan_report+0x141/0x180
[   17.738411]  ? kasan_atomics_helper+0x218a/0x5450
[   17.738439]  kasan_check_range+0x10c/0x1c0
[   17.738464]  __kasan_check_write+0x18/0x20
[   17.738485]  kasan_atomics_helper+0x218a/0x5450
[   17.738509]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.738532]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.738558]  ? kasan_atomics+0x152/0x310
[   17.738586]  kasan_atomics+0x1dc/0x310
[   17.738610]  ? __pfx_kasan_atomics+0x10/0x10
[   17.738636]  ? __pfx_read_tsc+0x10/0x10
[   17.738657]  ? ktime_get_ts64+0x86/0x230
[   17.738683]  kunit_try_run_case+0x1a5/0x480
[   17.738707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.738744]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.738790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.738814]  ? __kthread_parkme+0x82/0x180
[   17.738836]  ? preempt_count_sub+0x50/0x80
[   17.738860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.738886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.738909]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.738934]  kthread+0x337/0x6f0
[   17.738955]  ? trace_preempt_on+0x20/0xc0
[   17.738979]  ? __pfx_kthread+0x10/0x10
[   17.739001]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.739024]  ? calculate_sigpending+0x7b/0xa0
[   17.739061]  ? __pfx_kthread+0x10/0x10
[   17.739084]  ret_from_fork+0x116/0x1d0
[   17.739104]  ? __pfx_kthread+0x10/0x10
[   17.739126]  ret_from_fork_asm+0x1a/0x30
[   17.739158]  </TASK>
[   17.739171] 
[   17.747303] Allocated by task 282:
[   17.747443]  kasan_save_stack+0x45/0x70
[   17.747593]  kasan_save_track+0x18/0x40
[   17.748110]  kasan_save_alloc_info+0x3b/0x50
[   17.748536]  __kasan_kmalloc+0xb7/0xc0
[   17.749578]  __kmalloc_cache_noprof+0x189/0x420
[   17.750246]  kasan_atomics+0x95/0x310
[   17.750843]  kunit_try_run_case+0x1a5/0x480
[   17.751408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.751614]  kthread+0x337/0x6f0
[   17.751980]  ret_from_fork+0x116/0x1d0
[   17.752483]  ret_from_fork_asm+0x1a/0x30
[   17.753126] 
[   17.753317] The buggy address belongs to the object at ffff8881031d0c00
[   17.753317]  which belongs to the cache kmalloc-64 of size 64
[   17.754282] The buggy address is located 0 bytes to the right of
[   17.754282]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.754695] 
[   17.755101] The buggy address belongs to the physical page:
[   17.755931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.756313] flags: 0x200000000000000(node=0|zone=2)
[   17.756500] page_type: f5(slab)
[   17.756631] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.756891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.757734] page dumped because: kasan: bad access detected
[   17.758372] 
[   17.758650] Memory state around the buggy address:
[   17.759240]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.760084]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.760858] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.761487]                                      ^
[   17.761671]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.762495]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.763175] ==================================================================
[   16.500259] ==================================================================
[   16.500935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   16.501629] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.502381] 
[   16.502600] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.502646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.502659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.502708] Call Trace:
[   16.502742]  <TASK>
[   16.502759]  dump_stack_lvl+0x73/0xb0
[   16.502801]  print_report+0xd1/0x650
[   16.502824]  ? __virt_addr_valid+0x1db/0x2d0
[   16.502848]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.502881]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.502908]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.502930]  kasan_report+0x141/0x180
[   16.502953]  ? kasan_atomics_helper+0xa2b/0x5450
[   16.502981]  kasan_check_range+0x10c/0x1c0
[   16.503006]  __kasan_check_write+0x18/0x20
[   16.503026]  kasan_atomics_helper+0xa2b/0x5450
[   16.503058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.503081]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.503106]  ? kasan_atomics+0x152/0x310
[   16.503133]  kasan_atomics+0x1dc/0x310
[   16.503157]  ? __pfx_kasan_atomics+0x10/0x10
[   16.503182]  ? __pfx_read_tsc+0x10/0x10
[   16.503203]  ? ktime_get_ts64+0x86/0x230
[   16.503229]  kunit_try_run_case+0x1a5/0x480
[   16.503253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.503276]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.503299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.503323]  ? __kthread_parkme+0x82/0x180
[   16.503343]  ? preempt_count_sub+0x50/0x80
[   16.503368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.503393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.503416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.503440]  kthread+0x337/0x6f0
[   16.503460]  ? trace_preempt_on+0x20/0xc0
[   16.503485]  ? __pfx_kthread+0x10/0x10
[   16.503506]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.503528]  ? calculate_sigpending+0x7b/0xa0
[   16.503552]  ? __pfx_kthread+0x10/0x10
[   16.503574]  ret_from_fork+0x116/0x1d0
[   16.503594]  ? __pfx_kthread+0x10/0x10
[   16.503615]  ret_from_fork_asm+0x1a/0x30
[   16.503647]  </TASK>
[   16.503659] 
[   16.516807] Allocated by task 282:
[   16.517076]  kasan_save_stack+0x45/0x70
[   16.517433]  kasan_save_track+0x18/0x40
[   16.517579]  kasan_save_alloc_info+0x3b/0x50
[   16.517785]  __kasan_kmalloc+0xb7/0xc0
[   16.518211]  __kmalloc_cache_noprof+0x189/0x420
[   16.518656]  kasan_atomics+0x95/0x310
[   16.519067]  kunit_try_run_case+0x1a5/0x480
[   16.519370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.519552]  kthread+0x337/0x6f0
[   16.519677]  ret_from_fork+0x116/0x1d0
[   16.520100]  ret_from_fork_asm+0x1a/0x30
[   16.520499] 
[   16.520658] The buggy address belongs to the object at ffff8881031d0c00
[   16.520658]  which belongs to the cache kmalloc-64 of size 64
[   16.521650] The buggy address is located 0 bytes to the right of
[   16.521650]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.522625] 
[   16.522709] The buggy address belongs to the physical page:
[   16.523302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.523675] flags: 0x200000000000000(node=0|zone=2)
[   16.524187] page_type: f5(slab)
[   16.524529] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.525086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.525332] page dumped because: kasan: bad access detected
[   16.525516] 
[   16.525596] Memory state around the buggy address:
[   16.525894]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.526568]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.527261] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.527946]                                      ^
[   16.528438]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.529073]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.529512] ==================================================================
[   17.123259] ==================================================================
[   17.123605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   17.124458] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.125304] 
[   17.125526] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.125573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.125587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.125609] Call Trace:
[   17.125624]  <TASK>
[   17.125660]  dump_stack_lvl+0x73/0xb0
[   17.125690]  print_report+0xd1/0x650
[   17.125734]  ? __virt_addr_valid+0x1db/0x2d0
[   17.125757]  ? kasan_atomics_helper+0x151d/0x5450
[   17.125779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.125806]  ? kasan_atomics_helper+0x151d/0x5450
[   17.125828]  kasan_report+0x141/0x180
[   17.125851]  ? kasan_atomics_helper+0x151d/0x5450
[   17.125879]  kasan_check_range+0x10c/0x1c0
[   17.125904]  __kasan_check_write+0x18/0x20
[   17.125923]  kasan_atomics_helper+0x151d/0x5450
[   17.125946]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.125969]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.125995]  ? kasan_atomics+0x152/0x310
[   17.126022]  kasan_atomics+0x1dc/0x310
[   17.126056]  ? __pfx_kasan_atomics+0x10/0x10
[   17.126081]  ? __pfx_read_tsc+0x10/0x10
[   17.126103]  ? ktime_get_ts64+0x86/0x230
[   17.126129]  kunit_try_run_case+0x1a5/0x480
[   17.126154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.126177]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.126201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.126226]  ? __kthread_parkme+0x82/0x180
[   17.126246]  ? preempt_count_sub+0x50/0x80
[   17.126271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.126296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.126320]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.126344]  kthread+0x337/0x6f0
[   17.126364]  ? trace_preempt_on+0x20/0xc0
[   17.126388]  ? __pfx_kthread+0x10/0x10
[   17.126410]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.126432]  ? calculate_sigpending+0x7b/0xa0
[   17.126459]  ? __pfx_kthread+0x10/0x10
[   17.126481]  ret_from_fork+0x116/0x1d0
[   17.126500]  ? __pfx_kthread+0x10/0x10
[   17.126521]  ret_from_fork_asm+0x1a/0x30
[   17.126555]  </TASK>
[   17.126567] 
[   17.138679] Allocated by task 282:
[   17.139069]  kasan_save_stack+0x45/0x70
[   17.139475]  kasan_save_track+0x18/0x40
[   17.139887]  kasan_save_alloc_info+0x3b/0x50
[   17.140319]  __kasan_kmalloc+0xb7/0xc0
[   17.140697]  __kmalloc_cache_noprof+0x189/0x420
[   17.141182]  kasan_atomics+0x95/0x310
[   17.141564]  kunit_try_run_case+0x1a5/0x480
[   17.142010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.142464]  kthread+0x337/0x6f0
[   17.142599]  ret_from_fork+0x116/0x1d0
[   17.142820]  ret_from_fork_asm+0x1a/0x30
[   17.143236] 
[   17.143440] The buggy address belongs to the object at ffff8881031d0c00
[   17.143440]  which belongs to the cache kmalloc-64 of size 64
[   17.144451] The buggy address is located 0 bytes to the right of
[   17.144451]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.145204] 
[   17.145379] The buggy address belongs to the physical page:
[   17.145942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.146548] flags: 0x200000000000000(node=0|zone=2)
[   17.146780] page_type: f5(slab)
[   17.147123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.147856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.148230] page dumped because: kasan: bad access detected
[   17.148418] 
[   17.148496] Memory state around the buggy address:
[   17.148671]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.149372]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.150080] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.150767]                                      ^
[   17.151238]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.151935]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.152272] ==================================================================
[   16.191810] ==================================================================
[   16.192620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   16.193489] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.194402] 
[   16.194601] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.194677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.194691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.194713] Call Trace:
[   16.194727]  <TASK>
[   16.194746]  dump_stack_lvl+0x73/0xb0
[   16.194775]  print_report+0xd1/0x650
[   16.194799]  ? __virt_addr_valid+0x1db/0x2d0
[   16.194821]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.194844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.194872]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.194894]  kasan_report+0x141/0x180
[   16.194918]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.194946]  __asan_report_store4_noabort+0x1b/0x30
[   16.194972]  kasan_atomics_helper+0x4b6e/0x5450
[   16.194997]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.195020]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.195046]  ? kasan_atomics+0x152/0x310
[   16.195090]  kasan_atomics+0x1dc/0x310
[   16.195113]  ? __pfx_kasan_atomics+0x10/0x10
[   16.195139]  ? __pfx_read_tsc+0x10/0x10
[   16.195187]  ? ktime_get_ts64+0x86/0x230
[   16.195212]  kunit_try_run_case+0x1a5/0x480
[   16.195238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.195262]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.195287]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.195312]  ? __kthread_parkme+0x82/0x180
[   16.195335]  ? preempt_count_sub+0x50/0x80
[   16.195361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.195386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.195410]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.195435]  kthread+0x337/0x6f0
[   16.195456]  ? trace_preempt_on+0x20/0xc0
[   16.195481]  ? __pfx_kthread+0x10/0x10
[   16.195503]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.195525]  ? calculate_sigpending+0x7b/0xa0
[   16.195551]  ? __pfx_kthread+0x10/0x10
[   16.195574]  ret_from_fork+0x116/0x1d0
[   16.195593]  ? __pfx_kthread+0x10/0x10
[   16.195615]  ret_from_fork_asm+0x1a/0x30
[   16.195649]  </TASK>
[   16.195662] 
[   16.203619] Allocated by task 282:
[   16.203915]  kasan_save_stack+0x45/0x70
[   16.204149]  kasan_save_track+0x18/0x40
[   16.204369]  kasan_save_alloc_info+0x3b/0x50
[   16.204561]  __kasan_kmalloc+0xb7/0xc0
[   16.204754]  __kmalloc_cache_noprof+0x189/0x420
[   16.205093]  kasan_atomics+0x95/0x310
[   16.205294]  kunit_try_run_case+0x1a5/0x480
[   16.205562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.205827]  kthread+0x337/0x6f0
[   16.206000]  ret_from_fork+0x116/0x1d0
[   16.206213]  ret_from_fork_asm+0x1a/0x30
[   16.206413] 
[   16.206492] The buggy address belongs to the object at ffff8881031d0c00
[   16.206492]  which belongs to the cache kmalloc-64 of size 64
[   16.207067] The buggy address is located 0 bytes to the right of
[   16.207067]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.207716] 
[   16.207796] The buggy address belongs to the physical page:
[   16.207972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.208469] flags: 0x200000000000000(node=0|zone=2)
[   16.208727] page_type: f5(slab)
[   16.209023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.209419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.209713] page dumped because: kasan: bad access detected
[   16.209942] 
[   16.210044] Memory state around the buggy address:
[   16.210297]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.210619]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.211125] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.211475]                                      ^
[   16.211703]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.212097]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.212424] ==================================================================
[   17.014102] ==================================================================
[   17.014949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   17.015690] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.016431] 
[   17.016565] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.016609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.016623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.016645] Call Trace:
[   17.016674]  <TASK>
[   17.016692]  dump_stack_lvl+0x73/0xb0
[   17.016720]  print_report+0xd1/0x650
[   17.016764]  ? __virt_addr_valid+0x1db/0x2d0
[   17.016788]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.016810]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.016837]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.016860]  kasan_report+0x141/0x180
[   17.016883]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.016920]  kasan_check_range+0x10c/0x1c0
[   17.016945]  __kasan_check_read+0x15/0x20
[   17.016966]  kasan_atomics_helper+0x13b5/0x5450
[   17.017004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.017031]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.017065]  ? kasan_atomics+0x152/0x310
[   17.017093]  kasan_atomics+0x1dc/0x310
[   17.017118]  ? __pfx_kasan_atomics+0x10/0x10
[   17.017143]  ? __pfx_read_tsc+0x10/0x10
[   17.017166]  ? ktime_get_ts64+0x86/0x230
[   17.017192]  kunit_try_run_case+0x1a5/0x480
[   17.017218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.017241]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.017265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.017290]  ? __kthread_parkme+0x82/0x180
[   17.017311]  ? preempt_count_sub+0x50/0x80
[   17.017336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.017361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.017384]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.017408]  kthread+0x337/0x6f0
[   17.017429]  ? trace_preempt_on+0x20/0xc0
[   17.017453]  ? __pfx_kthread+0x10/0x10
[   17.017475]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.017496]  ? calculate_sigpending+0x7b/0xa0
[   17.017520]  ? __pfx_kthread+0x10/0x10
[   17.017546]  ret_from_fork+0x116/0x1d0
[   17.017566]  ? __pfx_kthread+0x10/0x10
[   17.017587]  ret_from_fork_asm+0x1a/0x30
[   17.017619]  </TASK>
[   17.017632] 
[   17.029738] Allocated by task 282:
[   17.030131]  kasan_save_stack+0x45/0x70
[   17.030532]  kasan_save_track+0x18/0x40
[   17.030953]  kasan_save_alloc_info+0x3b/0x50
[   17.031394]  __kasan_kmalloc+0xb7/0xc0
[   17.031785]  __kmalloc_cache_noprof+0x189/0x420
[   17.032244]  kasan_atomics+0x95/0x310
[   17.032630]  kunit_try_run_case+0x1a5/0x480
[   17.033170]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.033632]  kthread+0x337/0x6f0
[   17.033798]  ret_from_fork+0x116/0x1d0
[   17.034122]  ret_from_fork_asm+0x1a/0x30
[   17.034449] 
[   17.034529] The buggy address belongs to the object at ffff8881031d0c00
[   17.034529]  which belongs to the cache kmalloc-64 of size 64
[   17.035145] The buggy address is located 0 bytes to the right of
[   17.035145]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.035762] 
[   17.035962] The buggy address belongs to the physical page:
[   17.036508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.037320] flags: 0x200000000000000(node=0|zone=2)
[   17.037616] page_type: f5(slab)
[   17.037999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.038482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.038742] page dumped because: kasan: bad access detected
[   17.039278] 
[   17.039446] Memory state around the buggy address:
[   17.039957]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.040631]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.041043] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.041290]                                      ^
[   17.041463]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.041706]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.042371] ==================================================================
[   16.276484] ==================================================================
[   16.277561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   16.278097] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.278618] 
[   16.278737] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.278784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.278799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.278822] Call Trace:
[   16.278840]  <TASK>
[   16.278858]  dump_stack_lvl+0x73/0xb0
[   16.278888]  print_report+0xd1/0x650
[   16.278912]  ? __virt_addr_valid+0x1db/0x2d0
[   16.278936]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.278959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.278986]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.279011]  kasan_report+0x141/0x180
[   16.279035]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.279076]  __asan_report_store4_noabort+0x1b/0x30
[   16.279102]  kasan_atomics_helper+0x4b3a/0x5450
[   16.279127]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.279151]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.279177]  ? kasan_atomics+0x152/0x310
[   16.279206]  kasan_atomics+0x1dc/0x310
[   16.279232]  ? __pfx_kasan_atomics+0x10/0x10
[   16.279258]  ? __pfx_read_tsc+0x10/0x10
[   16.279281]  ? ktime_get_ts64+0x86/0x230
[   16.279307]  kunit_try_run_case+0x1a5/0x480
[   16.279333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.279356]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.279381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.279406]  ? __kthread_parkme+0x82/0x180
[   16.279428]  ? preempt_count_sub+0x50/0x80
[   16.279454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.279479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.279503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.279528]  kthread+0x337/0x6f0
[   16.279549]  ? trace_preempt_on+0x20/0xc0
[   16.279574]  ? __pfx_kthread+0x10/0x10
[   16.279596]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.279618]  ? calculate_sigpending+0x7b/0xa0
[   16.279644]  ? __pfx_kthread+0x10/0x10
[   16.279668]  ret_from_fork+0x116/0x1d0
[   16.279687]  ? __pfx_kthread+0x10/0x10
[   16.279710]  ret_from_fork_asm+0x1a/0x30
[   16.279743]  </TASK>
[   16.279756] 
[   16.291417] Allocated by task 282:
[   16.291605]  kasan_save_stack+0x45/0x70
[   16.292097]  kasan_save_track+0x18/0x40
[   16.292754]  kasan_save_alloc_info+0x3b/0x50
[   16.292932]  __kasan_kmalloc+0xb7/0xc0
[   16.293118]  __kmalloc_cache_noprof+0x189/0x420
[   16.293502]  kasan_atomics+0x95/0x310
[   16.293658]  kunit_try_run_case+0x1a5/0x480
[   16.294029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.294574]  kthread+0x337/0x6f0
[   16.294955]  ret_from_fork+0x116/0x1d0
[   16.295201]  ret_from_fork_asm+0x1a/0x30
[   16.295354] 
[   16.295435] The buggy address belongs to the object at ffff8881031d0c00
[   16.295435]  which belongs to the cache kmalloc-64 of size 64
[   16.295820] The buggy address is located 0 bytes to the right of
[   16.295820]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.296224] 
[   16.296303] The buggy address belongs to the physical page:
[   16.296488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.296743] flags: 0x200000000000000(node=0|zone=2)
[   16.296917] page_type: f5(slab)
[   16.297046] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.297725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.298377] page dumped because: kasan: bad access detected
[   16.298918] 
[   16.299585] Memory state around the buggy address:
[   16.300639]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.301865]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.302825] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.303545]                                      ^
[   16.303729]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.303951]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.304219] ==================================================================
[   17.270258] ==================================================================
[   17.270549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   17.271267] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.272072] 
[   17.272252] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.272298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.272312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.272335] Call Trace:
[   17.272352]  <TASK>
[   17.272371]  dump_stack_lvl+0x73/0xb0
[   17.272400]  print_report+0xd1/0x650
[   17.272436]  ? __virt_addr_valid+0x1db/0x2d0
[   17.272460]  ? kasan_atomics_helper+0x1818/0x5450
[   17.272482]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.272508]  ? kasan_atomics_helper+0x1818/0x5450
[   17.272531]  kasan_report+0x141/0x180
[   17.272554]  ? kasan_atomics_helper+0x1818/0x5450
[   17.272583]  kasan_check_range+0x10c/0x1c0
[   17.272607]  __kasan_check_write+0x18/0x20
[   17.272627]  kasan_atomics_helper+0x1818/0x5450
[   17.272651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.272674]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.272700]  ? kasan_atomics+0x152/0x310
[   17.272728]  kasan_atomics+0x1dc/0x310
[   17.272763]  ? __pfx_kasan_atomics+0x10/0x10
[   17.272788]  ? __pfx_read_tsc+0x10/0x10
[   17.272810]  ? ktime_get_ts64+0x86/0x230
[   17.272836]  kunit_try_run_case+0x1a5/0x480
[   17.272860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.272882]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.272907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.272930]  ? __kthread_parkme+0x82/0x180
[   17.272952]  ? preempt_count_sub+0x50/0x80
[   17.272976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.273000]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.273023]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.273057]  kthread+0x337/0x6f0
[   17.273078]  ? trace_preempt_on+0x20/0xc0
[   17.273100]  ? __pfx_kthread+0x10/0x10
[   17.273122]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.273143]  ? calculate_sigpending+0x7b/0xa0
[   17.273167]  ? __pfx_kthread+0x10/0x10
[   17.273191]  ret_from_fork+0x116/0x1d0
[   17.273209]  ? __pfx_kthread+0x10/0x10
[   17.273230]  ret_from_fork_asm+0x1a/0x30
[   17.273262]  </TASK>
[   17.273276] 
[   17.281223] Allocated by task 282:
[   17.281416]  kasan_save_stack+0x45/0x70
[   17.281634]  kasan_save_track+0x18/0x40
[   17.281854]  kasan_save_alloc_info+0x3b/0x50
[   17.282098]  __kasan_kmalloc+0xb7/0xc0
[   17.282295]  __kmalloc_cache_noprof+0x189/0x420
[   17.282478]  kasan_atomics+0x95/0x310
[   17.282622]  kunit_try_run_case+0x1a5/0x480
[   17.282790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.283090]  kthread+0x337/0x6f0
[   17.283268]  ret_from_fork+0x116/0x1d0
[   17.283521]  ret_from_fork_asm+0x1a/0x30
[   17.283714] 
[   17.283820] The buggy address belongs to the object at ffff8881031d0c00
[   17.283820]  which belongs to the cache kmalloc-64 of size 64
[   17.284362] The buggy address is located 0 bytes to the right of
[   17.284362]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.284912] 
[   17.285019] The buggy address belongs to the physical page:
[   17.285306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.285638] flags: 0x200000000000000(node=0|zone=2)
[   17.285884] page_type: f5(slab)
[   17.286060] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.286403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.286657] page dumped because: kasan: bad access detected
[   17.286903] 
[   17.287010] Memory state around the buggy address:
[   17.287276]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.287615]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.288111] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.288404]                                      ^
[   17.288592]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.288982]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.289308] ==================================================================
[   16.863310] ==================================================================
[   16.863565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   16.863980] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.864662] 
[   16.864857] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.864903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.864917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.864940] Call Trace:
[   16.864959]  <TASK>
[   16.864977]  dump_stack_lvl+0x73/0xb0
[   16.865015]  print_report+0xd1/0x650
[   16.865039]  ? __virt_addr_valid+0x1db/0x2d0
[   16.865080]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.865103]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.865130]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.865152]  kasan_report+0x141/0x180
[   16.865176]  ? kasan_atomics_helper+0x4a02/0x5450
[   16.865204]  __asan_report_load4_noabort+0x18/0x20
[   16.865228]  kasan_atomics_helper+0x4a02/0x5450
[   16.865252]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.865275]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.865300]  ? kasan_atomics+0x152/0x310
[   16.865328]  kasan_atomics+0x1dc/0x310
[   16.865364]  ? __pfx_kasan_atomics+0x10/0x10
[   16.865390]  ? __pfx_read_tsc+0x10/0x10
[   16.865412]  ? ktime_get_ts64+0x86/0x230
[   16.865437]  kunit_try_run_case+0x1a5/0x480
[   16.865462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.865486]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.865510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.865540]  ? __kthread_parkme+0x82/0x180
[   16.865561]  ? preempt_count_sub+0x50/0x80
[   16.865586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.865610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.865633]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.865657]  kthread+0x337/0x6f0
[   16.865677]  ? trace_preempt_on+0x20/0xc0
[   16.865702]  ? __pfx_kthread+0x10/0x10
[   16.865724]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.865745]  ? calculate_sigpending+0x7b/0xa0
[   16.865770]  ? __pfx_kthread+0x10/0x10
[   16.865792]  ret_from_fork+0x116/0x1d0
[   16.865811]  ? __pfx_kthread+0x10/0x10
[   16.865832]  ret_from_fork_asm+0x1a/0x30
[   16.865864]  </TASK>
[   16.865877] 
[   16.880194] Allocated by task 282:
[   16.880547]  kasan_save_stack+0x45/0x70
[   16.880971]  kasan_save_track+0x18/0x40
[   16.881248]  kasan_save_alloc_info+0x3b/0x50
[   16.881590]  __kasan_kmalloc+0xb7/0xc0
[   16.881741]  __kmalloc_cache_noprof+0x189/0x420
[   16.882198]  kasan_atomics+0x95/0x310
[   16.882572]  kunit_try_run_case+0x1a5/0x480
[   16.883072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.883261]  kthread+0x337/0x6f0
[   16.883392]  ret_from_fork+0x116/0x1d0
[   16.883533]  ret_from_fork_asm+0x1a/0x30
[   16.883683] 
[   16.883820] The buggy address belongs to the object at ffff8881031d0c00
[   16.883820]  which belongs to the cache kmalloc-64 of size 64
[   16.884965] The buggy address is located 0 bytes to the right of
[   16.884965]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.886221] 
[   16.886401] The buggy address belongs to the physical page:
[   16.887010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.887889] flags: 0x200000000000000(node=0|zone=2)
[   16.888289] page_type: f5(slab)
[   16.888422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.888672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.889338] page dumped because: kasan: bad access detected
[   16.889921] 
[   16.890127] Memory state around the buggy address:
[   16.890588]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.891325]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.892057] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.892291]                                      ^
[   16.892461]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.892692]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.893003] ==================================================================
[   16.377640] ==================================================================
[   16.377890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   16.378334] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.378634] 
[   16.378724] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.378770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.378783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.378806] Call Trace:
[   16.378821]  <TASK>
[   16.378838]  dump_stack_lvl+0x73/0xb0
[   16.378866]  print_report+0xd1/0x650
[   16.378890]  ? __virt_addr_valid+0x1db/0x2d0
[   16.378913]  ? kasan_atomics_helper+0x72f/0x5450
[   16.378936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.378963]  ? kasan_atomics_helper+0x72f/0x5450
[   16.378986]  kasan_report+0x141/0x180
[   16.379010]  ? kasan_atomics_helper+0x72f/0x5450
[   16.379040]  kasan_check_range+0x10c/0x1c0
[   16.379077]  __kasan_check_write+0x18/0x20
[   16.379098]  kasan_atomics_helper+0x72f/0x5450
[   16.379122]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.379147]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.379174]  ? kasan_atomics+0x152/0x310
[   16.379202]  kasan_atomics+0x1dc/0x310
[   16.379227]  ? __pfx_kasan_atomics+0x10/0x10
[   16.379269]  ? __pfx_read_tsc+0x10/0x10
[   16.379333]  ? ktime_get_ts64+0x86/0x230
[   16.379387]  kunit_try_run_case+0x1a5/0x480
[   16.379414]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.379486]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.379511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.379536]  ? __kthread_parkme+0x82/0x180
[   16.379608]  ? preempt_count_sub+0x50/0x80
[   16.379659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.379686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.379710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.379736]  kthread+0x337/0x6f0
[   16.379756]  ? trace_preempt_on+0x20/0xc0
[   16.379782]  ? __pfx_kthread+0x10/0x10
[   16.379805]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.379828]  ? calculate_sigpending+0x7b/0xa0
[   16.379853]  ? __pfx_kthread+0x10/0x10
[   16.379877]  ret_from_fork+0x116/0x1d0
[   16.379897]  ? __pfx_kthread+0x10/0x10
[   16.379919]  ret_from_fork_asm+0x1a/0x30
[   16.379954]  </TASK>
[   16.379968] 
[   16.388755] Allocated by task 282:
[   16.388898]  kasan_save_stack+0x45/0x70
[   16.389135]  kasan_save_track+0x18/0x40
[   16.389378]  kasan_save_alloc_info+0x3b/0x50
[   16.389642]  __kasan_kmalloc+0xb7/0xc0
[   16.389845]  __kmalloc_cache_noprof+0x189/0x420
[   16.390362]  kasan_atomics+0x95/0x310
[   16.390664]  kunit_try_run_case+0x1a5/0x480
[   16.391103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.391410]  kthread+0x337/0x6f0
[   16.391614]  ret_from_fork+0x116/0x1d0
[   16.391836]  ret_from_fork_asm+0x1a/0x30
[   16.392106] 
[   16.392209] The buggy address belongs to the object at ffff8881031d0c00
[   16.392209]  which belongs to the cache kmalloc-64 of size 64
[   16.392666] The buggy address is located 0 bytes to the right of
[   16.392666]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.393202] 
[   16.393306] The buggy address belongs to the physical page:
[   16.393631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.393932] flags: 0x200000000000000(node=0|zone=2)
[   16.394117] page_type: f5(slab)
[   16.394251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.394598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.395151] page dumped because: kasan: bad access detected
[   16.395492] 
[   16.395593] Memory state around the buggy address:
[   16.395997]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.396349]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.396721] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.397038]                                      ^
[   16.397213]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.397556]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.397947] ==================================================================
[   17.152975] ==================================================================
[   17.153661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   17.154373] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.155114] 
[   17.155319] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.155366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.155380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.155402] Call Trace:
[   17.155418]  <TASK>
[   17.155435]  dump_stack_lvl+0x73/0xb0
[   17.155462]  print_report+0xd1/0x650
[   17.155486]  ? __virt_addr_valid+0x1db/0x2d0
[   17.155510]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.155531]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.155558]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.155580]  kasan_report+0x141/0x180
[   17.155623]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.155651]  kasan_check_range+0x10c/0x1c0
[   17.155675]  __kasan_check_write+0x18/0x20
[   17.155696]  kasan_atomics_helper+0x15b6/0x5450
[   17.155741]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.155764]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.155791]  ? kasan_atomics+0x152/0x310
[   17.155819]  kasan_atomics+0x1dc/0x310
[   17.155843]  ? __pfx_kasan_atomics+0x10/0x10
[   17.155868]  ? __pfx_read_tsc+0x10/0x10
[   17.155890]  ? ktime_get_ts64+0x86/0x230
[   17.155916]  kunit_try_run_case+0x1a5/0x480
[   17.155942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.155964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.155988]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.156013]  ? __kthread_parkme+0x82/0x180
[   17.156034]  ? preempt_count_sub+0x50/0x80
[   17.156069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.156095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.156120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.156144]  kthread+0x337/0x6f0
[   17.156165]  ? trace_preempt_on+0x20/0xc0
[   17.156190]  ? __pfx_kthread+0x10/0x10
[   17.156212]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.156234]  ? calculate_sigpending+0x7b/0xa0
[   17.156258]  ? __pfx_kthread+0x10/0x10
[   17.156282]  ret_from_fork+0x116/0x1d0
[   17.156302]  ? __pfx_kthread+0x10/0x10
[   17.156325]  ret_from_fork_asm+0x1a/0x30
[   17.156357]  </TASK>
[   17.156371] 
[   17.168701] Allocated by task 282:
[   17.169055]  kasan_save_stack+0x45/0x70
[   17.169423]  kasan_save_track+0x18/0x40
[   17.169808]  kasan_save_alloc_info+0x3b/0x50
[   17.170213]  __kasan_kmalloc+0xb7/0xc0
[   17.170554]  __kmalloc_cache_noprof+0x189/0x420
[   17.170738]  kasan_atomics+0x95/0x310
[   17.171104]  kunit_try_run_case+0x1a5/0x480
[   17.171487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.171784]  kthread+0x337/0x6f0
[   17.171913]  ret_from_fork+0x116/0x1d0
[   17.172058]  ret_from_fork_asm+0x1a/0x30
[   17.172421] 
[   17.172585] The buggy address belongs to the object at ffff8881031d0c00
[   17.172585]  which belongs to the cache kmalloc-64 of size 64
[   17.173649] The buggy address is located 0 bytes to the right of
[   17.173649]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.174330] 
[   17.174407] The buggy address belongs to the physical page:
[   17.174588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.175008] flags: 0x200000000000000(node=0|zone=2)
[   17.175452] page_type: f5(slab)
[   17.175773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.176724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.177508] page dumped because: kasan: bad access detected
[   17.178011] 
[   17.178184] Memory state around the buggy address:
[   17.178619]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.178909]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.179148] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.179374]                                      ^
[   17.179541]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.179786]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.180063] ==================================================================
[   17.043404] ==================================================================
[   17.044118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   17.044852] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.045587] 
[   17.045817] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.045865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.045879] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.045902] Call Trace:
[   17.045918]  <TASK>
[   17.045934]  dump_stack_lvl+0x73/0xb0
[   17.045962]  print_report+0xd1/0x650
[   17.045986]  ? __virt_addr_valid+0x1db/0x2d0
[   17.046010]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.046032]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.046072]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.046096]  kasan_report+0x141/0x180
[   17.046120]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.046149]  __asan_report_load8_noabort+0x18/0x20
[   17.046175]  kasan_atomics_helper+0x4eae/0x5450
[   17.046200]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.046225]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.046252]  ? kasan_atomics+0x152/0x310
[   17.046282]  kasan_atomics+0x1dc/0x310
[   17.046307]  ? __pfx_kasan_atomics+0x10/0x10
[   17.046334]  ? __pfx_read_tsc+0x10/0x10
[   17.046357]  ? ktime_get_ts64+0x86/0x230
[   17.046384]  kunit_try_run_case+0x1a5/0x480
[   17.046409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.046432]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.046456]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.046482]  ? __kthread_parkme+0x82/0x180
[   17.046503]  ? preempt_count_sub+0x50/0x80
[   17.046529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.046554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.046579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.046604]  kthread+0x337/0x6f0
[   17.046625]  ? trace_preempt_on+0x20/0xc0
[   17.046650]  ? __pfx_kthread+0x10/0x10
[   17.046673]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.046696]  ? calculate_sigpending+0x7b/0xa0
[   17.046721]  ? __pfx_kthread+0x10/0x10
[   17.046757]  ret_from_fork+0x116/0x1d0
[   17.046778]  ? __pfx_kthread+0x10/0x10
[   17.046799]  ret_from_fork_asm+0x1a/0x30
[   17.046846]  </TASK>
[   17.046858] 
[   17.059747] Allocated by task 282:
[   17.060067]  kasan_save_stack+0x45/0x70
[   17.060277]  kasan_save_track+0x18/0x40
[   17.060432]  kasan_save_alloc_info+0x3b/0x50
[   17.060650]  __kasan_kmalloc+0xb7/0xc0
[   17.060842]  __kmalloc_cache_noprof+0x189/0x420
[   17.061072]  kasan_atomics+0x95/0x310
[   17.061215]  kunit_try_run_case+0x1a5/0x480
[   17.061431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.061724]  kthread+0x337/0x6f0
[   17.061925]  ret_from_fork+0x116/0x1d0
[   17.062126]  ret_from_fork_asm+0x1a/0x30
[   17.062320] 
[   17.062421] The buggy address belongs to the object at ffff8881031d0c00
[   17.062421]  which belongs to the cache kmalloc-64 of size 64
[   17.062949] The buggy address is located 0 bytes to the right of
[   17.062949]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.063547] 
[   17.063642] The buggy address belongs to the physical page:
[   17.063927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.064333] flags: 0x200000000000000(node=0|zone=2)
[   17.064629] page_type: f5(slab)
[   17.064803] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.065202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.065496] page dumped because: kasan: bad access detected
[   17.065753] 
[   17.065851] Memory state around the buggy address:
[   17.066084]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.066312]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.066581] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.066955]                                      ^
[   17.067168]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.067491]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.067858] ==================================================================
[   17.552830] ==================================================================
[   17.553586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   17.554331] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.555058] 
[   17.555264] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.555312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.555325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.555349] Call Trace:
[   17.555364]  <TASK>
[   17.555380]  dump_stack_lvl+0x73/0xb0
[   17.555431]  print_report+0xd1/0x650
[   17.555455]  ? __virt_addr_valid+0x1db/0x2d0
[   17.555478]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.555501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.555530]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.555553]  kasan_report+0x141/0x180
[   17.555578]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.555607]  kasan_check_range+0x10c/0x1c0
[   17.555632]  __kasan_check_write+0x18/0x20
[   17.555653]  kasan_atomics_helper+0x1eaa/0x5450
[   17.555678]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.555702]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.555750]  ? kasan_atomics+0x152/0x310
[   17.555779]  kasan_atomics+0x1dc/0x310
[   17.555804]  ? __pfx_kasan_atomics+0x10/0x10
[   17.555830]  ? __pfx_read_tsc+0x10/0x10
[   17.555852]  ? ktime_get_ts64+0x86/0x230
[   17.555878]  kunit_try_run_case+0x1a5/0x480
[   17.555904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.555928]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.555953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.555980]  ? __kthread_parkme+0x82/0x180
[   17.556005]  ? preempt_count_sub+0x50/0x80
[   17.556032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.556071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.556097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.556122]  kthread+0x337/0x6f0
[   17.556144]  ? trace_preempt_on+0x20/0xc0
[   17.556171]  ? __pfx_kthread+0x10/0x10
[   17.556197]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.556220]  ? calculate_sigpending+0x7b/0xa0
[   17.556246]  ? __pfx_kthread+0x10/0x10
[   17.556270]  ret_from_fork+0x116/0x1d0
[   17.556291]  ? __pfx_kthread+0x10/0x10
[   17.556318]  ret_from_fork_asm+0x1a/0x30
[   17.556353]  </TASK>
[   17.556365] 
[   17.567406] Allocated by task 282:
[   17.567617]  kasan_save_stack+0x45/0x70
[   17.567822]  kasan_save_track+0x18/0x40
[   17.568031]  kasan_save_alloc_info+0x3b/0x50
[   17.568286]  __kasan_kmalloc+0xb7/0xc0
[   17.568508]  __kmalloc_cache_noprof+0x189/0x420
[   17.568735]  kasan_atomics+0x95/0x310
[   17.568946]  kunit_try_run_case+0x1a5/0x480
[   17.569171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.569418]  kthread+0x337/0x6f0
[   17.569548]  ret_from_fork+0x116/0x1d0
[   17.569721]  ret_from_fork_asm+0x1a/0x30
[   17.569923] 
[   17.570056] The buggy address belongs to the object at ffff8881031d0c00
[   17.570056]  which belongs to the cache kmalloc-64 of size 64
[   17.570595] The buggy address is located 0 bytes to the right of
[   17.570595]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.571170] 
[   17.571275] The buggy address belongs to the physical page:
[   17.571535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.571965] flags: 0x200000000000000(node=0|zone=2)
[   17.572214] page_type: f5(slab)
[   17.572392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.572720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.573162] page dumped because: kasan: bad access detected
[   17.573421] 
[   17.573526] Memory state around the buggy address:
[   17.573739]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.573965]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.574549] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.575027]                                      ^
[   17.575280]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.575569]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.575942] ==================================================================
[   16.305034] ==================================================================
[   16.305959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   16.307353] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.308328] 
[   16.308642] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.308693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.308708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.308731] Call Trace:
[   16.308748]  <TASK>
[   16.308789]  dump_stack_lvl+0x73/0xb0
[   16.308822]  print_report+0xd1/0x650
[   16.308846]  ? __virt_addr_valid+0x1db/0x2d0
[   16.308870]  ? kasan_atomics_helper+0x565/0x5450
[   16.308892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.308920]  ? kasan_atomics_helper+0x565/0x5450
[   16.308943]  kasan_report+0x141/0x180
[   16.308966]  ? kasan_atomics_helper+0x565/0x5450
[   16.308994]  kasan_check_range+0x10c/0x1c0
[   16.309020]  __kasan_check_write+0x18/0x20
[   16.309040]  kasan_atomics_helper+0x565/0x5450
[   16.309079]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.309103]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.309130]  ? kasan_atomics+0x152/0x310
[   16.309159]  kasan_atomics+0x1dc/0x310
[   16.309183]  ? __pfx_kasan_atomics+0x10/0x10
[   16.309209]  ? __pfx_read_tsc+0x10/0x10
[   16.309231]  ? ktime_get_ts64+0x86/0x230
[   16.309258]  kunit_try_run_case+0x1a5/0x480
[   16.309283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.309307]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.309333]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.309357]  ? __kthread_parkme+0x82/0x180
[   16.309379]  ? preempt_count_sub+0x50/0x80
[   16.309405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.309430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.309454]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.309478]  kthread+0x337/0x6f0
[   16.309501]  ? trace_preempt_on+0x20/0xc0
[   16.309531]  ? __pfx_kthread+0x10/0x10
[   16.309554]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.309578]  ? calculate_sigpending+0x7b/0xa0
[   16.309603]  ? __pfx_kthread+0x10/0x10
[   16.309628]  ret_from_fork+0x116/0x1d0
[   16.309647]  ? __pfx_kthread+0x10/0x10
[   16.309669]  ret_from_fork_asm+0x1a/0x30
[   16.309702]  </TASK>
[   16.309715] 
[   16.322234] Allocated by task 282:
[   16.322374]  kasan_save_stack+0x45/0x70
[   16.322520]  kasan_save_track+0x18/0x40
[   16.322658]  kasan_save_alloc_info+0x3b/0x50
[   16.322932]  __kasan_kmalloc+0xb7/0xc0
[   16.323334]  __kmalloc_cache_noprof+0x189/0x420
[   16.323499]  kasan_atomics+0x95/0x310
[   16.323674]  kunit_try_run_case+0x1a5/0x480
[   16.324185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.324551]  kthread+0x337/0x6f0
[   16.324682]  ret_from_fork+0x116/0x1d0
[   16.324911]  ret_from_fork_asm+0x1a/0x30
[   16.325309] 
[   16.325390] The buggy address belongs to the object at ffff8881031d0c00
[   16.325390]  which belongs to the cache kmalloc-64 of size 64
[   16.325792] The buggy address is located 0 bytes to the right of
[   16.325792]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.326314] 
[   16.326396] The buggy address belongs to the physical page:
[   16.326578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.327133] flags: 0x200000000000000(node=0|zone=2)
[   16.327663] page_type: f5(slab)
[   16.328074] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.328796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.329670] page dumped because: kasan: bad access detected
[   16.330407] 
[   16.330610] Memory state around the buggy address:
[   16.331143]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.331393]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.331621] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.332184]                                      ^
[   16.332671]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.333467]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.334308] ==================================================================
[   16.470450] ==================================================================
[   16.471025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   16.471468] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.472263] 
[   16.472514] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.472562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.472576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.472598] Call Trace:
[   16.472615]  <TASK>
[   16.472632]  dump_stack_lvl+0x73/0xb0
[   16.472689]  print_report+0xd1/0x650
[   16.472740]  ? __virt_addr_valid+0x1db/0x2d0
[   16.472764]  ? kasan_atomics_helper+0x992/0x5450
[   16.472815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.472841]  ? kasan_atomics_helper+0x992/0x5450
[   16.472875]  kasan_report+0x141/0x180
[   16.472899]  ? kasan_atomics_helper+0x992/0x5450
[   16.472927]  kasan_check_range+0x10c/0x1c0
[   16.472951]  __kasan_check_write+0x18/0x20
[   16.472999]  kasan_atomics_helper+0x992/0x5450
[   16.473023]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.473046]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.473089]  ? kasan_atomics+0x152/0x310
[   16.473117]  kasan_atomics+0x1dc/0x310
[   16.473141]  ? __pfx_kasan_atomics+0x10/0x10
[   16.473167]  ? __pfx_read_tsc+0x10/0x10
[   16.473189]  ? ktime_get_ts64+0x86/0x230
[   16.473215]  kunit_try_run_case+0x1a5/0x480
[   16.473242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.473265]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.473290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.473314]  ? __kthread_parkme+0x82/0x180
[   16.473336]  ? preempt_count_sub+0x50/0x80
[   16.473363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.473388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.473412]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.473437]  kthread+0x337/0x6f0
[   16.473458]  ? trace_preempt_on+0x20/0xc0
[   16.473482]  ? __pfx_kthread+0x10/0x10
[   16.473505]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.473533]  ? calculate_sigpending+0x7b/0xa0
[   16.473557]  ? __pfx_kthread+0x10/0x10
[   16.473581]  ret_from_fork+0x116/0x1d0
[   16.473601]  ? __pfx_kthread+0x10/0x10
[   16.473622]  ret_from_fork_asm+0x1a/0x30
[   16.473655]  </TASK>
[   16.473668] 
[   16.486934] Allocated by task 282:
[   16.487293]  kasan_save_stack+0x45/0x70
[   16.487698]  kasan_save_track+0x18/0x40
[   16.488122]  kasan_save_alloc_info+0x3b/0x50
[   16.488477]  __kasan_kmalloc+0xb7/0xc0
[   16.488625]  __kmalloc_cache_noprof+0x189/0x420
[   16.489032]  kasan_atomics+0x95/0x310
[   16.489442]  kunit_try_run_case+0x1a5/0x480
[   16.489898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.490323]  kthread+0x337/0x6f0
[   16.490459]  ret_from_fork+0x116/0x1d0
[   16.490602]  ret_from_fork_asm+0x1a/0x30
[   16.490858] 
[   16.491085] The buggy address belongs to the object at ffff8881031d0c00
[   16.491085]  which belongs to the cache kmalloc-64 of size 64
[   16.492273] The buggy address is located 0 bytes to the right of
[   16.492273]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.493229] 
[   16.493316] The buggy address belongs to the physical page:
[   16.493506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.493944] flags: 0x200000000000000(node=0|zone=2)
[   16.494444] page_type: f5(slab)
[   16.494834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.495555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.496289] page dumped because: kasan: bad access detected
[   16.496841] 
[   16.496926] Memory state around the buggy address:
[   16.497105]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.497338]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.497571] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.497807]                                      ^
[   16.497972]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.498626]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.499307] ==================================================================
[   16.592532] ==================================================================
[   16.592939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   16.593642] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.594495] 
[   16.594750] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.594800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.594826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.594849] Call Trace:
[   16.594867]  <TASK>
[   16.594898]  dump_stack_lvl+0x73/0xb0
[   16.594929]  print_report+0xd1/0x650
[   16.594953]  ? __virt_addr_valid+0x1db/0x2d0
[   16.594979]  ? kasan_atomics_helper+0xc70/0x5450
[   16.595003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.595030]  ? kasan_atomics_helper+0xc70/0x5450
[   16.595065]  kasan_report+0x141/0x180
[   16.595089]  ? kasan_atomics_helper+0xc70/0x5450
[   16.595116]  kasan_check_range+0x10c/0x1c0
[   16.595142]  __kasan_check_write+0x18/0x20
[   16.595163]  kasan_atomics_helper+0xc70/0x5450
[   16.595187]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.595211]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.595248]  ? kasan_atomics+0x152/0x310
[   16.595278]  kasan_atomics+0x1dc/0x310
[   16.595314]  ? __pfx_kasan_atomics+0x10/0x10
[   16.595340]  ? __pfx_read_tsc+0x10/0x10
[   16.595364]  ? ktime_get_ts64+0x86/0x230
[   16.595390]  kunit_try_run_case+0x1a5/0x480
[   16.595427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.595451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.595488]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.595513]  ? __kthread_parkme+0x82/0x180
[   16.595534]  ? preempt_count_sub+0x50/0x80
[   16.595560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.595585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.595610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.595635]  kthread+0x337/0x6f0
[   16.595656]  ? trace_preempt_on+0x20/0xc0
[   16.595682]  ? __pfx_kthread+0x10/0x10
[   16.595704]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.595727]  ? calculate_sigpending+0x7b/0xa0
[   16.595753]  ? __pfx_kthread+0x10/0x10
[   16.595776]  ret_from_fork+0x116/0x1d0
[   16.595796]  ? __pfx_kthread+0x10/0x10
[   16.595818]  ret_from_fork_asm+0x1a/0x30
[   16.595853]  </TASK>
[   16.595867] 
[   16.609498] Allocated by task 282:
[   16.609865]  kasan_save_stack+0x45/0x70
[   16.610184]  kasan_save_track+0x18/0x40
[   16.610429]  kasan_save_alloc_info+0x3b/0x50
[   16.610586]  __kasan_kmalloc+0xb7/0xc0
[   16.610724]  __kmalloc_cache_noprof+0x189/0x420
[   16.610888]  kasan_atomics+0x95/0x310
[   16.611026]  kunit_try_run_case+0x1a5/0x480
[   16.611437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.611967]  kthread+0x337/0x6f0
[   16.612296]  ret_from_fork+0x116/0x1d0
[   16.612667]  ret_from_fork_asm+0x1a/0x30
[   16.613070] 
[   16.613210] The buggy address belongs to the object at ffff8881031d0c00
[   16.613210]  which belongs to the cache kmalloc-64 of size 64
[   16.613741] The buggy address is located 0 bytes to the right of
[   16.613741]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.614422] 
[   16.614500] The buggy address belongs to the physical page:
[   16.614678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.615343] flags: 0x200000000000000(node=0|zone=2)
[   16.615825] page_type: f5(slab)
[   16.616154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.616904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.617355] page dumped because: kasan: bad access detected
[   16.617539] 
[   16.617614] Memory state around the buggy address:
[   16.617857]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.618478]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.619193] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.619862]                                      ^
[   16.620312]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.620758]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.621341] ==================================================================
[   17.665098] ==================================================================
[   17.665819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   17.666188] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.666786] 
[   17.666941] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.667133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.667149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.667172] Call Trace:
[   17.667188]  <TASK>
[   17.667205]  dump_stack_lvl+0x73/0xb0
[   17.667235]  print_report+0xd1/0x650
[   17.667258]  ? __virt_addr_valid+0x1db/0x2d0
[   17.667282]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.667304]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.667331]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.667355]  kasan_report+0x141/0x180
[   17.667377]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.667406]  __asan_report_load8_noabort+0x18/0x20
[   17.667431]  kasan_atomics_helper+0x4f98/0x5450
[   17.667456]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.667479]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.667505]  ? kasan_atomics+0x152/0x310
[   17.667533]  kasan_atomics+0x1dc/0x310
[   17.667557]  ? __pfx_kasan_atomics+0x10/0x10
[   17.667583]  ? __pfx_read_tsc+0x10/0x10
[   17.667605]  ? ktime_get_ts64+0x86/0x230
[   17.667632]  kunit_try_run_case+0x1a5/0x480
[   17.667658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.667681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.667706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.667740]  ? __kthread_parkme+0x82/0x180
[   17.667762]  ? preempt_count_sub+0x50/0x80
[   17.667786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.667812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.667837]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.667862]  kthread+0x337/0x6f0
[   17.667882]  ? trace_preempt_on+0x20/0xc0
[   17.667906]  ? __pfx_kthread+0x10/0x10
[   17.667929]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.667951]  ? calculate_sigpending+0x7b/0xa0
[   17.667976]  ? __pfx_kthread+0x10/0x10
[   17.668000]  ret_from_fork+0x116/0x1d0
[   17.668020]  ? __pfx_kthread+0x10/0x10
[   17.668043]  ret_from_fork_asm+0x1a/0x30
[   17.668089]  </TASK>
[   17.668102] 
[   17.678845] Allocated by task 282:
[   17.679289]  kasan_save_stack+0x45/0x70
[   17.679491]  kasan_save_track+0x18/0x40
[   17.679669]  kasan_save_alloc_info+0x3b/0x50
[   17.679879]  __kasan_kmalloc+0xb7/0xc0
[   17.680251]  __kmalloc_cache_noprof+0x189/0x420
[   17.680625]  kasan_atomics+0x95/0x310
[   17.680910]  kunit_try_run_case+0x1a5/0x480
[   17.681239]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.681591]  kthread+0x337/0x6f0
[   17.681925]  ret_from_fork+0x116/0x1d0
[   17.682226]  ret_from_fork_asm+0x1a/0x30
[   17.682547] 
[   17.682748] The buggy address belongs to the object at ffff8881031d0c00
[   17.682748]  which belongs to the cache kmalloc-64 of size 64
[   17.683239] The buggy address is located 0 bytes to the right of
[   17.683239]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.683717] 
[   17.683891] The buggy address belongs to the physical page:
[   17.684506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.685118] flags: 0x200000000000000(node=0|zone=2)
[   17.685465] page_type: f5(slab)
[   17.685747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.686209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.686642] page dumped because: kasan: bad access detected
[   17.687025] 
[   17.687334] Memory state around the buggy address:
[   17.687578]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.688066]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.688508] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.689025]                                      ^
[   17.689274]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.689593]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.690150] ==================================================================
[   17.576484] ==================================================================
[   17.577182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   17.578079] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.578447] 
[   17.578554] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.578599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.578612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.578634] Call Trace:
[   17.578650]  <TASK>
[   17.578665]  dump_stack_lvl+0x73/0xb0
[   17.578692]  print_report+0xd1/0x650
[   17.578716]  ? __virt_addr_valid+0x1db/0x2d0
[   17.578769]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.578792]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.578819]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.578842]  kasan_report+0x141/0x180
[   17.578865]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.578893]  kasan_check_range+0x10c/0x1c0
[   17.578918]  __kasan_check_write+0x18/0x20
[   17.578939]  kasan_atomics_helper+0x1f43/0x5450
[   17.578963]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.578986]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.579012]  ? kasan_atomics+0x152/0x310
[   17.579040]  kasan_atomics+0x1dc/0x310
[   17.579076]  ? __pfx_kasan_atomics+0x10/0x10
[   17.579102]  ? __pfx_read_tsc+0x10/0x10
[   17.579143]  ? ktime_get_ts64+0x86/0x230
[   17.579170]  kunit_try_run_case+0x1a5/0x480
[   17.579212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.579235]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.579260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.579302]  ? __kthread_parkme+0x82/0x180
[   17.579324]  ? preempt_count_sub+0x50/0x80
[   17.579349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.579374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.579398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.579422]  kthread+0x337/0x6f0
[   17.579462]  ? trace_preempt_on+0x20/0xc0
[   17.579486]  ? __pfx_kthread+0x10/0x10
[   17.579508]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.579531]  ? calculate_sigpending+0x7b/0xa0
[   17.579555]  ? __pfx_kthread+0x10/0x10
[   17.579578]  ret_from_fork+0x116/0x1d0
[   17.579597]  ? __pfx_kthread+0x10/0x10
[   17.579619]  ret_from_fork_asm+0x1a/0x30
[   17.579669]  </TASK>
[   17.579682] 
[   17.593518] Allocated by task 282:
[   17.593918]  kasan_save_stack+0x45/0x70
[   17.594295]  kasan_save_track+0x18/0x40
[   17.594445]  kasan_save_alloc_info+0x3b/0x50
[   17.594607]  __kasan_kmalloc+0xb7/0xc0
[   17.594782]  __kmalloc_cache_noprof+0x189/0x420
[   17.594954]  kasan_atomics+0x95/0x310
[   17.595111]  kunit_try_run_case+0x1a5/0x480
[   17.595269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.595455]  kthread+0x337/0x6f0
[   17.595586]  ret_from_fork+0x116/0x1d0
[   17.595750]  ret_from_fork_asm+0x1a/0x30
[   17.596128] 
[   17.596303] The buggy address belongs to the object at ffff8881031d0c00
[   17.596303]  which belongs to the cache kmalloc-64 of size 64
[   17.597543] The buggy address is located 0 bytes to the right of
[   17.597543]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.598940] 
[   17.599137] The buggy address belongs to the physical page:
[   17.599658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.600457] flags: 0x200000000000000(node=0|zone=2)
[   17.600962] page_type: f5(slab)
[   17.601289] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.602034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.602322] page dumped because: kasan: bad access detected
[   17.602510] 
[   17.602587] Memory state around the buggy address:
[   17.602782]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.603432]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.604148] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.604837]                                      ^
[   17.606253]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.606853]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.607102] ==================================================================
[   16.443286] ==================================================================
[   16.443746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   16.444122] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.444407] 
[   16.444571] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.444658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.444674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.444698] Call Trace:
[   16.444714]  <TASK>
[   16.444741]  dump_stack_lvl+0x73/0xb0
[   16.444772]  print_report+0xd1/0x650
[   16.444796]  ? __virt_addr_valid+0x1db/0x2d0
[   16.444857]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.444881]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.444909]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.444932]  kasan_report+0x141/0x180
[   16.444988]  ? kasan_atomics_helper+0x8f9/0x5450
[   16.445018]  kasan_check_range+0x10c/0x1c0
[   16.445043]  __kasan_check_write+0x18/0x20
[   16.445076]  kasan_atomics_helper+0x8f9/0x5450
[   16.445102]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.445125]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.445152]  ? kasan_atomics+0x152/0x310
[   16.445182]  kasan_atomics+0x1dc/0x310
[   16.445207]  ? __pfx_kasan_atomics+0x10/0x10
[   16.445234]  ? __pfx_read_tsc+0x10/0x10
[   16.445257]  ? ktime_get_ts64+0x86/0x230
[   16.445283]  kunit_try_run_case+0x1a5/0x480
[   16.445308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.445333]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.445358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.445384]  ? __kthread_parkme+0x82/0x180
[   16.445406]  ? preempt_count_sub+0x50/0x80
[   16.445432]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.445458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.445482]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.445509]  kthread+0x337/0x6f0
[   16.445533]  ? trace_preempt_on+0x20/0xc0
[   16.445581]  ? __pfx_kthread+0x10/0x10
[   16.445604]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.445627]  ? calculate_sigpending+0x7b/0xa0
[   16.445652]  ? __pfx_kthread+0x10/0x10
[   16.445676]  ret_from_fork+0x116/0x1d0
[   16.445697]  ? __pfx_kthread+0x10/0x10
[   16.445720]  ret_from_fork_asm+0x1a/0x30
[   16.445755]  </TASK>
[   16.445769] 
[   16.455609] Allocated by task 282:
[   16.456065]  kasan_save_stack+0x45/0x70
[   16.456473]  kasan_save_track+0x18/0x40
[   16.456894]  kasan_save_alloc_info+0x3b/0x50
[   16.457327]  __kasan_kmalloc+0xb7/0xc0
[   16.457739]  __kmalloc_cache_noprof+0x189/0x420
[   16.458200]  kasan_atomics+0x95/0x310
[   16.458576]  kunit_try_run_case+0x1a5/0x480
[   16.459010]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.459535]  kthread+0x337/0x6f0
[   16.459904]  ret_from_fork+0x116/0x1d0
[   16.460287]  ret_from_fork_asm+0x1a/0x30
[   16.460588] 
[   16.460668] The buggy address belongs to the object at ffff8881031d0c00
[   16.460668]  which belongs to the cache kmalloc-64 of size 64
[   16.461652] The buggy address is located 0 bytes to the right of
[   16.461652]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.462748] 
[   16.462897] The buggy address belongs to the physical page:
[   16.463318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.463693] flags: 0x200000000000000(node=0|zone=2)
[   16.464199] page_type: f5(slab)
[   16.464532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.464964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.465222] page dumped because: kasan: bad access detected
[   16.465409] 
[   16.465484] Memory state around the buggy address:
[   16.465652]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.466330]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.467001] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.467666]                                      ^
[   16.468172]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.468856]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.469500] ==================================================================
[   16.786159] ==================================================================
[   16.786654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   16.787076] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.787459] 
[   16.787580] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.787628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.787642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.787666] Call Trace:
[   16.787680]  <TASK>
[   16.787697]  dump_stack_lvl+0x73/0xb0
[   16.787749]  print_report+0xd1/0x650
[   16.787774]  ? __virt_addr_valid+0x1db/0x2d0
[   16.787810]  ? kasan_atomics_helper+0x1079/0x5450
[   16.787833]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.787861]  ? kasan_atomics_helper+0x1079/0x5450
[   16.787897]  kasan_report+0x141/0x180
[   16.787921]  ? kasan_atomics_helper+0x1079/0x5450
[   16.787951]  kasan_check_range+0x10c/0x1c0
[   16.787977]  __kasan_check_write+0x18/0x20
[   16.787999]  kasan_atomics_helper+0x1079/0x5450
[   16.788024]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.788057]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.788084]  ? kasan_atomics+0x152/0x310
[   16.788114]  kasan_atomics+0x1dc/0x310
[   16.788139]  ? __pfx_kasan_atomics+0x10/0x10
[   16.788166]  ? __pfx_read_tsc+0x10/0x10
[   16.788188]  ? ktime_get_ts64+0x86/0x230
[   16.788225]  kunit_try_run_case+0x1a5/0x480
[   16.788251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.788275]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.788312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.788337]  ? __kthread_parkme+0x82/0x180
[   16.788359]  ? preempt_count_sub+0x50/0x80
[   16.788384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.788418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.788443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.788479]  kthread+0x337/0x6f0
[   16.788501]  ? trace_preempt_on+0x20/0xc0
[   16.788526]  ? __pfx_kthread+0x10/0x10
[   16.788549]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.788582]  ? calculate_sigpending+0x7b/0xa0
[   16.788607]  ? __pfx_kthread+0x10/0x10
[   16.788631]  ret_from_fork+0x116/0x1d0
[   16.788661]  ? __pfx_kthread+0x10/0x10
[   16.788684]  ret_from_fork_asm+0x1a/0x30
[   16.788745]  </TASK>
[   16.788758] 
[   16.797155] Allocated by task 282:
[   16.797356]  kasan_save_stack+0x45/0x70
[   16.797557]  kasan_save_track+0x18/0x40
[   16.797761]  kasan_save_alloc_info+0x3b/0x50
[   16.797990]  __kasan_kmalloc+0xb7/0xc0
[   16.798219]  __kmalloc_cache_noprof+0x189/0x420
[   16.798442]  kasan_atomics+0x95/0x310
[   16.798672]  kunit_try_run_case+0x1a5/0x480
[   16.798848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.799035]  kthread+0x337/0x6f0
[   16.799224]  ret_from_fork+0x116/0x1d0
[   16.799434]  ret_from_fork_asm+0x1a/0x30
[   16.799656] 
[   16.799785] The buggy address belongs to the object at ffff8881031d0c00
[   16.799785]  which belongs to the cache kmalloc-64 of size 64
[   16.800261] The buggy address is located 0 bytes to the right of
[   16.800261]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.800876] 
[   16.800987] The buggy address belongs to the physical page:
[   16.801291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.801651] flags: 0x200000000000000(node=0|zone=2)
[   16.801921] page_type: f5(slab)
[   16.802116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.802423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.802664] page dumped because: kasan: bad access detected
[   16.802872] 
[   16.802949] Memory state around the buggy address:
[   16.803211]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.803547]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.803921] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.804266]                                      ^
[   16.804500]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.804809]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.805035] ==================================================================
[   16.767659] ==================================================================
[   16.767995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   16.768361] Read of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.768718] 
[   16.768852] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.768898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.768912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.768934] Call Trace:
[   16.768951]  <TASK>
[   16.768967]  dump_stack_lvl+0x73/0xb0
[   16.768995]  print_report+0xd1/0x650
[   16.769019]  ? __virt_addr_valid+0x1db/0x2d0
[   16.769043]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.769074]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.769101]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.769123]  kasan_report+0x141/0x180
[   16.769146]  ? kasan_atomics_helper+0x4a36/0x5450
[   16.769174]  __asan_report_load4_noabort+0x18/0x20
[   16.769199]  kasan_atomics_helper+0x4a36/0x5450
[   16.769222]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.769245]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.769271]  ? kasan_atomics+0x152/0x310
[   16.769299]  kasan_atomics+0x1dc/0x310
[   16.769323]  ? __pfx_kasan_atomics+0x10/0x10
[   16.769348]  ? __pfx_read_tsc+0x10/0x10
[   16.769370]  ? ktime_get_ts64+0x86/0x230
[   16.769395]  kunit_try_run_case+0x1a5/0x480
[   16.769420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.769443]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.769467]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.769491]  ? __kthread_parkme+0x82/0x180
[   16.769511]  ? preempt_count_sub+0x50/0x80
[   16.769542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.769567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.769600]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.769625]  kthread+0x337/0x6f0
[   16.769646]  ? trace_preempt_on+0x20/0xc0
[   16.769681]  ? __pfx_kthread+0x10/0x10
[   16.769703]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.769750]  ? calculate_sigpending+0x7b/0xa0
[   16.769775]  ? __pfx_kthread+0x10/0x10
[   16.769798]  ret_from_fork+0x116/0x1d0
[   16.769817]  ? __pfx_kthread+0x10/0x10
[   16.769839]  ret_from_fork_asm+0x1a/0x30
[   16.769872]  </TASK>
[   16.769885] 
[   16.777375] Allocated by task 282:
[   16.777565]  kasan_save_stack+0x45/0x70
[   16.777751]  kasan_save_track+0x18/0x40
[   16.777979]  kasan_save_alloc_info+0x3b/0x50
[   16.778212]  __kasan_kmalloc+0xb7/0xc0
[   16.778406]  __kmalloc_cache_noprof+0x189/0x420
[   16.778637]  kasan_atomics+0x95/0x310
[   16.778867]  kunit_try_run_case+0x1a5/0x480
[   16.779082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.779352]  kthread+0x337/0x6f0
[   16.779528]  ret_from_fork+0x116/0x1d0
[   16.779763]  ret_from_fork_asm+0x1a/0x30
[   16.779979] 
[   16.780091] The buggy address belongs to the object at ffff8881031d0c00
[   16.780091]  which belongs to the cache kmalloc-64 of size 64
[   16.780646] The buggy address is located 0 bytes to the right of
[   16.780646]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.781264] 
[   16.781362] The buggy address belongs to the physical page:
[   16.781658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.782014] flags: 0x200000000000000(node=0|zone=2)
[   16.782311] page_type: f5(slab)
[   16.782474] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.782819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.783078] page dumped because: kasan: bad access detected
[   16.783265] 
[   16.783344] Memory state around the buggy address:
[   16.783529]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.783942]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.784352] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.784794]                                      ^
[   16.785061]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.785361]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.785599] ==================================================================
[   17.814805] ==================================================================
[   17.815193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   17.815547] Read of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.816141] 
[   17.816260] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.816304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.816317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.816339] Call Trace:
[   17.816354]  <TASK>
[   17.816370]  dump_stack_lvl+0x73/0xb0
[   17.816399]  print_report+0xd1/0x650
[   17.816421]  ? __virt_addr_valid+0x1db/0x2d0
[   17.816443]  ? kasan_atomics_helper+0x5115/0x5450
[   17.816465]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.816492]  ? kasan_atomics_helper+0x5115/0x5450
[   17.816514]  kasan_report+0x141/0x180
[   17.816538]  ? kasan_atomics_helper+0x5115/0x5450
[   17.816566]  __asan_report_load8_noabort+0x18/0x20
[   17.816591]  kasan_atomics_helper+0x5115/0x5450
[   17.816615]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.816638]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.816664]  ? kasan_atomics+0x152/0x310
[   17.816692]  kasan_atomics+0x1dc/0x310
[   17.816715]  ? __pfx_kasan_atomics+0x10/0x10
[   17.816754]  ? __pfx_read_tsc+0x10/0x10
[   17.816777]  ? ktime_get_ts64+0x86/0x230
[   17.816803]  kunit_try_run_case+0x1a5/0x480
[   17.816827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.816850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.816874]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.816898]  ? __kthread_parkme+0x82/0x180
[   17.816919]  ? preempt_count_sub+0x50/0x80
[   17.816943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.816969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.816992]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.817016]  kthread+0x337/0x6f0
[   17.817037]  ? trace_preempt_on+0x20/0xc0
[   17.817072]  ? __pfx_kthread+0x10/0x10
[   17.817094]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.817117]  ? calculate_sigpending+0x7b/0xa0
[   17.817141]  ? __pfx_kthread+0x10/0x10
[   17.817164]  ret_from_fork+0x116/0x1d0
[   17.817183]  ? __pfx_kthread+0x10/0x10
[   17.817204]  ret_from_fork_asm+0x1a/0x30
[   17.817237]  </TASK>
[   17.817250] 
[   17.824812] Allocated by task 282:
[   17.825002]  kasan_save_stack+0x45/0x70
[   17.825222]  kasan_save_track+0x18/0x40
[   17.825387]  kasan_save_alloc_info+0x3b/0x50
[   17.825566]  __kasan_kmalloc+0xb7/0xc0
[   17.825881]  __kmalloc_cache_noprof+0x189/0x420
[   17.826131]  kasan_atomics+0x95/0x310
[   17.826318]  kunit_try_run_case+0x1a5/0x480
[   17.826503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.826760]  kthread+0x337/0x6f0
[   17.826925]  ret_from_fork+0x116/0x1d0
[   17.827104]  ret_from_fork_asm+0x1a/0x30
[   17.827292] 
[   17.827372] The buggy address belongs to the object at ffff8881031d0c00
[   17.827372]  which belongs to the cache kmalloc-64 of size 64
[   17.827931] The buggy address is located 0 bytes to the right of
[   17.827931]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.828334] 
[   17.828412] The buggy address belongs to the physical page:
[   17.828596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.828914] flags: 0x200000000000000(node=0|zone=2)
[   17.829243] page_type: f5(slab)
[   17.829420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.829825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.830076] page dumped because: kasan: bad access detected
[   17.830258] 
[   17.830332] Memory state around the buggy address:
[   17.830497]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.830932]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.831290] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.831626]                                      ^
[   17.832010]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.832367]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.832593] ==================================================================
[   17.638874] ==================================================================
[   17.639894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   17.640164] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.640405] 
[   17.640498] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.640543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.640558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.640581] Call Trace:
[   17.640599]  <TASK>
[   17.640615]  dump_stack_lvl+0x73/0xb0
[   17.640643]  print_report+0xd1/0x650
[   17.640667]  ? __virt_addr_valid+0x1db/0x2d0
[   17.640689]  ? kasan_atomics_helper+0x2006/0x5450
[   17.640712]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.640740]  ? kasan_atomics_helper+0x2006/0x5450
[   17.640764]  kasan_report+0x141/0x180
[   17.640787]  ? kasan_atomics_helper+0x2006/0x5450
[   17.640815]  kasan_check_range+0x10c/0x1c0
[   17.640840]  __kasan_check_write+0x18/0x20
[   17.640860]  kasan_atomics_helper+0x2006/0x5450
[   17.640884]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.640907]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.640934]  ? kasan_atomics+0x152/0x310
[   17.640963]  kasan_atomics+0x1dc/0x310
[   17.640987]  ? __pfx_kasan_atomics+0x10/0x10
[   17.641013]  ? __pfx_read_tsc+0x10/0x10
[   17.641035]  ? ktime_get_ts64+0x86/0x230
[   17.641072]  kunit_try_run_case+0x1a5/0x480
[   17.641098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.641121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.641145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.641170]  ? __kthread_parkme+0x82/0x180
[   17.641191]  ? preempt_count_sub+0x50/0x80
[   17.641216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.641241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.641265]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.641290]  kthread+0x337/0x6f0
[   17.641311]  ? trace_preempt_on+0x20/0xc0
[   17.641336]  ? __pfx_kthread+0x10/0x10
[   17.641358]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.641381]  ? calculate_sigpending+0x7b/0xa0
[   17.641405]  ? __pfx_kthread+0x10/0x10
[   17.641429]  ret_from_fork+0x116/0x1d0
[   17.641449]  ? __pfx_kthread+0x10/0x10
[   17.641471]  ret_from_fork_asm+0x1a/0x30
[   17.641505]  </TASK>
[   17.641517] 
[   17.653161] Allocated by task 282:
[   17.653393]  kasan_save_stack+0x45/0x70
[   17.653921]  kasan_save_track+0x18/0x40
[   17.654157]  kasan_save_alloc_info+0x3b/0x50
[   17.654389]  __kasan_kmalloc+0xb7/0xc0
[   17.654797]  __kmalloc_cache_noprof+0x189/0x420
[   17.655147]  kasan_atomics+0x95/0x310
[   17.655379]  kunit_try_run_case+0x1a5/0x480
[   17.655737]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.656082]  kthread+0x337/0x6f0
[   17.656421]  ret_from_fork+0x116/0x1d0
[   17.656735]  ret_from_fork_asm+0x1a/0x30
[   17.656965] 
[   17.657239] The buggy address belongs to the object at ffff8881031d0c00
[   17.657239]  which belongs to the cache kmalloc-64 of size 64
[   17.657760] The buggy address is located 0 bytes to the right of
[   17.657760]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.658352] 
[   17.658519] The buggy address belongs to the physical page:
[   17.659166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.659570] flags: 0x200000000000000(node=0|zone=2)
[   17.659919] page_type: f5(slab)
[   17.660139] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.660615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.661121] page dumped because: kasan: bad access detected
[   17.661427] 
[   17.661544] Memory state around the buggy address:
[   17.661847]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.662362]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.662694] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.663156]                                      ^
[   17.663464]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.663925]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.664243] ==================================================================
[   17.345337] ==================================================================
[   17.345728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   17.346013] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.348097] 
[   17.348300] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.348350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.348366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.348391] Call Trace:
[   17.348408]  <TASK>
[   17.348426]  dump_stack_lvl+0x73/0xb0
[   17.348459]  print_report+0xd1/0x650
[   17.348483]  ? __virt_addr_valid+0x1db/0x2d0
[   17.348507]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.348530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.348560]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.348585]  kasan_report+0x141/0x180
[   17.348609]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.348637]  kasan_check_range+0x10c/0x1c0
[   17.348663]  __kasan_check_write+0x18/0x20
[   17.348684]  kasan_atomics_helper+0x1a7f/0x5450
[   17.348710]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.350753]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.350800]  ? kasan_atomics+0x152/0x310
[   17.350833]  kasan_atomics+0x1dc/0x310
[   17.350861]  ? __pfx_kasan_atomics+0x10/0x10
[   17.350888]  ? __pfx_read_tsc+0x10/0x10
[   17.350911]  ? ktime_get_ts64+0x86/0x230
[   17.350939]  kunit_try_run_case+0x1a5/0x480
[   17.350965]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.350989]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.351015]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.351040]  ? __kthread_parkme+0x82/0x180
[   17.351089]  ? preempt_count_sub+0x50/0x80
[   17.351117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.351142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.351166]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.351190]  kthread+0x337/0x6f0
[   17.351211]  ? trace_preempt_on+0x20/0xc0
[   17.351237]  ? __pfx_kthread+0x10/0x10
[   17.351260]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.351283]  ? calculate_sigpending+0x7b/0xa0
[   17.351308]  ? __pfx_kthread+0x10/0x10
[   17.351331]  ret_from_fork+0x116/0x1d0
[   17.351352]  ? __pfx_kthread+0x10/0x10
[   17.351374]  ret_from_fork_asm+0x1a/0x30
[   17.351407]  </TASK>
[   17.351421] 
[   17.364561] Allocated by task 282:
[   17.364890]  kasan_save_stack+0x45/0x70
[   17.365143]  kasan_save_track+0x18/0x40
[   17.365316]  kasan_save_alloc_info+0x3b/0x50
[   17.365549]  __kasan_kmalloc+0xb7/0xc0
[   17.365728]  __kmalloc_cache_noprof+0x189/0x420
[   17.366285]  kasan_atomics+0x95/0x310
[   17.366607]  kunit_try_run_case+0x1a5/0x480
[   17.366855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.367199]  kthread+0x337/0x6f0
[   17.367477]  ret_from_fork+0x116/0x1d0
[   17.367637]  ret_from_fork_asm+0x1a/0x30
[   17.368035] 
[   17.368148] The buggy address belongs to the object at ffff8881031d0c00
[   17.368148]  which belongs to the cache kmalloc-64 of size 64
[   17.368971] The buggy address is located 0 bytes to the right of
[   17.368971]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.369493] 
[   17.369754] The buggy address belongs to the physical page:
[   17.370117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.370526] flags: 0x200000000000000(node=0|zone=2)
[   17.370843] page_type: f5(slab)
[   17.371030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.371372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.371698] page dumped because: kasan: bad access detected
[   17.372214] 
[   17.372461] Memory state around the buggy address:
[   17.372687]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.373233]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.373651] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.374166]                                      ^
[   17.374503]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.374981]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.375398] ==================================================================
[   16.560497] ==================================================================
[   16.560836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   16.562373] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.563002] 
[   16.563205] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.563253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.563266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.563289] Call Trace:
[   16.563306]  <TASK>
[   16.563322]  dump_stack_lvl+0x73/0xb0
[   16.564099]  print_report+0xd1/0x650
[   16.564134]  ? __virt_addr_valid+0x1db/0x2d0
[   16.564171]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.564194]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.564220]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.564245]  kasan_report+0x141/0x180
[   16.564269]  ? kasan_atomics_helper+0xb6a/0x5450
[   16.564298]  kasan_check_range+0x10c/0x1c0
[   16.564323]  __kasan_check_write+0x18/0x20
[   16.564344]  kasan_atomics_helper+0xb6a/0x5450
[   16.564368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.564391]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.564418]  ? kasan_atomics+0x152/0x310
[   16.564835]  kasan_atomics+0x1dc/0x310
[   16.564863]  ? __pfx_kasan_atomics+0x10/0x10
[   16.564904]  ? __pfx_read_tsc+0x10/0x10
[   16.564927]  ? ktime_get_ts64+0x86/0x230
[   16.564955]  kunit_try_run_case+0x1a5/0x480
[   16.564980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.565003]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.565028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.565062]  ? __kthread_parkme+0x82/0x180
[   16.565084]  ? preempt_count_sub+0x50/0x80
[   16.565109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.565134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.565157]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.565181]  kthread+0x337/0x6f0
[   16.565201]  ? trace_preempt_on+0x20/0xc0
[   16.565226]  ? __pfx_kthread+0x10/0x10
[   16.565248]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.565270]  ? calculate_sigpending+0x7b/0xa0
[   16.565295]  ? __pfx_kthread+0x10/0x10
[   16.565317]  ret_from_fork+0x116/0x1d0
[   16.565336]  ? __pfx_kthread+0x10/0x10
[   16.565358]  ret_from_fork_asm+0x1a/0x30
[   16.565391]  </TASK>
[   16.565403] 
[   16.578787] Allocated by task 282:
[   16.579086]  kasan_save_stack+0x45/0x70
[   16.579365]  kasan_save_track+0x18/0x40
[   16.579686]  kasan_save_alloc_info+0x3b/0x50
[   16.580169]  __kasan_kmalloc+0xb7/0xc0
[   16.580459]  __kmalloc_cache_noprof+0x189/0x420
[   16.580841]  kasan_atomics+0x95/0x310
[   16.581153]  kunit_try_run_case+0x1a5/0x480
[   16.581314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.581499]  kthread+0x337/0x6f0
[   16.581633]  ret_from_fork+0x116/0x1d0
[   16.581857]  ret_from_fork_asm+0x1a/0x30
[   16.582268] 
[   16.582446] The buggy address belongs to the object at ffff8881031d0c00
[   16.582446]  which belongs to the cache kmalloc-64 of size 64
[   16.583675] The buggy address is located 0 bytes to the right of
[   16.583675]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.584989] 
[   16.585193] The buggy address belongs to the physical page:
[   16.585558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.585986] flags: 0x200000000000000(node=0|zone=2)
[   16.586471] page_type: f5(slab)
[   16.586833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.587658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.588265] page dumped because: kasan: bad access detected
[   16.588673] 
[   16.588769] Memory state around the buggy address:
[   16.589163]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.589563]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.589938] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.590615]                                      ^
[   16.591159]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.591761]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.591995] ==================================================================
[   17.308422] ==================================================================
[   17.308822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   17.309093] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.309458] 
[   17.309579] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.309623] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.309636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.309657] Call Trace:
[   17.309672]  <TASK>
[   17.309686]  dump_stack_lvl+0x73/0xb0
[   17.309714]  print_report+0xd1/0x650
[   17.309745]  ? __virt_addr_valid+0x1db/0x2d0
[   17.309769]  ? kasan_atomics_helper+0x194a/0x5450
[   17.309791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.309817]  ? kasan_atomics_helper+0x194a/0x5450
[   17.309841]  kasan_report+0x141/0x180
[   17.309864]  ? kasan_atomics_helper+0x194a/0x5450
[   17.309891]  kasan_check_range+0x10c/0x1c0
[   17.309916]  __kasan_check_write+0x18/0x20
[   17.309937]  kasan_atomics_helper+0x194a/0x5450
[   17.309961]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.309984]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.310009]  ? kasan_atomics+0x152/0x310
[   17.310037]  kasan_atomics+0x1dc/0x310
[   17.310072]  ? __pfx_kasan_atomics+0x10/0x10
[   17.310097]  ? __pfx_read_tsc+0x10/0x10
[   17.310120]  ? ktime_get_ts64+0x86/0x230
[   17.310146]  kunit_try_run_case+0x1a5/0x480
[   17.310170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.310193]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.310217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.310241]  ? __kthread_parkme+0x82/0x180
[   17.310261]  ? preempt_count_sub+0x50/0x80
[   17.310286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.310309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.310332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.310356]  kthread+0x337/0x6f0
[   17.310377]  ? trace_preempt_on+0x20/0xc0
[   17.310401]  ? __pfx_kthread+0x10/0x10
[   17.310425]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.310449]  ? calculate_sigpending+0x7b/0xa0
[   17.310473]  ? __pfx_kthread+0x10/0x10
[   17.310495]  ret_from_fork+0x116/0x1d0
[   17.310514]  ? __pfx_kthread+0x10/0x10
[   17.310536]  ret_from_fork_asm+0x1a/0x30
[   17.310569]  </TASK>
[   17.310581] 
[   17.318305] Allocated by task 282:
[   17.318468]  kasan_save_stack+0x45/0x70
[   17.318643]  kasan_save_track+0x18/0x40
[   17.318882]  kasan_save_alloc_info+0x3b/0x50
[   17.319102]  __kasan_kmalloc+0xb7/0xc0
[   17.319285]  __kmalloc_cache_noprof+0x189/0x420
[   17.319504]  kasan_atomics+0x95/0x310
[   17.319693]  kunit_try_run_case+0x1a5/0x480
[   17.319942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.320165]  kthread+0x337/0x6f0
[   17.320324]  ret_from_fork+0x116/0x1d0
[   17.320520]  ret_from_fork_asm+0x1a/0x30
[   17.320710] 
[   17.320818] The buggy address belongs to the object at ffff8881031d0c00
[   17.320818]  which belongs to the cache kmalloc-64 of size 64
[   17.321193] The buggy address is located 0 bytes to the right of
[   17.321193]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.321591] 
[   17.321666] The buggy address belongs to the physical page:
[   17.321911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.322288] flags: 0x200000000000000(node=0|zone=2)
[   17.322534] page_type: f5(slab)
[   17.322739] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.323098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.323443] page dumped because: kasan: bad access detected
[   17.323698] 
[   17.323809] Memory state around the buggy address:
[   17.324036]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.324342]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.324564] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.324925]                                      ^
[   17.325198]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.325532]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.325902] ==================================================================
[   17.467969] ==================================================================
[   17.468806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   17.469667] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.470181] 
[   17.470293] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.470339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.470376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.470400] Call Trace:
[   17.470416]  <TASK>
[   17.470433]  dump_stack_lvl+0x73/0xb0
[   17.470465]  print_report+0xd1/0x650
[   17.470488]  ? __virt_addr_valid+0x1db/0x2d0
[   17.470511]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.470533]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.470636]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.470660]  kasan_report+0x141/0x180
[   17.470683]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.470711]  kasan_check_range+0x10c/0x1c0
[   17.470737]  __kasan_check_write+0x18/0x20
[   17.470757]  kasan_atomics_helper+0x1ce1/0x5450
[   17.470781]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.470804]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.470830]  ? kasan_atomics+0x152/0x310
[   17.470859]  kasan_atomics+0x1dc/0x310
[   17.470882]  ? __pfx_kasan_atomics+0x10/0x10
[   17.470907]  ? __pfx_read_tsc+0x10/0x10
[   17.470929]  ? ktime_get_ts64+0x86/0x230
[   17.470955]  kunit_try_run_case+0x1a5/0x480
[   17.470981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.471004]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.471028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.471065]  ? __kthread_parkme+0x82/0x180
[   17.471087]  ? preempt_count_sub+0x50/0x80
[   17.471112]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.471136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.471160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.471184]  kthread+0x337/0x6f0
[   17.471204]  ? trace_preempt_on+0x20/0xc0
[   17.471229]  ? __pfx_kthread+0x10/0x10
[   17.471251]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.471272]  ? calculate_sigpending+0x7b/0xa0
[   17.471296]  ? __pfx_kthread+0x10/0x10
[   17.471318]  ret_from_fork+0x116/0x1d0
[   17.471337]  ? __pfx_kthread+0x10/0x10
[   17.471358]  ret_from_fork_asm+0x1a/0x30
[   17.471391]  </TASK>
[   17.471403] 
[   17.483511] Allocated by task 282:
[   17.483655]  kasan_save_stack+0x45/0x70
[   17.483849]  kasan_save_track+0x18/0x40
[   17.484213]  kasan_save_alloc_info+0x3b/0x50
[   17.484620]  __kasan_kmalloc+0xb7/0xc0
[   17.485004]  __kmalloc_cache_noprof+0x189/0x420
[   17.485465]  kasan_atomics+0x95/0x310
[   17.485851]  kunit_try_run_case+0x1a5/0x480
[   17.486270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.486774]  kthread+0x337/0x6f0
[   17.487173]  ret_from_fork+0x116/0x1d0
[   17.487555]  ret_from_fork_asm+0x1a/0x30
[   17.488010] 
[   17.488217] The buggy address belongs to the object at ffff8881031d0c00
[   17.488217]  which belongs to the cache kmalloc-64 of size 64
[   17.489563] The buggy address is located 0 bytes to the right of
[   17.489563]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.490416] 
[   17.490609] The buggy address belongs to the physical page:
[   17.491129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.491561] flags: 0x200000000000000(node=0|zone=2)
[   17.491756] page_type: f5(slab)
[   17.492118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.492878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.493542] page dumped because: kasan: bad access detected
[   17.493746] 
[   17.493947] Memory state around the buggy address:
[   17.494425]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.495072]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.495456] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.495684]                                      ^
[   17.496031]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.496719]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.497514] ==================================================================
[   16.252126] ==================================================================
[   16.252544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   16.252909] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.253271] 
[   16.253366] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.253411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.253424] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.253446] Call Trace:
[   16.253462]  <TASK>
[   16.253478]  dump_stack_lvl+0x73/0xb0
[   16.253508]  print_report+0xd1/0x650
[   16.253558]  ? __virt_addr_valid+0x1db/0x2d0
[   16.253583]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.253605]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.253650]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.253675]  kasan_report+0x141/0x180
[   16.253700]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.253728]  kasan_check_range+0x10c/0x1c0
[   16.253753]  __kasan_check_write+0x18/0x20
[   16.253773]  kasan_atomics_helper+0x4a0/0x5450
[   16.253815]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.253839]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.253866]  ? kasan_atomics+0x152/0x310
[   16.253894]  kasan_atomics+0x1dc/0x310
[   16.253918]  ? __pfx_kasan_atomics+0x10/0x10
[   16.253944]  ? __pfx_read_tsc+0x10/0x10
[   16.253986]  ? ktime_get_ts64+0x86/0x230
[   16.254015]  kunit_try_run_case+0x1a5/0x480
[   16.254041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.254073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.254098]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.254122]  ? __kthread_parkme+0x82/0x180
[   16.254144]  ? preempt_count_sub+0x50/0x80
[   16.254169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.254194]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.254218]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.254242]  kthread+0x337/0x6f0
[   16.254263]  ? trace_preempt_on+0x20/0xc0
[   16.254286]  ? __pfx_kthread+0x10/0x10
[   16.254327]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.254350]  ? calculate_sigpending+0x7b/0xa0
[   16.254374]  ? __pfx_kthread+0x10/0x10
[   16.254398]  ret_from_fork+0x116/0x1d0
[   16.254417]  ? __pfx_kthread+0x10/0x10
[   16.254439]  ret_from_fork_asm+0x1a/0x30
[   16.254490]  </TASK>
[   16.254504] 
[   16.262765] Allocated by task 282:
[   16.262942]  kasan_save_stack+0x45/0x70
[   16.263167]  kasan_save_track+0x18/0x40
[   16.263417]  kasan_save_alloc_info+0x3b/0x50
[   16.263681]  __kasan_kmalloc+0xb7/0xc0
[   16.263997]  __kmalloc_cache_noprof+0x189/0x420
[   16.264226]  kasan_atomics+0x95/0x310
[   16.264492]  kunit_try_run_case+0x1a5/0x480
[   16.264936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.265173]  kthread+0x337/0x6f0
[   16.265326]  ret_from_fork+0x116/0x1d0
[   16.265463]  ret_from_fork_asm+0x1a/0x30
[   16.265609] 
[   16.265684] The buggy address belongs to the object at ffff8881031d0c00
[   16.265684]  which belongs to the cache kmalloc-64 of size 64
[   16.266765] The buggy address is located 0 bytes to the right of
[   16.266765]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.268582] 
[   16.268675] The buggy address belongs to the physical page:
[   16.269279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.269952] flags: 0x200000000000000(node=0|zone=2)
[   16.270412] page_type: f5(slab)
[   16.270736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.271087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.271406] page dumped because: kasan: bad access detected
[   16.271650] 
[   16.271981] Memory state around the buggy address:
[   16.272517]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.273160]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.273612] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.274112]                                      ^
[   16.274478]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.275020]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.275497] ==================================================================
[   16.728829] ==================================================================
[   16.729426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   16.729836] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.730319] 
[   16.730441] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.730486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.730500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.730524] Call Trace:
[   16.730540]  <TASK>
[   16.730556]  dump_stack_lvl+0x73/0xb0
[   16.730584]  print_report+0xd1/0x650
[   16.730608]  ? __virt_addr_valid+0x1db/0x2d0
[   16.730631]  ? kasan_atomics_helper+0xf10/0x5450
[   16.730654]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.730682]  ? kasan_atomics_helper+0xf10/0x5450
[   16.730705]  kasan_report+0x141/0x180
[   16.730754]  ? kasan_atomics_helper+0xf10/0x5450
[   16.730806]  kasan_check_range+0x10c/0x1c0
[   16.730833]  __kasan_check_write+0x18/0x20
[   16.730854]  kasan_atomics_helper+0xf10/0x5450
[   16.730879]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.730902]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.730950]  ? kasan_atomics+0x152/0x310
[   16.730982]  kasan_atomics+0x1dc/0x310
[   16.731006]  ? __pfx_kasan_atomics+0x10/0x10
[   16.731033]  ? __pfx_read_tsc+0x10/0x10
[   16.731066]  ? ktime_get_ts64+0x86/0x230
[   16.731094]  kunit_try_run_case+0x1a5/0x480
[   16.731119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.731158]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.731183]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.731221]  ? __kthread_parkme+0x82/0x180
[   16.731242]  ? preempt_count_sub+0x50/0x80
[   16.731268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.731305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.731330]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.731371]  kthread+0x337/0x6f0
[   16.731393]  ? trace_preempt_on+0x20/0xc0
[   16.731420]  ? __pfx_kthread+0x10/0x10
[   16.731442]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.731465]  ? calculate_sigpending+0x7b/0xa0
[   16.731490]  ? __pfx_kthread+0x10/0x10
[   16.731514]  ret_from_fork+0x116/0x1d0
[   16.731534]  ? __pfx_kthread+0x10/0x10
[   16.731556]  ret_from_fork_asm+0x1a/0x30
[   16.731590]  </TASK>
[   16.731603] 
[   16.740040] Allocated by task 282:
[   16.740251]  kasan_save_stack+0x45/0x70
[   16.740464]  kasan_save_track+0x18/0x40
[   16.740656]  kasan_save_alloc_info+0x3b/0x50
[   16.740928]  __kasan_kmalloc+0xb7/0xc0
[   16.741124]  __kmalloc_cache_noprof+0x189/0x420
[   16.741361]  kasan_atomics+0x95/0x310
[   16.741597]  kunit_try_run_case+0x1a5/0x480
[   16.741813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.742083]  kthread+0x337/0x6f0
[   16.742261]  ret_from_fork+0x116/0x1d0
[   16.742486]  ret_from_fork_asm+0x1a/0x30
[   16.742690] 
[   16.742829] The buggy address belongs to the object at ffff8881031d0c00
[   16.742829]  which belongs to the cache kmalloc-64 of size 64
[   16.743377] The buggy address is located 0 bytes to the right of
[   16.743377]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.743977] 
[   16.744084] The buggy address belongs to the physical page:
[   16.744378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.744777] flags: 0x200000000000000(node=0|zone=2)
[   16.745038] page_type: f5(slab)
[   16.745247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.745500] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.745781] page dumped because: kasan: bad access detected
[   16.745970] 
[   16.746057] Memory state around the buggy address:
[   16.746299]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.746774]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.747185] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.747573]                                      ^
[   16.747840]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.748114]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.748347] ==================================================================
[   17.691879] ==================================================================
[   17.692251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   17.692611] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.692949] 
[   17.693661] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.693713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.693727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.693751] Call Trace:
[   17.693769]  <TASK>
[   17.693787]  dump_stack_lvl+0x73/0xb0
[   17.693923]  print_report+0xd1/0x650
[   17.693953]  ? __virt_addr_valid+0x1db/0x2d0
[   17.693979]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.694003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.694031]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.694068]  kasan_report+0x141/0x180
[   17.694092]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.694121]  kasan_check_range+0x10c/0x1c0
[   17.694147]  __kasan_check_write+0x18/0x20
[   17.694168]  kasan_atomics_helper+0x20c8/0x5450
[   17.694192]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.694216]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.694243]  ? kasan_atomics+0x152/0x310
[   17.694272]  kasan_atomics+0x1dc/0x310
[   17.694297]  ? __pfx_kasan_atomics+0x10/0x10
[   17.694324]  ? __pfx_read_tsc+0x10/0x10
[   17.694347]  ? ktime_get_ts64+0x86/0x230
[   17.694373]  kunit_try_run_case+0x1a5/0x480
[   17.694399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.694423]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.694450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.694476]  ? __kthread_parkme+0x82/0x180
[   17.694497]  ? preempt_count_sub+0x50/0x80
[   17.694524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.694549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.694574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.694599]  kthread+0x337/0x6f0
[   17.694620]  ? trace_preempt_on+0x20/0xc0
[   17.694645]  ? __pfx_kthread+0x10/0x10
[   17.694668]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.694690]  ? calculate_sigpending+0x7b/0xa0
[   17.694716]  ? __pfx_kthread+0x10/0x10
[   17.694750]  ret_from_fork+0x116/0x1d0
[   17.694770]  ? __pfx_kthread+0x10/0x10
[   17.694793]  ret_from_fork_asm+0x1a/0x30
[   17.694827]  </TASK>
[   17.694840] 
[   17.706258] Allocated by task 282:
[   17.706585]  kasan_save_stack+0x45/0x70
[   17.706953]  kasan_save_track+0x18/0x40
[   17.707295]  kasan_save_alloc_info+0x3b/0x50
[   17.707535]  __kasan_kmalloc+0xb7/0xc0
[   17.707734]  __kmalloc_cache_noprof+0x189/0x420
[   17.708184]  kasan_atomics+0x95/0x310
[   17.708475]  kunit_try_run_case+0x1a5/0x480
[   17.708833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.709194]  kthread+0x337/0x6f0
[   17.709480]  ret_from_fork+0x116/0x1d0
[   17.709642]  ret_from_fork_asm+0x1a/0x30
[   17.710105] 
[   17.710212] The buggy address belongs to the object at ffff8881031d0c00
[   17.710212]  which belongs to the cache kmalloc-64 of size 64
[   17.711009] The buggy address is located 0 bytes to the right of
[   17.711009]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.711627] 
[   17.711715] The buggy address belongs to the physical page:
[   17.712218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.712737] flags: 0x200000000000000(node=0|zone=2)
[   17.713078] page_type: f5(slab)
[   17.713266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.713765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.714113] page dumped because: kasan: bad access detected
[   17.714382] 
[   17.714475] Memory state around the buggy address:
[   17.714702]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.715284]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.715684] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.716167]                                      ^
[   17.716484]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.716950]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.717337] ==================================================================
[   16.683223] ==================================================================
[   16.683919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   16.684769] Write of size 4 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   16.685171] 
[   16.685332] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   16.685384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.685398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.685432] Call Trace:
[   16.685449]  <TASK>
[   16.685467]  dump_stack_lvl+0x73/0xb0
[   16.685509]  print_report+0xd1/0x650
[   16.685538]  ? __virt_addr_valid+0x1db/0x2d0
[   16.685562]  ? kasan_atomics_helper+0xde0/0x5450
[   16.685585]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.685612]  ? kasan_atomics_helper+0xde0/0x5450
[   16.685636]  kasan_report+0x141/0x180
[   16.685671]  ? kasan_atomics_helper+0xde0/0x5450
[   16.685700]  kasan_check_range+0x10c/0x1c0
[   16.685726]  __kasan_check_write+0x18/0x20
[   16.685759]  kasan_atomics_helper+0xde0/0x5450
[   16.685784]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.685807]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.685834]  ? kasan_atomics+0x152/0x310
[   16.685864]  kasan_atomics+0x1dc/0x310
[   16.685889]  ? __pfx_kasan_atomics+0x10/0x10
[   16.685915]  ? __pfx_read_tsc+0x10/0x10
[   16.685939]  ? ktime_get_ts64+0x86/0x230
[   16.685965]  kunit_try_run_case+0x1a5/0x480
[   16.685990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.686014]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.686040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.686075]  ? __kthread_parkme+0x82/0x180
[   16.686096]  ? preempt_count_sub+0x50/0x80
[   16.686123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.686148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.686173]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.686198]  kthread+0x337/0x6f0
[   16.686219]  ? trace_preempt_on+0x20/0xc0
[   16.686244]  ? __pfx_kthread+0x10/0x10
[   16.686267]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.686290]  ? calculate_sigpending+0x7b/0xa0
[   16.686316]  ? __pfx_kthread+0x10/0x10
[   16.686339]  ret_from_fork+0x116/0x1d0
[   16.686359]  ? __pfx_kthread+0x10/0x10
[   16.686381]  ret_from_fork_asm+0x1a/0x30
[   16.686415]  </TASK>
[   16.686429] 
[   16.698625] Allocated by task 282:
[   16.698791]  kasan_save_stack+0x45/0x70
[   16.699164]  kasan_save_track+0x18/0x40
[   16.699541]  kasan_save_alloc_info+0x3b/0x50
[   16.699996]  __kasan_kmalloc+0xb7/0xc0
[   16.700380]  __kmalloc_cache_noprof+0x189/0x420
[   16.700853]  kasan_atomics+0x95/0x310
[   16.701246]  kunit_try_run_case+0x1a5/0x480
[   16.701681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.702275]  kthread+0x337/0x6f0
[   16.702689]  ret_from_fork+0x116/0x1d0
[   16.703180]  ret_from_fork_asm+0x1a/0x30
[   16.703655] 
[   16.703827] The buggy address belongs to the object at ffff8881031d0c00
[   16.703827]  which belongs to the cache kmalloc-64 of size 64
[   16.704933] The buggy address is located 0 bytes to the right of
[   16.704933]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   16.705439] 
[   16.705550] The buggy address belongs to the physical page:
[   16.705776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   16.706187] flags: 0x200000000000000(node=0|zone=2)
[   16.706433] page_type: f5(slab)
[   16.706596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.706910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.707260] page dumped because: kasan: bad access detected
[   16.707542] 
[   16.707631] Memory state around the buggy address:
[   16.707928]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.708196]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.708558] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.708931]                                      ^
[   16.709160]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.709480]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.709741] ==================================================================
[   17.180601] ==================================================================
[   17.180945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   17.181286] Write of size 8 at addr ffff8881031d0c30 by task kunit_try_catch/282
[   17.181613] 
[   17.181718] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.181771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.181785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.181807] Call Trace:
[   17.181824]  <TASK>
[   17.181842]  dump_stack_lvl+0x73/0xb0
[   17.181870]  print_report+0xd1/0x650
[   17.181893]  ? __virt_addr_valid+0x1db/0x2d0
[   17.181916]  ? kasan_atomics_helper+0x164f/0x5450
[   17.181939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.181965]  ? kasan_atomics_helper+0x164f/0x5450
[   17.181988]  kasan_report+0x141/0x180
[   17.182011]  ? kasan_atomics_helper+0x164f/0x5450
[   17.182039]  kasan_check_range+0x10c/0x1c0
[   17.182077]  __kasan_check_write+0x18/0x20
[   17.182098]  kasan_atomics_helper+0x164f/0x5450
[   17.182122]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.182146]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.182172]  ? kasan_atomics+0x152/0x310
[   17.182200]  kasan_atomics+0x1dc/0x310
[   17.182224]  ? __pfx_kasan_atomics+0x10/0x10
[   17.182249]  ? __pfx_read_tsc+0x10/0x10
[   17.182272]  ? ktime_get_ts64+0x86/0x230
[   17.182297]  kunit_try_run_case+0x1a5/0x480
[   17.182323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.182346]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.182370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.182394]  ? __kthread_parkme+0x82/0x180
[   17.182416]  ? preempt_count_sub+0x50/0x80
[   17.182442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.182467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.182492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.182515]  kthread+0x337/0x6f0
[   17.182535]  ? trace_preempt_on+0x20/0xc0
[   17.182560]  ? __pfx_kthread+0x10/0x10
[   17.182582]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.182604]  ? calculate_sigpending+0x7b/0xa0
[   17.182630]  ? __pfx_kthread+0x10/0x10
[   17.182654]  ret_from_fork+0x116/0x1d0
[   17.182674]  ? __pfx_kthread+0x10/0x10
[   17.182696]  ret_from_fork_asm+0x1a/0x30
[   17.182730]  </TASK>
[   17.182742] 
[   17.195687] Allocated by task 282:
[   17.196067]  kasan_save_stack+0x45/0x70
[   17.196448]  kasan_save_track+0x18/0x40
[   17.196868]  kasan_save_alloc_info+0x3b/0x50
[   17.197129]  __kasan_kmalloc+0xb7/0xc0
[   17.197276]  __kmalloc_cache_noprof+0x189/0x420
[   17.197445]  kasan_atomics+0x95/0x310
[   17.197595]  kunit_try_run_case+0x1a5/0x480
[   17.197792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.198290]  kthread+0x337/0x6f0
[   17.198619]  ret_from_fork+0x116/0x1d0
[   17.199032]  ret_from_fork_asm+0x1a/0x30
[   17.199440] 
[   17.199610] The buggy address belongs to the object at ffff8881031d0c00
[   17.199610]  which belongs to the cache kmalloc-64 of size 64
[   17.200975] The buggy address is located 0 bytes to the right of
[   17.200975]  allocated 48-byte region [ffff8881031d0c00, ffff8881031d0c30)
[   17.202167] 
[   17.202251] The buggy address belongs to the physical page:
[   17.202438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031d0
[   17.202697] flags: 0x200000000000000(node=0|zone=2)
[   17.203290] page_type: f5(slab)
[   17.203598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.204404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.205141] page dumped because: kasan: bad access detected
[   17.205656] 
[   17.205821] Memory state around the buggy address:
[   17.206175]  ffff8881031d0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.206406]  ffff8881031d0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.206634] >ffff8881031d0c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.207144]                                      ^
[   17.207590]  ffff8881031d0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.208296]  ffff8881031d0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.208927] ==================================================================

[   56.916940] ==================================================================
[   56.924180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   56.931485] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   56.938887] 
[   56.940417] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   56.940425] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   56.940428] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   56.940432] Call Trace:
[   56.940433]  <TASK>
[   56.940435]  dump_stack_lvl+0x73/0xb0
[   56.940440]  print_report+0xd1/0x650
[   56.940444]  ? __virt_addr_valid+0x1db/0x2d0
[   56.940448]  ? kasan_atomics_helper+0xac7/0x5450
[   56.940452]  ? kasan_complete_mode_report_info+0x2a/0x200
[   56.940457]  ? kasan_atomics_helper+0xac7/0x5450
[   56.940461]  kasan_report+0x141/0x180
[   56.940466]  ? kasan_atomics_helper+0xac7/0x5450
[   56.940470]  kasan_check_range+0x10c/0x1c0
[   56.940475]  __kasan_check_write+0x18/0x20
[   56.940479]  kasan_atomics_helper+0xac7/0x5450
[   56.940483]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   56.940487]  ? __kmalloc_cache_noprof+0x189/0x420
[   56.940492]  ? kasan_atomics+0x152/0x310
[   56.940497]  kasan_atomics+0x1dc/0x310
[   56.940501]  ? __pfx_kasan_atomics+0x10/0x10
[   56.940506]  ? ktime_get_ts64+0x83/0x230
[   56.940511]  kunit_try_run_case+0x1a2/0x480
[   56.940515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.940520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   56.940524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   56.940528]  ? __kthread_parkme+0x82/0x180
[   56.940532]  ? preempt_count_sub+0x50/0x80
[   56.940537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.940541]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.940545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   56.940550]  kthread+0x334/0x6f0
[   56.940553]  ? trace_preempt_on+0x20/0xc0
[   56.940558]  ? __pfx_kthread+0x10/0x10
[   56.940562]  ? _raw_spin_unlock_irq+0x47/0x80
[   56.940566]  ? calculate_sigpending+0x7b/0xa0
[   56.940570]  ? __pfx_kthread+0x10/0x10
[   56.940574]  ret_from_fork+0x113/0x1d0
[   56.940578]  ? __pfx_kthread+0x10/0x10
[   56.940582]  ret_from_fork_asm+0x1a/0x30
[   56.940588]  </TASK>
[   56.940589] 
[   57.123288] Allocated by task 306:
[   57.126692]  kasan_save_stack+0x45/0x70
[   57.130531]  kasan_save_track+0x18/0x40
[   57.134413]  kasan_save_alloc_info+0x3b/0x50
[   57.138686]  __kasan_kmalloc+0xb7/0xc0
[   57.142439]  __kmalloc_cache_noprof+0x189/0x420
[   57.146972]  kasan_atomics+0x95/0x310
[   57.150637]  kunit_try_run_case+0x1a2/0x480
[   57.154824]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.160223]  kthread+0x334/0x6f0
[   57.163457]  ret_from_fork+0x113/0x1d0
[   57.167208]  ret_from_fork_asm+0x1a/0x30
[   57.171135] 
[   57.172635] The buggy address belongs to the object at ffff8881066eaf00
[   57.172635]  which belongs to the cache kmalloc-64 of size 64
[   57.184975] The buggy address is located 0 bytes to the right of
[   57.184975]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   57.197837] 
[   57.199361] The buggy address belongs to the physical page:
[   57.204978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   57.212986] flags: 0x200000000000000(node=0|zone=2)
[   57.217865] page_type: f5(slab)
[   57.221011] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   57.228751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.236490] page dumped because: kasan: bad access detected
[   57.242061] 
[   57.243562] Memory state around the buggy address:
[   57.248376]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.255627]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   57.262854] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.270082]                                      ^
[   57.274875]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.282094]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.289312] ==================================================================
[   62.219675] ==================================================================
[   62.226925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   62.234318] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   62.241744] 
[   62.243243] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   62.243251] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   62.243254] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   62.243257] Call Trace:
[   62.243259]  <TASK>
[   62.243261]  dump_stack_lvl+0x73/0xb0
[   62.243265]  print_report+0xd1/0x650
[   62.243269]  ? __virt_addr_valid+0x1db/0x2d0
[   62.243273]  ? kasan_atomics_helper+0x1217/0x5450
[   62.243277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   62.243283]  ? kasan_atomics_helper+0x1217/0x5450
[   62.243287]  kasan_report+0x141/0x180
[   62.243291]  ? kasan_atomics_helper+0x1217/0x5450
[   62.243296]  kasan_check_range+0x10c/0x1c0
[   62.243300]  __kasan_check_write+0x18/0x20
[   62.243304]  kasan_atomics_helper+0x1217/0x5450
[   62.243308]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   62.243312]  ? __kmalloc_cache_noprof+0x189/0x420
[   62.243317]  ? kasan_atomics+0x152/0x310
[   62.243322]  kasan_atomics+0x1dc/0x310
[   62.243346]  ? __pfx_kasan_atomics+0x10/0x10
[   62.243352]  ? ktime_get_ts64+0x83/0x230
[   62.243356]  kunit_try_run_case+0x1a2/0x480
[   62.243361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.243379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   62.243383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   62.243388]  ? __kthread_parkme+0x82/0x180
[   62.243392]  ? preempt_count_sub+0x50/0x80
[   62.243396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.243413]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.243418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   62.243422]  kthread+0x334/0x6f0
[   62.243426]  ? trace_preempt_on+0x20/0xc0
[   62.243430]  ? __pfx_kthread+0x10/0x10
[   62.243434]  ? _raw_spin_unlock_irq+0x47/0x80
[   62.243438]  ? calculate_sigpending+0x7b/0xa0
[   62.243443]  ? __pfx_kthread+0x10/0x10
[   62.243447]  ret_from_fork+0x113/0x1d0
[   62.243450]  ? __pfx_kthread+0x10/0x10
[   62.243454]  ret_from_fork_asm+0x1a/0x30
[   62.243460]  </TASK>
[   62.243462] 
[   62.426775] Allocated by task 306:
[   62.430183]  kasan_save_stack+0x45/0x70
[   62.434022]  kasan_save_track+0x18/0x40
[   62.437861]  kasan_save_alloc_info+0x3b/0x50
[   62.442133]  __kasan_kmalloc+0xb7/0xc0
[   62.445885]  __kmalloc_cache_noprof+0x189/0x420
[   62.450421]  kasan_atomics+0x95/0x310
[   62.454094]  kunit_try_run_case+0x1a2/0x480
[   62.458278]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.463680]  kthread+0x334/0x6f0
[   62.466911]  ret_from_fork+0x113/0x1d0
[   62.470663]  ret_from_fork_asm+0x1a/0x30
[   62.474589] 
[   62.476089] The buggy address belongs to the object at ffff8881066eaf00
[   62.476089]  which belongs to the cache kmalloc-64 of size 64
[   62.488433] The buggy address is located 0 bytes to the right of
[   62.488433]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   62.501302] 
[   62.502800] The buggy address belongs to the physical page:
[   62.508394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   62.516417] flags: 0x200000000000000(node=0|zone=2)
[   62.521305] page_type: f5(slab)
[   62.524449] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.532188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.539927] page dumped because: kasan: bad access detected
[   62.545500] 
[   62.547001] Memory state around the buggy address:
[   62.551793]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.559013]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   62.566233] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.573458]                                      ^
[   62.578252]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.585470]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.592691] ==================================================================
[   54.259925] ==================================================================
[   54.267172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   54.274478] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   54.281872] 
[   54.283395] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   54.283415] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   54.283418] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   54.283422] Call Trace:
[   54.283424]  <TASK>
[   54.283425]  dump_stack_lvl+0x73/0xb0
[   54.283430]  print_report+0xd1/0x650
[   54.283434]  ? __virt_addr_valid+0x1db/0x2d0
[   54.283439]  ? kasan_atomics_helper+0x697/0x5450
[   54.283442]  ? kasan_complete_mode_report_info+0x2a/0x200
[   54.283448]  ? kasan_atomics_helper+0x697/0x5450
[   54.283452]  kasan_report+0x141/0x180
[   54.283456]  ? kasan_atomics_helper+0x697/0x5450
[   54.283461]  kasan_check_range+0x10c/0x1c0
[   54.283466]  __kasan_check_write+0x18/0x20
[   54.283469]  kasan_atomics_helper+0x697/0x5450
[   54.283473]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   54.283477]  ? __kmalloc_cache_noprof+0x189/0x420
[   54.283482]  ? kasan_atomics+0x152/0x310
[   54.283488]  kasan_atomics+0x1dc/0x310
[   54.283492]  ? __pfx_kasan_atomics+0x10/0x10
[   54.283497]  ? ktime_get_ts64+0x83/0x230
[   54.283501]  kunit_try_run_case+0x1a2/0x480
[   54.283506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.283510]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   54.283515]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   54.283519]  ? __kthread_parkme+0x82/0x180
[   54.283523]  ? preempt_count_sub+0x50/0x80
[   54.283528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.283532]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.283537]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   54.283541]  kthread+0x334/0x6f0
[   54.283545]  ? trace_preempt_on+0x20/0xc0
[   54.283549]  ? __pfx_kthread+0x10/0x10
[   54.283553]  ? _raw_spin_unlock_irq+0x47/0x80
[   54.283557]  ? calculate_sigpending+0x7b/0xa0
[   54.283562]  ? __pfx_kthread+0x10/0x10
[   54.283566]  ret_from_fork+0x113/0x1d0
[   54.283569]  ? __pfx_kthread+0x10/0x10
[   54.283573]  ret_from_fork_asm+0x1a/0x30
[   54.283579]  </TASK>
[   54.283581] 
[   54.466281] Allocated by task 306:
[   54.469687]  kasan_save_stack+0x45/0x70
[   54.473525]  kasan_save_track+0x18/0x40
[   54.477364]  kasan_save_alloc_info+0x3b/0x50
[   54.481682]  __kasan_kmalloc+0xb7/0xc0
[   54.485432]  __kmalloc_cache_noprof+0x189/0x420
[   54.489966]  kasan_atomics+0x95/0x310
[   54.493632]  kunit_try_run_case+0x1a2/0x480
[   54.497819]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.503217]  kthread+0x334/0x6f0
[   54.506450]  ret_from_fork+0x113/0x1d0
[   54.510202]  ret_from_fork_asm+0x1a/0x30
[   54.514129] 
[   54.515629] The buggy address belongs to the object at ffff8881066eaf00
[   54.515629]  which belongs to the cache kmalloc-64 of size 64
[   54.527969] The buggy address is located 0 bytes to the right of
[   54.527969]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   54.540831] 
[   54.542348] The buggy address belongs to the physical page:
[   54.547927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   54.555928] flags: 0x200000000000000(node=0|zone=2)
[   54.560807] page_type: f5(slab)
[   54.563953] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   54.571694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.579441] page dumped because: kasan: bad access detected
[   54.585012] 
[   54.586512] Memory state around the buggy address:
[   54.591307]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.598533]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   54.605754] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.612981]                                      ^
[   54.617774]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.624992]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.632213] ==================================================================
[   55.398520] ==================================================================
[   55.405760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   55.413067] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   55.420466] 
[   55.421966] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   55.421974] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   55.421977] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.421981] Call Trace:
[   55.421983]  <TASK>
[   55.421984]  dump_stack_lvl+0x73/0xb0
[   55.421989]  print_report+0xd1/0x650
[   55.421993]  ? __virt_addr_valid+0x1db/0x2d0
[   55.421997]  ? kasan_atomics_helper+0x860/0x5450
[   55.422001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.422006]  ? kasan_atomics_helper+0x860/0x5450
[   55.422010]  kasan_report+0x141/0x180
[   55.422015]  ? kasan_atomics_helper+0x860/0x5450
[   55.422019]  kasan_check_range+0x10c/0x1c0
[   55.422024]  __kasan_check_write+0x18/0x20
[   55.422028]  kasan_atomics_helper+0x860/0x5450
[   55.422032]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.422036]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.422041]  ? kasan_atomics+0x152/0x310
[   55.422046]  kasan_atomics+0x1dc/0x310
[   55.422051]  ? __pfx_kasan_atomics+0x10/0x10
[   55.422055]  ? ktime_get_ts64+0x83/0x230
[   55.422060]  kunit_try_run_case+0x1a2/0x480
[   55.422065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.422069]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.422073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.422078]  ? __kthread_parkme+0x82/0x180
[   55.422082]  ? preempt_count_sub+0x50/0x80
[   55.422086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.422091]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.422095]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.422100]  kthread+0x334/0x6f0
[   55.422103]  ? trace_preempt_on+0x20/0xc0
[   55.422108]  ? __pfx_kthread+0x10/0x10
[   55.422112]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.422115]  ? calculate_sigpending+0x7b/0xa0
[   55.422120]  ? __pfx_kthread+0x10/0x10
[   55.422124]  ret_from_fork+0x113/0x1d0
[   55.422128]  ? __pfx_kthread+0x10/0x10
[   55.422132]  ret_from_fork_asm+0x1a/0x30
[   55.422138]  </TASK>
[   55.422140] 
[   55.605068] Allocated by task 306:
[   55.608474]  kasan_save_stack+0x45/0x70
[   55.612310]  kasan_save_track+0x18/0x40
[   55.616151]  kasan_save_alloc_info+0x3b/0x50
[   55.620432]  __kasan_kmalloc+0xb7/0xc0
[   55.624184]  __kmalloc_cache_noprof+0x189/0x420
[   55.628716]  kasan_atomics+0x95/0x310
[   55.632415]  kunit_try_run_case+0x1a2/0x480
[   55.636604]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.642004]  kthread+0x334/0x6f0
[   55.645235]  ret_from_fork+0x113/0x1d0
[   55.648989]  ret_from_fork_asm+0x1a/0x30
[   55.652915] 
[   55.654424] The buggy address belongs to the object at ffff8881066eaf00
[   55.654424]  which belongs to the cache kmalloc-64 of size 64
[   55.666764] The buggy address is located 0 bytes to the right of
[   55.666764]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   55.679625] 
[   55.681126] The buggy address belongs to the physical page:
[   55.686696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   55.694697] flags: 0x200000000000000(node=0|zone=2)
[   55.699575] page_type: f5(slab)
[   55.702723] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   55.710471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.718218] page dumped because: kasan: bad access detected
[   55.723789] 
[   55.725290] Memory state around the buggy address:
[   55.730084]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.737312]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   55.744538] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.751759]                                      ^
[   55.756550]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.763769]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.770988] ==================================================================
[   61.463200] ==================================================================
[   61.470442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   61.477841] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   61.485233] 
[   61.486735] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   61.486743] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   61.486746] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.486749] Call Trace:
[   61.486751]  <TASK>
[   61.486753]  dump_stack_lvl+0x73/0xb0
[   61.486757]  print_report+0xd1/0x650
[   61.486761]  ? __virt_addr_valid+0x1db/0x2d0
[   61.486766]  ? kasan_atomics_helper+0x1148/0x5450
[   61.486770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.486775]  ? kasan_atomics_helper+0x1148/0x5450
[   61.486779]  kasan_report+0x141/0x180
[   61.486783]  ? kasan_atomics_helper+0x1148/0x5450
[   61.486788]  kasan_check_range+0x10c/0x1c0
[   61.486793]  __kasan_check_write+0x18/0x20
[   61.486796]  kasan_atomics_helper+0x1148/0x5450
[   61.486800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.486804]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.486809]  ? kasan_atomics+0x152/0x310
[   61.486815]  kasan_atomics+0x1dc/0x310
[   61.486819]  ? __pfx_kasan_atomics+0x10/0x10
[   61.486824]  ? ktime_get_ts64+0x83/0x230
[   61.486828]  kunit_try_run_case+0x1a2/0x480
[   61.486833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.486837]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.486842]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.486846]  ? __kthread_parkme+0x82/0x180
[   61.486850]  ? preempt_count_sub+0x50/0x80
[   61.486854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.486859]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.486863]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.486868]  kthread+0x334/0x6f0
[   61.486871]  ? trace_preempt_on+0x20/0xc0
[   61.486876]  ? __pfx_kthread+0x10/0x10
[   61.486880]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.486884]  ? calculate_sigpending+0x7b/0xa0
[   61.486888]  ? __pfx_kthread+0x10/0x10
[   61.486892]  ret_from_fork+0x113/0x1d0
[   61.486896]  ? __pfx_kthread+0x10/0x10
[   61.486900]  ret_from_fork_asm+0x1a/0x30
[   61.486906]  </TASK>
[   61.486908] 
[   61.670033] Allocated by task 306:
[   61.673440]  kasan_save_stack+0x45/0x70
[   61.677277]  kasan_save_track+0x18/0x40
[   61.681116]  kasan_save_alloc_info+0x3b/0x50
[   61.685426]  __kasan_kmalloc+0xb7/0xc0
[   61.689185]  __kmalloc_cache_noprof+0x189/0x420
[   61.693719]  kasan_atomics+0x95/0x310
[   61.697427]  kunit_try_run_case+0x1a2/0x480
[   61.701614]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.707012]  kthread+0x334/0x6f0
[   61.710247]  ret_from_fork+0x113/0x1d0
[   61.713998]  ret_from_fork_asm+0x1a/0x30
[   61.717925] 
[   61.719427] The buggy address belongs to the object at ffff8881066eaf00
[   61.719427]  which belongs to the cache kmalloc-64 of size 64
[   61.731766] The buggy address is located 0 bytes to the right of
[   61.731766]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   61.744626] 
[   61.746126] The buggy address belongs to the physical page:
[   61.751700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   61.759706] flags: 0x200000000000000(node=0|zone=2)
[   61.764584] page_type: f5(slab)
[   61.767733] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.775472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.783220] page dumped because: kasan: bad access detected
[   61.788791] 
[   61.790292] Memory state around the buggy address:
[   61.795084]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.802303]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   61.809522] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.816742]                                      ^
[   61.821533]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.828754]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.835972] ==================================================================
[   74.396209] ==================================================================
[   74.403449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   74.410841] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   74.418242] 
[   74.419743] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   74.419751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   74.419754] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.419757] Call Trace:
[   74.419759]  <TASK>
[   74.419761]  dump_stack_lvl+0x73/0xb0
[   74.419765]  print_report+0xd1/0x650
[   74.419769]  ? __virt_addr_valid+0x1db/0x2d0
[   74.419774]  ? kasan_atomics_helper+0x218a/0x5450
[   74.419777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.419783]  ? kasan_atomics_helper+0x218a/0x5450
[   74.419787]  kasan_report+0x141/0x180
[   74.419791]  ? kasan_atomics_helper+0x218a/0x5450
[   74.419796]  kasan_check_range+0x10c/0x1c0
[   74.419801]  __kasan_check_write+0x18/0x20
[   74.419804]  kasan_atomics_helper+0x218a/0x5450
[   74.419809]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.419813]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.419818]  ? kasan_atomics+0x152/0x310
[   74.419823]  kasan_atomics+0x1dc/0x310
[   74.419827]  ? __pfx_kasan_atomics+0x10/0x10
[   74.419832]  ? ktime_get_ts64+0x83/0x230
[   74.419837]  kunit_try_run_case+0x1a2/0x480
[   74.419841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.419846]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.419850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.419855]  ? __kthread_parkme+0x82/0x180
[   74.419858]  ? preempt_count_sub+0x50/0x80
[   74.419863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.419867]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.419872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.419876]  kthread+0x334/0x6f0
[   74.419880]  ? trace_preempt_on+0x20/0xc0
[   74.419884]  ? __pfx_kthread+0x10/0x10
[   74.419888]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.419892]  ? calculate_sigpending+0x7b/0xa0
[   74.419896]  ? __pfx_kthread+0x10/0x10
[   74.419901]  ret_from_fork+0x113/0x1d0
[   74.419904]  ? __pfx_kthread+0x10/0x10
[   74.419908]  ret_from_fork_asm+0x1a/0x30
[   74.419914]  </TASK>
[   74.419916] 
[   74.603059] Allocated by task 306:
[   74.606465]  kasan_save_stack+0x45/0x70
[   74.610303]  kasan_save_track+0x18/0x40
[   74.614142]  kasan_save_alloc_info+0x3b/0x50
[   74.618418]  __kasan_kmalloc+0xb7/0xc0
[   74.622178]  __kmalloc_cache_noprof+0x189/0x420
[   74.626718]  kasan_atomics+0x95/0x310
[   74.630416]  kunit_try_run_case+0x1a2/0x480
[   74.634604]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.640004]  kthread+0x334/0x6f0
[   74.643236]  ret_from_fork+0x113/0x1d0
[   74.646989]  ret_from_fork_asm+0x1a/0x30
[   74.650915] 
[   74.652421] The buggy address belongs to the object at ffff8881066eaf00
[   74.652421]  which belongs to the cache kmalloc-64 of size 64
[   74.664756] The buggy address is located 0 bytes to the right of
[   74.664756]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   74.677617] 
[   74.679117] The buggy address belongs to the physical page:
[   74.684689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   74.692689] flags: 0x200000000000000(node=0|zone=2)
[   74.697569] page_type: f5(slab)
[   74.700713] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   74.708453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.716194] page dumped because: kasan: bad access detected
[   74.721765] 
[   74.723263] Memory state around the buggy address:
[   74.728058]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.735287]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   74.742513] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.749732]                                      ^
[   74.754524]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.761745]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.768962] ==================================================================
[   53.124206] ==================================================================
[   53.131446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   53.138840] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   53.146239] 
[   53.147740] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   53.147748] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   53.147751] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.147755] Call Trace:
[   53.147756]  <TASK>
[   53.147758]  dump_stack_lvl+0x73/0xb0
[   53.147763]  print_report+0xd1/0x650
[   53.147767]  ? __virt_addr_valid+0x1db/0x2d0
[   53.147771]  ? kasan_atomics_helper+0x4b3a/0x5450
[   53.147775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.147781]  ? kasan_atomics_helper+0x4b3a/0x5450
[   53.147785]  kasan_report+0x141/0x180
[   53.147789]  ? kasan_atomics_helper+0x4b3a/0x5450
[   53.147794]  __asan_report_store4_noabort+0x1b/0x30
[   53.147799]  kasan_atomics_helper+0x4b3a/0x5450
[   53.147803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.147807]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.147813]  ? kasan_atomics+0x152/0x310
[   53.147818]  kasan_atomics+0x1dc/0x310
[   53.147822]  ? __pfx_kasan_atomics+0x10/0x10
[   53.147827]  ? ktime_get_ts64+0x83/0x230
[   53.147832]  kunit_try_run_case+0x1a2/0x480
[   53.147836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.147841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.147845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.147849]  ? __kthread_parkme+0x82/0x180
[   53.147853]  ? preempt_count_sub+0x50/0x80
[   53.147858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.147862]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.147866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.147871]  kthread+0x334/0x6f0
[   53.147875]  ? trace_preempt_on+0x20/0xc0
[   53.147879]  ? __pfx_kthread+0x10/0x10
[   53.147883]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.147887]  ? calculate_sigpending+0x7b/0xa0
[   53.147891]  ? __pfx_kthread+0x10/0x10
[   53.147896]  ret_from_fork+0x113/0x1d0
[   53.147899]  ? __pfx_kthread+0x10/0x10
[   53.147903]  ret_from_fork_asm+0x1a/0x30
[   53.147909]  </TASK>
[   53.147911] 
[   53.327764] Allocated by task 306:
[   53.331169]  kasan_save_stack+0x45/0x70
[   53.335008]  kasan_save_track+0x18/0x40
[   53.338847]  kasan_save_alloc_info+0x3b/0x50
[   53.343121]  __kasan_kmalloc+0xb7/0xc0
[   53.346883]  __kmalloc_cache_noprof+0x189/0x420
[   53.351428]  kasan_atomics+0x95/0x310
[   53.355096]  kunit_try_run_case+0x1a2/0x480
[   53.359282]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.364684]  kthread+0x334/0x6f0
[   53.367925]  ret_from_fork+0x113/0x1d0
[   53.371677]  ret_from_fork_asm+0x1a/0x30
[   53.375602] 
[   53.377103] The buggy address belongs to the object at ffff8881066eaf00
[   53.377103]  which belongs to the cache kmalloc-64 of size 64
[   53.389443] The buggy address is located 0 bytes to the right of
[   53.389443]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   53.402305] 
[   53.403805] The buggy address belongs to the physical page:
[   53.409422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   53.417427] flags: 0x200000000000000(node=0|zone=2)
[   53.422309] page_type: f5(slab)
[   53.425453] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.433195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.440940] page dumped because: kasan: bad access detected
[   53.446511] 
[   53.448011] Memory state around the buggy address:
[   53.452806]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.460033]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   53.467253] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.474470]                                      ^
[   53.479264]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.486485]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.493710] ==================================================================
[   52.367913] ==================================================================
[   52.375155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   52.382555] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   52.389869] 
[   52.391393] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   52.391414] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   52.391417] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.391420] Call Trace:
[   52.391422]  <TASK>
[   52.391424]  dump_stack_lvl+0x73/0xb0
[   52.391428]  print_report+0xd1/0x650
[   52.391432]  ? __virt_addr_valid+0x1db/0x2d0
[   52.391437]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.391441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.391446]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.391450]  kasan_report+0x141/0x180
[   52.391454]  ? kasan_atomics_helper+0x4b54/0x5450
[   52.391459]  __asan_report_load4_noabort+0x18/0x20
[   52.391464]  kasan_atomics_helper+0x4b54/0x5450
[   52.391468]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.391472]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.391477]  ? kasan_atomics+0x152/0x310
[   52.391482]  kasan_atomics+0x1dc/0x310
[   52.391487]  ? __pfx_kasan_atomics+0x10/0x10
[   52.391492]  ? ktime_get_ts64+0x83/0x230
[   52.391496]  kunit_try_run_case+0x1a2/0x480
[   52.391501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.391505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.391510]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.391514]  ? __kthread_parkme+0x82/0x180
[   52.391518]  ? preempt_count_sub+0x50/0x80
[   52.391522]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.391527]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.391531]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.391536]  kthread+0x334/0x6f0
[   52.391539]  ? trace_preempt_on+0x20/0xc0
[   52.391544]  ? __pfx_kthread+0x10/0x10
[   52.391547]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.391551]  ? calculate_sigpending+0x7b/0xa0
[   52.391556]  ? __pfx_kthread+0x10/0x10
[   52.391560]  ret_from_fork+0x113/0x1d0
[   52.391564]  ? __pfx_kthread+0x10/0x10
[   52.391568]  ret_from_fork_asm+0x1a/0x30
[   52.391574]  </TASK>
[   52.391575] 
[   52.571279] Allocated by task 306:
[   52.574686]  kasan_save_stack+0x45/0x70
[   52.578533]  kasan_save_track+0x18/0x40
[   52.582413]  kasan_save_alloc_info+0x3b/0x50
[   52.586687]  __kasan_kmalloc+0xb7/0xc0
[   52.590441]  __kmalloc_cache_noprof+0x189/0x420
[   52.594983]  kasan_atomics+0x95/0x310
[   52.598657]  kunit_try_run_case+0x1a2/0x480
[   52.602844]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.608241]  kthread+0x334/0x6f0
[   52.611475]  ret_from_fork+0x113/0x1d0
[   52.615228]  ret_from_fork_asm+0x1a/0x30
[   52.619161] 
[   52.620660] The buggy address belongs to the object at ffff8881066eaf00
[   52.620660]  which belongs to the cache kmalloc-64 of size 64
[   52.633003] The buggy address is located 0 bytes to the right of
[   52.633003]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   52.645863] 
[   52.647362] The buggy address belongs to the physical page:
[   52.652954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   52.660960] flags: 0x200000000000000(node=0|zone=2)
[   52.665840] page_type: f5(slab)
[   52.668989] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   52.676734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.684473] page dumped because: kasan: bad access detected
[   52.690047] 
[   52.691546] Memory state around the buggy address:
[   52.696364]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.703629]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   52.710855] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.718075]                                      ^
[   52.722868]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.730096]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.737313] ==================================================================
[   67.906181] ==================================================================
[   67.913427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   67.920820] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   67.928214] 
[   67.929713] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   67.929721] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   67.929724] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.929727] Call Trace:
[   67.929729]  <TASK>
[   67.929731]  dump_stack_lvl+0x73/0xb0
[   67.929735]  print_report+0xd1/0x650
[   67.929739]  ? __virt_addr_valid+0x1db/0x2d0
[   67.929743]  ? kasan_atomics_helper+0x194a/0x5450
[   67.929747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.929753]  ? kasan_atomics_helper+0x194a/0x5450
[   67.929757]  kasan_report+0x141/0x180
[   67.929761]  ? kasan_atomics_helper+0x194a/0x5450
[   67.929766]  kasan_check_range+0x10c/0x1c0
[   67.929770]  __kasan_check_write+0x18/0x20
[   67.929774]  kasan_atomics_helper+0x194a/0x5450
[   67.929778]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.929782]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.929787]  ? kasan_atomics+0x152/0x310
[   67.929792]  kasan_atomics+0x1dc/0x310
[   67.929797]  ? __pfx_kasan_atomics+0x10/0x10
[   67.929802]  ? ktime_get_ts64+0x83/0x230
[   67.929806]  kunit_try_run_case+0x1a2/0x480
[   67.929811]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.929815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.929820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.929824]  ? __kthread_parkme+0x82/0x180
[   67.929828]  ? preempt_count_sub+0x50/0x80
[   67.929832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.929837]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.929841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.929845]  kthread+0x334/0x6f0
[   67.929849]  ? trace_preempt_on+0x20/0xc0
[   67.929853]  ? __pfx_kthread+0x10/0x10
[   67.929857]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.929861]  ? calculate_sigpending+0x7b/0xa0
[   67.929866]  ? __pfx_kthread+0x10/0x10
[   67.929870]  ret_from_fork+0x113/0x1d0
[   67.929874]  ? __pfx_kthread+0x10/0x10
[   67.929878]  ret_from_fork_asm+0x1a/0x30
[   67.929883]  </TASK>
[   67.929885] 
[   68.113071] Allocated by task 306:
[   68.116479]  kasan_save_stack+0x45/0x70
[   68.120318]  kasan_save_track+0x18/0x40
[   68.124190]  kasan_save_alloc_info+0x3b/0x50
[   68.128463]  __kasan_kmalloc+0xb7/0xc0
[   68.132218]  __kmalloc_cache_noprof+0x189/0x420
[   68.136756]  kasan_atomics+0x95/0x310
[   68.140424]  kunit_try_run_case+0x1a2/0x480
[   68.144610]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.150018]  kthread+0x334/0x6f0
[   68.153252]  ret_from_fork+0x113/0x1d0
[   68.157002]  ret_from_fork_asm+0x1a/0x30
[   68.160929] 
[   68.162428] The buggy address belongs to the object at ffff8881066eaf00
[   68.162428]  which belongs to the cache kmalloc-64 of size 64
[   68.174769] The buggy address is located 0 bytes to the right of
[   68.174769]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   68.187632] 
[   68.189130] The buggy address belongs to the physical page:
[   68.194703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   68.202710] flags: 0x200000000000000(node=0|zone=2)
[   68.207591] page_type: f5(slab)
[   68.210739] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.218485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.226232] page dumped because: kasan: bad access detected
[   68.231805] 
[   68.233303] Memory state around the buggy address:
[   68.238098]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.245345]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   68.252571] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.259797]                                      ^
[   68.264592]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.271819]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   68.279037] ==================================================================
[   69.426325] ==================================================================
[   69.433571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   69.440965] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   69.448379] 
[   69.449910] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   69.449917] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   69.449920] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.449924] Call Trace:
[   69.449925]  <TASK>
[   69.449927]  dump_stack_lvl+0x73/0xb0
[   69.449932]  print_report+0xd1/0x650
[   69.449936]  ? __virt_addr_valid+0x1db/0x2d0
[   69.449940]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.449944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.449949]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.449953]  kasan_report+0x141/0x180
[   69.449957]  ? kasan_atomics_helper+0x1c18/0x5450
[   69.449962]  kasan_check_range+0x10c/0x1c0
[   69.449967]  __kasan_check_write+0x18/0x20
[   69.449970]  kasan_atomics_helper+0x1c18/0x5450
[   69.449974]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.449979]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.449984]  ? kasan_atomics+0x152/0x310
[   69.449989]  kasan_atomics+0x1dc/0x310
[   69.449993]  ? __pfx_kasan_atomics+0x10/0x10
[   69.449998]  ? ktime_get_ts64+0x83/0x230
[   69.450002]  kunit_try_run_case+0x1a2/0x480
[   69.450007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.450011]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.450016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.450020]  ? __kthread_parkme+0x82/0x180
[   69.450024]  ? preempt_count_sub+0x50/0x80
[   69.450028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.450033]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.450037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.450042]  kthread+0x334/0x6f0
[   69.450045]  ? trace_preempt_on+0x20/0xc0
[   69.450050]  ? __pfx_kthread+0x10/0x10
[   69.450054]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.450058]  ? calculate_sigpending+0x7b/0xa0
[   69.450062]  ? __pfx_kthread+0x10/0x10
[   69.450066]  ret_from_fork+0x113/0x1d0
[   69.450070]  ? __pfx_kthread+0x10/0x10
[   69.450074]  ret_from_fork_asm+0x1a/0x30
[   69.450080]  </TASK>
[   69.450082] 
[   69.633154] Allocated by task 306:
[   69.636562]  kasan_save_stack+0x45/0x70
[   69.640420]  kasan_save_track+0x18/0x40
[   69.644265]  kasan_save_alloc_info+0x3b/0x50
[   69.648538]  __kasan_kmalloc+0xb7/0xc0
[   69.652290]  __kmalloc_cache_noprof+0x189/0x420
[   69.656824]  kasan_atomics+0x95/0x310
[   69.660489]  kunit_try_run_case+0x1a2/0x480
[   69.664675]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.670076]  kthread+0x334/0x6f0
[   69.673316]  ret_from_fork+0x113/0x1d0
[   69.677104]  ret_from_fork_asm+0x1a/0x30
[   69.681038] 
[   69.682538] The buggy address belongs to the object at ffff8881066eaf00
[   69.682538]  which belongs to the cache kmalloc-64 of size 64
[   69.694880] The buggy address is located 0 bytes to the right of
[   69.694880]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   69.707741] 
[   69.709239] The buggy address belongs to the physical page:
[   69.714813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   69.722821] flags: 0x200000000000000(node=0|zone=2)
[   69.727698] page_type: f5(slab)
[   69.730847] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   69.738596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.746368] page dumped because: kasan: bad access detected
[   69.751983] 
[   69.753481] Memory state around the buggy address:
[   69.758275]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.765493]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   69.772714] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.779932]                                      ^
[   69.784725]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.791945]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   69.799165] ==================================================================
[   51.612021] ==================================================================
[   51.619267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   51.626659] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   51.634053] 
[   51.635552] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   51.635561] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   51.635563] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   51.635567] Call Trace:
[   51.635569]  <TASK>
[   51.635571]  dump_stack_lvl+0x73/0xb0
[   51.635575]  print_report+0xd1/0x650
[   51.635579]  ? __virt_addr_valid+0x1db/0x2d0
[   51.635583]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.635587]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.635593]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.635597]  kasan_report+0x141/0x180
[   51.635601]  ? kasan_atomics_helper+0x4b6e/0x5450
[   51.635606]  __asan_report_store4_noabort+0x1b/0x30
[   51.635611]  kasan_atomics_helper+0x4b6e/0x5450
[   51.635615]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   51.635619]  ? __kmalloc_cache_noprof+0x189/0x420
[   51.635624]  ? kasan_atomics+0x152/0x310
[   51.635629]  kasan_atomics+0x1dc/0x310
[   51.635634]  ? __pfx_kasan_atomics+0x10/0x10
[   51.635639]  ? ktime_get_ts64+0x83/0x230
[   51.635643]  kunit_try_run_case+0x1a2/0x480
[   51.635648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.635652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   51.635656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   51.635661]  ? __kthread_parkme+0x82/0x180
[   51.635665]  ? preempt_count_sub+0x50/0x80
[   51.635669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.635674]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.635678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.635682]  kthread+0x334/0x6f0
[   51.635686]  ? trace_preempt_on+0x20/0xc0
[   51.635690]  ? __pfx_kthread+0x10/0x10
[   51.635694]  ? _raw_spin_unlock_irq+0x47/0x80
[   51.635698]  ? calculate_sigpending+0x7b/0xa0
[   51.635703]  ? __pfx_kthread+0x10/0x10
[   51.635707]  ret_from_fork+0x113/0x1d0
[   51.635711]  ? __pfx_kthread+0x10/0x10
[   51.635715]  ret_from_fork_asm+0x1a/0x30
[   51.635720]  </TASK>
[   51.635722] 
[   51.815376] Allocated by task 306:
[   51.818789]  kasan_save_stack+0x45/0x70
[   51.822628]  kasan_save_track+0x18/0x40
[   51.826468]  kasan_save_alloc_info+0x3b/0x50
[   51.830742]  __kasan_kmalloc+0xb7/0xc0
[   51.834493]  __kmalloc_cache_noprof+0x189/0x420
[   51.839026]  kasan_atomics+0x95/0x310
[   51.842693]  kunit_try_run_case+0x1a2/0x480
[   51.846887]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.852288]  kthread+0x334/0x6f0
[   51.855520]  ret_from_fork+0x113/0x1d0
[   51.859273]  ret_from_fork_asm+0x1a/0x30
[   51.863197] 
[   51.864698] The buggy address belongs to the object at ffff8881066eaf00
[   51.864698]  which belongs to the cache kmalloc-64 of size 64
[   51.877039] The buggy address is located 0 bytes to the right of
[   51.877039]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   51.889899] 
[   51.891423] The buggy address belongs to the physical page:
[   51.896998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   51.905007] flags: 0x200000000000000(node=0|zone=2)
[   51.909884] page_type: f5(slab)
[   51.913032] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   51.920781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.928526] page dumped because: kasan: bad access detected
[   51.934100] 
[   51.935601] Memory state around the buggy address:
[   51.940417]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.947637]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   51.954856] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.962077]                                      ^
[   51.966869]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.974087]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.981307] ==================================================================
[   68.286280] ==================================================================
[   68.293512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   68.300902] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   68.308295] 
[   68.309798] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   68.309805] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   68.309808] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   68.309812] Call Trace:
[   68.309813]  <TASK>
[   68.309815]  dump_stack_lvl+0x73/0xb0
[   68.309820]  print_report+0xd1/0x650
[   68.309824]  ? __virt_addr_valid+0x1db/0x2d0
[   68.309828]  ? kasan_atomics_helper+0x19e3/0x5450
[   68.309832]  ? kasan_complete_mode_report_info+0x2a/0x200
[   68.309837]  ? kasan_atomics_helper+0x19e3/0x5450
[   68.309841]  kasan_report+0x141/0x180
[   68.309845]  ? kasan_atomics_helper+0x19e3/0x5450
[   68.309850]  kasan_check_range+0x10c/0x1c0
[   68.309855]  __kasan_check_write+0x18/0x20
[   68.309858]  kasan_atomics_helper+0x19e3/0x5450
[   68.309862]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   68.309866]  ? __kmalloc_cache_noprof+0x189/0x420
[   68.309871]  ? kasan_atomics+0x152/0x310
[   68.309876]  kasan_atomics+0x1dc/0x310
[   68.309881]  ? __pfx_kasan_atomics+0x10/0x10
[   68.309886]  ? ktime_get_ts64+0x83/0x230
[   68.309890]  kunit_try_run_case+0x1a2/0x480
[   68.309895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.309899]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   68.309904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   68.309908]  ? __kthread_parkme+0x82/0x180
[   68.309912]  ? preempt_count_sub+0x50/0x80
[   68.309916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.309921]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.309925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   68.309930]  kthread+0x334/0x6f0
[   68.309934]  ? trace_preempt_on+0x20/0xc0
[   68.309938]  ? __pfx_kthread+0x10/0x10
[   68.309942]  ? _raw_spin_unlock_irq+0x47/0x80
[   68.309946]  ? calculate_sigpending+0x7b/0xa0
[   68.309950]  ? __pfx_kthread+0x10/0x10
[   68.309955]  ret_from_fork+0x113/0x1d0
[   68.309958]  ? __pfx_kthread+0x10/0x10
[   68.309962]  ret_from_fork_asm+0x1a/0x30
[   68.309968]  </TASK>
[   68.309970] 
[   68.493078] Allocated by task 306:
[   68.496483]  kasan_save_stack+0x45/0x70
[   68.500323]  kasan_save_track+0x18/0x40
[   68.504213]  kasan_save_alloc_info+0x3b/0x50
[   68.508485]  __kasan_kmalloc+0xb7/0xc0
[   68.512239]  __kmalloc_cache_noprof+0x189/0x420
[   68.516773]  kasan_atomics+0x95/0x310
[   68.520446]  kunit_try_run_case+0x1a2/0x480
[   68.524632]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.530031]  kthread+0x334/0x6f0
[   68.533266]  ret_from_fork+0x113/0x1d0
[   68.537019]  ret_from_fork_asm+0x1a/0x30
[   68.540954] 
[   68.542453] The buggy address belongs to the object at ffff8881066eaf00
[   68.542453]  which belongs to the cache kmalloc-64 of size 64
[   68.554793] The buggy address is located 0 bytes to the right of
[   68.554793]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   68.567654] 
[   68.569155] The buggy address belongs to the physical page:
[   68.574725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   68.582725] flags: 0x200000000000000(node=0|zone=2)
[   68.587605] page_type: f5(slab)
[   68.590753] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.598498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.606237] page dumped because: kasan: bad access detected
[   68.611810] 
[   68.613310] Memory state around the buggy address:
[   68.618103]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   68.625321]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   68.632567] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   68.639786]                                      ^
[   68.644579]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   68.651799]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   68.659016] ==================================================================
[   64.489430] ==================================================================
[   64.496670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   64.504063] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   64.511457] 
[   64.512956] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   64.512964] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   64.512966] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.512970] Call Trace:
[   64.512971]  <TASK>
[   64.512973]  dump_stack_lvl+0x73/0xb0
[   64.512978]  print_report+0xd1/0x650
[   64.512982]  ? __virt_addr_valid+0x1db/0x2d0
[   64.512986]  ? kasan_atomics_helper+0x1467/0x5450
[   64.512990]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.512995]  ? kasan_atomics_helper+0x1467/0x5450
[   64.512999]  kasan_report+0x141/0x180
[   64.513004]  ? kasan_atomics_helper+0x1467/0x5450
[   64.513009]  kasan_check_range+0x10c/0x1c0
[   64.513013]  __kasan_check_write+0x18/0x20
[   64.513017]  kasan_atomics_helper+0x1467/0x5450
[   64.513021]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.513025]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.513030]  ? kasan_atomics+0x152/0x310
[   64.513035]  kasan_atomics+0x1dc/0x310
[   64.513040]  ? __pfx_kasan_atomics+0x10/0x10
[   64.513045]  ? ktime_get_ts64+0x83/0x230
[   64.513049]  kunit_try_run_case+0x1a2/0x480
[   64.513054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.513058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.513063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.513067]  ? __kthread_parkme+0x82/0x180
[   64.513071]  ? preempt_count_sub+0x50/0x80
[   64.513075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.513080]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.513084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.513089]  kthread+0x334/0x6f0
[   64.513092]  ? trace_preempt_on+0x20/0xc0
[   64.513097]  ? __pfx_kthread+0x10/0x10
[   64.513101]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.513104]  ? calculate_sigpending+0x7b/0xa0
[   64.513109]  ? __pfx_kthread+0x10/0x10
[   64.513113]  ret_from_fork+0x113/0x1d0
[   64.513117]  ? __pfx_kthread+0x10/0x10
[   64.513121]  ret_from_fork_asm+0x1a/0x30
[   64.513127]  </TASK>
[   64.513129] 
[   64.696149] Allocated by task 306:
[   64.699556]  kasan_save_stack+0x45/0x70
[   64.703394]  kasan_save_track+0x18/0x40
[   64.707253]  kasan_save_alloc_info+0x3b/0x50
[   64.711533]  __kasan_kmalloc+0xb7/0xc0
[   64.715288]  __kmalloc_cache_noprof+0x189/0x420
[   64.719829]  kasan_atomics+0x95/0x310
[   64.723501]  kunit_try_run_case+0x1a2/0x480
[   64.727687]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.733089]  kthread+0x334/0x6f0
[   64.736348]  ret_from_fork+0x113/0x1d0
[   64.740161]  ret_from_fork_asm+0x1a/0x30
[   64.744093] 
[   64.745594] The buggy address belongs to the object at ffff8881066eaf00
[   64.745594]  which belongs to the cache kmalloc-64 of size 64
[   64.757935] The buggy address is located 0 bytes to the right of
[   64.757935]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   64.770796] 
[   64.772294] The buggy address belongs to the physical page:
[   64.777868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   64.785867] flags: 0x200000000000000(node=0|zone=2)
[   64.790747] page_type: f5(slab)
[   64.793893] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.801643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.809422] page dumped because: kasan: bad access detected
[   64.814997] 
[   64.816494] Memory state around the buggy address:
[   64.821287]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.828508]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   64.835727] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.842946]                                      ^
[   64.847739]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.854959]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.862184] ==================================================================
[   57.676189] ==================================================================
[   57.683430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   57.690743] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   57.698134] 
[   57.699635] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   57.699643] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   57.699646] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   57.699649] Call Trace:
[   57.699651]  <TASK>
[   57.699653]  dump_stack_lvl+0x73/0xb0
[   57.699657]  print_report+0xd1/0x650
[   57.699662]  ? __virt_addr_valid+0x1db/0x2d0
[   57.699666]  ? kasan_atomics_helper+0xc70/0x5450
[   57.699669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   57.699675]  ? kasan_atomics_helper+0xc70/0x5450
[   57.699679]  kasan_report+0x141/0x180
[   57.699683]  ? kasan_atomics_helper+0xc70/0x5450
[   57.699688]  kasan_check_range+0x10c/0x1c0
[   57.699693]  __kasan_check_write+0x18/0x20
[   57.699696]  kasan_atomics_helper+0xc70/0x5450
[   57.699700]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   57.699704]  ? __kmalloc_cache_noprof+0x189/0x420
[   57.699709]  ? kasan_atomics+0x152/0x310
[   57.699715]  kasan_atomics+0x1dc/0x310
[   57.699719]  ? __pfx_kasan_atomics+0x10/0x10
[   57.699724]  ? ktime_get_ts64+0x83/0x230
[   57.699728]  kunit_try_run_case+0x1a2/0x480
[   57.699733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.699737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   57.699742]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   57.699746]  ? __kthread_parkme+0x82/0x180
[   57.699750]  ? preempt_count_sub+0x50/0x80
[   57.699754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.699759]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.699763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   57.699768]  kthread+0x334/0x6f0
[   57.699772]  ? trace_preempt_on+0x20/0xc0
[   57.699776]  ? __pfx_kthread+0x10/0x10
[   57.699780]  ? _raw_spin_unlock_irq+0x47/0x80
[   57.699784]  ? calculate_sigpending+0x7b/0xa0
[   57.699788]  ? __pfx_kthread+0x10/0x10
[   57.699793]  ret_from_fork+0x113/0x1d0
[   57.699796]  ? __pfx_kthread+0x10/0x10
[   57.699800]  ret_from_fork_asm+0x1a/0x30
[   57.699806]  </TASK>
[   57.699808] 
[   57.882526] Allocated by task 306:
[   57.885932]  kasan_save_stack+0x45/0x70
[   57.889772]  kasan_save_track+0x18/0x40
[   57.893610]  kasan_save_alloc_info+0x3b/0x50
[   57.897885]  __kasan_kmalloc+0xb7/0xc0
[   57.901643]  __kmalloc_cache_noprof+0x189/0x420
[   57.906178]  kasan_atomics+0x95/0x310
[   57.909850]  kunit_try_run_case+0x1a2/0x480
[   57.914037]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.919438]  kthread+0x334/0x6f0
[   57.922670]  ret_from_fork+0x113/0x1d0
[   57.926422]  ret_from_fork_asm+0x1a/0x30
[   57.930376] 
[   57.931908] The buggy address belongs to the object at ffff8881066eaf00
[   57.931908]  which belongs to the cache kmalloc-64 of size 64
[   57.944249] The buggy address is located 0 bytes to the right of
[   57.944249]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   57.957110] 
[   57.958611] The buggy address belongs to the physical page:
[   57.964182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   57.972183] flags: 0x200000000000000(node=0|zone=2)
[   57.977062] page_type: f5(slab)
[   57.980207] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   57.987949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.995696] page dumped because: kasan: bad access detected
[   58.001267] 
[   58.002768] Memory state around the buggy address:
[   58.007560]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.014778]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   58.021999] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.029217]                                      ^
[   58.034010]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.041229]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.048448] ==================================================================
[   54.639445] ==================================================================
[   54.646684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   54.653992] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   54.661422] 
[   54.662919] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   54.662927] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   54.662930] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   54.662933] Call Trace:
[   54.662935]  <TASK>
[   54.662937]  dump_stack_lvl+0x73/0xb0
[   54.662942]  print_report+0xd1/0x650
[   54.662946]  ? __virt_addr_valid+0x1db/0x2d0
[   54.662950]  ? kasan_atomics_helper+0x72f/0x5450
[   54.662954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   54.662959]  ? kasan_atomics_helper+0x72f/0x5450
[   54.662963]  kasan_report+0x141/0x180
[   54.662967]  ? kasan_atomics_helper+0x72f/0x5450
[   54.662972]  kasan_check_range+0x10c/0x1c0
[   54.662977]  __kasan_check_write+0x18/0x20
[   54.662980]  kasan_atomics_helper+0x72f/0x5450
[   54.662984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   54.662989]  ? __kmalloc_cache_noprof+0x189/0x420
[   54.662994]  ? kasan_atomics+0x152/0x310
[   54.662999]  kasan_atomics+0x1dc/0x310
[   54.663003]  ? __pfx_kasan_atomics+0x10/0x10
[   54.663008]  ? ktime_get_ts64+0x83/0x230
[   54.663013]  kunit_try_run_case+0x1a2/0x480
[   54.663017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.663022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   54.663026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   54.663031]  ? __kthread_parkme+0x82/0x180
[   54.663035]  ? preempt_count_sub+0x50/0x80
[   54.663039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   54.663044]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.663048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   54.663052]  kthread+0x334/0x6f0
[   54.663056]  ? trace_preempt_on+0x20/0xc0
[   54.663060]  ? __pfx_kthread+0x10/0x10
[   54.663064]  ? _raw_spin_unlock_irq+0x47/0x80
[   54.663068]  ? calculate_sigpending+0x7b/0xa0
[   54.663073]  ? __pfx_kthread+0x10/0x10
[   54.663077]  ret_from_fork+0x113/0x1d0
[   54.663081]  ? __pfx_kthread+0x10/0x10
[   54.663085]  ret_from_fork_asm+0x1a/0x30
[   54.663090]  </TASK>
[   54.663092] 
[   54.845782] Allocated by task 306:
[   54.849190]  kasan_save_stack+0x45/0x70
[   54.853030]  kasan_save_track+0x18/0x40
[   54.856876]  kasan_save_alloc_info+0x3b/0x50
[   54.861151]  __kasan_kmalloc+0xb7/0xc0
[   54.864901]  __kmalloc_cache_noprof+0x189/0x420
[   54.869434]  kasan_atomics+0x95/0x310
[   54.873100]  kunit_try_run_case+0x1a2/0x480
[   54.877286]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.882687]  kthread+0x334/0x6f0
[   54.885928]  ret_from_fork+0x113/0x1d0
[   54.889679]  ret_from_fork_asm+0x1a/0x30
[   54.893607] 
[   54.895105] The buggy address belongs to the object at ffff8881066eaf00
[   54.895105]  which belongs to the cache kmalloc-64 of size 64
[   54.907448] The buggy address is located 0 bytes to the right of
[   54.907448]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   54.920316] 
[   54.921842] The buggy address belongs to the physical page:
[   54.927430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   54.935432] flags: 0x200000000000000(node=0|zone=2)
[   54.940311] page_type: f5(slab)
[   54.943456] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   54.951198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.958943] page dumped because: kasan: bad access detected
[   54.964516] 
[   54.966014] Memory state around the buggy address:
[   54.970807]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.978026]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   54.985247] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.992467]                                      ^
[   54.997258]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.004480]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.011707] ==================================================================
[   58.811698] ==================================================================
[   58.818937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   58.826245] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   58.833645] 
[   58.835144] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   58.835152] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   58.835155] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.835158] Call Trace:
[   58.835160]  <TASK>
[   58.835162]  dump_stack_lvl+0x73/0xb0
[   58.835167]  print_report+0xd1/0x650
[   58.835171]  ? __virt_addr_valid+0x1db/0x2d0
[   58.835175]  ? kasan_atomics_helper+0xde0/0x5450
[   58.835179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.835184]  ? kasan_atomics_helper+0xde0/0x5450
[   58.835188]  kasan_report+0x141/0x180
[   58.835192]  ? kasan_atomics_helper+0xde0/0x5450
[   58.835197]  kasan_check_range+0x10c/0x1c0
[   58.835202]  __kasan_check_write+0x18/0x20
[   58.835205]  kasan_atomics_helper+0xde0/0x5450
[   58.835209]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.835213]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.835218]  ? kasan_atomics+0x152/0x310
[   58.835224]  kasan_atomics+0x1dc/0x310
[   58.835228]  ? __pfx_kasan_atomics+0x10/0x10
[   58.835233]  ? ktime_get_ts64+0x83/0x230
[   58.835237]  kunit_try_run_case+0x1a2/0x480
[   58.835242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.835246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.835251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.835255]  ? __kthread_parkme+0x82/0x180
[   58.835259]  ? preempt_count_sub+0x50/0x80
[   58.835263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.835268]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.835272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.835276]  kthread+0x334/0x6f0
[   58.835280]  ? trace_preempt_on+0x20/0xc0
[   58.835284]  ? __pfx_kthread+0x10/0x10
[   58.835288]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.835292]  ? calculate_sigpending+0x7b/0xa0
[   58.835297]  ? __pfx_kthread+0x10/0x10
[   58.835301]  ret_from_fork+0x113/0x1d0
[   58.835304]  ? __pfx_kthread+0x10/0x10
[   58.835308]  ret_from_fork_asm+0x1a/0x30
[   58.835314]  </TASK>
[   58.835316] 
[   59.018096] Allocated by task 306:
[   59.021504]  kasan_save_stack+0x45/0x70
[   59.025365]  kasan_save_track+0x18/0x40
[   59.029251]  kasan_save_alloc_info+0x3b/0x50
[   59.033522]  __kasan_kmalloc+0xb7/0xc0
[   59.037276]  __kmalloc_cache_noprof+0x189/0x420
[   59.041808]  kasan_atomics+0x95/0x310
[   59.045475]  kunit_try_run_case+0x1a2/0x480
[   59.049661]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.055060]  kthread+0x334/0x6f0
[   59.058291]  ret_from_fork+0x113/0x1d0
[   59.062046]  ret_from_fork_asm+0x1a/0x30
[   59.065972] 
[   59.067471] The buggy address belongs to the object at ffff8881066eaf00
[   59.067471]  which belongs to the cache kmalloc-64 of size 64
[   59.079812] The buggy address is located 0 bytes to the right of
[   59.079812]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   59.092673] 
[   59.094173] The buggy address belongs to the physical page:
[   59.099744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   59.107744] flags: 0x200000000000000(node=0|zone=2)
[   59.112624] page_type: f5(slab)
[   59.115772] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.123517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.131258] page dumped because: kasan: bad access detected
[   59.136828] 
[   59.138348] Memory state around the buggy address:
[   59.143193]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.150420]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   59.157646] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.164866]                                      ^
[   59.169659]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.176880]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.184107] ==================================================================
[   69.046385] ==================================================================
[   69.053652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   69.061045] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   69.068438] 
[   69.069937] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   69.069944] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   69.069947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.069951] Call Trace:
[   69.069952]  <TASK>
[   69.069954]  dump_stack_lvl+0x73/0xb0
[   69.069959]  print_report+0xd1/0x650
[   69.069963]  ? __virt_addr_valid+0x1db/0x2d0
[   69.069967]  ? kasan_atomics_helper+0x1b22/0x5450
[   69.069971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.069976]  ? kasan_atomics_helper+0x1b22/0x5450
[   69.069980]  kasan_report+0x141/0x180
[   69.069984]  ? kasan_atomics_helper+0x1b22/0x5450
[   69.069989]  kasan_check_range+0x10c/0x1c0
[   69.069994]  __kasan_check_write+0x18/0x20
[   69.069997]  kasan_atomics_helper+0x1b22/0x5450
[   69.070001]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.070005]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.070010]  ? kasan_atomics+0x152/0x310
[   69.070015]  kasan_atomics+0x1dc/0x310
[   69.070020]  ? __pfx_kasan_atomics+0x10/0x10
[   69.070025]  ? ktime_get_ts64+0x83/0x230
[   69.070029]  kunit_try_run_case+0x1a2/0x480
[   69.070034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.070038]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.070043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.070047]  ? __kthread_parkme+0x82/0x180
[   69.070051]  ? preempt_count_sub+0x50/0x80
[   69.070055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.070060]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.070064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.070069]  kthread+0x334/0x6f0
[   69.070072]  ? trace_preempt_on+0x20/0xc0
[   69.070077]  ? __pfx_kthread+0x10/0x10
[   69.070081]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.070085]  ? calculate_sigpending+0x7b/0xa0
[   69.070089]  ? __pfx_kthread+0x10/0x10
[   69.070093]  ret_from_fork+0x113/0x1d0
[   69.070097]  ? __pfx_kthread+0x10/0x10
[   69.070101]  ret_from_fork_asm+0x1a/0x30
[   69.070107]  </TASK>
[   69.070109] 
[   69.253108] Allocated by task 306:
[   69.256512]  kasan_save_stack+0x45/0x70
[   69.260376]  kasan_save_track+0x18/0x40
[   69.264253]  kasan_save_alloc_info+0x3b/0x50
[   69.268534]  __kasan_kmalloc+0xb7/0xc0
[   69.272286]  __kmalloc_cache_noprof+0x189/0x420
[   69.276826]  kasan_atomics+0x95/0x310
[   69.280493]  kunit_try_run_case+0x1a2/0x480
[   69.284677]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.290077]  kthread+0x334/0x6f0
[   69.293310]  ret_from_fork+0x113/0x1d0
[   69.297063]  ret_from_fork_asm+0x1a/0x30
[   69.300988] 
[   69.302489] The buggy address belongs to the object at ffff8881066eaf00
[   69.302489]  which belongs to the cache kmalloc-64 of size 64
[   69.314829] The buggy address is located 0 bytes to the right of
[   69.314829]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   69.327691] 
[   69.329190] The buggy address belongs to the physical page:
[   69.334764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   69.342762] flags: 0x200000000000000(node=0|zone=2)
[   69.347642] page_type: f5(slab)
[   69.350788] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   69.358528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   69.366274] page dumped because: kasan: bad access detected
[   69.371848] 
[   69.373376] Memory state around the buggy address:
[   69.378202]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.385429]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   69.392646] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.399866]                                      ^
[   69.404659]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.411880]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   69.419098] ==================================================================
[   72.125911] ==================================================================
[   72.133155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   72.140549] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   72.147949] 
[   72.149452] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   72.149460] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   72.149463] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.149467] Call Trace:
[   72.149469]  <TASK>
[   72.149471]  dump_stack_lvl+0x73/0xb0
[   72.149475]  print_report+0xd1/0x650
[   72.149479]  ? __virt_addr_valid+0x1db/0x2d0
[   72.149483]  ? kasan_atomics_helper+0x1f43/0x5450
[   72.149487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.149493]  ? kasan_atomics_helper+0x1f43/0x5450
[   72.149497]  kasan_report+0x141/0x180
[   72.149501]  ? kasan_atomics_helper+0x1f43/0x5450
[   72.149506]  kasan_check_range+0x10c/0x1c0
[   72.149510]  __kasan_check_write+0x18/0x20
[   72.149514]  kasan_atomics_helper+0x1f43/0x5450
[   72.149518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.149522]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.149527]  ? kasan_atomics+0x152/0x310
[   72.149532]  kasan_atomics+0x1dc/0x310
[   72.149537]  ? __pfx_kasan_atomics+0x10/0x10
[   72.149542]  ? ktime_get_ts64+0x83/0x230
[   72.149546]  kunit_try_run_case+0x1a2/0x480
[   72.149551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.149555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.149560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.149564]  ? __kthread_parkme+0x82/0x180
[   72.149568]  ? preempt_count_sub+0x50/0x80
[   72.149572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.149577]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.149581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.149586]  kthread+0x334/0x6f0
[   72.149589]  ? trace_preempt_on+0x20/0xc0
[   72.149594]  ? __pfx_kthread+0x10/0x10
[   72.149597]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.149601]  ? calculate_sigpending+0x7b/0xa0
[   72.149606]  ? __pfx_kthread+0x10/0x10
[   72.149610]  ret_from_fork+0x113/0x1d0
[   72.149614]  ? __pfx_kthread+0x10/0x10
[   72.149617]  ret_from_fork_asm+0x1a/0x30
[   72.149623]  </TASK>
[   72.149625] 
[   72.332767] Allocated by task 306:
[   72.336171]  kasan_save_stack+0x45/0x70
[   72.340012]  kasan_save_track+0x18/0x40
[   72.343849]  kasan_save_alloc_info+0x3b/0x50
[   72.348123]  __kasan_kmalloc+0xb7/0xc0
[   72.351875]  __kmalloc_cache_noprof+0x189/0x420
[   72.356422]  kasan_atomics+0x95/0x310
[   72.360093]  kunit_try_run_case+0x1a2/0x480
[   72.364286]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.369685]  kthread+0x334/0x6f0
[   72.372918]  ret_from_fork+0x113/0x1d0
[   72.376670]  ret_from_fork_asm+0x1a/0x30
[   72.380596] 
[   72.382097] The buggy address belongs to the object at ffff8881066eaf00
[   72.382097]  which belongs to the cache kmalloc-64 of size 64
[   72.394439] The buggy address is located 0 bytes to the right of
[   72.394439]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   72.407309] 
[   72.408806] The buggy address belongs to the physical page:
[   72.414422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   72.422423] flags: 0x200000000000000(node=0|zone=2)
[   72.427303] page_type: f5(slab)
[   72.430447] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.438188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.445936] page dumped because: kasan: bad access detected
[   72.451507] 
[   72.453007] Memory state around the buggy address:
[   72.457800]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.465018]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   72.472237] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.479458]                                      ^
[   72.484252]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.491480]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.498719] ==================================================================
[   73.262980] ==================================================================
[   73.270226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   73.277618] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   73.284925] 
[   73.286425] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   73.286433] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   73.286436] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   73.286440] Call Trace:
[   73.286442]  <TASK>
[   73.286443]  dump_stack_lvl+0x73/0xb0
[   73.286448]  print_report+0xd1/0x650
[   73.286452]  ? __virt_addr_valid+0x1db/0x2d0
[   73.286456]  ? kasan_atomics_helper+0x4f98/0x5450
[   73.286460]  ? kasan_complete_mode_report_info+0x2a/0x200
[   73.286466]  ? kasan_atomics_helper+0x4f98/0x5450
[   73.286470]  kasan_report+0x141/0x180
[   73.286474]  ? kasan_atomics_helper+0x4f98/0x5450
[   73.286479]  __asan_report_load8_noabort+0x18/0x20
[   73.286484]  kasan_atomics_helper+0x4f98/0x5450
[   73.286488]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   73.286492]  ? __kmalloc_cache_noprof+0x189/0x420
[   73.286497]  ? kasan_atomics+0x152/0x310
[   73.286502]  kasan_atomics+0x1dc/0x310
[   73.286507]  ? __pfx_kasan_atomics+0x10/0x10
[   73.286511]  ? ktime_get_ts64+0x83/0x230
[   73.286516]  kunit_try_run_case+0x1a2/0x480
[   73.286521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.286525]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   73.286529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   73.286534]  ? __kthread_parkme+0x82/0x180
[   73.286538]  ? preempt_count_sub+0x50/0x80
[   73.286542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.286547]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.286551]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   73.286555]  kthread+0x334/0x6f0
[   73.286559]  ? trace_preempt_on+0x20/0xc0
[   73.286563]  ? __pfx_kthread+0x10/0x10
[   73.286567]  ? _raw_spin_unlock_irq+0x47/0x80
[   73.286571]  ? calculate_sigpending+0x7b/0xa0
[   73.286576]  ? __pfx_kthread+0x10/0x10
[   73.286580]  ret_from_fork+0x113/0x1d0
[   73.286583]  ? __pfx_kthread+0x10/0x10
[   73.286587]  ret_from_fork_asm+0x1a/0x30
[   73.286593]  </TASK>
[   73.286595] 
[   73.466266] Allocated by task 306:
[   73.469672]  kasan_save_stack+0x45/0x70
[   73.473511]  kasan_save_track+0x18/0x40
[   73.477376]  kasan_save_alloc_info+0x3b/0x50
[   73.481674]  __kasan_kmalloc+0xb7/0xc0
[   73.485427]  __kmalloc_cache_noprof+0x189/0x420
[   73.489969]  kasan_atomics+0x95/0x310
[   73.493633]  kunit_try_run_case+0x1a2/0x480
[   73.497821]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.503219]  kthread+0x334/0x6f0
[   73.506454]  ret_from_fork+0x113/0x1d0
[   73.510204]  ret_from_fork_asm+0x1a/0x30
[   73.514132] 
[   73.515632] The buggy address belongs to the object at ffff8881066eaf00
[   73.515632]  which belongs to the cache kmalloc-64 of size 64
[   73.527972] The buggy address is located 0 bytes to the right of
[   73.527972]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   73.540841] 
[   73.542378] The buggy address belongs to the physical page:
[   73.547983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   73.555990] flags: 0x200000000000000(node=0|zone=2)
[   73.560870] page_type: f5(slab)
[   73.564018] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.571766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.579512] page dumped because: kasan: bad access detected
[   73.585085] 
[   73.586585] Memory state around the buggy address:
[   73.591400]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.598639]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   73.605859] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.613078]                                      ^
[   73.617872]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.625101]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.632348] ==================================================================
[   61.086682] ==================================================================
[   61.093927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   61.101319] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   61.108661] 
[   61.110162] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   61.110169] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   61.110172] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.110176] Call Trace:
[   61.110178]  <TASK>
[   61.110179]  dump_stack_lvl+0x73/0xb0
[   61.110184]  print_report+0xd1/0x650
[   61.110188]  ? __virt_addr_valid+0x1db/0x2d0
[   61.110192]  ? kasan_atomics_helper+0x4a1c/0x5450
[   61.110196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.110201]  ? kasan_atomics_helper+0x4a1c/0x5450
[   61.110205]  kasan_report+0x141/0x180
[   61.110210]  ? kasan_atomics_helper+0x4a1c/0x5450
[   61.110215]  __asan_report_load4_noabort+0x18/0x20
[   61.110219]  kasan_atomics_helper+0x4a1c/0x5450
[   61.110224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.110228]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.110233]  ? kasan_atomics+0x152/0x310
[   61.110238]  kasan_atomics+0x1dc/0x310
[   61.110242]  ? __pfx_kasan_atomics+0x10/0x10
[   61.110247]  ? ktime_get_ts64+0x83/0x230
[   61.110252]  kunit_try_run_case+0x1a2/0x480
[   61.110256]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.110261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.110265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.110269]  ? __kthread_parkme+0x82/0x180
[   61.110273]  ? preempt_count_sub+0x50/0x80
[   61.110278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.110282]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.110287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.110291]  kthread+0x334/0x6f0
[   61.110295]  ? trace_preempt_on+0x20/0xc0
[   61.110299]  ? __pfx_kthread+0x10/0x10
[   61.110303]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.110307]  ? calculate_sigpending+0x7b/0xa0
[   61.110312]  ? __pfx_kthread+0x10/0x10
[   61.110316]  ret_from_fork+0x113/0x1d0
[   61.110319]  ? __pfx_kthread+0x10/0x10
[   61.110323]  ret_from_fork_asm+0x1a/0x30
[   61.110349]  </TASK>
[   61.110351] 
[   61.290080] Allocated by task 306:
[   61.293485]  kasan_save_stack+0x45/0x70
[   61.297325]  kasan_save_track+0x18/0x40
[   61.301189]  kasan_save_alloc_info+0x3b/0x50
[   61.305463]  __kasan_kmalloc+0xb7/0xc0
[   61.309214]  __kmalloc_cache_noprof+0x189/0x420
[   61.313749]  kasan_atomics+0x95/0x310
[   61.317428]  kunit_try_run_case+0x1a2/0x480
[   61.321617]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.327017]  kthread+0x334/0x6f0
[   61.330248]  ret_from_fork+0x113/0x1d0
[   61.334001]  ret_from_fork_asm+0x1a/0x30
[   61.337926] 
[   61.339429] The buggy address belongs to the object at ffff8881066eaf00
[   61.339429]  which belongs to the cache kmalloc-64 of size 64
[   61.351768] The buggy address is located 0 bytes to the right of
[   61.351768]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   61.364630] 
[   61.366130] The buggy address belongs to the physical page:
[   61.371701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   61.379702] flags: 0x200000000000000(node=0|zone=2)
[   61.384587] page_type: f5(slab)
[   61.387736] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.395484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.403222] page dumped because: kasan: bad access detected
[   61.408795] 
[   61.410294] Memory state around the buggy address:
[   61.415088]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.422305]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   61.429527] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.436744]                                      ^
[   61.441538]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.448757]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.455976] ==================================================================
[   61.843200] ==================================================================
[   61.850446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   61.857838] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   61.865144] 
[   61.866646] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   61.866654] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   61.866657] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   61.866660] Call Trace:
[   61.866662]  <TASK>
[   61.866664]  dump_stack_lvl+0x73/0xb0
[   61.866668]  print_report+0xd1/0x650
[   61.866672]  ? __virt_addr_valid+0x1db/0x2d0
[   61.866676]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.866680]  ? kasan_complete_mode_report_info+0x2a/0x200
[   61.866685]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.866689]  kasan_report+0x141/0x180
[   61.866694]  ? kasan_atomics_helper+0x4a02/0x5450
[   61.866699]  __asan_report_load4_noabort+0x18/0x20
[   61.866703]  kasan_atomics_helper+0x4a02/0x5450
[   61.866708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   61.866712]  ? __kmalloc_cache_noprof+0x189/0x420
[   61.866717]  ? kasan_atomics+0x152/0x310
[   61.866722]  kasan_atomics+0x1dc/0x310
[   61.866726]  ? __pfx_kasan_atomics+0x10/0x10
[   61.866731]  ? ktime_get_ts64+0x83/0x230
[   61.866735]  kunit_try_run_case+0x1a2/0x480
[   61.866740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.866745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   61.866749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   61.866753]  ? __kthread_parkme+0x82/0x180
[   61.866757]  ? preempt_count_sub+0x50/0x80
[   61.866762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   61.866766]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   61.866770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   61.866775]  kthread+0x334/0x6f0
[   61.866779]  ? trace_preempt_on+0x20/0xc0
[   61.866783]  ? __pfx_kthread+0x10/0x10
[   61.866787]  ? _raw_spin_unlock_irq+0x47/0x80
[   61.866791]  ? calculate_sigpending+0x7b/0xa0
[   61.866795]  ? __pfx_kthread+0x10/0x10
[   61.866800]  ret_from_fork+0x113/0x1d0
[   61.866803]  ? __pfx_kthread+0x10/0x10
[   61.866807]  ret_from_fork_asm+0x1a/0x30
[   61.866813]  </TASK>
[   61.866815] 
[   62.046485] Allocated by task 306:
[   62.049890]  kasan_save_stack+0x45/0x70
[   62.053729]  kasan_save_track+0x18/0x40
[   62.057568]  kasan_save_alloc_info+0x3b/0x50
[   62.061843]  __kasan_kmalloc+0xb7/0xc0
[   62.065595]  __kmalloc_cache_noprof+0x189/0x420
[   62.070138]  kasan_atomics+0x95/0x310
[   62.073812]  kunit_try_run_case+0x1a2/0x480
[   62.077996]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.083395]  kthread+0x334/0x6f0
[   62.086647]  ret_from_fork+0x113/0x1d0
[   62.090418]  ret_from_fork_asm+0x1a/0x30
[   62.094364] 
[   62.095909] The buggy address belongs to the object at ffff8881066eaf00
[   62.095909]  which belongs to the cache kmalloc-64 of size 64
[   62.108245] The buggy address is located 0 bytes to the right of
[   62.108245]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   62.121114] 
[   62.122612] The buggy address belongs to the physical page:
[   62.128187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   62.136193] flags: 0x200000000000000(node=0|zone=2)
[   62.141072] page_type: f5(slab)
[   62.144219] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.151957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.159698] page dumped because: kasan: bad access detected
[   62.165271] 
[   62.166770] Memory state around the buggy address:
[   62.171562]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.178781]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   62.186000] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.193220]                                      ^
[   62.198014]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.205232]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.212451] ==================================================================
[   50.474233] ==================================================================
[   50.489124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   50.496522] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   50.503830] 
[   50.505348] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   50.505358] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   50.505361] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.505365] Call Trace:
[   50.505367]  <TASK>
[   50.505369]  dump_stack_lvl+0x73/0xb0
[   50.505386]  print_report+0xd1/0x650
[   50.505390]  ? __virt_addr_valid+0x1db/0x2d0
[   50.505407]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.505411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.505416]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.505420]  kasan_report+0x141/0x180
[   50.505424]  ? kasan_atomics_helper+0x4bbc/0x5450
[   50.505429]  __asan_report_load4_noabort+0x18/0x20
[   50.505434]  kasan_atomics_helper+0x4bbc/0x5450
[   50.505437]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   50.505441]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.505446]  ? kasan_atomics+0x152/0x310
[   50.505451]  kasan_atomics+0x1dc/0x310
[   50.505455]  ? __pfx_kasan_atomics+0x10/0x10
[   50.505460]  ? ktime_get_ts64+0x83/0x230
[   50.505464]  kunit_try_run_case+0x1a2/0x480
[   50.505469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.505473]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.505477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.505481]  ? __kthread_parkme+0x82/0x180
[   50.505485]  ? preempt_count_sub+0x50/0x80
[   50.505489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.505493]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.505497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.505502]  kthread+0x334/0x6f0
[   50.505505]  ? trace_preempt_on+0x20/0xc0
[   50.505509]  ? __pfx_kthread+0x10/0x10
[   50.505513]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.505517]  ? calculate_sigpending+0x7b/0xa0
[   50.505521]  ? __pfx_kthread+0x10/0x10
[   50.505525]  ret_from_fork+0x113/0x1d0
[   50.505528]  ? __pfx_kthread+0x10/0x10
[   50.505532]  ret_from_fork_asm+0x1a/0x30
[   50.505538]  </TASK>
[   50.505540] 
[   50.685309] Allocated by task 306:
[   50.688715]  kasan_save_stack+0x45/0x70
[   50.692552]  kasan_save_track+0x18/0x40
[   50.696415]  kasan_save_alloc_info+0x3b/0x50
[   50.700691]  __kasan_kmalloc+0xb7/0xc0
[   50.704444]  __kmalloc_cache_noprof+0x189/0x420
[   50.708978]  kasan_atomics+0x95/0x310
[   50.712651]  kunit_try_run_case+0x1a2/0x480
[   50.716838]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.722245]  kthread+0x334/0x6f0
[   50.725477]  ret_from_fork+0x113/0x1d0
[   50.729229]  ret_from_fork_asm+0x1a/0x30
[   50.733156] 
[   50.734654] The buggy address belongs to the object at ffff8881066eaf00
[   50.734654]  which belongs to the cache kmalloc-64 of size 64
[   50.746988] The buggy address is located 0 bytes to the right of
[   50.746988]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   50.759851] 
[   50.761363] The buggy address belongs to the physical page:
[   50.766965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   50.774965] flags: 0x200000000000000(node=0|zone=2)
[   50.779843] page_type: f5(slab)
[   50.782990] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   50.790731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.798476] page dumped because: kasan: bad access detected
[   50.804050] 
[   50.805549] Memory state around the buggy address:
[   50.810377]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.817632]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   50.824860] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.832078]                                      ^
[   50.836870]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.844088]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.851308] ==================================================================
[   59.950519] ==================================================================
[   59.957757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   59.965065] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   59.972467] 
[   59.973966] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   59.973973] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   59.973976] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   59.973979] Call Trace:
[   59.973981]  <TASK>
[   59.973983]  dump_stack_lvl+0x73/0xb0
[   59.973988]  print_report+0xd1/0x650
[   59.973992]  ? __virt_addr_valid+0x1db/0x2d0
[   59.973996]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.973999]  ? kasan_complete_mode_report_info+0x2a/0x200
[   59.974005]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.974009]  kasan_report+0x141/0x180
[   59.974013]  ? kasan_atomics_helper+0xfa9/0x5450
[   59.974018]  kasan_check_range+0x10c/0x1c0
[   59.974023]  __kasan_check_write+0x18/0x20
[   59.974027]  kasan_atomics_helper+0xfa9/0x5450
[   59.974031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   59.974035]  ? __kmalloc_cache_noprof+0x189/0x420
[   59.974040]  ? kasan_atomics+0x152/0x310
[   59.974045]  kasan_atomics+0x1dc/0x310
[   59.974049]  ? __pfx_kasan_atomics+0x10/0x10
[   59.974054]  ? ktime_get_ts64+0x83/0x230
[   59.974059]  kunit_try_run_case+0x1a2/0x480
[   59.974063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.974068]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   59.974072]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   59.974077]  ? __kthread_parkme+0x82/0x180
[   59.974080]  ? preempt_count_sub+0x50/0x80
[   59.974085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.974090]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.974094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   59.974099]  kthread+0x334/0x6f0
[   59.974102]  ? trace_preempt_on+0x20/0xc0
[   59.974106]  ? __pfx_kthread+0x10/0x10
[   59.974111]  ? _raw_spin_unlock_irq+0x47/0x80
[   59.974114]  ? calculate_sigpending+0x7b/0xa0
[   59.974119]  ? __pfx_kthread+0x10/0x10
[   59.974123]  ret_from_fork+0x113/0x1d0
[   59.974127]  ? __pfx_kthread+0x10/0x10
[   59.974131]  ret_from_fork_asm+0x1a/0x30
[   59.974137]  </TASK>
[   59.974138] 
[   60.156858] Allocated by task 306:
[   60.160264]  kasan_save_stack+0x45/0x70
[   60.164101]  kasan_save_track+0x18/0x40
[   60.167941]  kasan_save_alloc_info+0x3b/0x50
[   60.172216]  __kasan_kmalloc+0xb7/0xc0
[   60.175976]  __kmalloc_cache_noprof+0x189/0x420
[   60.180517]  kasan_atomics+0x95/0x310
[   60.184182]  kunit_try_run_case+0x1a2/0x480
[   60.188404]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.193811]  kthread+0x334/0x6f0
[   60.197044]  ret_from_fork+0x113/0x1d0
[   60.200797]  ret_from_fork_asm+0x1a/0x30
[   60.204722] 
[   60.206221] The buggy address belongs to the object at ffff8881066eaf00
[   60.206221]  which belongs to the cache kmalloc-64 of size 64
[   60.218563] The buggy address is located 0 bytes to the right of
[   60.218563]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   60.231428] 
[   60.232925] The buggy address belongs to the physical page:
[   60.238496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   60.246495] flags: 0x200000000000000(node=0|zone=2)
[   60.251394] page_type: f5(slab)
[   60.254565] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   60.262306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.270051] page dumped because: kasan: bad access detected
[   60.275623] 
[   60.277123] Memory state around the buggy address:
[   60.281917]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.289145]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   60.296376] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.303627]                                      ^
[   60.308427]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.315646]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.322866] ==================================================================
[   67.146265] ==================================================================
[   67.153512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   67.160905] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   67.168306] 
[   67.169807] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   67.169815] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   67.169818] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.169821] Call Trace:
[   67.169823]  <TASK>
[   67.169825]  dump_stack_lvl+0x73/0xb0
[   67.169829]  print_report+0xd1/0x650
[   67.169834]  ? __virt_addr_valid+0x1db/0x2d0
[   67.169838]  ? kasan_atomics_helper+0x1818/0x5450
[   67.169842]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.169847]  ? kasan_atomics_helper+0x1818/0x5450
[   67.169851]  kasan_report+0x141/0x180
[   67.169855]  ? kasan_atomics_helper+0x1818/0x5450
[   67.169860]  kasan_check_range+0x10c/0x1c0
[   67.169865]  __kasan_check_write+0x18/0x20
[   67.169868]  kasan_atomics_helper+0x1818/0x5450
[   67.169873]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.169877]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.169882]  ? kasan_atomics+0x152/0x310
[   67.169887]  kasan_atomics+0x1dc/0x310
[   67.169891]  ? __pfx_kasan_atomics+0x10/0x10
[   67.169896]  ? ktime_get_ts64+0x83/0x230
[   67.169901]  kunit_try_run_case+0x1a2/0x480
[   67.169905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.169910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.169914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.169919]  ? __kthread_parkme+0x82/0x180
[   67.169922]  ? preempt_count_sub+0x50/0x80
[   67.169927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.169931]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.169936]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.169940]  kthread+0x334/0x6f0
[   67.169944]  ? trace_preempt_on+0x20/0xc0
[   67.169948]  ? __pfx_kthread+0x10/0x10
[   67.169952]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.169956]  ? calculate_sigpending+0x7b/0xa0
[   67.169961]  ? __pfx_kthread+0x10/0x10
[   67.169965]  ret_from_fork+0x113/0x1d0
[   67.169968]  ? __pfx_kthread+0x10/0x10
[   67.169972]  ret_from_fork_asm+0x1a/0x30
[   67.169978]  </TASK>
[   67.169980] 
[   67.353060] Allocated by task 306:
[   67.356466]  kasan_save_stack+0x45/0x70
[   67.360307]  kasan_save_track+0x18/0x40
[   67.364156]  kasan_save_alloc_info+0x3b/0x50
[   67.368436]  __kasan_kmalloc+0xb7/0xc0
[   67.372188]  __kmalloc_cache_noprof+0x189/0x420
[   67.376722]  kasan_atomics+0x95/0x310
[   67.380419]  kunit_try_run_case+0x1a2/0x480
[   67.384606]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.390008]  kthread+0x334/0x6f0
[   67.393239]  ret_from_fork+0x113/0x1d0
[   67.396992]  ret_from_fork_asm+0x1a/0x30
[   67.400918] 
[   67.402421] The buggy address belongs to the object at ffff8881066eaf00
[   67.402421]  which belongs to the cache kmalloc-64 of size 64
[   67.414757] The buggy address is located 0 bytes to the right of
[   67.414757]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   67.427621] 
[   67.429119] The buggy address belongs to the physical page:
[   67.434691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   67.442691] flags: 0x200000000000000(node=0|zone=2)
[   67.447570] page_type: f5(slab)
[   67.450718] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.458465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.466204] page dumped because: kasan: bad access detected
[   67.471777] 
[   67.473276] Memory state around the buggy address:
[   67.478070]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.485298]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   67.492526] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.499751]                                      ^
[   67.504545]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.511764]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.518983] ==================================================================
[   65.246254] ==================================================================
[   65.253501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   65.260894] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   65.268295] 
[   65.269795] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   65.269803] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   65.269806] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   65.269809] Call Trace:
[   65.269811]  <TASK>
[   65.269813]  dump_stack_lvl+0x73/0xb0
[   65.269818]  print_report+0xd1/0x650
[   65.269822]  ? __virt_addr_valid+0x1db/0x2d0
[   65.269826]  ? kasan_atomics_helper+0x151d/0x5450
[   65.269830]  ? kasan_complete_mode_report_info+0x2a/0x200
[   65.269835]  ? kasan_atomics_helper+0x151d/0x5450
[   65.269839]  kasan_report+0x141/0x180
[   65.269843]  ? kasan_atomics_helper+0x151d/0x5450
[   65.269848]  kasan_check_range+0x10c/0x1c0
[   65.269853]  __kasan_check_write+0x18/0x20
[   65.269856]  kasan_atomics_helper+0x151d/0x5450
[   65.269861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   65.269865]  ? __kmalloc_cache_noprof+0x189/0x420
[   65.269870]  ? kasan_atomics+0x152/0x310
[   65.269875]  kasan_atomics+0x1dc/0x310
[   65.269879]  ? __pfx_kasan_atomics+0x10/0x10
[   65.269884]  ? ktime_get_ts64+0x83/0x230
[   65.269889]  kunit_try_run_case+0x1a2/0x480
[   65.269893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.269898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   65.269902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   65.269907]  ? __kthread_parkme+0x82/0x180
[   65.269910]  ? preempt_count_sub+0x50/0x80
[   65.269915]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.269919]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.269923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   65.269928]  kthread+0x334/0x6f0
[   65.269932]  ? trace_preempt_on+0x20/0xc0
[   65.269936]  ? __pfx_kthread+0x10/0x10
[   65.269940]  ? _raw_spin_unlock_irq+0x47/0x80
[   65.269944]  ? calculate_sigpending+0x7b/0xa0
[   65.269948]  ? __pfx_kthread+0x10/0x10
[   65.269952]  ret_from_fork+0x113/0x1d0
[   65.269956]  ? __pfx_kthread+0x10/0x10
[   65.269960]  ret_from_fork_asm+0x1a/0x30
[   65.269966]  </TASK>
[   65.269967] 
[   65.453042] Allocated by task 306:
[   65.456448]  kasan_save_stack+0x45/0x70
[   65.460287]  kasan_save_track+0x18/0x40
[   65.464127]  kasan_save_alloc_info+0x3b/0x50
[   65.468422]  __kasan_kmalloc+0xb7/0xc0
[   65.472176]  __kmalloc_cache_noprof+0x189/0x420
[   65.476709]  kasan_atomics+0x95/0x310
[   65.480415]  kunit_try_run_case+0x1a2/0x480
[   65.484604]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.490005]  kthread+0x334/0x6f0
[   65.493237]  ret_from_fork+0x113/0x1d0
[   65.496990]  ret_from_fork_asm+0x1a/0x30
[   65.500916] 
[   65.502419] The buggy address belongs to the object at ffff8881066eaf00
[   65.502419]  which belongs to the cache kmalloc-64 of size 64
[   65.514757] The buggy address is located 0 bytes to the right of
[   65.514757]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   65.527618] 
[   65.529116] The buggy address belongs to the physical page:
[   65.534691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   65.542698] flags: 0x200000000000000(node=0|zone=2)
[   65.547577] page_type: f5(slab)
[   65.550724] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.558470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.566210] page dumped because: kasan: bad access detected
[   65.571783] 
[   65.573282] Memory state around the buggy address:
[   65.578076]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.585302]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   65.592523] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.599742]                                      ^
[   65.604534]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.611753]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.618973] ==================================================================
[   71.322980] ==================================================================
[   71.330218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   71.337613] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   71.345005] 
[   71.346505] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   71.346513] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   71.346515] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   71.346519] Call Trace:
[   71.346521]  <TASK>
[   71.346522]  dump_stack_lvl+0x73/0xb0
[   71.346527]  print_report+0xd1/0x650
[   71.346531]  ? __virt_addr_valid+0x1db/0x2d0
[   71.346535]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.346539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   71.346544]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.346548]  kasan_report+0x141/0x180
[   71.346552]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.346557]  kasan_check_range+0x10c/0x1c0
[   71.346562]  __kasan_check_write+0x18/0x20
[   71.346565]  kasan_atomics_helper+0x1eaa/0x5450
[   71.346570]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   71.346574]  ? __kmalloc_cache_noprof+0x189/0x420
[   71.346579]  ? kasan_atomics+0x152/0x310
[   71.346584]  kasan_atomics+0x1dc/0x310
[   71.346588]  ? __pfx_kasan_atomics+0x10/0x10
[   71.346593]  ? ktime_get_ts64+0x83/0x230
[   71.346597]  kunit_try_run_case+0x1a2/0x480
[   71.346602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.346607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   71.346611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   71.346615]  ? __kthread_parkme+0x82/0x180
[   71.346619]  ? preempt_count_sub+0x50/0x80
[   71.346623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.346628]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.346632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   71.346637]  kthread+0x334/0x6f0
[   71.346640]  ? trace_preempt_on+0x20/0xc0
[   71.346645]  ? __pfx_kthread+0x10/0x10
[   71.346648]  ? _raw_spin_unlock_irq+0x47/0x80
[   71.346652]  ? calculate_sigpending+0x7b/0xa0
[   71.346657]  ? __pfx_kthread+0x10/0x10
[   71.346661]  ret_from_fork+0x113/0x1d0
[   71.346665]  ? __pfx_kthread+0x10/0x10
[   71.346669]  ret_from_fork_asm+0x1a/0x30
[   71.346675]  </TASK>
[   71.346676] 
[   71.485352] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
[   71.491252] Allocated by task 306:
[   71.494484] rcu: \t3-....: (56 ticks this GP) idle=2e54/1/0x4000000000000000 softirq=321/321 fqs=5250
[   71.498489]  kasan_save_stack+0x45/0x70
[   71.502232] rcu: \t(detected by 2, t=21018 jiffies, g=-327, q=19 ncpus=4)
[   71.506583]  kasan_save_track+0x18/0x40
[   71.510934] Sending NMI from CPU 2 to CPUs 3:
[   71.510941] NMI backtrace for cpu 3
[   71.510944] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   71.510952] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   71.510955] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   71.510959] RIP: 0010:io_serial_out+0x6c/0xa0
[   71.510964] Code: b6 8b c1 00 00 00 48 8d 7b 08 48 ba 00 00 00 00 00 fc ff df d3 e6 48 89 f9 48 c1 e9 03 80 3c 11 00 75 24 66 03 73 08 89 f2 ee <48> 8b 5d f8 c9 c3 cc cc cc cc 89 45 f0 89 75 f4 e8 2f 1f 05 ff 8b
[   71.510972] RSP: 0000:ffff888106c5f510 EFLAGS: 00000006
[   71.510977] RAX: 0000000000000000 RBX: ffffffffaaaa07c0 RCX: 1ffffffff55540f9
[   71.510982] RDX: 00000000000003f9 RSI: 00000000000003f9 RDI: ffffffffaaaa07c8
[   71.510986] RBP: ffff888106c5f520 R08: 0000000000000001 R09: ffffffffaa9fc480
[   71.510990] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000
[   71.510993] R13: ffffffffaaaa0a20 R14: ffffffffa9bd8ec0 R15: ffffffffaaaa07c0
[   71.510997] FS:  0000000000000000(0000) GS:ffff888474df4000(0000) knlGS:0000000000000000
[   71.511002] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   71.511006] CR2: 0000000000000000 CR3: 00000003a84bc001 CR4: 00000000003726f0
[   71.511010] DR0: ffffffffaaa50440 DR1: ffffffffaaa50441 DR2: ffffffffaaa50443
[   71.511013] DR3: ffffffffaaa50445 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[   71.511017] Call Trace:
[   71.511019]  <TASK>
[   71.511021]  serial8250_clear_IER+0x8c/0xb0
[   71.511026]  serial8250_console_write+0x1bd/0x1810
[   71.511032]  ? __pfx_serial8250_console_write+0x10/0x10
[   71.511038]  ? __kasan_check_write+0x18/0x20
[   71.511042]  ? _raw_spin_lock+0x8b/0xe0
[   71.511046]  ? __pfx__raw_spin_lock+0x10/0x10
[   71.511050]  univ8250_console_write+0x57/0x80
[   71.511055]  ? _raw_spin_unlock+0x41/0x70
[   71.511059]  console_flush_all+0x57b/0xc00
[   71.511064]  ? __pfx_console_flush_all+0x10/0x10
[   71.511068]  ? __pfx_vprintk_store+0x10/0x10
[   71.511073]  ? __kasan_check_read+0x15/0x20
[   71.511077]  console_unlock+0xf2/0x1f0
[   71.511080]  ? __pfx_console_unlock+0x10/0x10
[   71.511084]  ? __kasan_check_write+0x18/0x20
[   71.511088]  ? _raw_spin_lock+0x8b/0xe0
[   71.511093]  vprintk_emit+0x1e9/0x480
[   71.511097]  ? __pfx_vprintk_emit+0x10/0x10
[   71.511101]  ? vprintk_emit+0x169/0x480
[   71.511105]  vprintk_default+0x21/0x30
[   71.511109]  vprintk+0x12/0x20
[   71.511112]  _printk+0xc3/0xf0
[   71.511117]  ? __pfx__printk+0x10/0x10
[   71.511121]  ? vprintk+0x12/0x20
[   71.511125]  ? _printk+0xc3/0xf0
[   71.511129]  ? __pfx__printk+0x10/0x10
[   71.511133]  ? kasan_save_track+0x18/0x40
[   71.511137]  stack_trace_print+0x5d/0x90
[   71.511142]  stack_depot_print+0x48/0x50
[   71.511147]  print_report+0x61a/0x650
[   71.511151]  ? __virt_addr_valid+0x1db/0x2d0
[   71.511156]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.511160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   71.511165]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.511169]  kasan_report+0x141/0x180
[   71.511173]  ? kasan_atomics_helper+0x1eaa/0x5450
[   71.511178]  kasan_check_range+0x10c/0x1c0
[   71.511183]  __kasan_check_write+0x18/0x20
[   71.511186]  kasan_atomics_helper+0x1eaa/0x5450
[   71.511191]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   71.511195]  ? __kmalloc_cache_noprof+0x189/0x420
[   71.511200]  ? kasan_atomics+0x152/0x310
[   71.511205]  kasan_atomics+0x1dc/0x310
[   71.511209]  ? __pfx_kasan_atomics+0x10/0x10
[   71.511214]  ? ktime_get_ts64+0x83/0x230
[   71.511219]  kunit_try_run_case+0x1a2/0x480
[   71.511223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.511228]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   71.511232]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   71.511237]  ? __kthread_parkme+0x82/0x180
[   71.511240]  ? preempt_count_sub+0x50/0x80
[   71.511245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   71.511250]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.511254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   71.511258]  kthread+0x334/0x6f0
[   71.511262]  ? trace_preempt_on+0x20/0xc0
[   71.511267]  ? __pfx_kthread+0x10/0x10
[   71.511271]  ? _raw_spin_unlock_irq+0x47/0x80
[   71.511274]  ? calculate_sigpending+0x7b/0xa0
[   71.511279]  ? __pfx_kthread+0x10/0x10
[   71.511283]  ret_from_fork+0x113/0x1d0
[   71.511287]  ? __pfx_kthread+0x10/0x10
[   71.511291]  ret_from_fork_asm+0x1a/0x30
[   71.511297]  </TASK>
[   71.963843]  kasan_save_alloc_info+0x3b/0x50
[   71.968126]  __kasan_kmalloc+0xb7/0xc0
[   71.971879]  __kmalloc_cache_noprof+0x189/0x420
[   71.976420]  kasan_atomics+0x95/0x310
[   71.980087]  kunit_try_run_case+0x1a2/0x480
[   71.984280]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.989680]  kthread+0x334/0x6f0
[   71.992912]  ret_from_fork+0x113/0x1d0
[   71.996666]  ret_from_fork_asm+0x1a/0x30
[   72.000602] 
[   72.002099] The buggy address belongs to the object at ffff8881066eaf00
[   72.002099]  which belongs to the cache kmalloc-64 of size 64
[   72.014442] The buggy address is located 0 bytes to the right of
[   72.014442]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   72.027311] 
[   72.028811] The buggy address belongs to the physical page:
[   72.034415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   72.042417] flags: 0x200000000000000(node=0|zone=2)
[   72.047295] page_type: f5(slab)
[   72.050444] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.058191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.065929] page dumped because: kasan: bad access detected
[   72.071500] 
[   72.073002] Memory state around the buggy address:
[   72.077793]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.085013]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   72.092232] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.099453]                                      ^
[   72.104245]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.111464]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.118683] ==================================================================
[   58.432204] ==================================================================
[   58.439460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   58.446767] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   58.454169] 
[   58.455669] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   58.455677] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   58.455680] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.455683] Call Trace:
[   58.455685]  <TASK>
[   58.455687]  dump_stack_lvl+0x73/0xb0
[   58.455691]  print_report+0xd1/0x650
[   58.455695]  ? __virt_addr_valid+0x1db/0x2d0
[   58.455700]  ? kasan_atomics_helper+0xd47/0x5450
[   58.455704]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.455709]  ? kasan_atomics_helper+0xd47/0x5450
[   58.455713]  kasan_report+0x141/0x180
[   58.455717]  ? kasan_atomics_helper+0xd47/0x5450
[   58.455722]  kasan_check_range+0x10c/0x1c0
[   58.455727]  __kasan_check_write+0x18/0x20
[   58.455730]  kasan_atomics_helper+0xd47/0x5450
[   58.455734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.455739]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.455744]  ? kasan_atomics+0x152/0x310
[   58.455749]  kasan_atomics+0x1dc/0x310
[   58.455753]  ? __pfx_kasan_atomics+0x10/0x10
[   58.455758]  ? ktime_get_ts64+0x83/0x230
[   58.455762]  kunit_try_run_case+0x1a2/0x480
[   58.455767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.455772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.455776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.455780]  ? __kthread_parkme+0x82/0x180
[   58.455784]  ? preempt_count_sub+0x50/0x80
[   58.455789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.455793]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.455798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.455802]  kthread+0x334/0x6f0
[   58.455806]  ? trace_preempt_on+0x20/0xc0
[   58.455810]  ? __pfx_kthread+0x10/0x10
[   58.455814]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.455818]  ? calculate_sigpending+0x7b/0xa0
[   58.455823]  ? __pfx_kthread+0x10/0x10
[   58.455827]  ret_from_fork+0x113/0x1d0
[   58.455830]  ? __pfx_kthread+0x10/0x10
[   58.455834]  ret_from_fork_asm+0x1a/0x30
[   58.455840]  </TASK>
[   58.455842] 
[   58.638445] Allocated by task 306:
[   58.641853]  kasan_save_stack+0x45/0x70
[   58.645693]  kasan_save_track+0x18/0x40
[   58.649530]  kasan_save_alloc_info+0x3b/0x50
[   58.653803]  __kasan_kmalloc+0xb7/0xc0
[   58.657556]  __kmalloc_cache_noprof+0x189/0x420
[   58.662088]  kasan_atomics+0x95/0x310
[   58.665754]  kunit_try_run_case+0x1a2/0x480
[   58.669940]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.675362]  kthread+0x334/0x6f0
[   58.678616]  ret_from_fork+0x113/0x1d0
[   58.682416]  ret_from_fork_asm+0x1a/0x30
[   58.686361] 
[   58.687907] The buggy address belongs to the object at ffff8881066eaf00
[   58.687907]  which belongs to the cache kmalloc-64 of size 64
[   58.700247] The buggy address is located 0 bytes to the right of
[   58.700247]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   58.713111] 
[   58.714609] The buggy address belongs to the physical page:
[   58.720183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   58.728188] flags: 0x200000000000000(node=0|zone=2)
[   58.733070] page_type: f5(slab)
[   58.736216] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   58.743964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.751709] page dumped because: kasan: bad access detected
[   58.757285] 
[   58.758781] Memory state around the buggy address:
[   58.763575]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.770797]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   58.778023] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.785241]                                      ^
[   58.790035]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.797254]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.804475] ==================================================================
[   64.869435] ==================================================================
[   64.876686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   64.884086] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   64.891479] 
[   64.892981] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   64.892989] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   64.892992] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.892995] Call Trace:
[   64.892997]  <TASK>
[   64.892998]  dump_stack_lvl+0x73/0xb0
[   64.893003]  print_report+0xd1/0x650
[   64.893007]  ? __virt_addr_valid+0x1db/0x2d0
[   64.893011]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.893015]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.893021]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.893024]  kasan_report+0x141/0x180
[   64.893029]  ? kasan_atomics_helper+0x50d4/0x5450
[   64.893034]  __asan_report_store8_noabort+0x1b/0x30
[   64.893039]  kasan_atomics_helper+0x50d4/0x5450
[   64.893043]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.893047]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.893052]  ? kasan_atomics+0x152/0x310
[   64.893057]  kasan_atomics+0x1dc/0x310
[   64.893062]  ? __pfx_kasan_atomics+0x10/0x10
[   64.893066]  ? ktime_get_ts64+0x83/0x230
[   64.893071]  kunit_try_run_case+0x1a2/0x480
[   64.893075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.893080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.893084]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.893089]  ? __kthread_parkme+0x82/0x180
[   64.893093]  ? preempt_count_sub+0x50/0x80
[   64.893097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.893102]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.893106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.893110]  kthread+0x334/0x6f0
[   64.893114]  ? trace_preempt_on+0x20/0xc0
[   64.893118]  ? __pfx_kthread+0x10/0x10
[   64.893122]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.893126]  ? calculate_sigpending+0x7b/0xa0
[   64.893131]  ? __pfx_kthread+0x10/0x10
[   64.893135]  ret_from_fork+0x113/0x1d0
[   64.893139]  ? __pfx_kthread+0x10/0x10
[   64.893143]  ret_from_fork_asm+0x1a/0x30
[   64.893149]  </TASK>
[   64.893150] 
[   65.072925] Allocated by task 306:
[   65.076360]  kasan_save_stack+0x45/0x70
[   65.080247]  kasan_save_track+0x18/0x40
[   65.084086]  kasan_save_alloc_info+0x3b/0x50
[   65.088361]  __kasan_kmalloc+0xb7/0xc0
[   65.092154]  __kmalloc_cache_noprof+0x189/0x420
[   65.096688]  kasan_atomics+0x95/0x310
[   65.100361]  kunit_try_run_case+0x1a2/0x480
[   65.104590]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.109991]  kthread+0x334/0x6f0
[   65.113232]  ret_from_fork+0x113/0x1d0
[   65.116985]  ret_from_fork_asm+0x1a/0x30
[   65.120919] 
[   65.122425] The buggy address belongs to the object at ffff8881066eaf00
[   65.122425]  which belongs to the cache kmalloc-64 of size 64
[   65.134760] The buggy address is located 0 bytes to the right of
[   65.134760]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   65.147620] 
[   65.149120] The buggy address belongs to the physical page:
[   65.154694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   65.162702] flags: 0x200000000000000(node=0|zone=2)
[   65.167590] page_type: f5(slab)
[   65.170737] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.178482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.186221] page dumped because: kasan: bad access detected
[   65.191794] 
[   65.193295] Memory state around the buggy address:
[   65.198088]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.205315]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   65.212569] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.219788]                                      ^
[   65.224581]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.231801]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.239027] ==================================================================
[   53.500938] ==================================================================
[   53.508186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   53.515500] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   53.522901] 
[   53.524419] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   53.524427] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   53.524430] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.524433] Call Trace:
[   53.524435]  <TASK>
[   53.524437]  dump_stack_lvl+0x73/0xb0
[   53.524441]  print_report+0xd1/0x650
[   53.524445]  ? __virt_addr_valid+0x1db/0x2d0
[   53.524449]  ? kasan_atomics_helper+0x565/0x5450
[   53.524453]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.524459]  ? kasan_atomics_helper+0x565/0x5450
[   53.524463]  kasan_report+0x141/0x180
[   53.524467]  ? kasan_atomics_helper+0x565/0x5450
[   53.524472]  kasan_check_range+0x10c/0x1c0
[   53.524477]  __kasan_check_write+0x18/0x20
[   53.524480]  kasan_atomics_helper+0x565/0x5450
[   53.524484]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.524489]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.524494]  ? kasan_atomics+0x152/0x310
[   53.524499]  kasan_atomics+0x1dc/0x310
[   53.524503]  ? __pfx_kasan_atomics+0x10/0x10
[   53.524508]  ? ktime_get_ts64+0x83/0x230
[   53.524513]  kunit_try_run_case+0x1a2/0x480
[   53.524517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.524522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.524526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.524531]  ? __kthread_parkme+0x82/0x180
[   53.524535]  ? preempt_count_sub+0x50/0x80
[   53.524539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.524544]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.524548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.524553]  kthread+0x334/0x6f0
[   53.524556]  ? trace_preempt_on+0x20/0xc0
[   53.524561]  ? __pfx_kthread+0x10/0x10
[   53.524565]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.524569]  ? calculate_sigpending+0x7b/0xa0
[   53.524573]  ? __pfx_kthread+0x10/0x10
[   53.524578]  ret_from_fork+0x113/0x1d0
[   53.524581]  ? __pfx_kthread+0x10/0x10
[   53.524585]  ret_from_fork_asm+0x1a/0x30
[   53.524591]  </TASK>
[   53.524593] 
[   53.707299] Allocated by task 306:
[   53.710707]  kasan_save_stack+0x45/0x70
[   53.714545]  kasan_save_track+0x18/0x40
[   53.718424]  kasan_save_alloc_info+0x3b/0x50
[   53.722701]  __kasan_kmalloc+0xb7/0xc0
[   53.726452]  __kmalloc_cache_noprof+0x189/0x420
[   53.730986]  kasan_atomics+0x95/0x310
[   53.734652]  kunit_try_run_case+0x1a2/0x480
[   53.738839]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.744247]  kthread+0x334/0x6f0
[   53.747478]  ret_from_fork+0x113/0x1d0
[   53.751231]  ret_from_fork_asm+0x1a/0x30
[   53.755157] 
[   53.756657] The buggy address belongs to the object at ffff8881066eaf00
[   53.756657]  which belongs to the cache kmalloc-64 of size 64
[   53.768997] The buggy address is located 0 bytes to the right of
[   53.768997]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   53.781860] 
[   53.783375] The buggy address belongs to the physical page:
[   53.788956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   53.796957] flags: 0x200000000000000(node=0|zone=2)
[   53.801837] page_type: f5(slab)
[   53.804982] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.812721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.820462] page dumped because: kasan: bad access detected
[   53.826034] 
[   53.827533] Memory state around the buggy address:
[   53.832346]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.839580]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   53.846797] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.854019]                                      ^
[   53.858812]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.866037]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.873257] ==================================================================
[   72.882688] ==================================================================
[   72.889934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   72.897349] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   72.904797] 
[   72.906298] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   72.906306] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   72.906309] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.906313] Call Trace:
[   72.906315]  <TASK>
[   72.906317]  dump_stack_lvl+0x73/0xb0
[   72.906321]  print_report+0xd1/0x650
[   72.906325]  ? __virt_addr_valid+0x1db/0x2d0
[   72.906349]  ? kasan_atomics_helper+0x2006/0x5450
[   72.906353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.906359]  ? kasan_atomics_helper+0x2006/0x5450
[   72.906376]  kasan_report+0x141/0x180
[   72.906381]  ? kasan_atomics_helper+0x2006/0x5450
[   72.906398]  kasan_check_range+0x10c/0x1c0
[   72.906402]  __kasan_check_write+0x18/0x20
[   72.906406]  kasan_atomics_helper+0x2006/0x5450
[   72.906410]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.906414]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.906419]  ? kasan_atomics+0x152/0x310
[   72.906424]  kasan_atomics+0x1dc/0x310
[   72.906429]  ? __pfx_kasan_atomics+0x10/0x10
[   72.906434]  ? ktime_get_ts64+0x83/0x230
[   72.906438]  kunit_try_run_case+0x1a2/0x480
[   72.906443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.906447]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.906452]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.906456]  ? __kthread_parkme+0x82/0x180
[   72.906460]  ? preempt_count_sub+0x50/0x80
[   72.906464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.906469]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.906473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.906478]  kthread+0x334/0x6f0
[   72.906481]  ? trace_preempt_on+0x20/0xc0
[   72.906486]  ? __pfx_kthread+0x10/0x10
[   72.906490]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.906493]  ? calculate_sigpending+0x7b/0xa0
[   72.906498]  ? __pfx_kthread+0x10/0x10
[   72.906502]  ret_from_fork+0x113/0x1d0
[   72.906506]  ? __pfx_kthread+0x10/0x10
[   72.906510]  ret_from_fork_asm+0x1a/0x30
[   72.906515]  </TASK>
[   72.906517] 
[   73.089761] Allocated by task 306:
[   73.093166]  kasan_save_stack+0x45/0x70
[   73.097008]  kasan_save_track+0x18/0x40
[   73.100845]  kasan_save_alloc_info+0x3b/0x50
[   73.105118]  __kasan_kmalloc+0xb7/0xc0
[   73.108871]  __kmalloc_cache_noprof+0x189/0x420
[   73.113421]  kasan_atomics+0x95/0x310
[   73.117088]  kunit_try_run_case+0x1a2/0x480
[   73.121283]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.126682]  kthread+0x334/0x6f0
[   73.129915]  ret_from_fork+0x113/0x1d0
[   73.133665]  ret_from_fork_asm+0x1a/0x30
[   73.137594] 
[   73.139092] The buggy address belongs to the object at ffff8881066eaf00
[   73.139092]  which belongs to the cache kmalloc-64 of size 64
[   73.151434] The buggy address is located 0 bytes to the right of
[   73.151434]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   73.164296] 
[   73.165794] The buggy address belongs to the physical page:
[   73.171365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   73.179428] flags: 0x200000000000000(node=0|zone=2)
[   73.184314] page_type: f5(slab)
[   73.187497] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.195243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.202982] page dumped because: kasan: bad access detected
[   73.208553] 
[   73.210054] Memory state around the buggy address:
[   73.214848]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.222067]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   73.229287] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.236512]                                      ^
[   73.241306]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.248526]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.255752] ==================================================================
[   75.152701] ==================================================================
[   75.159941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   75.167362] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   75.174778] 
[   75.176279] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   75.176287] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   75.176290] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   75.176293] Call Trace:
[   75.176295]  <TASK>
[   75.176297]  dump_stack_lvl+0x73/0xb0
[   75.176301]  print_report+0xd1/0x650
[   75.176305]  ? __virt_addr_valid+0x1db/0x2d0
[   75.176309]  ? kasan_atomics_helper+0x224c/0x5450
[   75.176313]  ? kasan_complete_mode_report_info+0x2a/0x200
[   75.176319]  ? kasan_atomics_helper+0x224c/0x5450
[   75.176323]  kasan_report+0x141/0x180
[   75.176347]  ? kasan_atomics_helper+0x224c/0x5450
[   75.176352]  kasan_check_range+0x10c/0x1c0
[   75.176357]  __kasan_check_write+0x18/0x20
[   75.176361]  kasan_atomics_helper+0x224c/0x5450
[   75.176378]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   75.176382]  ? __kmalloc_cache_noprof+0x189/0x420
[   75.176400]  ? kasan_atomics+0x152/0x310
[   75.176405]  kasan_atomics+0x1dc/0x310
[   75.176409]  ? __pfx_kasan_atomics+0x10/0x10
[   75.176414]  ? ktime_get_ts64+0x83/0x230
[   75.176419]  kunit_try_run_case+0x1a2/0x480
[   75.176423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.176428]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   75.176432]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   75.176437]  ? __kthread_parkme+0x82/0x180
[   75.176441]  ? preempt_count_sub+0x50/0x80
[   75.176445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.176450]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.176454]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   75.176458]  kthread+0x334/0x6f0
[   75.176462]  ? trace_preempt_on+0x20/0xc0
[   75.176466]  ? __pfx_kthread+0x10/0x10
[   75.176470]  ? _raw_spin_unlock_irq+0x47/0x80
[   75.176474]  ? calculate_sigpending+0x7b/0xa0
[   75.176479]  ? __pfx_kthread+0x10/0x10
[   75.176483]  ret_from_fork+0x113/0x1d0
[   75.176486]  ? __pfx_kthread+0x10/0x10
[   75.176490]  ret_from_fork_asm+0x1a/0x30
[   75.176496]  </TASK>
[   75.176498] 
[   75.359613] Allocated by task 306:
[   75.363018]  kasan_save_stack+0x45/0x70
[   75.366857]  kasan_save_track+0x18/0x40
[   75.370698]  kasan_save_alloc_info+0x3b/0x50
[   75.374977]  __kasan_kmalloc+0xb7/0xc0
[   75.378729]  __kmalloc_cache_noprof+0x189/0x420
[   75.383264]  kasan_atomics+0x95/0x310
[   75.386928]  kunit_try_run_case+0x1a2/0x480
[   75.391115]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.396514]  kthread+0x334/0x6f0
[   75.399747]  ret_from_fork+0x113/0x1d0
[   75.403501]  ret_from_fork_asm+0x1a/0x30
[   75.407435] 
[   75.408934] The buggy address belongs to the object at ffff8881066eaf00
[   75.408934]  which belongs to the cache kmalloc-64 of size 64
[   75.421273] The buggy address is located 0 bytes to the right of
[   75.421273]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   75.434137] 
[   75.435636] The buggy address belongs to the physical page:
[   75.441209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   75.449217] flags: 0x200000000000000(node=0|zone=2)
[   75.454096] page_type: f5(slab)
[   75.457243] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   75.464989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.472730] page dumped because: kasan: bad access detected
[   75.478302] 
[   75.479801] Memory state around the buggy address:
[   75.484592]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.491813]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   75.499031] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.506252]                                      ^
[   75.511043]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.518263]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.525481] ==================================================================
[   75.532707] ==================================================================
[   75.539947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   75.547362] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   75.554715] 
[   75.556215] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   75.556223] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   75.556225] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   75.556229] Call Trace:
[   75.556231]  <TASK>
[   75.556232]  dump_stack_lvl+0x73/0xb0
[   75.556237]  print_report+0xd1/0x650
[   75.556241]  ? __virt_addr_valid+0x1db/0x2d0
[   75.556245]  ? kasan_atomics_helper+0x5115/0x5450
[   75.556249]  ? kasan_complete_mode_report_info+0x2a/0x200
[   75.556254]  ? kasan_atomics_helper+0x5115/0x5450
[   75.556258]  kasan_report+0x141/0x180
[   75.556263]  ? kasan_atomics_helper+0x5115/0x5450
[   75.556268]  __asan_report_load8_noabort+0x18/0x20
[   75.556273]  kasan_atomics_helper+0x5115/0x5450
[   75.556277]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   75.556281]  ? __kmalloc_cache_noprof+0x189/0x420
[   75.556286]  ? kasan_atomics+0x152/0x310
[   75.556291]  kasan_atomics+0x1dc/0x310
[   75.556296]  ? __pfx_kasan_atomics+0x10/0x10
[   75.556300]  ? ktime_get_ts64+0x83/0x230
[   75.556305]  kunit_try_run_case+0x1a2/0x480
[   75.556310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.556314]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   75.556319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   75.556323]  ? __kthread_parkme+0x82/0x180
[   75.556327]  ? preempt_count_sub+0x50/0x80
[   75.556351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.556356]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.556360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   75.556377]  kthread+0x334/0x6f0
[   75.556381]  ? trace_preempt_on+0x20/0xc0
[   75.556386]  ? __pfx_kthread+0x10/0x10
[   75.556402]  ? _raw_spin_unlock_irq+0x47/0x80
[   75.556406]  ? calculate_sigpending+0x7b/0xa0
[   75.556411]  ? __pfx_kthread+0x10/0x10
[   75.556415]  ret_from_fork+0x113/0x1d0
[   75.556418]  ? __pfx_kthread+0x10/0x10
[   75.556422]  ret_from_fork_asm+0x1a/0x30
[   75.556428]  </TASK>
[   75.556430] 
[   75.736090] Allocated by task 306:
[   75.739495]  kasan_save_stack+0x45/0x70
[   75.743364]  kasan_save_track+0x18/0x40
[   75.747226]  kasan_save_alloc_info+0x3b/0x50
[   75.751497]  __kasan_kmalloc+0xb7/0xc0
[   75.755252]  __kmalloc_cache_noprof+0x189/0x420
[   75.759794]  kasan_atomics+0x95/0x310
[   75.763469]  kunit_try_run_case+0x1a2/0x480
[   75.767661]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.773061]  kthread+0x334/0x6f0
[   75.776293]  ret_from_fork+0x113/0x1d0
[   75.780048]  ret_from_fork_asm+0x1a/0x30
[   75.783981] 
[   75.785480] The buggy address belongs to the object at ffff8881066eaf00
[   75.785480]  which belongs to the cache kmalloc-64 of size 64
[   75.797813] The buggy address is located 0 bytes to the right of
[   75.797813]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   75.810676] 
[   75.812175] The buggy address belongs to the physical page:
[   75.817747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   75.825746] flags: 0x200000000000000(node=0|zone=2)
[   75.830626] page_type: f5(slab)
[   75.833774] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   75.841521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.849268] page dumped because: kasan: bad access detected
[   75.854841] 
[   75.856364] Memory state around the buggy address:
[   75.861201]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.868420]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   75.875640] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.882859]                                      ^
[   75.887653]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.894872]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.902092] ==================================================================
[   59.191352] ==================================================================
[   59.198605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   59.205912] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   59.213311] 
[   59.214814] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   59.214822] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   59.214825] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   59.214828] Call Trace:
[   59.214830]  <TASK>
[   59.214832]  dump_stack_lvl+0x73/0xb0
[   59.214837]  print_report+0xd1/0x650
[   59.214841]  ? __virt_addr_valid+0x1db/0x2d0
[   59.214845]  ? kasan_atomics_helper+0xe78/0x5450
[   59.214849]  ? kasan_complete_mode_report_info+0x2a/0x200
[   59.214854]  ? kasan_atomics_helper+0xe78/0x5450
[   59.214858]  kasan_report+0x141/0x180
[   59.214863]  ? kasan_atomics_helper+0xe78/0x5450
[   59.214867]  kasan_check_range+0x10c/0x1c0
[   59.214872]  __kasan_check_write+0x18/0x20
[   59.214876]  kasan_atomics_helper+0xe78/0x5450
[   59.214880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   59.214884]  ? __kmalloc_cache_noprof+0x189/0x420
[   59.214889]  ? kasan_atomics+0x152/0x310
[   59.214894]  kasan_atomics+0x1dc/0x310
[   59.214899]  ? __pfx_kasan_atomics+0x10/0x10
[   59.214904]  ? ktime_get_ts64+0x83/0x230
[   59.214908]  kunit_try_run_case+0x1a2/0x480
[   59.214913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.214917]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   59.214921]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   59.214926]  ? __kthread_parkme+0x82/0x180
[   59.214930]  ? preempt_count_sub+0x50/0x80
[   59.214934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.214939]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.214943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   59.214947]  kthread+0x334/0x6f0
[   59.214951]  ? trace_preempt_on+0x20/0xc0
[   59.214955]  ? __pfx_kthread+0x10/0x10
[   59.214959]  ? _raw_spin_unlock_irq+0x47/0x80
[   59.214963]  ? calculate_sigpending+0x7b/0xa0
[   59.214968]  ? __pfx_kthread+0x10/0x10
[   59.214972]  ret_from_fork+0x113/0x1d0
[   59.214975]  ? __pfx_kthread+0x10/0x10
[   59.214979]  ret_from_fork_asm+0x1a/0x30
[   59.214985]  </TASK>
[   59.214987] 
[   59.397774] Allocated by task 306:
[   59.401180]  kasan_save_stack+0x45/0x70
[   59.405017]  kasan_save_track+0x18/0x40
[   59.408859]  kasan_save_alloc_info+0x3b/0x50
[   59.413139]  __kasan_kmalloc+0xb7/0xc0
[   59.416892]  __kmalloc_cache_noprof+0x189/0x420
[   59.421431]  kasan_atomics+0x95/0x310
[   59.425100]  kunit_try_run_case+0x1a2/0x480
[   59.429293]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.434694]  kthread+0x334/0x6f0
[   59.437934]  ret_from_fork+0x113/0x1d0
[   59.441686]  ret_from_fork_asm+0x1a/0x30
[   59.445612] 
[   59.447112] The buggy address belongs to the object at ffff8881066eaf00
[   59.447112]  which belongs to the cache kmalloc-64 of size 64
[   59.459455] The buggy address is located 0 bytes to the right of
[   59.459455]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   59.472315] 
[   59.473849] The buggy address belongs to the physical page:
[   59.479432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   59.487437] flags: 0x200000000000000(node=0|zone=2)
[   59.492318] page_type: f5(slab)
[   59.495499] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.503238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.510978] page dumped because: kasan: bad access detected
[   59.516549] 
[   59.518050] Memory state around the buggy address:
[   59.522843]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.530068]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   59.537290] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.544516]                                      ^
[   59.549310]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.556530]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.563756] ==================================================================
[   63.732930] ==================================================================
[   63.740170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   63.747563] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   63.754878] 
[   63.756417] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   63.756425] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   63.756428] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.756431] Call Trace:
[   63.756433]  <TASK>
[   63.756435]  dump_stack_lvl+0x73/0xb0
[   63.756439]  print_report+0xd1/0x650
[   63.756443]  ? __virt_addr_valid+0x1db/0x2d0
[   63.756447]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.756451]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.756456]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.756460]  kasan_report+0x141/0x180
[   63.756465]  ? kasan_atomics_helper+0x13b5/0x5450
[   63.756470]  kasan_check_range+0x10c/0x1c0
[   63.756474]  __kasan_check_read+0x15/0x20
[   63.756478]  kasan_atomics_helper+0x13b5/0x5450
[   63.756482]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.756486]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.756491]  ? kasan_atomics+0x152/0x310
[   63.756496]  kasan_atomics+0x1dc/0x310
[   63.756500]  ? __pfx_kasan_atomics+0x10/0x10
[   63.756505]  ? ktime_get_ts64+0x83/0x230
[   63.756510]  kunit_try_run_case+0x1a2/0x480
[   63.756514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.756519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.756523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.756528]  ? __kthread_parkme+0x82/0x180
[   63.756531]  ? preempt_count_sub+0x50/0x80
[   63.756536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.756540]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.756545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.756549]  kthread+0x334/0x6f0
[   63.756553]  ? trace_preempt_on+0x20/0xc0
[   63.756557]  ? __pfx_kthread+0x10/0x10
[   63.756561]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.756565]  ? calculate_sigpending+0x7b/0xa0
[   63.756570]  ? __pfx_kthread+0x10/0x10
[   63.756574]  ret_from_fork+0x113/0x1d0
[   63.756577]  ? __pfx_kthread+0x10/0x10
[   63.756581]  ret_from_fork_asm+0x1a/0x30
[   63.756587]  </TASK>
[   63.756589] 
[   63.939598] Allocated by task 306:
[   63.943002]  kasan_save_stack+0x45/0x70
[   63.946843]  kasan_save_track+0x18/0x40
[   63.950682]  kasan_save_alloc_info+0x3b/0x50
[   63.954964]  __kasan_kmalloc+0xb7/0xc0
[   63.958716]  __kmalloc_cache_noprof+0x189/0x420
[   63.963249]  kasan_atomics+0x95/0x310
[   63.966915]  kunit_try_run_case+0x1a2/0x480
[   63.971109]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.976508]  kthread+0x334/0x6f0
[   63.979740]  ret_from_fork+0x113/0x1d0
[   63.983495]  ret_from_fork_asm+0x1a/0x30
[   63.987431] 
[   63.988936] The buggy address belongs to the object at ffff8881066eaf00
[   63.988936]  which belongs to the cache kmalloc-64 of size 64
[   64.001270] The buggy address is located 0 bytes to the right of
[   64.001270]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   64.014137] 
[   64.015639] The buggy address belongs to the physical page:
[   64.021211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   64.029220] flags: 0x200000000000000(node=0|zone=2)
[   64.034106] page_type: f5(slab)
[   64.037255] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.045002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.052748] page dumped because: kasan: bad access detected
[   64.058323] 
[   64.059854] Memory state around the buggy address:
[   64.064649]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.071869]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   64.079095] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.086313]                                      ^
[   64.091143]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.098365]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.105632] ==================================================================
[   51.988532] ==================================================================
[   51.995771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   52.003078] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   52.010417] 
[   52.011919] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   52.011927] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   52.011930] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.011934] Call Trace:
[   52.011935]  <TASK>
[   52.011937]  dump_stack_lvl+0x73/0xb0
[   52.011942]  print_report+0xd1/0x650
[   52.011946]  ? __virt_addr_valid+0x1db/0x2d0
[   52.011950]  ? kasan_atomics_helper+0x3df/0x5450
[   52.011954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.011959]  ? kasan_atomics_helper+0x3df/0x5450
[   52.011963]  kasan_report+0x141/0x180
[   52.011967]  ? kasan_atomics_helper+0x3df/0x5450
[   52.011972]  kasan_check_range+0x10c/0x1c0
[   52.011977]  __kasan_check_read+0x15/0x20
[   52.011980]  kasan_atomics_helper+0x3df/0x5450
[   52.011985]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.011989]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.011994]  ? kasan_atomics+0x152/0x310
[   52.011999]  kasan_atomics+0x1dc/0x310
[   52.012003]  ? __pfx_kasan_atomics+0x10/0x10
[   52.012008]  ? ktime_get_ts64+0x83/0x230
[   52.012013]  kunit_try_run_case+0x1a2/0x480
[   52.012017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.012022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.012026]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.012030]  ? __kthread_parkme+0x82/0x180
[   52.012034]  ? preempt_count_sub+0x50/0x80
[   52.012038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.012043]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.012048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.012052]  kthread+0x334/0x6f0
[   52.012056]  ? trace_preempt_on+0x20/0xc0
[   52.012060]  ? __pfx_kthread+0x10/0x10
[   52.012064]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.012068]  ? calculate_sigpending+0x7b/0xa0
[   52.012072]  ? __pfx_kthread+0x10/0x10
[   52.012076]  ret_from_fork+0x113/0x1d0
[   52.012080]  ? __pfx_kthread+0x10/0x10
[   52.012084]  ret_from_fork_asm+0x1a/0x30
[   52.012090]  </TASK>
[   52.012092] 
[   52.194775] Allocated by task 306:
[   52.198180]  kasan_save_stack+0x45/0x70
[   52.202019]  kasan_save_track+0x18/0x40
[   52.205859]  kasan_save_alloc_info+0x3b/0x50
[   52.210133]  __kasan_kmalloc+0xb7/0xc0
[   52.213883]  __kmalloc_cache_noprof+0x189/0x420
[   52.218419]  kasan_atomics+0x95/0x310
[   52.222092]  kunit_try_run_case+0x1a2/0x480
[   52.226278]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.231676]  kthread+0x334/0x6f0
[   52.234909]  ret_from_fork+0x113/0x1d0
[   52.238661]  ret_from_fork_asm+0x1a/0x30
[   52.242589] 
[   52.244089] The buggy address belongs to the object at ffff8881066eaf00
[   52.244089]  which belongs to the cache kmalloc-64 of size 64
[   52.256428] The buggy address is located 0 bytes to the right of
[   52.256428]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   52.269291] 
[   52.270788] The buggy address belongs to the physical page:
[   52.276376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   52.284418] flags: 0x200000000000000(node=0|zone=2)
[   52.289302] page_type: f5(slab)
[   52.292450] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   52.300196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.307933] page dumped because: kasan: bad access detected
[   52.313508] 
[   52.315008] Memory state around the buggy address:
[   52.319800]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.327018]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   52.334238] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.341457]                                      ^
[   52.346249]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.353469]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   52.360689] ==================================================================
[   62.599915] ==================================================================
[   62.607155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   62.614546] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   62.621855] 
[   62.623376] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   62.623384] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   62.623387] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   62.623391] Call Trace:
[   62.623393]  <TASK>
[   62.623395]  dump_stack_lvl+0x73/0xb0
[   62.623412]  print_report+0xd1/0x650
[   62.623416]  ? __virt_addr_valid+0x1db/0x2d0
[   62.623420]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.623424]  ? kasan_complete_mode_report_info+0x2a/0x200
[   62.623429]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.623433]  kasan_report+0x141/0x180
[   62.623437]  ? kasan_atomics_helper+0x49e8/0x5450
[   62.623442]  __asan_report_load4_noabort+0x18/0x20
[   62.623447]  kasan_atomics_helper+0x49e8/0x5450
[   62.623451]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   62.623455]  ? __kmalloc_cache_noprof+0x189/0x420
[   62.623460]  ? kasan_atomics+0x152/0x310
[   62.623465]  kasan_atomics+0x1dc/0x310
[   62.623469]  ? __pfx_kasan_atomics+0x10/0x10
[   62.623474]  ? ktime_get_ts64+0x83/0x230
[   62.623479]  kunit_try_run_case+0x1a2/0x480
[   62.623483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.623488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   62.623492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   62.623497]  ? __kthread_parkme+0x82/0x180
[   62.623500]  ? preempt_count_sub+0x50/0x80
[   62.623505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   62.623509]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.623514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   62.623518]  kthread+0x334/0x6f0
[   62.623522]  ? trace_preempt_on+0x20/0xc0
[   62.623526]  ? __pfx_kthread+0x10/0x10
[   62.623530]  ? _raw_spin_unlock_irq+0x47/0x80
[   62.623534]  ? calculate_sigpending+0x7b/0xa0
[   62.623539]  ? __pfx_kthread+0x10/0x10
[   62.623543]  ret_from_fork+0x113/0x1d0
[   62.623547]  ? __pfx_kthread+0x10/0x10
[   62.623551]  ret_from_fork_asm+0x1a/0x30
[   62.623557]  </TASK>
[   62.623558] 
[   62.803263] Allocated by task 306:
[   62.806669]  kasan_save_stack+0x45/0x70
[   62.810507]  kasan_save_track+0x18/0x40
[   62.814362]  kasan_save_alloc_info+0x3b/0x50
[   62.818682]  __kasan_kmalloc+0xb7/0xc0
[   62.822434]  __kmalloc_cache_noprof+0x189/0x420
[   62.826966]  kasan_atomics+0x95/0x310
[   62.830632]  kunit_try_run_case+0x1a2/0x480
[   62.834819]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   62.840217]  kthread+0x334/0x6f0
[   62.843449]  ret_from_fork+0x113/0x1d0
[   62.847203]  ret_from_fork_asm+0x1a/0x30
[   62.851129] 
[   62.852630] The buggy address belongs to the object at ffff8881066eaf00
[   62.852630]  which belongs to the cache kmalloc-64 of size 64
[   62.864969] The buggy address is located 0 bytes to the right of
[   62.864969]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   62.877831] 
[   62.879361] The buggy address belongs to the physical page:
[   62.884957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   62.892963] flags: 0x200000000000000(node=0|zone=2)
[   62.897844] page_type: f5(slab)
[   62.900988] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   62.908728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.916469] page dumped because: kasan: bad access detected
[   62.922041] 
[   62.923538] Memory state around the buggy address:
[   62.928363]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.935631]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   62.942847] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.950069]                                      ^
[   62.954860]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.962080]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   62.969307] ==================================================================
[   74.776191] ==================================================================
[   74.783437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   74.790837] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   74.798145] 
[   74.799645] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   74.799653] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   74.799656] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.799659] Call Trace:
[   74.799661]  <TASK>
[   74.799663]  dump_stack_lvl+0x73/0xb0
[   74.799667]  print_report+0xd1/0x650
[   74.799671]  ? __virt_addr_valid+0x1db/0x2d0
[   74.799675]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.799679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.799685]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.799689]  kasan_report+0x141/0x180
[   74.799693]  ? kasan_atomics_helper+0x4fa5/0x5450
[   74.799698]  __asan_report_load8_noabort+0x18/0x20
[   74.799703]  kasan_atomics_helper+0x4fa5/0x5450
[   74.799707]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.799712]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.799717]  ? kasan_atomics+0x152/0x310
[   74.799722]  kasan_atomics+0x1dc/0x310
[   74.799726]  ? __pfx_kasan_atomics+0x10/0x10
[   74.799731]  ? ktime_get_ts64+0x83/0x230
[   74.799735]  kunit_try_run_case+0x1a2/0x480
[   74.799740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.799745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.799749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.799754]  ? __kthread_parkme+0x82/0x180
[   74.799757]  ? preempt_count_sub+0x50/0x80
[   74.799762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.799766]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.799771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.799775]  kthread+0x334/0x6f0
[   74.799779]  ? trace_preempt_on+0x20/0xc0
[   74.799783]  ? __pfx_kthread+0x10/0x10
[   74.799787]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.799791]  ? calculate_sigpending+0x7b/0xa0
[   74.799795]  ? __pfx_kthread+0x10/0x10
[   74.799800]  ret_from_fork+0x113/0x1d0
[   74.799803]  ? __pfx_kthread+0x10/0x10
[   74.799807]  ret_from_fork_asm+0x1a/0x30
[   74.799813]  </TASK>
[   74.799815] 
[   74.979469] Allocated by task 306:
[   74.982875]  kasan_save_stack+0x45/0x70
[   74.986721]  kasan_save_track+0x18/0x40
[   74.990559]  kasan_save_alloc_info+0x3b/0x50
[   74.994835]  __kasan_kmalloc+0xb7/0xc0
[   74.998586]  __kmalloc_cache_noprof+0x189/0x420
[   75.003118]  kasan_atomics+0x95/0x310
[   75.006786]  kunit_try_run_case+0x1a2/0x480
[   75.010980]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.016413]  kthread+0x334/0x6f0
[   75.019646]  ret_from_fork+0x113/0x1d0
[   75.023414]  ret_from_fork_asm+0x1a/0x30
[   75.027363] 
[   75.028909] The buggy address belongs to the object at ffff8881066eaf00
[   75.028909]  which belongs to the cache kmalloc-64 of size 64
[   75.041242] The buggy address is located 0 bytes to the right of
[   75.041242]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   75.054104] 
[   75.055604] The buggy address belongs to the physical page:
[   75.061176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   75.069184] flags: 0x200000000000000(node=0|zone=2)
[   75.074065] page_type: f5(slab)
[   75.077212] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   75.084959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   75.092706] page dumped because: kasan: bad access detected
[   75.098279] 
[   75.099778] Memory state around the buggy address:
[   75.104571]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   75.111790]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   75.119017] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.126236]                                      ^
[   75.131028]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.138250]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.145477] ==================================================================
[   60.330093] ==================================================================
[   60.337365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   60.344810] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   60.352117] 
[   60.353617] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   60.353625] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   60.353628] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   60.353631] Call Trace:
[   60.353633]  <TASK>
[   60.353635]  dump_stack_lvl+0x73/0xb0
[   60.353639]  print_report+0xd1/0x650
[   60.353643]  ? __virt_addr_valid+0x1db/0x2d0
[   60.353647]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.353651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   60.353657]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.353661]  kasan_report+0x141/0x180
[   60.353665]  ? kasan_atomics_helper+0x4a36/0x5450
[   60.353670]  __asan_report_load4_noabort+0x18/0x20
[   60.353675]  kasan_atomics_helper+0x4a36/0x5450
[   60.353679]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   60.353683]  ? __kmalloc_cache_noprof+0x189/0x420
[   60.353688]  ? kasan_atomics+0x152/0x310
[   60.353693]  kasan_atomics+0x1dc/0x310
[   60.353697]  ? __pfx_kasan_atomics+0x10/0x10
[   60.353702]  ? ktime_get_ts64+0x83/0x230
[   60.353707]  kunit_try_run_case+0x1a2/0x480
[   60.353711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.353716]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   60.353720]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   60.353725]  ? __kthread_parkme+0x82/0x180
[   60.353729]  ? preempt_count_sub+0x50/0x80
[   60.353733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.353738]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.353742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   60.353746]  kthread+0x334/0x6f0
[   60.353750]  ? trace_preempt_on+0x20/0xc0
[   60.353754]  ? __pfx_kthread+0x10/0x10
[   60.353758]  ? _raw_spin_unlock_irq+0x47/0x80
[   60.353762]  ? calculate_sigpending+0x7b/0xa0
[   60.353767]  ? __pfx_kthread+0x10/0x10
[   60.353771]  ret_from_fork+0x113/0x1d0
[   60.353775]  ? __pfx_kthread+0x10/0x10
[   60.353779]  ret_from_fork_asm+0x1a/0x30
[   60.353785]  </TASK>
[   60.353786] 
[   60.533428] Allocated by task 306:
[   60.536835]  kasan_save_stack+0x45/0x70
[   60.540675]  kasan_save_track+0x18/0x40
[   60.544516]  kasan_save_alloc_info+0x3b/0x50
[   60.548797]  __kasan_kmalloc+0xb7/0xc0
[   60.552549]  __kmalloc_cache_noprof+0x189/0x420
[   60.557092]  kasan_atomics+0x95/0x310
[   60.560764]  kunit_try_run_case+0x1a2/0x480
[   60.564950]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.570363]  kthread+0x334/0x6f0
[   60.573618]  ret_from_fork+0x113/0x1d0
[   60.577371]  ret_from_fork_asm+0x1a/0x30
[   60.581363] 
[   60.582884] The buggy address belongs to the object at ffff8881066eaf00
[   60.582884]  which belongs to the cache kmalloc-64 of size 64
[   60.595224] The buggy address is located 0 bytes to the right of
[   60.595224]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   60.608086] 
[   60.609583] The buggy address belongs to the physical page:
[   60.615157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   60.623164] flags: 0x200000000000000(node=0|zone=2)
[   60.628046] page_type: f5(slab)
[   60.631192] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   60.638939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.646687] page dumped because: kasan: bad access detected
[   60.652258] 
[   60.653757] Memory state around the buggy address:
[   60.658550]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.665770]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   60.672991] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.680217]                                      ^
[   60.685011]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.692237]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   60.699457] ==================================================================
[   70.182972] ==================================================================
[   70.190211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   70.197605] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   70.204996] 
[   70.206498] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   70.206506] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   70.206509] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.206512] Call Trace:
[   70.206514]  <TASK>
[   70.206516]  dump_stack_lvl+0x73/0xb0
[   70.206520]  print_report+0xd1/0x650
[   70.206524]  ? __virt_addr_valid+0x1db/0x2d0
[   70.206528]  ? kasan_atomics_helper+0x1ce1/0x5450
[   70.206532]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.206538]  ? kasan_atomics_helper+0x1ce1/0x5450
[   70.206542]  kasan_report+0x141/0x180
[   70.206546]  ? kasan_atomics_helper+0x1ce1/0x5450
[   70.206551]  kasan_check_range+0x10c/0x1c0
[   70.206555]  __kasan_check_write+0x18/0x20
[   70.206559]  kasan_atomics_helper+0x1ce1/0x5450
[   70.206563]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.206567]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.206572]  ? kasan_atomics+0x152/0x310
[   70.206577]  kasan_atomics+0x1dc/0x310
[   70.206582]  ? __pfx_kasan_atomics+0x10/0x10
[   70.206587]  ? ktime_get_ts64+0x83/0x230
[   70.206591]  kunit_try_run_case+0x1a2/0x480
[   70.206596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.206600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.206604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.206609]  ? __kthread_parkme+0x82/0x180
[   70.206612]  ? preempt_count_sub+0x50/0x80
[   70.206617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.206621]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.206626]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.206630]  kthread+0x334/0x6f0
[   70.206634]  ? trace_preempt_on+0x20/0xc0
[   70.206638]  ? __pfx_kthread+0x10/0x10
[   70.206642]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.206646]  ? calculate_sigpending+0x7b/0xa0
[   70.206651]  ? __pfx_kthread+0x10/0x10
[   70.206655]  ret_from_fork+0x113/0x1d0
[   70.206659]  ? __pfx_kthread+0x10/0x10
[   70.206662]  ret_from_fork_asm+0x1a/0x30
[   70.206668]  </TASK>
[   70.206670] 
[   70.389794] Allocated by task 306:
[   70.393200]  kasan_save_stack+0x45/0x70
[   70.397040]  kasan_save_track+0x18/0x40
[   70.400880]  kasan_save_alloc_info+0x3b/0x50
[   70.405153]  __kasan_kmalloc+0xb7/0xc0
[   70.408906]  __kmalloc_cache_noprof+0x189/0x420
[   70.413446]  kasan_atomics+0x95/0x310
[   70.417111]  kunit_try_run_case+0x1a2/0x480
[   70.421298]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.426698]  kthread+0x334/0x6f0
[   70.429930]  ret_from_fork+0x113/0x1d0
[   70.433682]  ret_from_fork_asm+0x1a/0x30
[   70.437609] 
[   70.439109] The buggy address belongs to the object at ffff8881066eaf00
[   70.439109]  which belongs to the cache kmalloc-64 of size 64
[   70.451451] The buggy address is located 0 bytes to the right of
[   70.451451]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   70.464319] 
[   70.465852] The buggy address belongs to the physical page:
[   70.471432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   70.479435] flags: 0x200000000000000(node=0|zone=2)
[   70.484314] page_type: f5(slab)
[   70.487496] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.495242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.502981] page dumped because: kasan: bad access detected
[   70.508552] 
[   70.510052] Memory state around the buggy address:
[   70.514847]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.522075]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   70.529303] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.536531]                                      ^
[   70.541323]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.548594]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   70.555812] ==================================================================
[   50.858588] ==================================================================
[   50.865818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   50.873219] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   50.880618] 
[   50.882120] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   50.882129] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   50.882131] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   50.882135] Call Trace:
[   50.882136]  <TASK>
[   50.882138]  dump_stack_lvl+0x73/0xb0
[   50.882143]  print_report+0xd1/0x650
[   50.882147]  ? __virt_addr_valid+0x1db/0x2d0
[   50.882151]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.882155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   50.882160]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.882164]  kasan_report+0x141/0x180
[   50.882169]  ? kasan_atomics_helper+0x4ba2/0x5450
[   50.882173]  __asan_report_store4_noabort+0x1b/0x30
[   50.882179]  kasan_atomics_helper+0x4ba2/0x5450
[   50.882183]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   50.882187]  ? __kmalloc_cache_noprof+0x189/0x420
[   50.882192]  ? kasan_atomics+0x152/0x310
[   50.882197]  kasan_atomics+0x1dc/0x310
[   50.882201]  ? __pfx_kasan_atomics+0x10/0x10
[   50.882206]  ? ktime_get_ts64+0x83/0x230
[   50.882211]  kunit_try_run_case+0x1a2/0x480
[   50.882215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.882220]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   50.882224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   50.882229]  ? __kthread_parkme+0x82/0x180
[   50.882233]  ? preempt_count_sub+0x50/0x80
[   50.882237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   50.882242]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   50.882246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   50.882250]  kthread+0x334/0x6f0
[   50.882254]  ? trace_preempt_on+0x20/0xc0
[   50.882258]  ? __pfx_kthread+0x10/0x10
[   50.882262]  ? _raw_spin_unlock_irq+0x47/0x80
[   50.882266]  ? calculate_sigpending+0x7b/0xa0
[   50.882271]  ? __pfx_kthread+0x10/0x10
[   50.882275]  ret_from_fork+0x113/0x1d0
[   50.882279]  ? __pfx_kthread+0x10/0x10
[   50.882283]  ret_from_fork_asm+0x1a/0x30
[   50.882289]  </TASK>
[   50.882291] 
[   51.062089] Allocated by task 306:
[   51.065494]  kasan_save_stack+0x45/0x70
[   51.069363]  kasan_save_track+0x18/0x40
[   51.073245]  kasan_save_alloc_info+0x3b/0x50
[   51.077524]  __kasan_kmalloc+0xb7/0xc0
[   51.081278]  __kmalloc_cache_noprof+0x189/0x420
[   51.085811]  kasan_atomics+0x95/0x310
[   51.089485]  kunit_try_run_case+0x1a2/0x480
[   51.093671]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.099071]  kthread+0x334/0x6f0
[   51.102302]  ret_from_fork+0x113/0x1d0
[   51.106056]  ret_from_fork_asm+0x1a/0x30
[   51.109981] 
[   51.111480] The buggy address belongs to the object at ffff8881066eaf00
[   51.111480]  which belongs to the cache kmalloc-64 of size 64
[   51.123824] The buggy address is located 0 bytes to the right of
[   51.123824]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   51.136694] 
[   51.138193] The buggy address belongs to the physical page:
[   51.143763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   51.151762] flags: 0x200000000000000(node=0|zone=2)
[   51.156643] page_type: f5(slab)
[   51.159789] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   51.167529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.175267] page dumped because: kasan: bad access detected
[   51.180839] 
[   51.182362] Memory state around the buggy address:
[   51.187201]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.194420]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   51.201641] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.208859]                                      ^
[   51.213651]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.220872]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.228090] ==================================================================
[   55.018931] ==================================================================
[   55.026170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   55.033476] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   55.040870] 
[   55.042382] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   55.042403] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   55.042406] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.042410] Call Trace:
[   55.042411]  <TASK>
[   55.042413]  dump_stack_lvl+0x73/0xb0
[   55.042418]  print_report+0xd1/0x650
[   55.042422]  ? __virt_addr_valid+0x1db/0x2d0
[   55.042426]  ? kasan_atomics_helper+0x7c7/0x5450
[   55.042430]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.042435]  ? kasan_atomics_helper+0x7c7/0x5450
[   55.042439]  kasan_report+0x141/0x180
[   55.042443]  ? kasan_atomics_helper+0x7c7/0x5450
[   55.042448]  kasan_check_range+0x10c/0x1c0
[   55.042453]  __kasan_check_write+0x18/0x20
[   55.042456]  kasan_atomics_helper+0x7c7/0x5450
[   55.042461]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.042465]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.042470]  ? kasan_atomics+0x152/0x310
[   55.042475]  kasan_atomics+0x1dc/0x310
[   55.042479]  ? __pfx_kasan_atomics+0x10/0x10
[   55.042484]  ? ktime_get_ts64+0x83/0x230
[   55.042489]  kunit_try_run_case+0x1a2/0x480
[   55.042493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.042498]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.042502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.042507]  ? __kthread_parkme+0x82/0x180
[   55.042511]  ? preempt_count_sub+0x50/0x80
[   55.042515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.042520]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.042524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.042528]  kthread+0x334/0x6f0
[   55.042532]  ? trace_preempt_on+0x20/0xc0
[   55.042536]  ? __pfx_kthread+0x10/0x10
[   55.042540]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.042544]  ? calculate_sigpending+0x7b/0xa0
[   55.042549]  ? __pfx_kthread+0x10/0x10
[   55.042553]  ret_from_fork+0x113/0x1d0
[   55.042557]  ? __pfx_kthread+0x10/0x10
[   55.042561]  ret_from_fork_asm+0x1a/0x30
[   55.042567]  </TASK>
[   55.042569] 
[   55.225251] Allocated by task 306:
[   55.228657]  kasan_save_stack+0x45/0x70
[   55.232496]  kasan_save_track+0x18/0x40
[   55.236376]  kasan_save_alloc_info+0x3b/0x50
[   55.240677]  __kasan_kmalloc+0xb7/0xc0
[   55.244431]  __kmalloc_cache_noprof+0x189/0x420
[   55.248964]  kasan_atomics+0x95/0x310
[   55.252637]  kunit_try_run_case+0x1a2/0x480
[   55.256823]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.262225]  kthread+0x334/0x6f0
[   55.265465]  ret_from_fork+0x113/0x1d0
[   55.269216]  ret_from_fork_asm+0x1a/0x30
[   55.273142] 
[   55.274643] The buggy address belongs to the object at ffff8881066eaf00
[   55.274643]  which belongs to the cache kmalloc-64 of size 64
[   55.286984] The buggy address is located 0 bytes to the right of
[   55.286984]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   55.299846] 
[   55.301364] The buggy address belongs to the physical page:
[   55.306986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   55.314985] flags: 0x200000000000000(node=0|zone=2)
[   55.319864] page_type: f5(slab)
[   55.323011] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   55.330752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.338499] page dumped because: kasan: bad access detected
[   55.344072] 
[   55.345571] Memory state around the buggy address:
[   55.350365]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.357626]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   55.364844] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.372065]                                      ^
[   55.376857]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.384076]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.391296] ==================================================================
[   73.639578] ==================================================================
[   73.646816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   73.654210] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   73.661602] 
[   73.663102] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   73.663110] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   73.663113] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   73.663116] Call Trace:
[   73.663118]  <TASK>
[   73.663120]  dump_stack_lvl+0x73/0xb0
[   73.663125]  print_report+0xd1/0x650
[   73.663129]  ? __virt_addr_valid+0x1db/0x2d0
[   73.663133]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.663137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   73.663142]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.663146]  kasan_report+0x141/0x180
[   73.663151]  ? kasan_atomics_helper+0x20c8/0x5450
[   73.663155]  kasan_check_range+0x10c/0x1c0
[   73.663160]  __kasan_check_write+0x18/0x20
[   73.663164]  kasan_atomics_helper+0x20c8/0x5450
[   73.663168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   73.663172]  ? __kmalloc_cache_noprof+0x189/0x420
[   73.663177]  ? kasan_atomics+0x152/0x310
[   73.663182]  kasan_atomics+0x1dc/0x310
[   73.663187]  ? __pfx_kasan_atomics+0x10/0x10
[   73.663192]  ? ktime_get_ts64+0x83/0x230
[   73.663196]  kunit_try_run_case+0x1a2/0x480
[   73.663201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.663205]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   73.663209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   73.663214]  ? __kthread_parkme+0x82/0x180
[   73.663218]  ? preempt_count_sub+0x50/0x80
[   73.663222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   73.663226]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.663231]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   73.663235]  kthread+0x334/0x6f0
[   73.663239]  ? trace_preempt_on+0x20/0xc0
[   73.663243]  ? __pfx_kthread+0x10/0x10
[   73.663247]  ? _raw_spin_unlock_irq+0x47/0x80
[   73.663251]  ? calculate_sigpending+0x7b/0xa0
[   73.663256]  ? __pfx_kthread+0x10/0x10
[   73.663260]  ret_from_fork+0x113/0x1d0
[   73.663263]  ? __pfx_kthread+0x10/0x10
[   73.663267]  ret_from_fork_asm+0x1a/0x30
[   73.663273]  </TASK>
[   73.663275] 
[   73.846454] Allocated by task 306:
[   73.849860]  kasan_save_stack+0x45/0x70
[   73.853697]  kasan_save_track+0x18/0x40
[   73.857537]  kasan_save_alloc_info+0x3b/0x50
[   73.861811]  __kasan_kmalloc+0xb7/0xc0
[   73.865563]  __kmalloc_cache_noprof+0x189/0x420
[   73.870105]  kasan_atomics+0x95/0x310
[   73.873770]  kunit_try_run_case+0x1a2/0x480
[   73.877957]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   73.883365]  kthread+0x334/0x6f0
[   73.886648]  ret_from_fork+0x113/0x1d0
[   73.890419]  ret_from_fork_asm+0x1a/0x30
[   73.894363] 
[   73.895906] The buggy address belongs to the object at ffff8881066eaf00
[   73.895906]  which belongs to the cache kmalloc-64 of size 64
[   73.908246] The buggy address is located 0 bytes to the right of
[   73.908246]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   73.921107] 
[   73.922606] The buggy address belongs to the physical page:
[   73.928179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   73.936179] flags: 0x200000000000000(node=0|zone=2)
[   73.941059] page_type: f5(slab)
[   73.944204] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   73.951943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   73.959684] page dumped because: kasan: bad access detected
[   73.965257] 
[   73.966754] Memory state around the buggy address:
[   73.971548]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   73.978767]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   73.985985] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.993205]                                      ^
[   73.997999]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.005227]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.012444] ==================================================================
[   53.880499] ==================================================================
[   53.887748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   53.895056] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   53.902455] 
[   53.903957] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   53.903965] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   53.903968] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   53.903971] Call Trace:
[   53.903973]  <TASK>
[   53.903975]  dump_stack_lvl+0x73/0xb0
[   53.903979]  print_report+0xd1/0x650
[   53.903983]  ? __virt_addr_valid+0x1db/0x2d0
[   53.903988]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.903991]  ? kasan_complete_mode_report_info+0x2a/0x200
[   53.903997]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.904001]  kasan_report+0x141/0x180
[   53.904005]  ? kasan_atomics_helper+0x5fe/0x5450
[   53.904010]  kasan_check_range+0x10c/0x1c0
[   53.904015]  __kasan_check_write+0x18/0x20
[   53.904018]  kasan_atomics_helper+0x5fe/0x5450
[   53.904022]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   53.904026]  ? __kmalloc_cache_noprof+0x189/0x420
[   53.904031]  ? kasan_atomics+0x152/0x310
[   53.904037]  kasan_atomics+0x1dc/0x310
[   53.904041]  ? __pfx_kasan_atomics+0x10/0x10
[   53.904046]  ? ktime_get_ts64+0x83/0x230
[   53.904050]  kunit_try_run_case+0x1a2/0x480
[   53.904055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.904060]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   53.904064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   53.904069]  ? __kthread_parkme+0x82/0x180
[   53.904072]  ? preempt_count_sub+0x50/0x80
[   53.904077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   53.904082]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   53.904086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   53.904090]  kthread+0x334/0x6f0
[   53.904094]  ? trace_preempt_on+0x20/0xc0
[   53.904098]  ? __pfx_kthread+0x10/0x10
[   53.904102]  ? _raw_spin_unlock_irq+0x47/0x80
[   53.904106]  ? calculate_sigpending+0x7b/0xa0
[   53.904111]  ? __pfx_kthread+0x10/0x10
[   53.904115]  ret_from_fork+0x113/0x1d0
[   53.904119]  ? __pfx_kthread+0x10/0x10
[   53.904123]  ret_from_fork_asm+0x1a/0x30
[   53.904129]  </TASK>
[   53.904130] 
[   54.086776] Allocated by task 306:
[   54.090185]  kasan_save_stack+0x45/0x70
[   54.094022]  kasan_save_track+0x18/0x40
[   54.097862]  kasan_save_alloc_info+0x3b/0x50
[   54.102144]  __kasan_kmalloc+0xb7/0xc0
[   54.105896]  __kmalloc_cache_noprof+0x189/0x420
[   54.110428]  kasan_atomics+0x95/0x310
[   54.114094]  kunit_try_run_case+0x1a2/0x480
[   54.118281]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   54.123681]  kthread+0x334/0x6f0
[   54.126920]  ret_from_fork+0x113/0x1d0
[   54.130673]  ret_from_fork_asm+0x1a/0x30
[   54.134600] 
[   54.136100] The buggy address belongs to the object at ffff8881066eaf00
[   54.136100]  which belongs to the cache kmalloc-64 of size 64
[   54.148440] The buggy address is located 0 bytes to the right of
[   54.148440]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   54.161302] 
[   54.162801] The buggy address belongs to the physical page:
[   54.168416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   54.176417] flags: 0x200000000000000(node=0|zone=2)
[   54.181295] page_type: f5(slab)
[   54.184444] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   54.192191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.199937] page dumped because: kasan: bad access detected
[   54.205509] 
[   54.207010] Memory state around the buggy address:
[   54.211802]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.219020]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   54.226242] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.233469]                                      ^
[   54.238262]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.245481]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.252700] ==================================================================
[   67.526210] ==================================================================
[   67.533457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   67.540848] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   67.548243] 
[   67.549742] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   67.549750] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   67.549752] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   67.549756] Call Trace:
[   67.549757]  <TASK>
[   67.549759]  dump_stack_lvl+0x73/0xb0
[   67.549764]  print_report+0xd1/0x650
[   67.549768]  ? __virt_addr_valid+0x1db/0x2d0
[   67.549772]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.549776]  ? kasan_complete_mode_report_info+0x2a/0x200
[   67.549781]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.549785]  kasan_report+0x141/0x180
[   67.549789]  ? kasan_atomics_helper+0x18b1/0x5450
[   67.549794]  kasan_check_range+0x10c/0x1c0
[   67.549799]  __kasan_check_write+0x18/0x20
[   67.549802]  kasan_atomics_helper+0x18b1/0x5450
[   67.549807]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   67.549811]  ? __kmalloc_cache_noprof+0x189/0x420
[   67.549816]  ? kasan_atomics+0x152/0x310
[   67.549821]  kasan_atomics+0x1dc/0x310
[   67.549825]  ? __pfx_kasan_atomics+0x10/0x10
[   67.549830]  ? ktime_get_ts64+0x83/0x230
[   67.549835]  kunit_try_run_case+0x1a2/0x480
[   67.549839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.549844]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   67.549848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   67.549853]  ? __kthread_parkme+0x82/0x180
[   67.549856]  ? preempt_count_sub+0x50/0x80
[   67.549861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   67.549865]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.549870]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   67.549874]  kthread+0x334/0x6f0
[   67.549878]  ? trace_preempt_on+0x20/0xc0
[   67.549882]  ? __pfx_kthread+0x10/0x10
[   67.549886]  ? _raw_spin_unlock_irq+0x47/0x80
[   67.549890]  ? calculate_sigpending+0x7b/0xa0
[   67.549895]  ? __pfx_kthread+0x10/0x10
[   67.549899]  ret_from_fork+0x113/0x1d0
[   67.549902]  ? __pfx_kthread+0x10/0x10
[   67.549906]  ret_from_fork_asm+0x1a/0x30
[   67.549912]  </TASK>
[   67.549914] 
[   67.733067] Allocated by task 306:
[   67.736473]  kasan_save_stack+0x45/0x70
[   67.740312]  kasan_save_track+0x18/0x40
[   67.744150]  kasan_save_alloc_info+0x3b/0x50
[   67.748422]  __kasan_kmalloc+0xb7/0xc0
[   67.752175]  __kmalloc_cache_noprof+0x189/0x420
[   67.756710]  kasan_atomics+0x95/0x310
[   67.760416]  kunit_try_run_case+0x1a2/0x480
[   67.764604]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.770003]  kthread+0x334/0x6f0
[   67.773235]  ret_from_fork+0x113/0x1d0
[   67.776989]  ret_from_fork_asm+0x1a/0x30
[   67.780915] 
[   67.782420] The buggy address belongs to the object at ffff8881066eaf00
[   67.782420]  which belongs to the cache kmalloc-64 of size 64
[   67.794756] The buggy address is located 0 bytes to the right of
[   67.794756]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   67.807618] 
[   67.809116] The buggy address belongs to the physical page:
[   67.814688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   67.822688] flags: 0x200000000000000(node=0|zone=2)
[   67.827568] page_type: f5(slab)
[   67.830714] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.838453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.846192] page dumped because: kasan: bad access detected
[   67.851764] 
[   67.853264] Memory state around the buggy address:
[   67.858058]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.865285]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   67.872503] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.879723]                                      ^
[   67.884516]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.891734]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.898955] ==================================================================
[   72.505949] ==================================================================
[   72.513187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   72.520581] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   72.527896] 
[   72.529423] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   72.529431] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   72.529434] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   72.529437] Call Trace:
[   72.529439]  <TASK>
[   72.529441]  dump_stack_lvl+0x73/0xb0
[   72.529445]  print_report+0xd1/0x650
[   72.529450]  ? __virt_addr_valid+0x1db/0x2d0
[   72.529454]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.529458]  ? kasan_complete_mode_report_info+0x2a/0x200
[   72.529463]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.529467]  kasan_report+0x141/0x180
[   72.529471]  ? kasan_atomics_helper+0x4f71/0x5450
[   72.529476]  __asan_report_load8_noabort+0x18/0x20
[   72.529481]  kasan_atomics_helper+0x4f71/0x5450
[   72.529485]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   72.529489]  ? __kmalloc_cache_noprof+0x189/0x420
[   72.529494]  ? kasan_atomics+0x152/0x310
[   72.529499]  kasan_atomics+0x1dc/0x310
[   72.529504]  ? __pfx_kasan_atomics+0x10/0x10
[   72.529509]  ? ktime_get_ts64+0x83/0x230
[   72.529513]  kunit_try_run_case+0x1a2/0x480
[   72.529518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.529522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   72.529527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   72.529531]  ? __kthread_parkme+0x82/0x180
[   72.529535]  ? preempt_count_sub+0x50/0x80
[   72.529539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   72.529544]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.529548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   72.529552]  kthread+0x334/0x6f0
[   72.529556]  ? trace_preempt_on+0x20/0xc0
[   72.529560]  ? __pfx_kthread+0x10/0x10
[   72.529564]  ? _raw_spin_unlock_irq+0x47/0x80
[   72.529568]  ? calculate_sigpending+0x7b/0xa0
[   72.529573]  ? __pfx_kthread+0x10/0x10
[   72.529577]  ret_from_fork+0x113/0x1d0
[   72.529580]  ? __pfx_kthread+0x10/0x10
[   72.529584]  ret_from_fork_asm+0x1a/0x30
[   72.529590]  </TASK>
[   72.529592] 
[   72.709350] Allocated by task 306:
[   72.712808]  kasan_save_stack+0x45/0x70
[   72.716645]  kasan_save_track+0x18/0x40
[   72.720486]  kasan_save_alloc_info+0x3b/0x50
[   72.724766]  __kasan_kmalloc+0xb7/0xc0
[   72.728518]  __kmalloc_cache_noprof+0x189/0x420
[   72.733051]  kasan_atomics+0x95/0x310
[   72.736718]  kunit_try_run_case+0x1a2/0x480
[   72.740912]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   72.746312]  kthread+0x334/0x6f0
[   72.749577]  ret_from_fork+0x113/0x1d0
[   72.753362]  ret_from_fork_asm+0x1a/0x30
[   72.757364] 
[   72.758896] The buggy address belongs to the object at ffff8881066eaf00
[   72.758896]  which belongs to the cache kmalloc-64 of size 64
[   72.771238] The buggy address is located 0 bytes to the right of
[   72.771238]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   72.784106] 
[   72.785606] The buggy address belongs to the physical page:
[   72.791177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   72.799177] flags: 0x200000000000000(node=0|zone=2)
[   72.804057] page_type: f5(slab)
[   72.807206] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   72.814953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   72.822701] page dumped because: kasan: bad access detected
[   72.828270] 
[   72.829771] Memory state around the buggy address:
[   72.834563]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   72.841785]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   72.849011] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.856230]                                      ^
[   72.861023]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.868241]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.875461] ==================================================================
[   51.235319] ==================================================================
[   51.242582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   51.249982] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   51.257289] 
[   51.258788] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   51.258796] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   51.258799] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   51.258802] Call Trace:
[   51.258804]  <TASK>
[   51.258806]  dump_stack_lvl+0x73/0xb0
[   51.258811]  print_report+0xd1/0x650
[   51.258815]  ? __virt_addr_valid+0x1db/0x2d0
[   51.258819]  ? kasan_atomics_helper+0x4b88/0x5450
[   51.258823]  ? kasan_complete_mode_report_info+0x2a/0x200
[   51.258828]  ? kasan_atomics_helper+0x4b88/0x5450
[   51.258833]  kasan_report+0x141/0x180
[   51.258837]  ? kasan_atomics_helper+0x4b88/0x5450
[   51.258842]  __asan_report_load4_noabort+0x18/0x20
[   51.258847]  kasan_atomics_helper+0x4b88/0x5450
[   51.258851]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   51.258855]  ? __kmalloc_cache_noprof+0x189/0x420
[   51.258860]  ? kasan_atomics+0x152/0x310
[   51.258865]  kasan_atomics+0x1dc/0x310
[   51.258870]  ? __pfx_kasan_atomics+0x10/0x10
[   51.258874]  ? ktime_get_ts64+0x83/0x230
[   51.258879]  kunit_try_run_case+0x1a2/0x480
[   51.258884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.258888]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   51.258892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   51.258897]  ? __kthread_parkme+0x82/0x180
[   51.258901]  ? preempt_count_sub+0x50/0x80
[   51.258905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   51.258910]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.258914]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   51.258918]  kthread+0x334/0x6f0
[   51.258922]  ? trace_preempt_on+0x20/0xc0
[   51.258926]  ? __pfx_kthread+0x10/0x10
[   51.258930]  ? _raw_spin_unlock_irq+0x47/0x80
[   51.258934]  ? calculate_sigpending+0x7b/0xa0
[   51.258939]  ? __pfx_kthread+0x10/0x10
[   51.258943]  ret_from_fork+0x113/0x1d0
[   51.258947]  ? __pfx_kthread+0x10/0x10
[   51.258951]  ret_from_fork_asm+0x1a/0x30
[   51.258956]  </TASK>
[   51.258958] 
[   51.438767] Allocated by task 306:
[   51.442174]  kasan_save_stack+0x45/0x70
[   51.446013]  kasan_save_track+0x18/0x40
[   51.449853]  kasan_save_alloc_info+0x3b/0x50
[   51.454132]  __kasan_kmalloc+0xb7/0xc0
[   51.457887]  __kmalloc_cache_noprof+0x189/0x420
[   51.462428]  kasan_atomics+0x95/0x310
[   51.466103]  kunit_try_run_case+0x1a2/0x480
[   51.470287]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   51.475687]  kthread+0x334/0x6f0
[   51.478921]  ret_from_fork+0x113/0x1d0
[   51.482671]  ret_from_fork_asm+0x1a/0x30
[   51.486598] 
[   51.488098] The buggy address belongs to the object at ffff8881066eaf00
[   51.488098]  which belongs to the cache kmalloc-64 of size 64
[   51.500439] The buggy address is located 0 bytes to the right of
[   51.500439]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   51.513309] 
[   51.514808] The buggy address belongs to the physical page:
[   51.520421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   51.528425] flags: 0x200000000000000(node=0|zone=2)
[   51.533312] page_type: f5(slab)
[   51.536494] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   51.544241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.551987] page dumped because: kasan: bad access detected
[   51.557561] 
[   51.559061] Memory state around the buggy address:
[   51.563853]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.571072]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   51.578293] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.585519]                                      ^
[   51.590313]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.597568]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.604793] ==================================================================
[   66.386200] ==================================================================
[   66.393441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   66.400841] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   66.408243] 
[   66.409743] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   66.409751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   66.409754] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.409758] Call Trace:
[   66.409759]  <TASK>
[   66.409761]  dump_stack_lvl+0x73/0xb0
[   66.409766]  print_report+0xd1/0x650
[   66.409770]  ? __virt_addr_valid+0x1db/0x2d0
[   66.409774]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.409778]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.409783]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.409787]  kasan_report+0x141/0x180
[   66.409792]  ? kasan_atomics_helper+0x16e7/0x5450
[   66.409796]  kasan_check_range+0x10c/0x1c0
[   66.409801]  __kasan_check_write+0x18/0x20
[   66.409805]  kasan_atomics_helper+0x16e7/0x5450
[   66.409809]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.409813]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.409818]  ? kasan_atomics+0x152/0x310
[   66.409823]  kasan_atomics+0x1dc/0x310
[   66.409827]  ? __pfx_kasan_atomics+0x10/0x10
[   66.409832]  ? ktime_get_ts64+0x83/0x230
[   66.409837]  kunit_try_run_case+0x1a2/0x480
[   66.409842]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.409846]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.409850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.409855]  ? __kthread_parkme+0x82/0x180
[   66.409859]  ? preempt_count_sub+0x50/0x80
[   66.409863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.409868]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.409872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.409877]  kthread+0x334/0x6f0
[   66.409880]  ? trace_preempt_on+0x20/0xc0
[   66.409885]  ? __pfx_kthread+0x10/0x10
[   66.409889]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.409893]  ? calculate_sigpending+0x7b/0xa0
[   66.409897]  ? __pfx_kthread+0x10/0x10
[   66.409902]  ret_from_fork+0x113/0x1d0
[   66.409905]  ? __pfx_kthread+0x10/0x10
[   66.409909]  ret_from_fork_asm+0x1a/0x30
[   66.409915]  </TASK>
[   66.409917] 
[   66.593041] Allocated by task 306:
[   66.596447]  kasan_save_stack+0x45/0x70
[   66.600286]  kasan_save_track+0x18/0x40
[   66.604125]  kasan_save_alloc_info+0x3b/0x50
[   66.608421]  __kasan_kmalloc+0xb7/0xc0
[   66.612177]  __kmalloc_cache_noprof+0x189/0x420
[   66.616718]  kasan_atomics+0x95/0x310
[   66.620418]  kunit_try_run_case+0x1a2/0x480
[   66.624604]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.630005]  kthread+0x334/0x6f0
[   66.633236]  ret_from_fork+0x113/0x1d0
[   66.636991]  ret_from_fork_asm+0x1a/0x30
[   66.640924] 
[   66.642423] The buggy address belongs to the object at ffff8881066eaf00
[   66.642423]  which belongs to the cache kmalloc-64 of size 64
[   66.654764] The buggy address is located 0 bytes to the right of
[   66.654764]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   66.667627] 
[   66.669125] The buggy address belongs to the physical page:
[   66.674699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   66.682707] flags: 0x200000000000000(node=0|zone=2)
[   66.687594] page_type: f5(slab)
[   66.690741] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   66.698490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.706237] page dumped because: kasan: bad access detected
[   66.711809] 
[   66.713306] Memory state around the buggy address:
[   66.718101]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.725321]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   66.732574] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.739792]                                      ^
[   66.744586]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.751806]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.759023] ==================================================================
[   68.666243] ==================================================================
[   68.673481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   68.680876] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   68.688275] 
[   68.689776] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   68.689784] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   68.689786] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   68.689790] Call Trace:
[   68.689792]  <TASK>
[   68.689793]  dump_stack_lvl+0x73/0xb0
[   68.689798]  print_report+0xd1/0x650
[   68.689802]  ? __virt_addr_valid+0x1db/0x2d0
[   68.689806]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.689810]  ? kasan_complete_mode_report_info+0x2a/0x200
[   68.689815]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.689819]  kasan_report+0x141/0x180
[   68.689824]  ? kasan_atomics_helper+0x1a7f/0x5450
[   68.689829]  kasan_check_range+0x10c/0x1c0
[   68.689833]  __kasan_check_write+0x18/0x20
[   68.689837]  kasan_atomics_helper+0x1a7f/0x5450
[   68.689841]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   68.689845]  ? __kmalloc_cache_noprof+0x189/0x420
[   68.689850]  ? kasan_atomics+0x152/0x310
[   68.689855]  kasan_atomics+0x1dc/0x310
[   68.689859]  ? __pfx_kasan_atomics+0x10/0x10
[   68.689864]  ? ktime_get_ts64+0x83/0x230
[   68.689869]  kunit_try_run_case+0x1a2/0x480
[   68.689873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.689878]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   68.689882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   68.689887]  ? __kthread_parkme+0x82/0x180
[   68.689891]  ? preempt_count_sub+0x50/0x80
[   68.689895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   68.689899]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.689904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   68.689908]  kthread+0x334/0x6f0
[   68.689912]  ? trace_preempt_on+0x20/0xc0
[   68.689916]  ? __pfx_kthread+0x10/0x10
[   68.689920]  ? _raw_spin_unlock_irq+0x47/0x80
[   68.689924]  ? calculate_sigpending+0x7b/0xa0
[   68.689929]  ? __pfx_kthread+0x10/0x10
[   68.689933]  ret_from_fork+0x113/0x1d0
[   68.689936]  ? __pfx_kthread+0x10/0x10
[   68.689940]  ret_from_fork_asm+0x1a/0x30
[   68.689946]  </TASK>
[   68.689948] 
[   68.873100] Allocated by task 306:
[   68.876508]  kasan_save_stack+0x45/0x70
[   68.880377]  kasan_save_track+0x18/0x40
[   68.884246]  kasan_save_alloc_info+0x3b/0x50
[   68.888527]  __kasan_kmalloc+0xb7/0xc0
[   68.892279]  __kmalloc_cache_noprof+0x189/0x420
[   68.896812]  kasan_atomics+0x95/0x310
[   68.900479]  kunit_try_run_case+0x1a2/0x480
[   68.904674]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   68.910080]  kthread+0x334/0x6f0
[   68.913313]  ret_from_fork+0x113/0x1d0
[   68.917102]  ret_from_fork_asm+0x1a/0x30
[   68.921034] 
[   68.922536] The buggy address belongs to the object at ffff8881066eaf00
[   68.922536]  which belongs to the cache kmalloc-64 of size 64
[   68.934877] The buggy address is located 0 bytes to the right of
[   68.934877]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   68.947737] 
[   68.949237] The buggy address belongs to the physical page:
[   68.954808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   68.962808] flags: 0x200000000000000(node=0|zone=2)
[   68.967687] page_type: f5(slab)
[   68.970836] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   68.978582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   68.986323] page dumped because: kasan: bad access detected
[   68.991945] 
[   68.993445] Memory state around the buggy address:
[   68.998238]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   69.005457]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   69.012678] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   69.019896]                                      ^
[   69.024690]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   69.031915]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   69.039135] ==================================================================
[   60.706682] ==================================================================
[   60.713922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   60.721316] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   60.728741] 
[   60.730241] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   60.730249] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   60.730251] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   60.730255] Call Trace:
[   60.730257]  <TASK>
[   60.730258]  dump_stack_lvl+0x73/0xb0
[   60.730263]  print_report+0xd1/0x650
[   60.730267]  ? __virt_addr_valid+0x1db/0x2d0
[   60.730271]  ? kasan_atomics_helper+0x1079/0x5450
[   60.730275]  ? kasan_complete_mode_report_info+0x2a/0x200
[   60.730281]  ? kasan_atomics_helper+0x1079/0x5450
[   60.730285]  kasan_report+0x141/0x180
[   60.730289]  ? kasan_atomics_helper+0x1079/0x5450
[   60.730294]  kasan_check_range+0x10c/0x1c0
[   60.730298]  __kasan_check_write+0x18/0x20
[   60.730302]  kasan_atomics_helper+0x1079/0x5450
[   60.730306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   60.730310]  ? __kmalloc_cache_noprof+0x189/0x420
[   60.730315]  ? kasan_atomics+0x152/0x310
[   60.730321]  kasan_atomics+0x1dc/0x310
[   60.730325]  ? __pfx_kasan_atomics+0x10/0x10
[   60.730350]  ? ktime_get_ts64+0x83/0x230
[   60.730354]  kunit_try_run_case+0x1a2/0x480
[   60.730359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.730364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   60.730381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   60.730386]  ? __kthread_parkme+0x82/0x180
[   60.730402]  ? preempt_count_sub+0x50/0x80
[   60.730407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   60.730411]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.730416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   60.730420]  kthread+0x334/0x6f0
[   60.730424]  ? trace_preempt_on+0x20/0xc0
[   60.730428]  ? __pfx_kthread+0x10/0x10
[   60.730432]  ? _raw_spin_unlock_irq+0x47/0x80
[   60.730436]  ? calculate_sigpending+0x7b/0xa0
[   60.730441]  ? __pfx_kthread+0x10/0x10
[   60.730445]  ret_from_fork+0x113/0x1d0
[   60.730448]  ? __pfx_kthread+0x10/0x10
[   60.730452]  ret_from_fork_asm+0x1a/0x30
[   60.730458]  </TASK>
[   60.730460] 
[   60.913505] Allocated by task 306:
[   60.916910]  kasan_save_stack+0x45/0x70
[   60.920751]  kasan_save_track+0x18/0x40
[   60.924591]  kasan_save_alloc_info+0x3b/0x50
[   60.928870]  __kasan_kmalloc+0xb7/0xc0
[   60.932625]  __kmalloc_cache_noprof+0x189/0x420
[   60.937166]  kasan_atomics+0x95/0x310
[   60.940840]  kunit_try_run_case+0x1a2/0x480
[   60.945025]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   60.950426]  kthread+0x334/0x6f0
[   60.953658]  ret_from_fork+0x113/0x1d0
[   60.957425]  ret_from_fork_asm+0x1a/0x30
[   60.961363] 
[   60.962905] The buggy address belongs to the object at ffff8881066eaf00
[   60.962905]  which belongs to the cache kmalloc-64 of size 64
[   60.975246] The buggy address is located 0 bytes to the right of
[   60.975246]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   60.988108] 
[   60.989608] The buggy address belongs to the physical page:
[   60.995180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   61.003179] flags: 0x200000000000000(node=0|zone=2)
[   61.008060] page_type: f5(slab)
[   61.011204] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   61.018944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.026684] page dumped because: kasan: bad access detected
[   61.032255] 
[   61.033755] Memory state around the buggy address:
[   61.038550]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.045777]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   61.053004] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.060224]                                      ^
[   61.065014]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.072236]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   61.079454] ==================================================================
[   70.942940] ==================================================================
[   70.950179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   70.957572] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   70.964974] 
[   70.966474] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   70.966482] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   70.966485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.966488] Call Trace:
[   70.966490]  <TASK>
[   70.966492]  dump_stack_lvl+0x73/0xb0
[   70.966496]  print_report+0xd1/0x650
[   70.966500]  ? __virt_addr_valid+0x1db/0x2d0
[   70.966504]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.966508]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.966514]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.966518]  kasan_report+0x141/0x180
[   70.966522]  ? kasan_atomics_helper+0x1e12/0x5450
[   70.966527]  kasan_check_range+0x10c/0x1c0
[   70.966531]  __kasan_check_write+0x18/0x20
[   70.966535]  kasan_atomics_helper+0x1e12/0x5450
[   70.966539]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.966543]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.966548]  ? kasan_atomics+0x152/0x310
[   70.966553]  kasan_atomics+0x1dc/0x310
[   70.966558]  ? __pfx_kasan_atomics+0x10/0x10
[   70.966563]  ? ktime_get_ts64+0x83/0x230
[   70.966567]  kunit_try_run_case+0x1a2/0x480
[   70.966572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.966576]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.966581]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.966585]  ? __kthread_parkme+0x82/0x180
[   70.966589]  ? preempt_count_sub+0x50/0x80
[   70.966593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.966598]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.966602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.966606]  kthread+0x334/0x6f0
[   70.966610]  ? trace_preempt_on+0x20/0xc0
[   70.966614]  ? __pfx_kthread+0x10/0x10
[   70.966618]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.966622]  ? calculate_sigpending+0x7b/0xa0
[   70.966627]  ? __pfx_kthread+0x10/0x10
[   70.966631]  ret_from_fork+0x113/0x1d0
[   70.966634]  ? __pfx_kthread+0x10/0x10
[   70.966638]  ret_from_fork_asm+0x1a/0x30
[   70.966644]  </TASK>
[   70.966646] 
[   71.149763] Allocated by task 306:
[   71.153168]  kasan_save_stack+0x45/0x70
[   71.157007]  kasan_save_track+0x18/0x40
[   71.160848]  kasan_save_alloc_info+0x3b/0x50
[   71.165129]  __kasan_kmalloc+0xb7/0xc0
[   71.168880]  __kmalloc_cache_noprof+0x189/0x420
[   71.173421]  kasan_atomics+0x95/0x310
[   71.177089]  kunit_try_run_case+0x1a2/0x480
[   71.181284]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   71.186681]  kthread+0x334/0x6f0
[   71.189916]  ret_from_fork+0x113/0x1d0
[   71.193669]  ret_from_fork_asm+0x1a/0x30
[   71.197602] 
[   71.199101] The buggy address belongs to the object at ffff8881066eaf00
[   71.199101]  which belongs to the cache kmalloc-64 of size 64
[   71.211436] The buggy address is located 0 bytes to the right of
[   71.211436]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   71.224297] 
[   71.225796] The buggy address belongs to the physical page:
[   71.231379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   71.239431] flags: 0x200000000000000(node=0|zone=2)
[   71.244317] page_type: f5(slab)
[   71.247496] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   71.255237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   71.262984] page dumped because: kasan: bad access detected
[   71.268558] 
[   71.270056] Memory state around the buggy address:
[   71.274847]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   71.282067]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   71.289289] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   71.296514]                                      ^
[   71.301309]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   71.308536]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   71.315753] ==================================================================
[   63.356478] ==================================================================
[   63.363717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   63.371109] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   63.378423] 
[   63.379924] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   63.379932] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   63.379935] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.379938] Call Trace:
[   63.379940]  <TASK>
[   63.379942]  dump_stack_lvl+0x73/0xb0
[   63.379946]  print_report+0xd1/0x650
[   63.379950]  ? __virt_addr_valid+0x1db/0x2d0
[   63.379955]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.379958]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.379964]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.379968]  kasan_report+0x141/0x180
[   63.379972]  ? kasan_atomics_helper+0x49ce/0x5450
[   63.379977]  __asan_report_load4_noabort+0x18/0x20
[   63.379982]  kasan_atomics_helper+0x49ce/0x5450
[   63.379986]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.379990]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.379995]  ? kasan_atomics+0x152/0x310
[   63.380000]  kasan_atomics+0x1dc/0x310
[   63.380005]  ? __pfx_kasan_atomics+0x10/0x10
[   63.380010]  ? ktime_get_ts64+0x83/0x230
[   63.380014]  kunit_try_run_case+0x1a2/0x480
[   63.380019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.380023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.380027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.380032]  ? __kthread_parkme+0x82/0x180
[   63.380036]  ? preempt_count_sub+0x50/0x80
[   63.380040]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.380045]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.380049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.380053]  kthread+0x334/0x6f0
[   63.380057]  ? trace_preempt_on+0x20/0xc0
[   63.380061]  ? __pfx_kthread+0x10/0x10
[   63.380065]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.380069]  ? calculate_sigpending+0x7b/0xa0
[   63.380074]  ? __pfx_kthread+0x10/0x10
[   63.380078]  ret_from_fork+0x113/0x1d0
[   63.380081]  ? __pfx_kthread+0x10/0x10
[   63.380085]  ret_from_fork_asm+0x1a/0x30
[   63.380091]  </TASK>
[   63.380093] 
[   63.559772] Allocated by task 306:
[   63.563178]  kasan_save_stack+0x45/0x70
[   63.567018]  kasan_save_track+0x18/0x40
[   63.570857]  kasan_save_alloc_info+0x3b/0x50
[   63.575129]  __kasan_kmalloc+0xb7/0xc0
[   63.578883]  __kmalloc_cache_noprof+0x189/0x420
[   63.583428]  kasan_atomics+0x95/0x310
[   63.587099]  kunit_try_run_case+0x1a2/0x480
[   63.591286]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.596692]  kthread+0x334/0x6f0
[   63.599925]  ret_from_fork+0x113/0x1d0
[   63.603678]  ret_from_fork_asm+0x1a/0x30
[   63.607605] 
[   63.609104] The buggy address belongs to the object at ffff8881066eaf00
[   63.609104]  which belongs to the cache kmalloc-64 of size 64
[   63.621447] The buggy address is located 0 bytes to the right of
[   63.621447]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   63.634315] 
[   63.635848] The buggy address belongs to the physical page:
[   63.641426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   63.649429] flags: 0x200000000000000(node=0|zone=2)
[   63.654310] page_type: f5(slab)
[   63.657456] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   63.665195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.672935] page dumped because: kasan: bad access detected
[   63.678508] 
[   63.680007] Memory state around the buggy address:
[   63.684800]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.692027]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   63.699246] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.706465]                                      ^
[   63.711259]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.718485]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.725706] ==================================================================
[   74.019671] ==================================================================
[   74.026908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   74.034301] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   74.041610] 
[   74.043108] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   74.043115] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   74.043118] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   74.043122] Call Trace:
[   74.043124]  <TASK>
[   74.043126]  dump_stack_lvl+0x73/0xb0
[   74.043130]  print_report+0xd1/0x650
[   74.043134]  ? __virt_addr_valid+0x1db/0x2d0
[   74.043138]  ? kasan_atomics_helper+0x4fb2/0x5450
[   74.043142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   74.043148]  ? kasan_atomics_helper+0x4fb2/0x5450
[   74.043152]  kasan_report+0x141/0x180
[   74.043156]  ? kasan_atomics_helper+0x4fb2/0x5450
[   74.043161]  __asan_report_load8_noabort+0x18/0x20
[   74.043166]  kasan_atomics_helper+0x4fb2/0x5450
[   74.043170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   74.043174]  ? __kmalloc_cache_noprof+0x189/0x420
[   74.043179]  ? kasan_atomics+0x152/0x310
[   74.043184]  kasan_atomics+0x1dc/0x310
[   74.043189]  ? __pfx_kasan_atomics+0x10/0x10
[   74.043194]  ? ktime_get_ts64+0x83/0x230
[   74.043198]  kunit_try_run_case+0x1a2/0x480
[   74.043203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.043207]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   74.043212]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   74.043216]  ? __kthread_parkme+0x82/0x180
[   74.043220]  ? preempt_count_sub+0x50/0x80
[   74.043224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   74.043229]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.043233]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   74.043237]  kthread+0x334/0x6f0
[   74.043241]  ? trace_preempt_on+0x20/0xc0
[   74.043245]  ? __pfx_kthread+0x10/0x10
[   74.043249]  ? _raw_spin_unlock_irq+0x47/0x80
[   74.043253]  ? calculate_sigpending+0x7b/0xa0
[   74.043258]  ? __pfx_kthread+0x10/0x10
[   74.043262]  ret_from_fork+0x113/0x1d0
[   74.043265]  ? __pfx_kthread+0x10/0x10
[   74.043269]  ret_from_fork_asm+0x1a/0x30
[   74.043275]  </TASK>
[   74.043277] 
[   74.222982] Allocated by task 306:
[   74.226416]  kasan_save_stack+0x45/0x70
[   74.230263]  kasan_save_track+0x18/0x40
[   74.234104]  kasan_save_alloc_info+0x3b/0x50
[   74.238416]  __kasan_kmalloc+0xb7/0xc0
[   74.242171]  __kmalloc_cache_noprof+0x189/0x420
[   74.246705]  kasan_atomics+0x95/0x310
[   74.250403]  kunit_try_run_case+0x1a2/0x480
[   74.254598]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   74.259997]  kthread+0x334/0x6f0
[   74.263232]  ret_from_fork+0x113/0x1d0
[   74.266984]  ret_from_fork_asm+0x1a/0x30
[   74.270910] 
[   74.272421] The buggy address belongs to the object at ffff8881066eaf00
[   74.272421]  which belongs to the cache kmalloc-64 of size 64
[   74.284758] The buggy address is located 0 bytes to the right of
[   74.284758]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   74.297620] 
[   74.299120] The buggy address belongs to the physical page:
[   74.304694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   74.312701] flags: 0x200000000000000(node=0|zone=2)
[   74.317590] page_type: f5(slab)
[   74.320734] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   74.328475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   74.336214] page dumped because: kasan: bad access detected
[   74.341786] 
[   74.343285] Memory state around the buggy address:
[   74.348077]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   74.355297]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   74.362518] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.369744]                                      ^
[   74.374537]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.381758]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.388983] ==================================================================
[   59.570983] ==================================================================
[   59.578229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   59.585536] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   59.592938] 
[   59.594436] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   59.594444] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   59.594447] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   59.594450] Call Trace:
[   59.594452]  <TASK>
[   59.594454]  dump_stack_lvl+0x73/0xb0
[   59.594458]  print_report+0xd1/0x650
[   59.594462]  ? __virt_addr_valid+0x1db/0x2d0
[   59.594466]  ? kasan_atomics_helper+0xf10/0x5450
[   59.594470]  ? kasan_complete_mode_report_info+0x2a/0x200
[   59.594476]  ? kasan_atomics_helper+0xf10/0x5450
[   59.594480]  kasan_report+0x141/0x180
[   59.594484]  ? kasan_atomics_helper+0xf10/0x5450
[   59.594489]  kasan_check_range+0x10c/0x1c0
[   59.594493]  __kasan_check_write+0x18/0x20
[   59.594497]  kasan_atomics_helper+0xf10/0x5450
[   59.594501]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   59.594505]  ? __kmalloc_cache_noprof+0x189/0x420
[   59.594510]  ? kasan_atomics+0x152/0x310
[   59.594515]  kasan_atomics+0x1dc/0x310
[   59.594520]  ? __pfx_kasan_atomics+0x10/0x10
[   59.594525]  ? ktime_get_ts64+0x83/0x230
[   59.594529]  kunit_try_run_case+0x1a2/0x480
[   59.594534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.594538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   59.594543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   59.594547]  ? __kthread_parkme+0x82/0x180
[   59.594551]  ? preempt_count_sub+0x50/0x80
[   59.594555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   59.594560]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.594564]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   59.594569]  kthread+0x334/0x6f0
[   59.594572]  ? trace_preempt_on+0x20/0xc0
[   59.594577]  ? __pfx_kthread+0x10/0x10
[   59.594581]  ? _raw_spin_unlock_irq+0x47/0x80
[   59.594585]  ? calculate_sigpending+0x7b/0xa0
[   59.594589]  ? __pfx_kthread+0x10/0x10
[   59.594594]  ret_from_fork+0x113/0x1d0
[   59.594597]  ? __pfx_kthread+0x10/0x10
[   59.594601]  ret_from_fork_asm+0x1a/0x30
[   59.594607]  </TASK>
[   59.594609] 
[   59.777260] Allocated by task 306:
[   59.780664]  kasan_save_stack+0x45/0x70
[   59.784503]  kasan_save_track+0x18/0x40
[   59.788362]  kasan_save_alloc_info+0x3b/0x50
[   59.792685]  __kasan_kmalloc+0xb7/0xc0
[   59.796437]  __kmalloc_cache_noprof+0x189/0x420
[   59.800970]  kasan_atomics+0x95/0x310
[   59.804637]  kunit_try_run_case+0x1a2/0x480
[   59.808833]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   59.814240]  kthread+0x334/0x6f0
[   59.817481]  ret_from_fork+0x113/0x1d0
[   59.821234]  ret_from_fork_asm+0x1a/0x30
[   59.825160] 
[   59.826657] The buggy address belongs to the object at ffff8881066eaf00
[   59.826657]  which belongs to the cache kmalloc-64 of size 64
[   59.838993] The buggy address is located 0 bytes to the right of
[   59.838993]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   59.851852] 
[   59.853361] The buggy address belongs to the physical page:
[   59.858985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   59.866994] flags: 0x200000000000000(node=0|zone=2)
[   59.871873] page_type: f5(slab)
[   59.875018] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   59.882757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.890496] page dumped because: kasan: bad access detected
[   59.896068] 
[   59.897567] Memory state around the buggy address:
[   59.902363]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.909625]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   59.916844] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.924063]                                      ^
[   59.928856]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.936074]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   59.943294] ==================================================================
[   55.778231] ==================================================================
[   55.785463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   55.792770] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   55.800168] 
[   55.801669] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   55.801677] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   55.801680] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   55.801683] Call Trace:
[   55.801685]  <TASK>
[   55.801687]  dump_stack_lvl+0x73/0xb0
[   55.801691]  print_report+0xd1/0x650
[   55.801695]  ? __virt_addr_valid+0x1db/0x2d0
[   55.801700]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.801703]  ? kasan_complete_mode_report_info+0x2a/0x200
[   55.801709]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.801713]  kasan_report+0x141/0x180
[   55.801717]  ? kasan_atomics_helper+0x8f9/0x5450
[   55.801722]  kasan_check_range+0x10c/0x1c0
[   55.801727]  __kasan_check_write+0x18/0x20
[   55.801730]  kasan_atomics_helper+0x8f9/0x5450
[   55.801734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   55.801739]  ? __kmalloc_cache_noprof+0x189/0x420
[   55.801744]  ? kasan_atomics+0x152/0x310
[   55.801749]  kasan_atomics+0x1dc/0x310
[   55.801753]  ? __pfx_kasan_atomics+0x10/0x10
[   55.801758]  ? ktime_get_ts64+0x83/0x230
[   55.801762]  kunit_try_run_case+0x1a2/0x480
[   55.801767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.801772]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   55.801776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   55.801780]  ? __kthread_parkme+0x82/0x180
[   55.801784]  ? preempt_count_sub+0x50/0x80
[   55.801788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   55.801793]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   55.801798]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   55.801802]  kthread+0x334/0x6f0
[   55.801806]  ? trace_preempt_on+0x20/0xc0
[   55.801810]  ? __pfx_kthread+0x10/0x10
[   55.801814]  ? _raw_spin_unlock_irq+0x47/0x80
[   55.801818]  ? calculate_sigpending+0x7b/0xa0
[   55.801823]  ? __pfx_kthread+0x10/0x10
[   55.801827]  ret_from_fork+0x113/0x1d0
[   55.801830]  ? __pfx_kthread+0x10/0x10
[   55.801834]  ret_from_fork_asm+0x1a/0x30
[   55.801840]  </TASK>
[   55.801842] 
[   55.984481] Allocated by task 306:
[   55.987888]  kasan_save_stack+0x45/0x70
[   55.991728]  kasan_save_track+0x18/0x40
[   55.995566]  kasan_save_alloc_info+0x3b/0x50
[   55.999841]  __kasan_kmalloc+0xb7/0xc0
[   56.003592]  __kmalloc_cache_noprof+0x189/0x420
[   56.008124]  kasan_atomics+0x95/0x310
[   56.011791]  kunit_try_run_case+0x1a2/0x480
[   56.015977]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.021420]  kthread+0x334/0x6f0
[   56.024654]  ret_from_fork+0x113/0x1d0
[   56.028417]  ret_from_fork_asm+0x1a/0x30
[   56.032365] 
[   56.033908] The buggy address belongs to the object at ffff8881066eaf00
[   56.033908]  which belongs to the cache kmalloc-64 of size 64
[   56.046251] The buggy address is located 0 bytes to the right of
[   56.046251]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   56.059112] 
[   56.060610] The buggy address belongs to the physical page:
[   56.066184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   56.074191] flags: 0x200000000000000(node=0|zone=2)
[   56.079072] page_type: f5(slab)
[   56.082217] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.089966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.097711] page dumped because: kasan: bad access detected
[   56.103283] 
[   56.104784] Memory state around the buggy address:
[   56.109576]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.116796]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   56.124017] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.131233]                                      ^
[   56.136029]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.143246]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   56.150464] ==================================================================
[   66.006221] ==================================================================
[   66.013460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   66.020854] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   66.028253] 
[   66.029754] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   66.029762] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   66.029765] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.029769] Call Trace:
[   66.029770]  <TASK>
[   66.029772]  dump_stack_lvl+0x73/0xb0
[   66.029777]  print_report+0xd1/0x650
[   66.029781]  ? __virt_addr_valid+0x1db/0x2d0
[   66.029785]  ? kasan_atomics_helper+0x164f/0x5450
[   66.029789]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.029794]  ? kasan_atomics_helper+0x164f/0x5450
[   66.029798]  kasan_report+0x141/0x180
[   66.029802]  ? kasan_atomics_helper+0x164f/0x5450
[   66.029807]  kasan_check_range+0x10c/0x1c0
[   66.029812]  __kasan_check_write+0x18/0x20
[   66.029816]  kasan_atomics_helper+0x164f/0x5450
[   66.029820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.029824]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.029829]  ? kasan_atomics+0x152/0x310
[   66.029834]  kasan_atomics+0x1dc/0x310
[   66.029839]  ? __pfx_kasan_atomics+0x10/0x10
[   66.029844]  ? ktime_get_ts64+0x83/0x230
[   66.029848]  kunit_try_run_case+0x1a2/0x480
[   66.029853]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.029857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.029862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.029866]  ? __kthread_parkme+0x82/0x180
[   66.029870]  ? preempt_count_sub+0x50/0x80
[   66.029874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.029879]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.029884]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.029888]  kthread+0x334/0x6f0
[   66.029892]  ? trace_preempt_on+0x20/0xc0
[   66.029896]  ? __pfx_kthread+0x10/0x10
[   66.029900]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.029904]  ? calculate_sigpending+0x7b/0xa0
[   66.029909]  ? __pfx_kthread+0x10/0x10
[   66.029913]  ret_from_fork+0x113/0x1d0
[   66.029916]  ? __pfx_kthread+0x10/0x10
[   66.029920]  ret_from_fork_asm+0x1a/0x30
[   66.029926]  </TASK>
[   66.029928] 
[   66.213060] Allocated by task 306:
[   66.216467]  kasan_save_stack+0x45/0x70
[   66.220308]  kasan_save_track+0x18/0x40
[   66.224147]  kasan_save_alloc_info+0x3b/0x50
[   66.228428]  __kasan_kmalloc+0xb7/0xc0
[   66.232180]  __kmalloc_cache_noprof+0x189/0x420
[   66.236714]  kasan_atomics+0x95/0x310
[   66.240415]  kunit_try_run_case+0x1a2/0x480
[   66.244607]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.250008]  kthread+0x334/0x6f0
[   66.253249]  ret_from_fork+0x113/0x1d0
[   66.257000]  ret_from_fork_asm+0x1a/0x30
[   66.260928] 
[   66.262426] The buggy address belongs to the object at ffff8881066eaf00
[   66.262426]  which belongs to the cache kmalloc-64 of size 64
[   66.274768] The buggy address is located 0 bytes to the right of
[   66.274768]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   66.287630] 
[   66.289127] The buggy address belongs to the physical page:
[   66.294702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   66.302708] flags: 0x200000000000000(node=0|zone=2)
[   66.307589] page_type: f5(slab)
[   66.310736] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   66.318482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.326221] page dumped because: kasan: bad access detected
[   66.331793] 
[   66.333292] Memory state around the buggy address:
[   66.338086]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   66.345306]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   66.352525] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   66.359745]                                      ^
[   66.364538]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.371757]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.378975] ==================================================================
[   52.744576] ==================================================================
[   52.751822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   52.759129] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   52.766528] 
[   52.768029] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   52.768037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   52.768040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   52.768043] Call Trace:
[   52.768045]  <TASK>
[   52.768047]  dump_stack_lvl+0x73/0xb0
[   52.768052]  print_report+0xd1/0x650
[   52.768056]  ? __virt_addr_valid+0x1db/0x2d0
[   52.768060]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.768064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   52.768069]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.768073]  kasan_report+0x141/0x180
[   52.768078]  ? kasan_atomics_helper+0x4a0/0x5450
[   52.768082]  kasan_check_range+0x10c/0x1c0
[   52.768087]  __kasan_check_write+0x18/0x20
[   52.768091]  kasan_atomics_helper+0x4a0/0x5450
[   52.768095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   52.768099]  ? __kmalloc_cache_noprof+0x189/0x420
[   52.768104]  ? kasan_atomics+0x152/0x310
[   52.768109]  kasan_atomics+0x1dc/0x310
[   52.768114]  ? __pfx_kasan_atomics+0x10/0x10
[   52.768118]  ? ktime_get_ts64+0x83/0x230
[   52.768123]  kunit_try_run_case+0x1a2/0x480
[   52.768128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.768132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   52.768136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   52.768141]  ? __kthread_parkme+0x82/0x180
[   52.768145]  ? preempt_count_sub+0x50/0x80
[   52.768149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   52.768153]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.768158]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   52.768162]  kthread+0x334/0x6f0
[   52.768166]  ? trace_preempt_on+0x20/0xc0
[   52.768170]  ? __pfx_kthread+0x10/0x10
[   52.768174]  ? _raw_spin_unlock_irq+0x47/0x80
[   52.768178]  ? calculate_sigpending+0x7b/0xa0
[   52.768183]  ? __pfx_kthread+0x10/0x10
[   52.768187]  ret_from_fork+0x113/0x1d0
[   52.768191]  ? __pfx_kthread+0x10/0x10
[   52.768195]  ret_from_fork_asm+0x1a/0x30
[   52.768200]  </TASK>
[   52.768202] 
[   52.950989] Allocated by task 306:
[   52.954418]  kasan_save_stack+0x45/0x70
[   52.958261]  kasan_save_track+0x18/0x40
[   52.962102]  kasan_save_alloc_info+0x3b/0x50
[   52.966418]  __kasan_kmalloc+0xb7/0xc0
[   52.970169]  __kmalloc_cache_noprof+0x189/0x420
[   52.974709]  kasan_atomics+0x95/0x310
[   52.978418]  kunit_try_run_case+0x1a2/0x480
[   52.982606]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   52.988006]  kthread+0x334/0x6f0
[   52.991238]  ret_from_fork+0x113/0x1d0
[   52.994990]  ret_from_fork_asm+0x1a/0x30
[   52.998917] 
[   53.000416] The buggy address belongs to the object at ffff8881066eaf00
[   53.000416]  which belongs to the cache kmalloc-64 of size 64
[   53.012757] The buggy address is located 0 bytes to the right of
[   53.012757]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   53.025620] 
[   53.027117] The buggy address belongs to the physical page:
[   53.032692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   53.040698] flags: 0x200000000000000(node=0|zone=2)
[   53.045577] page_type: f5(slab)
[   53.048726] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   53.056472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.064210] page dumped because: kasan: bad access detected
[   53.069784] 
[   53.071283] Memory state around the buggy address:
[   53.076075]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.083294]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   53.090515] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.097741]                                      ^
[   53.102536]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.109763]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   53.116981] ==================================================================
[   66.766248] ==================================================================
[   66.773487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   66.780883] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   66.788282] 
[   66.789782] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   66.789790] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   66.789793] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   66.789796] Call Trace:
[   66.789798]  <TASK>
[   66.789800]  dump_stack_lvl+0x73/0xb0
[   66.789805]  print_report+0xd1/0x650
[   66.789809]  ? __virt_addr_valid+0x1db/0x2d0
[   66.789813]  ? kasan_atomics_helper+0x177f/0x5450
[   66.789817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   66.789822]  ? kasan_atomics_helper+0x177f/0x5450
[   66.789826]  kasan_report+0x141/0x180
[   66.789830]  ? kasan_atomics_helper+0x177f/0x5450
[   66.789835]  kasan_check_range+0x10c/0x1c0
[   66.789840]  __kasan_check_write+0x18/0x20
[   66.789844]  kasan_atomics_helper+0x177f/0x5450
[   66.789848]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   66.789852]  ? __kmalloc_cache_noprof+0x189/0x420
[   66.789857]  ? kasan_atomics+0x152/0x310
[   66.789862]  kasan_atomics+0x1dc/0x310
[   66.789866]  ? __pfx_kasan_atomics+0x10/0x10
[   66.789871]  ? ktime_get_ts64+0x83/0x230
[   66.789876]  kunit_try_run_case+0x1a2/0x480
[   66.789880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.789885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   66.789889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   66.789894]  ? __kthread_parkme+0x82/0x180
[   66.789897]  ? preempt_count_sub+0x50/0x80
[   66.789902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   66.789906]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   66.789911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   66.789915]  kthread+0x334/0x6f0
[   66.789919]  ? trace_preempt_on+0x20/0xc0
[   66.789923]  ? __pfx_kthread+0x10/0x10
[   66.789927]  ? _raw_spin_unlock_irq+0x47/0x80
[   66.789931]  ? calculate_sigpending+0x7b/0xa0
[   66.789936]  ? __pfx_kthread+0x10/0x10
[   66.789940]  ret_from_fork+0x113/0x1d0
[   66.789944]  ? __pfx_kthread+0x10/0x10
[   66.789948]  ret_from_fork_asm+0x1a/0x30
[   66.789954]  </TASK>
[   66.789955] 
[   66.973038] Allocated by task 306:
[   66.976443]  kasan_save_stack+0x45/0x70
[   66.980282]  kasan_save_track+0x18/0x40
[   66.984123]  kasan_save_alloc_info+0x3b/0x50
[   66.988424]  __kasan_kmalloc+0xb7/0xc0
[   66.992183]  __kmalloc_cache_noprof+0x189/0x420
[   66.996723]  kasan_atomics+0x95/0x310
[   67.000418]  kunit_try_run_case+0x1a2/0x480
[   67.004611]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   67.010020]  kthread+0x334/0x6f0
[   67.013261]  ret_from_fork+0x113/0x1d0
[   67.017012]  ret_from_fork_asm+0x1a/0x30
[   67.020939] 
[   67.022438] The buggy address belongs to the object at ffff8881066eaf00
[   67.022438]  which belongs to the cache kmalloc-64 of size 64
[   67.034778] The buggy address is located 0 bytes to the right of
[   67.034778]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   67.047641] 
[   67.049141] The buggy address belongs to the physical page:
[   67.054713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   67.062712] flags: 0x200000000000000(node=0|zone=2)
[   67.067592] page_type: f5(slab)
[   67.070739] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   67.078486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.086233] page dumped because: kasan: bad access detected
[   67.091806] 
[   67.093303] Memory state around the buggy address:
[   67.098099]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   67.105325]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   67.112570] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   67.119791]                                      ^
[   67.124584]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.131812]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.139037] ==================================================================
[   70.563039] ==================================================================
[   70.570288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   70.577689] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   70.585089] 
[   70.586590] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   70.586598] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   70.586600] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   70.586604] Call Trace:
[   70.586605]  <TASK>
[   70.586607]  dump_stack_lvl+0x73/0xb0
[   70.586612]  print_report+0xd1/0x650
[   70.586616]  ? __virt_addr_valid+0x1db/0x2d0
[   70.586620]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.586624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   70.586629]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.586633]  kasan_report+0x141/0x180
[   70.586637]  ? kasan_atomics_helper+0x1d7a/0x5450
[   70.586642]  kasan_check_range+0x10c/0x1c0
[   70.586647]  __kasan_check_write+0x18/0x20
[   70.586650]  kasan_atomics_helper+0x1d7a/0x5450
[   70.586654]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   70.586659]  ? __kmalloc_cache_noprof+0x189/0x420
[   70.586664]  ? kasan_atomics+0x152/0x310
[   70.586669]  kasan_atomics+0x1dc/0x310
[   70.586673]  ? __pfx_kasan_atomics+0x10/0x10
[   70.586678]  ? ktime_get_ts64+0x83/0x230
[   70.586682]  kunit_try_run_case+0x1a2/0x480
[   70.586687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.586691]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   70.586696]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   70.586700]  ? __kthread_parkme+0x82/0x180
[   70.586704]  ? preempt_count_sub+0x50/0x80
[   70.586708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   70.586713]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.586717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   70.586722]  kthread+0x334/0x6f0
[   70.586725]  ? trace_preempt_on+0x20/0xc0
[   70.586729]  ? __pfx_kthread+0x10/0x10
[   70.586733]  ? _raw_spin_unlock_irq+0x47/0x80
[   70.586737]  ? calculate_sigpending+0x7b/0xa0
[   70.586742]  ? __pfx_kthread+0x10/0x10
[   70.586746]  ret_from_fork+0x113/0x1d0
[   70.586750]  ? __pfx_kthread+0x10/0x10
[   70.586754]  ret_from_fork_asm+0x1a/0x30
[   70.586760]  </TASK>
[   70.586761] 
[   70.769764] Allocated by task 306:
[   70.773172]  kasan_save_stack+0x45/0x70
[   70.777011]  kasan_save_track+0x18/0x40
[   70.780852]  kasan_save_alloc_info+0x3b/0x50
[   70.785133]  __kasan_kmalloc+0xb7/0xc0
[   70.788885]  __kmalloc_cache_noprof+0x189/0x420
[   70.793425]  kasan_atomics+0x95/0x310
[   70.797091]  kunit_try_run_case+0x1a2/0x480
[   70.801279]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.806686]  kthread+0x334/0x6f0
[   70.809920]  ret_from_fork+0x113/0x1d0
[   70.813672]  ret_from_fork_asm+0x1a/0x30
[   70.817597] 
[   70.819096] The buggy address belongs to the object at ffff8881066eaf00
[   70.819096]  which belongs to the cache kmalloc-64 of size 64
[   70.831437] The buggy address is located 0 bytes to the right of
[   70.831437]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   70.844299] 
[   70.845798] The buggy address belongs to the physical page:
[   70.851393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   70.859430] flags: 0x200000000000000(node=0|zone=2)
[   70.864309] page_type: f5(slab)
[   70.867458] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.875204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.882944] page dumped because: kasan: bad access detected
[   70.888517] 
[   70.890014] Memory state around the buggy address:
[   70.894808]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.902028]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   70.909247] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.916467]                                      ^
[   70.921259]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.928480]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   70.935707] ==================================================================
[   56.537332] ==================================================================
[   56.544590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   56.551896] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   56.559287] 
[   56.560790] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   56.560798] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   56.560800] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   56.560804] Call Trace:
[   56.560805]  <TASK>
[   56.560807]  dump_stack_lvl+0x73/0xb0
[   56.560812]  print_report+0xd1/0x650
[   56.560816]  ? __virt_addr_valid+0x1db/0x2d0
[   56.560820]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.560824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   56.560829]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.560833]  kasan_report+0x141/0x180
[   56.560838]  ? kasan_atomics_helper+0xa2b/0x5450
[   56.560843]  kasan_check_range+0x10c/0x1c0
[   56.560847]  __kasan_check_write+0x18/0x20
[   56.560851]  kasan_atomics_helper+0xa2b/0x5450
[   56.560855]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   56.560859]  ? __kmalloc_cache_noprof+0x189/0x420
[   56.560864]  ? kasan_atomics+0x152/0x310
[   56.560870]  kasan_atomics+0x1dc/0x310
[   56.560874]  ? __pfx_kasan_atomics+0x10/0x10
[   56.560879]  ? ktime_get_ts64+0x83/0x230
[   56.560883]  kunit_try_run_case+0x1a2/0x480
[   56.560888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.560892]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   56.560897]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   56.560901]  ? __kthread_parkme+0x82/0x180
[   56.560905]  ? preempt_count_sub+0x50/0x80
[   56.560910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.560914]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.560919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   56.560923]  kthread+0x334/0x6f0
[   56.560927]  ? trace_preempt_on+0x20/0xc0
[   56.560931]  ? __pfx_kthread+0x10/0x10
[   56.560935]  ? _raw_spin_unlock_irq+0x47/0x80
[   56.560939]  ? calculate_sigpending+0x7b/0xa0
[   56.560944]  ? __pfx_kthread+0x10/0x10
[   56.560948]  ret_from_fork+0x113/0x1d0
[   56.560951]  ? __pfx_kthread+0x10/0x10
[   56.560955]  ret_from_fork_asm+0x1a/0x30
[   56.560961]  </TASK>
[   56.560963] 
[   56.743773] Allocated by task 306:
[   56.747180]  kasan_save_stack+0x45/0x70
[   56.751020]  kasan_save_track+0x18/0x40
[   56.754861]  kasan_save_alloc_info+0x3b/0x50
[   56.759141]  __kasan_kmalloc+0xb7/0xc0
[   56.762893]  __kmalloc_cache_noprof+0x189/0x420
[   56.767428]  kasan_atomics+0x95/0x310
[   56.771099]  kunit_try_run_case+0x1a2/0x480
[   56.775288]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.780694]  kthread+0x334/0x6f0
[   56.783928]  ret_from_fork+0x113/0x1d0
[   56.787679]  ret_from_fork_asm+0x1a/0x30
[   56.791604] 
[   56.793105] The buggy address belongs to the object at ffff8881066eaf00
[   56.793105]  which belongs to the cache kmalloc-64 of size 64
[   56.805445] The buggy address is located 0 bytes to the right of
[   56.805445]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   56.818309] 
[   56.819806] The buggy address belongs to the physical page:
[   56.825422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   56.833427] flags: 0x200000000000000(node=0|zone=2)
[   56.838309] page_type: f5(slab)
[   56.841458] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.849204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.856943] page dumped because: kasan: bad access detected
[   56.862515] 
[   56.864016] Memory state around the buggy address:
[   56.868809]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.876026]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   56.883248] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.890475]                                      ^
[   56.895267]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.902488]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   56.909714] ==================================================================
[   69.806432] ==================================================================
[   69.813673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   69.821073] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   69.828423] 
[   69.829922] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   69.829930] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   69.829932] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   69.829936] Call Trace:
[   69.829937]  <TASK>
[   69.829939]  dump_stack_lvl+0x73/0xb0
[   69.829944]  print_report+0xd1/0x650
[   69.829948]  ? __virt_addr_valid+0x1db/0x2d0
[   69.829952]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.829956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   69.829962]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.829966]  kasan_report+0x141/0x180
[   69.829970]  ? kasan_atomics_helper+0x4f30/0x5450
[   69.829975]  __asan_report_load8_noabort+0x18/0x20
[   69.829980]  kasan_atomics_helper+0x4f30/0x5450
[   69.829984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   69.829988]  ? __kmalloc_cache_noprof+0x189/0x420
[   69.829993]  ? kasan_atomics+0x152/0x310
[   69.829998]  kasan_atomics+0x1dc/0x310
[   69.830002]  ? __pfx_kasan_atomics+0x10/0x10
[   69.830007]  ? ktime_get_ts64+0x83/0x230
[   69.830012]  kunit_try_run_case+0x1a2/0x480
[   69.830016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.830021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   69.830025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   69.830030]  ? __kthread_parkme+0x82/0x180
[   69.830033]  ? preempt_count_sub+0x50/0x80
[   69.830038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   69.830042]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   69.830047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   69.830051]  kthread+0x334/0x6f0
[   69.830055]  ? trace_preempt_on+0x20/0xc0
[   69.830059]  ? __pfx_kthread+0x10/0x10
[   69.830063]  ? _raw_spin_unlock_irq+0x47/0x80
[   69.830067]  ? calculate_sigpending+0x7b/0xa0
[   69.830072]  ? __pfx_kthread+0x10/0x10
[   69.830076]  ret_from_fork+0x113/0x1d0
[   69.830079]  ? __pfx_kthread+0x10/0x10
[   69.830083]  ret_from_fork_asm+0x1a/0x30
[   69.830089]  </TASK>
[   69.830091] 
[   70.009790] Allocated by task 306:
[   70.013195]  kasan_save_stack+0x45/0x70
[   70.017034]  kasan_save_track+0x18/0x40
[   70.020873]  kasan_save_alloc_info+0x3b/0x50
[   70.025147]  __kasan_kmalloc+0xb7/0xc0
[   70.028900]  __kmalloc_cache_noprof+0x189/0x420
[   70.033442]  kasan_atomics+0x95/0x310
[   70.037114]  kunit_try_run_case+0x1a2/0x480
[   70.041302]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   70.046709]  kthread+0x334/0x6f0
[   70.049941]  ret_from_fork+0x113/0x1d0
[   70.053694]  ret_from_fork_asm+0x1a/0x30
[   70.057622] 
[   70.059119] The buggy address belongs to the object at ffff8881066eaf00
[   70.059119]  which belongs to the cache kmalloc-64 of size 64
[   70.071461] The buggy address is located 0 bytes to the right of
[   70.071461]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   70.084324] 
[   70.085848] The buggy address belongs to the physical page:
[   70.091430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   70.099438] flags: 0x200000000000000(node=0|zone=2)
[   70.104317] page_type: f5(slab)
[   70.107497] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   70.115236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   70.122977] page dumped because: kasan: bad access detected
[   70.128549] 
[   70.130048] Memory state around the buggy address:
[   70.134842]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   70.142069]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   70.149297] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   70.156515]                                      ^
[   70.161307]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   70.168527]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   70.175745] ==================================================================
[   62.976533] ==================================================================
[   62.983772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   62.991165] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   62.998558] 
[   63.000059] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   63.000067] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   63.000070] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   63.000073] Call Trace:
[   63.000075]  <TASK>
[   63.000077]  dump_stack_lvl+0x73/0xb0
[   63.000081]  print_report+0xd1/0x650
[   63.000085]  ? __virt_addr_valid+0x1db/0x2d0
[   63.000089]  ? kasan_atomics_helper+0x12e6/0x5450
[   63.000093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   63.000098]  ? kasan_atomics_helper+0x12e6/0x5450
[   63.000102]  kasan_report+0x141/0x180
[   63.000107]  ? kasan_atomics_helper+0x12e6/0x5450
[   63.000111]  kasan_check_range+0x10c/0x1c0
[   63.000116]  __kasan_check_write+0x18/0x20
[   63.000120]  kasan_atomics_helper+0x12e6/0x5450
[   63.000124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   63.000128]  ? __kmalloc_cache_noprof+0x189/0x420
[   63.000133]  ? kasan_atomics+0x152/0x310
[   63.000138]  kasan_atomics+0x1dc/0x310
[   63.000142]  ? __pfx_kasan_atomics+0x10/0x10
[   63.000147]  ? ktime_get_ts64+0x83/0x230
[   63.000152]  kunit_try_run_case+0x1a2/0x480
[   63.000156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.000161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   63.000165]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   63.000170]  ? __kthread_parkme+0x82/0x180
[   63.000173]  ? preempt_count_sub+0x50/0x80
[   63.000178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   63.000183]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.000187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   63.000191]  kthread+0x334/0x6f0
[   63.000195]  ? trace_preempt_on+0x20/0xc0
[   63.000199]  ? __pfx_kthread+0x10/0x10
[   63.000203]  ? _raw_spin_unlock_irq+0x47/0x80
[   63.000207]  ? calculate_sigpending+0x7b/0xa0
[   63.000212]  ? __pfx_kthread+0x10/0x10
[   63.000216]  ret_from_fork+0x113/0x1d0
[   63.000219]  ? __pfx_kthread+0x10/0x10
[   63.000223]  ret_from_fork_asm+0x1a/0x30
[   63.000229]  </TASK>
[   63.000231] 
[   63.183287] Allocated by task 306:
[   63.186692]  kasan_save_stack+0x45/0x70
[   63.190533]  kasan_save_track+0x18/0x40
[   63.194415]  kasan_save_alloc_info+0x3b/0x50
[   63.198686]  __kasan_kmalloc+0xb7/0xc0
[   63.202439]  __kmalloc_cache_noprof+0x189/0x420
[   63.206971]  kasan_atomics+0x95/0x310
[   63.210638]  kunit_try_run_case+0x1a2/0x480
[   63.214825]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   63.220223]  kthread+0x334/0x6f0
[   63.223457]  ret_from_fork+0x113/0x1d0
[   63.227209]  ret_from_fork_asm+0x1a/0x30
[   63.231135] 
[   63.232633] The buggy address belongs to the object at ffff8881066eaf00
[   63.232633]  which belongs to the cache kmalloc-64 of size 64
[   63.244966] The buggy address is located 0 bytes to the right of
[   63.244966]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   63.257829] 
[   63.259346] The buggy address belongs to the physical page:
[   63.264927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   63.272934] flags: 0x200000000000000(node=0|zone=2)
[   63.277813] page_type: f5(slab)
[   63.280960] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   63.288700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.296448] page dumped because: kasan: bad access detected
[   63.302021] 
[   63.303517] Memory state around the buggy address:
[   63.308311]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.315565]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   63.322784] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.330003]                                      ^
[   63.334798]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.342024]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   63.349245] ==================================================================
[   58.055675] ==================================================================
[   58.062921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   58.070315] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   58.077655] 
[   58.079157] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   58.079165] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   58.079167] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   58.079171] Call Trace:
[   58.079173]  <TASK>
[   58.079175]  dump_stack_lvl+0x73/0xb0
[   58.079179]  print_report+0xd1/0x650
[   58.079183]  ? __virt_addr_valid+0x1db/0x2d0
[   58.079187]  ? kasan_atomics_helper+0x4a84/0x5450
[   58.079191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   58.079197]  ? kasan_atomics_helper+0x4a84/0x5450
[   58.079201]  kasan_report+0x141/0x180
[   58.079205]  ? kasan_atomics_helper+0x4a84/0x5450
[   58.079210]  __asan_report_load4_noabort+0x18/0x20
[   58.079215]  kasan_atomics_helper+0x4a84/0x5450
[   58.079219]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   58.079223]  ? __kmalloc_cache_noprof+0x189/0x420
[   58.079228]  ? kasan_atomics+0x152/0x310
[   58.079233]  kasan_atomics+0x1dc/0x310
[   58.079238]  ? __pfx_kasan_atomics+0x10/0x10
[   58.079242]  ? ktime_get_ts64+0x83/0x230
[   58.079247]  kunit_try_run_case+0x1a2/0x480
[   58.079252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.079256]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   58.079261]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   58.079265]  ? __kthread_parkme+0x82/0x180
[   58.079269]  ? preempt_count_sub+0x50/0x80
[   58.079273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   58.079278]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.079282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   58.079286]  kthread+0x334/0x6f0
[   58.079290]  ? trace_preempt_on+0x20/0xc0
[   58.079294]  ? __pfx_kthread+0x10/0x10
[   58.079298]  ? _raw_spin_unlock_irq+0x47/0x80
[   58.079302]  ? calculate_sigpending+0x7b/0xa0
[   58.079307]  ? __pfx_kthread+0x10/0x10
[   58.079311]  ret_from_fork+0x113/0x1d0
[   58.079315]  ? __pfx_kthread+0x10/0x10
[   58.079319]  ret_from_fork_asm+0x1a/0x30
[   58.079325]  </TASK>
[   58.079346] 
[   58.259047] Allocated by task 306:
[   58.262453]  kasan_save_stack+0x45/0x70
[   58.266294]  kasan_save_track+0x18/0x40
[   58.270132]  kasan_save_alloc_info+0x3b/0x50
[   58.274422]  __kasan_kmalloc+0xb7/0xc0
[   58.278173]  __kmalloc_cache_noprof+0x189/0x420
[   58.282709]  kasan_atomics+0x95/0x310
[   58.286416]  kunit_try_run_case+0x1a2/0x480
[   58.290603]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   58.296003]  kthread+0x334/0x6f0
[   58.299235]  ret_from_fork+0x113/0x1d0
[   58.302988]  ret_from_fork_asm+0x1a/0x30
[   58.306921] 
[   58.308427] The buggy address belongs to the object at ffff8881066eaf00
[   58.308427]  which belongs to the cache kmalloc-64 of size 64
[   58.320762] The buggy address is located 0 bytes to the right of
[   58.320762]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   58.333624] 
[   58.335124] The buggy address belongs to the physical page:
[   58.340697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   58.348703] flags: 0x200000000000000(node=0|zone=2)
[   58.353583] page_type: f5(slab)
[   58.356730] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   58.364477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.372216] page dumped because: kasan: bad access detected
[   58.377787] 
[   58.379290] Memory state around the buggy address:
[   58.384083]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.391310]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   58.398529] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.405747]                                      ^
[   58.410540]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.417759]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   58.424977] ==================================================================
[   65.626199] ==================================================================
[   65.633445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   65.640840] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   65.648239] 
[   65.649740] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   65.649748] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   65.649751] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   65.649754] Call Trace:
[   65.649756]  <TASK>
[   65.649758]  dump_stack_lvl+0x73/0xb0
[   65.649763]  print_report+0xd1/0x650
[   65.649767]  ? __virt_addr_valid+0x1db/0x2d0
[   65.649771]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.649775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   65.649780]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.649784]  kasan_report+0x141/0x180
[   65.649788]  ? kasan_atomics_helper+0x15b6/0x5450
[   65.649793]  kasan_check_range+0x10c/0x1c0
[   65.649798]  __kasan_check_write+0x18/0x20
[   65.649802]  kasan_atomics_helper+0x15b6/0x5450
[   65.649806]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   65.649810]  ? __kmalloc_cache_noprof+0x189/0x420
[   65.649815]  ? kasan_atomics+0x152/0x310
[   65.649820]  kasan_atomics+0x1dc/0x310
[   65.649825]  ? __pfx_kasan_atomics+0x10/0x10
[   65.649829]  ? ktime_get_ts64+0x83/0x230
[   65.649834]  kunit_try_run_case+0x1a2/0x480
[   65.649839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.649843]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   65.649847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   65.649852]  ? __kthread_parkme+0x82/0x180
[   65.649855]  ? preempt_count_sub+0x50/0x80
[   65.649860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   65.649865]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.649869]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   65.649873]  kthread+0x334/0x6f0
[   65.649877]  ? trace_preempt_on+0x20/0xc0
[   65.649881]  ? __pfx_kthread+0x10/0x10
[   65.649885]  ? _raw_spin_unlock_irq+0x47/0x80
[   65.649889]  ? calculate_sigpending+0x7b/0xa0
[   65.649894]  ? __pfx_kthread+0x10/0x10
[   65.649898]  ret_from_fork+0x113/0x1d0
[   65.649901]  ? __pfx_kthread+0x10/0x10
[   65.649905]  ret_from_fork_asm+0x1a/0x30
[   65.649911]  </TASK>
[   65.649913] 
[   65.833065] Allocated by task 306:
[   65.836469]  kasan_save_stack+0x45/0x70
[   65.840309]  kasan_save_track+0x18/0x40
[   65.844148]  kasan_save_alloc_info+0x3b/0x50
[   65.848423]  __kasan_kmalloc+0xb7/0xc0
[   65.852173]  __kmalloc_cache_noprof+0x189/0x420
[   65.856706]  kasan_atomics+0x95/0x310
[   65.860418]  kunit_try_run_case+0x1a2/0x480
[   65.864610]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   65.870010]  kthread+0x334/0x6f0
[   65.873242]  ret_from_fork+0x113/0x1d0
[   65.876995]  ret_from_fork_asm+0x1a/0x30
[   65.880920] 
[   65.882421] The buggy address belongs to the object at ffff8881066eaf00
[   65.882421]  which belongs to the cache kmalloc-64 of size 64
[   65.894762] The buggy address is located 0 bytes to the right of
[   65.894762]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   65.907623] 
[   65.909121] The buggy address belongs to the physical page:
[   65.914697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   65.922703] flags: 0x200000000000000(node=0|zone=2)
[   65.927583] page_type: f5(slab)
[   65.930730] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   65.938478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.946226] page dumped because: kasan: bad access detected
[   65.951797] 
[   65.953297] Memory state around the buggy address:
[   65.958089]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   65.965310]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   65.972527] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   65.979747]                                      ^
[   65.984542]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.991769]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.998996] ==================================================================
[   57.296573] ==================================================================
[   57.303822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   57.311134] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   57.318529] 
[   57.320029] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   57.320037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   57.320040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   57.320044] Call Trace:
[   57.320046]  <TASK>
[   57.320047]  dump_stack_lvl+0x73/0xb0
[   57.320052]  print_report+0xd1/0x650
[   57.320056]  ? __virt_addr_valid+0x1db/0x2d0
[   57.320060]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.320064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   57.320070]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.320074]  kasan_report+0x141/0x180
[   57.320078]  ? kasan_atomics_helper+0xb6a/0x5450
[   57.320083]  kasan_check_range+0x10c/0x1c0
[   57.320087]  __kasan_check_write+0x18/0x20
[   57.320091]  kasan_atomics_helper+0xb6a/0x5450
[   57.320095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   57.320099]  ? __kmalloc_cache_noprof+0x189/0x420
[   57.320104]  ? kasan_atomics+0x152/0x310
[   57.320109]  kasan_atomics+0x1dc/0x310
[   57.320114]  ? __pfx_kasan_atomics+0x10/0x10
[   57.320119]  ? ktime_get_ts64+0x83/0x230
[   57.320123]  kunit_try_run_case+0x1a2/0x480
[   57.320128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.320132]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   57.320137]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   57.320141]  ? __kthread_parkme+0x82/0x180
[   57.320145]  ? preempt_count_sub+0x50/0x80
[   57.320149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   57.320153]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.320158]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   57.320162]  kthread+0x334/0x6f0
[   57.320166]  ? trace_preempt_on+0x20/0xc0
[   57.320170]  ? __pfx_kthread+0x10/0x10
[   57.320174]  ? _raw_spin_unlock_irq+0x47/0x80
[   57.320178]  ? calculate_sigpending+0x7b/0xa0
[   57.320183]  ? __pfx_kthread+0x10/0x10
[   57.320187]  ret_from_fork+0x113/0x1d0
[   57.320190]  ? __pfx_kthread+0x10/0x10
[   57.320194]  ret_from_fork_asm+0x1a/0x30
[   57.320200]  </TASK>
[   57.320202] 
[   57.502955] Allocated by task 306:
[   57.506376]  kasan_save_stack+0x45/0x70
[   57.510244]  kasan_save_track+0x18/0x40
[   57.514080]  kasan_save_alloc_info+0x3b/0x50
[   57.518361]  __kasan_kmalloc+0xb7/0xc0
[   57.522157]  __kmalloc_cache_noprof+0x189/0x420
[   57.526690]  kasan_atomics+0x95/0x310
[   57.530361]  kunit_try_run_case+0x1a2/0x480
[   57.534595]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   57.539995]  kthread+0x334/0x6f0
[   57.543227]  ret_from_fork+0x113/0x1d0
[   57.546981]  ret_from_fork_asm+0x1a/0x30
[   57.550905] 
[   57.552420] The buggy address belongs to the object at ffff8881066eaf00
[   57.552420]  which belongs to the cache kmalloc-64 of size 64
[   57.564755] The buggy address is located 0 bytes to the right of
[   57.564755]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   57.577616] 
[   57.579117] The buggy address belongs to the physical page:
[   57.584688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   57.592688] flags: 0x200000000000000(node=0|zone=2)
[   57.597569] page_type: f5(slab)
[   57.600713] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   57.608454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.616190] page dumped because: kasan: bad access detected
[   57.621765] 
[   57.623263] Memory state around the buggy address:
[   57.628056]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.635278]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   57.642504] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.649724]                                      ^
[   57.654517]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.661744]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   57.668963] ==================================================================
[   56.157694] ==================================================================
[   56.164938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   56.172246] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   56.179647] 
[   56.181146] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   56.181154] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   56.181156] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   56.181160] Call Trace:
[   56.181162]  <TASK>
[   56.181163]  dump_stack_lvl+0x73/0xb0
[   56.181168]  print_report+0xd1/0x650
[   56.181172]  ? __virt_addr_valid+0x1db/0x2d0
[   56.181176]  ? kasan_atomics_helper+0x992/0x5450
[   56.181180]  ? kasan_complete_mode_report_info+0x2a/0x200
[   56.181186]  ? kasan_atomics_helper+0x992/0x5450
[   56.181190]  kasan_report+0x141/0x180
[   56.181194]  ? kasan_atomics_helper+0x992/0x5450
[   56.181199]  kasan_check_range+0x10c/0x1c0
[   56.181203]  __kasan_check_write+0x18/0x20
[   56.181207]  kasan_atomics_helper+0x992/0x5450
[   56.181211]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   56.181215]  ? __kmalloc_cache_noprof+0x189/0x420
[   56.181220]  ? kasan_atomics+0x152/0x310
[   56.181225]  kasan_atomics+0x1dc/0x310
[   56.181230]  ? __pfx_kasan_atomics+0x10/0x10
[   56.181235]  ? ktime_get_ts64+0x83/0x230
[   56.181239]  kunit_try_run_case+0x1a2/0x480
[   56.181244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.181248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   56.181253]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   56.181257]  ? __kthread_parkme+0x82/0x180
[   56.181261]  ? preempt_count_sub+0x50/0x80
[   56.181265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   56.181270]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.181274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   56.181279]  kthread+0x334/0x6f0
[   56.181282]  ? trace_preempt_on+0x20/0xc0
[   56.181286]  ? __pfx_kthread+0x10/0x10
[   56.181290]  ? _raw_spin_unlock_irq+0x47/0x80
[   56.181294]  ? calculate_sigpending+0x7b/0xa0
[   56.181299]  ? __pfx_kthread+0x10/0x10
[   56.181303]  ret_from_fork+0x113/0x1d0
[   56.181307]  ? __pfx_kthread+0x10/0x10
[   56.181311]  ret_from_fork_asm+0x1a/0x30
[   56.181316]  </TASK>
[   56.181318] 
[   56.364088] Allocated by task 306:
[   56.367494]  kasan_save_stack+0x45/0x70
[   56.371367]  kasan_save_track+0x18/0x40
[   56.375233]  kasan_save_alloc_info+0x3b/0x50
[   56.379507]  __kasan_kmalloc+0xb7/0xc0
[   56.383259]  __kmalloc_cache_noprof+0x189/0x420
[   56.387792]  kasan_atomics+0x95/0x310
[   56.391460]  kunit_try_run_case+0x1a2/0x480
[   56.395652]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   56.401053]  kthread+0x334/0x6f0
[   56.404286]  ret_from_fork+0x113/0x1d0
[   56.408038]  ret_from_fork_asm+0x1a/0x30
[   56.411963] 
[   56.413463] The buggy address belongs to the object at ffff8881066eaf00
[   56.413463]  which belongs to the cache kmalloc-64 of size 64
[   56.425804] The buggy address is located 0 bytes to the right of
[   56.425804]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   56.438667] 
[   56.440166] The buggy address belongs to the physical page:
[   56.445738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   56.453746] flags: 0x200000000000000(node=0|zone=2)
[   56.458624] page_type: f5(slab)
[   56.461772] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   56.469513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.477258] page dumped because: kasan: bad access detected
[   56.482831] 
[   56.484362] Memory state around the buggy address:
[   56.489184]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.496419]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   56.503639] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.510858]                                      ^
[   56.515652]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.522872]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   56.530089] ==================================================================
[   64.112856] ==================================================================
[   64.120097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   64.127491] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306
[   64.134803] 
[   64.136306] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   64.136314] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   64.136317] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   64.136320] Call Trace:
[   64.136322]  <TASK>
[   64.136324]  dump_stack_lvl+0x73/0xb0
[   64.136348]  print_report+0xd1/0x650
[   64.136352]  ? __virt_addr_valid+0x1db/0x2d0
[   64.136357]  ? kasan_atomics_helper+0x4eae/0x5450
[   64.136361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   64.136367]  ? kasan_atomics_helper+0x4eae/0x5450
[   64.136383]  kasan_report+0x141/0x180
[   64.136388]  ? kasan_atomics_helper+0x4eae/0x5450
[   64.136405]  __asan_report_load8_noabort+0x18/0x20
[   64.136410]  kasan_atomics_helper+0x4eae/0x5450
[   64.136414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   64.136419]  ? __kmalloc_cache_noprof+0x189/0x420
[   64.136423]  ? kasan_atomics+0x152/0x310
[   64.136429]  kasan_atomics+0x1dc/0x310
[   64.136433]  ? __pfx_kasan_atomics+0x10/0x10
[   64.136438]  ? ktime_get_ts64+0x83/0x230
[   64.136442]  kunit_try_run_case+0x1a2/0x480
[   64.136447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.136451]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   64.136456]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   64.136460]  ? __kthread_parkme+0x82/0x180
[   64.136464]  ? preempt_count_sub+0x50/0x80
[   64.136468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   64.136473]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.136477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   64.136482]  kthread+0x334/0x6f0
[   64.136485]  ? trace_preempt_on+0x20/0xc0
[   64.136490]  ? __pfx_kthread+0x10/0x10
[   64.136494]  ? _raw_spin_unlock_irq+0x47/0x80
[   64.136498]  ? calculate_sigpending+0x7b/0xa0
[   64.136502]  ? __pfx_kthread+0x10/0x10
[   64.136506]  ret_from_fork+0x113/0x1d0
[   64.136510]  ? __pfx_kthread+0x10/0x10
[   64.136514]  ret_from_fork_asm+0x1a/0x30
[   64.136520]  </TASK>
[   64.136521] 
[   64.316214] Allocated by task 306:
[   64.319621]  kasan_save_stack+0x45/0x70
[   64.323468]  kasan_save_track+0x18/0x40
[   64.327306]  kasan_save_alloc_info+0x3b/0x50
[   64.331581]  __kasan_kmalloc+0xb7/0xc0
[   64.335361]  __kmalloc_cache_noprof+0x189/0x420
[   64.339918]  kasan_atomics+0x95/0x310
[   64.343591]  kunit_try_run_case+0x1a2/0x480
[   64.347777]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   64.353178]  kthread+0x334/0x6f0
[   64.356419]  ret_from_fork+0x113/0x1d0
[   64.360171]  ret_from_fork_asm+0x1a/0x30
[   64.364097] 
[   64.365597] The buggy address belongs to the object at ffff8881066eaf00
[   64.365597]  which belongs to the cache kmalloc-64 of size 64
[   64.377938] The buggy address is located 0 bytes to the right of
[   64.377938]  allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30)
[   64.390800] 
[   64.392300] The buggy address belongs to the physical page:
[   64.397871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea
[   64.405870] flags: 0x200000000000000(node=0|zone=2)
[   64.410749] page_type: f5(slab)
[   64.413895] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000
[   64.421635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.429410] page dumped because: kasan: bad access detected
[   64.434990] 
[   64.436489] Memory state around the buggy address:
[   64.441282]  ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   64.448502]  ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   64.455722] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   64.462941]                                      ^
[   64.467731]  ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.474953]  ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   64.482171] ==================================================================